| Fraud has been a common behavior in people’s daily life since ancient times.With the continuous development of technology,the rise and popularity of telecommunications networks,fraudulent behaviors are constantly updated,making it more and more difficult to prevent.Especially in recent years,telecommunications network fraud crime has become a new type of crime that uses communication network technology to commit fraud.Its characteristics not only make the people who commit this crime rush,but also plunge the victims of this crime into a quagmire,causing serious harm to the society.Although the "two highs and one department" have successively issued relevant opinions and regulations,the terminal control model in traditional governance has encountered numerous constraints when faced with this crime,and it is urgent to introduce new governance concepts to prevent it.Therefore,this article is based on crime victimology,an emerging branch of criminology,and analyzes specific cases to solve the problem of insufficient victim prevention in this crime.In addition to the introduction,this article is divided into three chapters.The first chapter is "Description of Victims of Telecommunications Network Fraud Crimes".This chapter first provides a conceptual explanation of "victims of telecommunications network fraud crimes".The characteristics of victims under this crime are summarized in terms of quantity,gender,age,occupation,victimization,adverse reactions,loss status,etc.,and the types of victims with a higher frequency of occurrence are summarized.The second chapter is "Analysis of the Reasons for Victims of the Crime of Telecommunications Network Fraud".On the basis of the previous chapter,we further analyze the reasons for the victims of this crime from both static and dynamic levels.At the static level,it is divided into subjective factors and external factors.The subjective factors include the victim’s cognitive bias,the victim’s easy-to-use psychological state,and the victim’s bad living habits.The external factors include the lack of self-discipline awareness in related industries and the existence of technology in the industry sector.Loopholes and limited effects of terminal judicial control;dynamic level,from the interactive relationship between the victim and the offender to analyze the cause,specifically including the available victim model and victim promotion model.The third chapter is "Construction of Victim Prevention of Telecommunications Network Fraud Crime Victims",which specifically includes pre-victim prevention,pre-victimization and post-victimization prevention.Pre-victim prevention includes perfecting and implementing industry supervision,strengthening technical prevention capabilities,and improving self-prevention awareness.Prevention during victimization includes the establishment of a rapid response mechanism by the public security organs and the victims themselves maintaining a rational and active response.Post-victimization prevention includes strengthening the end-of-judicial control effect,improving a victim compensation system,and increasing the importance and publicity of victim assistance. |