首 页       用户登录  |  用户注册
设为首页
加入收藏
联系我们
按字母检索 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
按声母检索 A B C D E F G H J K L M N O P Q R S T W X Y Z 数字 符号
您的位置: 5VAR论文频道论文中心法律论文国际法
   Rethinking Chinese Modes of Social Control and Cybercrime Prevention      ★★★ 【字体: 】  
Rethinking Chinese Modes of Social Control and Cybercrime Prevention
收集整理:佚名    来源:本站整理  时间:2009-02-04 14:08:52   点击数:[]    

sofsovereignnations,originatinganattackfromalmostanycomputerintheworld,passingitacrossmultiplenationalboundaries,ordesigningattacksthatappeartobeoriginatingfromforeignsources.Suchtechniquesdramaticallyincreaseboththetechnicalandlegalcomplexitiesofinvestigatingandprosecutingcybercrimes.22
  
  Usingsoftwaretoolsinstalledonacomputerinaremotelocation,hackerscanbreakintocomputersystemstostealdata,plantvirusesorTrojanhorses,orworksmischiefofalessserioussortbychangingusernamesorpasswords.23
  
  Corporations,likegovernments,lovetospyontheenemy.Networkedsystemsprovidenewopportunitiesforthis,ashackers-for-hireretrieveinformationaboutproductdevelopmentandmarketingstrategies,rarelyleavingbehindanyevidenceofthetheft.24
  
  PiracyinChinaistherevoltandattackagainstthesoftwareimperialism.InthewebsitesmanagedbyChinese,severalofnewandoldsoftwarecanbedownloadedeasily.Somewebsites,aswellasforestoutlaws,aredevotedtothiskindofcharities,similartoprovidingrelieftothepoor.Theseacts,thoughbelongtodevianceandcrime,producersofsoftwareshouldalsoself-examinationintheaspectofpricemonopoly.Usersofpersonalcomputercouldnotaffordfortheexpensivesoftware,andthusthemarketofpiracyactsasasolutiontosatisfytheseusers.
  
  Thekeencompetitionbetweenthesoftwareproducersvirtuallyencouragesthepiracy.Forexample,agreatportionofthemarketofpersonalcomputerinChinaisundercontrolofMicrosoft,whosesoftwareispreinstalled.UsersinChinaknowonlyMicrosoft,cangetonlyMicrosoft,canoperateonlyMicrosoft,andcanchooseonlyMicrosoftcontinuously.That’stheprospect.Eventhatfreesoftwarecannotgivefullplaytotheiradvantagesofprice.Thepiracybringssoftwareproducersnotsomuchlossbutsavetheirexpensesofadvertisements.AnyproducersoftheplatformsdonothopetoseethattherisinggiantLinuxswallowstheChinesemarket.Intheframeworkoftheexistinglegalsystem,whichregardspiracyasacrime,andtheproducersremainhighprices,LinuxisascompetentasMicrosoftis.
  
  iv.Networkasaplace
  
  TheInternethaserodedtheprotectionprovidedbynationallawsagainstsuchactivitiesaspornography.TheInternetisaglobalsystem.Wecannowbeattackedbycriminalswhodonotneedtocometothisterritory.Lotsofpolicingarrangementshavetheirrootsinthefactthatvictimandoffenderaregeographicallyco-located.Itisadifferentworldnow,andifyoucandoyourbusinesslegitimatelyfromhomeviatheelectronicmedium,whycan’tthatbusinessnotbecriminalbusiness?Wehavetomoveourselvesintothisnewworld.Itisagreatchallengeforus.25
  
  Now,muchofthemoney,assets,statesecretandpersonalprivacyaretransformedintocomputerdataandstoredincomputers,orcirculatethroughthenetwork.Meanwhile,networkisalsobecomingaspacetoexhibitpornography,oragamblinghouse.Networkdoesnothavetheabilityofvaluejudgement,hasnoculture,hasnolegalconsciousness,buttheinformationbeingstoredandactivitiestakingplaceinithavenatures,eitherprotectedorreprimandedbylaws.Furthermore,theplaceofnetworkistrans-regional,trans-national,wherethereisnotaunifiedlegalsystem,andbecomesazoneaswellastheHolySea.Manyaggressionstakeplaceattheterminals.Manyharmsalsotakeplaceattheterminals.Itseemsthatonlyterminalshavesomethingtodowithcrimes.
  
  Factually,thisisacontradictorybroughtaboutbythespecialcharacteristicoftheplaceofnetwork.InChina,pornographyisonecrimethatisclearlyillegal,bothonandofftheInternet.Andviewingpornographywebsitesisillegal,too.Otherwiseinsomeothercountriesatleasttostorethesepicturesinthenetworkislegal.ItisbeyondthereachofthepowerofChineselaws.Theproblemofconflictofcriminaljurisdiction,butnotconflictofciviljurisdiction,haveneverbeenputforwardasaserioustopicastoday.
  
  Adifferentvoice,however,advocatesthathecriminallawhasnobusinesshere.Forthenetworkhavenoborders,andtheautonomousspaceofhyperperfectillusionandflawlesslyrecombinantcultureistooslipperyforanystatute.26Control--thecontrolweneed--isnotfinallyalegalproblematall.Itisasocial,moral,andtechnologicalproblem.27
  
  v.Networkasatarget
  
  Networkinacertainsensecanberegardedasnetworkassets,includingtangibleassetsandintangibleassets,bothhardwareandsoftware;bothintra-nationalassetsandinternationalassets.Networkassetsisakindofcombinativeassets,existsinthecyberspace.Furthermore,networkassetsisnotstatic,butexistsintheprocessofproduction,whichconstitutesamodeofproductionmanagement,forexample,theactivitiesthatcanbeincludedinthefieldofelectroniccommerce.Itsexistenceisvulnerable,easytosufferfromvariousofartificialattacks,someofwhichbelongtothetraditionalcrimes,forexample,cuttingofftheelectricitysupply,destroyingthecables,movingtheantennausedinsatellitecommunications;andmoretraditionalcrimes,forexample,bombingsonbuildingshousingcomputerequipment,arson,andtheftanddestructionofcomputerequipment.28Nowadays,theyarenotregardedascybercrimes.Thecybercrimesagainstthenetworkaremainlythosethatutilisethecomputertechnologiesbutnotothertechnologies,ofwhichthemosttypicalarecomputerviruses,aswellasothermaliciouscomputerprogrammes,whichareusedtodoharmtocomputersandnetwork.Therehavebeenalreadyalonglistofinstancesofseriousviruses,whichtheCIH,Melissa,ILoveYou,etcstandfirston.
  
  On10October,2002,itwasreportedthatviruseshaveinfectedatleast80percentofChina’scomputers,highlightingthevulnerabilityofoneoftheworld’sbiggestPCandInternetmarkets.ThesurveyconductedbytheNationalComputerVirusEmergencyResponseCentresaidthatonly16percentofcomputerusersthisyearreportedtheywerefreefromanyvirusattack,whilelastyearnearlyoneinthreeuserssaidtheysufferednocomputerinfections,halfoftheinfectedmachineshadsuffereddatalosses,problemsbrowsingtheWeb,orotherdamage.29
  
  AndDenialofService(DoS)AttackstothefamouswebsitesincludingYahoo!tookplacein2001,usedtheharmfulprogrammesotherthanviruses.Theseattacksbrokethenetworkdown,madethewebsitesshutdown,broketheelectroniccommerce,broughtgreatdirectlossesinmanagementandindirectlossesinthecredential.
  
  III.PolicyofcontrollingthenetworkinChina
  
  Itwascriticisedthatintotalitarianorauthoritariansystems,thestateintrudesintoeverydomainofthecivilsocietyandleviesstrictconstraintsonthepresswithoutdeliveringacorrespondinglevelofinducements.Outr

上一页  [1] [2] [3] [4] [5] [6] [7]  下一页


Tags:


文章转载请注明来源于:5VAR论文频道 http://paper.5var.com。本站内容整理自互联网,如有问题或合作请Email至:support@5var.com
或联系QQ37750965
提供人:佚名
  • 上一篇文章:论市场经济体制下我国环境资源保护法的完善

  • 下一篇文章:论我国传统信任机制与WTO的冲突和适应
  • 返回上一页】【打 印】【关闭窗口
    中查找“Rethinking Chinese Modes of Social Control and Cybercrime Prevention”更多相关内容 5VAR论文频道
    中查找“Rethinking Chinese Modes of Social Control and Cybercrime Prevention”更多相关内容 5VAR论文频道
    最新热点 最新推荐 相关新闻
  • ››浅析“入世”后我国海运服务贸易法...
  • ››试析国际技术转让中商业行为的限制...
  • ››北约东扩、华约瓦解之渊源
  • ››提单的性质与提单权利
  • ››人道主义干涉在国际法中的地位及其...
  • ››公共秩序保留制度再探讨
  • ››比较法方法的一个注释――海上货物...
  • ››去意识形态化——WTO法律机制解决中...
  • ››从主权平等的发展看我国四十年来国...
  • ››韩国国际私法的回顾与展望(下)
  • ››Rethinking Chinese Modes of Soci...
  •   文章-网友评论:(评论内容只代表网友观点,与本站立场无关!)
    关于本站 - 网站帮助 - 广告合作 - 下载声明 - 网站地图
    Copyright © 2006-2033 5Var.Com. All Rights Reserved .