Hasil untuk "Criminal law and procedure"

Menampilkan 20 dari ~1902279 hasil · dari CrossRef, DOAJ, arXiv, Semantic Scholar

JSON API
DOAJ Open Access 2026
Regulasi Hukum Ekonomi Digital: Implikasi Undang-Undang Nomor 1 Tahun 2024 Terhadap E-Commerce dan Start-Up di Indonesia

Della Delia, David Tan, Shenti Agustini

Kemajuan teknologi digital memberikan pengaruh yang signifikan terhadap sektor ekonomi dan hukum di Indonesia, terutama bagi pelaku bisnis digital dan startup. Penelitian ini bertujuan untuk mengkaji penerapan Undang-Undang Nomor 1 Tahun 2024 tentang Informasi dan Transaksi Elektronik (UU ITE) dalam memberikan perlindungan hukum bagi pelaku usaha digital, serta mengidentifikasi berbagai tantangan yang dihadapi startup dalam memenuhi ketentuan hukum tersebut. Metode penelitian yang digunakan adalah pendekatan hukum normatif dengan analisis deskriptif berdasarkan bahan hukum primer dan sekunder. Hasil penelitian mengungkapkan bahwa meskipun UU ITE telah menyediakan landasan hukum yang cukup kuat bagi aktivitas digital, masih terdapat sejumlah hambatan seperti rendahnya kesadaran hukum, tumpang tindih regulasi, serta keterbatasan sumber daya. Oleh karena itu, diperlukan kolaborasi antara pemerintah, aparat penegak hukum, dan pelaku industri digital guna memperkuat penerapan serta kepatuhan terhadap hukum di sektor ekonomi digital.

Criminal law and procedure
DOAJ Open Access 2026
Efektivitas Penegakan Peraturan Daerah oleh Satpol PP Terhadap Penertiban Pedagang Kaki Lima di Kabupaten Solok

Elsa Novrima Dewi, Darmini Roza, Fitra Mulyawan

Penelitian ini bertujuan untuk menganalisis efektivitas pelaksanaan penegakan Peraturan Daerah Kabupaten Solok Nomor 9 Tahun 2019 oleh Satuan Polisi Pamong Praja (Satpol PP) terhadap penertiban Pedagang Kaki Lima (PKL), serta mengidentifikasi kendala-kendala yang dihadapi dalam proses tersebut. Penelitian menggunakan metode yuridis normatif dan yuridis empiris dengan spesifikasi deskriptif-analitis. Data diperoleh melalui studi kepustakaan, wawancara semi-terstruktur dengan aparat Satpol PP dan PKL, serta observasi langsung di beberapa lokasi pelanggaran. Hasil penelitian menunjukkan bahwa penegakan Perda oleh Satpol PP belum efektif, ditandai dengan masih tingginya pelanggaran yang dilakukan PKL secara berulang dan belum adanya efek jera. Hambatan yang dihadapi mencakup kendala yuridis seperti substansi peraturan yang belum operasional, serta kendala non-yuridis seperti keterbatasan personel, sarana prasarana, minimnya anggaran, resistensi sosial, dan lemahnya koordinasi antar-OPD. Oleh karena itu, diperlukan pendekatan hukum yang lebih holistik dan integratif, serta peningkatan kapasitas kelembagaan dan kesadaran hukum masyarakat untuk mewujudkan ketertiban ruang publik secara berkelanjutan.

Criminal law and procedure
S2 Open Access 2025
Strategy for Optimizing the Position of Whistleblowers and Justice Collaborators in Corruption Criminal Law Reform in Indonesia

Thomy Faisal, S. Suparno

Whistleblowers and justice collaborators play an important role in dismantling complex corruption networks that often involve powerful actors in government and the private sector. However, in practice, their existence still does not receive optimal legal protection. This study aims to examine the strategy for optimizing the position of whistleblowers and justice collaborators within the framework of corruption criminal law reform in Indonesia. Using a normative legal method, this study analyzes applicable laws and regulations, such as Law No. 31 of 1999 in conjunction with Law No. 20 of 2001, Law No. 13 of 2006 in conjunction with Law No. 31 of 2014, and LPSK Regulation No. 4 of 2021, as well as relevant legal theories. The study results indicate a gap between legal norms and their implementation, especially regarding the criminalization of whistleblowers, the unclear procedure for granting justice collaborator status, and the weak institutional protection of LPSK due to limited budget and authority. In addition, structural challenges and a culture of silence in the bureaucratic environment worsen the situation for whistleblowers. This study recommends revising regulations by adding an explicit prohibition on the criminalization of whistleblowers, strengthening the LPSK institution, providing financial incentives and economic protection, training law enforcers, and utilizing safe and anonymous reporting technology. This strategy is expected to encourage broader public participation in efforts to eradicate corruption and form a more just, inclusive, and sustainable legal system.

arXiv Open Access 2025
Protected Grounds and the System of Non-Discrimination Law in the Context of Algorithmic Decision-Making and Artificial Intelligence

Janneke Gerards, Frederik Zuiderveen Borgesius

Algorithmic decision-making and similar types of artificial intelligence (AI) may lead to improvements in all sectors of society, but can also have discriminatory effects. While current non-discrimination law offers people some protection, algorithmic decision-making presents the law with several challenges. For instance, algorithms can generate new categories of people based on seemingly innocuous characteristics, such as web browser preference or apartment number, or more complicated categories combining many data points. Such new types of differentiation could evade non-discrimination law, as browser type and house number are not protected characteristics, but such differentiation could still be unfair, for instance if it reinforces social inequality. This paper explores which system of non-discrimination law can best be applied to algorithmic decision-making, considering that algorithms can differentiate on the basis of characteristics that do not correlate with protected grounds of discrimination such as ethnicity or gender. The paper analyses the current loopholes in the protection offered by non-discrimination law and explores the best way for lawmakers to approach algorithmic differentiation. While we focus on Europe, the conceptual and theoretical focus of the paper can make it useful for scholars and policymakers from other regions too, as they encounter similar problems with algorithmic decision-making.

en cs.CY
arXiv Open Access 2025
Demystifying AI in Criminal Justice

Richard Berk

There is widespread confusion among criminal justice practitioners and legal scholars about the use of artificial intelligence in criminal justice. This didactic review is written for readers with little or no background in statistics or computer science. It is not intended to replace more technical treatments. It is intended to supplement them and encourage readers to dig more deeply into topics that strike their fancy.

en cs.CY, stat.AP
arXiv Open Access 2025
When Anti-Fraud Laws Become a Barrier to Computer Science Research

Madelyne Xiao, Andrew Sellars, Sarah Scheffler

Computer science research sometimes brushes with the law, from red-team exercises that probe the boundaries of authentication mechanisms, to AI research processing copyrighted material, to platform research measuring the behavior of algorithms and users. U.S.-based computer security research is no stranger to the Computer Fraud and Abuse Act (CFAA) and the Digital Millennium Copyright Act (DMCA) in a relationship that is still evolving through case law, research practices, changing policies, and legislation. Amid the landscape computer scientists, lawyers, and policymakers have learned to navigate, anti-fraud laws are a surprisingly under-examined challenge for computer science research. Fraud brings separate issues that are not addressed by the methods for navigating CFAA, DMCA, and Terms of Service that are more familiar in the computer security literature. Although anti-fraud laws have been discussed to a limited extent in older research on phishing attacks, modern computer science researchers are left with little guidance when it comes to navigating issues of deception outside the context of pure laboratory research. In this paper, we analyze and taxonomize the anti-fraud and deception issues that arise in several areas of computer science research. We find that, despite the lack of attention to these issues in the legal and computer science literature, issues of misrepresented identity or false information that could implicate anti-fraud laws are actually relevant to many methodologies used in computer science research, including penetration testing, web scraping, user studies, sock puppets, social engineering, auditing AI or socio-technical systems, and attacks on artificial intelligence. We especially highlight the importance of anti-fraud laws in two research fields of great policy importance: attacking or auditing AI systems, and research involving legal identification.

en cs.CY
S2 Open Access 2024
Implications of Changes in the Criminal Procedure Law of the ITE Law on Individual Rights in the Indonesian Legal System

Fahmi Sidiq, Astrid Sulistya Azahra, Dede Irman Pirdaus

The revision of the Electronic Information and Transactions Law (UU ITE) in Indonesia has become a hot topic of debate. Institutions and activists such as the Institute for Criminal Justice Reform (ICJR) and the Press Legal Aid Institute (LBH Pers) have presented various arguments regarding the impact of these changes. This article outlines the five main arguments advanced by the ICJR and LBH Pers. First, there is an objection to Article 27 paragraph (3) which regulates insults and defamation. Second, changes in criminal procedural law raise concerns about the discretionary authority of law enforcement officials without involving the courts. Third, the addition of cyberbullying-related crimes raises concerns about the potential for over-criminalization. Fourth, governments are given additional powers to filter and block content, which can result in potential abuse. Finally, the fifth argument relates to the "right to be forgotten" clause which can be used as a tool of censorship against news publications and journalists about one's past. This article also examines the impact of information technology developments on computer crime and underscores the importance of protecting individual rights and free speech in the digital age.

5 sitasi en
DOAJ Open Access 2024
Перспективы правового регулирования и алгоритм маркировки генеративного контента

Бодров Н. Ф., Лебедева А. К.

Введение: статья посвящена анализу механизмов правового регулирования генеративного контента в Российской Федерации, алгоритма его маркирования. Анализ действующего законодательства показывает, что возрастание роли технологий искусственного интеллекта в современном обществе диктует необходимость совершенствования существующих, а также разработки новых норм для правового регулирования оборота генеративного контента. Российский законодатель предпринимает первые попытки разработки законодательных мер контроля за оборотом генеративного контента, однако в настоящее время отсутствует даже унифицированное определение дипфейка как основополагающего понятия данной сферы. Цель: на основе существующей классификации видов генеративного контента описать существующие виды его маркировки, представить определение дипфейка. Методы: сравнительно-правовой, эмпирические методы описания, интерпретации, теоретические методы формальной и диалектической логики, юридико-догматический и метод толкования правовых норм. Результаты: анализ видов генеративного контента, целей его распространения демонстрирует необходимость создания эффективных правовых и технологических механизмов регулирования. Разработаны теоретические положения о структуре субъектов создания и распространения генеративного контента, предложены рекомендации по установлению их правовых обязанностей и ответственности. Выводы: механизмы правового регулирования генеративного контента на данном этапе сводятся к следующему: закрепление обязанности технологических компаний и пользователей, создающих генеративный контент, использовать водяные знаки для маркирования контента в целях информирования иных лиц о генеративной природе контента; установление ответственности за отказ от маркировки или удаление какого-либо вида маркировки, неправомерное использование биометрических персональных данных для создания дипфейка; учет общественной опасности деяний, совершаемых с использованием дипфейка в качестве средства.

Criminal law and procedure
arXiv Open Access 2024
Criminal organizations exhibit hysteresis, resilience, and robustness by balancing security and efficiency

Casper van Elteren, Vítor V. Vasconcelos, Mike Lees

The interplay between criminal organizations and law enforcement disruption strategies is crucial in criminology. Criminal enterprises, like legitimate businesses, balance visibility and security to thrive. This study uses evolutionary game theory to analyze criminal networks' dynamics, resilience to interventions, and responses to external conditions. We find strong hysteresis effects, challenging traditional deterrence-focused strategies. Optimal thresholds for organization formation or dissolution are defined by these effects. Stricter punishment doesn't always deter organized crime linearly. Network structure, particularly link density and skill assortativity, significantly influences organization formation and stability. These insights advocate for adaptive policy-making and strategic law enforcement to effectively disrupt criminal networks.

en physics.soc-ph, cs.SI
arXiv Open Access 2024
Unlocking Criminal Hierarchies: A Survey, Experimental, and Comparative Exploration of Techniques for Identifying Leaders within Criminal Networks

Kamal Taha, Abdulhadi Shoufan, Aya Taha

This survey paper offers a thorough analysis of techniques and algorithms used in the identification of crime leaders within criminal networks. For each technique, the paper examines its effectiveness, limitations, potential for improvement, and future prospects. The main challenge faced by existing survey papers focusing on algorithms for identifying crime leaders and predicting crimes is effectively categorizing these algorithms. To address this limitation, this paper proposes a new methodological taxonomy that hierarchically classifies algorithms into more detailed categories and specific techniques. The paper includes empirical and experimental evaluations to rank the different techniques. The combination of the methodological taxonomy, empirical evaluations, and experimental comparisons allows for a nuanced and comprehensive understanding of the techniques and algorithms for identifying crime leaders, assisting researchers in making informed decisions. Moreover, the paper offers valuable insights into the future prospects of techniques for identifying crime leaders, emphasizing potential advancements and opportunities for further research. Here's an overview of our empirical analysis findings and experimental insights, along with the solution we've devised: (1) PageRank and Eigenvector centrality are reliable for mapping network connections, (2) Katz Centrality can effectively identify influential criminals through indirect links, stressing their significance in criminal networks, (3) current models fail to account for the specific impacts of criminal influence levels, the importance of socio-economic context, and the dynamic nature of criminal networks and hierarchies, and (4) we propose enhancements, such as incorporating temporal dynamics and sentiment analysis to reflect the fluidity of criminal activities and relationships

en cs.SI, cs.AI
S2 Open Access 2023
Teaching Criminal Law Procedure in Universities: Meeting the Needs of Juveniles in Criminal Legal Practice

Nadzriah Ahmad

Children's involvement in school disciplinary problems is often a predictor of their involvement in crime in the future, resulting in them coming into contact with the criminal justice system. Therefore, teaching final-year law students the subject of criminal procedure, particularly governing the juvenile justice system, is essential for legal practice, especially when the legal rights of the children need to be protected since they are vulnerable to the adverse effects of the juvenile justice system. In this connection, the objectives of this paper are (a) to examine the underpinning causes behind children’s involvement in disciplinary problems in schools as predictors of their future involvement in crime; (b) to analyse the existing legal framework governing the juvenile justice system in Malaysia that forms part of the subject of criminal law procedure, and (c) to examine the importance of teaching criminal law procedure subject to final-year law students in preparing them for legal practice, especially when dealing with juveniles in the juvenile justice system. A qualitative research design is undertaken to explore the significance of teaching criminal law procedure to final-year law students by undertaking library-based research and an examination of content analysis, drawing from both primary and secondary sources. The findings in this research demonstrate that children who commit disciplinary problems in schools, such as truancy and bullying, will eventually come into contact with the criminal justice system, and their legal rights need to be protected. This research is significant in meeting the university’s mission, vision and values and supporting the national framework for reducing crime rates and strengthening crime prevention initiatives.

1 sitasi en
arXiv Open Access 2023
Deep Learning Criminal Networks

Haroldo V. Ribeiro, Diego D. Lopes, Arthur A. B. Pessa et al.

Recent advances in deep learning methods have enabled researchers to develop and apply algorithms for the analysis and modeling of complex networks. These advances have sparked a surge of interest at the interface between network science and machine learning. Despite this, the use of machine learning methods to investigate criminal networks remains surprisingly scarce. Here, we explore the potential of graph convolutional networks to learn patterns among networked criminals and to predict various properties of criminal networks. Using empirical data from political corruption, criminal police intelligence, and criminal financial networks, we develop a series of deep learning models based on the GraphSAGE framework that are able to recover missing criminal partnerships, distinguish among types of associations, predict the amount of money exchanged among criminal agents, and even anticipate partnerships and recidivism of criminals during the growth dynamics of corruption networks, all with impressive accuracy. Our deep learning models significantly outperform previous shallow learning approaches and produce high-quality embeddings for node and edge properties. Moreover, these models inherit all the advantages of the GraphSAGE framework, including the generalization to unseen nodes and scaling up to large graph structures.

en physics.soc-ph, cs.SI
arXiv Open Access 2023
CrimeGAT: Leveraging Graph Attention Networks for Enhanced Predictive Policing in Criminal Networks

Chen Yang

In this paper, we present CrimeGAT, a novel application of Graph Attention Networks (GATs) for predictive policing in criminal networks. Criminal networks pose unique challenges for predictive analytics due to their complex structure, multi-relational links, and dynamic behavior. Traditional methods often fail to capture these complexities, leading to suboptimal predictions. To address these challenges, we propose the use of GATs, which can effectively leverage both node features and graph structure to make predictions. Our proposed CrimeGAT model integrates attention mechanisms to weigh the importance of a node's neighbors, thereby capturing the local and global structures of criminal networks. We formulate the problem as learning a function that maps node features and graph structure to a prediction of future criminal activity. The experimental results on real-world datasets demonstrate that CrimeGAT out-performs conventional methods in predicting criminal activities, thereby providing a powerful tool for law enforcement agencies to proactively deploy resources. Furthermore, the interpretable nature of the attentionmechanism inGATs offers insights into the key players and relationships in criminal networks. This research opens new avenues for applying deep learning techniques in the Aeld of predictive policing and criminal network analysis.

en cs.SI
arXiv Open Access 2023
TransCrimeNet: A Transformer-Based Model for Text-Based Crime Prediction in Criminal Networks

Chen Yang

This paper presents TransCrimeNet, a novel transformer-based model for predicting future crimes in criminal networks from textual data. Criminal network analysis has become vital for law enforcement agencies to prevent crimes. However, existing graph-based methods fail to effectively incorporate crucial textual data like social media posts and interrogation transcripts that provide valuable insights into planned criminal activities. To address this limitation, we develop TransCrimeNet which leverages the representation learning capabilities of transformer models like BERT to extract features from unstructured text data. These text-derived features are fused with graph embeddings of the criminal network for accurate prediction of future crimes. Extensive experiments on real-world criminal network datasets demonstrate that TransCrimeNet outperforms previous state-of-the-art models by 12.7\% in F1 score for crime prediction. The results showcase the benefits of combining textual and graph-based features for actionable insights to disrupt criminal enterprises.

en cs.CY
DOAJ Open Access 2022
Identification of persons in pre-investigation proceedings and investigation: Current controversies and the case law of the Supreme Court of Cassation

Tasić Marija, Žarković Milan, Bull Ray

The present article analyses the case law of the Supreme Court of Cassation of the Republic of Serbia regarding the identification of persons conducted in pre-investigation proceedings and investigation by the police. The basic assumption is that the quality and precision of the criminal procedure rules and judgments of the Supreme Court of Cassation additionally determine the police actions in the conditions of expected harmonization of these rules with the most important scientific findings on factors ('system variables') that affect the accuracy of identification. To determine how the case law in Serbia treats certain assertions made in the requests for protection of legality regarding violations of criminal procedure regarding the identification of persons, the present article analyzed 33 judgments issued by the Supreme Court of Cassation regarding these requests in the period from 2013 to 2021. Based on the results of the analysis, recommendations regarding the improvement of the current criminal procedure rules referring to the identification of persons in Serbia were provided, and that by respecting research-informed standards for the collection, preservation, and presentation of identification evidence.

Social pathology. Social and public welfare. Criminology
DOAJ Open Access 2022
ANALISIS PERAN KORBAN DALAM TERJADINYA KECELAKAAN LALULINTAS SEBAGAI UPAYA PENANGGULANGANNYA (Studi Pada Satlantas Polresta Padang)

Omrizal Omrizal

Keterlibatan korban dalam suatu peristiwa kecelakaan harus menjadi sebuah kajian dalam upaya menekan angka kecelakaan tersebut. Penelitian ini bersifat deskriptif analitis. Pendekatan yang digunakan adalah pendekatan Yuridis Normatif yang didukung pendekatan  Yuridis Empiris. 112 125 Peran korban dalam terjadinya kecelakaan lalulintas di Kota Padang  adalah adanya korban yang kurang konsentrasi dan menyalip serta menyeberang tiba tiba. Korban yang kurang konsetrasi sehingga tidak memperhatikan rambu atau peringatan yang ada di jalan. Kondisi kelelahan/ mengantuk membuat korban lengah dalam mengendarai kendaraannya. Peranan korban sangatlah berpengaruh dalam terjadinya kecelakaan baik secara sadar maupun tidak sadar sehingga menjadikannya sebagai korban. Upaya yang dilakukan Satlantas Polresta Padang dalam menanggulangi  kecelakaan lalulintas berdasarkan analisis peran korban adalah dengan meningkatkan sistem kerja penanganan kecelakaan lalu lintas sehingga bisa bekerja dengan optimal. Pembinaan masyarakat di bidang lalu lintas. Mengadakan program kegiatan Penegakan Hukum bukan berorientasi mencari kesalahan dari pengguna jalan tetapi lebih berorientasi pada perlindungan, pengayoman  dan pelayanan pengguana jalan yang melanggar itu sendiri. Upaya-upaya tersebut bahwa pada dasarnya kecelakan terjadi karena kurangnya kesadaran  masyarakat untuk menjaga keselamatannya sendiri dalam berkendara.

Criminal law and procedure
arXiv Open Access 2022
Machine Learning Partners in Criminal Networks

Diego D. Lopes, Bruno R. da Cunha, Alvaro F. Martins et al.

Recent research has shown that criminal networks have complex organizational structures, but whether this can be used to predict static and dynamic properties of criminal networks remains little explored. Here, by combining graph representation learning and machine learning methods, we show that structural properties of political corruption, police intelligence, and money laundering networks can be used to recover missing criminal partnerships, distinguish among different types of criminal and legal associations, as well as predict the total amount of money exchanged among criminal agents, all with outstanding accuracy. We also show that our approach can anticipate future criminal associations during the dynamic growth of corruption networks with significant accuracy. Thus, similar to evidence found at crime scenes, we conclude that structural patterns of criminal networks carry crucial information about illegal activities, which allows machine learning methods to predict missing information and even anticipate future criminal behavior.

en physics.soc-ph, cs.LG
arXiv Open Access 2022
Cybersecurity Law: Legal Jurisdiction and Authority

Feras A. Batarseh

Cybersecurity threats affect all aspects of society; critical infrastructures (such as networks, corporate systems, water supply systems, and intelligent transportation systems) are especially prone to attacks and can have tangible negative consequences on society. However, these critical cyber systems are generally governed by multiple jurisdictions, for instance the Metro in the Washington, D.C. area is managed by the states of Virginia and Maryland, as well as the District of Columbia (DC) through Washington Metropolitan Area Transit Authority (WMATA). Additionally, the water treatment infrastructure managed by DC Water consists of waste water input from Fairfax and Arlington counties, and the district (i.e. DC). Additionally, cyber attacks usually launch from unknown sources, through unknown switches and servers, and end up at the destination without much knowledge on their source or path. Certain infrastructures are shared amongst multiple countries, another idiosyncrasy that exacerbates the issue of governance. This law paper however, is not concerned with the general governance of these infrastructures, rather with the ambiguity in the relevant laws or doctrines about which authority would prevail in the context of a cyber threat or a cyber-attack, with a focus on federal vs. state issues, international law involvement, federal preemption, technical aspects that could affect lawmaking, and conflicting responsibilities in cases of cyber crime. A legal analysis of previous cases is presented, as well as an extended discussion addressing different sides of the argument.

en cs.SI, cs.CR
S2 Open Access 2021
Problems of Criminal Law and Criminal Procedure in International Search

Maksim Yur’evich Tarasov

: During the operational search activities and criminal proceedings it is often necessary to issue an international search warrant for a person in order to arrest and extradite him/her. In such cases, a number of questions related to the regulation of criminal law and criminal procedure arise, the answers to which are not obvious, and are not available in the scientific literature. Based on the analysis of Russian legislation and practice of its application, the standards of international law, as well as scientific information sources and references, the answers to a number of questions have been substantiated, including: the types of offences for which an international search warrant can be issued against a person; whose competence it is to issue an international search warrant against a person; documented justification for issuing an international search warrant against a person; against which persons (with what standing) an international search warrant can be issued; who and at what stage applies the measure of restrain in the form of taking into custody for an internationally wanted person. The answers received provide grounds for improving the regulations governing the declaration of an international search for a person in the Russian Federation with a view to arrest and extradition, as well as the practice of their application. The purpose of the research is to identify the problems in criminal law and criminal procedure in the field of international search and to substantiate options for solving them in the legislation and law enforcement practice. In order to achieve this, the following objectives are being pursued: the types of offences for which an international search warrant is issued against a person are identified; the bodies and officials whose competence includes issuing an international search warrant against a person are identified; the documented justification for issuing an international search warrant against a person are identified; the analysis is made in order to identify against which persons (with what standing) an international search warrant can be issued; the analysis is made in order to study who and at what stage chooses the measure of restraint in the from of taking into custody for an internationally wanted person.

2 sitasi en
DOAJ Open Access 2021
Интеллектуальная природа права в основных концепциях правопонимания

А. А. КОСЫХ

Введение: зарождение правовых норм, их трансформация, специализация и отраслевая дифференциация, формирование системы права – все это свидетельствует о постоянном качественном, интеллектуально обоснованном развитии права. В статье проводится анализ основных концепций правопонимания (естественно-правовой, исторической, психологической, нормативистской, марксистской, антропологического подхода) на предмет определения сущности (природы) права. Исследование сущностных основ права выступает главной задачей не только теории права и государства, но и других наук (философии права, социологии права, истории правовых учений). Цель работы состоит в исследовании интеллектуальной природы права на основе анализа трудов представителей различных концепций правопонимания. Методы: выводы и умозаключения автора основываются на использовании материалистической диалектики, сравнительно-правовом, социологическом и историческом методах. Обсуждение: примечательно, что в каждой концепции правопонимания интеллект (ум, разум, рассудок) рассматривается учеными как неотъемлемый элемент процесса правообразования. Выводы: право рассматривается в рамках антропологического подхода как результат интеллектуальной деятельности человека не только по своему происхождению, но и сущностному основанию, своей природе. Выдвигается тезис о том, что право есть результат интеллектуально-разумной мыслительной деятельности человека, предлагается авторская дефиниция права.

Criminal law and procedure

Halaman 2 dari 95114