Study on the Obligations of the Crime of Refusing to Fulfill the Obligations of Information Network Security Management
DOI: 10.23977/law.2023.021009 | Downloads: 5 | Views: 328
Author(s)
Yinshuang Ma 1
Affiliation(s)
1 Department of Laws, Dalian Ocean University, Heishijiao Street, Dalian, Liaoning, China
Corresponding Author
Yinshuang MaABSTRACT
With the continuous development of the internet today, the Internet has greatly promoted the progress of society, but its impact also has to attract our attention, the internet crime more and more at the same time the breeding of new forms of crime, so that the traditional criminal law can not be completely regulated, the new law has also solved this problem. The new law is the criminal law amendment (IX). According to the new crime of refusing to implement the regulation of network security management, the network service provider must bear the criminal responsibility for his inaction, which has laid a new legal basis for the security management of network crime. However, there are many problems in this charge, such as the low application rate of the court. This paper focuses on the legal background and judicial system of the crime of failing to perform the responsibility of Information Network security management. Using the general idea of the present situation, the paper puts forward the requirements for information network security, then expounds the existing problems and puts forward remedial measures.
KEYWORDS
Internet crime; duty of Information Network security management; network service providerCITE THIS PAPER
Yinshuang Ma, Study on the Obligations of the Crime of Refusing to Fulfill the Obligations of Information Network Security Management. Science of Law Journal (2023) Vol. 2: 55-60. DOI: http://dx.doi.org/DOI: 10.23977/law.2023.021009.
REFERENCES
[1] Zhou Guangquan. Judicial application of the crime of refusing to fulfill the duty of information network security management [J]. People's Procuratorate, 2018(09): 16-22.
[2] Wang Chunhui. An analysis of the ten legal systems and basic characteristics of the cyber security law [J]. China Telecom, 2016(12): 11-16.
[3] Zhou Jiahai, Yu Haisong. Understanding and application of the interpretation on several issues concerning the application of law in criminal cases concerning illegal use of information networks and assistance in criminal activities on information networks [J]. People's Justice, 2019(31) : 25-29. DOI: 10.19684/J. CNKI. 1002-4603.2019.31.007.
[4] Ma Yongchun, Wang Teng. The applicable predicament and relief of the crime of refusing to fulfill the duty of information network security management [J]. Journal of Shandong Police College, 2018, 30(03): 12 -20.
Downloads: | 4218 |
---|---|
Visits: | 97982 |
Sponsors, Associates, and Links
-
Journal of Language Testing & Assessment
-
Information and Knowledge Management
-
Military and Armament Science
-
Media and Communication Research
-
Journal of Human Movement Science
-
Art and Performance Letters
-
Lecture Notes on History
-
Lecture Notes on Language and Literature
-
Philosophy Journal
-
Journal of Political Science Research
-
Journal of Sociology and Ethnology
-
Advances in Broadcasting