Culmination of Law

Culmination of Law

Scope and criteria for recognizing cyber security crimes

Document Type : Original Article

Authors
1 Doctoral student, Department of Criminal Law and Criminology, Qom branch, Islamic Azad University, Qom, Iran.
2 Criminal Law and Criminology, Qom , College Department of of Farabi , University of Tehran, Qom, Iran
3 Department of Criminal Law and Criminology, Qom , College of Farabi , University of Tehran, Qom, Iran
Abstract
Today, there is no less hesitation in accepting cyber security crimes as a new type of cyber crimes. However, views and opinions on recognizing the scope and criteria of cyber security crimes are diverse and different, based on this necessity and due to the importance of space. Cyber has opportunities and threats, and the prominent role of cyber power in the position of countries in the global power hierarchy. The main challenge is to know the scope and criteria of cyber security crimes, which has caused controversy, so that different divisions The types and examples of security crimes have been presented. It has been stated and it is possible to commit it, including the Law on Punishment of Crimes of the Armed Forces, which has also examined the procedure for investigating these crimes. Showed that for a comprehensive and accurate understanding of cyber security crimes should be intercepted An adaptive-comparative finding was used and a framework based on interdisciplinary perspective and integration of all approaches was considered. Accordingly, an alternative analytical framework based on the linkage of these approaches is presented.
Keywords

Subjects