Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 法律學院
  3. 法律學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/98121
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor周漾沂zh_TW
dc.contributor.advisorYang-Yi Chouen
dc.contributor.author黃柏鈞zh_TW
dc.contributor.authorPo-Chun Huangen
dc.date.accessioned2025-07-29T16:07:24Z-
dc.date.available2025-07-30-
dc.date.copyright2025-07-28-
dc.date.issued2025-
dc.date.submitted2025-07-16-
dc.identifier.citation一、 中文文獻
(一)專書
王皇玉(2021), 《刑法總則》,7 版,新學林。
林山田(2004), 《刑法各論(下冊) 》,4 版,台大法律學院圖書部。
周冶平(1972), 《刑法各論》,2 版,三民。
陳子平(2015), 《刑法各論(上) 》,2 版,元照。
陳子平(2014), 《刑法各論(下) 》 ,初版,元照。
許澤天(2024), 《刑法分則(上) :財產法益篇》,6 版,新學林。
許澤天(2023), 《刑法分則(下) :人格與公共法益篇》,5 版,新學林。
黃榮堅(2019), 《基礎刑法學(上) 》,4 版,元照。
黃榮堅(2019), 《基礎刑法學(下) 》,4 版,元照。
劉連煜(2014), 《新證券交易法實例研習》,增訂 12 版,元照。
韓忠謨(1982), 《刑法各論》,7 版,三民。
(二)期刊論文
王效文(2015), 〈刑罰目的與刑法體系:論 Günther Jakobs 功能主義刑法體系中的罪責〉, 《成大法學》,30 期,頁 151-222。
王晨桓 (2023), 〈銀行法第 29 條之 1 再思考:以虛擬通貨為中心〉, 《當代法律》,20 期,頁 68-75。
甘添貴(2003), 〈虛擬遊戲與盜取寶物〉, 《台灣本土法學雜誌》,50 期,頁 179-187。
余雪明(1996), 〈認識證券交易法(二)有價證券之概念〉, 《月旦法學雜誌》,16 期,頁83-86。
李怡萱(2023), 〈重新思考虛擬資產與洗錢犯罪之可罰性關係〉, 《檢察新論》,32 期,頁 234-255。
李茂生 (2004), 〈刑法新修妨害電腦使用罪章芻議(上) 〉, 《台灣本土法學雜誌》,54 期,頁 235-247。
李茂生 (2004), 〈刑法新修妨害電腦使用罪章芻議(中) 〉, 《台灣本土法學雜誌》,55 期,頁 243-256。
李聖傑(2022), 〈以比特幣吸「睛」的刑法管制:兼評臺灣高等法院 107 年度金上訴字第 83 號判決〉, 《月旦法學教室》,232 期,頁 51-62。
沈易(2019), 〈淺論比特幣在民事法律上之定性〉, 《司法新聲》,129 期,頁 12-36。
吳天雲(2015), 〈大陸《刑法》竊盜罪財物概念的檢討:以虛擬財產之無形財產上利益為例〉, 《展望與探索》,13 卷 1 期,頁 78-93。
吳坤山 (2002), 〈論「妨害國幣懲治條例」 之存廢〉, 《刑事法雜誌》,46 卷 3 期,頁 48-60。
林東茂(1995), 〈經濟刑法導論〉, 《東海法學研究》,9 期,頁 177-206。
林政有(2006), 〈重新定位妨害國幣懲治條例〉, 《刑事法雜誌》,50 卷 5 期,頁29-46。
林書楷(2011), 〈論操縱市場罪:資本市場價格形成真實性的觀點〉, 《興國財經法律學報》,1 期,頁 62-108。
林繼恆、楊岳平、李鎧如(2021), 〈新興金融科技遭濫用於犯罪之研究〉, 《刑事政策與犯罪防治研究專刊》,30 期,頁 141-202。
施志鴻 (2018), 〈比特幣相關犯罪類型與因應作為之探討〉, 《資訊、科技與社會學報》,18 期,頁 64-79。
陳建綱 (2017), 〈效益主義的發軔:初探邊沁的政治思想〉, 《人文及社會科學集刊》,29 卷 4 期,頁 527-562。
陳恭(2017), 〈智能合約的發展與應用〉, 《財金資訊季刊》,90 期,頁 33-39。
陳肇鴻(2022), 〈數位新台幣於貨幣法制上的意義─中央銀行數位貨幣對現行法制的影響初探〉, 《台灣法律人》,18 期,頁 51-64。
周漾沂 (2008), 〈論「煽惑他人犯罪或違背法令」 之處罰理由〉, 《臺大法學論叢》,37 卷 4 期,頁 347-389。
周漾沂 (2014), 〈風險承擔作為阻卻不法事由:重構容許風險的實質理由〉, 《中研院法學期刊》,14 期,頁 169-243。
周漾沂 (2016), 〈刑罰的自我目的性 :重新證立絕對刑罰理論〉, 《政大法學評論》,147 期,頁 279-346。
周漾沂 (2017), 〈財產犯罪中的持有概念:社會性歸屬的證立與運用〉, 《臺大法學論叢》,46 卷 1 期,頁 269-338。
周漾沂 (2017), 〈2016 年刑事法實務見解發展回顧:食品安全、交通安全,與抽象危險犯〉, 《臺大法學論叢》,46 卷特刊,頁 1465-1491。
周漾沂 (2021), 〈煽惑犯罪與政治言論:重新思索刑法第 153 條第 1 款之限縮解釋策略〉, 《月旦法學雜誌》,316 期,頁 140-154。
周漾沂 (2024), 〈論未了未遂中止之成立可能性〉, 《月旦法學雜誌》,345 期,頁70-87。
徐龍(2021), 〈論人工智慧創作之法律屬性與保護〉, 《東吳法律學報》,33 卷 1期,頁 139-181。
郭大維 (2021), 〈證券型虛擬通貨是否為證券交易法上之有價證券〉, 《月旦法學教室》,229 期,頁 27-30。
張明偉(2023), 〈有價證券之核定與限制(上) 〉, 《月旦裁判時報》,137 期,頁68-80。
許絲捷 (2022), 〈經濟刑法中的阻卻違法事由〉, 《月旦法學教室》, 239 期, 頁 36-49。
許恒達 (2011), 〈資訊安全的社會信賴與刑法第三五九條的保護法益:評士林地方法院九十九年度訴字第一二二號判決〉, 《月旦法學雜誌》,194 期,頁 233-249。
許恒達 (2013), 〈公職詐欺與財產損害:以臺灣高等法院九十九年度矚上易字第二號刑事判決為討論中心〉, 《月旦法學雜誌》,217 期,頁 15-32。
許恒達 (2015), 〈電腦詐欺與不正方法〉, 《政大法學評論》,140 期,頁 83-161。
許恒達 (2020), 〈論假訊息的刑法規制〉, 《月旦法學雜誌》, 303 期, 頁 226-246。
莊永丞 (2023), 〈論穩定幣之法制〉, 《臺大法學論叢》, 52 卷特刊, 頁 1113-1118。
惲純良(2017), 〈詐欺罪中財產損害之判斷:「財產危險」概念的回顧與展望〉,《臺北大學法學論叢》,103 期,頁 119-192。
黃國瑞(2014), 〈法益論之解構〉, 《輔仁法學》,第 48 期,頁 1-43。
黃榮堅(2000), 〈冰水有毒〉, 《月旦法學雜誌》,65 期,頁 16-17。
楊岳平(2019), 〈區塊鏈時代下的證券監管思維挑戰:評金管會最新證券型虛擬通貨監管方案〉, 《臺大法學論叢》,48 卷特刊,頁 1322-1323
楊岳平(2019), 〈論違法收受存款罪的目的性限縮:評最高法院 106 年度台上字第 3713 號判決〉, 《月旦裁判時報》,90 期,頁 46-53。
楊岳平(2021), 〈論去中心化金融與智慧合約的金融監理:以去中心化借貸為中心〉, 《月旦法學雜誌》,316 期,頁 53-72。
楊岳平(2023), 〈虛擬通貨監管的比較法發展與我國監管架構芻議〉, 《月旦法學雜誌》,335 期,頁 39-63。
楊岳平(2023), 〈虛擬通貨與銀行法之「款項」或「資金」:評最高法院 110 年度台上字第 3277 號刑事判決〉, 《月旦裁判時報》,130 期,頁 46-55。
劉創馥(2016), 〈康德的自由與自發性〉, 《人文及社會科學集刊》,28 卷 1 期,頁 105-132。
蔡步清(2025), 〈虛擬貨幣的犯罪趨勢及因應之道〉, 《月旦會計實務研究》,87期,頁23-26。
蔡佩玲 (2017), 〈國際洗錢防制發展趨勢與我國洗錢防制新法:兼論刑事政策變革〉, 《刑事政策與犯罪防治研究專刊》,14 期,頁 3-12。
蔡聖偉(2008), 〈從刑總法理檢視分則的立法〉, 《月旦法學雜誌》,157 期,頁267-293。
蔡聖偉(2008), 〈竊盜罪之客觀構成要件(上) 〉, 《月旦法學教室》,73 期,頁48-56。
蔡墩銘(1984), 〈特別刑法之檢討〉, 《法令月刊》,35 卷 10 期,頁 7-10。
鄭文中 (2020), 〈犯罪沒收與虛擬貨幣之保全扣押初探〉, 《商業法律與財金期刊》,3 卷 1 期,頁 93-113。
鄭文中 (2021), 〈虛擬貨幣相關網路犯罪及其訴追與預防:以德國法為例〉, 《財金法學研究》,4 卷 2 期,頁 57-81。
鄭婷嫻 (2023), 〈虛擬通貨與銀行法第 29 條之 1 準收受存款罪 : 評最高法院 112 年度台上字第 317 號刑事判決〉, 《當代法律》,22 期,頁 110-117。
盧映潔、徐暢 (2024), 〈比特幣與違法吸金:評最高法院 111 年度台上字第 5556 號刑事判決〉, 《裁判時報》,146 期,頁 44-53。
戴銘昇 (2007), 〈論證券交易法上之 「有價證券」 〉, 《華岡法粹》,38 期,頁 137-182。
薛智仁(2012), 〈 「網路釣魚 」的刑事責任〉, 《東吳法律學報》,24 卷 3 期,頁149-185。
薛智仁 (2014), 〈無故取得電磁紀錄罪之解釋及立法〉, 《政大法學評論》, 136 期,頁 45-128。
謝開平(2018), 〈強盜價值輕微之物〉, 《月旦法學教室》,186 期,頁 21-23。
謝煜偉(2017), 〈財產犯、財產法益與財產上利益〉,收錄於《刑事法與憲法的對話:許前大法官玉秀教授六秩祝壽論文集》,頁 689-716,元照。
羅韋淵 (2023), 〈偵辦虛擬貨幣相關犯罪之戰略思考:美國司法部史上最大查扣案之借鏡〉, 《檢察新論》,32 期,頁 23-43。
(三)學位論文
林倍伸(2016), 《論妨害公務罪:以法治國家中的公務概念為核心》 ,國立臺灣大學法律學院法律學研究所碩士論文。
李威霖(2021), 《重構違法吸金罪的處罰基礎》 ,國立臺灣大學法律學院法律學研究所碩士論文。
張天一(2007), 《刑法上之財產概念:探索財產犯罪之體系架構》 ,天主教輔仁大學法律研究所博士論文。
蔡依宸(2019), 《論詐欺罪詐術之意涵》 ,國立臺灣大學法律學院科際整合法律學研究所碩士論文。
鍾斯羽(2018), 《應用區塊鏈技術之不動產交易系統設計》 ,國立臺北科技大學資訊與財金管理系碩士論文。
二、 英文文獻
(一)專書
Ahn, Daniel P. (2019). Principles of Commodity Economics and Finance. The MIT. Press.
Alexander, Gregory S., and Peñalver, Eduardo M. (2012). An Introduction to Property Theory. Cambridge University Press.
Antonopoulos, Andreas M. (2017). Mastering Bitcoin: Programming the Open Blockchain. O'Reilly Media.
Apostolik, Richard., Donohue, Christopher., and Went, Peter. (2009). Foundations of Banking Risk: An Overview of Banking, Banking Risks, and Risk-Based Banking Regulation. John Wiley & Sons Inc.
Aristotle. (2009). The Nicomachean Ethics, translated by David Ross. Oxford University Press.
Aristotle. (1995). Politics, translated by Trevor J. Saunders. Oxford University Press.
Bailey, Andrew M., Rettler, Bradley. and Warmke, Craig. (2023). Resistance Money: A Philosophical Case for Bitcoin. Routledge.
Bartle, Richard A. (2003). Designing Virtual Worlds. New Riders.
Bashir, Imran. (2022). Blockchain Consensus: An Introduction to Classical, Blockchain, and Quantum Consensus Protocols. Apress.
Bentham, Jeremy. (1823). An Introduction to the Principles of Morals and Legislation, corrected by the author. Clarendon Press.
Bodin, Jean. (1992). On Sovereignty: Four Chapters from the Six Books of the Commonwealth, edited and translated by Julian H. Franklin. Cambridge University Press.
Buchanan, William J. (2017). Cryptography. River Publishers.
Chalmers, David J. (2022). Reality+: Virtual Worlds and the Problems of Philosophy. W. W. Norton & Company.
Eich, Stefan. (2022). The Currency of Politics: The Political Theory of Money from Aristotle to Keynes. Princeton University Press.
Giddens, Anthony. (1990). The Consequences of Modernity. Polity Press.
Glover, Jonathan. (1990). Utilitarianism and Its Critics. Macmillan Publishing Company.
Graeber, David. (2011). Debt: The First 5,000 Years. Melville House.
Hayek, Friedrich A. (1990). Denationalisation of Money: The Argument Refined. The Institute of Economic Affairs.
Heim, Michael. (1994). The Metaphysics of Virtual Reality. Oxford University Press.
Ingham, Geoffrey. (2004). The Nature of Money. Polity Press.
Jalava, Janne. (2006). Trust as a Decision: The Problems and Functions of Trust in Luhmannian Systems Theory. Department of Social Policy, University of Helsinki.
Jøsang, Audun. (2024). Cybersecurity Technology and Governance. Springer.
Kant, Immanuel. (2002). Groundwork for the Metaphysics of Morals, edited and. translated by Allen W. Wood. Yale University Press.
Kant, Immanuel. (1998). Critique of Pure Reason, edited and translated by Paul Guyer. & Allen W. Wood. Cambridge University Press.
Kant, Immanuel. (1991). The Metaphysics of Morals, translated by Mary Gregor. Cambridge University Press.
Kaur, Gurdip., Habibi Lashkari, Arash., and Sharafaldin, Iman. (2023). Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends. Springer.
Knapp, Georg Friedrich. (1924). The State Theory of Money, translated by Mrs. H. M. Lucas and James Bonar. Royal Economic Society by Macmillan and Company.
Krugman, Paul., and Wells, Robin. (2012). Economics. Worth Publishers.
Lee, Wei-Meng. (2023). Beginning Ethereum Smart Contracts Programming: With Examples in Python, Solidity, and JavaScript. Apress.
Lewis, Antony. (2021). The Basics of Bitcoins and Blockchains: An Introduction to Cryptocurrencies and the Technology That Powers Them. Mango.
Locke, John. (2016). Two Treatises of Government, edited by Lee Ward. Focus.
Luhmann, Niklas. (1993). Risk: A Sociological Theory, translated by Rhodes Barrett. Walter de Gruyter.
Luhmann, Niklas. (1979). Trust and Power, translated by Howard Davis, John Raffan. and Kathryn Rooney, edited by Tom Burns and Gianfranco Poggi. John Wiley & Sons.
Mangrulkar, Ramchandra S., and Chavan, Pallavi V. (2024). Blockchain Essentials: Core Concepts and Implementations. Apress.
Mann, F. A. (1992). The Legal Aspect of Money: With Special Reference to Comparative Private and Public International Law. Oxford University Press.
Marx, Karl. (2015). Capital A Critique of Political Economy Volume I, translated by Samuel Moore and Edward Aveling, edited by Frederick Engels. Progress Publishers.
Merges, Robert P. (2011). Justifying Intellectual Property. Harvard University Press.
Mill, John Stuart. (1885). Principles of Political Economy, edited by J. Laurence Laughlin. D. Appleton and Company.
Mishkin, Frederic S. (2019). The Economics of Money, Banking and Financial Markets. Pearson Education Limited.
Nain, Aditya., and Jung, P. G. (2022). Understanding Money: Philosophical Frameworks of Monetary Value. Routledge Chapman & Hall.
Nozick, Robert. (2001). Anarchy State and Utopia. Blackwell Publishers.
O’Leary, Mike. (2019). Cyber Operations: Building, Defending, and Attacking Modern Computer Networks. Apress.
Poggi, Gianfranco. (1993). Money and the Modern Mind: Georg Simmel's Philosophy of Money. University of California Press.
Prasad, Eswar S. (2021). The Future of Money: How the Digital Revolution Is Transforming Currencies and Finance. Tantor Audio.
Rawls, John. (2005). A Theory of Justice. The Belknap Press of Harvard University Press.
Ricardo, David. (1811). The High Price of Bullion: A Proof of the Depreciation of Bank Notes. John Murray.
Robinson, Joan. (1974). Economic Philosophy. Penguin.
Rubinstein-Salzedo, Simon. (2018). Cryptography. Springer.
Scharfman, Jason. (2023). The Cryptocurrency and Digital Asset Fraud Casebook. Palgrave Macmillan.
Scharfman, Jason. (2024). The Cryptocurrency and Digital Asset Fraud Casebook, Volume II. Palgrave Macmillan.
Schwenk, Jörg. (2022). Guide to Internet Cryptography: Security Protocols and Real World Attack Implications. Springer.
Seligman, Adam B. (1997). The Problem of Trust. Princeton University Press.
Simmel, Georg. (2004). The Philosophy of Money, translated by David Frisby. Routledge.
Smith, Adam. (1976). An Inquiry into the Nature and Causes of the Wealth of Nations, edited by Edwin Cannan. University of Chicago Press.
Sztompka, Piotr. (2000). Trust: A Sociological Theory. Cambridge University Press.
Tanwar, Sudeep. (2022). Blockchain Technology: From Theory to Practice. Springer.
Von Savigny, Friedrich Carl. (1867). System of the Modern Roman Law Volume I, translated by William Holloway. J. Higginbotham.
Werbach, Kevin. (2018). The Blockchain and the New Architecture of Trust. The MIT Press.
Zhang, S. Thomas. (2024). The Potential and Limitations of Bitcoin and Ethereum: A Framework to Assess Blockchain Projects from a Business and Economics Perspective. Palgrave MacMillan.
Zheng, Gavin., Gao, Longxiang., and Huang, Liqun. (2020). Ethereum Smart Contract Development in Solidity. Springer.
(二)期刊論文
Ahmed, Ishtiaque., Darda, Manan., and Nath, Siddhanth. (2021). Blockchain: A New Safeguard to Cybersecurity. Pp. 271–284 in Blockchain Technology: Applications and Challenges, edited by Sandeep Kumar Panda, Ajay Kumar Jena, Santosh Kumar Swain and Suresh Chandra Satapathy. Springer.
Ammous, Saifedean. (2018). Can cryptocurrencies fulfil the functions of money?. The Quarterly Review of Economics and Finance 70:38-51.
Barbalet, J.M. (1996). Social Emotions: Confidence, Trust and Loyalty. International Journal of Sociology and Social Policy 16:75-96.
Bele, Julija L. (2021). Cryptocurrencies as facilitators of cybercrime. SHS Web of Conferences 111:1-6.
Benedetti, Hugo., McKeon, Stephen., and Pfiffer, Cameron. (2021). Blockchain Trading and Exchange. Pp. 337–368 in The Palgrave Handbook of Technological Finance, edited by Raghavendra Rau, Robert Wardrop and Luigi Zingales. Springer.
Brighente, Alessandro., Conti, Mauro., and De Salve, Andrea. (2024). The Ethereum Blockchain: Implementation and Security Aspects. Pp. 109–145 in Blockchains: A Handbook on Fundamentals, Platforms and Applications, edited by Sushmita Ruj, Salil S. Kanhere and Mauro Conti. Springer.
Calafos, Michael W. and Dimitoglou, George. (2022). Cyber Laundering: Money Laundering from Fiat Money to Cryptocurrency. Pp. 271-300 in Principles and Practice of Blockchains, edited by Kevin Daimi, Ioanna Dionysiou and Nour El Madhoun. Springer.
Chen, Yuan., Yang, Liang. and Tian, Ling. (2022). A Study of Orphan Blocks in Public Blockchain. Pp. 220-223 in 2022 IEEE 2nd International Conference on Data Science and Computer Application. IEEE.
Chohan, Usman W. (2018). The Problems of Cryptocurrency Thefts and Exchange Shutdowns. SSRN Electronic Journal (March 7, 2018).
Crockett, Andrew. (1981). Determinants of exchange rate movements: a review. Finance & Development 18:33-37.
Croman, Kyle., Decker, Christian., Eyal, Ittay., Gencer, Adem Efe., Juels, Ari., Kosba, Ahmed., Miller, Andrew., Saxena, Prateek., Shi, Elaine., Sirer, Emin Gün., Song, Dawn., and Wattenhofer, Roger. (2016). On Scaling Decentralized Blockchains. Pp. 106-125 in Financial Cryptography and Data Security, edited by Jeremy Clark, Sarah Meiklejohn, Peter Y.A. Ryan, Dan Wallach, Michael Brenner and Kurt Rohloff. Springer.
Deirmentzoglou, Evangelos., Papakyriakopoulos, Georgios. and Patsakis, Constantinos. (2019). A Survey on Long-Range Attacks for Proof of Stake Protocols. IEEE Access 7: 28712-28725.
Demeyer, Serge., Rocha, Henrique. and Verheijke, Darin. (2022). Refactoring Solidity Smart Contracts to Protect Against Reentrancy Exploits. Pp. 324-344 in Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering, edited by Tiziana Margaria and Bernhard Steffen. Springer.
Foley, Sean., Karlsen, Jonathan R., and Putnins, Talis J. (2019). Sex, Drugs, and Bitcoin: How Much Illegal Activity Is Financed Through Cryptocurrencies?. The Review of Financial Studies 32(5):1798–1853.
Gandhi, Charu., Shukla, Nitin., Kaur, Gagandeep. and Yadav, Kusum. (2021). Blockchain Technology: Concept, Applications, Challenges, and Security Threats. Pp. 77-104 in Blockchain Applications in IoT Ecosystem, edited by Tanupriya Choudhury, Abhirup Khanna, Teoh Teik Toe, Madhu Khurana and Nguyen Gia Nhu. Springer.
Gervais, Arthur., Ritzdorf, Hubert., O. Karame, Ghassan., and Čapkun, Srdjan. (2015). Tampering with the delivery of blocks and transactions in Bitcoin. Pp. 692 – 705 in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CSS 2015), edited by Indrajit Ray. Association for Computing Machinery.
Godlove, Nicholas. (2014). Regulatory Overview of Virtual Currency. Oklahoma Journal of Law and Technology 10(1): number 1, article 2.
Gordon, James D., III. (2011). Defining a Common Enterprise in Investments Contracts. Ohio State Law Journal 72(1):59-94.
Grinberg, Reuben. (2011). Bitcoin: An Innovative Alternative Digital Currency. Hastings Science & Technology Law Journal 4:159-208.
Gupta, Ruchika., Ranjan, Shiv. and Kukreja, Gagan. (2021). Fusion of Blockchain and IoT: The Future of Industry 4.0. Pp. 29-43 in Blockchain Applications in IoT Ecosystem, edited by Tanupriya Choudhury, Abhirup Khanna, Teoh Teik Toe, Madhu Khurana and Nguyen Gia Nhu. Springer.
Hart, Keith. (1986). Heads or Tails? Two Sides of the Coin. Man 21(4): 637-656.
Hazlett, Peter K., and Luther, William J. (2020). Is bitcoin money? And what that means. The Quarterly Review of Economics and Finance 77:144-149.
Heilman, Ethan., Kendler, Alison., Zohar, Aviv. and Goldberg, Sharon. (2015). Eclipse attacks on Bitcoin's peer-to-peer network. Pp. 129-144 in 24th USENIX Security Symposium.
Henning, Justin. (2018). The Howey Test: Are Crypto-Assets Investment Contracts?. University of Miami Business Law Review 27:51-74.
Humphrey, Caroline. (1985). Barter and Economic Disintegration. Man 20(1): 48-72.
Jena, Ajay Kumar. and Dash, Sujata Priyambada. (2021). Blockchain Technology: Introduction, Applications, Challenges. Pp. 1–11 in Blockchain Technology: Applications and Challenges, edited by Sandeep Kumar Panda, Ajay Kumar Jena, Santosh Kumar Swain and Suresh Chandra Satapathy. Springer.
Katal, Avita., Sethi, Vitesh., and Lamba, Saksham. (2021). Blockchain Consensus Algorithms: Study and Challenges. Pp. 45-64 in Blockchain Applications in IoT Ecosystem, edited by Tanupriya Choudhury, Abhirup Khanna, Teoh Teik Toe, Madhu Khurana and Nguyen Gia Nhu. Springer.
Kiktenko, E. O., Kudinov, M. A., and Fedorov, A. K. (2019). Detecting Brute-Force Attacks on Cryptocurrency Wallets. Pp. 232-242 in Business Information Systems Workshops, edited by Witold Abramowicz and Rafael Corchuelo. Springer.
Kleineke, Hannes. (2016). The prosecution of counterfeiting in Lancastrian England. Pp. 213-226 in Medieval Merchants and Money: Essays in Honour of James L. Bolton, edited by Martin Allen and Matthew Davies. University of London Press.
Kothari, Namrata. (2023). Cryptocurrency Fraud: A Glance into the Perimeter of Fraud. Pp. 109–129 in Financial Crimes: A Guide to Financial Exploitation in a Digital Age, edited by Chander Mohan Gupta. Springer.
Larue, Louis. (2024). John Searle’s Ontology of Money and Its Critics. Pp. 721-741 in The Palgrave Handbook of Philosophy and Money: Volume 2: Modern Thought, edited by Joseph J. Tinguely. Palgrave Macmillan.
Lastowka, F. Gregory. and Hunter, Dan. (2004). The Laws of the Virtual Worlds. California Law Review 92(1):1-73.
Leath, Jessica L. (2019). Is Bitcoin Reminiscent of Past Bubbles?. University of Tennessee at Chattanooga Honors Theses.
Levulytė, Laura. and Šapkauskienė, Alfreda. (2021). Cryptocurrency in context of fiat money functions. The Quarterly Review of Economics and Finance 82:44-54.
Lys, Léonard. and Potop-Butucaru, Maria. (2022). Distributed Blockchain Price Oracle. Pp. 37–51 in Networked Systems, edited by Mohammed-Amine Koulali and Mira Mezini. Springer.
Madhushanie, Nadisha., Vidanagamachchi, Sugandima., and Arachchilage, Nalin. (2024). Selfish mining attack in blockchain: a systematic literature review. International Journal of Information Security 23: 2333–2351.
Maginnis, Mary E. (2017). Money for Nothing: The Treatment of Bitcoin in Section 550 Recovery Actions. University of Pennsylvania Journal of Business Law 20(2):485-519.
Medearis, John. (2005). Labor, Democracy, Utility, and Mill's Critique of Private Property. American Journal of Political Science 49(1):135-149.
Merlec, Mpyana Mwamba. and In, Hoh Peter. (2024). Blockchain-Based Decentralized Storage Systems for Sustainable Data Self-Sovereignty: A Comparative Study. Sustainability 17: Article number 7671.
Mitchell-Innes, Alfred. (1913). What Is Money?. The Banking Law Journal 30(5):377-408.
Mitchell-Innes, Alfred. (1914). The Credit Theory of Money. The Banking Law Journal 31:151-168.
Mill, John Stuart. (1869). Thornton on Labour and Its Claims Part II. Fortnightly review 5(30):680-700.
Nguyen, Minh Hong., Thanh, Binh Nguyen., Pham, Huy. and Pham, Thi Thu Tra. (2025). The determinants of funding liquidity risk in decentralized lending. Global Finance Journal 64: Article number 101055.
Nowroozi, Ehsan., Seyedshoari, Seyedsadra., Mekdad, Yassine., Savaş, Erkay. and Conti, Mauro. (2022). Cryptocurrency Wallets: Assessment and Security. Pp. 1-19 in Blockchain for Cybersecurity in Cyber-Physical Systems, edited by Yassine Maleh, Mamoun Alazab and Imed Romdhani. Springer.
Nuzzi, Lucas., Waters, Kyle., and Andrade, Mat´ıas. (2024). Breaking BFT: Quantifying the Cost to Attack Bitcoin and Ethereum. SSRN Working Paper, Feb. 15, 2024. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4727999 .
Otta, Soumya Prakash. and Panda, Subhrakanta. (2021). Cloud Identity and Access Management Solution with Blockchain. Pp. 243-270 in Blockchain Technology: Applications and Challenges, edited by Sandeep Kumar Panda, Ajay Kumar Jena, Santosh Kumar Swain and Suresh Chandra Satapathy. Springer.
Papadopoulos, Pavlos., Pitropakis, Nikolaos. and Buchanan, William J. (2022). Decentralized Privacy: A Distributed Ledger Approach. Pp. 1805–1830 in Handbook of Smart Materials, Technologies, and Devices, edited by Chaudhery Mustansar Hussain, Paolo Di Sia. Springer.
Parisi, Carlo., Budorin, Dyma., and Khalavka, Ostap. (2023). Wallet Security. Pp. 61-79 in A Comprehensive Guide for Web3 Security, edited by Ken Huang, Dyma Budorin, Lisa JY Tan, Winston Ma and Zhijun William Zhang. Springer.
Prentis, Mitchell. (2015). Digital Metal: Regulating Bitcoin as a Commodity. Case Western Reserve Law Review 66(2):609-638.
Saad, Muhammad., Spaulding, Jeffrey., Njilla, Laurent., Kamhoua, Charles., Shetty, Sachin., Nyang, DaeHun. and Mohaisen, David. (2020). Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Communications Surveys and Tutorials 22(3):1977-2008.
Saad, Muhammad., Thai, My T. and Mohaisen, Aziz. (2018). POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization. Pp. 809-810 in Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security.
Saini, Yuvraj Singh., Sharma, Lucky., Chawla, Pronika. and Parashar, Sanidhya. (2022). Social Engineering Attacks. Pp. 497–509 in Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2022, Volume 1, edited by Paramartha Dutta, Satyajit Chakrabarti, Abhishek Bhattacharya, Soumi Dutta and Vincenzo Piuri. Springer.
Saxena, Rohit., Arora, Deepak., Nagar, Vishal. and Mahapatra, Satyasundara. (2021). Bitcoin: A Digital Cryptocurrency. Pp. 13-28 in Blockchain Technology: Applications and Challenges, edited by Sandeep Kumar Panda, Ajay Kumar Jena, Santosh Kumar Swain and Suresh Chandra Satapathy. Springer.
Schär, Fabian. (2021). Decentralized Finance: On Blockchain- and Smart Contract-based Financial Markets. Federal Reserve Bank of St. Louis Review 103(2):153-174.
Shah, Javeriya. and Parveen, Suraiya. (2021). Understanding the Blockchain Technology Beyond Bitcoin. Pp. 499–516 in Advances in Industrial and Production Engineering, edited by Rakesh Kumar Phanden, K. Mathiyazhagan, Ravinder Kumar and J. Paulo Davim. Springer.
Sharma, Ayushi. Tiwari, Shashwat., Arora, Nitin. and Sharma, Subhash C. (2021). Introduction to Blockchain. Pp. 1-14 in Blockchain Applications in IoT Ecosystem, edited by Tanupriya Choudhury, Abhirup Khanna, Teoh Teik Toe, Madhu Khurana and Nguyen Gia Nhu. Springer.
Shawver, Josephine. (2021). Commodity or Currency: Cryptocurrency Valuation in Bankruptcy and the Trustee's Recovery Powers. Boston College Law Review 62(6):2013-2055.
Stroukal, Dominik. (2018). Can Bitcoin Become Money? Its Money Functions and the Regression Theorem. International Journal of Business and Management 6(1):36-53.
Swartz, Nicole D. (2014). Bursting the Bitcoin Bubble: The Case to Regulate Digital Currency as a Security or Commodity. Tulane Journal of Technology and Intellectual Property 17:319-335.
Tripathi, Ashish. Choudhary, Arjun., Arora, Sandeep Kumar., Arora, Gautam., Shakya, Gargi. and Rajwanshi, Bhavya. (2024). Crypto Bank: Cryptocurrency Wallet Based on Blockchain. Pp. 223-236 in Recent Trends in Image Processing and Pattern Recognition, edited by KC Santosh, Aaisha Makkar, Myra Conway, Ashutosh K. Singh, Antoine Vacavant, Anas Abou el Kalam, Mohamed-Rafik Bouguelia and Ravindra Hegadi. Springer.
Walch, Angela. (2017). The Path of the Blockchain Lexicon (and the Law). Review of Banking & Financial Law 36:713-765.
Walshaw, Jill. (2012). Counterfeiting in 18th-Century France: Political Rhetoric and Social Realities. Journal of the Western Society for French History 40:45-57.
Werapun, Warodom., Karode, Tanakorn., Arpornthip, Tanwa., Suaboot, Jakapan., Sangiamkul, Esther. and Boonrat, Pawita. (2023). The Flash Loan Attack Analysis (FAA) Framework—A Case Study of the Warp Finance Exploitation. Informatics 10(1): article 3.
Wray, L. Randall. (1998). Money and Taxes: The Chartalist Approach. Jerome Levy Economics Institute Working Paper Number 222.
Xue, Yue., Fu, Jialu., Su, Shen., Bhuiyan, Zakirul Alam., Qiu, Jing., Lu, Hui., Hu, Ning. and Tian, Zhihong. (2022). Preventing Price Manipulation Attack by Front-Running. Pp. 309-322 in Advances in Artificial Intelligence and Security, edited by Xingming Sun, Xiaorui Zhang, Zhihua Xia and Elisa Bertino. Springer.
Yousuf, Rameez., Jeelani, Zubair., Bhat, Owais. and Bhat, Javaid Iqbal. (2024). Exploring DeFi: Foundations, Applications, and Challenges. Pp. 179-196 in Intelligent Signal Processing and RF Energy Harvesting for State of art 5G and B5G Networks, edited by Javaid A. Sheikh, Taimoor Khan and Binod Kumar Kanaujia. Springer.
三、日文文獻
(一)專書
小野清一郎(1956),《新訂刑法講義各論》,15版,有斐閣。
大塚仁(1968),《刑法各論(上卷)》,初版,青林書院新社。
山口厚(2005),《刑法各論》,補訂版,有斐閣。
木村亀二(1958),《刑法各論》,初版復刊,法文社。
中山研一(1990),《刑法各論》,初版,成文堂。
井田良(2018),《講義刑法学・総論》,2版,有斐閣。
內藤謙(2007),《刑法理論の史的展開》,初版,有斐閣。
平川宗信(1995),《刑法各論》,初版,有斐閣。
四宮和夫、能見善久(2005),《民法総則》,7版,弘文堂。
西田典之(2019),《刑法総論》,3版,弘文堂。
西田典之(著)、橋爪隆(補訂)(2018),《刑法各論》,7版,弘文堂。
我妻荣(1963),《新訂民法総則》,日本評論新社。
尾崎道明(2020),《刑事法の基礎理論》,初版,成文堂。
林幹人(1999),《刑法各論》,初版,東京大学出版会。
岩井克人(1993),《貨幣論》,初版,筑摩書房。
春日淳一(2003),《貨幣論のルーマン:社会の経済講義》,初版,勁草書房。
高橋則夫(2022),《刑法各論》,4版,成文堂。
飯島暢(2016),《自由の普遍的保障と哲学的刑法理論》,初版,成文堂。
滝川幸辰(1954),《刑法各論》,5版,世界思想社。
(二)期刊論文
小島秀夫(2017),〈法益論の根本的問題:法益と道徳は対置されうるか〉,《大東法学》,26卷2号,頁1-35。
川口慎二(2007),〈「貨幣の二重の役割」について:ジンメル『貨幣の哲学』の根本問題〉,《広島経済大学創立四十周年記念論文集》,頁1-25。
川端一摩(2019),〈仮想通貨は「通貨」なのか:「支払手段」としての仮想通貨について〉,《調査と情報》,1044号,頁1-10。
山沖義和(2023),〈資金決済法・金融商品取引法の改正経緯から紐解くデジタル決済手段(暗号資産類似)等の定義と注目点〉,《SBI金融経済研究所所報》,4号,頁5-16。
片木進(2007),〈電子マネーの質的変化と今後の課題:貨幣進化からの考察〉,《流通科学大学論集一経済・経営情報編》,16卷1号,頁55-73。
内田幸隆(2011),〈財産犯における可罰性の根拠〉,《刑法雑誌》,50巻2号,頁167-181。
水津太郎(2014),〈民法體系と物概念〉,收錄於吉田克己、片山直也編,《財の多様化と民法学》,頁62-84,商事法務。
古川顕(2019),〈貨幣の起源と貨幣の未来〉,《甲南経済学論集》,59卷3・4号,頁21-57。
佐伯仁志(2004),〈通貨偽造罪の研究〉,《金融研究》,23期,頁117-177。
君塚正臣(2010),〈日本銀行の憲法学:「国家の通貨発行権」の批判的検討〉,《横浜国際経済法学》,18巻3号,頁49-74。
松宮孝明(2007),〈法益論の意義と限界を論ずる意味〉,《刑法雜誌》,47卷1号,頁1-14。
京藤哲久(1995),〈経済刑法における詐欺罪〉,《刑法雑誌》,34巻2号,頁323-335。
京藤哲久(2013),〈刑法から経済刑法へ〉,《明治学院大学法科大学院ローレビュー》,19号,頁13-30。
神谷英礼(1999),〈電子マネーによる貨幣発行自由化論の実現可能性〉,《国際公共政策研究》,4巻1号,頁359-383。
荒川雅行(2022),〈暗号資産と刑事規制:その予備的考察〉,《法と政治》,73 巻1号,頁17-59。
黒川ひとみ(2008),〈誤振込と財産犯の成否:財産の静的安全・動的安全と刑法〉,《慶應法学》,9号,頁151-202。
荻野昭一(2019),〈暗号資産に関する改正資金決済法、改正金商法について〉,《月刊資本市場》,407号,頁54-64。
鄉原信郎(1991),〈財産犯の意義、分類、保護法益〉,收錄於佐藤道夫編,《財產的刑法犯》,頁1-14,青林書院。
梅崎進哉(1996),〈個人の保護と社会法益の構造〉,《刑法雑誌》,35 巻 2 号,頁172-191。
奧邨弘司(2017),〈人工知能が生み出したコンテンツと著作権:著作物性を中心に〉,《パテント》,70卷2号,頁10-19。
嘉門優(2009),〈行為原理と法益論〉,《立命館法学》,327・328合併号,頁192-218。
嘉門優(2015),〈経済刑法と法益論〉,《刑法雑誌》,55巻1号,頁55-69。
-
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/98121-
dc.description.abstract自以加密技術為基礎的虛擬貨幣(Cryptocurrency)問世以來,全球各地之持有人數及規模皆不斷上升,並伴隨著以其為對象之各式侵擾的出現。然而,既有的刑事管制態度卻係在未留意到虛擬貨幣的技術特殊性下貿然地將其納入現行法射程或在借鑑他法下訂立新法;前者主要可聚焦在刑法財產犯罪以及妨害電腦使用犯罪,而後者則可見《虛擬資產服務法》草案之情形。因此,對虛擬貨幣侵擾的攻擊型態以及虛擬貨幣的本質等問題,已成為今日在分析虛擬貨幣侵擾時所必須深度探討的面向。
為了釐清虛擬貨幣侵擾的刑事管制正當性及具體規制途徑,本文將首先從技術層面著手,透過指出各種虛擬貨幣侵擾之特殊性以發覺其與現行法間的齟齬之處。再者,若認為現行法並無法妥適地回應此類侵擾行為,則關鍵問題應在虛擬貨幣的本質究竟為何,蓋此將影響在理念上是否以及如何經由刑法加以規制;此處,本文將借用若干哲學及社會學的觀點來釐清虛擬貨幣的本質,並得出虛擬貨幣在本質上可能係貨幣或財產之觀察。最後,則必須立基於上述對虛擬貨幣的觀察,具體指明那些本文整理的虛擬貨幣侵擾態樣應否及以何種方式受到刑法規制;在結論上,本文主張那些以虛擬貨幣系統為攻擊的行為態樣若係以具備貨幣特徵的虛擬貨幣為對象,則應透過立法論上所建議的妨害貨幣體制運作罪處罰,著重在破壞擁有者與虛擬貨幣之歸屬關係的行為態樣則應經由解釋論取徑而透過現行財產犯罪進行規制。
zh_TW
dc.description.abstractSince the advent of cryptocurrencies, the number of holders and the scale of transactions worldwide have continued to increase, accompanied by the emergence of various forms of intrusion targeting such digital units. Yet existing approaches to criminal regulation, undertaken without sufficient regard for the technical specificities of cryptocurrencies, have either hastily extended the scope of existing laws to cover them or introduced new legislation modeled on foreign frameworks. The former is primarily reflected in the application of property crimes and computer misuse offenses under the Criminal Code, while the latter is exemplified by the draft Virtual Asset Service Act. Accordingly, understanding both attack patterns and the ontological status of cryptocurrencies is essential for assessing appropriate criminal responses.
To clarify both the normative legitimacy and the concrete legal pathways for criminal regulation of infringements against cryptocurrencies, this article begins with a technical analysis of intrusion patterns, exposing their misalignment with current legal frameworks. Where existing law proves insufficient, the inquiry turns to the ontological status of cryptocurrency—whether it should be treated as “money” or “property”— drawing on philosophical and sociological perspectives. Building on the foregoing conceptual analysis, the article specifies which of the previously identified intrusion patterns warrant criminal regulation, arguing that attacks on cryptocurrencies with monetary characteristics that undermine system integrity should give rise to a new offense of “undermining the monetary system,” whereas infringements on ownership interests should be addressed under existing property crime doctrines.
en
dc.description.provenanceSubmitted by admin ntu (admin@lib.ntu.edu.tw) on 2025-07-29T16:07:24Z
No. of bitstreams: 0
en
dc.description.provenanceMade available in DSpace on 2025-07-29T16:07:24Z (GMT). No. of bitstreams: 0en
dc.description.tableofcontents口試委員審定書 ....................................................................................................................................... I
謝辭 ......................................................................................................................................................... II
中文摘要 ................................................................................................................................................ VI
英文摘要 ............................................................................................................................................... VII
目次 ..................................................................................................................................................... VIII
第一章 緒論 ............................................................................................................................................. 1
第一節 研究動機及問題意識 ............................................................................................................ 1
第二節 研究範圍及研究限制 ............................................................................................................ 3
第三節 研究方法及研究架構 ............................................................................................................ 4
第二章 虛擬貨幣的技術及現行刑法管制途徑概覽 ............................................................................ 6
第一節 虛擬貨幣的技術概覽 ............................................................................................................ 6
第一項 密碼學及其應用 ............................................................................................................... 6
第一項 區塊鏈技術 ....................................................................................................................... 9
第二項 比特幣(Bitcoin) ......................................................................................................... 16
第三項 以太坊(Ethereum) ..................................................................................................... 22
第四項 小結 ................................................................................................................................. 30
第二節 虛擬貨幣犯罪型態及其可能的刑法管制途徑 .................................................................. 30
第一項 行為態樣的區分標準 ..................................................................................................... 31
第二項 利用區塊鏈技術且透過攻擊區塊鏈以實現的侵擾行為 ............................................. 34
第一款 主鏈取代型.................................................................................................................................. 35
第二款 系統癱瘓型.................................................................................................................................. 42
第三款 資訊截堵型.................................................................................................................................. 45
第四款 漏洞利用型.................................................................................................................................. 50
第五款 小結.............................................................................................................................................. 54
第三項 利用區塊鏈技術但未透過攻擊區塊鏈所實現的侵擾行為 ......................................... 54
第一款 詐術利用型.................................................................................................................................. 55
第二款 貨幣竊取型.................................................................................................................................. 59
第三款 市場侵擾型.................................................................................................................................. 62
第四款 小結.............................................................................................................................................. 67
第三項 與虛擬貨幣相關的傳統侵擾行為 ................................................................................. 67
第一款 虛擬貨幣詐騙.............................................................................................................................. 68
第二款 虛擬貨幣洗錢.............................................................................................................................. 69
第三款 去中心化借貸.............................................................................................................................. 70
第三節 小結 ................................................................................................................................. 72
第三章 管制虛擬貨幣侵擾的刑事正當性 .......................................................................................... 77
第一節 虛擬貨幣的定性 .................................................................................................................. 77
第一項 虛擬貨幣作為一種騙局? ............................................................................................. 77
第二項 虛擬貨幣作為一種商品? ............................................................................................. 80
第三項 虛擬貨幣作為一種有價證券? ..................................................................................... 83
第四項 虛擬貨幣作為一種智慧財產? ..................................................................................... 87
第五項 本文見解:虛擬貨幣作為一種貨幣 ............................................................................. 90
第一款 經濟學的貨幣概念 ......................................................................................................... 91
第二款 既有觀點的正反論爭 ..................................................................................................... 93
第三款 重新理解貨幣的內涵 ..................................................................................................... 98
第一目 商品貨幣理論與以物易物神話.................................................................................................. 98
第二目 信用貨幣理論及其可能的疑義................................................................................................ 105
第三目 貨幣作為一種體制性與財產性並存的交易媒介.................................................................... 110
第四目 貨幣的體制性意義.................................................................................................................... 115
第五目 貨幣的財產性意義.................................................................................................................... 121
第六目 小結............................................................................................................................................ 127
第四款 虛擬貨幣的貨幣適格性 ............................................................................................... 128
第六項 小結 ............................................................................................................................... 134
第二節 管制虛擬貨幣侵擾的刑事正當性 .................................................................................... 135
第一項 以法益保護為核心的刑法觀 ....................................................................................... 136
第二項 財產法益內涵的再確認 ............................................................................................... 143
第一款 自由法理念下的財產法益內涵................................................................................................ 144
第二款 對既有財產犯罪之規制方式的質疑及重構............................................................................ 150
第三項 重新理解貨幣犯罪的保護法益 ................................................................................... 155
第一款 國家的貨幣高權?.................................................................................................................... 155
第二款 貨幣的公共信用?.................................................................................................................... 157
第三款 結合貨幣高權與公共信用的複合法益?................................................................................ 159
第四款 本文見解:以整體貨幣體制作為保護法益............................................................................ 160
第四項 虛擬貨幣應受刑法保護 ............................................................................................... 163
第三節 小結 .................................................................................................................................... 165
第四章 管制虛擬貨幣侵擾之立法建議及解釋策略 ........................................................................ 168
第一節 《虛擬資產服務法》草案概覽及其疑義 ........................................................................ 168
第一項 虛資法草案內容概覽 ................................................................................................... 168
第二項 草案管制框架的可能疑義 ........................................................................................... 170
第一款 保護法益部分............................................................................................................................ 171
第二款 條文結構部分............................................................................................................................ 172
第三項 小結 ............................................................................................................................... 174
第二節 第一類行為的刑事管制:以立法論為核心 .................................................................... 176
第一項 現行貨幣刑法之立法架構評析 ................................................................................... 176
第二項 重新建構刑法貨幣犯罪之管制架構 ........................................................................... 179
第三項 第一類行為的可罰性探討 ........................................................................................... 182
第四項 小結 ............................................................................................................................... 186
第三節 第二類行為的刑事管制:以解釋論為核心 .................................................................... 186
第一項 在現行財產犯罪中納入無形財產的解釋論策略 ....................................................... 187
第二項 第二類行為的可罰性探討 ........................................................................................... 189
第三項 小結 ............................................................................................................................... 196
第四節 小結 .................................................................................................................................... 196
第五章 結論 ......................................................................................................................................... 199
參考文獻 ............................................................................................................................................... 203
附論 ....................................................................................................................................................... 224
-
dc.language.isozh_TW-
dc.subject虛擬資產服務法zh_TW
dc.subject虛擬貨幣zh_TW
dc.subject區塊鏈zh_TW
dc.subject貨幣zh_TW
dc.subject系統性信任zh_TW
dc.subject財產權zh_TW
dc.subjectVirtual Asset Service Act.en
dc.subjectProperty Rightsen
dc.subjectSystem Trusten
dc.subjectMoneyen
dc.subjectBlockchainen
dc.subjectCryptocurrencyen
dc.title論虛擬貨幣的刑法管制zh_TW
dc.titleOn the Criminal Regulation of Cryptocurrencyen
dc.typeThesis-
dc.date.schoolyear113-2-
dc.description.degree碩士-
dc.contributor.oralexamcommittee徐育安;黃種甲zh_TW
dc.contributor.oralexamcommitteeYu-An Hsu;Chung-Chia Huangen
dc.subject.keyword虛擬資產服務法,虛擬貨幣,區塊鏈,貨幣,系統性信任,財產權,zh_TW
dc.subject.keywordVirtual Asset Service Act.,Cryptocurrency,Blockchain,Money,System Trust,Property Rights,en
dc.relation.page229-
dc.identifier.doi10.6342/NTU202501878-
dc.rights.note同意授權(全球公開)-
dc.date.accepted2025-07-17-
dc.contributor.author-college法律學院-
dc.contributor.author-dept法律學系-
dc.date.embargo-lift2025-07-30-
顯示於系所單位:法律學系

文件中的檔案:
檔案 大小格式 
ntu-113-2.pdf53.26 MBAdobe PDF檢視/開啟
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved