請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40119完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 李茂生(Mau-Sheng Lee) | |
| dc.contributor.author | Shih-Chi Ou | en |
| dc.contributor.author | 歐師綺 | zh_TW |
| dc.date.accessioned | 2021-06-14T16:41:28Z | - |
| dc.date.available | 2008-08-01 | |
| dc.date.copyright | 2008-08-01 | |
| dc.date.issued | 2008 | |
| dc.date.submitted | 2008-08-01 | |
| dc.identifier.citation | 一 、中文資料
(一) 翻譯著作 1. Viktor Mayer-Schoanberger, Teree E. Foster, 「受規範的全球資訊網」,『數位法律』,遠流出版,1999。 2. Joe R. Reidenberg , 「網際空間的管理與立法」,『數位法律』,Brain Kahin編,遠流,1999初版。 3. Joe R. Reidenberg , 「網際空間的管理與立法」,『數位法律』,Brain Kahin編,遠流,1999初版. 4. Henry H. Perritt, Jr.,「網際空間的管轄:中介者的角色」,『數位法律』,遠流。 (二) 期刊 1. 林山田,「電腦犯罪之研究」,政大法學評論第30期,73年12月,頁61。 2.李茂生,「刑法新修妨害電腦使用罪章芻議(上)」,台灣本土法學第54期,2004年1月,頁218。 二、外文資料 (一) 書籍 1. Lawrence Lessig, ‘Code and Other Laws of Cyberspace’, 1990. 2. Lawrence Lessig, ‘The Future of Ideas: The Fate of the Commons in a Connected World’,120-140. 2001. 3. Lance James,’ Phishing Exposed’, Syngress, 2005. 4. Wayne R. LaFave, Criminal Law § 8.13 (3d ed. 2000). 5. Preston Gralla, ’How the Internet Works’ , 128-129. 2002. 6. Wayne R. LaFave,’ Criminal Law’, 3d ed. 2000. (二) 期刊 . David G. Post & David R Johnson, “Chaos Prevailing on Every Continent”, 73 Chi-Kent L.Rev.1055,(1998). 2. David G .Post,” Governing Cyberspace”,43 Wayne L.Rev.155(1996). 3.David Post, “Law and Borders—The Rise of Law in Cyberspace”, 48 Stan. L. Rev. 1367. 1996. 4. Julie E. Cohen, ”Cyberspace As/And Space”, Columbia L. Rev. , Vol.107:210, p.214. 5.John Perry Barlow,” A Declaration of the Independence of Cyberspace”, Columbia Law Review. Feb. 8, 1996. 6. Cf. Edward Soja, “Surveying Law and Borders: Afterword”, 48 Stan. L. Rev. 1421, 1426. 1996. 7. Orin S. Kerr, Note, “The Limits of Computer Conversation: United States v. Collins”, Harv. J.L. & Tech. 205,209. 1996. 8. Stanley L.Sokolik,”Computer Crime—The Need for Deterrent Legislation”, 2 Computer/L. J. 353. 1980. 9. David R. Johnson & Davind G. Post, “Law and Borders-the rise of Law in Cyberspace”, 48 Stan. L. Rev. 1367. 1996 10. James Boyle,” Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors”, 66 U. Cin. L. Rev. 177, 179. 1997. 11. Stankley L. Sokolik, “Computer Crime-The Need for Deterrent Legislation”, 2 Computer/L.J. 353. 1980. 12. Patrica L. Bellia, “Defending Cyberproperty”, N.Y.U. L. Rev. , Vol.79, Dec. 2004. 13. David R. Johnson & Davind G. Post, “Law and Borders-the rise of Law in Cyberspace”, 48 Stan. L. Rev. 1367. 1996. 14. James Boyle, “Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors”, 66 U. Cin. L. Rev. 177, 179. 1997. 15. Michael A. Sussmann, “The Critical Challenges from International High-Tech and Computer Related Crime at the Millennium”, 9 Duke J. comp, & Int’l L. 451, 488. 1999. 16. Liz Duff& Simon L. Gardiner, “Computer Crime in the Global Village: Strategies for Control and Regulation—in Defence of the Hacker”, 24 INT’L J. SOC.L.211,220. 1996. 17. Reid Skibelt, “Cybercrimes and Misdemeanors:A Reevaluation of the Computer Fraud and Abuse Act”, Berkeley Technology Law Journal,Vol.18:909,940. 2003. 18. Id. Patricia L. Bellia,” Chasing Bits Across Borders”, 2001 U. Chi. Legal F. 35, 36 n. 6. 2001. 19. Patricia L. Bellia, “Chasing Bits Across Borders, 2001 U. CHI. LEGAL F. 35, 36n.6. 2001. 20. Jack L. Goldsmith, “The Internet and the Legitimacy of Remote Cross-Border Searches, 2001 U.CHI LEGAL F.103,107. 2001. 21. Orin S. Kerr,” The Problem of Perspective in Internet Law”, 91 Geo. L. J. 357,357. 2003. 22. Orin S. Kerr,”Cybercrime’s Scope: Interpreting ”Access” and “Authorization” in Computer Misuse Statutes”, New York University L. Rev. Vol.78,1605,Nov. 2003. 23. House Report . No. 98-894,at 20(1984),reported in 1984 U.S.C.C.A.N.3689,3706. 24. Orin S. Kerr,” The Problem of Perspective in Internet Law”,91 Geo. L. J. 357,357. 2003. 25. Orin S. kerr , “How a Suppression Remedy Would Change Computer Crime Law, 54 Hastings L.J. 805, 829-30. 2003. 26. Patrica L. Bellia, “Defending Cyberproperty”, N.Y.U. L. Rev. , Vol.79, Dec. 2004. 27. Orin S. Kerr,”Cybercrime’s Scope: Interpreting ”Access” and “Authorization” in Computer Misuse Statutes”, New York University L. Rev. Vol.78,1605,Nov. 2003. 28. Richard H. Fallon,”Making Sense of Overbreadth”, 100 Yale L. J. 853, 1991 29. Patrica L. Bellia, “Defending Cyberproperty”, N.Y.U. L. Rev. , Vol.79, Dec. 2004. 30. Sanford H. Kadish, “Fifty Years of Criminal Law: An Opinionated Review, 87 Cal. L. Rev.943,947. 1999. 31. Stanley L. Sokolik,” Computer Crime—The Need for Deterrent Legislation”, 2 Computer/L. J. 353. 1980. 32. George R. Milne, “Consumers’ Protection of Online Privacy and ID Theft.”, 38J. Consumer AFF.217, 223-224. 2004. 33. Lawrence Lessig ,” The Constitution of Code: Limitation on Choice-Based Cyberspace Regulation.” 5 COMMLAW CONSPECTUS 181, 184. 1997. 34. Peter J. Dugan, “National Security Checks Are in the Mail -A First Amendment Analysis of Intelligent Mail and Sender Identification”, 12 COMMLAW CONSPECTUS 265. 2004. 35. Lori J. Parker, “Legal and Procedural Issues in Prosecutions Under Federal Statutes Relating to Offense of Identity Theft”, American Law Reports, Feb.2nd 265, 2005. 36. Kristen S. Provenza , “Identity Theft: Prevention and Liability”, 3 N. C. BANKING INST. 319, 325. 1999. 37. Jennifer Lynch , “Identity Theft in Cyberspace : Crime Control Methods and Their Effectiven in Combating Phishing Attacks”, Berkeley The .L. J. Vol. 20. 2005. 38. Cf. Edward Soja, Surveying Law and Borders: Afterword, 48 Stan. L. Rev. 1421, 1426. 1996. 39. Donn B. Parker, “Fighting Computer Crime 17 (1983); Scott Charney & Kent Alexander”, Computer Crime, 45 Emory L.J. 931, 934. 1996. 40. Michael A. Sussmann, “The Critical Challenges from International High-Tech and Computer Related Crime at the Millennium”, 9 Duke J. comp, & Int’l L. 451, 488. 1999. 41. Frank Easterbrook,”Cyberspace and the Law of the Horse”,1996,U CHI.LEGAL F.207. 42. William J. Stuntz, The Pathological Politics of Criminal Law, 100 Mich. L. Rev. 505, 512 (2001) . (三) 報紙 1. Jovi Tanada Yam, Cybercrime Treaty Under Way, BUSINESSWORLD, May 3, 2001. 2. David McGuire&Brian Krebs, ”Large Scale Attack on Internet Backbone”, WASHTON POST , Oct. 23, 2002. 3. Monte Morin, “U.S. Indicts Russian Citizen in Hacking Case, L.A. TIMES, JUN 21, 2000. 4. David McGuire, “Senate Bill Targets Phishers”, WASH. POST., July 12, 2004. (四) 判例 1. United States v. Fellows,157 F.3rd 1197,1202 (9th Cir. 1998) 2. 15 U.S.C. § 6501,6505 (Supp.2000). 3. United States v. Seidlitz, 589 F.2d 152, 160 (4th Cir. 1978) 4. United States v. Girard, 601 F.2d 69, 71 (2nd Cir. 1979) 5. Ticketmaster Corp. v. Tickets.com, Inc., No.CV 99-7654, 2000 WL 1887522 (C.D. Cal. Mal. 7,2003). 6. People v. Johnson, 560 N.Y.S.2d 238, 241, 243-44 (N.Y. Crim. Ct. 1990) 7. State v. Olson, 735 P. 2d 1362, 1364(Wash.Ct.App.1987). 8. State v. Dupuy, 395 A.2d 851,853-54(N.H. 1978). 9. Trulock v. Freeh, 275 F,3d 391,409(4th Cir.2001). 10. City of Chicago v. Morales, 527 U.S. 41,56(1999). 11. Cf. Lewis v. City of New Orleans, 415 U.S.41, 52, 56(1999). 12. State v. Allen, 917 P.2d 848, 852(Kan.1996). 13. State v. Peter, 263 Wis. 2d 475, 2003 WI 88, 665 N.W.2d 171, 125 A. L. R.5th 775(2003). 14. Greidinger v. Davis, 988 F.2d 1344(4th Cir. 1993). (五) 法條 1. 18 U.S.C.A. Sec.2511(2)(d). 2. Id.Sec. 1681c-1(b)(1). 3. 15 U.S.C. Sec.1681. 4. 18 U.S.C. § 875(2000). 5. RESTATEMENT(SECOND) OF TORTS § 217(1965). 6. Ark. Code Ann.§5-41-104(Michie 1997);N.Y. Penal Law § 156.10(McKinney 2000); Va. Code Ann.§ 9 A.52.110(West 2000). 7. Model Penal Code§221.2(2)(1962). 8. No. 1:00CV 434-TWT, 2000 WL 33310901 (N.D. Ga. Nov.7,2000). 9. Moulton,2000 WL 33310901, *6. 10. Wash. Rev . Code Ann. § 9A.52.010(6). 11. 121 F. Supp.2d 1255(N.D. Iowa 2000). 12. 616 A.2d 686,691(Pa. Super . Ct.1992). 13. 908 P.2d 1379(N.M.1995). 14. Model Penal Code § 221.1 cmt. At 67. 15. 18 U. S. C.§ 1030(a)(5)(A)(1986). 16. Va. Code Ann.§ 18.2-152.5(Michie 1996). 17. Fair Credit Reporting Act, 15 U.S.C. § 1681(2002). 18. CAL CIV.CODE § 1798.29. (2004). 19. 18 U.S.C. § 1029(c)(1)(A)(ii)(Supp. II 2002). 20. 18 U.S.C. § 1029 (2000 & Supp. II 2002). 21. 18 U.S.C. § 1028(a)(7)(2000). 22. Kan. Stat. Ann. Sec. 21-4018(a) (Supp.2000). 23. Wash. Rev. Code Ann. SEC. 9. 35. 005(3). 24. 18 U.S.C.(Sec).1341, 1343, 1344, 1029, 1542, 1546, 1708. 三、網站資料 1. John Perry Barlow,“A Declaration of the Independence of Cyberspace”, Feb. 8, 1996, at http://homes.eff.org/~barlow/Declaration-final.html; Jan.3, 2006 2. Michel Foucault, “Of Other Space”, Diacritics, 1986.http://www.eng.fju.edu.tw/Literary_Criticism/postmodernism/postmo_urban/foucault-heterotopia-summary.htm, Summarized by Jerry Shih-chieh Liang 3. U.S. SECURITIES AND EXCHANCE COMMISSION, http://www.sec.gov/investor/pubs/cyberfraud.htm.; Jan 6, 2007 4. Six Month Trends Report, http://www.ifccfbi.gov/strategy/6monthreport.pdf; May 3, 2000 5. Computer Security Institute, “Financial Losses Due to Internet Intrusions, Trade Secret Theft, and Other Cyber Crimes Soar”, http://www.gocsi.com.prelea000321.htm. 6. Jonathan Rusch,”The Rising Tide of Internet Fraud”,http://www.cyberjournalist.net/slipups.htm.; Feb 22. 2007 7. 美國法務部對依CFAA起訴的案件做的統計資料。http://www.cybercrime.gov/cccases.html 8. Bedworth案:http://webjcli.ncl.ac.uk/1996/issue3/akdeniz3.html http://www.computerevidence.co.uk/Cases/CMA.htm 9. http://www.villagevoice.com/issues/0007/sirius.php 10. http://en.wikipedia.org/wiki/Script_kiddie 11. http://www.cnn.com/2000/LAW/05/05/love.bug/. 12. Bedworth案:http://webjcli.ncl.ac.uk/1996/issue3/akdeniz3.html http://www.computerevidence.co.uk/Cases/CMA.htm 13. http://en.wikipedia.org/wiki/Kevin_Mitnick; July 25th 2007 14. http://www.atstake.com/research/reports/acrobat/atstake_injustice.pdf 15. http://commdocs.house.gov/committees/judiciary/hju80830.000/hju80830_0f.htm http://www.cm.coe.int/ta/rec/1989/89r9.htm; Sept. 13, 1989. 16. FED. TRADE COMM’N, IDENTITY THEFT SURVEY REPORT 7(2003), http://www.ftc.gov/os/2003/09/synovatereport.pdf.; FEB.12th. 2006 17. Anti-Phishing Working Group, http://www.antiphishing.org.; Feb. 3 2005 | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40119 | - |
| dc.description.abstract | 本文主要觀察電腦犯罪規範已經行之有年的美國法實務與學說演進,挑出兩個代表性的問題—無權接近存取行為,以及ID竊盜行為,做為討論的中心。在眾多電腦犯罪型態中特別挑選者兩個議題的原因是,前者可說是實際的電腦犯罪行為最早的階段,對於電腦開始使用的行為,而對此類型犯罪的刑法規範我國移植自美國法,美國法的實務與學說已經從早期利用舊有規範處理,到創設特別規範此一行為的規定,到對法律文字的解釋與實際爭議案件的見解流變,都可以做為我國法的借鏡。相較於此,對後者的規範則在我國是付之闕如,即使在美國法已經有針對此行為所設的法律規定,解釋適用上仍然有待進一步的發展,反而著重在政策的選擇,希望能夠藉由對此一新興電腦犯罪手法的規範態度,看到對所有新興的電腦網路相關犯罪規範應該有的思考與方向。 | zh_TW |
| dc.description.abstract | The title is computer-related crime. Focus on unauthorized access and identity theft. Firstly, we will have an overview of computer crime legislation and what is computer crime, including the internet fraud and unauthorized access, and another types of internet fraud. Then we talk about the cyber property and the protection of the security of information. After these we get to see the framework of ID theft in cyberspace. Finally, we make the focus back on the law in Taiwan and try to bring a new thinking to the current computer crime law in Taiwan. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-14T16:41:28Z (GMT). No. of bitstreams: 1 ntu-97-R93a21051-1.pdf: 629621 bytes, checksum: d8c882d9f5e800333012b6974d372d84 (MD5) Previous issue date: 2008 | en |
| dc.description.tableofcontents | 口試委員會審定書
謝詞 3 中文摘要 5 英文摘要 6 第一章 序論 7 第二章 電腦犯罪立法概觀 10 第一節 網路世界的本質與法規範的思考背景 10 第二節 電腦犯罪類型簡介 13 第一項 網路詐欺 16 第二項 無權接近存取行為 20 第三節 電腦犯罪規範模式的發展 22 第一項 不同的法益觀點 22 第一款 資訊財產權 22 第二款 保護資訊流通與隱私 23 第二項 隨電腦應用而發生之規制模式的改變 26 第三章 美國立法例與國際組織處理態度 33 第一節 美國法 33 第一項 CFAA的發展與內容 34 第二項 主觀要件要素與5000美金的損害額門檻 43 第三項 USAPA與網路犯罪的刑罰方式 44 第一款 重罰的威嚇與功利主義正當化理由 45 第二款 重罰的負面效應 47 第三款 網路犯罪刑罰的應報思想與道德觀 50 第二節 其他國與國際性組織處理的方向與態度 52 第四章 無權接近存取行為規範的相關議題 60 第一節 美國法以規範無權接近存取行為處理網路侵權行為 60 第二節 以財產保障為規範基礎所引發的疑慮 64 第三節 何謂「權限」與「接近存取」 65 第四節 學說對無權接近存取解釋之建議 78 第五章 ID竊盜行為規範之爭議 84 第一節 綜觀網路時代的ID竊盜問題 84 第二節 新型態的ID竊盜手段 86 第三節 美國法對ID竊盜問題的處理 87 第一項 三種不同的處理層面 87 第二項 法條規範的涵義 94 第四節 美國ID竊盜規範面臨的問題 95 第六章 對現行法規之建議 98 第一節 我國法關於無故侵入電腦行為規範的問題 98 第二節 我國法現有規範在ID竊盜上適用的問題 104 第七章 結論 108 附錄 參考資料 113 | |
| dc.language.iso | zh-TW | |
| dc.subject | 電腦詐欺 | zh_TW |
| dc.subject | 入侵電腦 | zh_TW |
| dc.subject | 電腦犯罪 | zh_TW |
| dc.subject | 無權接近存取 | zh_TW |
| dc.subject | ID竊盜 | zh_TW |
| dc.subject | Unauthorized Access | en |
| dc.subject | Cyber Law | en |
| dc.subject | Cyber Crime | en |
| dc.subject | CFAA | en |
| dc.subject | Identity Theft | en |
| dc.subject | Computer Crime | en |
| dc.title | 無權接近存取行為與ID竊盜行為處罰—以美國法為中心 | zh_TW |
| dc.title | Computer-related Crime-Focus on Unauthorized Access and Identity Theft | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 96-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 盧映潔(Ying-Chieh Lu),王皇玉(Huang-Yu Wang) | |
| dc.subject.keyword | 電腦犯罪,無權接近存取,ID竊盜,入侵電腦,電腦詐欺, | zh_TW |
| dc.subject.keyword | Computer Crime,Unauthorized Access,Identity Theft,CFAA,Cyber Crime,Cyber Law, | en |
| dc.relation.page | 120 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2008-08-01 | |
| dc.contributor.author-college | 法律學院 | zh_TW |
| dc.contributor.author-dept | 法律學研究所 | zh_TW |
| 顯示於系所單位: | 法律學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-97-1.pdf 未授權公開取用 | 614.86 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
