
Volume 8, Issue 1
销售型电信诈骗犯罪的辩护策略
- 销售型电信诈骗犯罪的辩护策略
- Vol. 8, Issue 1, Pages: 1-9(2024)
Published: 30 June 2024
DOI:10.12184/wspcyycxWSP2516-413901.20240801
Scan QR Code
Volume 8, Issue 1
广东正平天成律师事务所,510623
Published: 30 June 2024 ,
Scan QR Code
单位.销售型电信诈骗犯罪的辩护策略[J].创业与创新,2024,08(01):1-9.
马洋. 销售型电信诈骗犯罪的辩护策略. [J]. 创业与创新(chuang ye yu chuang xin)
entrepreneurship and innovation(chinese version), 2024, 8(1): 1-9.
单位.销售型电信诈骗犯罪的辩护策略[J].创业与创新,2024,08(01):1-9. DOI: 10.12184/wspcyycxWSP2516-413901.20240801.
马洋. 销售型电信诈骗犯罪的辩护策略. [J]. 创业与创新(chuang ye yu chuang xin)
entrepreneurship and innovation(chinese version), 2024, 8(1): 1-9. DOI: 10.12184/wspcyycxWSP2516-413901.20240801.
随着电信诈骗的多样化和复杂化趋势,销售型电信诈骗犯罪作为新型犯罪模式,挑战了传统刑事辩护的制定。本文通过对销售型电信诈骗的犯罪概述,行为特征及与普通民事欺诈的相似性与差异进行深入剖析,重点关注虚假宣传、夸大产品效果和交易过程中的行为特征。在辩护策略的制定上,提出深入分析故意和主观恶意的界定,分析刑事诈骗罪成立的要素,以及在法庭上的有效辩护战略。同时,通过法律问题的讨论,建议强化消费者权益的保护、明晰刑事法律责任的边界,以及解决法律体系对销售型电信诈骗的不足之处。最终,本文旨在为刑事辩护领域提供新的视角和理论支持,推动法律界更科学、公正地应对销售型电信诈骗犯罪。
销售型电信诈骗犯罪辩护策略
高原(2021). 大学生网络诈骗易感性的影响因素: 心理特质、经验因素与线索加工. 硕士学位论文, 杭州: 浙江大学.
赵雷, 陈红敏(2022). 电信诈骗中青年受骗的影响因素和形成机制研究. 中国青年社会科学, 41(3), 102-112.
Alseadoon, I., Othman, M. F. I., & Chan, T. (2015). What Is the Influence of Users' Characteristics on Their Ability to Detect Phishing Emails? In H. A. Sulaiman, M. A. Othman, M. F. I. Othman, Y. Abd Rahim, & N. C. Pee (Eds.), Advanced Computer and Communication Engineering Technology (pp. 949-962). Springer International Publishing.
Buller, D. B., & Burgoon, J. K. (1996). Interpersonal Deception Theory. Communication Theory, 6, 203-242.
Button, M., Lewis, C., & Tapley, J. (2009). Fraud Typolo-gies and the Victims of Fraud: Literature Review. National Fraud Authority.
Langenderfer, J., & Shimp, T. A. (2001). Consumer Vulnerability to Scams, Swindles, and Fraud: A New Theory of Visceral Influences on Persuasion. Psychology and Mar-keting, 18, 763-783.
Dove, M. (2018). Predicting Individual Differences in Vulnerability to Fraud. Doctoral Dissertation, University of Portsmouth.
Norris, G., & Brookes, A. (2021). Personality, Emotion and Individual Differences in Response to Online Fraud. Personality and Individual Differences, 169, Article 109847.
Ferguson, A. J. (2005). Fos-tering Email Security Awareness: The West Point Carronade. EDUCAUSE Quarterly, 28, 54-57.
Neupane, A., Saxena, N., Kuruvilla, K., Georgescu, M., & Kana, R. K. (2014). Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings. In Proceedings of the Network and Distributed System Security Symposium (NDSS) (pp. 1-16).
Grazioli, S. (2004). Where Did They Go Wrong? An Analysis of the Failure of Knowledgeable Internet Consumers to Detect Deception over the Internet. Group Decision and Negotiation, 13, 149-172.
Khalifa, H. K. H. (2022). A Conceptual Review on Heu-ristic Systematic Model in Mass Communication Studies. International Journal of Media and Mass Communication, 4, 164-175.
Modic, D., & Lea, S. E. (2011). How Neurotic Are Scam Victims, Really? The Big Five and Internet Scams. In 2011 Conference of the International Confederation for the Advancement of Behavioral Economics and Economic Psychology (pp. 1-24).
Loewenstein, G. (1996). Out of Control: Visceral Influ-ences on Behavior. Organizational Behavior and Human Decision Processes, 65, 272-292.
Luo, X. R., Zhang, W., Burd, S., & Seazzu, A. (2013). Investigating Phishing Victimization with the Heuristic-Systematic Model: A Theoretical Framework and an Exploration. Computers and Security, 38, 28-38.
Related Articles
Related Author
Related Institution