Cargando…

Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing

Currently, cloud computing provides users all over the globe with Information and Communication Technology facilities that are utility-oriented. This technology is trying to drive the development of data center design by designing and building them as networks of cloud machines, enabling users to ac...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhang, Yu, Dong, Haoyun
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Berlin Heidelberg 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10123552/
https://www.ncbi.nlm.nih.gov/pubmed/37122827
http://dx.doi.org/10.1186/s13677-023-00437-3
_version_ 1785029678567784448
author Zhang, Yu
Dong, Haoyun
author_facet Zhang, Yu
Dong, Haoyun
author_sort Zhang, Yu
collection PubMed
description Currently, cloud computing provides users all over the globe with Information and Communication Technology facilities that are utility-oriented. This technology is trying to drive the development of data center design by designing and building them as networks of cloud machines, enabling users to access and run the application from any part of the globe. Cloud computing provides considerable benefits to organizations by providing rapid and adaptable ICT software and hardware systems, allowing them to concentrate on creating innovative business values for the facilities they provide. The right to privacy of big data has acquired new definitions with the continued advancement of cloud computing, and the techniques available to protect citizens’ personal information under administrative law have managed to grow in a multitude. Because of the foregoing, internet fraud is a new type of crime that has emerged over time and is based on network technology. This paper analyzed and studied China’s internet fraud governance capabilities, and made a comprehensive evaluation of them using cloud computing technology and the Analytic Hierarchy Process (AHP). This paper discussed personal information security and the improvement of criminal responsibility from the perspective of citizens’ information security and designed and analyzed cases. In addition, this paper also analyzed and studied the ability of network fraud governance in the era of cloud computing. It also carried out a comprehensive evaluation and used the fuzzy comprehensive evaluation method to carry out the evaluation. A questionnaire survey was used to survey 100 residents in district X of city Z and district Y of the suburban area. Among the 100 people, almost all of them received scam calls or text messages, accounting for 99%, of which 8 were scammed. Among the people, more than 59.00% of the people expressed dissatisfaction with the government’s Internet fraud satisfaction survey. Therefore, in the process of combating Internet fraud, the government still needs to step up its efforts.
format Online
Article
Text
id pubmed-10123552
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Springer Berlin Heidelberg
record_format MEDLINE/PubMed
spelling pubmed-101235522023-04-25 Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing Zhang, Yu Dong, Haoyun J Cloud Comput (Heidelb) Research Currently, cloud computing provides users all over the globe with Information and Communication Technology facilities that are utility-oriented. This technology is trying to drive the development of data center design by designing and building them as networks of cloud machines, enabling users to access and run the application from any part of the globe. Cloud computing provides considerable benefits to organizations by providing rapid and adaptable ICT software and hardware systems, allowing them to concentrate on creating innovative business values for the facilities they provide. The right to privacy of big data has acquired new definitions with the continued advancement of cloud computing, and the techniques available to protect citizens’ personal information under administrative law have managed to grow in a multitude. Because of the foregoing, internet fraud is a new type of crime that has emerged over time and is based on network technology. This paper analyzed and studied China’s internet fraud governance capabilities, and made a comprehensive evaluation of them using cloud computing technology and the Analytic Hierarchy Process (AHP). This paper discussed personal information security and the improvement of criminal responsibility from the perspective of citizens’ information security and designed and analyzed cases. In addition, this paper also analyzed and studied the ability of network fraud governance in the era of cloud computing. It also carried out a comprehensive evaluation and used the fuzzy comprehensive evaluation method to carry out the evaluation. A questionnaire survey was used to survey 100 residents in district X of city Z and district Y of the suburban area. Among the 100 people, almost all of them received scam calls or text messages, accounting for 99%, of which 8 were scammed. Among the people, more than 59.00% of the people expressed dissatisfaction with the government’s Internet fraud satisfaction survey. Therefore, in the process of combating Internet fraud, the government still needs to step up its efforts. Springer Berlin Heidelberg 2023-04-24 2023 /pmc/articles/PMC10123552/ /pubmed/37122827 http://dx.doi.org/10.1186/s13677-023-00437-3 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Research
Zhang, Yu
Dong, Haoyun
Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing
title Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing
title_full Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing
title_fullStr Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing
title_full_unstemmed Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing
title_short Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing
title_sort criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10123552/
https://www.ncbi.nlm.nih.gov/pubmed/37122827
http://dx.doi.org/10.1186/s13677-023-00437-3
work_keys_str_mv AT zhangyu criminallawregulationofcyberfraudcrimesfromtheperspectiveofcitizenspersonalinformationprotectionintheeraofedgecomputing
AT donghaoyun criminallawregulationofcyberfraudcrimesfromtheperspectiveofcitizenspersonalinformationprotectionintheeraofedgecomputing