[1] 中共中央,国务院.关于新时代加快完善社会主义市场经济体制的意见[R/OL].(2021-11-01)[2021-05-11].http://www.gov.cn/zhengce/2020-05/18/content_5512696.htm.
[2] 最高人民法院,国家发展和改革委员会.关于为新时代加快完善社会主义市场经济体制提供司法服务和保障的意见[R/OL].(2021-11-01)[2020-07-20].www.court.gov.cn/fabu-xiangqing-242911.html.
[3] 杨志琼.数据时代网络爬虫的刑法规制[J].比较法研究,2020(4): 186.
[4] RILEY K C. Data scraping as a cause of action: limiting use of the CFAA and trespass in online coping cases[J]. Fordham Intellectual Property, Media and Entertainment Law Journal, 2018 (1): 248.
[5] 韦玮.精通Python网络爬虫:核心技术、框架与项目实战[M].北京:机械工业出版社,2017: 6-7.
[6] 徐晨初,张燕平,刘国涛.一种优化路径的聚焦爬虫爬行策略[J].小型微型计算机系统,2016(8): 1721.
[7] 李东晖,廖晓兰,范辅桥,等.一种主题知识自增长的聚焦网络爬虫[J].计算机应用与软件,2014(5): 30.
[8] 李谦.数据爬取犯罪刑事风险类型及治理[N].民主与法制时报,2021-11-10(4).
[9] 陈小彪,储虎.论网络爬虫行为的刑法应对[J].河南警察学院学报,2020(5): 85-86.
[10] GOLD Z,LATONERO M. Robots welcome: ethical and legal considerations for web crawling and scraping[J]. Washington Journal of Law, Technology & Arts, 2018 (3): 302.
[11]李扬.著作权法基本原理[M].北京:知识产权出版社,2019: 426.
[12] KERR O S. Cybercrimes scope: interpreting access and authorization in computer misuse statutes[J]. New York University Law Review, 2003(5): 1644-1646.
[13] WOLFE N A. Using the computer fraud and abuse act to secure public data exclusivity[J]. Northwestern Journal of Technology and Intellectual Property, 2015 (3): 313-314.
[14] LI Q,JIANG T. Rethinking criminal sanctions on data scraping in China based on a case study of illegally obtaining specific data by crawlers[J]. China Legal Science, 2020 (4): 140-141.
[15] SOLOVE D J. Conceptualizing privacy[J]. California Law Review, 2002 (4): 1128.
[16] NISSENBAUM H. Privacy as contextual integrity[J]. Washington Law Review, 2004 (1): 138-153.
[17] 李谦.美国场景化司法规制数据爬取的经验与启示[J].电子政务,2020(11): 93.
[18] ZAMORA A. Making room for big data: web scraping and an affirmative right to access publicly available information online[J]. The Journal of Business, Entrepreneurship and the Law, 2019 (1): 226.
[19] SIMMONS R. The failure of the computer fraud and abuse act: time to take a new approach to regulating computer crime[J]. George Washington Law Review, 2016 (6): 1715-1716, 1714.
[20] ROACH G,MICHIELS W J. Damages is the gatekeeper issue for federal computer fraud[J]. Tulane Journal of Technology and Intellectual Property, 2006: 82.
[21] 刘艳红. 网络爬虫行为的刑事规制研究—以侵犯公民个人信息犯罪为视角[J].政治与法律,2019(11): 28.
[22] 田刚.大数据安全视角下计算机数据刑法保护之反思[J].重庆邮电大学学报(社会科学版),2015(3): 36.
[23] 张明楷.网络时代的刑事立法[J].法律科学,2017(3): 74-76.
[24] 曹阳.我国对违反“爬虫协议”行为的法律规制研究[J].江苏社会科学,2019(3): 166-167.
[25] 许可.数据爬取的正当性及其边界[J].中国法学,2021(2): 186.
[26] 李慧敏,孙佳亮.论爬虫抓取数据行为的法律边界[J].电子知识产权,2018(12): 64.
|