网络空间中犯罪帮助行为的类型化——来自司法判决的启发

邓矜婷

网络空间中犯罪帮助行为的类型化——来自司法判决的启发

Categorization of Cybercrime Aiding Activities


    期刊名称:《法学研究》
    期刊年份:
    作者:邓矜婷
    单位:中国人民大学刑事法律科学研究中心、中国人民大学未来法治研究院。
    中文关键词:网络帮助行为;提供侵入、非法控制计算机信息系统的程序、工具罪;帮助信息网络犯罪活动罪;明知
    英文关键词:providing aid for the commission of cybercrimes, providing programs or tools for the commission of the crime of hacking into or illegally controlling a computer information system, providing aid for commission of information network crime, mens rea
    中文摘要:
    提供侵入、非法控制计算机信息系统的程序、工具罪和帮助信息网络犯罪活动罪项下公开的一审判决书显示,实践中对下游犯罪、“明知”的把握缺乏明确标准,并且对帮助行为本身较为关注。网络空间中犯罪帮助行为应依其危害性和独立性进行分类,确立不同的入罪标准。对下游犯罪实行行为的促进作用程度与网络帮助行为的危害性、独立性直接相关,据此可将网络帮助行为分为三类:对下游犯罪实行行为有极大促进作用类;对下游犯罪实行行为有部分促进作用类;帮助下游犯罪前后期类。第一类对应提供专门用于侵入、非法控制计算机信息系统的程序、工具犯罪,第二类对应明知他人实施侵入、非法控制计算机信息系统的违法犯罪行为而为其提供程序、工具犯罪,第三类对应帮助信息网络犯罪活动罪。对于第一类,可以独立评价帮助行为的危害性;对于第二类、第三类,仍要求对帮助下游犯罪应具备“明知”要素以及应查实下游犯罪的不法性。
    英文摘要:
    Analysis of written judgments indicates that, in judicial practice relating to cybercrime aiding activities, attention has been focused on the chaotic standards on the aided crimes and the mens rea of the act of aiding the crime, as well as the actus reus of the aiders. Acts of providing aid for cybercrimes can be categorized according to such criteria as their harmfulness and independency, and convicted according to corresponding standards. The completion degree of the actus reus of the aided cybercrimes is directly related to the harmfulness and independency of the aiding activities. According to the completion degree, acts of providing aid for cybercrimes can be categorized into three types: aiding substantial part of the actus reus of cybercrimes; aiding some part of the actus reus; and aiding in the preparation for the crime or at the late stage of the crime. The first type corresponds to the act of providing programs or tools for the commission of the crime of hacking into or illegally controlling a computer information system. The second type corresponds to the act of knowingly providing programs or tools to a person who is about to commit the crime of hacking into or illegally controlling a computer information system. The third type corresponds to the act of providing aid for the commission of information network crime. The above relations of correspondence are supported by textual interpretation, legislative and judicial intentions, characteristics of cyber programs, and the harmfulness of the aiding activities. The first type can independently evaluate the harmfulness of the crime, while the second and the third types require the ascertainment of the act of knowingly aiding a crime and the illegality of the aided crimes. The act of providing aid for large number of activities that have only small harms individually or cannot be convicted as a crime can be evaluated as the second or the third type.
    全文阅读:  点击下载

相关文章!
  • 中国数据跨境调取路径探析——以

    特定情况下的数据跨境调取需要在传统的司法互助协定方式基础上补充其他路径。中国在坚持以双边司法互助协定和互惠原则为主要方式的基

  • 折中主义与理想主义之辩——评西

    美国西蒙尼德斯教授在新著的《全球冲突法立法:国际比较研究》一书中,提出晚近国际私法背离了萨维尼理论所追求的理想主义,呈现折中主义

  • 离岸信托避税规制的域外经验及

    作为信托的类型之一,离岸信托是指根据外国法律设立的信托。在信托本身固有的灵活机制之上,离岸信托充分利用了离岸管辖区的税收优势,成