Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Illegal Access to a Computer System from the Standpoint of the Current Criminal Code

Illegal Access to a Computer System from the Standpoint of the Current Criminal Code AbstractOne of the forms that cybercrime can take at present is illegal access to a computer system. From the very beginning, the world of computers and of the Internet was based on imperfections, defects, and sometimes on poorly understood processes. We might even call this fact “the original sin” of the Internet. In the end, it is not only computer scientists who have come to exploit such defects, but also criminals. In the real world, there are people who break into homes and take away everything they find valuable. In the virtual world, there are individuals who penetrate into computer systems and steal all valuable data. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Journal of Legal Studies de Gruyter

Illegal Access to a Computer System from the Standpoint of the Current Criminal Code

Journal of Legal Studies , Volume 23 (37): 11 – Jun 1, 2019

Loading next page...
 
/lp/de-gruyter/illegal-access-to-a-computer-system-from-the-standpoint-of-the-current-FuidXk3mI5
Publisher
de Gruyter
Copyright
© 2019 Alin Teodorus Drăgan, published by Sciendo
eISSN
2392-7054
DOI
10.2478/jles-2019-0003
Publisher site
See Article on Publisher Site

Abstract

AbstractOne of the forms that cybercrime can take at present is illegal access to a computer system. From the very beginning, the world of computers and of the Internet was based on imperfections, defects, and sometimes on poorly understood processes. We might even call this fact “the original sin” of the Internet. In the end, it is not only computer scientists who have come to exploit such defects, but also criminals. In the real world, there are people who break into homes and take away everything they find valuable. In the virtual world, there are individuals who penetrate into computer systems and steal all valuable data.

Journal

Journal of Legal Studiesde Gruyter

Published: Jun 1, 2019

There are no references for this article.