检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:梁远高 邢远 LIANG Yuangao;XING Yuan(Law School,Shenzhen University,Shenzhen,Guangdong 518060,China)
出 处:《山东科技大学学报(社会科学版)》2024年第2期34-44,共11页Journal of Shandong University of Science and Technology(Social Sciences)
基 金:广东省教育厅普通高校青年创新人才项目(2023WQNCX059);深圳市教育科学“十四五”规划2023年度课题人工智能专项(rgzn23022)。
摘 要:互联网领域不兼容行为是指网络平台无法与其他网络产品或服务接入、共同运行的情况,其典型类型可分为软件冲突或互斥、分享上的不兼容、数据访问上的不兼容。规制互联网领域不兼容行为面临的最大难题是对不兼容行为中“恶意”的认定。对“恶意”的认定体现为一种客观化的过程,其认定逻辑是由客观证据来反推行为人主观上存在恶意。在具体情形上,可分为行为结果和行为表现两个层面。当不兼容行为给特定经营者带来“显著损害”或是对消费者利益等社会公共利益造成较大损害时,可以推定行为人主观上存在“恶意”;当不兼容行为存在针对性、超过必要限度、背离经营者正常经营目的等特征时,亦可以推定行为人主观上存在“恶意”。当然,行为人可以提出反证以证明其主观上不存在“恶意”。常见的不构成不兼容的抗辩理由包括不兼容行为符合技术中立原则、符合行业惯例、为了维护合法利益及在合理时间内消除。Incompatible behaviors in the Internet field refer to the situation in which the network platform fails to access to or run together with other network products or services.Typically,incompatible behaviors can be divided into software incompatibility or mutual exclusion,incompatible behaviors in sharing,and incompatible behaviors in data access.The biggest challenge to regulate incompatible behaviors in the Internet field is the identification of“malicious intent”in incompatible behaviors.The identification of“malicious intent”is an objective process,and its logic is to deduce,based on objective evidence,whether the actor has“malicious intent”subjectively.In the specific situation,it can be divided into two levels:behavior result and behavior performance.When incompatible behaviors bring“significant damage”to a particular operator or cause great damage to consumer interests,it can be presumed that the actor subjectively has“malicious intent”.When the incompatible behaviors are targeted,exceeding the necessary limit,or deviating from the normal business purpose,it can also be presumed that the actor subjectively has“malicious intent”.Of course,the actor can present counterevidence to prove that there is no subjective“malicious intent”.Common defenses that do not constitute incompatible behaviors include compliance with technology neutrality,compliance with industry practices,the preservation of legitimate interests,and elimination of effects within a reasonable time.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.49