نوع مقاله : علمی - پژوهشی
نویسندگان
1 استادیار گروه حقوق جزا و جرم شناسی، دانشکده حقوق و علوم سیاسی، دانشگاه تهران، تهران، ایران
2 دانشجوی دکترای حقوق جزا و جرم شناسی، دانشکده الهیات و معارف اسلامی، دانشگاه میبد، یزد، ایران
3 دانشجوی دکترای گروه حقوق، دانشکده حقوق، دانشگاه تربیت مدرس، تهران، ایران
چکیده
کلیدواژهها
عنوان مقاله [English]
نویسندگان [English]
Self-defense provisions as an excuse in criminal law, in the Iranian legal system like other systems, are provided with a classical view. However, nowadays increasing the number of cyber-attacks in the cyberspace and the development of technology to oppose these attacks, prior of the intervention of state and irreparable damages of cyber-attacks, makes this question if it is possible to invoke self- defense to confront with cyber-attack as an excuse in criminal law? This paper seeks to scrutinize the possibility of generalization of classical self-defense provisions to new kind of attack in light of the philosophical foundation of self-defense and eventually to examine whether the provision of sec. 156 of the Iranian Islamic penal code is sufficient in this respect. Finally, it concludes this generalization is possible and the foundation of traditional self-defense can justify the self-defense in cyber-attacks. Moreover, this paper recognizes the self-defense as a right of users in cyberspace to protect their computer system and data such as a non-cyber space.
کلیدواژهها [English]
20. Byrd, B. S. (1987). “Wrongdoing and Attribution: Implications Beyond the Justification-Excuse Distinction”, Wayne L. Rev., 33.
21. Fletcher, G. P. (1984). “Rights and excuses”, Criminal Justice Ethics, Vol.3, No.2, pp.17-27.
22. Fletcher, G. P. (1985). “The right and the reasonable”, Harvard Law Review, pp.949-982.
23. Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). “The law of cyber-attack”, California Law Review, pp.817-885.
24. Lord, K. M., & Sharp, T. (Eds.). (2011). America's Cyber Future: Security and Prosperity in the Information Age, Vol. 1, Washington, DC: Center for a New American Security.
25. Marshall, J.B & Saulawa M.A(2015). Cyber- attacks: The legal response, International Journal of International Law, 1(2).
26. Training, U. A., & Command, D. (2005, August). Cyber Operations and Cyber Terrorism. In DC Intelligence. Fort Leavenworth, KA, USA: US Army. United States Congress (1984).
27. Definition of terrorism, United States Code Congressional and Administrative News, 98th Congress, Second Session, Oct, Vol. 19.