검색결과

검색조건
좁혀보기
검색필터
결과 내 재검색

간행물

    분야

      발행연도

      -

        검색결과 1

        1.
        2009.11 KCI 등재 구독 인증기관·개인회원 무료
        Cybercrime refers to the crime committed by the means of computer and network in the cyberspace which cause serious infringement on legal interests. It includes three parts: crimes aiming at Computer and internet, e.g. system truncated, system modifications, deleting or clearing data, malicious attacks on Web; crimes aiming at virtual items implemented in the network space, e.g. steal of online games equipment; traditional crimes committed by the use of internet, e.g. stealing of others’ bank deposits or defrauding others’ property. The main types of cybercrime are as follows: (1) crimes interfering with the security of internet operations. (2) crimes endangering national security or social stability; crimes destroying the socialist market economic order and the management of social order; crimes infringing the legitimate rights of individual, legal entity or other organization e.g. civil rights, property rights; crimes committed through other acts except the above-mentioned behaviors. Here are basic characteristics of China cybercrime: (1)criminals of young age, juvenile crime is highlighted;(2)secret criminal behaviors and large dark figure of crime;(3)great difficulty in obtaining evidence and combating criminal;(4) low cost and little risk during the cybercrime committing. The Criminal Law of China in 1997 provides two kinds of computer-related crimes. One is Invasion of Computer Information System provided in section 285 of the Penal Code, the other is Destruction of Computer Information Systems provided in section 286. Due to the serious flaws in the related provisions, functional handicaps concerning the computer crime in the judicial practice is resulted. So Amendment Ⅶ to Criminal Law of the People's Republic of China is enacted by NPC Standing Committee on Feb 28,2009, which supplemented and revised the computer crime and cybercrime. Two new crimes are added ,the crime of illegal access to computer systems data, illegal control over the crime of computer information systems and the crime of providing the procedures and tools used for invading, controlling the computer information systems.