A

  • Aalikhani.Leila The Principle of Immediacy in Legal Sanctions for the Violation of Fashion Designers’ Intellectual Property Rights [ Vol.2, Issue 2 - Summer Year 1402]
  • Ahadi.Fatemeh An Analysis of the FATA Police Structure in the Light of the Theory of the Left Realist Criminology [ Vol.1, Issue 1 - Spring Year 1401]
  • Alavi.Seyed Hosein The role and position of territorialization and border guarding of cyber space in exercising sovereignty over national cyberspace [ Vol.3, Issue 2 - Summer Year 1403]
  • alayee fard.sepideh The principle of Proportionality in Light of the Use of Artificial Intelligence in Armed Conflicts [ Vol.3, Issue 1 - Spring Year 1403]
  • alipor.hassan The Principle of Immediacy in Legal Sanctions for the Violation of Fashion Designers’ Intellectual Property Rights [ Vol.2, Issue 2 - Summer Year 1402]
  • alipor.hassan A Feasibility Study of Crime Prevention in the Dark Web [ Vol.2, Issue 3 - Autumn Year 1402]
  • Alizadehseresht.Nader Effectiveness Requirements for Foreign Criminal Laws and Sentences in The National Territory: Developments, Obstacles and Solutions in the Field of Cybercrimes [ Vol.3, Issue 1 - Spring Year 1403]
  • Anabi.Alireza An Introduction to International Law of Cyberspace [ Vol.1, Issue 4 - Winter Year 1401]
  • Ansari Mahyari.Alireza Cyber Attacks from the Perspective of the Use of Force Stipulated Under International Law [ Vol.1, Issue 2 - Summer Year 1401]
  • Ansari Mahyari.Alireza Investigation of the Ways to Reduce Cyberattacks from the Perspective of the International Humanitarian Law [ Vol.1, Issue 3 - Autumn Year 1401]
  • Ansari Mahyari.Alireza The principle of Proportionality in Light of the Use of Artificial Intelligence in Armed Conflicts [ Vol.3, Issue 1 - Spring Year 1403]
  • Ansari Mahyari.Alireza Examining the position of deep web and dark web in international law [ Vol.3, Issue 2 - Summer Year 1403]
  • Arabian.MohammadJavad Challenges of Applying the Principles of Armed Conflict to Cyber Attacks Case Study: Observance of the Principle of Prohibition of the Use of Force and the Principle of Distinction in Cyber Attacks [ Vol.1, Issue 2 - Summer Year 1401]
  • arman.ali Imbalance Between Cybercrime Punishments with Some of the Corresponding Traditional Crimes [ Vol.1, Issue 2 - Summer Year 1401]
  • Asgari.Soheila Analyzing the Current Status of the Forensic Linguistics and Its Development Strategies in Cyber Linguistics [ Vol.2, Issue 3 - Autumn Year 1402]
  • azimzadeh.عظیمزاده The Free Circulation of Information and Interference of competences in the Procedure of the Supreme Council of Cyberspace [ Vol.2, Issue 4 - Winter Year 1402]

B

  • Babai.Samaneh Jurisprudential Feasibility Of The Right To Anonymity In Cyberspace [ Vol.3, Issue 1 - Spring Year 1403]
  • bagheri.jahangir Right to “Self-Defense” against Cyber-attacks with an Emphasis on the Attacks of the United States of America [ Vol.2, Issue 1 - Spring Year 1402]
  • Bagheri.Jahangir The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America [ Vol.3, Issue 2 - Summer Year 1403]
  • barzi.vadood Disclosure of E-commerce Secrets Stipulated Under the Competition Law of Iran and Law of European Union [ Vol.1, Issue 3 - Autumn Year 1401]
  • behdadi.amirali The Nature of the Decision of the Working Group to Determine Examples of Cyberspace Criminal Content and Its Consequences [ Vol.1, Issue 4 - Winter Year 1401]
  • Beigi.Jamal Situational Prevention Approaches of Iran's Criminal Policy Against Cyber Security Violations in the Light of International Documents [ Vol.2, Issue 1 - Spring Year 1402]
  • Beiki shouroki.Mahdi Examining the Necessary Changes in the Structure, Organization and Systems in Judiciary for Implementation of the Electronic Proceedings [ Vol.3, Issue 2 - Summer Year 1403]
  • bidarvand.mokhtar A Study of the Preventive Role of the Media Literacy in Occurrence of Cybercrimes in Iran Over Duration of the COVID-19 Pandemic [ Vol.3, Issue 1 - Spring Year 1403]

D

  • darrehshiri.davood A Legal Analysis of the Harassment of Women in Cyberspace [ Vol.2, Issue 2 - Summer Year 1402]
  • dehghanfar.azadeh A Study of the Role of Environmental Factors in Committing Crimes by the Cyberspace Users: A Case Study of the Youth in Shiraz [ Vol.2, Issue 2 - Summer Year 1402]
  • Dolat.Mohammad Ali A Pathology of the Government’s Actions and Policies in Managing and Regulating of the Virtual Space [ Vol.2, Issue 4 - Winter Year 1402]

E

  • Eid koshayesh.Saeid Right to “Self-Defense” against Cyber-attacks with an Emphasis on the Attacks of the United States of America [ Vol.2, Issue 1 - Spring Year 1402]
  • Eid koshayesh.Saeid The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America [ Vol.3, Issue 2 - Summer Year 1403]
  • Ekhlasi.Mehdi Financial Income of the Digital Game Developers and Providers creators from the Perspective of the Islamic Jurisprudence [ Vol.1, Issue 2 - Summer Year 1401]
  • Elahimanesh.Mohammadreza The Principle of Immediacy in Legal Sanctions for the Violation of Fashion Designers’ Intellectual Property Rights [ Vol.2, Issue 2 - Summer Year 1402]
  • eydaee Gel Sefidi.Seyed Nurbakhsh S Identifying the Elements of Citizenship Rights and Prioritizing Them in the Cyberspace Using Theme Analysis and Fuzzy DEMATEL Technique (Case Study: Fouladshahr City [ Vol.1, Issue 4 - Winter Year 1401]

F

  • fallah tafti.fatemeh Jurisprudential Feasibility Of The Right To Anonymity In Cyberspace [ Vol.3, Issue 1 - Spring Year 1403]
  • fallah tafti.fatemeh Jurisprudential Rules Governing the Interaction of the Islamic System with Other Muslim Nations in Cyberspace [ Vol.1, Issue 4 - Winter Year 1401]
  • fallah.Mohammadreza Examining the Necessary Changes in the Structure, Organization and Systems in Judiciary for Implementation of the Electronic Proceedings [ Vol.3, Issue 2 - Summer Year 1403]
  • Famil Modaberan.Ashkan Effectiveness Requirements for Foreign Criminal Laws and Sentences in The National Territory: Developments, Obstacles and Solutions in the Field of Cybercrimes [ Vol.3, Issue 1 - Spring Year 1403]
  • Farazandehpour.Faezeh Analyzing the Current Status of the Forensic Linguistics and Its Development Strategies in Cyber Linguistics [ Vol.2, Issue 3 - Autumn Year 1402]
  • farhadi.farhad Identifying the Elements of Citizenship Rights and Prioritizing Them in the Cyberspace Using Theme Analysis and Fuzzy DEMATEL Technique (Case Study: Fouladshahr City [ Vol.1, Issue 4 - Winter Year 1401]
  • fatemi.hamid Criminological Investigation of the Principles of Crime Survey in the Prevention of Cyberspace Crimes [ Vol.2, Issue 4 - Winter Year 1402]
  • forati.maryam The Role of Virtual Social Networks in Changing People's Tolerance Threshold with an Emphasis on Divergence in the Anti-security Protests Atmosphere [ Vol.2, Issue 4 - Winter Year 1402]

G

  • ghaderi.reza Pathology of Whistleblowing Phenomenon in Virtual Social Networks [ Vol.3, Issue 1 - Spring Year 1403]
  • ghaderi.reza A Comparative Study of the Electronic Evidence in Criminal Justice Systems of Iran and China [ Vol.1, Issue 1 - Spring Year 1401]
  • ghavamipour sereshkeh.mohadeseh Legal challenges of digital currencies with an approach to money laundering [ Vol.1, Issue 3 - Autumn Year 1401]
  • Gholamloo.Jamshid Analyzing the Current Status of the Forensic Linguistics and Its Development Strategies in Cyber Linguistics [ Vol.2, Issue 3 - Autumn Year 1402]
  • Givkey.Azar Possible Responses to Cyber Attacks from the perspective of International Law [ Vol.2, Issue 1 - Spring Year 1402]
  • Givkey.Azar Foreign Intervention in the Internal Affairs of Governments through Cyber Operations According to Tallinn Manual 2 [ Vol.1, Issue 1 - Spring Year 1401]
  • Givkey.Azar Effectiveness Requirements for Foreign Criminal Laws and Sentences in The National Territory: Developments, Obstacles and Solutions in the Field of Cybercrimes [ Vol.3, Issue 1 - Spring Year 1403]

H

  • hajipour.ali The Free Circulation of Information and Interference of competences in the Procedure of the Supreme Council of Cyberspace [ Vol.2, Issue 4 - Winter Year 1402]
  • hakakzadeh.Mohammadreza Foreign Intervention in the Internal Affairs of Governments through Cyber Operations According to Tallinn Manual 2 [ Vol.1, Issue 1 - Spring Year 1401]
  • hakimzade.peyman The Scope of the Principle of Non-Use of Force in Cyber Attacks in the Framework of the United Nations Charter [ Vol.2, Issue 1 - Spring Year 1402]
  • Hosseini.Zahra sadat Examining the position of deep web and dark web in international law [ Vol.3, Issue 2 - Summer Year 1403]
  • Hosseini.Zahra sadat Cyber Attacks from the Perspective of the Use of Force Stipulated Under International Law [ Vol.1, Issue 2 - Summer Year 1401]

I

  • Irvanian.Amir A Study of the Role of Environmental Factors in Committing Crimes by the Cyberspace Users: A Case Study of the Youth in Shiraz [ Vol.2, Issue 2 - Summer Year 1402]

K

  • karami.hojat An Elaboration on Protection of the Internet Broadcasting Right in the Light of Literary and Artistic Property [ Vol.2, Issue 4 - Winter Year 1402]
  • Karimi.Sahar A Comparative Study of Digital Signatures in Smart Contracts Under the Laws of Iran and the United States of America [ Vol.3, Issue 2 - Summer Year 1403]
  • kazemi motlagh.kazemi motlagh A Feasibility Study of the Actualization and Occurrence of Pretence in Cyberspace and Its Manifestations [ Vol.1, Issue 3 - Autumn Year 1401]
  • khalili bandli.hosien Instances and Obstacles of the International Bank Payments [ Vol.2, Issue 4 - Winter Year 1402]
  • kiankhah.ehsan The role and position of territorialization and border guarding of cyber space in exercising sovereignty over national cyberspace [ Vol.3, Issue 2 - Summer Year 1403]

L

  • lorkojori.atefeh Examining the Role of Forensic Nurses in Cybersecurity and Preventing Crimes in Cyberspace [ Vol.3, Issue 1 - Spring Year 1403]

M

  • Mahdavisabet.MohammadAli Criminological Explanation of The Influence of Lived Experiences on The Strengthening of Criminal Tendencies in Cyber Space Subject of Study: Great Tehran Prison (Fashafouye) [ Vol.2, Issue 1 - Spring Year 1402]
  • mahmoodi.hadi Investigation of the Ways to Reduce Cyberattacks from the Perspective of the International Humanitarian Law [ Vol.1, Issue 3 - Autumn Year 1401]
  • Mahmoudi.Amirreza Analysis of Insurance Mechanisms for Non-Fungible Tokens [ Vol.1, Issue 1 - Spring Year 1401]
  • Mahmoudi.Amirreza Legal challenges of digital currencies with an approach to money laundering [ Vol.1, Issue 3 - Autumn Year 1401]
  • Mahmoudi.Amirreza Examining the Role of Forensic Nurses in Cybersecurity and Preventing Crimes in Cyberspace [ Vol.3, Issue 1 - Spring Year 1403]
  • Mahmoudi.Asghar A Comparative Study of Cryptocurrencies from Perspectives of the Contract Law and Banking Law [ Vol.2, Issue 3 - Autumn Year 1402]
  • Mahmoudi.Mohsen Metaverse and Its Impact on Lifestyle [ Vol.1, Issue 2 - Summer Year 1401]
  • malaki.mostafa A Survey on Preventive Approaches (Culture-Oriented Management) Of Cyberspace and Its Effect on the Occurrence of Election Violations and Crimes and the Options Governing the Political System of Iran [ Vol.2, Issue 3 - Autumn Year 1402]
  • malakooti.Rasool A Study of the Pillars of Actualization of Civil Liability in Cyberspace [ Vol.1, Issue 3 - Autumn Year 1401]
  • masuodi.naser Disclosure of E-commerce Secrets Stipulated Under the Competition Law of Iran and Law of European Union [ Vol.1, Issue 3 - Autumn Year 1401]
  • miri balajorshari.seyedeh mahshid Analysis of Insurance Mechanisms for Non-Fungible Tokens [ Vol.1, Issue 1 - Spring Year 1401]
  • mohamad zade.alireza A Comparative Study of Cryptocurrencies from Perspectives of the Contract Law and Banking Law [ Vol.2, Issue 3 - Autumn Year 1402]
  • Mohammadbagheri.Zahra Fast Fashion in Real World and Metaverse [ Vol.1, Issue 4 - Winter Year 1401]
  • mohammadi.ali Criminological Investigation of the Principles of Crime Survey in the Prevention of Cyberspace Crimes [ Vol.2, Issue 4 - Winter Year 1402]
  • Momeni.Abedin A Feasibility Study of the Actualization and Occurrence of Pretence in Cyberspace and Its Manifestations [ Vol.1, Issue 3 - Autumn Year 1401]
  • mousavifard.mohamadreza A Survey on Preventive Approaches (Culture-Oriented Management) Of Cyberspace and Its Effect on the Occurrence of Election Violations and Crimes and the Options Governing the Political System of Iran [ Vol.2, Issue 3 - Autumn Year 1402]
  • mousavifard.mohamadreza The Role of Virtual Social Networks in Changing People's Tolerance Threshold with an Emphasis on Divergence in the Anti-security Protests Atmosphere [ Vol.2, Issue 4 - Winter Year 1402]
  • Musavi.Seyyed Mohammad Sadegh The Liability of the Re-senders of Misleading Content in Cyberspace Envisaged by Law and Islamic Jurisprudence [ Vol.1, Issue 1 - Spring Year 1401]

N

  • Naghibi.Seyed Ab-Alghasem The Liability of the Re-senders of Misleading Content in Cyberspace Envisaged by Law and Islamic Jurisprudence [ Vol.1, Issue 1 - Spring Year 1401]
  • naji zavareh.morteza The Nature of the Decision of the Working Group to Determine Examples of Cyberspace Criminal Content and Its Consequences [ Vol.1, Issue 4 - Winter Year 1401]
  • Nargesi.Fateme Analysis of Rulings on Digital Currency Transactions from the Point of View of the Islamic Jurists Centered on Ayatollah Khamenei's Point of View [ Vol.2, Issue 2 - Summer Year 1402]
  • Negahdar.Eraj Situational Prevention Approaches of Iran's Criminal Policy Against Cyber Security Violations in the Light of International Documents [ Vol.2, Issue 1 - Spring Year 1402]
  • Norouzian.Hamid reza A Survey on Preventive Approaches (Culture-Oriented Management) Of Cyberspace and Its Effect on the Occurrence of Election Violations and Crimes and the Options Governing the Political System of Iran [ Vol.2, Issue 3 - Autumn Year 1402]

P

  • Paknahad.Amir A Study of the Role of Environmental Factors in Committing Crimes by the Cyberspace Users: A Case Study of the Youth in Shiraz [ Vol.2, Issue 2 - Summer Year 1402]
  • pourghahramani.babak A Comparative Study of the Electronic Evidence in Criminal Justice Systems of Iran and China [ Vol.1, Issue 1 - Spring Year 1401]
  • pourghahramani.babak Situational Prevention Approaches of Iran's Criminal Policy Against Cyber Security Violations in the Light of International Documents [ Vol.2, Issue 1 - Spring Year 1402]

R

  • Radman.Ahmad Examining the position of deep web and dark web in international law [ Vol.3, Issue 2 - Summer Year 1403]
  • rae.masoud The principle of Proportionality in Light of the Use of Artificial Intelligence in Armed Conflicts [ Vol.3, Issue 1 - Spring Year 1403]
  • Rafiee Tabatabaei.Dr. Seyyed Hesamoddin Analysis of Rulings on Digital Currency Transactions from the Point of View of the Islamic Jurists Centered on Ayatollah Khamenei's Point of View [ Vol.2, Issue 2 - Summer Year 1402]
  • Rafiee Tabatabaei.Motahhare Sadat Analysis of Rulings on Digital Currency Transactions from the Point of View of the Islamic Jurists Centered on Ayatollah Khamenei's Point of View [ Vol.2, Issue 2 - Summer Year 1402]
  • Rahimi.Seyed Dariush Identifying the Elements of Citizenship Rights and Prioritizing Them in the Cyberspace Using Theme Analysis and Fuzzy DEMATEL Technique (Case Study: Fouladshahr City [ Vol.1, Issue 4 - Winter Year 1401]
  • Rahpeik.Zahra A Feasibility Study of Crime Prevention in the Dark Web [ Vol.2, Issue 3 - Autumn Year 1402]
  • ramak.mehrab The role and position of territorialization and border guarding of cyber space in exercising sovereignty over national cyberspace [ Vol.3, Issue 2 - Summer Year 1403]
  • Razavi.Seyed Mahdi Civil Liability Incurred from Smart Contract Error [ Vol.3, Issue 2 - Summer Year 1403]
  • Rezaei.GHolam Hosein Differential Criminal Policy of the Armed Forces of the Islamic Republic of Iran in the Crime of Computer Espionage [ Vol.2, Issue 1 - Spring Year 1402]

S

  • sadat hossaini.maghdad The Role of Virtual Social Networks in Changing People's Tolerance Threshold with an Emphasis on Divergence in the Anti-security Protests Atmosphere [ Vol.2, Issue 4 - Winter Year 1402]
  • Sadeghi.Salar Metaverse and Its Impact on Lifestyle [ Vol.1, Issue 2 - Summer Year 1401]
  • Sadeghi.Zohre Challenges of Applying the Principles of Armed Conflict to Cyber Attacks Case Study: Observance of the Principle of Prohibition of the Use of Force and the Principle of Distinction in Cyber Attacks [ Vol.1, Issue 2 - Summer Year 1401]
  • safari.majid The Liability of the Re-senders of Misleading Content in Cyberspace Envisaged by Law and Islamic Jurisprudence [ Vol.1, Issue 1 - Spring Year 1401]
  • saghiri.esmaeil Disclosure of E-commerce Secrets Stipulated Under the Competition Law of Iran and Law of European Union [ Vol.1, Issue 3 - Autumn Year 1401]
  • Salehi.Ali Reza Differential Criminal Policy of the Armed Forces of the Islamic Republic of Iran in the Crime of Computer Espionage [ Vol.2, Issue 1 - Spring Year 1402]
  • Sedghi Sabet.mitra Examining the Role of Forensic Nurses in Cybersecurity and Preventing Crimes in Cyberspace [ Vol.3, Issue 1 - Spring Year 1403]
  • Seyed Bagheri.Seyed Mojtaba Fast Fashion in Real World and Metaverse [ Vol.1, Issue 4 - Winter Year 1401]
  • SHakeri.Yasser Differential Criminal Policy of the Armed Forces of the Islamic Republic of Iran in the Crime of Computer Espionage [ Vol.2, Issue 1 - Spring Year 1402]
  • Sheikholeslami vatani.Gelavizh Criminological Explanation of The Influence of Lived Experiences on The Strengthening of Criminal Tendencies in Cyber Space Subject of Study: Great Tehran Prison (Fashafouye) [ Vol.2, Issue 1 - Spring Year 1402]
  • shoja.akbar Phenomenology of Violations of Fundamental Human Rights by the Actions of Authoritarian States in Cyberspace [ Vol.2, Issue 2 - Summer Year 1402]
  • sinambari.parisa A Comparative Study of Digital Signatures in Smart Contracts Under the Laws of Iran and the United States of America [ Vol.3, Issue 2 - Summer Year 1403]
  • Soltani.Hatam Phenomenology of Violations of Fundamental Human Rights by the Actions of Authoritarian States in Cyberspace [ Vol.2, Issue 2 - Summer Year 1402]
  • soltani.nasrollah Divergences and Convergences in Normalization and Codification of Soft Cyber Law: A Case Study of the Proposed Resolution by the Russian Federation (1998-2021) [ Vol.2, Issue 3 - Autumn Year 1402]
  • soltani.nasrollah Analysis and Assessment of the the performance of the Committee on Disarmament and International Security of the United Nations General Assembly in the Area of International Information Security: Case study of " Government Experts" [ Vol.1, Issue 3 - Autumn Year 1401]
  • Sorayyai Azar.Hossein The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America [ Vol.3, Issue 2 - Summer Year 1403]
  • Sorayyai Azar.Hossein Right to “Self-Defense” against Cyber-attacks with an Emphasis on the Attacks of the United States of America [ Vol.2, Issue 1 - Spring Year 1402]

T

  • taghizadeh.ebrahim A Comparative Study of Cryptocurrencies from Perspectives of the Contract Law and Banking Law [ Vol.2, Issue 3 - Autumn Year 1402]
  • Teymouri.Mehrdad An Analysis of the FATA Police Structure in the Light of the Theory of the Left Realist Criminology [ Vol.1, Issue 1 - Spring Year 1401]

V

  • valizadeh.mohammad javad A Pathology of the Government’s Actions and Policies in Managing and Regulating of the Virtual Space [ Vol.2, Issue 4 - Winter Year 1402]

Y

  • yazdani.sadegh An Elaboration on Protection of the Internet Broadcasting Right in the Light of Literary and Artistic Property [ Vol.2, Issue 4 - Winter Year 1402]
  • Yussefpour Nezami.Ayyub A Deconstructive Elaboration on the Ratio of Crime to “Body-Psyche-Culture” in the Context of Cyber Lifestyle [ Vol.2, Issue 2 - Summer Year 1402]

Z

  • zande.mohamdreza The Nature of the Decision of the Working Group to Determine Examples of Cyberspace Criminal Content and Its Consequences [ Vol.1, Issue 4 - Winter Year 1401]