Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Recolector de Cienci...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
versions View all 1 versions
addClaim

Delitos Informáticos

Authors: Davara Fernández de Marcos, Elena Pilar;

Delitos Informáticos

Abstract

Esta obra está destinada a todo aquel que desee aprender, tanto desde el propio concepto como desde la orientación práctica enfocada a resultado, todo lo necesario en relación a los denominados delitos informático. Y es que, pese a la rápida evolución de las Tecnologías de la Información y las Comunicaciones y de todo lo que conllevan, el Derecho no debe permanecer ajeno a esta realidad y, por ello, en esta obra se pueden consultar de manera ordenada, práctica, clara y concisa todas las normas que, tanto a nivel nacional como a nivel europeo, resultan de aplicación a todas las acciones que, tipificadas o no en el Código Penal, han de ser integradas en la figura de delitos informáticos. Asimismo, a lo largo de la obra, además de hacer un barrido por todo el Código Penal -haciendo hincapié en las novedades incorporadas en su última reforma e incluyendo una referencia a cuestiones de Compliance- analizando los delitos contemplados en él y cómo pueden ser cometidos haciendo uso de las TIC, se incorpora un análisis de los delitos informáticos que pueden tener lugar en/a través de Redes Sociales así como los que son consecuencia del llamado BYOT, pasando por el ransomware u otras cuestiones de ciberseguridad. Incluye las novedades incorporadas por la reforma del Código Penal de 2015 y con referencia al Compliance. Recoge las resoluciones de la AEPD sobre delitos cometidos en/y/o a través de Redes Sociales y el análisis de jurisprudencia a nivel nacional en materia de delitos informáticos. Actualizado a normativa vigente, tanto a nivel nacional como europeo analiza los temas; BYOD,Ciberseguridad, Ransomware etc.

This work is intended for anyone who wants to learn, both from the concept itself and from the practical orientation focused on results, everything necessary in relation to the so-called computer crimes. And, despite the rapid evolution of Information and Communication Technologies and all that entails, the Law should not remain alien to this reality and, therefore, in this work can be consulted in an orderly, practical, clear and concise all the norms that, both nationally and at European level, are applicable to all actions that, whether or not they are included in the Criminal Code, have to be integrated in the figure of computer crimes. Also, throughout the work, in addition to making a sweep across the Penal Code - emphasizing the new features incorporated in its latest reform and including a reference to issues of compliance - analyzing the crimes covered in it and how they can be committed Using ICT, an analysis of computer crimes that can take place in / through Social Networks as well as those that are a consequence of the BYOT, through ransomware or other cybersecurity issues are incorporated. It includes the news incorporated by the reform of the Penal Code of 2015 and with reference to Compliance. It includes the resolutions of the AEPD on crimes committed in / and / or through Social Networks and the analysis of jurisprudence at national level in the matter of computer crimes. Updated current regulations, both nationally and European analyzes the issues; BYOD, Cybersecurity, Ransomware etc.

info:eu-repo/semantics/publishedVersion

Libro de Investigación

Country
Spain
Related Organizations
Keywords

330

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green