英文摘要 |
The term “hacker” is usually called the criminals to steal information or damage the computer systems nowadays. At the beginning, the hackers just promoted the computer technology and shared the network resource. The hackers were suppressed when the governments and the corporates controlled cyberspace. The above-mentioned phenomena brought about the legislation of computer crimes. The crime of computer intrusion is punished under the article 358 of the criminal code. Compared with the legislation of other countries, the subjective and objective elements of the article 358 of the criminal code are not enough to identify the constitution of crime.Based on the importance of computer systems in information society, the author holds that the legal interest of the crime of computer intrusion is to protect the trust in the functional mechanism of the permission to use the computer systems. This crime belongs to an offense of abstract danger because the prerequisite is only the criminal behavior of intrusion. This study suggests that interpreting the article 358 of the criminal code as the preparatory offense or the attempt of the article 359 and 360.According to this argument, the offender constitutes the crime when having the intent to not only commit article 358 but also article 358 or 359. In addition, the legitimacy about the legislation in the form of the offense of abstract danger only exists in the situation that the computer system is especially required to protect. Finally, the author suggests that increasing the prerequisite “the computer exclusively for the use of a financial institution or the government” for the article 358 of the criminal code. |