Font Size: a A A

Big Data Era Of Information Security In Criminal Law

Posted on:2015-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y L LiFull Text:PDF
GTID:2266330428963123Subject:Criminal Law
Abstract/Summary:PDF Full Text Request
The rapid development of information technology and the complexphenomenon of cybercrime present a great challenge to traditional criminallaw. When the transformation of the internet from Web1.0to Web2.0wasjust over, the concept of Web3.0began to move to the center stage. Bigdata and cloud computing are bringing new transformation to thetraditional business pattern and government control. Information isassuming vital importance in all aspects of human life. As a result, newspecific forms of cybercrime are threatening new specific legal interests. Inthe “age of information”, it is extremely important to examine and evaluatethe current Chinese criminal law regarding cybercrime.The aim of this research is to examine Chinese criminal laws toevaluate the effectiveness of combating illegal conducts using cybertechnology in Big Data Era. And further suggestions for developingexisting legal system are completed.The existing Chinese criminal laws establishing in the industrial era isnot suitable for the Information Age. By analyzing the protection patternadopting a normative methodology, it is found that almost new problemsarising in big data era can not be effectively dealt with existing articles.Concerning the features and characters of information security, paradigmshift is of great necessity.Yet this in this research I have proposed three innovative thinkings indealing with new kind of data crime, they are: changing from propertyrights and intellectual rights to information rights; changing from computerinformation system to network data storing and data computing; changingfrom scattered regulations to integrated system centering information.Following this changes, this research suggested some interpretationmethods and criminalization plan. Besides, economical analysis and semiology methodology are alsoincluded in this research as supporting arguments. The complication ofnetwork structure study is also referred to.
Keywords/Search Tags:Information
PDF Full Text Request
Related items