Culmination of Law

Culmination of Law

Legal-criminological investigation of cyber stalking and offline stalking

Document Type : Original Article

Authors
1 PhD in Criminal Law and Criminology, Faculty of Law, Ferdowsi University, Mashhad, Iran (Corresponding author)
2 Associate Professor of Criminal Law and Criminology, Faculty of Law, Ferdowsi University, Mashhad, Iran
3 PhD in Criminal Law and Criminology, Ferdowsi University, Mashhad, Iran
10.22034/thdad.2023.1990495.2385
Abstract
The growth and development of cyberspace, while providing an opportunity to enhance the standard of living of human beings, has also provided new tools for engaging in illegal and immoral activities that violate human rights, including the right to security and the right to privacy. Cyber stalking as a repetition and continuation of threatening behavior that causes psychological, emotional, and sometimes physical harm to the victim is one of the most widespread crimes in cyberspace that has much in common with its traditional type. But committing this crime in a space other than its traditional one has made cyber-ambushing practice more difficult and more difficult to detect, prove and prevent. Therefore, in order to prevent the irreparable effects of this crime, criminal policymakers have always sought to take appropriate and effective measures to prevent the victims of these crimes and in this regard have been inspired by theories of daily activities and lifestyle. The prevailing view of these theories is that the victimization of individuals is not accidental; Rather, individuals often expose themselves to motivated criminals as an attractive target by engaging in deviant behaviors, thereby facilitating their victimization
Keywords

Subjects


A: Persian
1. Books
. Bastani, Boroumand, (2004), Computer and Internet Crimes: A New Manifestation of Delinquency, First Edition, Payam Publications
Articles
. Pourghahrmani, Babak, (2012), "Computer Ethics, Its Principles and Rules from the Perspective of Islam and International and Domestic Regulations", Scientific Research Quarterly Journal of Jurisprudence and Fundamentals of Islamic Law, Year 4
Javan Jafari, Abdolreza, (2010), "Cybercrimes and the Differential Approach to Criminal Law", Journal of Knowledge and Development, Year 17
Shah Mohammadi, Gholamreza, (2016), Strategies for Situational Prevention of Cyberspace Harms" Quarterly Journal of Strategic Studies, Year 1
5. Alivardinia, Akbar; Malekdar, Azam, (2012), "Computer Crimes: Typology and Theoretical Explanation from the Criminological Perspective", Selected Articles of the Conference on the Prevention of Social Harms, National Welfare Organization, Tehran
Lak, Behzad, (2012), "Identification and Prevention of Cyber Ambush in Cyberspace", Detective, 5th year,
Yazdani Zenouz, Hormoz, (2009), "Privacy in Cyberspace", Collection of Articles on Information and Communication Technology Law, Legal and Judicial Development Deputy of the Judiciary, First Edition
Najafi Abrandabadi, Ali Hossein, (2012), "Criminology Essays", 7th Edition
Using a Multitheoretical Approach: Self-Control, Opportunity, and Control Balance.