Education, Science, Technology, Innovation and Life
Open Access
Sign In

Study on the Obligations of the Crime of Refusing to Fulfill the Obligations of Information Network Security Management

Download as PDF

DOI: 10.23977/law.2023.021009 | Downloads: 5 | Views: 328

Author(s)

Yinshuang Ma 1

Affiliation(s)

1 Department of Laws, Dalian Ocean University, Heishijiao Street, Dalian, Liaoning, China

Corresponding Author

Yinshuang Ma

ABSTRACT

With the continuous development of the internet today, the Internet has greatly promoted the progress of society, but its impact also has to attract our attention, the internet crime more and more at the same time the breeding of new forms of crime, so that the traditional criminal law can not be completely regulated, the new law has also solved this problem. The new law is the criminal law amendment (IX). According to the new crime of refusing to implement the regulation of network security management, the network service provider must bear the criminal responsibility for his inaction, which has laid a new legal basis for the security management of network crime. However, there are many problems in this charge, such as the low application rate of the court. This paper focuses on the legal background and judicial system of the crime of failing to perform the responsibility of Information Network security management. Using the general idea of the present situation, the paper puts forward the requirements for information network security, then expounds the existing problems and puts forward remedial measures.

KEYWORDS

Internet crime; duty of Information Network security management; network service provider

CITE THIS PAPER

Yinshuang Ma, Study on the Obligations of the Crime of Refusing to Fulfill the Obligations of Information Network Security Management. Science of Law Journal (2023) Vol. 2: 55-60. DOI: http://dx.doi.org/DOI: 10.23977/law.2023.021009.

REFERENCES

[1] Zhou Guangquan. Judicial application of the crime of refusing to fulfill the duty of information network security management [J]. People's Procuratorate, 2018(09): 16-22.
[2] Wang Chunhui. An analysis of the ten legal systems and basic characteristics of the cyber security law [J]. China Telecom, 2016(12): 11-16. 
[3] Zhou Jiahai, Yu Haisong. Understanding and application of the interpretation on several issues concerning the application of law in criminal cases concerning illegal use of information networks and assistance in criminal activities on information networks [J]. People's Justice, 2019(31) : 25-29. DOI: 10.19684/J. CNKI. 1002-4603.2019.31.007. 
[4] Ma Yongchun, Wang Teng. The applicable predicament and relief of the crime of refusing to fulfill the duty of information network security management [J]. Journal of Shandong Police College, 2018, 30(03): 12 -20.

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.