题名

“維基式犯罪預防”-從日常生活理論談網路犯罪預防模式

并列篇名

Wiki Crime Prevention-What Routine Activity Theory Teaches Us about Cybercrime Prevention

DOI

10.29607/ZHWHGX.200912.0003

作者

張耀中(Yao-Chung Chang)

关键词

網路犯罪 ; 日常生活理論 ; 維基式犯罪預防 ; Cybercrime ; Routine Activity Theory ; Wiki Crime Prevention

期刊名称

犯罪學期刊

卷期/出版年月

12卷2期(2009 / 12 / 01)

页次

87 - 115

内容语文

繁體中文

中文摘要

為協助政府單位或民間建立有效的網路犯罪防範機制,本文擬從Cohen與Felson在1979年所提出之「日常生活理論」出發,分析網路犯罪之成因與預防模式。首先,本文將先檢討「日常生活理論」是否適用於解釋網路犯罪的問題;其次,透過日常生活理論所提之三要素:可能的加害者、合適的標的物以及監控缺乏,討論網路犯罪形成之原因;最後,依據日常生活理論,本文擬從犯罪機會、標的物與監控三方面,提出有效的網路犯罪預防模式。 本文認為,目前網路犯罪問題,在全球法律尚未一致,以及跨國犯罪導致執法困難的情況下,應轉向思考如何強化標的物以及減少犯罪機會的角度出發。由於目前大部分的電腦使用者都是使用「封閉式軟體」,因此網路犯罪的預防以不再是「自掃門前雪」的觀念,而應轉向「維基式犯罪預防」,透過用戶集體的力量,找出軟體的漏洞並進行預警。此外,還可以透過開放原始碼,集合大眾的力量對軟體漏洞及時進行修正,以避免攻擊的發生。

英文摘要

This paper discusses Routine Activity Theory (RAT) and Cybercrime prevention. It examines the applicability of RAT to cybercrime and, through the three elements of RAT, the structure of Cybercrime. Based on RAT, it proposes some possible ways to prevent cybercrime. This paper argues that, due to transnational characteristics of Cybercrime, Cybercrime combating requires all countries to have consistent laws and regulations and Cybercrime investigation capabilities. However, in circumstances of inconsistent laws and regulations and difficulties in investigating Cybercrimes, it suggests that a combination of target hardening and opportunity reduction measures should be emphasized. Cybercrime prevention strategies should not be modeled on traditional crime prevention strategies. This paper proposes ”wiki” crime prevention-that is, users' collaboration online to find breaches and vulnerabilities in software and sharing information on remedial action. Instead of waiting for software companies to fix a breach or vulnerability, it suggests that open source programs should be promoted so that people can devote themselves to the correction of the breaches and vulnerabilities and use the Internet to share information on solution to Cybercrime problems.

主题分类 社會科學 > 社會學
参考文献
  1. Historical Statistics.Retrieved 10 Nov.,2007,from
  2. Choo,K.-K.R.,Smith,R.G,McCusker,R.(2007).Future Directions in Technology-Enabled Crime: 2007-2009.Canberra:Australian Institute of Criminology.
  3. Clarke,R.V.(1999).Hot Products:Understanding,Anticipating and Reducing Demand for Stolen Goods.London:Home Office.
  4. Cohen,L.,Felson,M.(1979).Social change and crime rate trends: A routine activity approach. American Sociological Review,44,588-607.
  5. Felson,M.,R.Paternoster,R.Bachman(Eds.)(2000).The routine activity approach:a very versatile theory of crime Explaining Criminals and Crime.CA:Roxbury.
  6. Grabosky,P.(2007).Requirements of prosecution services to deal with cyber crime. Crime, Law and Social Change,47,201-223.
  7. Routine Activity Theory.Practical Skills.Retrieved 20 Sept 2008 from
  8. Katyal,N.K.(2003).Digital architecture as crime control. Yale Law Journal,112(8),2261-2289.
  9. NO“There”there: Why cyberspace isn't.The Atlantic Monthly,August2000.Retrieved 2 July 2008 from
  10. Lessig,L.(1999).Code and Other Laws of Cyberspace.US:Basic Books.
  11. Lucas,J.R.(1973).A Treatise on Time and Space.London:Methuen.
  12. McGuire,M.(2007).Hypercrime:the New Geometry of Harm.Abingdon.Oxon:Routledge-Cavendish.
  13. Sklar,L.(1977).Space,Time,and Space-time.Berkeley:University of California Press.
  14. Smith,R.,Grabosky,P.,Urbas,G.(2004).Cyber Criminals on Trial.Cambridge:Cambridge University Press.
  15. Taylor,P.A.(2005).From hackers to hacttivists:Speed bumps on the global superhighway.New Media Society,7(5),625-646.
  16. Walkley,S.(2005).Canberra,Australian National University.
  17. Wall,D.S.(2007).Cybercrime.Cambridge:Polity Press.
  18. Broken windows.The Atlantic Monthly,March 1982.Retrieved 31 Oct 2008 from
  19. Wolfgang,M.(1958).Patterns in Criminal Homicide..NY:Wiley.
  20. Yar,M.(2005).The novelty of 'Cybercrime': An assessment in light of routine activity theory.European Journal of Criminology,2(4),407-427.
  21. 李茂生(2004)。刑法新修妨害電腦使用罪章芻議(下)。臺灣本土法學雜誌,56,207-220。
  22. 孟維德(2003)。跨境犯原因論及防制對策之實證研究。臺北:行政院國家科學委員會。
  23. 林宜隆、黃志龍(2005)。2005 年第九屆資訊管理學術暨警政資訊實務研討會論文集。臺北:中央警察大學。
  24. 林宜隆、黃讚松(2002)。網路使用問題分析與犯罪防治之探討。資訊、科技、與社會學報,2,95-114。
  25. 范國勇(2005)。網路犯罪成因與防治對策之研究
  26. 張耀中(2007)。無線網路溢波盜用之法律議題初探。科技法律透析,18(9),16-20。
  27. 張耀中、吳兆瑛(2008)。從美國實務經驗論我國資安事件通報與資訊分享機制。科技法律透析,20(8),39-61。
  28. 張耀中、周絛嫻(2007)。刑事政策與犯罪論文集(十)。臺北:法務部。
  29. 許春金(2000)。犯罪學理論。臺北:三民。
  30. 馮震宇(2003)。網路犯罪與網路犯罪公約(下)。月旦法學教室,5,115-124。
  31. 馮震宇(2003)。月旦法學教室
  32. 廖有祿、李相臣(2003)。電腦犯罪一理論與實務。臺北:五南圖書出版公司。
被引用次数
  1. CHANG, LENNON YAO-CHUNG(2012).Responsive Regulation and the Reporting of Information Security Incidents-Taiwan and China.Issues & Studies,48(1),85-119.