摘要(Abstract):
受三代网络环境中应用功能重心的变化,网络安全风险先后经历了技术性风险、内容性风险以及多重复合风险三个发展阶段。网络犯罪的指向从最初的技术性侵害,发展到后来的利益性侵害,直到过渡到目前的现实关系侵害。犯罪指向的变化引起不同阶段网络安全法律的策略转换。基于网络的发展趋势,网络安全的法律保护必须统筹"个体利益"、"抽象秩序"与"宏观安全"三者之间的关系,建立复合型的网络安全保护体系。
关键词(KeyWords):
Abstract:
Keywords:
基金项目(Foundation):
作者(Author): 王佳;李怀胜;
Email:
参考文献(References):
- 1 CNNIC,THE 39TH STATISTICAL REPORT OF CHINESE INTERNET DEVELOPMENT,at http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201701/P020170123364672657408.pdf(Last visited on June 6,2017).
- 2 2.4 BILLION CHINESE ARE ATTACKED BY CYBERCRIME:ANNUAL LOSS OF 7000 BILLION,at http://tech.huanqiu.com/news/2015-12/8083775.html(Last visited on June 6,2017).
- 3 BAIDU ENCYCLOPEDIA,at https://baike.baidu.com/(Last visited on June 6,2017).
- 4 HUI ZHIBIN,STRATEGY RESEARCH ON INFORMATION SECURITY OF GLOBAL CYBERSPACE,at 6(Chinese Publishing Group,2013).
- 5 VIKTOR MAYER-SCH?NBERGER ET AL.,BIG DATA:A REVOLUTION THAT WILL TRANSFORM HOW WE LIVE,WORK,AND THINK,at 11(Sheng Yan et al.trans.,Zhejiang People’s Publishing House,2013).
- 6 Yu Zhigang,The Direction of Adjustments of Criminal Legislation from the Perspective of Tri-networks,4 Law Forum 5,6(2012).
- 7 HUI ZHIBIN,THE INFORMATION SECURITY STRATEGY OF GLOBAL CYBERSPACE,at 7(Shanghai World Publishing Corporation,2013).
- 8 VIKTOR MAYER-SCH?NBERGER ET AL.,supra note 5,8.
- 9 Supra note 3.
- 10 VIKTOR MAYER-SCH?NBERGER ET AL.,supra note 5,4.
- 11 BIG DATA:THE TRUE WINNER OF THE PRESIDENTIAL ELECTION,at http://service.iresearch.cn/cloud/20121112/186756.shtml(Last visited on June 6,2017).
- 12 Yu Zhigang,The Propertilization and Criminal Protection of Computer Data in“Big Data”Age,3 Qinghai Sociology 7,9(2013).
- 13 YU ZHIGANG,RESEARCH ON THE INTERNET-BASED HETERIZATION OF TRADITIONAL CRIMES,at 5(China Procuratorial Press,2010).
- 14 Yu Zhigang,supra note 6.
- 15 Yu Zhigang,supra note 12.
- 16 In the evening of May 19,2009,a widespread network defect hit the Internet of China:23 provinces including Jiangsu,Hebei,Shanxi,Guangxi,Zhejiang and so on suffered from the phenomena of low speed of Internet visits and inaccessibility of websites.That incident is called“5·19 Accident of Network Paralysis”and“Accident of Storm Player”.The reason is that the attack between personal servers caused the DNS servers,to which the personal servers belonged,to be blocked by gigantic invalid flow rate within a short time and the other websites could not make effective DNS,including the website of Storm player.In order to rise higher click rate of advertisement,Storm player had a hidden device,which will link the users automatically to the websites of Storm player.With the congestion of DNS servers,Storm player software sent the resolution requests repeatedly,which led to more congestions of the network bandwidth.As a result,the networks of many southern provinces were paralyzed as a snow slide.See WANG ZUOLI&WEI LIANG,UNCOVER THE SECRETS OF 5·19 ACCIDENT OF NETWORK PARALYSIS:ANALYSIS OFTHE INCIDENT OF THE INTERNET CUT-OFF,at http://www.edu.cn/xin_xi_zi_xun_1625/20090821/t20090821_401364.shtml(Last visited on June 6,2017).
- 17 THE MOBILE INTERNET TRAFFIC OF CHINA IN 2013,at http://www.askci.com/news/201402/13/13172070854.shtml(Last visited on June 6,2017).
- 18 CURRENT GLOBAL INTERNET TRAFFIC PER DAY IS UP TO 1 EB,at http://www.chinairn.com/news/20131011/090221827.html(Last visited on June 6,2017).
- 19 CNNIC,supra note 1.
- 20 THE PIONEER OF NETWORK REAL-NAME REGISTRATION SYSTEM IN THE WORLD:WHY KOREA FAILED?at http://www.southcn.com/nfdaily/international/content/2012-01/19/content_36711818.htm(Last visited on June 6,2017).
- 21 Yu Zhigang,Possibilities of Applying Traditional Criminal Law in the“Double-layer Society”:Thoughts on the“Interpretations on Libel through Internet”Issued by the Supreme People’s Court and the Supreme People’s Procuratorate,10 Open Journal of Legal Science 102,105(2013).
- 22 THE CYBERCRIME SHOULD NOT BE NEGLECTED:MORE THAN HALF OF FINANCIAL INSTITUTIONS HAVE SUCHLOSSES,at http://sec.chinabyte.com/151/13019151.shtml(Last visited on June 6,2017).
- 23 THE“STUXNET VIRUS”ACCIDENT IN THE INDUSTRIAL CONTROL SECURITY SYSTEM HAS SHOCKED CHINA,at http://www.dqjsw.com.cn/xinwen/shichangdongtai/120461.html(Last visited on June 6,2017).
- 24 CNNIC:THE NUMBER OF NETIZENS IN CHINA IS UP TO 6.32 BILLION,THE PERCENTAGE OF CELLPHONENETIZENS SUCCEEDED THAT OF THE PC NETIZENS FOR THE FIRST TIME,at http://tech.ifeng.com/internet/detail_2014_07/21/37437832_0.shtml(Last visited on June 6,2017).
- 25 Article 3.6 of The Principles of Classification of Special Products for Computer Information System Security issued by the Ministry of Public Security of China in 1997.
- 26 YU ZHIGANG,INTERNET-BASED HETERIZATION OF JOINT CRIMES,at 40-41(China Fangzheng Press,2010).
- 27 Chang Yuan,The Review and Prediction of Computer Crimes,3 Legal Science 38,39(1991).
- 28 YIN WEI&ZHANG LI,TEACHING YOU COMPUTER SECURITY TECHNOLOGY STEP BY STEP,at 12(Publishing House of Electronic Industry,1997).
- 29 Li Huaisheng,Thoughts on the Spreading of Hacker Technology through the Internet from the Perspective of Criminal Law:with“Hacker School”as the Background,10 Chinese Criminal Law Journal 39,40(2009).
- 30 Yu Zhigang,The Legal Nature of Virtual Property in Online Games and Its Protection through Criminal Law,6 Forum of Political Science and Law 121(2003).
- 31 Yu Zhigang,Thoughts on the Criminalization of Renting and Selling“Zombi Network”Act,4 Journal of Beijing Union University75(2009).
- 32 Yu Zhigang&Li Xiangxia,The Empirical Analysis of the Transnational Crime of Chinese Citizens,1 Journal of National Procurators of the PRC 112,113(2014).
- 33 Yu Zhigang,supra note 21.
- 34 FENG YUJUN,THOUGHTS ON THE NETWORK SECURITY LEGISLATION OF THE US,at http://www.eupeople.com.cn/gz/20140307_14660.html(Last visited on June 6,2017).
- 35 Yu Zhigang&Xing Feilong,The Status Analysis and Future Construction of the Chinese Network Legal System:Up to December31,2012,4 Journal of Liaoning University 82,85(2013).