|
|
 |
Search published articles |
 |
|
Showing 3 results for Zamani
Dr Amin Pazhouhesh, Mrs Afsaneh Zamani, Volume 7, Issue 1 (9-2018)
Abstract
The purpose of the present article is studying continuation of the cycle of cybercrime and providing strategies for its prevention management. Cybercrime is a range that one side relies on technology and the other side, relies on interpersonal relationships. The aim of the present study, functional and in terms of type, quality and according to the method of data collection, library and study based on internal and external online resources. Paper reviews the literature and concludes the interval between supply technology and related crime and criminal laws do not fit and often the possibility of transferring experience to the field of cybercrime is not possible. However, due to the widespread nature of the phenomenon, appropriate, dynamic and agile legal framework is an urgent need for investigation and prosecution. This research has some preventive strategies such as threat assessment and strategic analyzes, development of cooperation between national, regional and international levels, and to increase awareness and educate points.
Mrs Afsaneh Zamani, Dr Amin Pazhouhesh, Volume 7, Issue 2 (3-2019)
Abstract
This paper tries to investigate the question of how virtual cybercrimes fall within the realm of criminal law and what their principles and conditions of criminalization are. Despite the large number of Internet users in virtual worlds, such as "Second Life", there has been limited literature and research especially on the extent and scope of the issue, the identity of the perpetrators and victims, as well as the consequences of cybercrimes. The present study is an applied and qualitative research and according to data collection, it is a library research (meta-analysis secondary studies) on the basis of internal and external online resources. The article provides necessary and sufficient conditions to include virtual cybercrime in a subset of criminal law by using philosophical ontology as well as philosophy of law. It is concluded that necessary condition for virtual-cyber acts as a crime to be placed under law to obtain a Meta-Virtual outcome. The sufficient condition is that the outcome of this entity, justifies interference with the freedom of citizens to use the criminal law on the basis of a principle limiting freedom of Feinberg.
Morteza Asadi, Mohammad Reza Zamani, Kasra Tawakoli, Volume 13, Issue 1 (8-2024)
Abstract
Passwords have been utilized as the primary means of authentication since the inception of the World Wide Web and the introduction of online services. The security risks associated with the use of passwords and their vulnerabilities to various types of cyberattacks have rendered this method no longer secure. In recent years, online service providers have sought to protect their users and data from cyber threats by implementing various multi-factor authentication methods. Although these methods have been successful in reducing the incidence of security breaches, they have generally resulted in increased complexity for users. The FIDO standard employs asymmetric encryption, mandates the storage of the private key on the user’s device, and combines it with biometric factors, thereby enabling the most secure authentication method for systems while simplifying the process for users [1-4]. This standard monitors the entire authentication process and prevents potential risks by establishing regulations within operating systems, browsers, and authentication tools. Rahavard Samanehaye Amn Company has implemented this standard locally, offering FIDO authentication under the product name ”Neshane” for smart phones. This article discusses the applications, specifications, and capabilities of this standard and the developed product.
|
|