| This article contain three part: Introduction, body, conclusion.Introduction: a brief description of the development of Internet technology, under the impact of computer crime and its impact on the crime of destruction of computer information systems to bring issues identified.Body is divided into four parts:Part one, describes the development of computer network technology and to analyze the problems caused by the destruction of computer information system characteristics and causes of the crime.Part two, on the destruction of computer information systems constitute the elements of the crime problem. Subjective aspect of crime, the intentional, negligent difficult to identify, as possible to avoid the penalty provided, and the fault exemption is not conducive to the establishment of social responsibility, come to their sins in the form of crime should include subjective fault. Object of a crime, the computer information system security is beyond the scope of maintenance management of social order, and closer to its inclusion affect the social lives of citizens, health and safety of public and private property, the classification of social relations, arrive at the object of their criminal aspects of public safety hazards is not just the management of social order. Subject of a crime, the unit that committed such crimes in the criminal law's lack of a result set found on the "no laws" is not conducive to acts of discipline or restraint unit; the same time, crime was the main trend of younger age, and not the traditional educational activities corrective actions to achieve the purpose of crime prevention, the relative age for criminal responsibility should be drawn into the criminal subject who, through appropriate penalties to correct the act. Objective aspect of crime, the harm is often the result than expected, and the result of criminal behavior and crime is not contiguous, reached its objective aspect of crime could be considered more appropriate attribution is Dangerous.Part three, on the crime in the judicial determination of the difficult problems. First, with the possible confusion of this crime charges similar to the analysis of the three, one by one to clarify the boundaries of crime and similar crimes; the second is through the analysis of computer viruses and other destructive programs and identify whether the "serious consequences standards, articulating damage the boundaries of crime or computer information systems; third is through the analysis of crime to stop crime, each attempted to clarify that with the suspension, prepared standards.Part four, from the charge set, the main setting, the subjective guilt of crime and criminal punishment in four types of relevant recommendations.Conclusion, summarized the contents of the article to clarify the purpose of emphasis on writing. |