Effectiveness Improvement of the “Secondary Authorization” Rule in Criminal Law from the Perspective of Consequentialism

Authors

  • Zhelin Wang

DOI:

https://doi.org/10.62051/qj5vm775

Keywords:

Human Flesh Search; Secondary Authorization; Criminal Law Regulation; Consequentialism; Reasonable Treatment.

Abstract

Human flesh search engine accounts for a large proportion of cyber violence crimes, but a certain lag exists in the current criminal law regulations. There are some defects in regulating the subject of crime with deficiencies in the legislative provisions on the criminal behavior of personal information and the application of the “secondary authorization” rule. Hence, it is difficult to effectively exert the deterrent force that the criminal law should have. From the perspective of consequentialism, focusing on actively and passively disclosed personal information in human flesh search incidents, it can be found that passively disclosed personal information has a higher risk of cyberbullying and greater harm. In this regard, a public opinion identification mechanism should be put in place first to identify the tendency to cyberbullying in a timely manner. Before cyber violence makes a huge difference, all departments will jointly step down for rectification in accordance with relevant regulations. Secondly, criminal law is used to regulate, with the crime of "infringing on citizens’ personal information” mainly applicable. At the level of judicial practice, to avoid the dilemma of subjective knowledge, the “presumption and counter-evidence model” with lower cost and higher efficiency is used. Under this model, combined with the reasonable handling principle that “within a reasonable range, there is no major impact on personal rights and interests, and individuals do not choose to refuse”, all evidence and information are exhausted to solve problems that exceed the scope of fair use with a major impact and without having been authorized twice. Based on this model, it can effectively identify criminal suspects in human flesh search engines and improve the efficiency of criminal law regulation.

Downloads

Download data is not yet available.

References

Yuan, G. F. & Liu, Z. P. (2022). Defining “the masses”: A sociological survey of knowledge on the spread of The Crowd: A Study of the Popular Mind in China. Studies of Journalism and Communication, (1): 29.

The mind of crowds mentioned by Gustav Le Bon in The Crowd: A Study of the Popular Mind refers to the fact that under certain conditions, individuals are affected by factors such as group atmosphere and emotions, which have a different psychological state from when they are alone. This phenomenon is particularly obvious in collective events and social movements.

Zhang, X. B. (2021). Research on the setting of special obligations for personal information protection of Internet ecological “gatekeepers”. Social Science Abstracts, (8).

Jiang, F. B. (2011). Cyber violence: Concept, roots and countermeasures—An analytical perspective based on risk society. Zhejiang Academic Journal, (6).

Liu, J. H. & Ke, H. X. (2018). The tension of public opinion in moral psychology: A study on the evolution pattern from Internet rumors to Internet violence and its influencing factors. International Journalism, (7): 40.

Yan, X. F. (2021). The difficulties and countermeasures of network public opinion monitoring under the background of mobile Internet. Communication, (8).

Yu, H. S. (2023). Regulation model of cyber violence from the perspective of criminal integration. Legal Science (Journal of Northwest University of Political Science and Law), (5): 41.

Same as the 21st note sourced from Criminal Law of the People’s Republic of China.

Same as the 20th note sourced from Interpretation on Several Issues Concerning the Application of Law in Handling Criminal Cases of Infringement of Citizens’ Personal Information.

Sun, D. C. (2023).

Zhou, J. H., Yu, H. S. & Li, Z. H. (2023). Cyber violence crime: A normative analysis of criminal law. Chinese Applied Law, (5).

Same as the 21st note sourced from Criminal Law of the People’s Republic of China.

Same as the 21st note sourced from Criminal Law of the People’s Republic of China.

The first case of procuratorial organs applying the Civil Code to determine that the perpetrator did not constitute a crime of infringing on citizens’ personal information.

Bulletin of the Supreme People’s Procuratorate, No. 140.

Guo, Z. L. (2023). Interpretive principles of criminal law governance of cyber violence. Jianghan Tribune, (5).

Chen, H. (2018). Value and position of consequentialism in judicial adjudication. Jurist, (4).

Xi, J. P. (2022). Hold high the great banner of socialism with Chinese characteristics and work together to build a modern socialist country in an all-round way—Report at the twentieth national congress of the Communist Party of China. Beijing: People’s Publishing House, 66.

Downloads

Published

29-08-2024

How to Cite

Wang, Z. (2024). Effectiveness Improvement of the “Secondary Authorization” Rule in Criminal Law from the Perspective of Consequentialism. Transactions on Social Science, Education and Humanities Research, 12, 362-367. https://doi.org/10.62051/qj5vm775