El delito de transferencia no consentida de activos
The Criminal Code provided in article 269J the Mtypus of not consensual transfer of assets and possession, manufacture, introduction and facilitation of cheat's software to commit frauds, as characteristic figures of computer-related crimes in the strict sense, in addition to protect the securi...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | Spanish |
Published: |
2012
|
Subjects: | |
Online Access: | https://dialnet.unirioja.es/servlet/oaiart?codigo=7505132 |
Source: | Revista de Derecho, Comunicaciones y Nuevas Tecnologías, ISSN 1909-7786, Nº. 8, 2012 |
Tags: |
Add Tag
No Tags: Be the first to tag this record
|
id |
dialnet-ar-18-ART0001400052
|
---|---|
record_format |
dialnet
|
spelling |
dialnet-ar-18-ART00014000522022-03-13El delito de transferencia no consentida de activosPosada Maya, Ricardofraudes informáticosdelito informáticotrasferencia no consentida de activosdelitos contra la seguridad de la informaciónComputer fraudcomputer crimenot consensual transfer of assetsoffences against the security of the informationThe Criminal Code provided in article 269J the Mtypus of not consensual transfer of assets and possession, manufacture, introduction and facilitation of cheat's software to commit frauds, as characteristic figures of computer-related crimes in the strict sense, in addition to protect the security of computerized information and the economic heritage. This contribution seeks a brief in relation to the concept of cybercrime study, the interest protected by the cited standard, and the objective and subjective elements that make up this class of legal prosecutions that certainly constitute a major advance to complete the "Microsystems" of security of the information and data in the existing criminal law.El Código Penal colombiano prevé en el artículo 269J las figuras típicas de Transferencia no consentida de activos y tenencia de software destinado al fraude, propias de los delitos informáticos en sentido estricto que, además de la seguridad de la información informatizada, protegen el patrimonio económico. Así las cosas, la presente contribución busca realizar un estudio breve en relación con el concepto de "ciberdelito", el bien jurídico protegido por la norma citada y los elementos objetivos y subjetivos que estructuran este tipo de incriminaciones jurídicas que, en nuestro medio, constituyen un avance imprescindible para completar el "microsistema" de seguridad de la información y los datos en el CP penal vigente.2012text (article)application/pdfhttps://dialnet.unirioja.es/servlet/oaiart?codigo=7505132(Revista) ISSN 1909-7786Revista de Derecho, Comunicaciones y Nuevas Tecnologías, ISSN 1909-7786, Nº. 8, 2012spaLICENCIA DE USO: Los documentos a texto completo incluidos en Dialnet son de acceso libre y propiedad de sus autores y/o editores. Por tanto, cualquier acto de reproducción, distribución, comunicación pública y/o transformación total o parcial requiere el consentimiento expreso y escrito de aquéllos. Cualquier enlace al texto completo de estos documentos deberá hacerse a través de la URL oficial de éstos en Dialnet. Más información: https://dialnet.unirioja.es/info/derechosOAI | INTELLECTUAL PROPERTY RIGHTS STATEMENT: Full text documents hosted by Dialnet are protected by copyright and/or related rights. This digital object is accessible without charge, but its use is subject to the licensing conditions set by its authors or editors. Unless expressly stated otherwise in the licensing conditions, you are free to linking, browsing, printing and making a copy for your own personal purposes. All other acts of reproduction and communication to the public are subject to the licensing conditions expressed by editors and authors and require consent from them. Any link to this document should be made using its official URL in Dialnet. More info: https://dialnet.unirioja.es/info/derechosOAI
|
institution |
Dialnet
|
collection |
Dialnet AR
|
source |
Revista de Derecho, Comunicaciones y Nuevas Tecnologías, ISSN 1909-7786, Nº. 8, 2012
|
language |
Spanish
|
topic |
fraudes informáticos
delito informático trasferencia no consentida de activos delitos contra la seguridad de la información Computer fraud computer crime not consensual transfer of assets offences against the security of the information |
spellingShingle |
fraudes informáticos
delito informático trasferencia no consentida de activos delitos contra la seguridad de la información Computer fraud computer crime not consensual transfer of assets offences against the security of the information Posada Maya, Ricardo El delito de transferencia no consentida de activos |
description |
The Criminal Code provided in article 269J the Mtypus of not consensual transfer of assets and possession, manufacture, introduction and facilitation of cheat's software to commit frauds, as characteristic figures of computer-related crimes in the strict sense, in addition to protect the security of computerized information and the economic heritage. This contribution seeks a brief in relation to the concept of cybercrime study, the interest protected by the cited standard, and the objective and subjective elements that make up this class of legal prosecutions that certainly constitute a major advance to complete the "Microsystems" of security of the information and data in the existing criminal law.
|
format |
Article
|
author |
Posada Maya, Ricardo
|
author_facet |
Posada Maya, Ricardo
|
author_sort |
Posada Maya, Ricardo
|
title |
El delito de transferencia no consentida de activos
|
title_short |
El delito de transferencia no consentida de activos
|
title_full |
El delito de transferencia no consentida de activos
|
title_fullStr |
El delito de transferencia no consentida de activos
|
title_full_unstemmed |
El delito de transferencia no consentida de activos
|
title_sort |
el delito de transferencia no consentida de activos
|
publishDate |
2012
|
url |
https://dialnet.unirioja.es/servlet/oaiart?codigo=7505132
|
_version_ |
1727401238798008320
|