مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

6,857
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

EXAMINING COMPUTER CRIME SCAMS IN E-COMMERCE

Pages

  61-74

Abstract

 The legal basis for the crime of traditional scam in Article 1 AH. T M M U U The crime is one of the crimes against property and property, which is: the acquisition of property by FRAUDulent means by FRAUDulent means. The material fray of the crime of traditional FRAUD is one of the elements that is absolutely necessary to commit a criminal offense, and a crime bound to result is necessary to commit the crime of traditional FRAUD. All elements of "legal, material, and spiritual" are necessary. The pillar of the computer crime scam in Article 67 of the Code is a new crime. The difference between scams with traditional scams is to commit these crimes and also to distinguish between means of committing crimes. Computer FRAUD involves one of the positive verbs of entering, modifying, fading, creating or stopping data, and so on, for studying "money or property or benefits or services or financial privileges." Computer scam is a crime bound up with the outcome. And to commit the crime of computer FRAUD, the realization of all elements of the "legal, material, spiritual" element is necessary. Today, FRAUDsters use computers and forge both for traditional and computer-based FRAUD.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    ALINEJHADI, MOHSEN, & ALINEJHADI, ZAHRA. (2018). EXAMINING COMPUTER CRIME SCAMS IN E-COMMERCE. JOURNAL OF CIVIL & LEGAL SCIENCES (GHANONYAR), 2(5 ), 61-74. SID. https://sid.ir/paper/259736/en

    Vancouver: Copy

    ALINEJHADI MOHSEN, ALINEJHADI ZAHRA. EXAMINING COMPUTER CRIME SCAMS IN E-COMMERCE. JOURNAL OF CIVIL & LEGAL SCIENCES (GHANONYAR)[Internet]. 2018;2(5 ):61-74. Available from: https://sid.ir/paper/259736/en

    IEEE: Copy

    MOHSEN ALINEJHADI, and ZAHRA ALINEJHADI, “EXAMINING COMPUTER CRIME SCAMS IN E-COMMERCE,” JOURNAL OF CIVIL & LEGAL SCIENCES (GHANONYAR), vol. 2, no. 5 , pp. 61–74, 2018, [Online]. Available: https://sid.ir/paper/259736/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button