首页 | 本学科首页   官方微博 | 高级检索  
     检索      

从现实到虚拟:计算机侵入禁止规范的构成及适用——兼论计算机同意
引用本文:杨春然.从现实到虚拟:计算机侵入禁止规范的构成及适用——兼论计算机同意[J].法学论坛,2021,36(1):138-152.
作者姓名:杨春然
作者单位:中国石油大学文法学院,山东青岛266580
基金项目:中国石油大学(华东)法律冲突与协调研究基地资助。
摘    要:计算机侵入禁止源自于传统的侵入禁止规范。在大数据、云计算、cookies技术的背景下,该罪构成要件要素的"访问",应采最广义的发送信息说,主要应由"未经授权"限制该禁止规范。由于互联网协议已明确规定网络具有开放性,所以,计算机同意通常等同于机主同意。当计算机不使用公共域名或者使用第三方软件为用户访问设置了现实障碍时,被告人使用第三方软件或者规避认证制度而进行的访问,会被视为是事实欺诈,计算机同意因有别于机主同意而无效,行为构成未经授权的访问。越权访问实际上是违约行为,即使其构成欺诈,但由于计算机产生认识错误的对象通常并非是访问行为本身,而是其回报或者意义,所以,被害人同意仍然有效。这也是刑法原则上不干预违约行为的规范原因。然而,当违约行为违反预期功能、义务冲突和合理预期等标准,而动摇了同意的基础时,则会使其由诱因欺诈变成事实欺诈,被害人同意无效,行为通常会构成犯罪。

关 键 词:未经授权访问  越权访问  侵入禁止规范  事实欺诈  诱因欺诈

From Real to virtual:the Application and Limitation of Intrusion Norms to Computertrespass On the Computer Consenting
YANG Chunran.From Real to virtual:the Application and Limitation of Intrusion Norms to Computertrespass On the Computer Consenting[J].Legal Forum,2021,36(1):138-152.
Authors:YANG Chunran
Institution:(China University of Petroeum,Qingdao Shandong 266580,China)
Abstract:The crime of legal intrusion of computers is that the fact that the traditional intrusion norms protect the computers.In the big data,cloud computing and cookies technologies,as the parts of the crime,access should be adopted the broadest interpretation,and the crime be limited with the part of unauthorized.However,due to the fact that the internet is public site according to the internet protocol,anyone should access the information that has published on the website,from which it is inferred the computer consenting to it.Nonetheless,the computer can set up the real obstacles,namely the authentication requirement,to deny the public of website.If the access that dodged the requirement should regard as the fraud in the factum,it is the crime because of avoiding the victim’s consenting.In contrast,exceeding authorized access constituted as the fraud in the inducement,which has the victim’s consent and cannot violate the norms of computer trespass.
Keywords:unauthorized access  exceeding authorized access  norms of trespass  fraud in the factum  fraud in the inducement
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号