Proceedings of the 2024 10th International Conference on Humanities and Social Science Research (ICHSSR 2024)

Study on the Criteria for Determining Destructive Programs in Computer System Crimes

Authors
Chong Jiang1, *
1Shanxi Agricultural University, Law, Department of Law, School of Public Administration, Jinzhong, Shanxi, 030801, China
*Corresponding author. Email: 3200312876@qq.com
Corresponding Author
Chong Jiang
Available Online 2 September 2024.
DOI
10.2991/978-2-38476-277-4_92How to use a DOI?
Keywords
computer system crimes; disruptive programs; identification criteria; judicial practice; case studies
Abstract

This thesis discusses the identification of destructive programs in computer system crimes and studies the role of relevant identification standards in judicial practice. Firstly, the study’s background, purpose, and significance are introduced, and then the concept and characteristics of a destructive program are elaborated in detail, including definition, classification, and characteristics. Then it focuses on identifying destructive programs in computer system crimes, analyzing the role of destructive programs in crimes, and establishing identification standards. The role of relevant identification standards in judicial practice is explored, including the importance of legal provisions, jurisprudence interpretation, and expert identification. The thesis further examines the refinement and improvement of the identification standards of destructive procedures, analyzes the current status of relevant research at home and abroad, existing problems and challenges, and puts forward suggestions for refinement and improvement. Finally, the application and impact of destructive procedures in specific cases are discussed through case studies. The main research findings are derived from the research and discussion in this thesis; the limitations of the research and suggestions for further research are discussed. The study is of practical significance for strengthening the fight against computer system crimes and identifying such crimes in judicial practice.

Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the 2024 10th International Conference on Humanities and Social Science Research (ICHSSR 2024)
Series
Advances in Social Science, Education and Humanities Research
Publication Date
2 September 2024
ISBN
978-2-38476-277-4
ISSN
2352-5398
DOI
10.2991/978-2-38476-277-4_92How to use a DOI?
Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Chong Jiang
PY  - 2024
DA  - 2024/09/02
TI  - Study on the Criteria for Determining Destructive Programs in Computer System Crimes
BT  - Proceedings of the 2024 10th International Conference on Humanities and Social Science Research (ICHSSR 2024)
PB  - Atlantis Press
SP  - 831
EP  - 843
SN  - 2352-5398
UR  - https://doi.org/10.2991/978-2-38476-277-4_92
DO  - 10.2991/978-2-38476-277-4_92
ID  - Jiang2024
ER  -