|
|
x | |
|
1 Emerging technologies and the criminal law |
|
|
1 | (30) |
|
|
|
|
1 | (1) |
|
2 Artificial intelligence and criminal justice |
|
|
1 | (6) |
|
a Artificial intelligence |
|
|
1 | (6) |
|
3 Privacy, surveillance and biometrics |
|
|
7 | (14) |
|
4 Censoring the Internet at large to prevent online harms |
|
|
21 | (6) |
|
5 Overview of the chapters herein |
|
|
27 | (4) |
|
2 Financial technology: opportunities and challenges to law and regulation |
|
|
31 | (18) |
|
|
|
31 | (3) |
|
|
34 | (1) |
|
|
34 | (6) |
|
|
40 | (2) |
|
|
42 | (1) |
|
|
43 | (1) |
|
7 Separate legal personality |
|
|
44 | (4) |
|
a How the law should be adapted |
|
|
45 | (1) |
|
b International conventions and model laws |
|
|
46 | (1) |
|
c Regulation and regulatory sandboxes |
|
|
46 | (2) |
|
|
48 | (1) |
|
3 Between prevention and enforcement: the role of "disruption" in confronting cybercrime |
|
|
49 | (25) |
|
|
|
49 | (1) |
|
2 The nature of disruption |
|
|
49 | (2) |
|
3 The role of intelligence |
|
|
51 | (1) |
|
4 The role of disruption in cybercrime |
|
|
52 | (8) |
|
|
54 | (3) |
|
|
57 | (2) |
|
|
59 | (1) |
|
5 Legislative frameworks and oversight |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
62 | (4) |
|
8 International cooperation |
|
|
66 | (6) |
|
|
72 | (2) |
|
4 Preventive cybercrime and cybercrime by omission in China |
|
|
74 | (23) |
|
|
|
|
74 | (2) |
|
2 Pre-inchoate criminalisation and early harm prevention |
|
|
76 | (8) |
|
a Background of the latest amendments to PRC criminal law |
|
|
76 | (2) |
|
b The harm justification for criminalising pre-inchoate cyberharm |
|
|
78 | (6) |
|
3 Omissions liability for internet service providers |
|
|
84 | (6) |
|
a Effective governance of cybercrime and the addition of citizens' positive duties |
|
|
86 | (4) |
|
4 The constitutional dilemma: the deviation from marketplace norms |
|
|
90 | (4) |
|
a The principle of personal responsibility |
|
|
92 | (2) |
|
5 The normativity of private censorship and pre-inchoate criminalisation |
|
|
94 | (1) |
|
|
95 | (2) |
|
5 Criminal law protection of virtual property in China |
|
|
97 | (29) |
|
|
|
|
97 | (1) |
|
2 Conceptualising virtual property |
|
|
98 | (1) |
|
a General concept of a virtual asset |
|
|
98 | (1) |
|
3 Categorising virtual property |
|
|
99 | (7) |
|
a The problem with virtual property in China |
|
|
100 | (2) |
|
b Virtual property articles |
|
|
102 | (2) |
|
c Virtual currency as property |
|
|
104 | (2) |
|
|
106 | (1) |
|
4 Virtual property as property |
|
|
106 | (4) |
|
5 The principle of legality |
|
|
110 | (8) |
|
6 China's current practice concerning virtual property |
|
|
118 | (3) |
|
7 The value of virtual property |
|
|
121 | (4) |
|
|
125 | (1) |
|
6 Criminalising cybercrime facilitation by omission and its remote harm form in China |
|
|
126 | (30) |
|
|
|
|
126 | (2) |
|
2 Cybercrime: extending the reach of the current law |
|
|
128 | (4) |
|
3 Liability for indirect remote harm and direct pre-inchoate harm |
|
|
132 | (7) |
|
4 Internet service provider offences |
|
|
139 | (8) |
|
a Criminalisation and the duty of the ISP to act |
|
|
139 | (2) |
|
b Allowing others to cause harm through failures to prevent |
|
|
141 | (2) |
|
c Responsibility for allowing others to leak data |
|
|
143 | (1) |
|
d Allowing the loss of criminal evidence |
|
|
144 | (2) |
|
e The crime of fabricating and disseminating false information |
|
|
146 | (1) |
|
5 Obstacles to applying complicity liability to cybercrimes |
|
|
147 | (4) |
|
6 The limits of national jurisdiction |
|
|
151 | (1) |
|
|
152 | (4) |
|
7 Rethinking personal data protection in the criminal law of China |
|
|
156 | (24) |
|
|
|
|
156 | (2) |
|
2 The legal status of personal data |
|
|
158 | (12) |
|
a Is privacy a public good? |
|
|
160 | (5) |
|
b The current law in China |
|
|
165 | (5) |
|
|
170 | (3) |
|
4 Related criminal offences in China |
|
|
173 | (2) |
|
5 Fair labelling and applying the right crime |
|
|
175 | (2) |
|
|
177 | (3) |
|
8 Using conspiracy and complicity for criminalising cyber fraud in China: lessons from the common law |
|
|
180 | (21) |
|
|
|
|
|
180 | (3) |
|
|
183 | (7) |
|
3 Remote harm offences vs. inchoate and pre-inchoate offences |
|
|
190 | (3) |
|
|
193 | (4) |
|
5 Successive complicity in Japanese law |
|
|
197 | (2) |
|
|
199 | (2) |
|
|
201 | (21) |
|
|
|
201 | (1) |
|
2 The nature of the threat |
|
|
202 | (1) |
|
3 Definition and scope of AI |
|
|
203 | (5) |
|
a Machine learning methods |
|
|
204 | (2) |
|
b Learning from incomplete data |
|
|
206 | (1) |
|
c Predicting behaviours and outcomes |
|
|
207 | (1) |
|
d Incomprehension of decisions |
|
|
208 | (1) |
|
4 Four apertures of cyberharm |
|
|
208 | (2) |
|
|
210 | (7) |
|
a Targeting and control enhancements due to AI |
|
|
211 | (1) |
|
b Attacker persistence, covertness and effects enhancement due to AI |
|
|
212 | (1) |
|
c Attack (un)mitigatability enhancements due to AI |
|
|
213 | (1) |
|
|
213 | (1) |
|
e Threat to businesses or organisations |
|
|
214 | (1) |
|
f Threat to nations or societies |
|
|
215 | (2) |
|
|
217 | (1) |
|
6 AI as an environmental threat |
|
|
217 | (4) |
|
a The question of dual-use |
|
|
218 | (1) |
|
b Vulnerability introduction |
|
|
218 | (1) |
|
c Growth of threat environment |
|
|
219 | (1) |
|
|
220 | (1) |
|
e Outliers and oversimplification |
|
|
220 | (1) |
|
f Rule of law and responsibility for harm |
|
|
221 | (1) |
|
|
221 | (1) |
|
10 AI vs. IP: criminal liability for intellectual property offences of artificial intelligence entities |
|
|
222 | (25) |
|
|
1 Introduction: the legal problem |
|
|
222 | (3) |
|
|
225 | (1) |
|
3 Three models of criminal liability of artificial intelligence entities for commission of IP offences |
|
|
226 | (15) |
|
a Perpetration-by-Another liability |
|
|
228 | (3) |
|
b Natural-Probable-Consequence liability |
|
|
231 | (3) |
|
|
234 | (6) |
|
|
240 | (1) |
|
|
241 | (3) |
|
|
244 | (3) |
|
11 Don't panic: artificial intelligence and Criminal Law 101 |
|
|
247 | (18) |
|
|
|
247 | (2) |
|
|
248 | (1) |
|
|
249 | (5) |
|
a Specific conduct offences |
|
|
249 | (2) |
|
b Specific consequence offences |
|
|
251 | (2) |
|
c State of affairs offences |
|
|
253 | (1) |
|
|
254 | (8) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
d Recklessness and negligence |
|
|
257 | (2) |
|
|
259 | (1) |
|
|
259 | (1) |
|
g Rationale-based defences |
|
|
260 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
264 | (1) |
Index |
|
265 | |