Font Size: a A A

Research On The Accomplished Offense Criterion Of Network Theft

Posted on:2019-07-31Degree:MasterType:Thesis
Country:ChinaCandidate:X BaiFull Text:PDF
GTID:2346330569989460Subject:Law
Abstract/Summary:PDF Full Text Request
Network theft,as the name suggests,can be understood as the theft that occurs in cyberspace and uses various network technical means.Network theft is a networked form of traditional theft crimes,and its essence is no different from traditional theft crimes.However,many features of the network itself,such as proliferation,scalability,virtuality,information,and reproducibility,are It is determined that network theft is more difficult to regulate than ordinary theft.After the occurrence of the case,it often brings challenges to the investigation and collection of evidence by the investigating authorities.In this context,how to understand the crimes of network theft and how to determine the standards of network theft crimes will provide more help for further cracking down on Network theft crimes in practice.Whether or not theft constitutes a crime and whether it meets existing standards should follow the corresponding criteria for identification.The forms of traditional theft crimes are various.The theory of the identification of its own flaws has become very complicated.Network theft crimes are a special form of theft crimes.The determination of not being guilty should also follow the path of determination of the theft crime when it is determined that it has not yet been defamed.Regarding the theory that traditional theft is neither a standard nor a standard,the academic circles have always been controversial.The controversial views are generally related to the concept of contact,concealment,transfer,loss,out of control,control,and loss of control plus control.These types of doctrines address traditional theft.It is worthy of study and discussion whether it is not determined to apply,and how to apply it to cybercrime crimes.This paper analyzes the basic problems,theories of identification,and specific types of network theft,and then combines the specific forms of network theft in practice,and proposes that the theft of the network is not flawed and the legal application of recommendations.The article mainly discusses the following issues:First,the author initially proposes to investigate the necessity of network theft without defamation to the standard through two practical cases;Second,analyze the conceptof network theft by studying the concept of traditional theft,compare the network The crime of theft is different from the characteristics of traditional theft crimes and describes the types of network theft cases that are common in practice in the context of the case in the text.Third,it recognizes that network theft is a kind of theft crime and its essence is the same as that of traditional crimes.Therefore,From the perspective of traditional theft,it analyzes the theoretical viewpoints of the existing standards,and then proposes and analyzes the applicable standards that the author considers reasonable.Fourthly,the combination of traditional theft theories and theories that are not yet unfounded is not a standard for theft of cybercrime.The identification of the company was analyzed,and the criteria for identification that did not apply to network theft were discussed and the criteria and applicable recommendations that the author considered to be applicable were proposed.Fifth,the problems of the two cases mentioned in this paper were analyzed and proposed.The theft of electronic money and the theft of virtual property have not been flawed.Identified related issues recommendations.
Keywords/Search Tags:Internet Theft, Traditional Theft, Endangered, Attempted, Out of Control
PDF Full Text Request
Related items