透過您的圖書館登入
IP:18.118.1.232
  • 學位論文

電腦網路侵權行為探討-以妨礙電腦使用罪為例

On Computer Network Torts-Taking the Crime of Obstructing Computer Use

指導教授 : 黃承啟

摘要


「駭客,一詞在今日通常被泛稱為竊取資料或破壞電腦系統的犯罪者。事實上最早的駭客是指一個追求電腦技術的精進並無私分享各種網路資源的社群,然而因為尋求網路空間解放的目標與政府或企業建立權威的需求產生衝突,結局是網路空間逐漸受到控制,駭客族群被打壓,電腦犯罪的制定以及重刑化潮流的背後,正是這種現象所造成的結果。刑法第358條處罰的是人侵電腦行為,與世界各國對於人侵電腦行為的規範相比較,除了有 無故」「輪人他人帳號碼」、「破解使用電腦之保護措施,與「利用電腦系統之漏洞」 幾種要件之外,在主觀或吝觀要件都略顯不足,使犯罪成立之認定不易,更有可能處罰到未造成損害的輕微行為。輕微行為。 關於侵電腦罪之保護法益,基於以下理由:偏高的法定刑、網路空間強調溝通互動的特性、資訊社會高度仰賴電腦網路系統等等,本文認為保護法益應當是對於控制電腦使用權限機制正常運作的社會信賴,屬於社會法益,當人侵行為的強度足以動搖這種信賴,才有處罰正當性。從犯罪性質來看,入侵電腦罪是種抽象危險犯,僅以人侵行為作為要件,而不要求發生損害結果,為了限縮這種前置化的刑罰規範,行為人需具備後續犯罪的主觀故意與該行為能致生損害於公眾或他人,藉此使偏高的法定刑與前置化處罰較為可接受。 入侵電腦行為真正適合以抽象危險犯規制的情形,應當是存在於被人侵的電腦是特別值得被保護的電腦,此類電腦中儲存大量不特定多數人的重要資訊,或是必須仰賴這類電腦系統才能完成與大眾利益相關的工作,因此本文提出的立法建議是,將行為客體限縮在公務機關與金融機構專用電腦。

並列摘要


The term "hacker" is usually called the criminals to steal information or damagethe computer systems nowadays.At the beginning, the hackers just promoted the computer technology and shared the network resource. The hackers were suppressed when the governments and the corporates controlled cyberspace. The above-mentioned phenomena brought about the legislation of computer crimes. The crime of computer intrusion is punished under the article 358 of the criminal code. Compared with the legislation of other countries, the subjective and objective elements of the article 358 of the criminal code are not enough to identify the constitution of crime. Based on the importance of computer systems in information society, the author holds that the legal interest of the crime of computer intrusion is to protect the trust in the functional mechanism of the permission to use the computer systems. This crime belongs to an offense of abstract danger because the prerequisite is only the criminal behavior of intrusion. .In addition, the legitimacy about the legislation in the form of the offense of abstract danger only exists in the situation that the computer system is especially required to protect. Finally, the author suggests that increasing the prerequisite "the computer exclusively for the use of a financial institution or the government" for the article 358 of the criminal code.

並列關鍵字

Hacker Cyberspace Computer Crime Hacking Computer

參考文獻


參考文獻
一、 中文文獻
(一)、專書
1. 甘添貴,體系刑法各論,修訂再版,2004年2月。
2. 林山田,刑法總論,增訂十版,2004年1月。

延伸閱讀