CHOSUN

사이버범죄의 수사상 문제점과 대책에 관한 연구

Metadata Downloads
Author(s)
유백준
Issued Date
2007
Abstract
ABSTRACT

A Study on the Problems of Investigating Cyber Crimes and Possible Solutions.

Yu, Baek-Jun
Advisor : Prof. Moon, Jeong-Min. Ph.D
Department of Law
Graduate School of Chosun University

We followed today in advancement of information and communication technology and the computer was used in until life every corner and it followed was not also the physical actuality world Internet the cyber space where it leads and, with an actuality it fell and in him and there was not a water service which it will think also one society appeared. Like this Internet is appearing it is absurd convenient it brings it did in our daily life, but hereupon just as good as the disfunction actual condition which expands the activity stage of the crime sleeping field in cyber space. From here becoming the problem the crime which occurs from cyber space discipline it does with law the thing to, is having a many limit is. For the order maintenance of cyber space consequently the new legal system it must take a triangular position and with a cyber crime by now it did must consider the whole confrontation plan recently because comes a that time tenure adaptation to circumstances confrontation even in and to be taken up it became, to think.

It is a IT powerful country where the oneself and others recognizes. The Internet utilization factors the above our citizen 6 three as 75.5% reach to 34,430,000 superhigh speed Internet member water service August 2007 end of the month current population hundreds of people spot 33.4 people the world-wide forefront it will be running and it will be able to use the Internet even from the road. Consequently the new species crime which is a cyber crime does not do is swaggering the investigation office the confrontation with a cyber crime in relation knowledge insufficiency ease. Also the government authority validity is appropriate does not confront is the actual condition even with of course international. But recently versatility it prepares a countermeasure from the government and each agency - the group and there is not a possibility without being the day when it is lucky.

The research which it sees like this problems let in mind and the concept which is a cyber space, it arranged occurs recently at cyber space to observe the concept of the multi branch crime which and the tendency back of present condition and change of shedding of blood and crime of cyber crime it tried. And at the investigating against a cyber crime problem point and the reporter to discuss a countermeasure under first, in problem point of the existing law system, with problem point at the entity law, our elder criminal law until 1953 establishment by law after 2001 with opening a court of some order part disposes in cyber crime and it is but, against the crime actual condition which in the Internet center occurs from cyber space the effective countermeasure did not become and to bear the problem which mass produces the various special law, it rolled up. Because the elder criminal law the flag it occurred against the hitherto crime sun time after death of the kind which it provides because is a norm where the legislation concept is strong occurrence against the crime shedding of blood which is possible in future falls in love in the principle of clarity opening a court is not easy not to be, it evolves suddenly and to the cyber crime which is had own way in the form which is various spontaneous intelligence it is in order not to be able.
One side, there is to the special law and, a various law regarding a cyber crime there is but also the elder criminal law department there is not a lot different and see from crime the prevention and protection effective intelligence cannot are bearing a problem point.
In afterwords problem point at the process law
First percentage volume cyber crime relation judges they are two things it is a problem to where. The cyber crime at quality of the crime which occurs from cyber space leads from inside information telecommunication system which is connected whole world and regarding the data which are illegal circulates it will be able to apply our elder criminal law becomes problem. Also, it does from the foreign nation and the investigation activity with a position crime or is and to sprout the investigation office of the foreign nation it leads and as the specialty evidence regarding the investigation document back which is drawn up permitted limit in case of restricted problem and confiscation - the search of evidence ability until where is the back becomes problem. The danger is abstraction but public order maintenance hazard it stands and that the case elder criminal law which is urgent must be exercised restricted will be born only the clarity could not be sacrificed it sees. Namely, with cyber crime the hazard which it disposes in same new species crime the thing the punishment regulation which stands must be having a flexibility is. Opening a court which collects the contents it will be able to win over consequently in the criminal law to lead and must prevent the legislation coat blank or a duplication actual condition. Only punishment regulation it lets to decide in advance from like that meaning and the contents of composition important matter it could be used in type of the order back in order, positivity must be investigated the introduction of the "Blanketstrafgesetz" and that, it sees. In after words, with cyber crime the case of the crime which is same special exceptionally will be punished because the negligence is many and from the traditional elder criminal law system it will escape necessary and to magnify the punishment of fruit act, must strengthen the elder criminal law legal punishment of reserve phase also. The elder criminal law in committing a crime reserve - conspiracy the before starting it is punishing in only exceptional case. The cyber crime approaches the computer but and when only schedule one fabrication it does and the result is automatic immediately and it is wide and it occurs to have the schedule one crime doctor, when it starts, reserves almost simultaneously, because the lance of conspiracy and execution becomes from reserve phase to be a necessity must punish, In end currently the punishment law which relates with information anger is being scattered to elder criminal law other multi special law this to integrate composition important matters, system and there is a consistency and it ties the what is called the cyber crime relation special law establishes relates at one and same law and will be the plan which treats the fact which in cyber crime include.
By second, investigation actuality coat problem point and countermeasure
First cyber crime the advancement and propagation velocity of the level of technique are quick too much and there is a problem the place where it prepares the counter-measure which even as the investigation office or the others agency is appropriate, the ethical ceremony of the net from the thin outdoors the multi problem points which come to knead from civil official negligence of the slander back group act which comes out and personal information is a wild possibility in after words. If consequently, system, from confront in cyber crime the professionalization of the investigation manpower for to be necessary, it prepares in international crime and the national for mutual assistance system validity is appropriate and to accomplish and quality possibility in order to be, it means the government must endeavor, at quality of cyber crime it appears just now and it disappears and it will be able to confront quickly in quick crime in order, must equip a real-time countermeasure system, the flag hazard the member anger of the crime hardship one´s post which stands is necessary. In order for also the relief regarding a crime damage is appropriate and to become accomplished quickly, it means the setup must be maintained.
After words, cyber crime the punishment elder quantity is heavy no matter how by social countermeasure and it is arrested certainly and is punished the psychological compulsion is operating sits before the computer and the ceremony without the actual condition which spoils a crime sees most is what the thing the ethical ceremony of each person must be strengthened and, the preventive action for the occurrence prevention of crime, and citizen each one in order not to see a damage oneself, must consider a help plan from the government other government offices. Until now our society confronts against the criminal act which uses a cyber space comparison broad-mindedly and all thing is fact. The advanced technology it was enough on top of that and hero hour it saw it came the fact that it is until the tendency which it does. But crime from cyber space, in instruction of about moment damage of large scale the mouth there will be a water service and with the important crime where also the cyber crime injures a social order with crime and sameness of existing because the case which it comes to do to recently mainly in crime objective is many recently it will recognize to be taken up, it became, it sees.

Think of, when discussing a cyber crime, the dilemma which it hits finally the human being with problem authorization or the computer the same machine problem to authorize. Of course computer where it gets peeled off but in the tool which is applied in objective of the human being the only thing is. Consequently the basic countermeasure against a cyber crime from the place where the ethical tube of the people who use the computer must start. Us prosperity of the community which all lives together the hazard individual oneself ethical ceremony, it will recover and will remain and when having the mind which it considers the cyber crime will decrease.
Alternative Author(s)
Yu Baek-Jun
Affiliation
대학원 법학과
Department
일반대학원 법학과
Awarded Date
2008-02
Table Of Contents
目 次

第1章 序 論 1
第1節 硏究의 目的 1
第2節 硏究의 範圍와 方法 4

第2章 사이버犯罪 槪觀 6
第1節 사이버犯罪의 槪念과 特性 6
Ⅰ. 사이버犯罪의 槪念 6
1. 인터넷과 情報化 6
2. 情報化의 逆機能과 사이버犯罪 10
3. 사이버犯罪의 類型 15
Ⅱ. 사이버犯罪의 特性 22
1. 一般的․社會的 特性 22
2. 行爲者의 特性 26

第2節 사이버犯罪의 類型 32
Ⅰ. 序論 32
Ⅱ. 사이버테러형犯罪 32
1. 槪念 32
2. 特徵 34
3. 目的 34
4. 類型 35
Ⅲ. 一般犯罪 55
1. 사이버詐欺 55
2. 사이버竊盜 57
3. 사이버暴力 60
4. 사이버性犯罪 62
5. 사이버名譽毁損․侮辱 63
6. 사이버賭博 64
7. 財物損壞 65
8. 個人情報 및 프라이버시侵害 66
Ⅳ. 新種 사이버犯罪 67

第3章 사이버犯罪의 現況과 變化趨勢 70
第1節. 사이버犯罪의 現況 70
Ⅰ. 사이버테러형犯罪 70
1. 類型別 71
2. 年齡別 72
3. 職業別 73
Ⅱ. 一般 사이버犯罪 74

第2節 사이버犯罪의 變化趨勢 75
Ⅰ. 사이버犯罪의 變化樣相 75
1. 犯罪傾向 및 情報保護 環境變化 75
2. 國內․外 사이버犯罪 事例 81
Ⅱ. 사이버犯罪의 增加展望 84
1. 프라이버시권과 個人情報에 대한 威脅 84
2. 사이버테러의 威脅增加 85
3. 組織犯罪와의 連繫 86
4. 犯罪機會의 增加 87

第4章 사이버犯罪의 搜査上 問題點과 對策 88
第1節 사이버犯罪에 대한 搜査構造 88
Ⅰ. 사이버犯罪 對應 搜査構造 88
1. 警察 89
2. 檢察 93
3. 情報通信部 95
4. 其他 97
Ⅱ. 外國의 사이버犯罪 對應活動 97
1. 主要 國家別 對應活動 97
2. 各國의 立法現況 110
Ⅲ. 國際共助에 관한 法律 113
1. 國際機構 113
2. 사이버犯罪 關聯 國際條約 117

第2節 사이버犯罪의 現行法上 問題點과 對策 123
Ⅰ. 問題點 123
1. 實體法上 問題點 123
2. 節次法上 問題點 144
Ⅱ. 對策 155
1. 罪刑法定主義의 補完 156
2. 過失犯 處罰의 擴大 158
3. 刑法上 豫備段階의 處罰擴大 159
4. 豫防法學의 導入 檢討 160
5. 强制搜査 根據 마련 및 範圍 確定 162
6. 法律의 整備 168

第3節 사이버犯罪의 搜査現實上 問題點과 對策 170
Ⅰ. 問題點 170
1. 技術力 170
2. 社會性 缺如 171
3. 倫理意識 缺如 172
4. 個人情報 管理疎忽 173
Ⅱ. 對策 175
1. 制度的 對應方案 175
2. 社會的 對應方案 184

第5章 結 論 189


參 考 文 獻 193

表 目 次

우리나라의 주요 정보통신 지수 순위 11
사이버테러에 대한 여러 견해 비교․분석표 33
2006년도 해킹 신고 현황 44
윈도우 파생 바이러스 50
애플리케이션 파생 바이러스 51
2006년도 웜․바이러스 신고 현황 53
사이버폭력 유형 60
사이버폭력 피해 신고현황 61
사이버폭력 범죄현황 61
사이버범죄 발생 및 검거현황 70
유형별 발생 및 검거현황 71
연령별 현황 72
직업별 현황 73
주요 국가별 입법규제 현황 112
형법관련 법률 조항 131
정보통신망이용촉진 및 정보보호 등에 관한법률 주요조항 132
컴퓨터프로그램보호법 주요조항 133
저작권법 주요조항 134
전기통신기본법 주요조항 135
전기통신사업법 주요조항 135
전자서명법 주요조항 136
성폭력범죄의 처벌 및 피해자보호등에 관한 법률 주요조항 138
공공기관의 개인정보보호에 관한 법률 주요조항 138
신용정보의 이용 및 보호에 관한 법률 주요조항 138
공업 및 에너지기술 기반조성에 관한 법률 주요조항 138
무역업무자동화촉진에관한 법률 주요조항 138
부정경쟁방지 및 영업비밀보호에 관한 법률 주요조항 139
청소년보호법 주요조항 139
통신비밀보호법 주요조항 139
전파법 주요조항 139
방문판매 등에 관한 법률 주요조항 140
화물유통촉진법 주요조항 140
Degree
Doctor
Publisher
조선대학교 대학원
Citation
유백준. (2007). 사이버범죄의 수사상 문제점과 대책에 관한 연구.
Type
Dissertation
URI
https://oak.chosun.ac.kr/handle/2020.oak/7092
http://chosun.dcollection.net/common/orgView/200000236102
Appears in Collections:
General Graduate School > 4. Theses(Ph.D)
Authorize & License
  • AuthorizeOpen
  • Embargo2008-02-19
Files in This Item:

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.