Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Author(s): 

Davoodi Beiraq Hossein

Issue Info: 
  • Year: 

    2024
  • Volume: 

    6
  • Issue: 

    1 (11)
  • Pages: 

    153-186
Measures: 
  • Citations: 

    0
  • Views: 

    21
  • Downloads: 

    0
Abstract: 

. . . . for human interactions and especially a platform for legal interactions, including legal actions and events. In the interactions of the real and physical world, people try to prove their Claims in cases of disputes and legal actions by preparing paper documents in transactions and legal relations with each other. The physical nature of these documents has made it easier to create and protect them. In the Cyber space, people must prepare documents and maintain these documents to prove their rights. Considering the fact that Iran's evidence system is a legal evidence system, the evidence presented by the parties must have legal conditions, at the same time, these documents and evidence are subject to change every day due to the dynamics and evolution of the Cyberspace, the challenges The acceptance of these evidences in the legal system of our country is a matter of debate. This article is written in a descriptive and analytical way and according to the provisions of the commercial law and the definition of the document in the civil law, in terms of the legal divisions of the evidence in this space, it can be classified as deed under private seal, secure electronic documents and documents in the form of a official document. there are also challenges such as the expensiveness of searching for these evidences, attribution of documents, determination of the governing law among these challenges.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 21

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Qaeminia Alireza

Issue Info: 
  • Year: 

    2023
  • Volume: 

    20
  • Issue: 

    49
  • Pages: 

    5-23
Measures: 
  • Citations: 

    0
  • Views: 

    96
  • Downloads: 

    33
Abstract: 

The subject of this article is the existential belonging of humans in the Cyber space. The relationship between man and old technology was instrumental; That is, technology was a human tool and he did not have an existence based on technology. But human consistency is new to modern technology. Or in other words, the new humanity has an existential poverty or an existential belonging in relation to technology. None of his spheres of existence are independent from technology, but rather are completely dependent on it. In other words, in the old technology, human beings were independent from it and lived without it. This technology was not more than a tool. But the existential consistency of the new human being is due to technology; Without it, his personal and social life will fall apart. By using the discussion of causation in Islamic philosophy, we can gain a special understanding of the relationship between humans and new technology and Cyber space. It seems that this discussion can give a special model in this field, which will make understanding this relationship easier from a philosophical point of view.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 96

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 33 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Writer: 

NOORI FATEMEH

Issue Info: 
  • Year: 

    2015
  • Volume: 

    1
Measures: 
  • Views: 

    195
  • Downloads: 

    0
Abstract: 

DUE TO THE NATURE OF Cyberspace AS A MAINSTREAM INFORMATION COUNTRY IS LIKELY TO OFFEND IN THIS WAY, IT IS IMPORTANT TO LOOK SPECIAL. IT IS IMPORTANT TO LOOK SPECIAL ISSUE OF Cyber SECURITY, ESPECIALLY AT A NATIONAL APPLICATION BECAUSE OF THE COUNTRY'S INFRASTRUCTURE HAS BEEN IN THIS space AND DOWNTIME SECURITY THREAT TO N THIS PAPER EXAMINES THE DIFFERENT APPROACHES SECURITY USING ANALYTICAL METHODS (SOMETIMES SOFT AND SOMETIMES HARDWARE) ADDRESS. THE STUDY SHOW THAT THE HARDWARE CAN BE CONNECTED TO WITH ASPECTS OF ACCESSIBILITY TO THE TARGET BY INFLUENCING THE BEHAVIOR OF OTHERS ARE ATIONAL SECURITY COUNTRY AND THE NATURE AND BEHAVIOR OF RESOURCES IS STRICT SECURITY SO THAT POWER CAN FORCE ORDER IS BASED ON THE THREAT SOFTWARE INCLUDES THE ABILITY TO OBTAIN FAVORABLE INTEREST THROUGH ATTRACTION RATHER THAN THROUGH COERCION.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 195

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Journal: 

PRIVATE LAW

Issue Info: 
  • Year: 

    2016
  • Volume: 

    4
  • Issue: 

    15
  • Pages: 

    129-149
Measures: 
  • Citations: 

    0
  • Views: 

    949
  • Downloads: 

    0
Abstract: 

in the Cyber space tow group players are acting. one of them are internet intermediates such as internet service provider and site mangers and data producer also second group of them are users that are end consumers of internet service. the resource of making tort in the Cyber space is same with others resource in the actual world because of nature difference between Cyber space and actual world we cannot performance total rules of basic tort in Cyber space all so we cannot performance same and one doctrine about this world. in this paper we try to reconnaissance the players who are present in the Cyber space. and we could comparison resource of making tort in actual world white Cyber space. at end we try to comparison important doctrine about base of tort in Cyber space. finally we cannot performance all rules of tort that there is in actual world in the Cyber space but we should be more inventor

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 949

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

NEW MEDIA STUDIES

Issue Info: 
  • Year: 

    2016
  • Volume: 

    1
  • Issue: 

    4
  • Pages: 

    247-281
Measures: 
  • Citations: 

    0
  • Views: 

    1581
  • Downloads: 

    0
Abstract: 

The present study aims to investigate the possibility of creation of trust culture in Cyber space regarding its structural properties. We used the theory of social trust by Piotr Sztompka and Handerson as the theoretical framework of the study. The study was conducted in the city of Islamshahr in December 2012. The statistical population included all the people who went to an internet café in the cityfrom whom 383 people were chosen as the sample. The results indicate that trust culture has been formed in the Cyber space, however at a lower average level compared to the physical world. The results also show a direct relation between the structure of Cyber space and the formed trust culture. The structure of Cyber space showed a stronger relation with the mental dimension of trust culture rather than its objective dimension. Different Cyber space environments showed different levels of trust culture. Facebook showed the strongest trust culture and emails and game environments came in second and third level.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1581

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Journal: 

J Leg Stud Res

Issue Info: 
  • Year: 

    2022
  • Volume: 

    8
  • Issue: 

    1
  • Pages: 

    0-0
Measures: 
  • Citations: 

    1
  • Views: 

    5
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 5

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    24
  • Issue: 

    4
  • Pages: 

    77-109
Measures: 
  • Citations: 

    0
  • Views: 

    42
  • Downloads: 

    0
Abstract: 

Background and objective: Crimes in Cyberspace include any action or action that is done through Cyberspace and using tools to connect to this space and violates the rights specified for people. The present study was conducted with the aim of analyzing and investigating the effective factors (drivers) of crime in Cyberspace using a mixed-method approach.Methods: This research is considered a mixed-method study with a qualitative and quantitative approach, which is descriptive and survey in terms of its nature and method, and in terms of its objectives it is of an applied research type.Findings: Based on the judgment and survey of experts, sixteen factors have been introduced as the effective factors of crime in Cyberspace. Also, the findings show that the weakness of digital literacy of users, emotional, financial and informational needs of people, cultural weakness, lack of appropriate and deterrent laws and regulations, inefficiency of safety systems, inflation and economic defects, increase in unemployment and low risk of arrest are the most important effective factors in the occurrence of criminal behavior in Cyber space.Results: Crime in Cyberspace is one of the most important problems that has severely threatened human societies in recent decades. Knowing the underlying factors in the occurrence of such crimes can significantly prevent the commission of these crimes in the society

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 42

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

Woman and Society

Issue Info: 
  • Year: 

    2017
  • Volume: 

    7
  • Issue: 

    SUPPLEMENT
  • Pages: 

    105-123
Measures: 
  • Citations: 

    0
  • Views: 

    3095
  • Downloads: 

    0
Abstract: 

This study aimed to investigate the cause of women’s presence in Cyber space. To understand why women prefer to spend their spare time in this space, the qualitative method and thematic analysis is used. Depth interviews with 30 women who were homemakers and bachelor aged between 30 and 40 years old were performed.8 following themes have been obtained: easy and uninterrupted communication with friends and family, ability to learn, possibility of co-existence of different groups, means for being updated, more success in raising children, understanding others’ thoughts, ascending interaction with people and low cost. At the end each of obtained themes were related into three paradigms of sociological analysis: social fact, social definition and social behavior. First theme was analyzed with the "colonization of life world" theory by Habermas, second theme with "exchange theory" by Homans, third one with "separation of time and space "by Giddens, forth with "differentiations Theory" by Baudrillard, fifth with "exchange theory" by Homans, sixth with "mystification theory" by Goffman and eight with "rational choice theory" by Colman.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3095

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

AMELI S. | HASANI H.

Issue Info: 
  • Year: 

    2012
  • Volume: 

    5
  • Issue: 

    1 (17)
  • Pages: 

    1-30
Measures: 
  • Citations: 

    2
  • Views: 

    228
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 228

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 2 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

FARROKHNIA RAHIM | LOTFI AZAM

Issue Info: 
  • Year: 

    2011
  • Volume: 

    7
  • Issue: 

    22
  • Pages: 

    95-118
Measures: 
  • Citations: 

    0
  • Views: 

    6200
  • Downloads: 

    0
Abstract: 

Wide spreading the modern information technology through all universal societies influenced on schemes in everyday life of peoples. Iranian youths are also influenced and this impress of acculturation is a parallel trend aside physical and visible surrenders. It is acceptable that Individuals as much operating the Cyber culture assimilating with them. The importing of new cultural factors by their appealing in the Cyber spaces consequence on reproducing the Cyber tastes.The understanding of the effect of Cyber space on the fashion of students of Islamic Azad University Branch Hamadan was conducted via applying a social survey through questionnaire and with a stratified sampling. Sample volume was 381 students. Results showed that there is a significant relation between Cyber culture and the amount of tendency to fashion.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 6200

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 1
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button