Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 法律學院
  3. 法律學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40119
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor李茂生(Mau-Sheng Lee)
dc.contributor.authorShih-Chi Ouen
dc.contributor.author歐師綺zh_TW
dc.date.accessioned2021-06-14T16:41:28Z-
dc.date.available2008-08-01
dc.date.copyright2008-08-01
dc.date.issued2008
dc.date.submitted2008-08-01
dc.identifier.citation一 、中文資料
(一) 翻譯著作
1. Viktor Mayer-Schoanberger, Teree E. Foster, 「受規範的全球資訊網」,『數位法律』,遠流出版,1999。
2. Joe R. Reidenberg , 「網際空間的管理與立法」,『數位法律』,Brain Kahin編,遠流,1999初版。
3. Joe R. Reidenberg , 「網際空間的管理與立法」,『數位法律』,Brain Kahin編,遠流,1999初版.
4. Henry H. Perritt, Jr.,「網際空間的管轄:中介者的角色」,『數位法律』,遠流。
(二) 期刊
1. 林山田,「電腦犯罪之研究」,政大法學評論第30期,73年12月,頁61。
2.李茂生,「刑法新修妨害電腦使用罪章芻議(上)」,台灣本土法學第54期,2004年1月,頁218。
二、外文資料
(一) 書籍
1. Lawrence Lessig, ‘Code and Other Laws of Cyberspace’, 1990.
2. Lawrence Lessig, ‘The Future of Ideas: The Fate of the Commons in a Connected World’,120-140. 2001.
3. Lance James,’ Phishing Exposed’, Syngress, 2005.
4. Wayne R. LaFave, Criminal Law § 8.13 (3d ed. 2000).
5. Preston Gralla, ’How the Internet Works’ , 128-129. 2002.
6. Wayne R. LaFave,’ Criminal Law’, 3d ed. 2000.
(二) 期刊
. David G. Post & David R Johnson, “Chaos Prevailing on Every Continent”, 73 Chi-Kent L.Rev.1055,(1998).
2. David G .Post,” Governing Cyberspace”,43 Wayne L.Rev.155(1996).
3.David Post, “Law and Borders—The Rise of Law in Cyberspace”, 48 Stan. L. Rev. 1367. 1996.
4. Julie E. Cohen, ”Cyberspace As/And Space”, Columbia L. Rev. , Vol.107:210, p.214.
5.John Perry Barlow,” A Declaration of the Independence of Cyberspace”, Columbia Law Review. Feb. 8, 1996.
6. Cf. Edward Soja, “Surveying Law and Borders: Afterword”, 48 Stan. L. Rev. 1421, 1426. 1996.
7. Orin S. Kerr, Note, “The Limits of Computer Conversation: United States v. Collins”, Harv. J.L. & Tech. 205,209. 1996.
8. Stanley L.Sokolik,”Computer Crime—The Need for Deterrent Legislation”, 2 Computer/L. J. 353. 1980.
9. David R. Johnson & Davind G. Post, “Law and Borders-the rise of Law in Cyberspace”, 48 Stan. L. Rev. 1367. 1996
10. James Boyle,” Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors”, 66 U. Cin. L. Rev. 177, 179. 1997.
11. Stankley L. Sokolik, “Computer Crime-The Need for Deterrent Legislation”, 2 Computer/L.J. 353. 1980.
12. Patrica L. Bellia, “Defending Cyberproperty”, N.Y.U. L. Rev. , Vol.79, Dec. 2004.
13. David R. Johnson & Davind G. Post, “Law and Borders-the rise of Law in Cyberspace”, 48 Stan. L. Rev. 1367. 1996.
14. James Boyle, “Foucault in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors”, 66 U. Cin. L. Rev. 177, 179. 1997.
15. Michael A. Sussmann, “The Critical Challenges from International High-Tech and Computer Related Crime at the Millennium”, 9 Duke J. comp, & Int’l L. 451, 488. 1999.
16. Liz Duff& Simon L. Gardiner, “Computer Crime in the Global Village: Strategies for Control and Regulation—in Defence of the Hacker”, 24 INT’L J. SOC.L.211,220. 1996.
17. Reid Skibelt, “Cybercrimes and Misdemeanors:A Reevaluation of the Computer Fraud and Abuse Act”, Berkeley Technology Law Journal,Vol.18:909,940. 2003.
18. Id. Patricia L. Bellia,” Chasing Bits Across Borders”, 2001 U. Chi. Legal F. 35, 36 n. 6. 2001.
19. Patricia L. Bellia, “Chasing Bits Across Borders, 2001 U. CHI. LEGAL F. 35, 36n.6. 2001.
20. Jack L. Goldsmith, “The Internet and the Legitimacy of Remote Cross-Border Searches, 2001 U.CHI LEGAL F.103,107. 2001.
21. Orin S. Kerr,” The Problem of Perspective in Internet Law”, 91 Geo. L. J. 357,357. 2003.
22. Orin S. Kerr,”Cybercrime’s Scope: Interpreting ”Access” and “Authorization” in Computer Misuse Statutes”, New York University L. Rev. Vol.78,1605,Nov. 2003.
23. House Report . No. 98-894,at 20(1984),reported in 1984 U.S.C.C.A.N.3689,3706.
24. Orin S. Kerr,” The Problem of Perspective in Internet Law”,91 Geo. L. J. 357,357. 2003.
25. Orin S. kerr , “How a Suppression Remedy Would Change Computer Crime Law, 54 Hastings L.J. 805, 829-30. 2003.
26. Patrica L. Bellia, “Defending Cyberproperty”, N.Y.U. L. Rev. , Vol.79, Dec. 2004.
27. Orin S. Kerr,”Cybercrime’s Scope: Interpreting ”Access” and “Authorization” in Computer Misuse Statutes”, New York University L. Rev. Vol.78,1605,Nov. 2003.
28. Richard H. Fallon,”Making Sense of Overbreadth”, 100 Yale L. J. 853, 1991
29. Patrica L. Bellia, “Defending Cyberproperty”, N.Y.U. L. Rev. , Vol.79, Dec. 2004.
30. Sanford H. Kadish, “Fifty Years of Criminal Law: An Opinionated Review, 87 Cal. L. Rev.943,947. 1999.
31. Stanley L. Sokolik,” Computer Crime—The Need for Deterrent Legislation”, 2 Computer/L. J. 353. 1980.
32. George R. Milne, “Consumers’ Protection of Online Privacy and ID Theft.”, 38J. Consumer AFF.217, 223-224. 2004.
33. Lawrence Lessig ,” The Constitution of Code: Limitation on Choice-Based Cyberspace Regulation.” 5 COMMLAW CONSPECTUS 181, 184. 1997.
34. Peter J. Dugan, “National Security Checks Are in the Mail -A First Amendment Analysis of Intelligent Mail and Sender Identification”, 12 COMMLAW CONSPECTUS 265. 2004.
35. Lori J. Parker, “Legal and Procedural Issues in Prosecutions Under Federal Statutes Relating to Offense of Identity Theft”, American Law Reports, Feb.2nd 265, 2005.
36. Kristen S. Provenza , “Identity Theft: Prevention and Liability”, 3 N. C. BANKING INST. 319, 325. 1999.
37. Jennifer Lynch , “Identity Theft in Cyberspace : Crime Control Methods and Their Effectiven in Combating Phishing Attacks”, Berkeley The .L. J. Vol. 20. 2005.
38. Cf. Edward Soja, Surveying Law and Borders: Afterword, 48 Stan. L. Rev. 1421, 1426. 1996.
39. Donn B. Parker, “Fighting Computer Crime 17 (1983); Scott Charney & Kent Alexander”, Computer Crime, 45 Emory L.J. 931, 934. 1996.
40. Michael A. Sussmann, “The Critical Challenges from International High-Tech and Computer Related Crime at the Millennium”, 9 Duke J. comp, & Int’l L. 451, 488. 1999.
41. Frank Easterbrook,”Cyberspace and the Law of the Horse”,1996,U CHI.LEGAL F.207.
42. William J. Stuntz, The Pathological Politics of Criminal Law, 100 Mich. L. Rev. 505, 512 (2001) .

(三) 報紙
1. Jovi Tanada Yam, Cybercrime Treaty Under Way, BUSINESSWORLD, May 3, 2001.
2. David McGuire&Brian Krebs, ”Large Scale Attack on Internet Backbone”, WASHTON POST , Oct. 23, 2002.
3. Monte Morin, “U.S. Indicts Russian Citizen in Hacking Case, L.A. TIMES, JUN 21, 2000.
4. David McGuire, “Senate Bill Targets Phishers”, WASH. POST., July 12, 2004.
(四) 判例
1. United States v. Fellows,157 F.3rd 1197,1202 (9th Cir. 1998)
2. 15 U.S.C. § 6501,6505 (Supp.2000).
3. United States v. Seidlitz, 589 F.2d 152, 160 (4th Cir. 1978)
4. United States v. Girard, 601 F.2d 69, 71 (2nd Cir. 1979)
5. Ticketmaster Corp. v. Tickets.com, Inc., No.CV 99-7654, 2000 WL 1887522 (C.D. Cal. Mal. 7,2003).
6. People v. Johnson, 560 N.Y.S.2d 238, 241, 243-44 (N.Y. Crim. Ct. 1990)
7. State v. Olson, 735 P. 2d 1362, 1364(Wash.Ct.App.1987).
8. State v. Dupuy, 395 A.2d 851,853-54(N.H. 1978).
9. Trulock v. Freeh, 275 F,3d 391,409(4th Cir.2001).
10. City of Chicago v. Morales, 527 U.S. 41,56(1999).
11. Cf. Lewis v. City of New Orleans, 415 U.S.41, 52, 56(1999).
12. State v. Allen, 917 P.2d 848, 852(Kan.1996).
13. State v. Peter, 263 Wis. 2d 475, 2003 WI 88, 665 N.W.2d 171, 125 A. L. R.5th 775(2003).
14. Greidinger v. Davis, 988 F.2d 1344(4th Cir. 1993).
(五) 法條
1. 18 U.S.C.A. Sec.2511(2)(d).
2. Id.Sec. 1681c-1(b)(1).
3. 15 U.S.C. Sec.1681.
4. 18 U.S.C. § 875(2000).
5. RESTATEMENT(SECOND) OF TORTS § 217(1965).
6. Ark. Code Ann.§5-41-104(Michie 1997);N.Y. Penal Law § 156.10(McKinney 2000); Va. Code Ann.§ 9 A.52.110(West 2000).
7. Model Penal Code§221.2(2)(1962).
8. No. 1:00CV 434-TWT, 2000 WL 33310901 (N.D. Ga. Nov.7,2000).
9. Moulton,2000 WL 33310901, *6.
10. Wash. Rev . Code Ann. § 9A.52.010(6).
11. 121 F. Supp.2d 1255(N.D. Iowa 2000).
12. 616 A.2d 686,691(Pa. Super . Ct.1992).
13. 908 P.2d 1379(N.M.1995).
14. Model Penal Code § 221.1 cmt. At 67.
15. 18 U. S. C.§ 1030(a)(5)(A)(1986).
16. Va. Code Ann.§ 18.2-152.5(Michie 1996).
17. Fair Credit Reporting Act, 15 U.S.C. § 1681(2002).
18. CAL CIV.CODE § 1798.29. (2004).
19. 18 U.S.C. § 1029(c)(1)(A)(ii)(Supp. II 2002).
20. 18 U.S.C. § 1029 (2000 & Supp. II 2002).
21. 18 U.S.C. § 1028(a)(7)(2000).
22. Kan. Stat. Ann. Sec. 21-4018(a) (Supp.2000).
23. Wash. Rev. Code Ann. SEC. 9. 35. 005(3).
24. 18 U.S.C.(Sec).1341, 1343, 1344, 1029, 1542, 1546, 1708.
三、網站資料
1. John Perry Barlow,“A Declaration of the Independence of Cyberspace”, Feb. 8, 1996, at http://homes.eff.org/~barlow/Declaration-final.html; Jan.3, 2006
2. Michel Foucault, “Of Other Space”, Diacritics, 1986.http://www.eng.fju.edu.tw/Literary_Criticism/postmodernism/postmo_urban/foucault-heterotopia-summary.htm, Summarized by Jerry Shih-chieh Liang
3. U.S. SECURITIES AND EXCHANCE COMMISSION, http://www.sec.gov/investor/pubs/cyberfraud.htm.; Jan 6, 2007
4. Six Month Trends Report, http://www.ifccfbi.gov/strategy/6monthreport.pdf; May 3, 2000
5. Computer Security Institute, “Financial Losses Due to Internet Intrusions, Trade Secret Theft, and Other Cyber Crimes Soar”, http://www.gocsi.com.prelea000321.htm.
6. Jonathan Rusch,”The Rising Tide of Internet Fraud”,http://www.cyberjournalist.net/slipups.htm.; Feb 22. 2007
7. 美國法務部對依CFAA起訴的案件做的統計資料。http://www.cybercrime.gov/cccases.html
8. Bedworth案:http://webjcli.ncl.ac.uk/1996/issue3/akdeniz3.html http://www.computerevidence.co.uk/Cases/CMA.htm
9. http://www.villagevoice.com/issues/0007/sirius.php
10. http://en.wikipedia.org/wiki/Script_kiddie
11. http://www.cnn.com/2000/LAW/05/05/love.bug/.
12. Bedworth案:http://webjcli.ncl.ac.uk/1996/issue3/akdeniz3.html http://www.computerevidence.co.uk/Cases/CMA.htm
13. http://en.wikipedia.org/wiki/Kevin_Mitnick; July 25th 2007
14. http://www.atstake.com/research/reports/acrobat/atstake_injustice.pdf
15. http://commdocs.house.gov/committees/judiciary/hju80830.000/hju80830_0f.htm
http://www.cm.coe.int/ta/rec/1989/89r9.htm; Sept. 13, 1989.
16. FED. TRADE COMM’N, IDENTITY THEFT SURVEY REPORT 7(2003), http://www.ftc.gov/os/2003/09/synovatereport.pdf.; FEB.12th. 2006
17. Anti-Phishing Working Group, http://www.antiphishing.org.; Feb. 3 2005
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/40119-
dc.description.abstract本文主要觀察電腦犯罪規範已經行之有年的美國法實務與學說演進,挑出兩個代表性的問題—無權接近存取行為,以及ID竊盜行為,做為討論的中心。在眾多電腦犯罪型態中特別挑選者兩個議題的原因是,前者可說是實際的電腦犯罪行為最早的階段,對於電腦開始使用的行為,而對此類型犯罪的刑法規範我國移植自美國法,美國法的實務與學說已經從早期利用舊有規範處理,到創設特別規範此一行為的規定,到對法律文字的解釋與實際爭議案件的見解流變,都可以做為我國法的借鏡。相較於此,對後者的規範則在我國是付之闕如,即使在美國法已經有針對此行為所設的法律規定,解釋適用上仍然有待進一步的發展,反而著重在政策的選擇,希望能夠藉由對此一新興電腦犯罪手法的規範態度,看到對所有新興的電腦網路相關犯罪規範應該有的思考與方向。zh_TW
dc.description.abstractThe title is computer-related crime. Focus on unauthorized access and identity theft. Firstly, we will have an overview of computer crime legislation and what is computer crime, including the internet fraud and unauthorized access, and another types of internet fraud. Then we talk about the cyber property and the protection of the security of information. After these we get to see the framework of ID theft in cyberspace. Finally, we make the focus back on the law in Taiwan and try to bring a new thinking to the current computer crime law in Taiwan.en
dc.description.provenanceMade available in DSpace on 2021-06-14T16:41:28Z (GMT). No. of bitstreams: 1
ntu-97-R93a21051-1.pdf: 629621 bytes, checksum: d8c882d9f5e800333012b6974d372d84 (MD5)
Previous issue date: 2008
en
dc.description.tableofcontents口試委員會審定書
謝詞 3
中文摘要 5
英文摘要 6
第一章 序論 7
第二章 電腦犯罪立法概觀 10
第一節 網路世界的本質與法規範的思考背景 10
第二節 電腦犯罪類型簡介 13
第一項 網路詐欺 16
第二項 無權接近存取行為 20
第三節 電腦犯罪規範模式的發展 22
第一項 不同的法益觀點 22
第一款 資訊財產權 22
第二款 保護資訊流通與隱私 23
第二項 隨電腦應用而發生之規制模式的改變 26
第三章 美國立法例與國際組織處理態度 33
第一節 美國法 33
第一項 CFAA的發展與內容 34
第二項 主觀要件要素與5000美金的損害額門檻 43
第三項 USAPA與網路犯罪的刑罰方式 44
第一款 重罰的威嚇與功利主義正當化理由 45
第二款 重罰的負面效應 47
第三款 網路犯罪刑罰的應報思想與道德觀 50
第二節 其他國與國際性組織處理的方向與態度 52
第四章 無權接近存取行為規範的相關議題 60
第一節 美國法以規範無權接近存取行為處理網路侵權行為 60
第二節 以財產保障為規範基礎所引發的疑慮 64
第三節 何謂「權限」與「接近存取」 65
第四節 學說對無權接近存取解釋之建議 78
第五章 ID竊盜行為規範之爭議 84
第一節 綜觀網路時代的ID竊盜問題 84
第二節 新型態的ID竊盜手段 86
第三節 美國法對ID竊盜問題的處理 87
第一項 三種不同的處理層面 87
第二項 法條規範的涵義 94
第四節 美國ID竊盜規範面臨的問題 95
第六章 對現行法規之建議 98
第一節 我國法關於無故侵入電腦行為規範的問題 98
第二節 我國法現有規範在ID竊盜上適用的問題 104
第七章 結論 108
附錄 參考資料 113
dc.language.isozh-TW
dc.subject電腦詐欺zh_TW
dc.subject入侵電腦zh_TW
dc.subject電腦犯罪zh_TW
dc.subject無權接近存取zh_TW
dc.subjectID竊盜zh_TW
dc.subjectUnauthorized Accessen
dc.subjectCyber Lawen
dc.subjectCyber Crimeen
dc.subjectCFAAen
dc.subjectIdentity Theften
dc.subjectComputer Crimeen
dc.title無權接近存取行為與ID竊盜行為處罰—以美國法為中心zh_TW
dc.titleComputer-related Crime-Focus on Unauthorized Access and Identity Theften
dc.typeThesis
dc.date.schoolyear96-2
dc.description.degree碩士
dc.contributor.oralexamcommittee盧映潔(Ying-Chieh Lu),王皇玉(Huang-Yu Wang)
dc.subject.keyword電腦犯罪,無權接近存取,ID竊盜,入侵電腦,電腦詐欺,zh_TW
dc.subject.keywordComputer Crime,Unauthorized Access,Identity Theft,CFAA,Cyber Crime,Cyber Law,en
dc.relation.page120
dc.rights.note有償授權
dc.date.accepted2008-08-01
dc.contributor.author-college法律學院zh_TW
dc.contributor.author-dept法律學研究所zh_TW
顯示於系所單位:法律學系

文件中的檔案:
檔案 大小格式 
ntu-97-1.pdf
  未授權公開取用
614.86 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved