The Difference between the Offenses of Deceiving and other Offenses with Fraudulent Feature
Frequently in the judicial practice but also in the doctrine there have been difficulties in delimiting the computer offense from the deceiving offense. Often this relationship was interpreted in the sense that it was about two competing offenses affecting different social values - namely those of...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Danubius University
2016-05-01
|
Series: | EIRP Proceedings |
Subjects: | |
Online Access: | http://www.proceedings.univ-danubius.ro/index.php/eirp/article/view/1729/1738 |
Summary: | Frequently in the judicial practice but also in the doctrine there have been difficulties in delimiting
the computer offense from the deceiving offense. Often this relationship was interpreted in the sense that it
was about two competing offenses affecting different social values - namely those of patrimonial type and
those referring to normal operation of information systems. The doctrine observes that with the technological
revolution, the opportunities to commit crimes against patrimony have multiplied. Goods that are represented
or taken from information systems (electronic funds, deposits, etc.) have become targets of manipulation, as
the traditional forms of property. Such offenses usually are done by entering incorrect data into a system
through manipulation programs or other interference during processing. This article aims at incriminating any
act of free handling as in data processing with the intention to operate an illegal transfer of property. Such
offenses are usually achieved by entering incorrect data into a system through manipulation of programs or
other interference during processing data. This article aims at incriminating any act of manipulation without
the right in the data processing with the intention of operating an illegal transfer of property. (Dobrinoiu, et
al., 2012) |
---|---|
ISSN: | 2067-9211 2069-9344 |