期刊文献+
共找到351篇文章
< 1 2 18 >
每页显示 20 50 100
基于CRIME理论的^(*)ST宜生财务舞弊案例研究 被引量:1
1
作者 吕晶晶 《财务管理研究》 2024年第1期54-59,共6页
资本市场不断完善对我国经济发展起到重要的推动作用,但同时财务舞弊事件也层出不穷。上市公司财务舞弊行为严重侵害了投资者权益,扰乱了我国资本市场的正常运行,不利于社会经济健康发展。运用CRIME理论,分别从造假行为人、造假手段、... 资本市场不断完善对我国经济发展起到重要的推动作用,但同时财务舞弊事件也层出不穷。上市公司财务舞弊行为严重侵害了投资者权益,扰乱了我国资本市场的正常运行,不利于社会经济健康发展。运用CRIME理论,分别从造假行为人、造假手段、造假动因、监督机制、造假结果5个方面对^(*)ST宜生财务舞弊事件进行分析,厘清了财务舞弊的来龙去脉,并针对性地从公司、会计师事务所和监管机制3个角度提供启示,希望对相关主体具有借鉴意义,减少财务舞弊行为的发生,肃清资本市场不良风气。 展开更多
关键词 财务舞弊 crime理论 内部控制
下载PDF
基于CRIME理论的康美药业财务造假分析及防范研究
2
作者 方欣 刘龙青 《江苏商论》 2024年第7期97-100,共4页
随着经济的快速发展,资本市场中财务造假事件频繁发生,损害了中小股东的利益,给债权人、广大投资者乃至社会带来了巨大的损失。利用传统财务指标对舞弊手段进行识别的作用有限,提出的解决措施治标不治本。因此,需要采用系统的理论对上... 随着经济的快速发展,资本市场中财务造假事件频繁发生,损害了中小股东的利益,给债权人、广大投资者乃至社会带来了巨大的损失。利用传统财务指标对舞弊手段进行识别的作用有限,提出的解决措施治标不治本。因此,需要采用系统的理论对上市公司财务舞弊进行深入分析,才能提出针对性的治理对策。本文运用CRIME舞弊行为理论,从舞弊者、舞弊手段、舞弊动机、监管机制、舞弊后果五个角度,对康美药业舞弊现象进行剖析,针对产生的问题提出了相应的预防措施,以期增强投资者的风险辨识能力。 展开更多
关键词 康美药业 crime舞弊行为理论 财务舞弊
下载PDF
从CRIME理论看公司财务造假
3
作者 张馨仪 吴留全 《合作经济与科技》 2024年第12期133-135,共3页
随着经济的飞速发展,我国上市公司数量逐年增加,但并不是所有的上市公司都能够保持持续盈利或者在行业中占据主导地位,财务造假严重影响着正常的经济运作规律,给社会带来巨大的危害。本文从CRIME理论五个因素出发,以中信国安公司财务造... 随着经济的飞速发展,我国上市公司数量逐年增加,但并不是所有的上市公司都能够保持持续盈利或者在行业中占据主导地位,财务造假严重影响着正常的经济运作规律,给社会带来巨大的危害。本文从CRIME理论五个因素出发,以中信国安公司财务造假为案例,对该公司造假者、造假手段、造假动机、监管机制、最终后果进行探究,从中寻找启示。 展开更多
关键词 上市公司 财务造假 crime理论
下载PDF
A Survey of Crime Scene Investigation Image Retrieval Using Deep Learning
4
作者 Ying Liu Aodong Zhou +1 位作者 Jize Xue Zhijie Xu 《Journal of Beijing Institute of Technology》 EI CAS 2024年第4期271-286,共16页
Crime scene investigation(CSI)image is key evidence carrier during criminal investiga-tion,in which CSI image retrieval can assist the public police to obtain criminal clues.Moreover,with the rapid development of deep... Crime scene investigation(CSI)image is key evidence carrier during criminal investiga-tion,in which CSI image retrieval can assist the public police to obtain criminal clues.Moreover,with the rapid development of deep learning,data-driven paradigm has become the mainstreammethod of CSI image feature extraction and representation,and in this process,datasets provideeffective support for CSI retrieval performance.However,there is a lack of systematic research onCSI image retrieval methods and datasets.Therefore,we present an overview of the existing worksabout one-class and multi-class CSI image retrieval based on deep learning.According to theresearch,based on their technical functionalities and implementation methods,CSI image retrievalis roughly classified into five categories:feature representation,metric learning,generative adversar-ial networks,autoencoder networks and attention networks.Furthermore,We analyzed the remain-ing challenges and discussed future work directions in this field. 展开更多
关键词 crime scene investigation(CSI)image image retrieval deep learning
下载PDF
Addressing Japan’s disposal of nuclear-contaminated water from the perspective of international human rights law
5
作者 Yen-Chiang Chang Xiaonan Zhao 《Chinese Journal of Population,Resources and Environment》 2024年第1期1-9,共9页
The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually ente... The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard. 展开更多
关键词 Fukushima nuclearcontaminated water crimes against humanity Remedy for violations of human rights Right to environment Right to life
下载PDF
基于CRIME理论视角下东方金钰财务舞弊分析
6
作者 任玥 《金融》 2024年第3期1020-1026,共7页
近年来,随着资本市场的不断完善,我国经济得到了高速发展,但与此同时伴随着上市公司财务舞弊行为的频繁发生,这不仅极大损害了投资者的利益,还严重影响了资本市场的诚信机制。因此,对上市公司财务舞弊行为进行有效识别与采取防范手段极... 近年来,随着资本市场的不断完善,我国经济得到了高速发展,但与此同时伴随着上市公司财务舞弊行为的频繁发生,这不仅极大损害了投资者的利益,还严重影响了资本市场的诚信机制。因此,对上市公司财务舞弊行为进行有效识别与采取防范手段极为重要。本文以东方金钰财务造假案件为例,运用CRIME理论,分别从舞弊行为人、舞弊手段、舞弊动因、监管机制、舞弊结果五个方面对东方金钰财务舞弊事件进行分析,并针对这五个方面提出有关的建议。希望对相关研究具有借鉴意义,以减少财务舞弊行为的发生。 展开更多
关键词 财务舞弊 crime理论 东方金钰 案例研究 舞弊手段
下载PDF
The Windy City’s Dark Side: A Statistical Exploration of Crime in the City of Chicago
7
作者 Clement Odooh Somtobe Olisah +7 位作者 Jane Onwuchekwa Omoshola Owolabi Sevidzem Simo Yufenyuy Oluwadare Aderibigbe Echezona Obunadike Oghenekome Efijemue Saheed Akintayo Samson Edozie 《Journal of Data Analysis and Information Processing》 2024年第3期370-387,共18页
This paper presents a detailed statistical exploration of crime trends in Chicago from 2001 to 2023, employing data from the Chicago Police Department’s publicly available crime database. The study aims to elucidate ... This paper presents a detailed statistical exploration of crime trends in Chicago from 2001 to 2023, employing data from the Chicago Police Department’s publicly available crime database. The study aims to elucidate the patterns, distribution, and variations in crime across different types and locations, providing a comprehensive picture of the city’s crime landscape through advanced data analytics and visualization techniques. Using exploratory data analysis (EDA), we identified significant insights into crime trends, including the prevalence of theft and battery, the impact of seasonal changes on crime rates, and spatial concentrations of criminal activities. The research leveraged a Power BI dashboard to visually represent crime data, facilitating an intuitive understanding of complex patterns and enabling dynamic interaction with the dataset. Key findings highlight notable disparities in crime occurrences by type, location, and time, offering a granular view of crime hotspots and temporal trends. Additionally, the study examines clearance rates, revealing variations in the resolution of cases across different crime categories. This analysis not only sheds light on the current state of urban safety but also serves as a critical tool for policymakers and law enforcement agencies to develop targeted interventions. The paper concludes with recommendations for enhancing public safety strategies and suggests directions for future research, emphasizing the need for continuous data-driven approaches to effectively address and mitigate urban crime. This study contributes to the broader discourse on urban safety, crime prevention, and the role of data analytics in public policy and community well-being. 展开更多
关键词 crime Analysis Chicago Data Visualization crime Trends Power BI Urban Safety
下载PDF
基于CRIME理论的财务舞弊问题研究——以Z公司为例
8
作者 郭学祯 《行政事业资产与财务》 2024年第6期94-96,共3页
随着数字经济和互联网的兴起,上市公司财务舞弊现象层出不穷。本文基于CRIME理论,从财务的舞弊者、舞弊手段、舞弊动机、舞弊监管机制、舞弊结果五个方面系统分析了Z公司的财务舞弊案例,从内部防范、人员素质、外部监管三个方面提出了建... 随着数字经济和互联网的兴起,上市公司财务舞弊现象层出不穷。本文基于CRIME理论,从财务的舞弊者、舞弊手段、舞弊动机、舞弊监管机制、舞弊结果五个方面系统分析了Z公司的财务舞弊案例,从内部防范、人员素质、外部监管三个方面提出了建议,希望对资本市场的完善有所启示。 展开更多
关键词 财务舞弊 crime理论 管理层
下载PDF
基于CRIME理论的财务舞弊案例分析——以康美药业为例 被引量:1
9
作者 刘佳琳 王雁书 《国际商务财会》 2023年第7期50-53,共4页
康美药业财务舞弊案作为A股史上最大的财务舞弊案,一直备受市场关注。文章基于CRIME理论,从舞弊行为人、舞弊手段、舞弊激励、监管机制、结果五个方面系统全面地分析了康美药业财务舞弊案,并从内部监管与外部监管两方面提出建议。
关键词 财务舞弊 crime理论 康美药业
下载PDF
基于CRIME理论的瑞幸咖啡财务造假案例分析 被引量:1
10
作者 李若琦 《现代商业》 2023年第11期189-192,共4页
伴随着我国资本市场的高速发展,财务造假事件频发,造假手法也越来越复杂,造假事件恶劣程度愈演愈烈。目前,识别造假行为难度越来越大。造假者对市场和投资者毫无敬畏之心,伤害投资者合法利益,扰乱市场秩序,甚至影响了我国经济的健康运... 伴随着我国资本市场的高速发展,财务造假事件频发,造假手法也越来越复杂,造假事件恶劣程度愈演愈烈。目前,识别造假行为难度越来越大。造假者对市场和投资者毫无敬畏之心,伤害投资者合法利益,扰乱市场秩序,甚至影响了我国经济的健康运行。瑞幸咖啡从闪电上市到跌落神坛,其财务造假涉案金额高达22亿元。本文以瑞幸咖啡为案例,首先对其财务造假事件进行回顾,使用CRIME五因素理论分析其财务造假动因,然后对其造假手段进行分析,最后针对瑞幸咖啡现状提出相应的治理措施。 展开更多
关键词 财务造假 crime五因素理论 瑞幸咖啡
下载PDF
基于CRIME五因素论的浪奇财务舞弊案例研究 被引量:1
11
作者 常皓然 钞倩倩 《现代商贸工业》 2023年第13期141-143,共3页
近年来,我国上市公司财务舞弊事件频发,这不仅损害了上市公司的声誉与形象,还使我国资本市场无法健康运行。此次通过CRIME五因素论模型,对浪奇的舞弊主体、舞弊手段、舞弊动机、舞弊监管机制和舞弊造成的后果进行全方位的分析,从上市公... 近年来,我国上市公司财务舞弊事件频发,这不仅损害了上市公司的声誉与形象,还使我国资本市场无法健康运行。此次通过CRIME五因素论模型,对浪奇的舞弊主体、舞弊手段、舞弊动机、舞弊监管机制和舞弊造成的后果进行全方位的分析,从上市公司层面、审计机构层面和政府层面提出预防上市公司舞弊的具体措施,促进我国市场经济健康可持续发展。 展开更多
关键词 crime五因素论 浪奇 财务舞弊
下载PDF
基于CRIME理论的紫晶存储财务舞弊案例分析 被引量:1
12
作者 李佳欣 《经济管理学刊(中英文版)》 2023年第2期122-129,共8页
在以信息披露为“生命线”的注册制下,紫晶存储开了一个恶劣的顶风欺诈上市先例,引起广泛关注。这种行为破坏了市场规律,使众多投资者对市场失去信心。紫晶存储以及相关中介机构负有重大责任。因此,对于注册制上市公司财务舞弊行为的识... 在以信息披露为“生命线”的注册制下,紫晶存储开了一个恶劣的顶风欺诈上市先例,引起广泛关注。这种行为破坏了市场规律,使众多投资者对市场失去信心。紫晶存储以及相关中介机构负有重大责任。因此,对于注册制上市公司财务舞弊行为的识别与治理对策的研究具有重要意义。文章基于CRIME理论,从舞弊行为人(cooks)、舞弊手段(recipes)、舞弊动因(incentives)、监管机制(monitoring)、结果(end result)五个方面系统全面地分析了紫晶存储财务舞弊案,并针对这五个方面提出有关的建议。 展开更多
关键词 财务舞弊 crime理论 紫晶存储
下载PDF
Ontology-Based Crime News Semantic Retrieval System
13
作者 Fiaz Majeed Afzaal Ahmad +3 位作者 Muhammad Awais Hassan Muhammad Shafiq Jin-Ghoo Choi Habib Hamam 《Computers, Materials & Continua》 SCIE EI 2023年第10期601-614,共14页
Every day,the media reports tons of crimes that are considered by a large number of users and accumulate on a regular basis.Crime news exists on the Internet in unstructured formats such as books,websites,documents,an... Every day,the media reports tons of crimes that are considered by a large number of users and accumulate on a regular basis.Crime news exists on the Internet in unstructured formats such as books,websites,documents,and journals.From such homogeneous data,it is very challenging to extract relevant information which is a time-consuming and critical task for the public and law enforcement agencies.Keyword-based Information Retrieval(IR)systems rely on statistics to retrieve results,making it difficult to obtain relevant results.They are unable to understandthe user’s query and thus facewordmismatchesdue to context changes andthe inevitable semanticsof a given word.Therefore,such datasets need to be organized in a structured configuration,with the goal of efficiently manipulating the data while respecting the semantics of the data.An ontological semantic IR systemis needed that can find the right investigative information and find important clues to solve criminal cases.The semantic system retrieves information in view of the similarity of the semantics among indexed data and user queries.In this paper,we develop anontology-based semantic IRsystemthat leverages the latest semantic technologies including resource description framework(RDF),semantic protocol and RDF query language(SPARQL),semantic web rule language(SWRL),and web ontology language(OWL).We have conducted two experiments.In the first experiment,we implemented a keyword-based textual IR systemusing Apache Lucene.In the second experiment,we implemented a semantic systemthat uses ontology to store the data and retrieve precise results with high accuracy using SPARQL queries.The keyword-based system has filtered results with 51%accuracy,while the semantic system has filtered results with 95%accuracy,leading to significant improvements in the field and opening up new horizons for researchers. 展开更多
关键词 Web 3.0 crime ontology semantic web knowledge representation
下载PDF
Crime Prediction Methods Based on Machine Learning:A Survey
14
作者 Junxiang Yin 《Computers, Materials & Continua》 SCIE EI 2023年第2期4601-4629,共29页
The objective of crime prediction,one of the most important technologies in social computing,is to extract useful information from many existing criminal records to predict the next process-related crime.It can aid th... The objective of crime prediction,one of the most important technologies in social computing,is to extract useful information from many existing criminal records to predict the next process-related crime.It can aid the police in obtaining criminal information and warn the public to be vigilant in certain areas.With the rapid growth of big data,the Internet of Things,and other technologies,as well as the increasing use of artificial intelligence in forecasting models,crime prediction models based on deep learning techniques are accelerating.Therefore,it is necessary to classify the existing crime prediction algorithms and compare in depth the attributes and conditions that play an essential role in the analysis of crime prediction algorithms.Existing crime prediction methods can be roughly divided into two categories:those based on conventional machine learning and those based on contemporary deep learning.This survey analyses the fundamental theories and procedures.The most frequently used data sets are then enumerated,and the fundamental procedures of various algorithms are also analyzed in this paper.In light of the insufficient scale of existing data in this field,the ambiguity of data types used to predict crimes,and the absence of public data sets that have a significant impact on the research of algorithm models,this survey proposes the construction of a machine learning-based big data research model to address these issues.Future researchers who will enter this field are provided with a guide to the direction of future research development. 展开更多
关键词 crime prediction machine learning artificial intelligence deep learning
下载PDF
Reconstructing the Data Crime Governance Model from the Perspective of Criminal Compliance
15
作者 Qianshi Wang 《Journal of Contemporary Educational Research》 2022年第4期60-66,共7页
With the advent of the risk society and the era of big data,criminal law must respond to data crime in a more proactive manner.The traditional way of conviction and sentencing adopted by the current criminal law for d... With the advent of the risk society and the era of big data,criminal law must respond to data crime in a more proactive manner.The traditional way of conviction and sentencing adopted by the current criminal law for data crime can no longer meet the requirements of the times.Compliance should be introduced into criminal law to improve the governance system of data crime.There are three ways to incorporate compliance into criminal law:(1)as the exemption cause of enterprise crime;(2)as the general circumstances of sentencing in the General Provisions of Criminal Law of the People’s Republic of China;(3)as the special circumstances of sentencing in the Specific Provisions of Criminal Law of the People’s Republic of China.The latter two approaches are more suited to China’s national conditions. 展开更多
关键词 Criminal compliance Data crime Governance model Risk society Era of big data
下载PDF
Detection and Mapping of Violent Crime Hotspots in Southwestern Nigeria
16
作者 Michael Ajide Oyinloye Suleiman Abdul-Azeez Adegboyega +4 位作者 Francis Omowonuola Akinluyi Akinola Adesuji Komolafe Joseph Olusola Akinyede Olabanji Odunayo Aladejana Samuel Olumide Akande 《Journal of Geographic Information System》 2023年第3期334-365,共32页
The increasing rate of insecurity in Nigeria, especially the southwest requires a paradigm shift from popular approach to crime hotspots detection. This study employed geospatial technologies to integrate spatio-tempo... The increasing rate of insecurity in Nigeria, especially the southwest requires a paradigm shift from popular approach to crime hotspots detection. This study employed geospatial technologies to integrate spatio-temporal crime, social media and field observation data from the communities in all the six states in the southwest to develop crime hotspots that can serve as preliminary information to assist in allocating resources for crime control and prevention. Historical crime data from January 1972 to April, 2021 were compiled and updated with rigorous field survey in September, 2021. The field data were encoded, input to the SPSS 17 and analyzed using descriptive statistics and multivariate analysis. A total 936 crime locations data were geolocated and exported to ArcGIS 10.5 for spatial mapping using point map operation and further imported to e-Spatial web-based and QGIS for the generation of hotspot map using heatmap tool. The results revealed that armed robbery, assassination and cultism were more pronounced in Lagos and Ogun States. Similarly, high incidences of farmers/herdsmen conflicts are observed in Oyo and Osun States. Increasing incidences of kidnapping are common in all the south-western states but very prominent in Ondo, Lagos and Oyo States. Most of the violent crime incidents took place along the highways, with forests being their hideouts. Violent crimes are dominantly caused by high rate of unemployment while farmer/herdsmen conflicts were majorly triggered by the scarcity of grazing fields and destruction of arable crops. The conflicts have resulted in the increasing cases of rape and disruption of social group, intake of hard drugs, cult-related activities, low income and revenue generation, and displacement of farmers and infrastructural damages. The study advocates regular retraining and equipping of security agents, establishment of cattle ranch, and installation of sophisticated IP Camera at the crime hotspots to assist in real-time crime monitoring and management. 展开更多
关键词 Violent crimes crime Hotspots Detection Geospatial Technologies Temporal crime Data Real-Time crime Information
下载PDF
Spatial Pattern and Distribution of Crime in Suleja Lga, Niger State, Nigeria
17
作者 Isaac Utenwojo Ocholi Paul Ojochenemi Abuh +1 位作者 Ademu Samuel Aminu Musa 《Journal of Geographic Information System》 2023年第4期379-390,共12页
The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study ... The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study area. The records of each crime incidence were geocoded. Microsoft Excel was used to collate and organise the crime entries before they were imported into the ArcGIS Pro 2.0 environment. A geodatabase was created where the spatial and aspatial data were encoded and geospatial analysis was performed. The study reveals that the crime distribution pattern is generally clustered with a Global Moran’s I index of 0.097, a Z-score of 1.87, and a P-value < 0.06. Furthermore, the study reveals that armed robbery (61), kidnapping (40), car theft (33), culpable homicide (31), rape (29), and robbery (13) cases rank the highest in crime rate. Equally, findings of the study show that Chaza, Kwamba, Madalla, Suleja central, and Gaboda are the major crime hotspot zones at 90% confidence, as analysed using the Getis-Ord Gi* (Hot spot analysis) spatial statistics tool in ArcGIS Pro 2.0. The research therefore recommends that more effort be put into fighting crime, especially in areas where there are low-security formations, as they mostly have the highest record of crimes committed. Also, the patrol units should be equipped with GPS for better surveillance and real-time tracking of criminal activities. 展开更多
关键词 Urban Security Spatial Pattern crime GIS HOTSPOT INSECURITY
下载PDF
基于CRIME理论的胜通集团财务造假案例研究
18
作者 景涛 《国际会计前沿》 2023年第3期339-344,共6页
财务造假行为对我国资本市场造成多方面负面影响,研究如何防范该行为的发生具有重要的现实意义。胜通集团作为一家民营500强企业之一,仍未能避免实施财务造假行为,并被证监会收录为债券发行人财务造假的典型案件。CRIME理论以造假行为... 财务造假行为对我国资本市场造成多方面负面影响,研究如何防范该行为的发生具有重要的现实意义。胜通集团作为一家民营500强企业之一,仍未能避免实施财务造假行为,并被证监会收录为债券发行人财务造假的典型案件。CRIME理论以造假行为人、造假手段、造假动机、造假监督机制和造假产生的后果作为切入角度,通过对该理论的运用能够较为全面地对胜通集团财务造假行为进行剖析,在此基础上提出相应的治理建议,为财务造假行为的防范提供参考思路。 展开更多
关键词 财务造假 crime理论 案例研究 胜通集团
下载PDF
高空抛物犯罪的类型化评价
19
作者 郭小亮 《中国人民警察大学学报》 2024年第5期57-63,共7页
高空抛物犯罪牵涉诸多不同罪名,需根据法益侵害的差异性进行类型化考察。“情节严重”的高空抛物行为构成高空抛物罪,“情节严重”属于客观违法要素,可从客观危害性和侵害可能性两个维度考察。造成他人轻伤以下的高空抛物行为,构成高空... 高空抛物犯罪牵涉诸多不同罪名,需根据法益侵害的差异性进行类型化考察。“情节严重”的高空抛物行为构成高空抛物罪,“情节严重”属于客观违法要素,可从客观危害性和侵害可能性两个维度考察。造成他人轻伤以下的高空抛物行为,构成高空抛物罪或高空抛物罪和寻衅滋事罪的想象竞合犯。造成他人轻伤以上的高空抛物行为,构成故意伤害罪、故意杀人罪等侵害人身权犯罪。造成财产损失数额较大的高空抛物行为构成高空抛物罪、寻衅滋事罪和故意毁坏财物罪的想象竞合犯。危害公共安全的高空抛物行为,需根据抛掷物品性质和可能发生的结果确定所涉罪名,不宜笼统地认定为以危险方法危害公共安全罪。 展开更多
关键词 高空抛物 类型化 情节严重 高空抛物罪 法益侵害
下载PDF
数据法益的阶层式还原路径与刑法适用
20
作者 孙鹏 《东北农业大学学报(社会科学版)》 2024年第1期78-89,共12页
在既有刑事立法框架下,建构完整的数据法益保护体系首先需要将抽象的数据法益进行还原。耦合式法益还原路径以主体为导向进行数据法益的分配,容易使刑法陷入数据确权的难题之中,且无法回答数据法益与信息法益保护之间的关系。应以阶层... 在既有刑事立法框架下,建构完整的数据法益保护体系首先需要将抽象的数据法益进行还原。耦合式法益还原路径以主体为导向进行数据法益的分配,容易使刑法陷入数据确权的难题之中,且无法回答数据法益与信息法益保护之间的关系。应以阶层式路径还原刑法中的数据法益,即数据载体法益、数据本体法益、信息法益。刑法对数据本体法益的保护实乃对信息法益的预防性保护,当行为人采取侵入性手段获取本就应当被公开的数据时,不必然构成非法获取计算机信息系统数据罪。刑法应当严密信息法益犯罪的法网,适当扩大针对信息法益犯罪罪名的适用。 展开更多
关键词 数据法益 法益还原 信息法益 非法获取计算机信息系统数据罪 侵犯公民个人信息罪
下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部