The holy Quran and tradition`s moral principles for prevention of cyber crimes

Document Type : Original Article

Authors

1 Assistant Professor and Faculty Member of NAJA Institute of Law Enforcement Sciences and Social Studies.

2 PhD student in criminal law and criminology and university lecturer.

3 Master of criminal law and criminology

Abstract
Cyberspace has become prevalent in the lives of millions people, but as much as it has turned into a tool of entertainment, gathering knowledge and information, it has deviated from the moral principles.  Islamic ethics consists of moral guidelines which shows the right path to human beings including the manner of using the information technology based on the human morality. There are various examples of these principles in the Qur'an and Sunnah, such as fulfilling the covenant, enjoining the good and forbidding the evil, or other cases, which in addition to their functions in preventing sin, can also be effective in preventing cybercrime as well. This study is based on a descriptive and analytical method, and its  findings show that the principles of Islamic ethics in the Qur'an and Sunnah are appropriate for all nations and times and when applied, lead to the creation of a moral society and subsequent success in crime prevention.

Highlights

All human beings have a secondary life and identity, and that is their life and identity in cyberspace, which is expanding day by day. Major changes in the more advanced and diversified cyberspace cause many changes in social structures and our physical environments which are often unpredictable. Currently, the growing influence of cyberspace among the people, especially in Muslim countries, is quiet considerable. If we do not take seriously the fact that we are building a new environment in which future generations will live, we will have a problem. Although ethical and professional principles for IT users, including professionals, have been adopted by professional organizations and committees such as the American Computer Machinery Association as cited in the article, however, given the growing number of cybercrime cases, it turns out that IT users, including professionals, still face many ethical issues. Islamic sources (Holy Quran and Sunnah) provide high moral standards for individuals, communities and levels of the ummah (nation). Islamic ethics is stable, comprehensive, just and standard that is suitable for all nations and times; and when pursued, it leads to the creation of a moral community, followed by success in crime prevention. This article introduces the main steps of the roadmap as well as new principles for cyberspace users based on Islamic moral values. This effort can be useful in solving many issues related to the ethics of cyberspace users. This provides a good opportunity for IT users, especially Muslims, to understand and implement the standard and comprehensive moral values ​​of their lives based on the moral principles of Islam, in order to succeed in preventing cybercrime.

 

Suggestions

1- Piety (fear of God) should be achieved as the main characteristic of a Muslim, so that he does not commit any crime that is harmful to others.

2- Tracking software can be installed to monitor and control the daily activities of IT users who use IT resources.

3- Different types of courses can be introduced based on Islamic ethics from elementary levels to higher education levels.

4-Understanding the fact that computer literacy and combining ethical issues with IT-related issues is a fundamental and essential skill in educational systems.

5- Creating a high level of awareness related to information security and issues related to cybercrime among home users, government and educational institutions, and in the private sector and among legal officers;

6- Increasing the exchange of information on information security and cybercrime at the regional and national levels;

7- Formation of policies and legal regulatory frameworks at the national level that are compatible with existing or developing legal instruments;

8- Establishing effective national and transnational mechanisms to prevent cybercrime and improve protection to identify and respond to cybercrime

9- Creating safe and secure environments for users, especially children and adolescents

10- Establishing effective mechanisms for identifying and responding to cybercrime at the national and regional levels, including the creation of environments that help report cybercrime

11- Accepting and agreeing of the people with the instructions related to observing the ethical principles governing cyberspace

12- Promoting the power of people's understanding of the destructive nature of immoral issues in cyberspace and creating obstacles in the way of these issues

 

Keywords


Article Title Persian

مبانی اخلاقی قرآن و سنت برای پیشگیری از جرایم سایبری

Authors Persian

محمدعلی عامری 1
جلال انصاری 2
مصطفی مرادی 3
1 Assistant Professor and Faculty Member of NAJA Institute of Law Enforcement Sciences and Social Studies.
3 Master of criminal law and criminology
1- Amini, Mohammad; Sharifzadeh, Fattah (2014), A Study of the Theoretical Relationship between Islamic Ethics and Organizational Framework Behavior, Ethics Research Journal, No. 25, pp. 151-172
2- Ansari, Jalal, Milani, Alireza, (2016), Critique of Iran's criminal policy against cyber fraud, criminal law and criminal policy, No. 1, pp. 145-164
4- Al-Tabatabai, Sayyed Mohammad Hussein (1417), Al-Mizan Fi Al-Tafsir Al-Quran, Teachers Association, Qom
5- Al-Tarihi, Fakhruddin, Bahrain Complex (unpublished)
6- Bai, Hossein Ali; Pourgharmani, Babak (2009), Jurisprudential and Legal Study of Pornography in Cyberspace, Islamic Law, No. 23, pp. 97-126
7- Pourshakibaei, Parivash; Jahani, Behzad (2017), Situation Prevention of Acid Spraying, Intelligence and Criminal Research, No. 1, pp. 33-54
8- Jahanshiri, Javad; Hosseini, Seyed Mohammad Reza; Ebrahimi, Ahmad (2015), Explaining the Preliminary Investigation Process in Cybercrime, No. 3, pp. 9-34
9- James Potter (2012), Recognition of Mass Media with Media Literacy Approach, translated by Amir Yazdanian, Payam Azadi, Ali Tod, Tehran, Radio and Television Research Center, 1st Edition
10- Khorramshad, Mohammad Baqir, Head of Sadat, Sayyed Ibrahim (2011)
11- Khazaei, Zahra (2008), Ethics of Virtue and Religious Ethics, Ethics Research Journal, Vol. 1, pp. 83-97
12- Khosroshahi, Ghodratullah (2009), Secondary prevention of crime and deviation in the teachings of the Qur'an, Social Welfare, No. 34, pp. 245-274
13- Khosroshahi, Ghodratollah, Namamian, Peyman, Shokrbeigi, Alireza (2011), Crime Prevention in the Light of Religious Teachings, Journal of Cultural Engineering, No. 57 and 58, pp. 8-23
14- Dehghanzadeh, Sajjad; Ahmadian, Fatemeh (2016), A Comparative Study of the Principle of Pleasure in Charvake's Philosophy and Epicurean Philosophy, Philosophical-Theological Research, Vol. 69, pp. 143-167
15- Sarikhani, Adel; Soltani Bohloli, Maryam (2016), The Role of the Executive in Social Crime Prevention, Justice Law, No. 94, pp. 141 - 154
16- Sabernejad, Ali; Hosseinpour, Peri (2017), Legal Analysis of the Typology of Violation of Privacy in Cyberspace, Public Law Researches, Vol. 3, pp. 111-128
17-Feyz Kashani, Mohsen (1361), Al-Mahja Al-Bayda Fi Al-Tahdhib Al-Haya, edited by Ali Akbar Ghaffari, Press Institute, Qom
18- Qayyumi Muqari, Ahmad Ibn Muhammad, (1418 AH), Al-Misbah Al-Munir, Beirut, publisher of Maktab Al-Asriya, vol.
19- Kakavand Ghaleh Noei, Fatemeh (2009), Psychological and physical effects of computer and Internet on children and adolescents, Report Journal, Vol. 215, pp. 12-13
20- Majlisi, Mohammad Baqir (1403 AH), Bihar Al-Anwar, Beirut, Dar Al-Ahya Al-Tarath Al-Arabi, vol. 68
21- Mohammadzadeh, Behnam (1397), Guarantees for the Protection of Intellectual Property in Law, Qanun Yar, No. 3, pp. 63-96
22- Malekan, Esfandiar; Salmani, Rasoul (2012), Computer viruses threaten the security of accounting information system, Accounting Research, Vol. 7, pp. 39-50
23- Momeni, Negar; Azizi, Sirus (2012), plagiarism (scientific) and the role of language tools in its identification and analysis, Detective Quarterly, Vol. 20, pp. 44-69
24- Najafi Aberandabad, Ali Hossein (2003). Criminology course lectures. Master's degree course in Qom Higher Education Complex, compiled by Mehdi Seyedzadeh
25- Ahn, Katherin (2006), A Study on the Methodology of Information Ethics Education in Youth, IJCSNS International Journal of Computer Science and Network Security, vol6, pp91-96
26- Berenbach, Brian (2009), Professional and Ethical Dilemmas in Software Engineering, Georgia Institute of Computer Technology, vol 42, pp 74-80
27- Couger, Daniel (1989), Preparing IS students to deal with ethical issues. MIS Quarterly journal, vol 13, pp- 211-218
28- Froehlich, Thomas, (2000), Rafael Capurro and the Challenge of Information Ethics, The International Information & Library Review, Volume 32, Pp 277-282
29- Gilbert, Jackie & Bette Ann, Stead, (2001), Ethical issues in electronic commerce, Journal of Business Ethics, vol34, pp75-85
30- Hilliard, Robert. L & C, Keith Michael (2007), Dirty Discourse: Sex and Indecency in Broadcasting, Hoboken, New Jersey, published by John Wiley & Sons
31- Iacovino, Livia (2013), Ethical Principles and Information Professionals: Theory, Practice and Education, Australian Academic & Research Libraries,vol33 ,pp57-74
32- Kenneally, Erin, Bailey ,Michael, Maughan, Douglas (2010),A Framework for Understanding and Applying Ethical Principles in Network andSecurity Research,International Conference on Financial Cryptography and Data Security,  Spain
33- Kimball , Marshall , (1999), Has technology introduced new ethical problems?, Journal of Business Ethics, VOL 19,PP 81–903
34- Leicester ,Nicola, (2016), Ethics in the IT Profession: Does a Code of Ethics have an Effect on Professional  Behavior  ?, Research Project in Information Management , wellington ,Victoria university of wellington

35- lourdu, vesna.j & Niveditha ,Daniel(2012), Ethics in cyberspace- a philosophical approach, International Journal of Advancements in Research & Technology, Volume 1,pp58-62.
36- Maghaireh, Alaeldin(2008), Shariah Law and Cyber-Sectarian Conflict: How can Islamic Criminal Law respond to cybercrime?, International Journal of Cyber Criminology, Vol 2 (2),pp 337–345
37- Peterson, Dane .K (2002), Computer ethics: The influence of guidelines and universal moral beliefs, Information Technology & People , vol15, pp346-361

38- Ronald, Sims؛ Brinkmann, Johannes(2003),Enron ethics (or culture matters more than codes),Journal of Business Ethics, vol 45, pp-243-256.