{"title":"攻击云存储平台的网络犯罪刑事责任研究","authors":"Lv Zhao","doi":"10.12783/dtssehs/icssm2020/34299","DOIUrl":null,"url":null,"abstract":"Attacking cloud platform crime is a kind of crime which is extremely harmful in the web3.0 era. It has the characteristics of strong combination ability, miscellaneous legal infringement category, low crime cost and difficult combat. In order to better criminalize this kind of crime, in addition to the traditional theoretical research of academic circles, it is necessary to study the trinity of practical research, data support and theoretical research. This article starts with the criminal model of attacking the cloud platform, sorts out 300 cases of the referee paper network, and the 42nd \"Statistical Report on the Development of China's Internet Network\" and other related data, and investigates the relevant substantive departments, and strives to clarify the crime of attacking the cloud platform. \"Combining with other cybercrime, analyzing the existing loopholes in criminal liability system, providing a reliable basis for scientifically identifying crimes and managing the network society.\"","PeriodicalId":320125,"journal":{"name":"DEStech Transactions on Social Science, Education and Human Science","volume":"447 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Criminal Liability of Cybercrime Related to Attack Cloud Storage Platform\",\"authors\":\"Lv Zhao\",\"doi\":\"10.12783/dtssehs/icssm2020/34299\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Attacking cloud platform crime is a kind of crime which is extremely harmful in the web3.0 era. It has the characteristics of strong combination ability, miscellaneous legal infringement category, low crime cost and difficult combat. In order to better criminalize this kind of crime, in addition to the traditional theoretical research of academic circles, it is necessary to study the trinity of practical research, data support and theoretical research. This article starts with the criminal model of attacking the cloud platform, sorts out 300 cases of the referee paper network, and the 42nd \\\"Statistical Report on the Development of China's Internet Network\\\" and other related data, and investigates the relevant substantive departments, and strives to clarify the crime of attacking the cloud platform. \\\"Combining with other cybercrime, analyzing the existing loopholes in criminal liability system, providing a reliable basis for scientifically identifying crimes and managing the network society.\\\"\",\"PeriodicalId\":320125,\"journal\":{\"name\":\"DEStech Transactions on Social Science, Education and Human Science\",\"volume\":\"447 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"DEStech Transactions on Social Science, Education and Human Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12783/dtssehs/icssm2020/34299\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"DEStech Transactions on Social Science, Education and Human Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12783/dtssehs/icssm2020/34299","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Criminal Liability of Cybercrime Related to Attack Cloud Storage Platform
Attacking cloud platform crime is a kind of crime which is extremely harmful in the web3.0 era. It has the characteristics of strong combination ability, miscellaneous legal infringement category, low crime cost and difficult combat. In order to better criminalize this kind of crime, in addition to the traditional theoretical research of academic circles, it is necessary to study the trinity of practical research, data support and theoretical research. This article starts with the criminal model of attacking the cloud platform, sorts out 300 cases of the referee paper network, and the 42nd "Statistical Report on the Development of China's Internet Network" and other related data, and investigates the relevant substantive departments, and strives to clarify the crime of attacking the cloud platform. "Combining with other cybercrime, analyzing the existing loopholes in criminal liability system, providing a reliable basis for scientifically identifying crimes and managing the network society."