Research Article
Open access
Published on 26 October 2023
Download pdf
Liu,Y. (2023). Intrusion into Computer Information System: Criminal Law Rule Based on Different Judicial Recognition Perspectives of State Affairs. Lecture Notes in Education Psychology and Public Media,17,63-72.
Export citation

Intrusion into Computer Information System: Criminal Law Rule Based on Different Judicial Recognition Perspectives of State Affairs

Yinuo Liu *,1,
  • 1 People's Public Security University of China

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2753-7048/17/20231216

Abstract

Cybercrime refers to a new form of crime generated with the application and prevalence of computer technology. In China, there are increasingly more instances of unauthorized access to computer systems every year, which has severely affected network security and the property security of the people, and even national security. This paper delves deeper and more methodically into the problems surrounding the criminal act of unlawful access to computer information systems. The ambiguous definition and limited reach of the criminal object make China’s punishment for unauthorised access to computer systems less effective., the crossover of the criminal law system caused by the contradiction of legislative logic, as well as the insufficient prevention of too lenient penalties. Based on the above legislative deficiencies, it is imperative to improve the criminal law system, expand the protection scope of the first clause of Article 285 of the Criminal Law, Increase the number of cases that are investigated and prosecuted, explain computer information systems in the context of state affairs, expand the definition of “state affairs” computer information systems, and strictly regulate the amount of crime that is legal. Additionally, it is essential to establish an independent status for data crimes by adding provisions on data security protection concerning the three major computer information systems; increasing the intensity of punishment, raising the range of statutory penalties, and adding property penalties, thereby imposing a comprehensive regulation on illegal intrusion into computer information systems.

Keywords

cybercrime, state affairs, computer information system, legislative improvement

[1]. Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., ... & Savage, S. (2013). Measuring the cost of cybercrime. The economics of information security and privacy, 265-300.

[2]. McQuade, S. C. (2006). Understanding and managing cybercrime. Boston: Pearson/Allyn and Bacon.

[3]. Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in computer virology, 2, 13-20.

[4]. Holt, T. J., & Bossler, A. M. (2015). Cybercrime in progress: Theory and prevention of technology-enabled offenses.

[5]. Broadhurst, R., & Chang, L. Y. (2012). Cybercrime in Asia: trends and challenges. Handbook of Asian criminology, 49-63.

[6]. Wall, D. (2007). Cybercrime: The transformation of crime in the information age (Vol. 4). Polity.

[7]. Okutan, A. (2019). A framework for cyber crime investigation. Procedia Computer Science, 158, 287-294.

[8]. Bossard, A., & Office international de justice criminelle. (1990). Transnational crime and criminal law. Office of International Criminal Justice, University of Illinois at Chicago.

[9]. Libo, Z. (2021) On the Criminal Law Protection of Network Security.East China University of Political Science and Law, DOI: 10.27150/d.cnki.ghdzc. 2021.000030.

[10]. Li, D. (2022) A Comparative Study of the Criminal Law Regime of Pure Cybercrime. Beijing Foreign Studies University, DOI: 10.26962/d.cnki.gbjwu. 2022.000009.

[11]. Wenyuan, Q. (2022) The Application and Reflection of the Criminal Policy of Hitting Early and Hitting Small in the Context of “Less Arrest and Careful Prosecution and Detention” --Taking Cybercrime Governance as a Perspective. Tribune of Political Science and Law, 40(02): 62-73.

Cite this article

Liu,Y. (2023). Intrusion into Computer Information System: Criminal Law Rule Based on Different Judicial Recognition Perspectives of State Affairs. Lecture Notes in Education Psychology and Public Media,17,63-72.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 4th International Conference on Educational Innovation and Philosophical Inquiries

Conference website: https://www.iceipi.org/
ISBN:978-1-83558-059-2(Print) / 978-1-83558-060-8(Online)
Conference date: 7 August 2023
Editor:Javier Cifuentes-Faura, Enrique Mallen
Series: Lecture Notes in Education Psychology and Public Media
Volume number: Vol.17
ISSN:2753-7048(Print) / 2753-7056(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).