检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李晓明[1] Li Xiaoming
机构地区:[1]苏州大学王健法学院
出 处:《中国法学》2023年第5期49-68,共20页China Legal Science
基 金:2020年度国家社科基金重大项目“网络时代的社会治理与刑法体系的理论创新”(项目批准号:20&ZD199)的阶段性成果。
摘 要:信息网络犯罪依据犯罪形态分为破坏信息网络安全的技术型犯罪、利用信息网络实施的传统犯罪及违反网络空间管理义务的犯罪,犯罪类型及特征不同,治理的侧重点也不同。我国刑法典一元模式难以适应网络时代发展,易造成网络犯罪的法网疏漏、刑罚结构的重刑化及刑法与前置法的衔接不畅。而三元立法模式能体现刑法规范体系维护价值的层次性与序位性,在适应犯罪类型化趋势及治理诉求差异上具有优势。其建构重点在于明确刑法典、单行刑法、附属刑法各自的立法原则,根据模式特点选择犯罪类型。其中,利用信息网络实施的传统犯罪以刑法典为主体,以单行刑法、附属刑法为补充;破坏信息网络安全的技术型犯罪以单行刑法为主体;违反网络空间管理义务的犯罪以附属刑法为主体。由此形成专门化、具有针对性和有效性的刑法科学体系,以适应网络时代治理犯罪之需。Based on the different forms of information network crime,cybercrime is divided into three types:the technical crime of destroying information network security,the traditional crime of using information network and the crime of violating management obligations in cyberspace.Different types and characteristics of crime have different focus on governance.The unitary model of China's criminal code is difficult to adapt to the development of the Internet era,which can easily lead to the omission of the legal network of cybercrime,the heavy punishment of the penalty structure and the poor connection between the criminal law and the pre-law.The three-dimensional legislative model of the coexistence reflects the hierarchy and order of the maintenance value of the criminal law system.In particular,it has advantages in adapting to the typology of cyber crimes and differences in governance demands.The top priority of its construction is to clarify the legislative principles of the criminal code,the separate criminal law and the subsidiary criminal law,and select the type of crime according to the characteristics of each legislative model.Among them,traditional crimes committed through information networks are subject to the criminal code,supplemented by separate criminal law and subsidiary criminal law;Technical-based crimes that undermine the security of information networks are subject to separate criminal law;Crimes that violate cyberspace management obligations are subject to subsidiary criminal law.As a result,a specialized,targeted and effective scientific system of criminal law has been formed to meet the needs of crime governance in the Internet era.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15