Mimickingreallife,crimesandcriminalscomeinallvarietiesontheInternet,13rangingfromthecatastrophictothemerelyannoying.14So,definedbroadly,thetermcybercrimecouldreasonablyincludeawidevarietyofcriminaloffencses,activities,orissues.Thepotentialscopeisevenlargerwhenusingthefrequentcompanionorsubstitutetermcomputer-relatedcrime.Asthephraseisevolvingintoatermofart,thenarrowersetofmeaningshasbecomemoreprevalentintheliteratureinthewesternworld.InChina,thetermisthesamefromthebeginning,pronouncedasJisuanjiFanzui,i.e.,computercrime.Butthereisneveranofficialtermforit.Thecrimesprovidedinthecriminallawaremorecomplicated. Intheacademiccircles,avarietyofdefinitionshavebeenintroducedfromtheWesternandputforwardbythemselvessinceearly1980s,includingeitherthedefinitionsinthebroadsenseorinthenarrowsense.MostofthemarederivedfromtheWesternharbingers,alongwiththetranslationintoChineseandpublicationinChinaofbooksandarticles.Forexample,thosedefinitionsofaWesternstylebytheDepartmentofJusticeofUSAin1979,statingthatacybercrimeisanyillegalactforwhichknowledgeofcomputertechnologiesisessentialforitsperpetration,investigation,orprosecution.Thisdefinitionwastoobroadandhassincebeenfurtherrefinedbynewormodifiedstateandfederalcriminalstatutes.AnotherwidelyciteddefinitionisbyOECD.Bothofthemwerebroughtintothedefinitioninthebroadsensewhendiscussed.Asforthedefinitioninthenarrowsense,oneofthemosttypicalexamplesistakenfromtheActofdata,Sweden. Thelaterstudysawsomerationalthinkingabouttheissue,andsomedefinitionscameintobeingwhichpossesstheChinesestyle.Forexample,adefinitionin1993readas:Cybercrimeisthecrimecommittedinwhichthecomputersystemisutilisedasatooloraimedasatarget.15 ThedefinitionsintroducedtoChinaandraisedbyChinesescholarshaveprofoundacademicsignificanceontheonehand;theyareregardedaswanting,however,inrelationshipwiththestagnancyofthetechnologicaldevelopmentandthecharacteristicsofcyberspaceintheChinesecontext,ontheotherhand.ThatisbecausethatdefinitionsinCriminalLawofP.R.China,1997arewidelyexplainedandacceptedastheonlyscientificones.ThetraditionofexplanatoryjurisprudencecontrolsanddecidestheideasofmostoftheChinesejurists. Anyway,itsoundsoutdatednowtotalkaboutsomeextradefinitionsofcomputercrimeinChinaaftertheCriminalLaw,whichprovidesthecomputercrimeinarticles285,286and287intheSectionICrimesofDisruptingPublicOrder,ChapterVICrimesofDisruptingtheOrderofSocialAdministration. Computercrimeisthatcrimeinwhichcomputerinformationsystemsarethetargetofcrime.Acomprehensivedefinitioncanbereachedasactsofthatwhoviolatesstateregulationsandintrudesintocomputersystemswithinformationconcerningstateaffairs,constructionofdefensefacilities,andsophisticatedscienceandtechnology;orviolatesstatesregulationsanddeletes,alters,adds,andinterferesincomputerinformationsystems,causingabnormaloperationsofthesystemsandgraveconsequences;orviolatesstateregulationsanddeletes,alters,oraddsthedataorapplicationprogramsinstalledinorprocessedandtransmittedbythecomputersystems,andcausesgraveconsequences;ordeliberatelycreatesandpropagatescomputervirusandotherprogramswhichsabotagethenormaloperationofthecomputersystemandcausegraveconsequences. AccordingtotheCriminalLaw,crimeinwhichcomputerisusedasatool,isnolongerregardedasacomputercrime.Whoeverusesacomputerforfinancialfraud,theft,corruption,misappropriationofpublicfunds,stealingstatesecrets,orothercrimesisnotguiltyofcomputercrimebutothercrimes. Unfortunately,thatisnottruewhenwethinkthatthedefinitionisnotofonlynominalmeaning.Inactualfact,cybercrimesemergeinChinacoverquitewidearangeandalargescale.IndiscussingtheproblemofcybercrimeinChina,weshouldusetheterminthesociologicalorcriminologicalsensebutnotlimitedtothenarrowlycriminalsense.InChina,accordingtothelawsandregulations,thereare15aspectsthatwerecriminalised:16 1.Violatingrelevantstatelawsandinvadingcomputerinformationsystemscontaininginformationaboutstateaffairs,statedefenseandthemostadvancedscienceandtechnologyofthestate; 2.Producingandspreadingcomputervirusesandestablishingdevastatingprogramstoattackcomputersystemsorcommunicationsnetworks,thuscausingdamagetosuchsystemsornetworks; 3.Violatingrelevantstatelaws,arbitrarilystoppingtheoperationofcomputernetworksorcommunicationsservices,therebyinterruptingnormaloperationsofsuchnetworksorservices; 4.Spreadingrumours,slanderorotherinformationviatheInternetforthepurposeofoverthrowingthestategovernment,overthrowingthesocialistsystem,orbreakingupthecountryanddestroyingthecountry’sunity; 5.Stealingorleakingstate-classifiedinformationormilitarysecretsviatheInternet; 6.Ignitingracial,ethnichatredanddiscrimination,anddestroyingracialandethnicunityviatheInternet; 7.OrganisingcultsorcontactingcultmembersviatheInternettodestroytheimplementationofstatelawsandadministrativeregulations; 8.EngaginginswindlesandburglaryviatheInternet; 9.SellingdefectiveproductsormakingfalseclaimsoncommoditiesandservicesviatheInternet; 10.ConcoctingandspreadingfalseinformationviatheInternettoinfluencesecuritiestradingandfuturestrading; 11.EstablishingpornographicWebsites,Webpages,orprovidinglinkstopornographicsitesontheInternettospreadsuchinformation,includingthosefrombooksandmagazines,motionpictures,videoandaudioproducts,andstillimages; 12.InsultingotherpeopleorfabricatingstoriestoslanderothersviatheInternet; 13.Illegallyintercepting,changing,ordeletingotherpeople’se-mailorotherdatainformation,thusinfringinguponotherpeople’sfreedomofcommunication; 14.Infringinguponotherpeople’srightstointellectualpropertyviatheInternet; 15.Damagingotherpeople’sbusinessreputationandproductreputationviatheInternet. Therearestillmoreacademicallyinducedcategories.Practicalcrimesthatarerelatedtocomputerareperhapsfoundeverywhereinthecriminallaw,fromcrimesagainstthenationalsecuritytocrimesagainsteconomy,fromcrimesagainstpersontocrimesagainstproperty,etc.CybercrimesmaybeincludedineverychapteroftheCriminalLawofP.R.C.,accordingtotheirnature.ThisisdeterminedbythemethodologyoftheCh 上一页 [1] [2] [3] [4] [5] [6] [7] 下一页
Tags:
|