Font Size: a A A

The Identification Of The Crime Of Destroying Computer Information System

Posted on:2017-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:F HanFull Text:PDF
GTID:2346330512984007Subject:Law
Abstract/Summary:PDF Full Text Request
The rapid development of social economy and the rapid progress of science and technology,the era of information explosion instantaneous.The daily life of people cannot leave computer networks and conveys information system.Computer information system safety moment under threat.Amendment of the criminal law in our country of destroying computer information system crime charges are related to make that clear,but the particularity of its relevant charges also has caused many problems and disputes.In this paper,through the case of destroying computer information system crime comb,put forward the analysis of the problems existing in the process,and the cases are solved and the crime,provide advice.This article mainly discussed and analyzed from the following three aspects:The first part is a typical case and disputes.By Wang using plugins whereas upgrade case,Yan hijacked program using the domain name server case,summing up the dispute focus of case.Respectively is the use of plugins for network player behavior should be considered,whereas whether meet the requirements of destroying computer information system crime constitution;Using the server program instruction hijacked server,add transfer of virtual property and qualitative profit behavior.The second part is to destroy the computer information system crime related problem analysis.First the concept of analysis of this crime,crime characteristics,etc.;Secondly on case,the use of plugins whereas upgrade behavior analysis and recognition;Finally is the second case,about the use of branch of the virtual property and profit by others.The third part is for the solution of the case and perfect Suggestions...
Keywords/Search Tags:plugins, Game Leveling, Virtual property, Hijack server
PDF Full Text Request
Related items