Javascript must be enabled to continue!
Study on the Functional Orientation of Malicious Collusion
View through CrossRef
The malicious collusion system has a long history, but there are still many issues. What is the status and role of the functional location of malicious collusion? One of the most controversial issues is what is the relationship between the malicious collusion system and the system of public order and good morals? The ambiguous function definition makes malicious collusion not only abused in the judgment, but also appear the gray area where it is mixed with other systems, or applied simultaneously. Therefore, clarifying its functional orientation will help to define the functions of malicious collusion, address the issue of validity defects effectively and avoid confusion in the application. It is of great significance to rationalize the logic of laws and regulations and to promote the judicial practice.
Title: Study on the Functional Orientation of Malicious Collusion
Description:
The malicious collusion system has a long history, but there are still many issues.
What is the status and role of the functional location of malicious collusion? One of the most controversial issues is what is the relationship between the malicious collusion system and the system of public order and good morals? The ambiguous function definition makes malicious collusion not only abused in the judgment, but also appear the gray area where it is mixed with other systems, or applied simultaneously.
Therefore, clarifying its functional orientation will help to define the functions of malicious collusion, address the issue of validity defects effectively and avoid confusion in the application.
It is of great significance to rationalize the logic of laws and regulations and to promote the judicial practice.
Related Results
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Construction of a Cybersecurity Behavior Knowledge Base for Malicious Behavior Analysis
Facing the surge in malicious behaviors in the network environment, the existing cybersecurity knowledge graph suffers from fragmented security knowledge and limited application sc...
Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Research on the Evolution of Collusion between Government and Civil Construction Enterprises in Environmental Regulation
Research on the Evolution of Collusion between Government and Civil Construction Enterprises in Environmental Regulation
Polluting civil construction enterprises usually use the way of "voting with their feet" to exert influence on the efforts of local government's environmental regulation, promote t...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
Status and solutions of malicious complaints
Status and solutions of malicious complaints
In Korea, malicious complaints that go beyond common sense are continuously occurring. Considering that Korea is a leading country in terms of security, the serious level of malici...
Learning-Based Detection for Malicious Android Application Using Code Vectorization
Learning-Based Detection for Malicious Android Application Using Code Vectorization
The malicious APK (Android Application Package) makers use some techniques such as code obfuscation and code encryption to avoid existing detection methods, which poses new challen...
Influence of innovation on the relationship between market orientation, entrepreneurial orientation, and SME performance in Pakistan
Influence of innovation on the relationship between market orientation, entrepreneurial orientation, and SME performance in Pakistan
Small and medium-sized firms (SMEs) are important in enhancing the economy, driving innovation, and enhancing competitiveness. Consequently, they play a substantial role in enhanci...
An efficient collusion resistant security mechanism for heterogeneous sensor networks
An efficient collusion resistant security mechanism for heterogeneous sensor networks
PurposeAs large‐scale homogeneous networks suffer from high costs of communication, computation, and storage requirements, the heterogeneous sensor networks (HSN) are preferred bec...

