Abstract

Destructive programs in computer network systems have become the leaders in digital crime in contemporary society. However, the current laws for judicial recognition of destructive programs are not yet clear enough, and judicial personnel still need to combine their own experience to efficiently judge whether criminals use destructive programs to conduct internet Crime. This article will use the case study method, based on the case of Zhang Chaojies destruction of a computer information system, combined with document collection and empirical analysis, and analyzing the recognition dilemma, reasons and improvement measures of destructive programs with specific reference to 100 typical cases of destructive program crime in conjunction with legal interpretation, and the empirical results show that there are many types of destructive programs, so their concepts and identification procedures should be clearly defined.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call