legislative perfection
Recently Published Documents


TOTAL DOCUMENTS

7
(FIVE YEARS 3)

H-INDEX

0
(FIVE YEARS 0)

2020 ◽  
Vol 26 (4) ◽  
pp. 796-814
Author(s):  
E.K. Ovakimyan

Subject. The article examines the laws regulating insider trading. Objectives. The study outlines recommendations for refining Law On Countering the Illegal Use of Insider Information and Market Manipulation and Amendments to Some Legislative Acts of the Russian Federation, № 224-ФЗ of July 27, 2010. Methods. The methodological framework includes a general dialectical method, analysis and synthesis, induction and deductions, and some specific methods, such as comparative and formal logic analysis to specify the definition of insider information, structural logic and functional analysis to improve the mechanism for countering insider trading and market manipulation. Results. We discovered key drawbacks to be addressed so as to improve the business environment in Russia. Although the Russia laws mainly mirror the U.S. laws, they present a more extended list of terms concerning the insider information. I believe the legislative perfection should be continued. Conclusions and Relevance. The study helps apply the findings to outline a new legislative regulation or amend the existing ones, add a new mention on the course of financial markets to students’ books, develop new methods for detecting and countering and improving the existing ones. If all parties to insider relationships use the findings, they will prevent insider trading crimes in financial markets and (or) reduce the negative impact of such crimes on the parties.


2014 ◽  
Vol 1079-1080 ◽  
pp. 733-736
Author(s):  
Yi Zeng

The rapid development of information technology makes the construction of computer information system possible, greatly facilitates people’s lives and improves the efficiency of learning and production. Computer information system is also applied in many sensitive areas. To improve the management efficiency of information and data, the behaviors that related computer information systems are illegally invaded are increasingly rampant and have seriously endanger national security, territorial security, sovereignty security, political security, military security, economic security, cultural security, science and technology security, ecological security and information security. In terms of the crime of illegal invasion into computer information system, this paper studies from several aspects, the cognizance of crime and non-crime, the accomplishment and attempt of the crime, subsequent criminal behaviors and legislative perfection.


Sign in / Sign up

Export Citation Format

Share Document