盗用数字证书删除车辆违章信息行为的定性研究—以何某、 杨某破坏计算机信息系统罪为例

A Qualitative Study on the Eliminating the Use of Digital Certificates to Remove Vehicle Illegal Information Behaviors——A Case Study of He and Yang Destroying Computer Information Systems

传播影响力
本库下载频次:
本库浏览频次:
CNKI下载频次:0

归属院系:

法学院

作者:

刘耀

导师:

蔡英

导师单位:

法学院

学位:

硕士

语种:

其他

关键词:

盗窃;受贿;诈骗;破坏计算机信息系统;财产性利益

摘要:

计算机信息网络已然革新了人们的生活方式。因为信息网络具有开放、专业、快捷等特征,所以在利用计算机实施相关犯罪的场合,其犯罪多具有隐蔽性,对象多具有虚拟性,这也给司法实践带来巨大的挑战。在有关计算机类型案件的审理中,常常出现检察机关起诉的罪名与审判机关最后认定的罪名并不相同的情况,对于涉及利用计算机实施的有关犯罪,究竟以计算机类型犯罪定罪处罚还是按照其他犯罪定罪处罚, 已经成为实践难题。 之所以会有这种情况出现,不仅因为计算机犯罪的理论模糊,也在于其与传统犯罪可能形成牵连犯或想象竞合犯。因此本文选取了利用计算机实施犯罪的案件作为本文研究对象,运用刑法理论对其进行分析论证,意图解决如何准确界定破坏计算机信息系统罪的构成要件,财产犯罪的对象是否包括国家应收罚款,以及在不法原因给付时,如何认定行为人的行为属于诈骗行为等司法实践中常见的疑难问题,同时给出本案定罪量刑的个人意见,并对实践操作提出一些建议,希望对实践中解决此类问题有所裨益。本文共分为四个部分:第一部分,案件的基本情况。本案中,何某、杨某被聘任为交通协管员,二人通过平时工作的机会获取了正式交警的授权数字证书,侵入交管系统非法清除车辆违章信息,从而向违章人员收取处理费。对于行为人的行为构成何罪,有盗窃、诈骗、破坏计算机信息系统或受贿等罪名的争议。本案的争议焦点在于,盗用授权数字证书非法删除车辆违章信息并收取处理费的行为,究竟应该如何定性。第二部分,相关问题的法理分析。争议焦点涉及盗窃罪、诈骗罪、破坏计算机信息系统罪、受贿罪之间此罪与彼罪的界限问题。其中,行为人的身份定性及其行为是否了利用职务之便,是区分受贿罪与其他罪名的关键所在;不法原因给付情形下的诈骗行为定性,决定能否构成诈骗罪;盗窃对象的性质认定,决定是否能构成盗窃罪;而对破坏计算机信息系统罪进行定性分析, 可以帮助我们理解破坏计算机信息系统罪所保护的法益以及与其他罪名竞合处理原则。因此,在法理分析部分,依次分别对“受贿罪之‘主体身份’与‘利用职务便利’”,“诈骗罪定性分析”,“盗窃罪之‘公私财物’界定”,“破坏计算机信息系统罪定性分析”,等问题进行了分析阐述。第三部分,本案的分析与结论。首先,行为人不构成受贿罪,其不是国家工作人员,也没有直接处理违章罚款的职权,不能利用职务之便,进而索取财物。其次,行为人不构成诈骗罪,因为违章人员未陷入错误认识。再次,行为人的行为不构成盗窃罪,违章人员给予的处理费,其在性质上并非国家已经收缴的违章罚款,而是因本案行为人帮忙删除违章信息而给与的回报;而还未收取的国家应收罚款,行为人在主观上没有非法占有的目的。本案行为人的行为构成破坏计算机信息系统罪,其行为符合破坏计算机信息系统罪中第二种行为模式,国家罚款未收到的损失正是被告人破坏计算机信息系统“后果严重”的表现。对被告人的非法所得应予以没收,对违章人员应重新罚款扣分。第四部分,本案的研究启示。第一,明确财产性利益是盗窃罪的犯罪对象,随着信息时代的来临,将财产类型犯罪的对象仅仅局限为有体物和无体物,已经不能满足现代社会对刑法需求。第二,应理清破坏计算机信息系统罪与其他犯罪的竞合问题。因为破坏计算机信息系统罪仅有两种法定刑,同时在现实生活中破坏计算机信息系统罪多作为犯罪的手段行为,其与财产类型犯罪或贪污类型犯罪产生竞合时,如何处理会极大影响犯罪人的量刑。第三,为同类型特殊单位如何预防相似案件的发生提出一些建议,防患于未然。

学科:

刑法学

提交日期

2019-04-11

引用参考

刘耀. 盗用数字证书删除车辆违章信息行为的定性研究—以何某、 杨某破坏计算机信息系统罪为例[D]. 西南政法大学,2018.

全文附件授权许可

知识共享许可协议-署名

  • dc.title
  • 盗用数字证书删除车辆违章信息行为的定性研究—以何某、 杨某破坏计算机信息系统罪为例
  • dc.title
  • A Qualitative Study on the Eliminating the Use of Digital Certificates to Remove Vehicle Illegal Information Behaviors——A Case Study of He and Yang Destroying Computer Information Systems
  • dc.contributor.schoolno
  • 20160042011530
  • dc.contributor.author
  • 刘耀
  • dc.contributor.affiliation
  • 法学院
  • dc.contributor.degree
  • 硕士
  • dc.contributor.childdegree
  • 法律硕士
  • dc.contributor.degreeConferringInstitution
  • 西南政法大学
  • dc.identifier.year
  • 2018
  • dc.contributor.advisor
  • 蔡英
  • dc.contributor.advisorAffiliation
  • 法学院
  • dc.language.iso
  • 其他
  • dc.subject
  • 盗窃;;受贿;;诈骗;;破坏计算机信息系统;;财产性利益
  • dc.subject
  • theft;bribery;fraud;destruction of computer information systems;property interests
  • dc.description.abstract
  • 计算机信息网络已然革新了人们的生活方式。因为信息网络具有开放、专业、快捷等特征,所以在利用计算机实施相关犯罪的场合,其犯罪多具有隐蔽性,对象多具有虚拟性,这也给司法实践带来巨大的挑战。在有关计算机类型案件的审理中,常常出现检察机关起诉的罪名与审判机关最后认定的罪名并不相同的情况,对于涉及利用计算机实施的有关犯罪,究竟以计算机类型犯罪定罪处罚还是按照其他犯罪定罪处罚, 已经成为实践难题。 之所以会有这种情况出现,不仅因为计算机犯罪的理论模糊,也在于其与传统犯罪可能形成牵连犯或想象竞合犯。因此本文选取了利用计算机实施犯罪的案件作为本文研究对象,运用刑法理论对其进行分析论证,意图解决如何准确界定破坏计算机信息系统罪的构成要件,财产犯罪的对象是否包括国家应收罚款,以及在不法原因给付时,如何认定行为人的行为属于诈骗行为等司法实践中常见的疑难问题,同时给出本案定罪量刑的个人意见,并对实践操作提出一些建议,希望对实践中解决此类问题有所裨益。本文共分为四个部分:第一部分,案件的基本情况。本案中,何某、杨某被聘任为交通协管员,二人通过平时工作的机会获取了正式交警的授权数字证书,侵入交管系统非法清除车辆违章信息,从而向违章人员收取处理费。对于行为人的行为构成何罪,有盗窃、诈骗、破坏计算机信息系统或受贿等罪名的争议。本案的争议焦点在于,盗用授权数字证书非法删除车辆违章信息并收取处理费的行为,究竟应该如何定性。第二部分,相关问题的法理分析。争议焦点涉及盗窃罪、诈骗罪、破坏计算机信息系统罪、受贿罪之间此罪与彼罪的界限问题。其中,行为人的身份定性及其行为是否了利用职务之便,是区分受贿罪与其他罪名的关键所在;不法原因给付情形下的诈骗行为定性,决定能否构成诈骗罪;盗窃对象的性质认定,决定是否能构成盗窃罪;而对破坏计算机信息系统罪进行定性分析, 可以帮助我们理解破坏计算机信息系统罪所保护的法益以及与其他罪名竞合处理原则。因此,在法理分析部分,依次分别对“受贿罪之‘主体身份’与‘利用职务便利’”,“诈骗罪定性分析”,“盗窃罪之‘公私财物’界定”,“破坏计算机信息系统罪定性分析”,等问题进行了分析阐述。第三部分,本案的分析与结论。首先,行为人不构成受贿罪,其不是国家工作人员,也没有直接处理违章罚款的职权,不能利用职务之便,进而索取财物。其次,行为人不构成诈骗罪,因为违章人员未陷入错误认识。再次,行为人的行为不构成盗窃罪,违章人员给予的处理费,其在性质上并非国家已经收缴的违章罚款,而是因本案行为人帮忙删除违章信息而给与的回报;而还未收取的国家应收罚款,行为人在主观上没有非法占有的目的。本案行为人的行为构成破坏计算机信息系统罪,其行为符合破坏计算机信息系统罪中第二种行为模式,国家罚款未收到的损失正是被告人破坏计算机信息系统“后果严重”的表现。对被告人的非法所得应予以没收,对违章人员应重新罚款扣分。第四部分,本案的研究启示。第一,明确财产性利益是盗窃罪的犯罪对象,随着信息时代的来临,将财产类型犯罪的对象仅仅局限为有体物和无体物,已经不能满足现代社会对刑法需求。第二,应理清破坏计算机信息系统罪与其他犯罪的竞合问题。因为破坏计算机信息系统罪仅有两种法定刑,同时在现实生活中破坏计算机信息系统罪多作为犯罪的手段行为,其与财产类型犯罪或贪污类型犯罪产生竞合时,如何处理会极大影响犯罪人的量刑。第三,为同类型特殊单位如何预防相似案件的发生提出一些建议,防患于未然。
  • dc.description.abstract
  • Computer information networks have revolutionized people's lifestyles. Because the information network has the characteristics of openness, professionalism, and quickness, when the use of computers to implement related crimes, the crimes are mostly concealed, and the objects are mostly virtual, which makes the judicial staff in China face enormous challenges.In the trial of computer-type cases, it is often the case that the crimes prosecuted by the Procuratorate are not the same as those finally determined by the judicial organs. For criminal offence involving the use of computers, whether to punish by computer-type crimes or conviction according to other crimes Punishment has become a practical problem. The reason for this is not only because of the ambiguity of computer crime, but also because it may form a sin or imaginary match with traditional crime. Therefore, the author selects the case of using computer to commit crimes as the research object of this article, and uses criminal law theory to analyze and demonstrate it, aiming to solve how to judge whether the criminal subject and the actor in the crime of accepting bribes “use the position of the post”, how to accurately define the destruction of computer information. The constituent elements of the system crime, whether the object of the property crime includes the state's receivable fines, and how to identify the property losses of the deceived person when the illegal cause is paid, etc., and other common problems in judicial practice, and give the individual opinion of the conviction and sentencing in this case. And put forward some suggestions for practical operations, and hope to help solve such problems in practice.This article is divided into four parts:The content of the first part is to introduce the basic situation of the case. In this case, he and Yang were hired as traffic assistants. The two obtained the authorized digital certificate of the official traffic police through the opportunity of ordinary work, and invaded the traffic control system to illegally remove the vehicle violation information, thereby charging the illegal personnel for processing fees. There is controversy over the crimes of the actor, theft, fraud, destruction of computer information systems or bribery. The focus of the dispute in this case is how to arbitrarily delete the illegal digital information of the vehicle and collect the handling fee.The content of the second part is the legal analysis of related issues. The focus of the dispute concerns the boundaries between the crime of theft, the crime of fraud, the crime of destroying computer information systems, and the crime of accepting bribes. Among them, whether the identity of the actor and his behavior use the position is the key to distinguishing the crime of accepting bribes and other crimes; what criteria are used to judge whether the victim suffers property loss in the crime of fraud, and whether the behavior can constitute fraud The nature of the theft object determines whether it can constitute theft; and the qualitative analysis of the crime of destroying the computer information system can help us understand the legal interests protected by the crime of destroying computer information systems and the principle of cooperating with other crimes. Therefore, in the jurisprudence analysis section, the definitions of “subject identity and 'utility of the position of accepting bribes”, “definition of victims’ property damage” in the crime of fraud, and “public and private property of theft” are defined. "Destruction of the crime of computer information system", and other issues were analyzed and elaborated. The content of the third part is the analysis and conclusion of this case. First of all, the perpetrator does not constitute a crime of accepting bribes. It is not a national staff member, nor has it directly related to the illegal personnel. It cannot use the position of the position and then obtain property. Secondly, the perpetrator does not constitute a crime of fraud, because the illegal person in the case has not suffered property damage. Thirdly, the behavior of the perpetrator does not constitute theft. The handling fee given by the offender is not the illegal fine that the state has already collected, but the return given by the perpetrator of the case to help delete the illegal information. The country is subject to a fine, and the perpetrator has no objective possession. The behavior of the perpetrator of the case constitutes a crime of destroying the computer information system. Its behavior is in line with the second mode of behavior in the crime of destroying the computer information system. The loss not received by the state fine is the performance of the defendant's destruction of the computer information system. The illegal income of the accused shall be recovered, and the offender shall be fined again.The content of the fourth part is the research enlightenment of this case. First, the definition of property interests is the crime of theft. With the advent of the information age, the object of property type crimes is limited to physical objects and intangibles, which can no longer meet the needs of modern society for criminal law. Second, we should clarify the issue of competing with the crime of destroying computer information systems and other crimes. Because there are only two statutory penalties for the crime of destroying computer information systems, and at the same time, in the real life, the crime of destroying the computer information system is more a crime, and when it competes with the crime of property type or the type of corruption, how to deal with it will greatly affect Sentence of the offender. Third, make some suggestions on how to prevent the occurrence of similar cases in the same type of special units, to prevent problems before they occur.
  • dc.date.issued
  • 2026-03-06
  • dc.date.oralDefense
  • 2018-12-01
回到顶部