Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Journal: 

JOURNAL OF CYBER LAW

Issue Info: 
  • Year: 

    2024
  • Volume: 

    1
  • Issue: 

    3
  • Pages: 

    1-21
Measures: 
  • Citations: 

    0
  • Views: 

    0
  • Downloads: 

    0
Abstract: 

Phishing, as a common threat in the digital space, employs deceptive methods such as sending fake emails or creating imitation websites to steal users’ sensitive information. These attacks not only jeopardize cybersecurity but also infringe on individuals’ privacy. In Iran, despite legal advancements in data protection, challenges remain in combating phishing and safeguarding users’ privacy. The aim of this article is to examine the conflict between digital security and individual freedoms in the context of phishing and privacy rights in Iran. The research method is descriptive-analytical, based on documentary study. The findings indicate that although laws such as the Computer Crimes Act and related executive regulations exist, gaps in implementation and oversight increase users’ vulnerability to phishing attacks. Therefore, strengthening regulatory infrastructures, raising public awareness, and fostering cooperation between governmental and private institutions are essential for effective countermeasures against these threats. This study also highlights innovative approaches for balancing security and individual rights in the Iranian legal context.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 0

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

KHAMENEHZADEH HANNANEH

Journal: 

BAGH-E NAZAR

Issue Info: 
  • Year: 

    2017
  • Volume: 

    14
  • Issue: 

    49
  • Pages: 

    33-44
Measures: 
  • Citations: 

    0
  • Views: 

    355
  • Downloads: 

    210
Abstract: 

Privacy, as the process in which humans regulate their relation with the others and achieve the experience of introspection, can be reached in the ‘house’ more than everywhere else. This phenomenon and its realization in the life world of house is studied and analyzed in this essay.There are various definitions of privacy from different points of view, but they mostly confirm that privacy is a spectrum as a concept. The basic hypothesis of this research is that failing to pay attention to the spectrum-like nature of privacy in designing living spaces especially ‘houses’, has on many occasions caused such spaces to be built by considering only one aspect of such concept. ‘Individual privacy’ and ‘collective (group) privacy’ are on both extremes of the privacy spectrum and two equal aspects of one nature, and they must be considered simultaneously for the optimum realization of privacy. Giving priority to either of the aspects or ignoring each of them can result in mental or social damages and turn the atmosphere of the house into an ineffective place in the extensive provision of the needs of the residents.Assuming a qualitative approach on the basis of interpretive historical method, this research has analyzed the realization of privacy spectrum in the two groups of pre-modern and modern Iranian houses. According to studies, a one dimensional/one faceted approach to the spectrum nature of the privacy in either group of the houses has led to the elimination of some territories. So either of personal/ individual identity and collective identity is bold in one of these two groups of houses. Therefore, the all-inclusive consideration of privacy spectrum and trying to achieve all of its aspects can be considered a comprehensive approach.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 355

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 210 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1393
  • Volume: 

    4
Measures: 
  • Views: 

    350
  • Downloads: 

    0
Abstract: 

لطفا برای مشاهده چکیده به متن کامل (PDF) مراجعه فرمایید.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 350

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Journal: 

COMPUTERS AND SOCIETY

Issue Info: 
  • Year: 

    2001
  • Volume: 

    31
  • Issue: 

    1
  • Pages: 

    6-11
Measures: 
  • Citations: 

    1
  • Views: 

    145
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 145

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Abbasi Atefeh

Journal: 

MEDICAL LAW

Issue Info: 
  • Year: 

    2020
  • Volume: 

    14
  • Issue: 

    54
  • Pages: 

    115-130
Measures: 
  • Citations: 

    0
  • Views: 

    893
  • Downloads: 

    0
Abstract: 

Information technology provides better medical services and so appropriate conditions for misuse of personal information. Medical information is an important part of sensitive computer data. For the growing of information technology. Protection of patient`s privacy in cyberspace has become one of the main matters of medical law. To this end. The rules are set out in international documents including the right to choose beneficiaries at the information gathering stage. Observance of data security. transparency and access to data and accuracy in data retention. The necessity of related processing and the prohibition of disclosure of data at the stage of information use and finally. the need to eliminate or prohibit transboundary data transfer at the end of the patient status process, however the constitution and some of laws emphasize to privacy and non-disclosure of patients but E-commerce law and cybercrime law generally refer to the protection of such information and without regard to the above sequence and order. Merely refer to the principles of subject satisfaction. Legal collection. as well as data dilatation. The principle of data accuracy and their elimination. Punishments were not sufficient to ensure compliance with the above principles. It is necessary to comply with the precise criteria mentioned above together with appropriate them.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 893

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 1
Journal: 

CULMINATION OF LOW

Issue Info: 
  • Year: 

    2022
  • Volume: 

    8
  • Issue: 

    1
  • Pages: 

    -
Measures: 
  • Citations: 

    0
  • Views: 

    41
  • Downloads: 

    5
Abstract: 

The crime detection stage is considered as one of the most significant stages of the criminal proceedings. In cases which are related to sexual offenses such as rape and require violating individual privacy ,therefore is a place of conflict between individual and social rights. The first principle in Imamiyeh jurisprudence and, consequently, the criminal law of Iran, is the maximum observance of individual privacy, which requires the impermissibility of invading one’s privacy and failing to detect a crime. Violation of this principle requires a reason. This article, in a descriptive-analytical method and through using library resources, aims to explore the impermissibility of invading individual privacy in sexual crimes. The findings of the study indicate that there is no Quranic or narrative evidence for such cases which prohibits invading individual privacy when there are more important issues, such as the preservation of an innocent person's personal life or the need to prevent further prostitution or extortion of a completely innocent victim and the realization of his or her rights. Hence, such investigations are necessary due to the need to help the oppressed and to counter the spread of prostitution; This matter has not been neglected to some extent by legislators, and in two articles of  241 Q.M.K and 102 D.K, the investigation is permitted by the judicial authority within the scope of the complaint in cases of sexual assault.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 41

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 5 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Moslemi Shiva

Issue Info: 
  • Year: 

    2021
  • Volume: 

    1
  • Issue: 

    4
  • Pages: 

    10-16
Measures: 
  • Citations: 

    0
  • Views: 

    149
  • Downloads: 

    71
Abstract: 

Purpose: In the past, big data was the concern of governments and large commercial industries, and so these organizations had infrastructures separate from the public network to store and process their data. But today, big data is easily accessible to everyone through cloud infrastructure. In recent years, with the explosive development of the Internet, data storage and data processing technologies, privacy has been one of the major concerns in data mining Methodology: In this paper, after examining the dimensions and key components of flax data, privacy in big data; Blockchain solution for privacy protection is examined. Findings: This topic provides new opportunities for researchers in knowledge processing tasks. However, these opportunities often bring challenges as well. Originality/Value: Big Data means a very large database that can be structured or unstructured. Big data is a database that is constantly getting bigger with the increase of information. Also with the rapid advancement of the Internet, data storage and data processing technologies, big data privacy has attracted a lot of attention. Before applying big data technology to mass applications and applications, a basic issue called privacy must be explored.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 149

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 71 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SHAHRIARI HAMID

Issue Info: 
  • Year: 

    2007
  • Volume: 

    8
  • Issue: 

    3-4 (31-32)
  • Pages: 

    101-125
Measures: 
  • Citations: 

    1
  • Views: 

    5685
  • Downloads: 

    0
Abstract: 

As we know information technology has a special role in the organization and retrieval of information to such a huge extent that was almost impossible before. This may entail interest and loss. This article attempts to answer two questions: what is the definition of privacy? And In which cases respect for privacy is necessary? Discussing about the concept of ‘privacy’, the paper presents a value-judgment on disclosure of privacy information with regard to Islamic values. Then it points out that one action may be known as being under several titles; so, there can be independent value-judgment in terms of each title. The Next point is that sometimes the value of privacy is in antithesis to the value of institutional purposes; in such a case, solving the conflict should be done according to priority of values in the teaching of Islam.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 5685

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

AGARWAL R. | SRIKANT R.

Issue Info: 
  • Year: 

    2000
  • Volume: 

    -
  • Issue: 

    -
  • Pages: 

    439-450
Measures: 
  • Citations: 

    2
  • Views: 

    235
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 235

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 2 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

ISLAMIC LAW

Issue Info: 
  • Year: 

    2012
  • Volume: 

    8
  • Issue: 

    31
  • Pages: 

    7-32
Measures: 
  • Citations: 

    0
  • Views: 

    1222
  • Downloads: 

    0
Abstract: 

Opponents of protection of privacy are so interested in acquiring, processing, and even commercializing individual data. This act, even if it is accompanied upon permission of the individual, will endanger personality and individual and social security of the person and his privacy. Thus, one of the main questions in the field of privacy concerns the extent of persons' rights and the extent their wills may influence privacy and possibility of assigning or relinquishing it in relations between individuals. The reply depends on whether privacy is a "right" or an "award". If it is an award, then a person cannot compositionally intervene in assigning or relinquishing it; though it seems possible by applying creative will. The aspects of the privacy related to human dignity, personality and spiritual prestige of the person being subject to privacy, are assumed as "awards" but aspects not related to the above which if disclosed will not harm persons' spiritual prestige are "rights" and may be considered as property and assigned or relinquished if necessary.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1222

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button