2017
DOI: 10.4067/s0718-34372017000100011
|View full text |Cite
|
Sign up to set email alerts
|

El Bien Jurídico Protegido en Los Delitos Informáticos

Abstract: RESUMEN: El trabajo revisa críticamente las tesis que asumen que los delitos informáticos tutelan un bien jurídico específi co, propiamente informático. Sobre esa base, plantea que reconocer un interés de esas características se justifi ca si dichos delitos, además de incidir en el soporte lógico de un sistema informático, implican el uso de redes computacionales. Para defi nir su bien jurídico, el estudio refl exiona sobre las funciones que cumplen los sistemas informáticos para el libre desarrollo de la pers… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 7 publications
(10 reference statements)
0
2
0
1
Order By: Relevance
“…La funcionalidad informática es un presupuesto para la realización de las actividades informáticas y un conjunto de condiciones que posibilitan que los sistemas informáticos lleven a cabo adecuadamente las operaciones de almacenamiento, tratamiento y transferencia de datos. Constituye un bien jurídico instrumental de carácter colectivo, porque lo que se daña es la información del ser humano contenida en el instrumento, por ello es necesario distinguir y clasificar los delitos informáticos en función de la información (Mayer, 2017).…”
Section: Bien Jurídico Protegido Y Clasificaciónunclassified
“…La funcionalidad informática es un presupuesto para la realización de las actividades informáticas y un conjunto de condiciones que posibilitan que los sistemas informáticos lleven a cabo adecuadamente las operaciones de almacenamiento, tratamiento y transferencia de datos. Constituye un bien jurídico instrumental de carácter colectivo, porque lo que se daña es la información del ser humano contenida en el instrumento, por ello es necesario distinguir y clasificar los delitos informáticos en función de la información (Mayer, 2017).…”
Section: Bien Jurídico Protegido Y Clasificaciónunclassified
“…Mayer [6], propose that recognizing an interest of these characteristics is justified if such crimes, in addition to affecting the software of a computer system, involve the use of computer networks. In order to define its juridical good, the study reflects on the functions of computer systems for the free development of the individual and the institutions that are at its service in a democratic State governed by the rule of law [6]. The study examines the functions of computer systems for the free development of the individual and the institutions that are at its service in a democratic State governed by the rule of law.…”
Section: International Backgroundmentioning
confidence: 99%
“…The new information and communication technologies from the twentieth century to the present, has been a tool of great benefits, since it is possible to interculturalize and exchange information achieving socio-economic activities worldwide, thus being closer interaction with other people, however, also have their disadvantages or dangers that generate organizations in computer crime, arising the computer crime or theft crimes, contemplated in Law 1273 of 2009 (Article 2691). Therefore, the criminal treatment is that of qualified theft, enshrined in Article 240 of Law 599 of 2000, which is obtained to a prison sentence of six (6) to fourteen (14) years, according to the circumstances of time, mode and place [1].…”
Section: Introductionmentioning
confidence: 99%
“…In order to define the object of legal protection of cybercrime, Lux L M critically reviewed the hypothesis that cybercrime protects specific computer-related interests in the article (Lux, 2017;Gao, 2017). On this basis, it is pointed out that if these crimes involve the use of computer networks in addition to affecting computer software, then it is reasonable to recognize the benefits of these characteristics.…”
Section: Introductionmentioning
confidence: 99%