Document Type : Research/Original/Regular Article

Author

Abstract

Due to the growing development of technology in recent times, great changes have occurred in man’s life, having positive and negative aspects; among the most important achievements is the telecommunicative progress which has brought human from telegraph and first telephones to internet phones. Such progress has caused commitment of many crimes, including communicative ones, which can be divided into pure telecommunicative and telecommunication-related crimes; each of these classes includes a wide spectrum of crimes.   The first category constitutes of crimes committed with telecommunicative tools and crimes against telecommunicative systems; while the latter consists traditional crimes which are transformed by telecommunicative systems.   In the Iranian legal system, despite the attempts to cover the instances of such crimes, a lot of partial and limited regulations and flawed criminalization have been made; a fact that necessitates a change in legislator’s approach and carrying out structural amendments in this field.

Keywords

الف) فارسی
1. آزمایش، علی؛ تقریرات جزای اختصاصی (جرایم علیه اشخاص و اموال)، مقطع کارشناسی ارشد، دانشگاه تهران، 1379-1378.
2. آقایی‌نیا، حسین؛ جرایم علیه اشخاص (شخصیت معنوی)، انتشارات میزان، تهران، 1386.
3. جلالی فراهانی، امیرحسین؛ بررسی قوانین و مقررات راجع به مزاحمت علیه اموال و اشخاص، مجله‌ی کانون وکلای دادگستری مرکز کرمانشاه، شماره‌ی 21-20، پائیز و زمستان 1387.
4. میرمحمدصادقی، حسین؛ جرایم علیه اشخاص، چاپ اول، نشر میزان، تهران، 1386.
5. میرمحمدصادقی، حسین؛ جرایم علیه اموال و مالکیت: کلاهبرداری، خیانت در امانت، سرقت و صدور چک پرداخت نشدنی (مطالعه تطبیقی)، انتشارات میزان، تهران، 1386.
 
ب) لاتین
3. Collins, Michael, Telecommunication crime (3), Computers & Security Journal, Vol. 19, No. 2, Elsevier Science Ltd, 2000.
4. Cradduck, Lucy; Mccullagh, Adrian, IdentifyingtheIdentityThief: Isittimefora (smart) AustraliaCard?, International Journal of Law and Information Technology, Vol. 16, No. 2,       Oxford University Press, 2007.
5. Cross, Michael, ThreatofCyberSabotageIncrease, Science Direct, 1999.
6. Cunningham, J. Lawrence, CuttingCellFraudFrequently, Security Management, 40.
7. Denning, D, CrimeandCryptoontheInformationSuperhighway, Journal of Criminal Justice Education, Vol. 6.
8. Grabosky, P.N; Smith, Russell G; Wright, Paul, CrimeandTelecommunication, Australian Criminology Institute, 1996.
9. Grabosky P.N; Smith, Russel G., TelecommunicationsandCrime: RegulatoryDilemmas, Law & Policy, VOL. 19, No. 3, July 1997.
10. Grabosky, P.N; Smith, Russell g., CrimeintheDigitalAge: ControllingTelecommunicationsandCyberspaceIllegalities, Federation Press, Sydney, 1998.
11. International Telecommunication Union (ITU) 2001, ‘TelecommunicationsIndicators, http://www.itu.int/ti.
12. Karl Seger, David; Von Storch, William, ComputerCrime: ACrimeFightersHandbook, Sebastopol, Calif. O’Reilly and Associates.
13. Naylor, R. T. (2000). ExpertPanelonEmergingCrimes: 4, Research and Statistics Division, Department of Justice: http://www.justice.gc.ca/en/ps/rs/rep/2002/expertpanel.pdf.
14. Royal Canadian Mounted Police (RCMP) 2001, ‘WhatisComputerandTelecommunicationCrime?, http://www.rcmp-grc.gc.ca/html/cpu-cri.html
15. Schiek, Michael, CombatingFraudinCableandTelecommunications, IIC Communications Topics, No. 13, London,        International Institute of Communications.
16. Smith, Russell G, StealingTelecommunicationsServices, Trends and Issues in Crime and Criminal Justice, No. 54, Canbera, Australian Institute of Criminology.
17. Zittrain, J. L. (2006). The Generative Internet, Harvard Law Review.  http://www.harvardlawreview.org/issues/119/may06/may06.shtml.