:::

詳目顯示

回上一頁
題名:「維基式犯罪預防」--從日常生活理論談網路犯罪預防模式
書刊名:犯罪學期刊
作者:張耀中
作者(外文):Chang, Yao-chung
出版日期:2009
卷期:12:2
頁次:頁87-115
主題關鍵詞:網路犯罪日常生活理論維基式犯罪預防CybercrimeRoutine activity theoryWiki crime prevention
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(1) 博士論文(1) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:3
  • 點閱點閱:280
為協助政府單位或民間建立有效的網路犯罪防範機制,本文擬從Cohen與Felson在1979年所提出之「日常生活理論」出發,分析網路犯罪之成因與預防模式。首先,本文將先檢討「日常生活理論」是否適用於解釋網路犯罪的問題;其次,透過日常生活理論所提之三要素:可能的加害者、合適的標的物以及監控缺乏,討論網路犯罪形成之原因;最後,依據日常生活理論,本文擬從犯罪機會、標的物與監控三方面,提出有效的網路犯罪預防模式。本文認為,目前網路犯罪問題,在全球法律尚未一致,以及跨國犯罪導致執法困難的情況下,應轉向思考如何強化標的物以及減少犯罪機會的角度出發。由於目前大部分的電腦使用者都是使用「封閉式軟體」,因此網路犯罪的預防以不再是「自掃門前雪」的觀念,而應轉向「維基式犯罪預防」,透過用戶集體的力量,找出軟體的漏洞並進行預警。此外,還可以透過開放原始碼,集合大眾的力量對軟體漏洞及時進行修正,以避免攻擊的發生。
This paper discusses Routine Activity Theory (RAT) and Cybercrime prevention. It examines the applicability of RAT to cybercrime and, through the three elements of RAT, the structure of Cybercrime. Based on RAT, it proposes some possible ways to prevent cybercrime. This paper argues that, due to transnational characteristics of Cybercrime, Cybercrime combating requires all countries to have consistent laws and regulations and Cybercrime investigation capabilities. However, in circumstances of inconsistent laws and regulations and difficulties in investigating Cybercrimes, it suggests that a combination of target hardening and opportunity reduction measures should be emphasized. Cybercrime prevention strategies should not be modeled on traditional crime prevention strategies. This paper proposes "wiki" crime prevention-that is, users' collaboration online to find breaches and vulnerabilities in software and sharing information on remedial action. Instead of waiting for software companies to fix a breach or vulnerability, it suggests that open source programs should be promoted so that people can devote themselves to the correction of the breaches and vulnerabilities and use the Internet to share information on solution to Cybercrime problems.
期刊論文
1.林宜隆、黃讚松(20021200)。網路使用問題分析與犯罪預防之探討。資訊、科技與社會學報,2(2)=3,95-114。new window  延伸查詢new window
2.Katyal, Neal Kumar(2003)。Digital architecture as crime control。Yale Law Journal,112(8),2261-2289。  new window
3.李茂生(20040200)。刑法新修妨害電腦使用罪章芻議。臺灣本土法學雜誌,55,243-256。  延伸查詢new window
4.Cohen, L. E.、Felson, M.(1979)。Social change and crime rate trends: a routine activity approach。American Sociological Review,44(4),588-608。  new window
5.Wilson, J. Q.、Kelling, G. L.(1982)。Broken Windows: The Police and Neighborhood Safety。Atlantic Monthly,249(3),29-38。  new window
6.李茂生(20040100)。刑法新修妨害電腦使用罪章芻議。臺灣本土法學雜誌,54,235-247。  延伸查詢new window
7.馮震宇(20030300)。網路犯罪與網路犯罪公約。月旦法學教室,5,115-124。  延伸查詢new window
8.馮震宇(20030200)。網路犯罪與網路犯罪公約。月旦法學教室,4,124-136。  延伸查詢new window
9.李茂生(20040300)。刑法新修妨害電腦使用罪章芻議。臺灣本土法學雜誌,56,207-220。  延伸查詢new window
10.張耀中(2007)。<無線網路溢波盜用之法律議題初探>。《 科技法律透析》,18(9),16-20。  延伸查詢new window
11.張耀中、吳兆琰(2008)。<從美國實務經驗論我國資安事件通報與資訊分享機制>。《科技法律透析》,20(8),39-61。  延伸查詢new window
12.Grabosky, P.(2007)。Requirements of prosecution services to deal with cyber crime。Crime, Law and Social Change,47,201-223。  new window
13.Koppell, J. G. S.(2000)。No 'There' there: Why cyberspace isn't。The Atlantic Monthly,August。  new window
14.Taylor, P. A.(2005)。From hackers to hacttivists: Speed bumps on the global superhighway。New Media Society,7(5),625-646。  new window
15.Yar, Majid(2005)。The novelty of 'Cybercrime': An assessment in light of routine activity theory。European Journal of Criminology,2(4),407-427。  new window
研究報告
1.孟維德(2003)。《跨境犯原因論及防制對策之實證研究》。臺北。  延伸查詢new window
2.范國勇(2005)。《網路犯罪成因與防治對策之研究》。  延伸查詢new window
學位論文
1.Walkley, S.(2005)。Regulating Cyberspace: An Approach to Studying Criminal Behaviour on the Internet,Canberra。  new window
圖書
1.廖有祿、李相臣(200309)。電腦犯罪--理論與實務。台北市:五南圖書。  延伸查詢new window
2.Wolfgang, Marvin E.(1958)。Patterns in Criminal Homicide。New York:Wiley。  new window
3.Lessig, Lawrence(1999)。Code and Other Laws of Cyberspace。Basic Books。  new window
4.林宜隆、黃志龍(2005)。<我國網路犯罪案例現況分析與防範對策探討—以刑法妨害電腦使用罪案件為例>。《2005 年第九屆資訊管理學術暨警政資訊實務研討會論文集》。臺北。  延伸查詢new window
5.張耀中、周愫嫻(2007)。<網路犯罪相關法規之比較:國際組織與台灣之經驗>。《刑事政策與犯罪論文集(十)》。臺北。  延伸查詢new window
6.許春金(2000)。《犯罪學理論》。臺北。  延伸查詢new window
7.Choo, K.-K. R.、McCusker, R.、Smith, R. G.(2007)。Future Directions in Technology-Enabled Crime: 2007-2009。Canberra:Australian Institute of Criminology。  new window
8.Clarke, Ronald V.(1999)。Hot Products: Understanding, Anticipating and Reducing Demand for Stolen Goods。London:Home Office。  new window
9.Felson, M.(2000)。The routine activity approach: a very versatile theory of crime。Explaining Criminals and Crime。CA。  new window
10.Lucas, J. R.(1973)。A Treatise on Time and Space。London。  new window
11.McGuire, M.(2007)。Hypercrime: the New Geometry of Harm。Abingdon, Oxon。  new window
12.Sklar, L.(1977)。Space, Time, and Space-time。Berkeley。  new window
13.Smith, R., Grabosky, P.,、Urbas, G.(2004)。Cyber Criminals on Trial。Cambridge。  new window
14.Wall, D. S.(2007)。Cybercrime。Cambridge。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE