Font Size: a A A

A Case Study Of The Crime Of Destroying Computer Information Systems

Posted on:2018-05-29Degree:MasterType:Thesis
Country:ChinaCandidate:F PengFull Text:PDF
GTID:2356330542450705Subject:Law
Abstract/Summary:PDF Full Text Request
Today,with the rapid development of global Internet and the rapid rise of China's economy,all kinds of science and technology information application has national daily life together,at the same time,more and more intensive invasion computer information system security events emerge in endlessly,crime the information under the network environment is increasing,therefore,destroying computer information system crime in the fight against crime and maintaining network security has been more widely applicable.,which should be with a fresh perspective and explanation in the penal code of our country to protect the function of the computer information system,data,application security and safety regulations,strictly follow the penal code protection benefit,protect human rights and tolerance requirements,accurate to all kinds of qualitative behavior,and thus to comply with the requirement of the principle of a legally prescribed punishment.My "first name" software case as sample,in combination with the working principle of the computer field analytical composition of destroying computer information system crime,clear "computer information system" "interference" "serious consequences" concept and scope of the elements of the constitutive requirements and considered to be "baidu search engine" the protection of computer information system crime,but increase website traffic behavior is not interference in destroying computer information system crime the behavior of the computer information system function,thus it is concluded that the defendant's behavior does not destroy the computer information system crime.Based on the "pocket" for this crime involves the practice of problem resolution was proposed,in order to perfect the charges set,reduce practice involves the problem of optimum method is not unified,punishment imbalances.
Keywords/Search Tags:The crime of destroying computer information system, Computer information system, Interference, Serious consequences, Pocketing
PDF Full Text Request
Related items