Cargando…
Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing
Currently, cloud computing provides users all over the globe with Information and Communication Technology facilities that are utility-oriented. This technology is trying to drive the development of data center design by designing and building them as networks of cloud machines, enabling users to ac...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer Berlin Heidelberg
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10123552/ https://www.ncbi.nlm.nih.gov/pubmed/37122827 http://dx.doi.org/10.1186/s13677-023-00437-3 |
_version_ | 1785029678567784448 |
---|---|
author | Zhang, Yu Dong, Haoyun |
author_facet | Zhang, Yu Dong, Haoyun |
author_sort | Zhang, Yu |
collection | PubMed |
description | Currently, cloud computing provides users all over the globe with Information and Communication Technology facilities that are utility-oriented. This technology is trying to drive the development of data center design by designing and building them as networks of cloud machines, enabling users to access and run the application from any part of the globe. Cloud computing provides considerable benefits to organizations by providing rapid and adaptable ICT software and hardware systems, allowing them to concentrate on creating innovative business values for the facilities they provide. The right to privacy of big data has acquired new definitions with the continued advancement of cloud computing, and the techniques available to protect citizens’ personal information under administrative law have managed to grow in a multitude. Because of the foregoing, internet fraud is a new type of crime that has emerged over time and is based on network technology. This paper analyzed and studied China’s internet fraud governance capabilities, and made a comprehensive evaluation of them using cloud computing technology and the Analytic Hierarchy Process (AHP). This paper discussed personal information security and the improvement of criminal responsibility from the perspective of citizens’ information security and designed and analyzed cases. In addition, this paper also analyzed and studied the ability of network fraud governance in the era of cloud computing. It also carried out a comprehensive evaluation and used the fuzzy comprehensive evaluation method to carry out the evaluation. A questionnaire survey was used to survey 100 residents in district X of city Z and district Y of the suburban area. Among the 100 people, almost all of them received scam calls or text messages, accounting for 99%, of which 8 were scammed. Among the people, more than 59.00% of the people expressed dissatisfaction with the government’s Internet fraud satisfaction survey. Therefore, in the process of combating Internet fraud, the government still needs to step up its efforts. |
format | Online Article Text |
id | pubmed-10123552 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Springer Berlin Heidelberg |
record_format | MEDLINE/PubMed |
spelling | pubmed-101235522023-04-25 Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing Zhang, Yu Dong, Haoyun J Cloud Comput (Heidelb) Research Currently, cloud computing provides users all over the globe with Information and Communication Technology facilities that are utility-oriented. This technology is trying to drive the development of data center design by designing and building them as networks of cloud machines, enabling users to access and run the application from any part of the globe. Cloud computing provides considerable benefits to organizations by providing rapid and adaptable ICT software and hardware systems, allowing them to concentrate on creating innovative business values for the facilities they provide. The right to privacy of big data has acquired new definitions with the continued advancement of cloud computing, and the techniques available to protect citizens’ personal information under administrative law have managed to grow in a multitude. Because of the foregoing, internet fraud is a new type of crime that has emerged over time and is based on network technology. This paper analyzed and studied China’s internet fraud governance capabilities, and made a comprehensive evaluation of them using cloud computing technology and the Analytic Hierarchy Process (AHP). This paper discussed personal information security and the improvement of criminal responsibility from the perspective of citizens’ information security and designed and analyzed cases. In addition, this paper also analyzed and studied the ability of network fraud governance in the era of cloud computing. It also carried out a comprehensive evaluation and used the fuzzy comprehensive evaluation method to carry out the evaluation. A questionnaire survey was used to survey 100 residents in district X of city Z and district Y of the suburban area. Among the 100 people, almost all of them received scam calls or text messages, accounting for 99%, of which 8 were scammed. Among the people, more than 59.00% of the people expressed dissatisfaction with the government’s Internet fraud satisfaction survey. Therefore, in the process of combating Internet fraud, the government still needs to step up its efforts. Springer Berlin Heidelberg 2023-04-24 2023 /pmc/articles/PMC10123552/ /pubmed/37122827 http://dx.doi.org/10.1186/s13677-023-00437-3 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Research Zhang, Yu Dong, Haoyun Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing |
title | Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing |
title_full | Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing |
title_fullStr | Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing |
title_full_unstemmed | Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing |
title_short | Criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing |
title_sort | criminal law regulation of cyber fraud crimes—from the perspective of citizens’ personal information protection in the era of edge computing |
topic | Research |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10123552/ https://www.ncbi.nlm.nih.gov/pubmed/37122827 http://dx.doi.org/10.1186/s13677-023-00437-3 |
work_keys_str_mv | AT zhangyu criminallawregulationofcyberfraudcrimesfromtheperspectiveofcitizenspersonalinformationprotectionintheeraofedgecomputing AT donghaoyun criminallawregulationofcyberfraudcrimesfromtheperspectiveofcitizenspersonalinformationprotectionintheeraofedgecomputing |