Font Size: a A A

Qualitative Analysis Of Invading Property By Using The Internal LAN Of The Company

Posted on:2019-11-16Degree:MasterType:Thesis
Country:ChinaCandidate:M Q WangFull Text:PDF
GTID:2416330545994295Subject:Criminal law
Abstract/Summary:PDF Full Text Request
A t present,our country is stepping into the era o f network intelligence,more and more new technologies are constantly attacking people's eyeballs.The development o f computer technology brings convenience as w ell as corresponding troubles.Computer crimes,represented by the crime o f destroying computer inform ation systems,emerge in endlessly and become increasingly harm ful.Due to the com plexity o f computer crimes and the lack o f computer professional knowledge o f the basic ju d ic ia l personnel in our country,For special types o f computer crim e,it is often d iffic u lt to accurately define.In addition,at the present stage,there are s till some unclear provisions o f crim inal law and related laws on computer crime in China.When a ju d ic ia l o ffice r deals w ith a sim ilar problem,there is no doubt that there is a lo t o f room fo r explanation,w hich may lead to the expansion o f discretion or even the same situation.D iffe re nt courts deal w ith such contradictory situations.Therefore,it is urgent to im prove the interpretation o f relevant legal provisions in our crim inal law and to strengthen the protection o f computer crime cases.Based on the analysis o f Wang L i case,this paper analyzes the behavior o f ille g a lly invading "unconnected" computer system and tampering w ith accounts ille g a lly occupying other people's wages.It can be divided into four parts.The firs t part is the case o f the case and focus,the general introduction o f the basic case o f Wang L i and the practice o f different opinions on the conviction o f the case,to determine the focus o f the dispute in the case.The second part is the analysis o f relevant jurisprudence.In this part,it can be divided into tw o small parts.The firs t small part is the ille g al invasion o f the internal L A N o f the company.The analysis o f tampering data behavior.This part introduces the protection regulations o f "unconnected" computer and three qualitative view points o f destroying "non-networked" computer system.By analyzing the theoretical basis o f the three qualitative view s,On the basis ofW ang L i case,this paper analyzes the behavior o f ille g a lly invading the company's internal L A N and tampering w ith the data.The second small part is qualitative analysis o f the behavior o f tampering w ith the company's internal L A N data and collecting other people's wages.In this part,the firs t part is the detailed analysis o f the behavior o f tampering w ith the company's internal L A N data.This paper analyzes the characteristics o f this behavior and compares it w ith the characteristics o f theft and fraud.Secondly,by introducing the theory o f disciplinary behavior and the meaning o f punishment,the real v ictim is determined to analyze and tamper w ith the internal L A N data o f the company and collect the wages o f others.The th ird small part is the analysis o f the number and form o f the crime o f invading property by using the "unconnected" computer.This part concretely introduces and analyzes tw o kinds o f view points about the crime number form o f using the computer to carry out the crime o f encroaching on the property in the academic circles o f our country at present.The third part is the conclusion o f this case,that is,the fin a l characterization o f the behavior o f ille g a lly intruding into the company's internal L A N system and tampering w ith the behavior o f the account number possessing the wages o f others.The 4th part is case revelation,that is,some suggestions to the problems in law after the detailed argumentation before.
Keywords/Search Tags:Crime of destroying computer Information system, Not connected to the Internet, larceny, Crime of fraud
PDF Full Text Request
Related items