设置非法利用信息网络罪的部分前置预防行为,以此应对网络风险社会的虚拟性、技术超越性以及秩序的涉众性,是网络信息时代的背景所需。非法利用信息网络罪不应全盘定性为预备行为正犯化,从刑法规范的精确用语角度分析,利用信息网络犯罪的行为形态存在着“预备行为正犯化”以及“纯粹的实行行为”的二元定性标准。在利用信息网络犯罪行为形态二元论的基本指引下,设立的“网站”应当包括“三网融合”下的空间类型;发布的“信息”评价应当从“时间、性质、类型”的多元维度予以规范诠释。
利用信息网络犯罪行为二元形态的教义解读
摘要
参考文献
1 Graif C, Lungeanu A I, Yetter A M. Neighborhood isolation in Chicago: Violent crime effects on structural isolation and homophily in inter-neighborhood commuting networks[J]. Social Networks, 2017, 51: 40–59. DOI:10.1016/j.socnet.2017.01.007
2 Hadji-Janev M. Toward effective national cyber security strategy: The path forward for Macedonia[A]. Vaseashta A, Susmann P, Braman E. Cyber Security and Resiliency Policy Framework[M]. IOS Press, 2014: 57–64.
4 Helfgott J B. Criminal behavior and the copycat effect: Literature review and theoretical framework for empirical investigation[J]. Aggression and Violent Behavior, 2015, 22: 46–64. DOI:10.1016/j.avb.2015.02.002
5 Kouziokas G N. The application of artificial intelligence in public administration for forecasting high crime risk transportation areas in urban environment[J]. Transportation Research Procedia, 2017, 24: 467–473. DOI:10.1016/j.trpro.2017.05.083
6 Kouziokas G N. The application of artificial intelligence in public administration for forecasting high crime risk transportation areas in urban environment[J]. Transportation Research Procedia, 2017, 24: 467–473. DOI:10.1016/j.trpro.2017.05.083
8 Pettersson T. Ethnicity and violent crime: The ethnic structure of networks of youths suspected of violent offences in Stockholm[J]. Journal of Scandinavian Studies in Criminology and Crime Prevention, 2003, 4(2): 143–161. DOI:10.1080/14043850310021567
10 Summers L, Johnson S D. Does the configuration of the street network influence where outdoor serious violence takes place? Using space syntax to test crime pattern theory[J]. Journal of Quantitative Criminology, 2017, 33(2): 397–420. DOI:10.1007/s10940-016-9306-9
11 Yang C C, Li K W. An associate constraint network approach to extract multi-lingual information for crime analysis[J]. Decision Support Systems, 2007, 43(4): 1348–1361. DOI:10.1016/j.dss.2006.04.011
引用本文
陈伟, 熊波. 利用信息网络犯罪行为二元形态的教义解读[J]. 上海财经大学学报, 2018, 20(2): 125-138.
导出参考文献,格式为:
上一篇:强制分红政策、融资约束与投资效率