Font Size: a A A

China's Juvenile Crime And Prevention Measures Related To Network Thinking

Posted on:2012-04-27Degree:MasterType:Thesis
Country:ChinaCandidate:S Y ChenFull Text:PDF
GTID:2216330371453200Subject:Law
Abstract/Summary:PDF Full Text Request
Juvenile crime, juvenile crime network timeless topic. This article discusses the characteristics of juvenile cybercrime law, and on this basis, propose preventive measures, with a view to judicial practice to provide practical advice.The introductory part of the main issues is the general quote, make this the main content.The first chapter is a minor crime networks involved in the basic profiles and trends. With the continuous development of China's Internet technology and mature minors on the network of moral anomie, deviant behavior and even criminal activity to cognitive, emotional, psychological and moral change, their sense of social responsibility and social skills caused serious impact.I believe that the minors involved in criminal network mainly refers to citizens 18 years of age by means of network tools implemented on the Internet for online or outside of a serious threat to social order and the criminal acts of a criminal act committed. The age of 18 years of age to 14 years of age or criminal liability of minors. Specifically, after age 90 for our young people.I believe that the juvenile cybercrime can be divided into three categories: (1) network system as a crime against the crimes committed; (2) crime network technology as a means to commit the crime; (3) to place the implementation of a criminal network crime. Related crime trends in the network, and harm the network information security hackers, virus behavior increased considerably, and usurpation-and the vast majority of violent, pornographic and high cases of personal privacy. The second chapter is a minor crime networks involved in the basic characteristics and the subjective and objective factors.Minors cybercrime younger age, intelligence, transnational, concealed, wide, large-scale features, mainly due to the relevant departments of the bad sites and illegal sites weak governance, as well as school, family, social trinity of education system not perfect, and the relevant government departments and comprehensive management system and weak legislative system caused by the absence. Of course, we can not rule out the ever-changing network technology and technology management behind the conflict between vulnerability and cyber crime victims indulgence minor behavior and other factors. The author also analyzes a variety of minor psychological characteristics of cyber crime, and psychological inverter, a reference to the treatment strategy.Chapter III of foreign minors involved in crime network more. In this paper, the objective environment, crime and crime at the event three main levels of repeated comparisons. Found in the Western cultural values, educational philosophy, ethics, constitute a crime, the legislative system, judicial institutions, Internet cafe management and how to deal with juvenile offenders, etc. all have differences.China's legislature, Internet governance and Web site there are quite a young activist in the weak link.Chapter IV for the prevention of juvenile crime networks involved Countermeasures. I believe that should be the prevention of juvenile crime as a whole constitutes a social system, adhere to the legislative basis for the administration of justice, three levels of social assistance and education, adhere to the community, schools and the work principle of the Trinity family, multi-level network involving all-round prevention of juvenile crime.Special emphasis on the special juvenile cybercrime legislation and the construction of network security technology.Finally, the concluding part, the author of the paper are summarized. I reiterated the network involved in a minor importance and necessity of crime prevention, and how to further set of social forces, to impose comprehensive management tools.
Keywords/Search Tags:network crime, law rules, regulations of nonage
PDF Full Text Request
Related items