Font Size: a A A

Traffic Coordinator For Illegal Money Qualitative Analysis

Posted on:2017-08-17Degree:MasterType:Thesis
Country:ChinaCandidate:L J LiFull Text:PDF
GTID:2336330485997921Subject:Punishment law
Abstract/Summary:PDF Full Text Request
With of our country economy and the rapid development of the population flow is frequent, public security departments of traffic management become more and more heavy, public security organs across the country in order to alleviate the increasingly grim situation, solve the difficulties caused by the shortage of police, as the Transportation Association of employment system of the public security organ pipe member of this group arises at the historic moment. As a road traffic safety management work in a group, whether in the absolute number and play the role of consideration, the traffic assistant is an important auxiliary force. As a kind of institutional attempt of the public security organs, the group of traffic assistant management also has many problems and contradictions in practice. Also, with the popularization of computer and Internet application using computer information system of crime is more and more, especially the combination of using computer information system and other property crime increased the difficulty of cases identified. Traffic assistant management in the process of assisting in the management of traffic management in the use of computer information systems involved in property crime in the judicial practice there is a lot of controversy. This paper on the basis of the existing research combined with the two aspects of theory and practice, the related views of such cases, to properly resolve the road. This thesis consists of four parts besides the preface. The first part of this paper briefly introduces the basic situation of the case. This part includes the cause of action, the case introduction, case of disagreement, the disputed points four parts of the case.The second part addresses the related issues of dispute focus legal analysis. This part is the core of this article research, first of all, the main body of taking bribes in the state functionaries identity is analyzed, from the "identity" to "post" two aspects were analyzed. Second, the legal analysis of the use of position, and position the distinction between the convenience and services. Once again, to destroy the computer information system crime legal analysis, defined the object of destroying computer information system crime and standards.The third part is case analysis and conclusion, this article second part of the legal analysis of this part, the case that your processing opinion. Analysis the behavior of the person of the attack, constitute a breach of the computer information system and belongs to the serious consequences. The defendant has no state personnel identity, not by taking advantage of his office, does not constitute a public prosecution organ quality of taking bribes. In addition, unpaid violations when not officially turned over to the state Treasury or traffic administration, still belongs to the state property, is not in conformity with the basic requirements of larceny. The defendants' ACTS constitute a breach of the computer information system and the serious consequences.The fourth part is through the related analysis of case of revelation. Using bribery of state functionaries and position on the convenience of recognition based on the essence of bribery. Add property punishment of destroying computer information system crime...
Keywords/Search Tags:Traffic management assistant, State personnel identity, The facility of power, The destruction of the computer information system
PDF Full Text Request
Related items