前言
PREFACE
LIST OF FIGURES
LIST OF TABLES
TABLE OF CASES
ABBREVIATIONS
CHAPTER 1INTRODUCTION
11Social context of cybersecurity and cybercrime
12Structure of this book
CHAPTER 2DECIPHERING THE PHENOMENONOF CYBERCRIME
21Introduction
22Development of definition of computer crime
23Analysis of the previous shortcomings in defining
cybercrime
24How to define cybercrime?
25Reading of the cyber label of criminal phenomenon
26The necessity of a broad definition of cybercrime
27A definition based on roles of information systems
CHAPTER 3CLASSIFICATION OF CYBERCRIME
31What roles can information systems play in cybercrime?
32Comparison with other conceptions
33Conclusion
CHAPTER 4SUBJECTS AND SUBJECTIVEASPECTS OF CYBERCRIME
41Introduction
42Whats special with cybercriminals?
43The perceived context of the perpetrators
44Forms of organization
45Age and cybercrime
46Psychological features of cybercrime
47What motivates a cybercrime?
48Conclusion
CHAPTER 5RECOGNIZING CRITICAL FACTORSIN COMBATING CYBERCRIME
51Introduction
52Victimization in cybercrime
53Time in cybercrime
54Space in cybercrime
55The technological nature
56The complexity of cybercrime
57The costs of cybercrime
58The anonymity of the perpetrators
59Hidden victims
510The concealment of cybercrime traces
511The transterritoriality of cybercrime coverage
512The rampancy of cybercriminal phenomena
513Rentseeking from the exaggeration of insecurity
514Conclusions
CHAPTER 6THE HISTORICAL DEVELOPMENT OFCYBERCRIME AND DETERRENCE
61Basic observations on the development of criminalphenomena
62Computer hackers discovery of a lawless new frontier
63The rise of the law against the increasing number ofcybercrimes
64A legal system wrestling with networked adversaries
65The equilibrium between cybercrime and deterrence
66Conclusion
CHAPTER 7LIABILITY FOR CYBERCRIME
71Introduction
72Criminal liability, civil liability and administrative liability
73Individual liability and corporate liability
74Liability based on law and liability based on contract
75Intentional liability, negligent liability and reckless liability
76Direct liability and indirect liability
77Trespassers liability, third parties liability, and victimsliability
78Domestic liability, transnational liability, and internationalliability
79Offensive liability and defensive liability
710Punitive liability, exemplary liability and compensatoryliability
711Conclusion
CHAPTER 8CYBERJURISDICTION
81Introduction
82The legal basis for cybercriminal jurisdiction
83Separate or international jurisdiction?
84The specific space the determination of the location ofconduct
85The specific player the determination of the location of theperson
86Liabilitybased cybercriminal jurisdiction
87Critical factors in cybercriminal jurisdiction
88Conclusion
CHAPTER 9INTERNATIONAL ACTIONSAGAINST CRIMINALITY
91Introduction
92From domestic legislation to international harmonization
93Professional efforts of the International Criminal PoliceOrganization Interpol
94Regional efforts
95Multinational efforts
96Global efforts by the United Nations UN
97The focuses of international harmonization
98From conversation to the European Convention
99Limited progress in international harmonization
910Conclusion
CHAPTER 10CONCLUSIONS
101Dilemmas of cybercrime control
102The primary factors benefiting cybercrime
103The primary factors preventing cybercrime
REFERENCES
內容試閱:
技术革新、全球化和城市化使得犯罪分子和恐怖分子能够带来撼动全球市场安全的新威胁。信息通信技术的发展创造了优势、便利和效率,同时也带来了劣势、挑战和威胁。立法从来不能及时有效地处理因技术而生的社会问题。长期以来,对于信息系统的潜在的滥用难以控制,而网络犯罪对于信息社会的发展产生了深刻地负面影响。近些年来,由于技术的进步、潜在犯罪收益增长以及侦查和惩罚概率低迷,网络犯罪的危险日渐增加。
本书探讨了信息技术发展对于传统社会控制机制树立的挑战。书中提出一个广义的定义方法,认定了网络犯罪的特点及其对于侦查概率和威慑效果的负面影响。可以发现,现行有关网络犯罪的法律框架在打击网络犯罪中收效甚微。本书的关键在于,为使信息社会得到保护,法律威慑取得实效,国家之间、传统空间与网络空间之间的法律与管辖的鸿沟必须去除,这样才能追究犯罪主体的刑事责任。
本书为读者提供一份网络犯罪的现象学论述。读者会发现本书在理论上具有独创性、趣味性和实用性。本书可以作为有关网络犯罪高级课程的教科书或者相关研究的参考书。
本书第一章导论部分介绍了网络安全和网络犯罪的社会背景。第二章和第三章聚焦于网络犯罪的现象学和类型学。本书提出一个统一的广义定义,以便取得高度的国际共识。此外,作为对以前分类方法的发展,第三章根据信息系统在犯罪中的作用把网络犯罪分为七种类型,分别是信息系统被用作媒体、目标、工具、路径、地点、手段的犯罪和信息系统用于准备其他犯罪的网络犯罪。
第四章归纳网络犯罪人的特点和动机。随着网络用户和信息关联活动的增长,潜在的网络犯罪人获得更多的机会,出于不同的动机,发动不同规模的攻击。本章认定二十多种动机类型。传统犯罪向网络空间迁徙的可能性已经警示执法当局既要打击现存网络犯罪,也要积极预备应对新兴的威胁。
第五章分析网络犯罪的主要特征,特别是参考对其侦查与威慑的难度。本章主要考察犯罪行为人的特点、主观的情形、典型的被害人、时间与空间、技术的牵涉、复杂性、成本与损失、侦破与调查、管辖权的冲突以及网络犯罪现象的猖獗性。
第六章回顾网络犯罪与法律对策的历史发展。本章将发展过程分为四个阶段,表明网络犯罪现象几乎与信息通信系统的发展同步进行。网络犯罪处于加速发展阶段,正在逐渐常规化,并且电子分裂导致网络犯罪分裂。基本结论是犯罪资源决定犯罪数量,而司法资源决定威慑程度。当犯罪资源与司法资源在长期过程中达成平衡时,犯罪现象将在一个平衡点达到饱和。
第七章研究网络犯罪责任的不同形式。犯罪的制裁具有必要性,但是现在与未来的条件都不具有充分性。民事救济可以补充刑事制裁。本章分析基于不同主体、法律基础、行为人的心理状态的责任、诸种责任的功能等。本章认为广泛覆盖的责任机制为打击犯罪所必需。
第八章聚焦于网络犯罪管辖权的主题。由于网络犯罪人的广泛分布和司法共识的缺乏,网络管辖权成为立法与司法必须解决的问题。有必要创设行之有效的规则,连接地区、国家与国际边界。本章审视刑事管辖权的传统基础与重建刑事管辖权的若干新兴理论。本章提出基于责任的管辖权观点与网络犯罪管辖权的若干焦点。
第九章审视打击网络犯罪的国际刑法倡议。本章将国际协调行动分为专业的、地区的、多国的与全球的行动,概述了这些行动主要关注的问题,评估了《网络犯罪公约》在国内与国际法律层面的影响。本章也指出以往行动的局限性,预期联合国发挥更重要的作用。
最后,第十章归纳全书,强调网络犯罪与传统犯罪的区别,因此对法律体系提出挑战,而刑法在打击网络犯罪中起着必备但有限的作用。随着网络犯罪现象的常规化,刑法改革会随之减缓。总体上,应从脆弱性与动机的影响中找到解决方案。脆弱性应以技术手段消除,而动机则应以法律工具消除。
Technological innovation, globalization, and urbanization have facilitated criminals and terrorists to pose a fresh wave of hazards that can shake the security establishment of global markets.The development of information and communications technology ICT creates not only advantages, convenience and efficiency, but also disadvantages, challenges and threatsLegislation is typically neither prompt nor sufficient enough to deal with technologyoriented social problems.The potential for abuse of information systems has long been uncontrollable, and cybercrime has a deeply negative influence on the development of an information society.The risks of cybercrime have grown in recent years caused by technological advances, the growth in potential gains from committing cybercrime, and the lower probability of detection and punishment.The book explores the conceived challenges created by the development of an information technology confronting the traditional socialcontrol system.It proposes a definition in a broad sense, in which it identifies characteristics of cybercrime and their negative influence on the probability of detection and effectiveness of deterrence.Current legal frameworks on cybercrime, are found ineffective in combating cybercrime.The key understanding of this book is that, in order for the information society to be protected and the effectiveness of legal deterrence to be guaranteed, it is imperative to eliminate the legal and jurisdictional gaps among countries, and between meatspace and cyberspace so as to hold the criminal subjects liable.This book is to provide readers with a phenomenological description of cybercrime.Readers will find this new publication theoretically original, interesting and useful.It can also be used as a textbook for courses on or a reference for research in cybercrime.