Proceedings of the 2022 5th International Conference on Humanities Education and Social Sciences (ICHESS 2022)

Analysis of the Crime of Damaging Computer Information System

Abating the Phenomenon of “Pocket Crime” of Cybercrime

Authors
Bixuan Hao1, Xinya Xue2, Ao Zhang3
1Faculty of Liberal Arts and Professional Studies, York University, Toronto, M3J 1P3, Canada
2Civil and Commercial Law School, Shandong University of Political Science and Law, Jinan, 250014, China
3Southwest Medical University, Luchou, 646000, China
Available Online 30 December 2022.
DOI
10.2991/978-2-494069-89-3_133How to use a DOI?
Keywords
Legal interests; Crime pattern; Damaging computer information system crime; Pocket crime
Abstract

In recent years, the number of judicial practice cases of crimes against damaging computer information systems has climbed with the rapid development of science and technology. The controversy about how to apply this crime has become increasingly controversial. Especially in the context of a risky society, the protection line of criminal law is in advance, making the boundaries of this crime extended and more ambiguous. From the perspective of legal interests protected by this criminal provision and its implementation, this paper clarifies the boundaries of this crime and analyses the significance of this crime in practice in the context of traditional crimes or new cybercrime. This paper also describes the implicated relation of the perpetrator for committing multiple acts and clarifies the criteria for conviction when there is a "concurrence of crime" with traditional type crimes. As a result, over-expansion of this crime that would blur the boundary between this and the other crime could be avoided. In order to further clarify the scope of application of crimes against computer information systems, this paper also advocates combining relevant judicial practice cases, drawing on the German "shortened two-act offenders" theory and advocating the unity principle of subjectivity and objectivity. These approaches can improve the efficiency of judicial application and provide powerful help for regulating and preventing cybercrime.

Copyright
© 2022 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the 2022 5th International Conference on Humanities Education and Social Sciences (ICHESS 2022)
Series
Advances in Social Science, Education and Humanities Research
Publication Date
30 December 2022
ISBN
978-2-494069-89-3
ISSN
2352-5398
DOI
10.2991/978-2-494069-89-3_133How to use a DOI?
Copyright
© 2022 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Bixuan Hao
AU  - Xinya Xue
AU  - Ao Zhang
PY  - 2022
DA  - 2022/12/30
TI  - Analysis of the Crime of Damaging Computer Information System
BT  - Proceedings of the 2022 5th International Conference on Humanities Education and Social Sciences (ICHESS 2022)
PB  - Atlantis Press
SP  - 1138
EP  - 1153
SN  - 2352-5398
UR  - https://doi.org/10.2991/978-2-494069-89-3_133
DO  - 10.2991/978-2-494069-89-3_133
ID  - Hao2022
ER  -