Crimes cibernéticos: estelionato virtual

Detalhes bibliográficos
Autor(a) principal: Feitoza, Luis Guilherme de Matos
Data de Publicação: 2012
Idioma: por
Título da fonte: Repositório Institucional da UCB
Texto Completo: https://repositorio.ucb.br:9443/jspui/handle/10869/2819
Resumo: Direito
id UCB-2_e214b28b63cc6520f15ddde0285a1504
oai_identifier_str oai:200.214.135.189:10869/2819
network_acronym_str UCB-2
network_name_str Repositório Institucional da UCB
spelling Feitoza, Luis Guilherme de Matos2014-03-21T20:46:09Z2016-10-10T03:38:37Z2017-01-25T18:37:39Z2014-03-21T20:46:09Z2016-10-10T03:38:37Z2017-01-25T18:37:39Z2012-11-05FEITOZA, Luis Guilherme de Matos. Crimes cibernéticos: estelionato virtual. 2012. 70 f. Monografia (Graduação) - Universidade Católica de Brasília, Brasília, 2012.https://repositorio.ucb.br:9443/jspui/handle/10869/2819DireitoO estudo do presente trabalho de conclusão de curso baseia-se na investigação do tipo penal do estelionato praticado na internet. Expõe um breve relato histórico sobre o surgimento da rede mundial de computadores no Brasil e no mundo e elucida algumas questões pertinentes. Ilustra como os usuários que navegam na grande rede podem se proteger de possíveis ataques e lesões causadas pelos delinquentes virtuais. Apresenta de forma direta e sucinta todos os assuntos relativos aos cibercrimes e a maneira com que os transgressores agem para fraudar suas vítimas. Versa sobre sua aplicação penal e os incontáveis prejuízos causados à sociedade. Traz a forma como ele é cometido e os meios jurídicos existentes para reprimir e punir esta conduta. Faz menção a outros delitos informáticos recorrentes na internet e aponta o posicionamento dos tribunais a respeito deles. Comenta a importância dos projetos de leis que tramitam no Congresso Nacional e demonstra a carência de leis penais para tipificar e penalizar os indivíduos que incidem nesta técnica criminosa.The study of the present course conclusion work based itself in the inquiry of larceny committed on the internet. It exposes a brief historical about the emergence of the world net of computers in Brazil and in the world and explains some relevant questions. It illustrates as the users that sail in the big net are able to protected itself for possible attacks and cheats caused by the virtual delinquents. It presents of succinct and straight form all the relative matters to the cyber crimes and the way with that the transgressors act for defraud its victims. It is about penal application and the countless damages caused to the society. It brings the form as it is made and the existing legal means for repress and punish this conduct. It does mention to others recurring processed cyber crimes in the internet and aims the positioning of the courts as to them. It comments the importance of the projects of laws that are processed in the National Congress and demonstrate the lack of penal laws for typify and penalize the individuals that incident in this technical criminal.Submitted by Juliana Pereira (juliana.pereira@ucb.br) on 2014-03-17T15:44:39Z No. of bitstreams: 2 license_rdf: 20168 bytes, checksum: 288037d582f66c131a3b54761360a7bc (MD5) Luis Guilherme de Matos Feitoza.pdf: 570746 bytes, checksum: de25aef111ba912f1b69eae9251d9e0f (MD5)Approved for entry into archive by Kelson Anthony de Menezes(kelson@ucb.br) on 2014-03-21T20:46:09Z (GMT) No. of bitstreams: 2 license_rdf: 20168 bytes, checksum: 288037d582f66c131a3b54761360a7bc (MD5) Luis Guilherme de Matos Feitoza.pdf: 570746 bytes, checksum: de25aef111ba912f1b69eae9251d9e0f (MD5)Made available in DSpace on 2014-03-21T20:46:09Z (GMT). No. of bitstreams: 2 license_rdf: 20168 bytes, checksum: 288037d582f66c131a3b54761360a7bc (MD5) Luis Guilherme de Matos Feitoza.pdf: 570746 bytes, checksum: de25aef111ba912f1b69eae9251d9e0f (MD5) Previous issue date: 2012-11-05Made available in DSpace on 2016-10-10T03:38:37Z (GMT). No. of bitstreams: 5 Luis Guilherme de Matos Feitoza.pdf: 570746 bytes, checksum: de25aef111ba912f1b69eae9251d9e0f (MD5) license_url: 46 bytes, checksum: 0d2fb706760bf56ddf1358a832652ccf (MD5) license_text: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) license_rdf: 20168 bytes, checksum: 288037d582f66c131a3b54761360a7bc (MD5) license.txt: 1877 bytes, checksum: 84662e9ff0de521fe5e714c111389722 (MD5) Previous issue date: 2012-11-05Made available in DSpace on 2017-01-25T18:37:39Z (GMT). No. of bitstreams: 6 Luis Guilherme de Matos Feitoza.pdf.txt: 156099 bytes, checksum: 745c157d4a04263d785cd183adcc4cda (MD5) Luis Guilherme de Matos Feitoza.pdf: 570746 bytes, checksum: de25aef111ba912f1b69eae9251d9e0f (MD5) license_url: 46 bytes, checksum: 0d2fb706760bf56ddf1358a832652ccf (MD5) license_text: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) license_rdf: 20168 bytes, checksum: 288037d582f66c131a3b54761360a7bc (MD5) license.txt: 1877 bytes, checksum: 84662e9ff0de521fe5e714c111389722 (MD5) Previous issue date: 2012-11-05TextoInternetDireito penalEstelionato VirtualDireitoPenal lawLarceny committedCrimes cibernéticos: estelionato virtualinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/bachelorThesisUniversidade Católica de Brasília, Brasilinfo:eu-repo/semantics/openAccessporreponame:Repositório Institucional da UCBinstname:Universidade Católica de Brasília (UCB)instacron:UCBTEXTLuis Guilherme de Matos Feitoza.pdf.txtExtracted texttext/plain156099https://200.214.135.178:9443/jspui/bitstream/10869/2819/1/Luis%20Guilherme%20de%20Matos%20Feitoza.pdf.txt745c157d4a04263d785cd183adcc4cdaMD51ORIGINALLuis Guilherme de Matos Feitoza.pdfMonografiaapplication/pdf570746https://200.214.135.178:9443/jspui/bitstream/10869/2819/2/Luis%20Guilherme%20de%20Matos%20Feitoza.pdfde25aef111ba912f1b69eae9251d9e0fMD52CC-LICENSElicense_urlapplication/octet-stream46https://200.214.135.178:9443/jspui/bitstream/10869/2819/3/license_url0d2fb706760bf56ddf1358a832652ccfMD53license_textapplication/octet-stream0https://200.214.135.178:9443/jspui/bitstream/10869/2819/4/license_textd41d8cd98f00b204e9800998ecf8427eMD54license_rdfapplication/octet-stream20168https://200.214.135.178:9443/jspui/bitstream/10869/2819/5/license_rdf288037d582f66c131a3b54761360a7bcMD55LICENSElicense.txttext/plain1877https://200.214.135.178:9443/jspui/bitstream/10869/2819/6/license.txt84662e9ff0de521fe5e714c111389722MD5610869/28192017-01-25 16:37:40.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Repositório de Publicaçõeshttps://repositorio.ucb.br:9443/jspui/
dc.title.pt_BR.fl_str_mv Crimes cibernéticos: estelionato virtual
title Crimes cibernéticos: estelionato virtual
spellingShingle Crimes cibernéticos: estelionato virtual
Feitoza, Luis Guilherme de Matos
Internet
Direito penal
Estelionato Virtual
Direito
Penal law
Larceny committed
title_short Crimes cibernéticos: estelionato virtual
title_full Crimes cibernéticos: estelionato virtual
title_fullStr Crimes cibernéticos: estelionato virtual
title_full_unstemmed Crimes cibernéticos: estelionato virtual
title_sort Crimes cibernéticos: estelionato virtual
author Feitoza, Luis Guilherme de Matos
author_facet Feitoza, Luis Guilherme de Matos
author_role author
dc.contributor.author.fl_str_mv Feitoza, Luis Guilherme de Matos
dc.subject.por.fl_str_mv Internet
Direito penal
Estelionato Virtual
Direito
Penal law
Larceny committed
topic Internet
Direito penal
Estelionato Virtual
Direito
Penal law
Larceny committed
dc.description.pt_BR.fl_txt_mv Direito
dc.description.abstract.por.fl_txt_mv O estudo do presente trabalho de conclusão de curso baseia-se na investigação do tipo penal do estelionato praticado na internet. Expõe um breve relato histórico sobre o surgimento da rede mundial de computadores no Brasil e no mundo e elucida algumas questões pertinentes. Ilustra como os usuários que navegam na grande rede podem se proteger de possíveis ataques e lesões causadas pelos delinquentes virtuais. Apresenta de forma direta e sucinta todos os assuntos relativos aos cibercrimes e a maneira com que os transgressores agem para fraudar suas vítimas. Versa sobre sua aplicação penal e os incontáveis prejuízos causados à sociedade. Traz a forma como ele é cometido e os meios jurídicos existentes para reprimir e punir esta conduta. Faz menção a outros delitos informáticos recorrentes na internet e aponta o posicionamento dos tribunais a respeito deles. Comenta a importância dos projetos de leis que tramitam no Congresso Nacional e demonstra a carência de leis penais para tipificar e penalizar os indivíduos que incidem nesta técnica criminosa.
The study of the present course conclusion work based itself in the inquiry of larceny committed on the internet. It exposes a brief historical about the emergence of the world net of computers in Brazil and in the world and explains some relevant questions. It illustrates as the users that sail in the big net are able to protected itself for possible attacks and cheats caused by the virtual delinquents. It presents of succinct and straight form all the relative matters to the cyber crimes and the way with that the transgressors act for defraud its victims. It is about penal application and the countless damages caused to the society. It brings the form as it is made and the existing legal means for repress and punish this conduct. It does mention to others recurring processed cyber crimes in the internet and aims the positioning of the courts as to them. It comments the importance of the projects of laws that are processed in the National Congress and demonstrate the lack of penal laws for typify and penalize the individuals that incident in this technical criminal.
description Direito
publishDate 2012
dc.date.issued.fl_str_mv 2012-11-05
dc.date.accessioned.fl_str_mv 2014-03-21T20:46:09Z
2016-10-10T03:38:37Z
2017-01-25T18:37:39Z
dc.date.available.fl_str_mv 2014-03-21T20:46:09Z
2016-10-10T03:38:37Z
2017-01-25T18:37:39Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/bachelorThesis
status_str publishedVersion
dc.identifier.citation.fl_str_mv FEITOZA, Luis Guilherme de Matos. Crimes cibernéticos: estelionato virtual. 2012. 70 f. Monografia (Graduação) - Universidade Católica de Brasília, Brasília, 2012.
dc.identifier.uri.fl_str_mv https://repositorio.ucb.br:9443/jspui/handle/10869/2819
identifier_str_mv FEITOZA, Luis Guilherme de Matos. Crimes cibernéticos: estelionato virtual. 2012. 70 f. Monografia (Graduação) - Universidade Católica de Brasília, Brasília, 2012.
url https://repositorio.ucb.br:9443/jspui/handle/10869/2819
dc.language.iso.fl_str_mv por
language por
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv Texto
dc.source.none.fl_str_mv reponame:Repositório Institucional da UCB
instname:Universidade Católica de Brasília (UCB)
instacron:UCB
instname_str Universidade Católica de Brasília (UCB)
instacron_str UCB
institution UCB
reponame_str Repositório Institucional da UCB
collection Repositório Institucional da UCB
bitstream.url.fl_str_mv https://200.214.135.178:9443/jspui/bitstream/10869/2819/1/Luis%20Guilherme%20de%20Matos%20Feitoza.pdf.txt
https://200.214.135.178:9443/jspui/bitstream/10869/2819/2/Luis%20Guilherme%20de%20Matos%20Feitoza.pdf
https://200.214.135.178:9443/jspui/bitstream/10869/2819/3/license_url
https://200.214.135.178:9443/jspui/bitstream/10869/2819/4/license_text
https://200.214.135.178:9443/jspui/bitstream/10869/2819/5/license_rdf
https://200.214.135.178:9443/jspui/bitstream/10869/2819/6/license.txt
bitstream.checksum.fl_str_mv 745c157d4a04263d785cd183adcc4cda
de25aef111ba912f1b69eae9251d9e0f
0d2fb706760bf56ddf1358a832652ccf
d41d8cd98f00b204e9800998ecf8427e
288037d582f66c131a3b54761360a7bc
84662e9ff0de521fe5e714c111389722
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv
repository.mail.fl_str_mv
_version_ 1724829846920495104