Abstract Information technology with all the capabilities and its complexity is vulnerable to threats. Thus, the field of information technology to commit criminal acts that was previously impossible to have provided. And its complexity is vulnerable to threats. New computer systems and enhanced opportunities for criminals to break the law and put at the disposal of potential criminal offenses such conventional methods have non-conventional.One of the most common types of computer crimes is crimes. Fraud is in cyberspace. These crimes such as fraud, including crimes against property and the property is considered a classic. Classic fraud, computer fraud and the offense of the process are different. However, one would conclude that the terms are ending. It is taking the property of another. But this distinction is also made ​​of penal policy that applies to the traditional fraud, computer fraud or not applicable.In this research the analytical and descritptive methods was applied using collected library resources.also,to conduct the research,internet resources were used too.in this research,the investigation capability,preliminary researches and thier related laws were investigated by defining the ciberspace,computerfraud,ciber criminals identification,serious strategies contrasting this crime and legally and technically comparing the two crimes KEYWORDS: Computer fraud, Traditional fraud, Penal policy, Cyber ​​Space. [1] – لذا اگر کسی پولی را از کسی بگیرد تا در مقابلش جنسی به او بدهد و بعداً گرفتن پول را انکار کند عملش کلاهبرداری نیست، زیرا به دست آوردن پول همراه با به کار بردن وسیله متقلبانه نبوده است. [2] Modem [3] -Data messarge [4] – Missuse [5] – Unauthorized Use [6] – Criminal Code ( Strafgesetz buch STGB) of Germany. Op. cit:”Section 263a – Computer Fraud 1)Whoever , with the internt of obtaining for himself or a third person an unlawful ,aterial bene fit , damages the assets of another by influencing the result of a data processing operation through incorrect configuration of a program , use of incorrect or incomplete data , unauthorized use of data or other unauthorized in fluence on the order of events , shall be punished with imprisonment for not more than five years or a fine … * ترجمه دقیق آن بدین شرح است: « هر کس با قصد کسب منفعت مادی غیرقانونی برای خود یا دیگری، با اثرگذاری بر نتایج یک عملیات داده پردازی از طریق ساختاربندی غیرصحیح یک برنامه، استفاده از داده های نادرست یا ناقص، استفاده غیرمجاز از داده ها یا اثرگذاری غیرمجاز دیگر بر جریان عملکردها، به دارایی دیگری خسارت بزند، با حبس تا 5 سال یا جزای نقدی مجازات خواهد شد … » [7]- input of data message

موضوعات: بدون موضوع  لینک ثابت


فرم در حال بارگذاری ...