Annotation |
A study on cyber fraud shall be based on clearly understanding of the basic features of cyber fraud. Cyber crime is a kind of crime of information, which means the offender manipulates personal information to cheat the victim to attain his goal. If predicting the development of cyber fraud, it will be more and more dependent on personal information. The key issue of controlling cyber crime is to protect personal information. Although the interest of personal information to someone cannot be regarded as a private right, to protect personal right is very important to safeguard the personal and property security of citizens. So the definition of personal information shall be made with the perspective of personal and property security. For the finding of cyber fraud, the relevant agencies and courts shall fully recognize such features and distinguish it from offline crimes.
When dealing with cyber fraud, the authors view “Governance” as co-governance and foresee the focus of cyber fraud governance as cooperation between different entities, as well as enhancement of information exchange between different subjects. In prevention and punishment of cyber fraud, special attention should be paid to the work of Internet enterprises. Besides, the administrative and judicial agency should strengthen cooperation with Internet enterprises, fully exerting the enthusiasm of Internet enterprises and also respecting the commercial interests and corporate reputation of Internet enterprises |
References |
1. Cai Changchun. MENG yianzhu proposed “big schemes” to prevent and fight against telecom and cyber fraud (Cai Changchun. MENG jianzhu proposed “big schemes” to prevent and fight against telecom and cyber fraud). URL: http://www.legaldaily.com.cn/index/content/2016-10/13/content_6836188.htm?node=20908 (Date of access: 14.10.2019). Text: electronic.
2. Chen Yizhuang Theory Monthly (Theory Monthly), 1985, no. 5.
3. Tencent Network Security and Crime Research (Tencent Network Security and Crime Research), 2017, no. 1.
4. Fang Yan China Network Information Security (China Network Information Security), 2017, no. 2.
5. Gui Changni China Information Security (China Information Security), 2017, no. 6, pp. 10.
6. Guo Chunying Legal Daily (Legal Daily), 2016.
7. He Liquan, Li Siwen Extortion software virus wreaked havoc on universities and colleges in china: once computers were invaded, they could not recover (Extortion software virus wreaked havoc on universities and colleges in china: once computers were invaded, they could not recover). URL: http://www.thepaper.cn/newsDetail_forward_1684721 (Date of access: 13.09.2019). Text: electronic.
8. Lang Sheng. Law Press (Law Press), 2015, pp. 423.
9. Li Hong Law Press (Law Press), 2016, pp. 331.
10. China Network Information Security (China Network Information Security), 2017, no. 2.
11. Pi Lan, Liu Feng, Lin Dongdai China Information Security (China Information Security), 2015, no. 9.
12. Shi Yanan Journal of Renmin University of China (Journal of Renmin University of China), 2017, no. 1.
13. Shi Yanan China People’s Public Security University Press (China People’s Public Security University Press), 2005.
14. Wang Feng More than half of telecommunications network fraud involves information leakage, and committee members call for the formulation of personal information protection law: 21st Century business report (More than half of telecommunications network fraud involves information leakage, and committee members call for the formulation of personal information protection law: 21st Century business report), 2017.
15. Wang Liming Fudan University Press (Fudan University Press), 2015, pp. 268.
16. Zhang Mingkai Law Press (Law Press), 2016, pp. 1003.
17. Zhang Xinbao China Law (China Law), 2015, no. 3. |