bachelorThesis
Eficacia de las normas penales colombianas para prevenir y sancionar los ciberdelitos
Registro en:
Autor
Escobar Roa, Daniela Alejandra
Jim?nez Moreno, Linda Dayana
Institución
Resumen
En el ?ltimo siglo, son extensas las cifras presentadas en nuestro pa?s, debido a la ciber delincuencia, y a la alta flexibilidad de los entes jur?dicos e instituciones, con la aplicaci?n de la normatividad jur?dica, frente a este tipo de delitos. Por lo anterior, nos enfocamos en este estudio en reconocer y diferenciar que tan eficaces, eficientes y efectivas son las normas jur?dicas penales, frente a este tipo de actos delictivos en nuestro pa?s. Comenzado as?, por un estudio hist?rico y comparado con la legislaci?n jur?dica de otros pa?ses, seguido a esto, una investigaci?n exhausta con respecto a la normatividad y extensiones doctrinales, que nos brinda nuestro sistema jur?dico. Continuando, y para mayor entendimiento, escogimos tres casos de la vida real, acontecidos en nuestro pa?s, en donde se evidencia a cabalidad la materializaci?n del delito inform?tico, y se permite observar el tr?mite procedimental que le han otorgado los entes competentes en el mismo. Llegando a la conclusi?n y descubriendo los vac?os normativos que existen en cada proceso, la ambigua interpretaci?n de la norma y por ?ltimo, la ausencia de verbos rectores. In the last century, the figures presented in our country, due to cybercrime, and the high flexibility of the legal entities and institutions, with the application of legal norms, are extensive in the face of this type of crime. For this reason, we focus in this study on recognizing and differentiating how effective, efficient and effective the criminal legal norms are, in the face of this type of criminal acts in our country. Thus started, by a historical study and compared with the legal legislation of other countries, followed by this, an exhausting investigation with respect to the normativity and doctrinal extensions, which our legal system provides us. Continuing, and for greater understanding, we chose three cases of real life, occurring in our country, where the materialization of computer crime is fully evidenced, and it is allowed to observe the procedural procedure granted to it by the competent authorities. Reaching the conclusion and discovering the normative gaps that exist in each process, the ambiguous interpretation of the norm and finally, the absence of guiding verbs
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
The application of distributed virtual machines for enterprise computer management: A two-tier network file system for image provisioning and management
Aguiar, César S.; Cruz, Daniel I.; Spolon, Roberta; Cavenaghi, Marcos Antônio -
The application of distributed virtual machines for enterprise computer management: A two-tier network file system for image provisioning and management
Universidade Estadual Paulista (Unesp) (2008-09-23)In order to simplify computer management, several system administrators are adopting advanced techniques to manage software configuration of enterprise computer networks, but the tight coupling between hardware and software ... -
The application of distributed virtual machines for enterprise computer management: A two-tier network file system for image provisioning and management
Universidade Estadual Paulista (Unesp) (2008-09-23)In order to simplify computer management, several system administrators are adopting advanced techniques to manage software configuration of enterprise computer networks, but the tight coupling between hardware and software ...