Font Size: a A A

Network Against Acts Of Criminal Law Analysis

Posted on:2008-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:Q HuaFull Text:PDF
GTID:2206360215972812Subject:Criminal Law
Abstract/Summary:PDF Full Text Request
Nowadays we have stepped into the age ofinternet which impacts greatly on thedevelopment of economy and social life. Since the interact has been invented, itchanges our society with each passing day. It plays an important role in other fieldsas well. However, computer crimes appear at the same time. What's worse, thelegislation of computer crime in our country is relatively laggard and not so good,so that it can't adapt to the changes of the computer crime. At present, everycountry enforces the power on the research of the crimes on the internet, but it isvery difficult to reach the balance of the sluggish determined by the relative steadyof the law and the leap of the development ofthe technique.Interact tampering is a new phenomenon in suppositional world which includescyber property theft, illegal invasion and malicious software. It brings lots ofdamage in cyber world. Such behaviours without limitation of laws are destroyingcyber space. For example the malicious software are known as phishingware,spyware ,which costing millions of dollars a year. Someone estimated that a newPC stands a 50-50 chance ofbeing infected by a worm within 12 minutes of beingconnected to the internet, Moreover it seems that the internet tampering is alreadydevising new and more sophisticated methods of attack.So author regards that countries' administration of justice on guarding andstriking the crimes should regular behaviours on the internet by revising of the law.Author applies for that criminal laws about internet should be modified asfollowing:Make clear of that cyber property theft is the behavior of illegal invasion ofinternet. Because cyber property theft is not only the theft of creditor's rights, butalso the invasion of computer system. And for the reason of practice, illegalinvasion is more suitable;Make clear of internet teams, for instance, such as illegal invasion, computersystem, etc.And classify the malicious software as destructive software~ Because malicioussoftware actually does damage to computer system, and its makers have theintension to disrupt computer information system; Enlarge the field of illegal invasion of internet. Some other crucial departmentsand private computer system should be protected too. Because many departmentsare relative to the safety of nation, and personal rights should not be harmed. Ifexcludes them out of protection of criminal laws, it is absurd and reasonless.The future society is highly depending on the internet to communicate andbroadcast the messages society, in order to use the internet efficiently and correctlylead the internet to develop healthily and orderly, higher demands are proposed tothe law-enforcers, and author hopes contribute share to it.
Keywords/Search Tags:Criminal
PDF Full Text Request
Related items