Welcome to Francis Academic Press

International Journal of Frontiers in Sociology, 2023, 5(10); doi: 10.25236/IJFS.2023.051018.

Analysis on the Criminal Management Dilemma of Network Verbal Violence under the Perspective of Execution Connection

Author(s)

Yiqing Huang

Corresponding Author:
Yiqing Huang
Affiliation(s)

China University of Political Science and Law, Beijing, 102249, China

Abstract

The criminal management of network verbal violence is facing the difficult problem of low conversion rate of criminal cases. The reinterpretation of the concept of network verbal violence under the system of criminal regulation is the premise of clarifying the problem and putting forward countermeasures. It should be noted that in addition to targeting individuals, the object of conduct also includes specific groups of non-specific individuals. Taking the connection of execution as the starting point, the criminal management dilemma of network verbal violence is mainly reflected in the physical dilemma of one-sided identification of “serious circumstances” and “social order”, and the procedural dilemma of low efficiency of criminal evidence transformation. In terms of entity, the penalty criteria should be improved, a single number of identification should be abandoned, a multi-dimensional identification method of “field + means + content + frequency” should be adopted, and it should be clear that the order of cyberspace belongs to social order. In terms of procedures, it emphasizes the responsibility of each subject to assist in investigation and evidence collection, and gives the opportunity for victims of cyber violence cases to initiate the investigation procedure.

Keywords

online verbal violence; execution cohesion; circumstances of aggravation; evidence conversion

Cite This Paper

Yiqing Huang. Analysis on the Criminal Management Dilemma of Network Verbal Violence under the Perspective of Execution Connection. International Journal of Frontiers in Sociology (2023), Vol. 5, Issue 10: 100-107. https://doi.org/10.25236/IJFS.2023.051018.

References

[1] Zhou Youyong, Liu Yanhong. Research on the Mechanism of Administrative Law Enforcement and Criminal Justice [J]. Journal of Southeast University, 2008, No. 4(01): 47-52

[2] Li Huajun, Zeng Liu, Teng Shanshan. Research on the Development of Cyber Violence: Connotation Type, Current Situation Characteristics and Governance Countermeasures—Based on the Analysis of 30 Typical Cyber Violence Incidents from 2012 to 2016 [J]. Intelligence magazine, 2017, 36 (09): 139-145

[3] Jiang Fangbing. “Network violence”: Concept, Root Cause and Response—Based on the Analysis Perspective of Risk Society [J]. Zhejiang Academic Journal, 2011 (06): 181-187

[4] Cai Rong. Analysis of the legitimacy and Doctrine of Internet language Violence [J]. Journal of Southwest University of Political Science and Law, 2018, 20 (02): 63-72

[5] Li Huaisheng. Research on the execution connection mechanism of network crime cases—Take anti-telecom network fraud and other network information supervision as a sample [J]. China Criminal Law Journal, 2022 (04): 79-94

[6] Yu Chong. The criminal law evaluation of network “quantity” insult and defamation[J]. China Law Review, 2023(03):87-98

[7] Liang Yalun. Research on the Regulation of Public Emergency [J]. Secretary, 2021 (06): 58-68

[8] Xu Yanping. Research on the working mechanism of administrative law enforcement and criminal justice—Also talk on the supervision of procuratorial organs over the transfer of suspected criminal cases by administrative law enforcement organs [J]. 2005 (02): 50-57

[9] Zhou Quan. Practical dilemma and improvement path of execution connection mechanism in environmental governance [J]. Journal of Hubei University, 2023, 50(02): 130-139

[10] Zhao Bingzhi, Yuan Bin. Thinking Transformation and Practical Development of Criminal Law Research—2013 Overview of Criminal Law Theory Research in China [J]. People's Procuratorate, 2014 (01): 22-32

[11] Yin Ziyuan. Research on the dilemma and Countermeasures of Network Violence [J]. Network Security Technology and Application, 2022 (08): 155-156