• AI글쓰기 2.1 업데이트
PARTNER
검증된 파트너 제휴사 자료

정보통신망법 상 정보통신망침입죄에 대한 비판적 고찰 (Critical Review of Intrusive Acts on Information and Communications Network Criminalized by Act on Information and Communications Network)

25 페이지
기타파일
최초등록일 2025.04.28 최종저작일 2014.12
25P 미리보기
정보통신망법 상 정보통신망침입죄에 대한 비판적 고찰
  • 미리보기

    서지정보

    · 발행기관 : 경찰대학 경찰대학
    · 수록지 정보 : 경찰학연구 / 14권 / 4호 / 51 ~ 75페이지
    · 저자명 : 장윤식, 김기범, 이관희

    초록

    This paper proposes legislative adjustment to the current Act on Promotion of Information and Communications Network Utilization and Information Protection, ect(hereafter Act on ICN) after discussing several interpretative problems regarding so called ‘hacking’, that is, intrusive acts on information and communications network prescribed on article 48 - (1) of Act on ICN. The necessity of criminal punishment against intrusive acts on information and communications network has arisen more severely as cyber security matters to a great extent in our daily lives. Criminal punishment against hacking has been more extensive since 1987 when the name of the offence was ‘intrusive and destructive acts on computer networks’ - the origin of the offense. Throughout this process, a number of problems occurred in relation to legal interest protected by the code and corpus delicti as follows;First, legal interest is not properly described in the article. Initially the article seems to protect information and communications networks owned by provider of information and communications services. However, interpretation of legal interest has gradually become blurred due to the rise of personal PC and especially smart phones. Although the extent of protection can expand by interpretational flexibility of the article considering the purpose of enactment, this interpretational measure cannot completely cover substantial difference between the extent of damage caused by infringement on computer systems of service providers and those of individuals.
    Second, the definition of information and communications network is not clear enough. When originally enacted, the act seemed to describe individual computer or communication network limited to specific orientations. These days, however, ‘Internet’ connects all the computers all at once, therefore, the information and communications network can easily stretches out indefinitely. Under these circumstances, the term ‘network’ in the code goes against the rule of clarity; the code cannot simply specify which network was compromised from a perpetrator’s end of the rink all the way to a victim’s. The legal statutes of the U.S., Germany and the Council of Europe(Convention on Cybercrime) use the term ‘computer’ or ‘system’ instead of ‘network’, which provides many legislative implications.
    Third, the concepts of access and intrusion are ambiguous. While the subject of intrusion is clearly stipulated as information and communications network, the subject of access does not exist. It could mean both: the network, the same as intrusion, and a specific piece of information within the network. Legal appraisal varies according to which approach is taken; if the subject of access is the network itself, access is the prior step to intrusion, so it can be treated as ‘attempted crime’. If it is the letter, access failure to targeted information within the network can still constitute an intrusion to network. In particular, the concept of access should be more clearly defined since it is essential to interpretation of a normative term, ’authority for access’.
    In order to solve aforementioned interpretative problems, several legislative amendments should be put in place. First of all, legal interest and corpus delicti ought to be set down in a more detailed matter; the article should clarify whether to protect individual PCs and smart phones. It is possible that the Act on ICN only prescribes the protection of networks owned by service providers and the others - personal gadgets - shall be covered by penal code. Or a new legislation can be enacted so as to include both subjects. Secondly, the extent of network in the article should be narrowly interpreted, and eventually the code should incorporate the terms like ‘computer’ and ‘system’ in the light of overseas cases. Finally, by clarifying the concept of access and intrusion, the same act should be treated equally in any circumstances no matter who interprets it legally.
    This paper tries to provide theoretical background under which legal stability and openness of Internet are ensured at the same time. It also intends to provide meaningful implications to discourses regarding culpability of intrusive acts on information and communications network as well as validity of punishment against attempted crime. This research hopes to contribute to a possible new enactment process in addition to the current one because the article 48 - (1) is virtually functioning as fundamental legislation for cyber security.

    영어초록

    This paper proposes legislative adjustment to the current Act on Promotion of Information and Communications Network Utilization and Information Protection, ect(hereafter Act on ICN) after discussing several interpretative problems regarding so called ‘hacking’, that is, intrusive acts on information and communications network prescribed on article 48 - (1) of Act on ICN. The necessity of criminal punishment against intrusive acts on information and communications network has arisen more severely as cyber security matters to a great extent in our daily lives. Criminal punishment against hacking has been more extensive since 1987 when the name of the offence was ‘intrusive and destructive acts on computer networks’ - the origin of the offense. Throughout this process, a number of problems occurred in relation to legal interest protected by the code and corpus delicti as follows;First, legal interest is not properly described in the article. Initially the article seems to protect information and communications networks owned by provider of information and communications services. However, interpretation of legal interest has gradually become blurred due to the rise of personal PC and especially smart phones. Although the extent of protection can expand by interpretational flexibility of the article considering the purpose of enactment, this interpretational measure cannot completely cover substantial difference between the extent of damage caused by infringement on computer systems of service providers and those of individuals.
    Second, the definition of information and communications network is not clear enough. When originally enacted, the act seemed to describe individual computer or communication network limited to specific orientations. These days, however, ‘Internet’ connects all the computers all at once, therefore, the information and communications network can easily stretches out indefinitely. Under these circumstances, the term ‘network’ in the code goes against the rule of clarity; the code cannot simply specify which network was compromised from a perpetrator’s end of the rink all the way to a victim’s. The legal statutes of the U.S., Germany and the Council of Europe(Convention on Cybercrime) use the term ‘computer’ or ‘system’ instead of ‘network’, which provides many legislative implications.
    Third, the concepts of access and intrusion are ambiguous. While the subject of intrusion is clearly stipulated as information and communications network, the subject of access does not exist. It could mean both: the network, the same as intrusion, and a specific piece of information within the network. Legal appraisal varies according to which approach is taken; if the subject of access is the network itself, access is the prior step to intrusion, so it can be treated as ‘attempted crime’. If it is the letter, access failure to targeted information within the network can still constitute an intrusion to network. In particular, the concept of access should be more clearly defined since it is essential to interpretation of a normative term, ’authority for access’.
    In order to solve aforementioned interpretative problems, several legislative amendments should be put in place. First of all, legal interest and corpus delicti ought to be set down in a more detailed matter; the article should clarify whether to protect individual PCs and smart phones. It is possible that the Act on ICN only prescribes the protection of networks owned by service providers and the others - personal gadgets - shall be covered by penal code. Or a new legislation can be enacted so as to include both subjects. Secondly, the extent of network in the article should be narrowly interpreted, and eventually the code should incorporate the terms like ‘computer’ and ‘system’ in the light of overseas cases. Finally, by clarifying the concept of access and intrusion, the same act should be treated equally in any circumstances no matter who interprets it legally.
    This paper tries to provide theoretical background under which legal stability and openness of Internet are ensured at the same time. It also intends to provide meaningful implications to discourses regarding culpability of intrusive acts on information and communications network as well as validity of punishment against attempted crime. This research hopes to contribute to a possible new enactment process in addition to the current one because the article 48 - (1) is virtually functioning as fundamental legislation for cyber security.

    참고자료

    · 없음
  • 자주묻는질문의 답변을 확인해 주세요

    해피캠퍼스 FAQ 더보기

    꼭 알아주세요

    • 자료의 정보 및 내용의 진실성에 대하여 해피캠퍼스는 보증하지 않으며, 해당 정보 및 게시물 저작권과 기타 법적 책임은 자료 등록자에게 있습니다.
      자료 및 게시물 내용의 불법적 이용, 무단 전재∙배포는 금지되어 있습니다.
      저작권침해, 명예훼손 등 분쟁 요소 발견 시 고객센터의 저작권침해 신고센터를 이용해 주시기 바랍니다.
    • 해피캠퍼스는 구매자와 판매자 모두가 만족하는 서비스가 되도록 노력하고 있으며, 아래의 4가지 자료환불 조건을 꼭 확인해주시기 바랍니다.
      파일오류 중복자료 저작권 없음 설명과 실제 내용 불일치
      파일의 다운로드가 제대로 되지 않거나 파일형식에 맞는 프로그램으로 정상 작동하지 않는 경우 다른 자료와 70% 이상 내용이 일치하는 경우 (중복임을 확인할 수 있는 근거 필요함) 인터넷의 다른 사이트, 연구기관, 학교, 서적 등의 자료를 도용한 경우 자료의 설명과 실제 자료의 내용이 일치하지 않는 경우
문서 초안을 생성해주는 EasyAI
안녕하세요 해피캠퍼스의 20년의 운영 노하우를 이용하여 당신만의 초안을 만들어주는 EasyAI 입니다.
저는 아래와 같이 작업을 도와드립니다.
- 주제만 입력하면 AI가 방대한 정보를 재가공하여, 최적의 목차와 내용을 자동으로 만들어 드립니다.
- 장문의 콘텐츠를 쉽고 빠르게 작성해 드립니다.
- 스토어에서 무료 이용권를 계정별로 1회 발급 받을 수 있습니다. 지금 바로 체험해 보세요!
이런 주제들을 입력해 보세요.
- 유아에게 적합한 문학작품의 기준과 특성
- 한국인의 가치관 중에서 정신적 가치관을 이루는 것들을 문화적 문법으로 정리하고, 현대한국사회에서 일어나는 사건과 사고를 비교하여 자신의 의견으로 기술하세요
- 작별인사 독후감
해캠 AI 챗봇과 대화하기
챗봇으로 간편하게 상담해보세요.
2026년 02월 26일 목요일
AI 챗봇
안녕하세요. 해피캠퍼스 AI 챗봇입니다. 무엇이 궁금하신가요?
2:04 오전