| 注册
首页|期刊导航|网络安全与数据治理|"流量劫持"行为民刑法律责任界分机制研究

"流量劫持"行为民刑法律责任界分机制研究

刘洋 刘舒婷

网络安全与数据治理2025,Vol.44Issue(3):89-95,102,8.
网络安全与数据治理2025,Vol.44Issue(3):89-95,102,8.DOI:10.19358/j.issn.2097-1788.2025.03.015

"流量劫持"行为民刑法律责任界分机制研究

Research on the civil and criminal liability boundary mechanism of"traffic hijacking"

刘洋 1刘舒婷2

作者信息

  • 1. 东南大学 法学院,江苏 南京 210000
  • 2. 广东省阳春市人民检察院,广东 阳春 529600
  • 折叠

摘要

Abstract

Through the study of the criminal cases of"traffic hijacking"in China,it can be found that there are problems of"difficult crime selection,wrong behavior identification and unclear distinction between civil and criminal"in the current judicial practice.Based on the consideration that the current academic circle has not reached a consensus on the treatment of"traffic hi-jacking"behavior in theory,it is urgent to rely on the typed thinking to rethink the"traffic hijacking"behavior from the dimen-sions of definition,type and essence.At the level of responsibility,"the seriousness of the damage consequences of computer sys-tem security"should be taken as the boundary of"traffic hijacking"under the guidance of the principle of the unity of law and or-der.Firstly,the crime of damaging computer information systems should be used to pursue criminal liability for domain name hi-jacking;the crime of illegally controlling computer information systems should be used to pursue criminal liability for link hijac-king and other traffic hijacking acts that do not reach the level of"damage."When the above two charges cannot fully cover all criminal acts,the charges of"providing programs or tools for intruding into or illegally controlling computer information systems"and"assisting in criminal activities on information networks"should be reasonable applied as supplementary charges.Secondly,there are still many"traffic hijacking"behaviors in judicial practice,although they have broad"destruction",but do not reach the degree of"illegal control of others'computer information system",which should be treated as civil anti-unfair competition cases.Finally,the user's consent is the legal basis for determining the legality of hijacking behavior.

关键词

"流量劫持"行为/民刑责任界分机制/法秩序统一性原理

Key words

"traffic hijacking"behavior/civil and criminal liability boundary mechanism/unity principle of law order

分类

社会科学

引用本文复制引用

刘洋,刘舒婷.."流量劫持"行为民刑法律责任界分机制研究[J].网络安全与数据治理,2025,44(3):89-95,102,8.

基金项目

最高人民检察院检察应用理论研究课题(41) (41)

2024年度广东省人民检察院民事检察研究基地课题(GDMSJCJD202402) (GDMSJCJD202402)

2024年山东省社科规划研究一般项目(24CFXJ13) (24CFXJ13)

2024年烟台市哲学社会科学规划专项课题(2024-LLCX-023) (2024-LLCX-023)

烟台大学2024年研究生科技创新基金项目(GGIFYTU2405). (GGIFYTU2405)

网络安全与数据治理

2097-1788

访问量0
|
下载量0
段落导航相关论文