مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

224
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

The legitimacy of the criminalization of the operation of production, distribution and publication of malware in the cyber space

Pages

  415-438

Abstract

 simply approving an act in the Guardian Council can guarantee its legitimacy and correspondency with Canon Law. since the natural responsibility of this entity is to accord Islamic Parliment's enactments with Canon Law (religious law), besides unless legislature's enactments obtain its correspondency with the Canon Law, it can not be described as an act. The Guardian Council has enacted the computer's crime law, so it has legitimacy and for the punitive justice agents this amount of legitimacy is enough. But from the jurisprudence point of view it should be detailed more and the arguments and proofs upon which the legitimacy of this act stands be clarified. The subject of this article is to examine the Canon Law's catechism of producing, distributing and diffusing malwares in the cyber space that is the subject of clause 25 in the computer crimes law enacted under the influence of Budapest convention. There is no instance of this crime in the religious tradition and verses as it is a new crime. Therefore to prove its legitimacy we should refer to intellect and general juridicial(فقهی) rules, such as No harm rule, tasbib rule(causation rule), Taslit rule, Al ta'azir be yadelhakem rule etc… . It is concluded that the mentioned crime not only doesn't conflict with the religious cases but also we can obtain many reasons for its legitimacy.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    NAJAFI, HOSSEIN, ZERAAT, ABBAS, Yazdian, Jaafar, & Goli, Salman. (2021). The legitimacy of the criminalization of the operation of production, distribution and publication of malware in the cyber space. ISLAMIC LAW AND JURISPRUDENCE STUDIES, 12(23 ), 415-438. SID. https://sid.ir/paper/401857/en

    Vancouver: Copy

    NAJAFI HOSSEIN, ZERAAT ABBAS, Yazdian Jaafar, Goli Salman. The legitimacy of the criminalization of the operation of production, distribution and publication of malware in the cyber space. ISLAMIC LAW AND JURISPRUDENCE STUDIES[Internet]. 2021;12(23 ):415-438. Available from: https://sid.ir/paper/401857/en

    IEEE: Copy

    HOSSEIN NAJAFI, ABBAS ZERAAT, Jaafar Yazdian, and Salman Goli, “The legitimacy of the criminalization of the operation of production, distribution and publication of malware in the cyber space,” ISLAMIC LAW AND JURISPRUDENCE STUDIES, vol. 12, no. 23 , pp. 415–438, 2021, [Online]. Available: https://sid.ir/paper/401857/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button