Search Results/Filters    

Filters

Year

Banks



Expert Group










Full-Text


Author(s): 

TORABZADEH H.

Issue Info: 
  • Year: 

    2009
  • Volume: 

    2
  • Issue: 

    6
  • Pages: 

    110-140
Measures: 
  • Citations: 

    0
  • Views: 

    1384
  • Downloads: 

    0
Abstract: 

Computers might be used in Crimes. They may also contain some evidences which prove a Crime or be used in committing Crimes. Therefore, these electronic equipments include valuable evidences for Crime detection. In this article it is attempted to realize the importance of dealing with these kind of evidences without any major damage to them and how to answer the law enforcement officers in this regard.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1384

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    12
  • Issue: 

    2 (46)
  • Pages: 

    53-82
Measures: 
  • Citations: 

    0
  • Views: 

    424
  • Downloads: 

    0
Abstract: 

Introduction: Features Cyber space has been provided with anonymity due to its marvelous capabilities and, the ease of committing Crime, the transgression of Crimes, reduction of the age of the perpetrators, the extent of the damage and the plight of the victim. The barriers to CyberCrime prevention will be effective in using effective strategies to control these capabilities. Therefore, the main objective of the present study is to identify the most important obstacles to the realization of CyberCrime prevention. Method: The present study was conducted from a methodological point of view, with a qualitative approach. The interviewed research participants include all experts in the field of Crime prevention in the judiciary and other organizations. Sampling was done purposefully and continued until theoretical saturation. The data was analyzed using "thematic analysis" method. In order to ensure the validity of research data, the views of professors of the scholars in the field of research were used, while the text of the interviews along with the codes was available to a number of experts, and after confirmation, the analysis of the interviews continued. Findings: According to research findings, the main obstacles to the realization of Cyber Crime prevention are seven main areas of social barriers, structural barriers, educational barriers, cultural barriers, administrative barriers, judicial barriers and technical barriers. Based on the number of obstacles encountered in each area, barriers in the area of management include 27 obstacles, legal and judicial barriers including 19 barriers, cultural barriers including 18 obstacles, technical obstacles including 13 barriers, structural barriers including 9 obstacles, scientific obstacles Training including 3 obstacles and social barriers also includes 3 obstacles. Conclution: According to the research findings, to prevent Cyber Crime, two levels can be used to remove barriers: First, through strategic and long-term measures through planning, policy-making and decision-making at the macro level of the country should reduce Crimes of this area. The second, through direct or indirect action, systematically regulates early-action measures to prevent the spread of Crime in Cyberspace.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 424

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    24
  • Issue: 

    4
  • Pages: 

    77-109
Measures: 
  • Citations: 

    0
  • Views: 

    35
  • Downloads: 

    0
Abstract: 

Background and objective: Crimes in Cyberspace include any action or action that is done through Cyberspace and using tools to connect to this space and violates the rights specified for people. The present study was conducted with the aim of analyzing and investigating the effective factors (drivers) of Crime in Cyberspace using a mixed-method approach.Methods: This research is considered a mixed-method study with a qualitative and quantitative approach, which is descriptive and survey in terms of its nature and method, and in terms of its objectives it is of an applied research type.Findings: Based on the judgment and survey of experts, sixteen factors have been introduced as the effective factors of Crime in Cyberspace. Also, the findings show that the weakness of digital literacy of users, emotional, financial and informational needs of people, cultural weakness, lack of appropriate and deterrent laws and regulations, inefficiency of safety systems, inflation and economic defects, increase in unemployment and low risk of arrest are the most important effective factors in the occurrence of criminal behavior in Cyber space.Results: Crime in Cyberspace is one of the most important problems that has severely threatened human societies in recent decades. Knowing the underlying factors in the occurrence of such Crimes can significantly prevent the commission of these Crimes in the society

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 35

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

JAVAN JAFARI ABDOLREZA

Issue Info: 
  • Year: 

    2011
  • Volume: 

    17
  • Issue: 

    SUPPLEMENT
  • Pages: 

    0-0
Measures: 
  • Citations: 

    0
  • Views: 

    5131
  • Downloads: 

    0
Abstract: 

Information technology development has deeply affected all aspects of social, economic, cultural, life including criminal law. This development has forced lawyers and policy makers of these areas to reflect deeply. Differences between traditional and Cyber Crimes are such that long standing conventional criminal policy can no longer tackle them.Trans nationality, easiness of occurrence, anonymity of culprits and their large scale effects partly show the characteristics of these offences. These features on one hand and dependence of the modern social life’s structures on the other hand necessitate preparing a new criminal approach. Efficacy and efficiency of new acts against digital Crimes require a new advance to categories such as definition of Crime, elements of Crime, criminal responsibility and so on. The main focus of this article is explanation of reasons and requirements of distinguished criminal policy against Cyber Crimes. Although analytical investigation of the Iranian criminal law in Cyber Crime is not the main aim of this writing, I tried to find out to what extent the differentiated criminal approach is adopted and applied by the Iranian criminal law.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 5131

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    13
  • Issue: 

    50
  • Pages: 

    128-148
Measures: 
  • Citations: 

    0
  • Views: 

    495
  • Downloads: 

    0
Abstract: 

Features of Cyber environment such as lack of dependence on particular time and place, the possibility of obtaining various identities, anonymity and … . . are all factors that make Cyber Crime commitment more different and Cyber Crime detection and pinning criminals, more difficult. Therefore; this research has been conducted with the aim of determining effective factors in the detection of Cyber Crimes. The research method is of applied type from objective perspective and of descriptive-survey type from implementation perspective. The statistical community of this research is formed by 12 NAJA Cyber Police Experts. The data collection tools is a questionnaire made based on library studies, reviewing early studies and experts’ views and among which, their most vital ones have been selected. In regards to the nature of this research, Excel software was used to analyze the collected data. The findings of the research show that the most effective factors in Cyber Crime detection, among 26 factors and 6 groups, include organizational interaction, organic equipment, judges’ familiarization with technical and legal principles, personnel and detectives’ capabilities, modern communications technologies, IT and Cyberspace. The findings show that in detecting Cyber Crimes, such issues as organizational interaction, organic equipment, judges’ familiarization with the technical and legal principles, personnel and detectives’ capabilities, modern communications technologies, IT and Cyberspace should be taken into considerations.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 495

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

LONGE O.B. | CHIEMEKE S.C.

Issue Info: 
  • Year: 

    2008
  • Volume: 

    6
  • Issue: 

    4
  • Pages: 

    132-139
Measures: 
  • Citations: 

    1
  • Views: 

    652
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 652

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

HASSANZADEH ALIREZA

Issue Info: 
  • Year: 

    2018
  • Volume: 

    4
  • Issue: 

    10
  • Pages: 

    231-262
Measures: 
  • Citations: 

    0
  • Views: 

    1470
  • Downloads: 

    0
Abstract: 

Public sphere plays an important role in individual and social life so that its weakness facilitates illegal behavior and may orientate individuals toward violence and crim. The present analysis deals with such key research questions as what are the impacts of the weakness of public sphere on private spheres particularly family? How does it affect the tendency of youth and adolescents toward Cyber and virtual spheres? Whether and how it may lead them towards violence and Crime? The present analysis focuses on these key research questions and tries to explore the consequences of the weakness of public sphere on tendency towards Cyber sphere, violence and Crime which in turn will damage individual morality and civic commitment.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1470

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

FARHADI ALASHTI ZAHRA | Javan Jafari Bojnoordi Abdorreza

Journal: 

MAJLIS & RAHBORD

Issue Info: 
  • Year: 

    2016
  • Volume: 

    23
  • Issue: 

    87
  • Pages: 

    75-100
Measures: 
  • Citations: 

    0
  • Views: 

    647
  • Downloads: 

    0
Abstract: 

The expansion of information and communication technologies has led to the formation of a new generation of Crime, and some Crimes has now became easier to commit. application of technology has facilitated the possible delinquency prevention in order to meet this challenge. Despite extensive monitoring features that are designed following expansion of information and communication technologies, it is sometimes very difficult to strike a balance between their use and possible delinquency prevention, and in some cases, over-reliance on them may bring about various dilemmas for users’ data security. As a result, there is always a dual challenge facing the authorities. On the one hand, the supervisory bodies are required to move under general rules, documents and provisions of international and regional privacy advocates, and in the event of any violation, they have international responsibility. On the other hand, they have to provide an atmosphere devoid of criminal opportunities and delinquency prevention. online victimization prevention requires appropriate measures towards the potential Crime and the idea of applying them by the judicial authority. Thus, in order to provide a safe space, above-mentioned constraints can not be ignored and potential Crime can not be prevented through pervasive surveillance. Hence, in this paper, we investigate alignment or non-alignment of the most popular electronic monitoring measures with human-rights requirements on the protection of privacy and various aspects of their interference with privacy.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 647

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    5
  • Issue: 

    10
  • Pages: 

    43-65
Measures: 
  • Citations: 

    0
  • Views: 

    1311
  • Downloads: 

    0
Abstract: 

The Crime of aggression is one of the Crimes that international criminal court can deal with. There is not a decisive definition about the meaning of the Crime of aggression at the time of the ratification of the Rome Statute. There was an agreement between the state parties to define the Crime of aggression at the time of reviewing the statute in the future. Consequently, the Crime of Aggression was being defined in 2010 under Article 8bis of the International Criminal Court Statute. Although the definition of the Crime of aggression does not refer to Cyber-attacks, but it seems that some kinds of these attacks according to the Rome Statute and the General Assembly Resolution 3314 of 1974, can be considered as the Crime of aggression. In order to assess the Cyber-attacks in the context of Crime of aggression, these attacks must reach the threshold of the Crime of aggression, that is to say, the most serious breach of international law regulations. For committing the Crime of aggression, the perpetrators of Cyber-attacks need to be aware of the circumstances that lead to the clear violation of International Law which is usually something difficult to be proven. Although some Cyber-attacks can be counted as the Crime of aggression, it seems that since that Cyber space has its own characteristics, the best way to deal with these kinds of attacks is an agreement between states and also allocating the judges in ICC who are specialized in the field of Cyberspace.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1311

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2014
  • Volume: 

    9
  • Issue: 

    3 (35)
  • Pages: 

    99-119
Measures: 
  • Citations: 

    0
  • Views: 

    6424
  • Downloads: 

    0
Abstract: 

Despites its various advantages, Cyber space has let so many different Crimes in due to its special features. The present study tries to elaborate on the ways to prevent them. This is a descriptive applied study. 57 of the experts of information technology in Iran police formed the statistical population of the study. Questionnaire was used to collect the required data. T-test was used to analyze the collected data. The findings of the study demonstrate that the following methods are significantly effective in Cyber Crime prevention:-Methods based on information technology including the attachers’ Ips;-Cyber space control;-Collecting electronic evidences;-Documentation in Crime scene.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 6424

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button