Document Type : Scientific research

Authors

1 Glasgow

2 Ferdowsi University of Mashhad

Abstract

Abstract
Many challenges that exchange of information like trade secret information faced gave rise to the government intervention through using repressive tools in order to more e strong deterrence. However, peculiar characteristics of cyber space and variants ways of lawbreaking make the procedures and prosecution of their identification more complicated. These conditions made the penal policy inefficient in this area. Accordingly the owners of trade secrets have to use of dynamic security tools to protect their critical data necessities and accept part of crime prevention costs. This article tries to investigate the above mentioned issues and seeks to identify methods to evaluate preventive measures situation, as well. Although, due to the competitively and value of these information, there are always hackers who try to achieve them, therefore victims are still needed to be supported by the governmental and non-governmental institutions

Keywords

[1] Allesan, M. (2014). "Cyberspace Law", the Institute of Legal Studies and Research in science, , Tehran.(in persian)
[2] Alipour, Hassan. (2011). " Criminal Justice IT ' satisfaction publications , printing , Tehran . (in persian)
[3] Abbasi, Morad. (2010). " Cyberspace and challenges facing the preventive police " , Journal of promoting crime prevention studies , Issue XVII , winter 2010. (in persian)
[4] Babaei, Mohammad Ali and Najibyan, Ali. (2011). "Crime Prevention Challenges," Justice Law Journal, Vol. 75, No. 75. (in persian)
[5] Hadavand, Mehdi. (2005). "The Basics of trade secret protection of the rights of America", the journal of Justice, Issue XVII. (in persian)
[6] HasanBygy, Ebrahim. (2005). “Rights and the Internet in cyberspace ", published by the International Cultural Institute of Political Studies of Contemporary Abrar, printing, Tehran. (in persian)
[7] Jalali Farahani, Amirhossein. (2005). "Situational Prevention of Cybercrime in the Light of Human Rights", Journal of Law and Jurisprudence, Issue 6. (in persian)
[8] Jalali Farahani, Amirhossein. (2005)."Institution-Building for the Prevention of Cybercrime Looking Computer Crimes Act", the multi-agency approach to crime prevention, crime prevention a national articels, first edition, Department of Education Prevention of Police, Tehran. (in persian)
[9] Javan Jafari, Abdorreza. (2010)." Cybercrime and differential approach to criminal law ", Journal of knowledge and development eighteenth year, No. 34. (in persian)
[10] Khaleghi Poostchi, Ali. (2009). "The Prevention of Cyber Crime By Using Information and Communication Technology (ICT)», National scientific-practical conference abstracts, prevention of crime (judiciary - Mashhad), Mizan publication, first edition , Tehran. (in persian)
[11] KhanaliPour and Ajargah, Sakineh. (2011). “Technical Prevention of Crime ", the publishing, Tehran. (in persian)
[12] Kenneth C.Brancikl:"Insider computer fraud, An in-Depth Framework for Detecting and Definding Insider Attack", Auerbach publication (2008).
[13] Najafi Abrandabadi, alihossein. (2002). “Pleadings course criminology (prevention) "regulatory” Mehdi Seyedzadh, graduate higher education centers in Qom. (in persian)
[14] Niazpour, Amirhossien. (2003), "Delinquency Prevention's rights in Iran", Journal Legal Justice Year Issue (49-48). (in persian)
[15] paknahad, Amir. (2009). "Risk-based Criminal Policy," the Mizan publication, first printing, Tehran. (in persian)
[16] Rahbari, EbrahIm. (2009). "A Trade Secret Law", the printing, Tehran. (in persian)
[17] Rezaei, Ali. (2008) "E-commerce law", the publishing, printing, summer 2009 (in persian).
[18] Safari, Ali . (2001). " Principles of Prevention of Crime " , Journal of Law , No. 33 and 34 , spring to winter 2001. (in persian)
[19] Zybar, Ulrich. (2011)." Computer Crimes " , inversion : Mohammad Nouri and others , Ganje Dansh Press , second edition , Tehran. (in persian)
CAPTCHA Image