《電子技術(shù)應(yīng)用》
您所在的位置:首頁(yè) > 其他 > 设计应用 > 流量劫持罪名认定的困境与纾解——基于数据安全法益的视角
流量劫持罪名认定的困境与纾解——基于数据安全法益的视角
网络安全与数据治理
许瀚文
甘肃政法大学涉外法治学院
摘要: 流量劫持不仅会因破坏市场竞争秩序被反不正当竞争法规制,还有可能因参与网络黑灰产业犯罪而落入刑法范畴。基于行为复杂与主体多元的特性,流量劫持的罪名认定存在计算机犯罪与财产犯罪两种典型观点,其背后反映出虚拟财产法益、网络秩序法益与系统安全法益的取舍。基于流量劫持行为过程和应用场景的考量,其本质应为对计算机信息系统或应用程序的数据通信行为加以非法控制,侵害了数据安全法益。破坏计算机信息系统罪所保护的数据安全法益,与流量劫持的侵害法益趋同,具有适用的可行性与必要性;同时需要对数据、应用程序、干扰等入罪要件进行刑法教义学释义。
中圖分類(lèi)號(hào):D922文獻(xiàn)標(biāo)識(shí)碼:ADOI:10.19358/j.issn.2097-1788.2024.03.008
引用格式:許瀚文.流量劫持罪名認(rèn)定的困境與紓解[J].網(wǎng)絡(luò)安全與數(shù)據(jù)治理,2024,43(3):49-54.
The dilemma and relief of traffic hijacking offense determination ——Based on the perspective of the legal benefits of data security
Xu Hanwen
School of Foreign Affairs and Law,Gansu University of Political Science and Law
Abstract: Traffic hijacking is not only regulated by the anti unfair competition law for destroying the order of market competition, but also may fall into the scope of criminal law for participating in the crime of network black ash industry. Based on the complexity of the behavior and the characteristics of multiple subjects, there are two typical views on the determination of the crime of traffic hijacking, namely, computer crime and property crime, which reflect the trade offs between the legal benefits of virtual asset, the legal benefits of online order and the legal benefits of system safety.Based on the consideration of the behavioral process and applications of traffic hijacking, its essence shall be to unlawfully control the behavior of application program or data communication of the computerized information system, which infringes on the legal interests of data security. The legal interests of data security protected by the crime of damaging computer information systems are convergent with those infringed upon by traffic hijacking, and the application is feasible and necessary,at the same time, it is necessary to carry out a jurisprudential interpretation of the elements of incrimination, such as data, application programs and interference.
Key words : traffic hijacking; data security; system security; interference; application program

引言

隨著互聯(lián)網(wǎng)的普及和數(shù)字化進(jìn)程的加速,流量劫持所造成的社會(huì)危害性日益凸顯,成為網(wǎng)絡(luò)安全領(lǐng)域的重要議題。數(shù)字經(jīng)濟(jì)下的流量與收益直接掛鉤,一旦本屬于某些經(jīng)營(yíng)者的流量被惡意轉(zhuǎn)移,其盈利能力必將大幅削弱;而且流量劫持人為設(shè)置消費(fèi)者與網(wǎng)絡(luò)平臺(tái)直接聯(lián)系的障礙,使得消費(fèi)者自愿或者被迫放棄目標(biāo)搜索頁(yè)面,進(jìn)而提高了搜索信息的成本。正因如此,流量劫持行為出現(xiàn)之初,因其違反了公平競(jìng)爭(zhēng)的原則,主要由《中華人民共和國(guó)反不正當(dāng)競(jìng)爭(zhēng)法》進(jìn)行規(guī)制。然而,流量劫持嚴(yán)重?fù)p害公民個(gè)人信息安全、財(cái)產(chǎn)安全和社會(huì)秩序,因此具有刑法規(guī)制的必要性。2015年,上海市浦東新區(qū)人民法院對(duì)付宣豪、黃子超破壞計(jì)算機(jī)信息系統(tǒng)案作出入刑的判決以來(lái),流量劫持的刑法定性與量刑規(guī)則引起了刑法學(xué)界和實(shí)務(wù)部門(mén)的關(guān)注?;诖?,本文從數(shù)據(jù)安全法益的視角出發(fā),對(duì)流量劫持的罪名認(rèn)定進(jìn)行深入研究,通過(guò)對(duì)流量劫持的行為解構(gòu)和類(lèi)型化進(jìn)行詳細(xì)闡述,立足對(duì)相關(guān)罪名的檢視和法益溯因分析,提出數(shù)據(jù)安全法益視角下流量劫持罪名的紓困路徑,以期對(duì)流量劫持的刑法定性與規(guī)制有所裨益。


本文詳細(xì)內(nèi)容請(qǐng)下載:

http://ihrv.cn/resource/share/2000005934


作者信息:

許瀚文

甘肅政法大學(xué)涉外法治學(xué)院,甘肅蘭州730070


雜志訂閱.jpg

此內(nèi)容為AET網(wǎng)站原創(chuàng),未經(jīng)授權(quán)禁止轉(zhuǎn)載。

相關(guān)內(nèi)容