Published June 22, 2016 | Version v1
Journal article Open

Regulation of Cyber Space: An Analysis of Chinese Law on Cyber Crime

Creators

  • 1. Tallinn University, Estonia

Contributors

  • 1. Raksha Shakti University

Description

Since the advent of the network era, different countries adopted different stance on maintaining social order in cyber space; soft, strong, or medium. In China, as in some other countries in the same group, a tough approach has been taken from the beginning. The purpose of this article is, by studying a series of legal actions against cyber crime, to explore in to the Chinese model of regulation of cyber space. In order to exercise control over the Internet, China has implemented statutory laws and administrative regulations revolving activity criminalizing, content filtering and user monitoring so as to maintain security and stability at both community and state levels. A tight legal and regulatory network has gradually weaved through recruitment of cyber police, investment on security technology, regulations on communications enterprises, and surveillance over users. Regardless of critics, this model was proved to have the merits of effectiveness in the specific socio-legal context in a short term.

Files

Li2015vol9issue2.pdf

Files (270.8 kB)

Name Size Download all
md5:19a88cab3daf92bbc1a09e906c0ec3fb
270.8 kB Preview Download

Additional details

Related works

References

  • China Internet Network Information Center. (2015). 35th Statistical Survey Report on the Internet Development in China, Beijing: China Internet Network Information Center.
  • Clarke, D. (1999). Private Enforcement of Intellectual Property Rights in China. Intellectual Property Rights in China: Evolving Business and Legal Frameworks, 10(2), National Bureau of Research Analysis.
  • Franda, M. (2002). Launching Into Cyberspace: Internet Development and Politics in Five World Regions, London: Lynne Rienner Publishers.
  • Huang, Z., & Chen, X. (2005). The Defects of Criminal Law Regulation and Theoretical Reaction to Computer Crime. Jianghai Xuekan, 3, 112-118.
  • Kim, M. W. (1997). How Countries Handle Computer Crime. Ethics and Law on the Electronic Frontier, Fall 1997.
  • Li, X. (1992). A Study on the Application of Criminal Law to Computer Crime, China University of Political Science and Law Graduate Law Review.
  • Li, X. (2008). Cyber crime and Deterrence: Networking Legal Systems in the Networked Information Society. Turku, Finland: University of Turku.
  • Li, X. (2009). Social Order in Cyberspace. Hyderabad, India: ICFAI University Press.
  • Li, X. (2014). Zhongguo Falv Zhidu Daolun (An Introduction to Chinese Legal System). Turku, Finland: Informyth.
  • Li, X. (2015). Chinese Legal System: A Way Forward. In X. Li (ed.), Selected Readings in Chinese Legal System (pp. xvii-xx). Turku, Finland: Informyth.
  • The National Computer Network Emergency Response Technical Team/Coordination Center of China (known as CNCERT or CNCERT/CC). (2014). Report on China Internet Network Security 2013. Beijing: CNCERT/CC