چالش‌های پلیس ایران در تفتیش و توقیف داده و سامانه در پیشگیری وکشف جرم

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشیار گروه فرماندهی و مدیریت انتظامی. دانشکده دافوس. دانشگاه جامع علوم انتظامی امین

2 استادیار گروه حقوق. دانشکده علوم و فنون انتظامی. دانشگاه افسری و تربیت پلیس امام حسن مجتبی(ع).

چکیده

  استفاده از داده‌ها و سامانه‌های رایانه­ای به‌عنوان موضوع و ابزار ارتکاب جرم از جمله نمودهای پیوند منفی بین این فناوری­ها با حقوق کیفریاست . هدف این پژوهش شناسایی چالش­های پلیس ایران در تفتیش و توقیف داده و سامانه در پیشگیری و کشف جرم است. پژوهش حاضر از نظر هدف، کاربردی و از نظر نوع پژوهش توصیفی– تحلیلی و در زمرة تحقیق کیفی است. با استفاده از منابع کتابخانه­ای و مصاحبه با خبرگان دانشگاهی، داده­ها جمع­آوری و به روش تحلیل محتوای کیفی تجزیه و تحلیل شده است. یافته­ها بیانگر این است که پلیس در تفتیش و توقیف داده و سامانه با دو دسته از چالش­ها شامل؛ چالش­ها در حوزه حفظ حریم خصوصی اشخاص و درحوزه محدودیت و خلاءهای تقنینی است. بنابراین رفع خلاءهای تقنینی در حوزه حریم خصوصی و اختیارات پلیسی و دسترسی آن­ها به پایگاه‌های داده جهت پیشگیری و کشف جرم، در رفع چالش­های پلیس در تفتیش و توقیف داده و سامانه در ایران مؤثرند.

کلیدواژه‌ها

موضوعات


عنوان مقاله [English]

The challenges of the Iranian police in the Search and Seizure of data and the System in the Prevention and Detection of crime

نویسندگان [English]

  • sayyad darvishi 1
  • mohsen rezaee 2
1 Associate Professor of Police Command and Management Department. Dafoos College. Amin Comprehensive University of Police Sciences
2 Assistant Professor of Law Department. Faculty of Police Sciences and Techniques. Imam Hasan Mojtaba University of Officers and Police Training
چکیده [English]

The use of data and computer systems as the subject and means of committing a crime is one of the manifestations of the negative link between these technologies and criminal law. The purpose of this research is to identify the challenges of the Iranian police in the search and seizure of data and the system in the prevention and detection of crime. The current research is applied in terms of its purpose, and descriptive-analytical in terms of its type and in the category of qualitative research. By using library resources and interviews with university experts, data has been collected and analyzed by qualitative content analysis method. The findings indicate that the police faces challenges in the search and seizure of data and the system with two types of challenges including: The The challenges are in the field of protecting the privacy of individuals and in the field of legislative limitations and loopholes. Therefore, the elimination of legislative gaps in the field of privacy and police powers and their access to databases for the prevention and detection of crime are effective in solving the challenges of the police in inspecting and confiscating data and systems in Iran.

کلیدواژه‌ها [English]

  • Electronic data
  • Prevention
  • Crime Detection
  • Inspection
  • Seizure
  • Iranian police
Ashawa, M., Mansour, A., Riley, J., Osamor, J., & Owoh, N. P. (2024). Digital Forensics Challenges in Cyberspace: Overcoming Legitimacy and Privacy Issues Through Modularisation. Cloud Computing and Data Science, 140-156. https://ojs.wiserpub.com/index.php/CCDS/article/view/3845
Baraz, A., & Montasari, R. (2023). Law Enforcement and the Policing of Cyberspace. In Digital Transformation in Policing: The Promise, Perils and Solutions (pp. 59-83). Cham: Springer International Publishing.
Casey, Owen (2008). Digital reasons and computer crime; Legal Science, Computers and Internet (Translators: Amir Hossein Jalali Farahani and Ali Shayan), first edition, Tehran: Selsbeil Publications. [In Persisn]
Dezbani, M. H. (2005). The beginning of computer-cyber crimes, informatics newsletter, number 93. [In Persisn]
Fazli, M. (2012). Criminal liability in cyberspace, second edition, Tehran: Khorsandi Publications. [In Persisn]
Hasan, M. S. (2023). Application of Fundamental Rights in Cyberspace: A Dissection of the Digital Security Act. Available at SSRN 4412447.
Jaafari Langroudi, M. J. (2022), expanded on legal terminology. Tehran: Ganj Danesh Publications, [In Persisn]
Jalali Farahani, A. H. (2007). Advantages and limitations of cyberspace in the fields of freedom of expression, freedom of information and privacy. Justice Journal, 71(59), 61-100. [In Persisn]https://www.jlj.ir/article_ 
Jovan Jafari, A. R. (2016), cyber crimes and the differential approach of criminal law with a look at the Islamic Penal Code section of computer crimes. Master's thesis, University of Mashhad. [In Persisn]
Karami, D. (2015). Differential criminal policy in cyber crimes with an emphasis on Iranian criminal law, Master's thesis, University of Qom. [In Persisn]
Kelsen, Hans (2020). The law of the United Nations, London, 5th edition, Stevens Press.
Kubben, P., Dumontier, M., & Dekker, A. (2019). Fundamentals of clinical data science.
Khater, M. H. (2023). International Perspective on Securing Cyberspace Against Terrorist Acts. International Journal of Sociotechnology and Knowledge Development (IJSKD), 15(1), 1-11.
Mirfallah, S.M. (2015). FATA police tactics in detecting cyber crimes, Master's thesis, Payam Noor University, Tehran province. [In Persisn]
Moradi Haqgo, F., Shamlou, B., & Saibani, A.R. (2022). Passive jurisdiction in dealing with cybercrimes: conditions; Challenges and consequences. Police Criminology Research, 3(6), 163-184. [In Persisn]doi: 10.22034/cr.2022.1266426.1060
Ngcece, S., & Mkhize, S. M. (2023). An Exploratory Study of the South African Police Services (SAPS) Systems in Combating Cybercrime. In Cybercrime and Challenges in South Africa (pp. 159-175). Singapore: Springer Nature Singapore.
Purtova, N. (2018). The law of everything. Broad concept of personal data and future of EU data protection law. Law, Innovation and Technology, 10(1), 40-81.
Pournajafi, L., Fakhr, H. & Pourgahermani, B. (2022). Refining the cyberspace as a crime or a tool to prevent it? Research paper on criminal law. 2(3), 163-187   [In Persisn] doi: 10.22124/jol.2022.20840.2214
Rahiminejad, I. (2023). Basic challenges of crime prevention rights in Iran. Research Journal of Criminal Law, 14(1), 115-89.  [In Persisn]doi: 10.22124/jol.2022.21908.2268
Rathmell, A., & Valeri, L. (2018). Handbook of legislative procedures of computer and network misuse in EU countries, Study for the European Commission Directorate General Information Society. Cambridge: Rand Europe.
Ryngaert, C. (2023). Extraterritorial Enforcement Jurisdiction in Cyberspace: Normative Shifts. German Law Journal, 24(3), 537-550. DOI: https://doi.org/10.1017/glj.2023.24
Tabrizi, S., Aalipour, H., Elahi Menesh, M.R. (2022). The principle of proportionality in the seizure of data and the system in the criminal process. Justice Journal, 86(117), 131-152.  [In Persisn]
https://www.jlj.ir/article245408.pdf
Taghi Zadeh, M., & Kosha, J. (2022). the effectiveness of traditional police powers in detecting transnational cyber crimes, International Police Studies Quarterly, 13(52), 55-78  [In Persisn]    doi: 10.22034/interpol.2023.1270640.1303 http://interpol.jrl.police.ir/article.pdf
Thomas, M. Chen & Davies,C. (2016), A Brief Description of Electronic Attacks, Deputy Legal Affairs and Majlis Naja, Applied Research Center, [In Persisn]
Winn, Jane K. & Wright Benjamin, (2011), Law of Electronic Commerce, Fourth Edition, Aspen Law & Business Supplement.