Analysis of Enticement Detection using Information Technology †
Abstract
:1. Overview of Enticement Detection using Information Technology
1.1. The Concept of Enticement Detection
1.2. The Difference between Enticement Detection and Technical Detection Using Information Technology
2. Values of Enticement Detection
2.1. Advantages of Enticement Detection
- First, enticement detection has the characteristic of having complementarities. The enticement detection method can effectively supplement the defect that the traditional detection method cannot overcome. For example, in the cases of “No Obvious Victims”, traditional detection often cannot play a role in detection. Such cases are usually those that infringe the interests of our country or disturb the social order without a specific victim, or where the opponent of the crime does not feel victimized. Therefore, it creates a situation in which no one can disclose the facts of their crimes to the detection authorities, or it is difficult for the detection authorities to collect evidence due to the high concealment of the crime, although they know the facts of the crime. In the cases of enticement detection, the investigative actions are carried out before such crimes are committed. It can be seen that authorities can take advantage of enticed investigations to monitor the criminal behavior of the enticed and to control the criminal behavior so that it develops in a direction that is conducive to the detection of cases.
- Second, the enticement detection method has the characteristic of high efficiency. The enticement investigate method has shown extremely high efficiency due to its proactive investigation process, especially in combination with information technology. Investigating authorities carry out enticement detection activities before the implementation of the crime, so the suspect can be caught in the moment of the crime, which is faster and more effective for the detection of cases.
- Third, the enticement detection method has the characteristic of deterrence. The proactive and covert characteristics of the enticement detection method have a huge deterrent effect in combating new types of criminal cases such as “No Obvious Victims” crimes; for drug, firearm, and ammunition crimes; as well as for organized crimes; terrorist activities; and other major crime cases. Only by actively adopting the enticement detection method to timely “intercept” criminal behavior and deter criminals can we ultimately achieve the goals of maintaining national security and stabilizing social order.
2.2. Disadvantages of Enticement Detection
- First, the use of the enticement detection method will violate the citizens’ personality rights. The personnel who carry out the enticement detection method conceal their real identity to entice citizens into the investigation procedure that was set in advance by the public power, which will inevitably seriously violate the personality rights of citizens.
- Second, the use of enticement detection may bring judicial ethics into question. If encouragement detection is used improperly without any restrictions, it will easily lead to a crisis of trust for our organizations and to judicial moral questioning from the public.
- Third, using the enticement detection method has the possibility of attracting crime, which violates the principle of criminal responsibility and punishment in China’s criminal law. The investigation agency plays the role of the “instigator” in the enticement detection of criminal inducements, which goes against the original intention of cracking down on the crime. In addition, investigative authorities may lead the crime in the direction of felonization in order to achieve their purpose, which clearly violates the principle of criminal responsibility and punishment under China’s criminal law.
3. The Reality of Enticement Detection Use in China
4. Regulations on Enticement Detection in China
4.1. Those That Are Suitable for Enticement Detection
4.1.1. Positive Conditions for Those That Are Suitable for Enticement Detection
4.1.2. Negative Conditions for Those That Are Suitable for Enticement Detection
4.2. Preconditions for the Application of Enticement Detection
4.3. Implementation Methods and Behavioral Limits of Enticement Detection
4.4. Procedural Regulation of Enticement Detection
5. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Li, L.Z. The General Assembly of the Criminal Law of the People’s Republic of China; Law Press: Beijing, China, 2003; p. 98. [Google Scholar]
- Ma, Y. An Overview of the Jurisprudence and Arguments on Seduction Investigation in the United States and Japan. Law 1998, 42. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jia, B. Analysis of Enticement Detection using Information Technology. Comput. Sci. Math. Forum 2023, 8, 22. https://doi.org/10.3390/cmsf2023008022
Jia B. Analysis of Enticement Detection using Information Technology. Computer Sciences & Mathematics Forum. 2023; 8(1):22. https://doi.org/10.3390/cmsf2023008022
Chicago/Turabian StyleJia, Baiyang. 2023. "Analysis of Enticement Detection using Information Technology" Computer Sciences & Mathematics Forum 8, no. 1: 22. https://doi.org/10.3390/cmsf2023008022
APA StyleJia, B. (2023). Analysis of Enticement Detection using Information Technology. Computer Sciences & Mathematics Forum, 8(1), 22. https://doi.org/10.3390/cmsf2023008022