بانک اطلاعات وکلا وکیل وکیل پایه یک دادگستری وکیل دادگستری وکیل با سابقه موسسات حقوقی کارشناس دادگستری دفاتر اسناد رسمی
محمد رضا مهرجو
آدرس : تهران سید خندان ابتدای خیابان دبستان کوچه شهید صفا فردوسی بلاک 24واحد 10
تلفن تماس : 02188463970 - 09123347471
وب سایت محمد رضا مهرجو وكيل پايه يك دادگستري و مشاور حقوقي کانون وکلای دادگستری مرکز
علی طلایی
آدرس : تهران-میدان فاطمی-ابتدای خیابان جویبار-کوچه غفاری غربی ساختمان آناهیتا-ط 4 واحد 401
وب سایت علی طلایی وكيل پايه يك دادگستري و مشاور حقوقي کانون وکلای دادگستری مرکز
علی جاوید
آدرس : تبریز ، 17 شهریور جدید ،جنب بانک ملی ، ساختمان ایران ، واحد A14
تلفن تماس : 04135572731 - 09141193504
وب سایت علی جاوید وکیل پایه یک دادگستری و مشاور حقوقی کانون وکلای دادگستری آذربایجان شرقی و عضو هیئت علمی دانشگاه
سجاد حجازی
آدرس : میدان نبوت -بلوار ملاصدرا - ساختمان معین -طبقه دوم واحد 6
وب سایت سجاد حجازی وکیل پایه یک دادگستری و مشاوره حقوقی کانون وکلای دادگستری البرز
سرور ثانی نژاد
آدرس : تهران، خیابان پاسداران، خیابان عابدینی زاده (بین بهارستان 5 و 6)، پلاک 34، طبقه همکف
تلفن تماس : 22779314 - 09124357415
وب سایت سرور ثانی نژاد وکیل پایه یک دادگستری و مشاور حقوقی کانون وکلای دادگستری مرکز
سیدجلال میرکاظمی
آدرس : تهران - خیابان انقلاب - پیچ شمیران - روبروی تجدید نظر دیوان عدالت اداری ساختمان تنکابن - ط 6- واحد 28
تلفن تماس : 02177684200 - 09122406368
وب سایت سیدجلال میرکاظمی وکیل پایه یک دادگستری و مشاور حقوقی پذیرش کلیه دعاوی حقوقی ، کیفری ، خانواده دیوان عدالت اداری دادگاه انقلاب و دادگاه نظامی
علی رمضانزاده
آدرس : تهران، شهرک غرب،ابتدای بلوار فرحزادی،روبروی مجتمع تجاری میلاد نور،مجتمع تجاری شهرک غرب،طبقه سوم شرقی،واحد پنج.
وب سایت علی رمضانزاده وکیل پایه یک دادگستری و مشاور حقوقی کانون وکلای دادگستری مرکز
احسان عابدین
آدرس : تهران، خیابان پاسداران، خیابان عابدینی زاده (بین بهارستان 5 و 6)، پلاک 34، طبقه همکف
تلفن تماس : 22779314 - 09123956043
وب سایت احسان عابدین وکیل پایه یک دادگستری و مشاور حقوقی کانون وکلای دادگستری مرکز
منوچهر ناصري فر
آدرس : بابلسر بلوار پاسداران - نبش پاسداران 23 - مجتمع سامان طبقه پنجم واحد15
وب سایت منوچهر ناصري فر مشاور حقوقی قوه قضائیه و وکیل دادگستری
مطالب پربازدید
جدیدترین مطالب
 

جرم شناسی سایبر (به انگلیسی)

ارسال شده توسط : پرتال اطلاع رساني وكالت آن لاين در تاریخ : 23-07-1392
نسخه چاپی ارسال به دوستان

مشاوره تلفنی با وکیل 09128304909

بخش بسیاری از خدمات سایت وکالت آنلاین رایگان میباشد ولی شما میتوانید با اهداء کمک های مالی خود ما را در خدمت رسانی بهتر یاری نمایید.
جرم شناسی سایبر (به انگلیسی)

Introduction

Criminology during its one hundred years of life was ever seeking for detection of crime-creating factors and conditions affecting the expression of criminal behaviors in order to achieve the crime prevention methods and offenders’ treatment, improvement and training styles by means of all academic specialties.

Meanwhile the considerable point is that such an effort has been taken up to the beginning of 1360s and concurrent to emergence of cyber crimes only in the real world. Although there are some common points in the comparative studies of real space and cyber space, but cyber crimes have provided new studying gateways for the criminologists, because these crimes in their development trend not only have created the conceptual and evident challenge for the traditional penal law but has retained its specialized literature. However, some believe that reforming the traditional penal laws met the needs against cyber crimes, in return some other believe that the cyber world is a new world and cyber offenders as regard to the criminology are different from common offenders and require new punishments and treatments.

a.Definition of cyber criminology:

According to the definitions presented for cyber criminology and its comparison with the definitions presented for criminology so far, it is concluded that “cyber criminology is studying the crime occurrence in the cyberspace and its effects on the real world and course of actions for prevention such crimes”. The objective studies on the cyber crime files show that making the virtual personality by non-identification mentality as well as convenience and extension of committing some crimes in the cyberspace has provided a prone context for emergence of personality and mental vacuums, thus we believe that the real personality of a cyber offender should be sought in his cyber personality; in other word, the virtual personality made by the cyber offender indeed is his same “real self” that he couldn’t express in the real world due to the different reasons. So, as quoted by the French Professor Gaston Stephaney, “recognition of offender’s personality” is considered as an important topic in the cyber studied.

b.Characterization of cyber offenders:

Analyzing the personality of such offenders indicates that they exclude somehow an abstract ability and cannot image and visualize the outcome of their behavior in order to have self-control in prevention from committing the crime in the cyberspace. Such individuals are affected by the present and conduct their behaviors without any calculation and contemplation. For instance, in a case the cyber offender only because of anger disabled the database of university website, moreover disturbed the computer system and made problems for thousands of students to register and attempt the course credits and excused his criminal action only as momentary anger and inattention to what may be occurred. In another case, the cyber offender while programming was encountered in temporary disconnection of internet service and due to the momentary anger hacked more than 10 thousand of related ISP users.

The cyber offenders despite of technical capability and high intelligence are unable people and by seeking refuge to cyberspace cave try to compensate the deficits but they fail in this refuge and exit from their artificial refuge ad so called show themselves up. Probably aiding this fact, the cyber crimes prosecutor institutions are able to identify the cyber offenders within the short time despite of cyberspace complexity.

c.An overview on cyber crimes:

The titles of cyber crimes according to the Computer Crimes Law of Islamic Republic of Iran ratified in 2009 are as follows:

1.Unauthorized accessibility to the computer or communication data;

2.Unauthorized listening to transmitting content in the computer or communication data;

3.Unauthorized accessibility to the transmitting the secret data in the computer or communication data or data carriers or its achievement and listening;

4.Providing the transmitting the secret data in the computer or communication data or data carriers to the access of disqualified persons;

5.Disclosing or providing the transmitting the secret data in the computer or communication data or data carriers at the disposal of government, organization, companies or foreign group;

6.Breaching the security policies of computer or communication systems in order to access the secret data transmitting in the computer or communication systems or data carriers;

7.Unauthorized change in the reliable data or fraudulent creation or entry thereof;

8.Changing the data or signs available in the memory card or processing in the computer or communication systems or chips, or fraudulent creation or entry of data or signs therein;

9.Unauthorized deleting, destroying, disrupting, non-processing the other data of computer or communication systems or data carriers;

10.Unauthorized disabling or disrupting the computer or communication systems;

11.Unauthorized blocking for access of authorized users to the computer or communication data or systems;

12.Unauthorized stealing the data belonging to the others;

13.Unauthorized acquisition of  property via computer or communication system;

14.Publication of vulgar and obscene works via computer or communication system or data carriers;

15.Facilitating the accessibility of vulgar and obscene contents to the people via computer or communication system or data carriers;

16.Desecration through publishing the others’ deviated audio and video via computer or communication systems;

17.Propagating the falsehoods via computer or communication systems for hurting the others or disturbing the public;

18.Avoiding the filtration of criminal contents by the service providers;

19.Unauthorized use of international bandwidth based on the internet protocol for establishing the communications;

20.Producing, publishing, distributing or transacting the data or software or any other electronic tools used merely for the purpose of committing computer crimes;

21.Selling, publishing or accessing the password or any data that provides unauthorized accessibility to the computer or communication data or systems belonging to the others;

22.Training the styles of committing the crimes including unauthorized accessing, unauthorized listening, and computer spy, disrupting the data or computer and communication systems.

d.Cyber criminal etiology

Plenty of causes and reasons such as economic, cultural and political factors, mental and psychological problems such as depression, anger, jealousy, revenging, hating, recreation and entertainment, inferiority complex, inferiority, sense of competition are effective on the formation of cyber crimes as follows:

1-Economic crimes:

Crimes such as unauthorized acquisition of property via computer system or the same swindling is a sample of such crimes which are majorly committed with the economic purposes; for instance some cyber offenders access to the banking account information of users through fishing or entering the passwords and other information available in the related systems and so withdraw the funds from peoples’ banking accounts.

Moreover, in many cases, the computer crimes that apparently are not economic are committed with the economic motivations and vice versa some apparently economic cyber crimes are committed by noneconomic motivations; for instance in a case, the individual after accessing to computer system of his victim and achieving his personal documents and evidences, tried to extort him. Vice versa, in another case, the accused has penetrated to the banking account of one of bank clients only for expressing his capability in hacking and took an amount and refund it exactly to the bank in order to show lacking the banking network security and his high capability in this field. It is interesting that he explained the cause of his criminal behavior so: “whereas I was seeking for a job, intended to show my capability to the others in order to provide the requirements for employment!!”

2-Cultural crimes:

Cultural poverty and non-binding upon the society values and religious beliefs are considered as the important causes for committing some crimes in the cyberspace. As mentioned above, upon creation of cyber world, many barriers have been removed and crime commitment has been facilitated. Cyberspace has provided the conditions for the offenders to commit crime in spaces excluding where the outcomes and effects of their actions are appeared therein, and conveniently and with the lowest cost and anxiety occur the maximum losses and damages and yet remain unknown. Committing the crimes such as propagating the vulgar and obscene works via computer or communication system or data carriers, or facilitating the people’s access to vulgar and obscene contents are deemed as the cyber crimes that inattention to the morals and society values leads thereto. Establishing the immoral websites and promoting the sexual promiscuous and unhealthy relationships between the girls and boys as fried-finding sites, online immoral films distribution sites etc. are considered as such crimes.

3-Mental and psychological problems:

The major part of computer crimes committed in our country (Iran) is arising out of mental and psychological problems of cyberspace offenders. A man has propagated his wife’s personal photos and videos in the internet sites only because of dispute with his wife and for the purpose of revenging her. A woman has propagated her unveiled photos in the internet in order to only revenge his husband that has remarried. In another case, a man out of jealousy has installed the listening software on the computer of a woman and so received the texts of her personal chats and sent to the others. In other cases, the individuals by making the fake pages in the social websites dishonored and affronted his victims.

The samples of this part of cyber crimes committing causes are more extensive than other causes and reasons and require criminology studies in this context.

e.Cyber crimes victims:

Cyber crimes victims are indeed the victims of technology development but the notable point in the meanwhile is that many of cyber crimes victims express considerable talent for victimization and are victimized by the cyber offenders easily. Some internet defrauds by means of obtaining the information through very simple channels and misusing the personal photos and secrets are samples for this topic. We believe that the victim of cyber crime is not ever innocent and maybe own the beginner of cyber offense inadvertently.

Personality weakness, lack of sufficient information in relation to the cyberspace and inattention in preserving the data etc. are deemed as cases that helps the cyber crime victim in his victimization.

f.Preventive criminology in cyberspace:

At the end of this discussion, it is concluded that the loss incurred by the cyber crimes is more extensive and non-compensable than traditional crimes. The objective study on cyber crimes demonstrates this fact that in the most cases, material, moral and psychological losses are incurred to the victim. On the other hand, the specific nature of cyberspace requires cyber prevention seriously. Promoting the level of society’s information on cyberspace and informing of cyber crimes and confronting strategies, promoting the religious and moral beliefs particularly among the juveniles and youths are assumed as the course of actions for prevention from crimes formation in cyberspace.

منبع : حق گستر
بخش بسیاری از خدمات سایت وکالت آنلاین رایگان میباشد ولی شما میتوانید با اهداء کمک های مالی خود ما را در خدمت رسانی بهتر یاری نمایید.

موضوعات مرتبط

مطالب مرتبط

بیش از 90 سیستم رایانه ای طلا فروشان تهرانی طعمه کیلگرها شد
مراقب جاعلان رایانه ای باشید
هشدار پلیس به کلیک دزدها، حبس از یک تا پنج سال، در انتظار متقلبان کلیک
آیین نامه نحوه استفاده از سامانه های رایانه ای تصویب شد
37 فقره برداشت از حساب در پی افشان رمز بانکی
کلاهبرداری مالی بالاترین جرم رایانه ای کشور
هکر اطلاعات شخصی مشترکین ایرانسل دستگیر شد
چت کردن با نامحرم در فضای مجازی چه حکمی دارد؟
قمار و شرط بندی در فضای مجازی
حقوق سازمان های پخش اینترنتی در کنوانسیون های بین المللی و مقایسه آن با قوانین ایران

دیدگاه های شما

نام :
پست الکترونیکی :
وب سایت :
نظر :
اختصاصی برای مدیر سایت ( درصورت انتخاب این گزینه نظر شما در وب سایت دیده نخواهد شد )
 
لطفا از ارسال سوالات حقوقی در این صفحه خودداری نمائید . به سوالات حقوقی در این بخش پاسخ داده نمیشود .
 
 
کد امنیتی :
 
نسخه چاپی ارسال به دوستان

مشاوره تلفنی با وکیل 09128304909

 
اثبات مالکیت در خصوص املاک بدون سند یکی از راهکارهای پیشگیری از وقوع جرم ایجاد اشتغال برای خانواده های زندانیان است توضیح کشاورز درباره کلید سوالات و شکایات مربوط به آزمون وکالت 95 پول پس گرفتن ، آداب دارد ! ، راهکارهای باز پس گرفتن طلب زمانیکه هیچ مدرکی نداریم متهم مادرکشی: تحت تاثیر توهم ناشی از شیشه جنایت کردم وضعیت حقوقی احوال شخصیه ایرانیان غیر شیعه توصیه های حقوقی به خریداران خودرو حضانت در آیینه قانون مهریه بهترین سن اعلام فرزند خواندگی به کودک ، پیگیری اعطای تابعیت به کودکان دارای مادر ایرانی مطالبه وجه بیشترین پرونده های وارده به شوراهای حل احتلاف فساد از طریق خدشه وارد کردن بر سیاست دولت باعث اتلاف منابع ملی می شود تشریح قوانین تملک آپارتمان ها توسط معاون رییس کل دادگستری تهران بیش از 90 سیستم رایانه ای طلا فروشان تهرانی طعمه کیلگرها شد تصویب موافقتنامه همکاری ایران و لهستان در مبارزه با جرایم سازمان یافته قانون تسهیل ازدواج پرونده ای گمشده در بایگانی دولت ها حضور وراثت جدید پس از انجام مراحل انحصار وراثت تغییر کاربری اراضی زراعی با لحاظ شرایطی امکان پذیر است آیا تغییر کاربری اراضی کشاورزی و باغ ها امکان پذیر است ؟ 2 زندانی محکوم به قصاص از اعدام نجات یافتند