完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | 蔡榮耕 | en_US |
dc.contributor.author | Tsai, Rong-geng | en_US |
dc.date.accessioned | 2014-12-19T03:51:14Z | - |
dc.date.available | 2014-12-19T03:51:14Z | - |
dc.date.issued | 2008 | en_US |
dc.identifier.issn | 1811-3095 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/107666 | - |
dc.identifier.uri | http://www.itl.nctu.edu.tw/tlr_n/ch/list5_1.html | en_US |
dc.description.abstract | 刑法第358條並沒有定義什麼是電腦。不過,這應該是正確的作法,因為實務可以因而有較大的彈性,以因應未來的科技發展。即便是要在法條中明文電腦的意義,也應該參考美國聯邦電腦詐欺及濫用防制法(CFAA)的規定,採取較為開放的定義。本文也建議刑法第358條的構成要件行為應修正為「無故入侵」電腦即為已足。至於「無故輸入他人帳號密碼」、「破解使用電腦之保護措施」或「利用電腦系統之漏洞」應屬蛇足的規定。「無故入侵」的解釋,可以參考美國聯邦電腦詐欺及濫用防制法(CFAA)中,關於「無(越)權使用」的規定及相關判決。 | zh_TW |
dc.description.abstract | It is accurate for the legislature not to define what a computer is in article 358 because the absence of the definition makes it flexible for the law enforcement to respond the rapid technology development. The legislature ought to visit CFAA even thought it wants to give a definition. This article suggests that actus reus requirements of the current article 358 are improper. It is unnecessary to narrow down the actus reus requirement to inputting other's account and password, hacking the protecting measure of a computer, and making use of the hole of computer system. The proper actus reus requirement should be accessing a computer without authorization, or exceeding authorized access. When interpreting and applying, we could refer to CFAA and the judicial decisions thereof. | en_US |
dc.subject | 電腦犯罪 | zh_TW |
dc.subject | 入侵電腦 | zh_TW |
dc.subject | 刑法第358條 | zh_TW |
dc.subject | 聯邦電腦詐欺及濫用法 | zh_TW |
dc.subject | 無權使用電腦 | zh_TW |
dc.subject | 越權使用電腦 | zh_TW |
dc.subject | Computer crime | zh_TW |
dc.subject | Intrusion of computer | zh_TW |
dc.subject | Article 358 of criminal law | zh_TW |
dc.subject | The computer fraud and abuse act of 1986 | zh_TW |
dc.subject | Access a computer without authorization | zh_TW |
dc.subject | Or exceeding authorized access | zh_TW |
dc.title | Matrix駭客任務:刑法第358條入侵電腦罪 | zh_TW |
dc.identifier.journal | 科技法學評論 | zh_TW |
dc.citation.volume | 5 | en_US |
dc.citation.issue | 1 | en_US |
dc.citation.spage | 103 | en_US |
dc.citation.epage | 134 | en_US |
dc.contributor.department | 科技法律研究所 | zh_TW |
dc.contributor.department | Institute of Technology Law | en_US |
顯示於類別: | 交大法學評論 |