Education, Science, Technology, Innovation and Life
Open Access
Sign In

Legal Interests of Computer and Data Security in the Context of Digital Economy Advocation of Dualism

Download as PDF

DOI: 10.23977/law.2024.030205 | Downloads: 4 | Views: 130

Author(s)

Shaobo Cui 1, Zhangwei Yao 1

Affiliation(s)

1 Zhuhai City People's Procuratorate, Zhuhai, Guangdong, 519000, China

Corresponding Author

Shaobo Cui

ABSTRACT

The current protection mode of computer security and data security adopted in China's criminal law not only causes the crime of "data interference type" damaging computer information system to lack clear extension and contraction in practice, but also is difficult to cope with the new trend of information technology development under the background of Internet 3.0, and can not effectively realize the multi-directional protection of data. Based on this, the data security should be raised in criminal legislation from the appendage of the computer information system to an independent legal interest, the implementation of dual protection of computer security and data security, to the safe operation of the computer information system as a protection law to restore the criminal function of the crime of damaging the computer information system, and through the data classification, pre-law reference and other ways to build the data crime system.

KEYWORDS

Damaging computer; information system; data crime; data classification; legal benefit correction

CITE THIS PAPER

Shaobo Cui, Zhangwei Yao, Legal Interests of Computer and Data Security in the Context of Digital Economy Advocation of Dualism. Science of Law Journal (2024) Vol. 3: 34-42. DOI: http://dx.doi.org/DOI: 10.23977/law.2024.030205.

REFERENCES

[1] Xu Chuncheng, Lin Tenglong. Legal Interest Debate on the Crime of destroying Computer Information System from the doctrinal Perspective [J]. Science and Law (Chinese and English), 2023(04):21-31.
[2] Li Huaisheng. The Change of legal Interest of Data Security and the regulation of Criminal Law [J]. Jiangxi Social Sciences, 2023, 43(07):33-44.
[3] Xia Wei. On the Legislative reconstruction of Data Crime [J]. Legal and Social Development, 2023,29(04):173-190.
[4] Wang Huimin. Dilemma and Solution of Data Crime Governance in China [J]. Northern Law School, 2023, 17(01): 122-132.
[5] Liu Shuangyang. The typification of data legal interests and the construction of Criminal Law protection System [J]. China Journal of Criminal Law, 2022(06):37-52.
[6] Liu Xian-quan. Reconstruction of Criminal law Regulation of Computer System in the era of "Internet 3.0" [J]. Journal of East China University of Political Science and Law, 2022, 25(05):67-78.
[7] Yan Erpeng. Judicial Determination of the crime of disrupting Computer Information System [J]. China Journal of Criminal Law, 2022(03):122-137.
[8] Yu Jian. Criminal Law Regulation and Value Recognition of property Data [J]. Law, 2022(04):78-87.
[9] Wang Huawei. Doctrinal Reflection and Reconstruction of Crime of destroying Computer Information System [J]. Journal of Southeast University (Philosophy and Social Sciences Edition), 2021, 23(06):93-104+147.
[10] Chen Xingliang. The types of cyber crimes and their judicial recognition[J]. Rule of Law Research, 2021(03):3-16.
[11] Su Sanyi. From data carrier to data information: the regression of legal interest standard of data security [J]. Journal of Southwest University of Political Science and Law, 2019, 22(06):97-108.
[12] Zhou Libo. Judicial Practice analysis of crime of destroying computer information System and adjustment of Criminal law norms: An Empirical Study based on 100 judicial cases [J]. Rule of Law Research, 2018(04):67-76.
[13] Zhang Mingkai. Legal interest protection and proportionality principle [J]. Social Sciences in China, 2017(07): 88-108+205-206.
[14] Sun Daoci. Review and prospect of Big Data legal benefit Protection in criminal law [J]. Journal of Central South University (Social Science Edition), 2017, 23(01):58-64.
[15] Wang Shizhou. Modern penalty objective theory and China's Choice [J]. Legal Studies, 2003(03):107-131.

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.