A Comparative Study of Criminalization Criteria in Cyber Space in the Criminal Systems of Iran and Germany

Document Type : Research Paper

Authors

1 Associate Professor of Criminal Law and Criminology Tarbiat Modares University, Tehran, Iran

2 Master’s in Criminal Law and Criminology, University of Shiraz, Shiraz, Iran

Abstract

Criminalization criteria in cyber space, in essence, declares the method of selecting moral regulations and its compilation in the form of laws. This approach is based on criteria such as: the principle of subsidiarity of criminal law, the principle of distinction in support of data, and other principles than are proposed to governments as approaches to criminal legislating in the convention of cybercrimes. This study seeks to answer these questions: "To what extent is the criminalization in cyber space, in the two criminal systems influenced by the international criminalization criteria in this realm?", and "What are the implications of the criminal system of Germany for the criminal system of Iran?" To answer these questions, qualitative methods, such as qualitative analysis of the contents of the Iranian and German criminal laws, and analysis of the discussion governing these laws, are used. Results of this study show that for example the German legislator strictly supports personal pleas, whereas the Iranian legislator only considers sensitive pleas as included Iran support. Furthermore, the German legislator considers being a child a form of vulnerability and considers a distinction in the support of individuals, whereas the Iranian legislator does not consider such a distinction.

Keywords

Main Subjects


1.Aslani ,H.( 2007) “ An Introduction to Electronic Health Information Privacy Law ”. Social Welfare 6 (25) pp.321-342 .(in Persian)
2.Alipour, Hasan. (2005) “Content-related crimes: Black Content of Information Technology in the Proceedings of the Conference on the Examination of the Legal Dimensions of Information Technology ”, The judiciary office of the Deputy of law and judicial Reform Center for Judicial reform syudies, pp. 265-221. (in Persian)
3.Bundesdaten schutzgesetz (BGBl.I 1990 S.2954), as amended by the law of 14 September, 1994,available at:< http://www.iuscomp.org/gla/statutes/BDSG.html>.2013/08/16
4.Campbell Quinn & m.kennedy , david. (2002) The psychology of computer criminals in computer security handbook forth edition : kohn wiley & sons Ins, New York
5.Convention on  Cybercrime,Budapest.23.XI.2001,available at:  <html://www.covention.coe.int/Treaty/en/Treaties/Html/185.html>.2006/06/19
6.Concil of Europe.(1981) Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data of 28.3.1981(ETS NO.108
7.Concil of Europe.(2001) Explanatory report to the Convention on Cybercrime
8.Concil of Europe.(2007) Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse of the Concil of Europe
9. Dezyani,Mohamad Hasan.(2005) Computer crimes, Volume 1,Management and planning of Islamic Organisation of Islamic Republic of Iran,Tehran, Limited edition, (in Persian)
10. Dezyani,Mohamad Hasan.(2004) Computer crimes, Volume 2,Management and planning of Islamic Organisation of Islamic Republic of Iran,Tehran, Limited edition, (in Persian)
11. Demetriou, Christina & silke , Andrew.(2003) A Criminological Internet sting , Oxford Univerity press Inc, British journal of Criminology Vol.43.
12. Directive 95/46/EC of the European parliament and of the Council of 24 October 1995 on the protection of individuals with regard to processing of the personal data and on the free movement of such data available,at:<http:www.cdt.org/privacy/eudirective/Eu-Directive-html>.2006/04/16
13. Delmas-Marty,Mirelle/Siber,Ulrich (2008) “Les chemins de 1harmonissation penale Collection  de L UMR de Droit Compare de Pris”,volum 15,paris.pp.127-202.
14. Gesetz gegen den unlauteren Wettbewerb vom 3. Juli 2004(BGBl. I 2004 32/1414) available at: < http://www.iuscomp.org/gla/literature/heidenreich.htm.sdfootnote2sym>(2012)
15. Hasani, Jafar. (2010) “Criminal Criteria Violation of personal privacy data in the cyber space”. A collection of articles on IT rights, legal affairs and judicial development of the judiciary, The judiciary office of the Deputy of law and judicial Reform Center for Judicial reform syudies pp. 171-194. (in Persian)
16. Jalali Farahani, Amir Hossein. ( 2011) The convention on cyber crime,Tehran, The judiciary office of the Deputy of law and judicial Reform Center for Judicial reform syudies.
17. Kadkhodaee, Hajimolla, Hiwa.(2014) “Disclosure of Classified Information by Wikileaks: A new Conflict Between The Right of Access to Information and National Security”, Comparative Law Review . Vol.5, No.2, Autumn,pp.535-557. (in Persian)
18. Moghadasi ,M.B, Farajiha, M.(2013) “Characteristics of Penal Populist Policies: A Comparative Study”, Comparative Law Review .Vol.4, No.2,pp137-155. (in Persian)
19.Michael, Alistair Kelman (2002) Electronic Commerce:law and practice,sweet &Maxwell,London
20.Michael L.Rusted &Thomas H.Koeng. (2005) Rebooting Cybertort Law,Washington Law Rewie,Vol.80. 
21.Personal Data protection Code.( 2003) sction 4,(1)(b).
22.Regulations on maintaining the secret and secret documents of the government, and specifying the types of documents and information approved on 1/10/1354; Official Gazette No. 1356/11/11/1354
23. Recommendation of the Coucil of the OECD Concering. (1997) Guidelines for The Cryptography policy,Strafgesetzbuches ,des Gesetzes durch Artikel 3 des Gesetzes vom 2.10.2009 BGBl. I S. 3214.
24. Sieber,Ulrich.( 1986) The international hand book on computer crime:Computer-related economic crime and the infringerments of privacy.
25.Sieber.Ulrich.(2001) Responsibility of Internet-providers,In Law,Information and InformationTechnologhy, E.LEDERMAN,R.SHAPIRA(eds.)TheHague,Kluwer International .Pp231-292 .
26. Sieber.Ulrich , (1994)Information Technology Crime,Heymann,vol 6.
27.United Nation, manual on the prevention and control of computer – related crime,para.114.
28.United Nations.( 1989) Convention on the Right of the Child,1577 UNTS.
29.William R.cheswick und steeven M.Belovin,Teil v, von:prof.Dr.ulrich sieber (1996) Fire walls and scherheit im internet von: Addision –wesley publishing company.