فصل نامه تحلیل حقوق اسلامی

مبانی اخلاقی قرآن و سنت برای پیشگیری از جرایم سایبری

نوع مقاله : Original Article

نویسندگان

1 Assistant Professor and Faculty Member of NAJA Institute of Law Enforcement Sciences and Social Studies.

2 Master of criminal law and criminology


1- Amini, Mohammad; Sharifzadeh, Fattah (2014), A Study of the Theoretical Relationship between Islamic Ethics and Organizational Framework Behavior, Ethics Research Journal, No. 25, pp. 151-172
2- Ansari, Jalal, Milani, Alireza, (2016), Critique of Iran's criminal policy against cyber fraud, criminal law and criminal policy, No. 1, pp. 145-164
4- Al-Tabatabai, Sayyed Mohammad Hussein (1417), Al-Mizan Fi Al-Tafsir Al-Quran, Teachers Association, Qom
5- Al-Tarihi, Fakhruddin, Bahrain Complex (unpublished)
6- Bai, Hossein Ali; Pourgharmani, Babak (2009), Jurisprudential and Legal Study of Pornography in Cyberspace, Islamic Law, No. 23, pp. 97-126
7- Pourshakibaei, Parivash; Jahani, Behzad (2017), Situation Prevention of Acid Spraying, Intelligence and Criminal Research, No. 1, pp. 33-54
8- Jahanshiri, Javad; Hosseini, Seyed Mohammad Reza; Ebrahimi, Ahmad (2015), Explaining the Preliminary Investigation Process in Cybercrime, No. 3, pp. 9-34
9- James Potter (2012), Recognition of Mass Media with Media Literacy Approach, translated by Amir Yazdanian, Payam Azadi, Ali Tod, Tehran, Radio and Television Research Center, 1st Edition
10- Khorramshad, Mohammad Baqir, Head of Sadat, Sayyed Ibrahim (2011)
11- Khazaei, Zahra (2008), Ethics of Virtue and Religious Ethics, Ethics Research Journal, Vol. 1, pp. 83-97
12- Khosroshahi, Ghodratullah (2009), Secondary prevention of crime and deviation in the teachings of the Qur'an, Social Welfare, No. 34, pp. 245-274
13- Khosroshahi, Ghodratollah, Namamian, Peyman, Shokrbeigi, Alireza (2011), Crime Prevention in the Light of Religious Teachings, Journal of Cultural Engineering, No. 57 and 58, pp. 8-23
14- Dehghanzadeh, Sajjad; Ahmadian, Fatemeh (2016), A Comparative Study of the Principle of Pleasure in Charvake's Philosophy and Epicurean Philosophy, Philosophical-Theological Research, Vol. 69, pp. 143-167
15- Sarikhani, Adel; Soltani Bohloli, Maryam (2016), The Role of the Executive in Social Crime Prevention, Justice Law, No. 94, pp. 141 - 154
16- Sabernejad, Ali; Hosseinpour, Peri (2017), Legal Analysis of the Typology of Violation of Privacy in Cyberspace, Public Law Researches, Vol. 3, pp. 111-128
17-Feyz Kashani, Mohsen (1361), Al-Mahja Al-Bayda Fi Al-Tahdhib Al-Haya, edited by Ali Akbar Ghaffari, Press Institute, Qom
18- Qayyumi Muqari, Ahmad Ibn Muhammad, (1418 AH), Al-Misbah Al-Munir, Beirut, publisher of Maktab Al-Asriya, vol.
19- Kakavand Ghaleh Noei, Fatemeh (2009), Psychological and physical effects of computer and Internet on children and adolescents, Report Journal, Vol. 215, pp. 12-13
20- Majlisi, Mohammad Baqir (1403 AH), Bihar Al-Anwar, Beirut, Dar Al-Ahya Al-Tarath Al-Arabi, vol. 68
21- Mohammadzadeh, Behnam (1397), Guarantees for the Protection of Intellectual Property in Law, Qanun Yar, No. 3, pp. 63-96
22- Malekan, Esfandiar; Salmani, Rasoul (2012), Computer viruses threaten the security of accounting information system, Accounting Research, Vol. 7, pp. 39-50
23- Momeni, Negar; Azizi, Sirus (2012), plagiarism (scientific) and the role of language tools in its identification and analysis, Detective Quarterly, Vol. 20, pp. 44-69
24- Najafi Aberandabad, Ali Hossein (2003). Criminology course lectures. Master's degree course in Qom Higher Education Complex, compiled by Mehdi Seyedzadeh
25- Ahn, Katherin (2006), A Study on the Methodology of Information Ethics Education in Youth, IJCSNS International Journal of Computer Science and Network Security, vol6, pp91-96
26- Berenbach, Brian (2009), Professional and Ethical Dilemmas in Software Engineering, Georgia Institute of Computer Technology, vol 42, pp 74-80
27- Couger, Daniel (1989), Preparing IS students to deal with ethical issues. MIS Quarterly journal, vol 13, pp- 211-218
28- Froehlich, Thomas, (2000), Rafael Capurro and the Challenge of Information Ethics, The International Information & Library Review, Volume 32, Pp 277-282
29- Gilbert, Jackie & Bette Ann, Stead, (2001), Ethical issues in electronic commerce, Journal of Business Ethics, vol34, pp75-85
30- Hilliard, Robert. L & C, Keith Michael (2007), Dirty Discourse: Sex and Indecency in Broadcasting, Hoboken, New Jersey, published by John Wiley & Sons
31- Iacovino, Livia (2013), Ethical Principles and Information Professionals: Theory, Practice and Education, Australian Academic & Research Libraries,vol33 ,pp57-74
32- Kenneally, Erin, Bailey ,Michael, Maughan, Douglas (2010),A Framework for Understanding and Applying Ethical Principles in Network andSecurity Research,International Conference on Financial Cryptography and Data Security,  Spain
33- Kimball , Marshall , (1999), Has technology introduced new ethical problems?, Journal of Business Ethics, VOL 19,PP 81–903
34- Leicester ,Nicola, (2016), Ethics in the IT Profession: Does a Code of Ethics have an Effect on Professional  Behavior  ?, Research Project in Information Management , wellington ,Victoria university of wellington

35- lourdu, vesna.j & Niveditha ,Daniel(2012), Ethics in cyberspace- a philosophical approach, International Journal of Advancements in Research & Technology, Volume 1,pp58-62.
36- Maghaireh, Alaeldin(2008), Shariah Law and Cyber-Sectarian Conflict: How can Islamic Criminal Law respond to cybercrime?, International Journal of Cyber Criminology, Vol 2 (2),pp 337–345
37- Peterson, Dane .K (2002), Computer ethics: The influence of guidelines and universal moral beliefs, Information Technology & People , vol15, pp346-361

38- Ronald, Sims؛ Brinkmann, Johannes(2003),Enron ethics (or culture matters more than codes),Journal of Business Ethics, vol 45, pp-243-256.