Font Size: a A A

On The Crime Of Destroying Computer Information System

Posted on:2017-05-10Degree:MasterType:Thesis
Country:ChinaCandidate:C QinFull Text:PDF
GTID:2296330503966739Subject:Law
Abstract/Summary:PDF Full Text Request
With the development and popularization of Internet technology, computer information systems are widely used in social life, plays a more and more important role. The destruction of computer information systems, computer information system, data tampering, crime making spreading computer virus and the destruction of computer information system is more and more danger more and more. Because high-tech and other factors are involved, the legal thinking of the crime of destroying computer information system and the traditional crime is not consistent,the traditional crime also has some variation in the computer information system in depth. So strengthening the research on the crime of destruction of computer information, and has important significance to combat cybercrime.This paper is divided into five parts, the first part of the background and significance of this paper, introduces the research status at home and abroad about the crime of destroying computer information system, the research methods of this paper. The second part describes the legislative history of the crime of destruction of computer information systems, the concept of the crime of destroying computer information system, characteristics and the current controversies in the crime of destroying computer information system in the high-tech development. The third part of the crime of destroying computer information system crime analysis, and try to solve this crime related behaviors subject "," object "," three failure behavior "," serious consequences "of the controversy. The fourth part of the destruction of computer crime unfinished form analysis,pointed out that the the destruction of computer crime unfinished form should be punished. The fifth part of the legal punishment of the crime of destroying computer information system are analyzed, and the end of rare crime The author puts forward the proposal of the author. Finally,the author puts forward the author’s point of view on perfecting the crime of destroying computer information system.
Keywords/Search Tags:computer information system, network crime
PDF Full Text Request
Related items