Aalikhani.Leila
The Principle of Immediacy in Legal Sanctions for the Violation of Fashion Designers’ Intellectual Property Rights
[
Vol.2,
Issue
2
- SummerYear
1402]
Ahadi.Fatemeh
An Analysis of the FATA Police Structure in the Light of the Theory of the Left Realist Criminology
[
Vol.1,
Issue
1
- SpringYear
1401]
Ahadi.Fatemeh
The challenge of the conflict of Law in cyberspace and its solution in the judicial procedure of the United States of America
[
Vol.3,
Issue
3
- AutumnYear
1403]
Alavi.Seyed Hosein
The role and position of territorialization and border guarding of cyber space in exercising sovereignty over national cyberspace
[
Vol.3,
Issue
2
- SummerYear
1403]
alayee fard.sepideh
The principle of Proportionality in Light of the Use of Artificial Intelligence in Armed Conflicts
[
Vol.3,
Issue
1
- SpringYear
1403]
alipor.hassan
The Principle of Immediacy in Legal Sanctions for the Violation of Fashion Designers’ Intellectual Property Rights
[
Vol.2,
Issue
2
- SummerYear
1402]
alipor.hassan
A Feasibility Study of Crime Prevention in the Dark Web
[
Vol.2,
Issue
3
- AutumnYear
1402]
Alizadeh.Akbar
The proportion of seizure of crime-related data and criminal jurisdiction in the cybercrime process
[
Vol.3,
Issue
3
- AutumnYear
1403]
Alizadehseresht.Nader
Effectiveness Requirements for Foreign Criminal Laws and Sentences in The National Territory: Developments, Obstacles and Solutions in the Field of Cybercrimes
[
Vol.3,
Issue
1
- SpringYear
1403]
Anabi.Alireza
An Introduction to International Law of Cyberspace
[
Vol.1,
Issue
4
- WinterYear
1401]
Ansari Mahyari.Alireza
Investigation of the Ways to Reduce Cyberattacks from the Perspective of the International Humanitarian Law
[
Vol.1,
Issue
3
- AutumnYear
1401]
Ansari Mahyari.Alireza
Cyber Attacks from the Perspective of the Use of Force Stipulated Under International Law
[
Vol.1,
Issue
2
- SummerYear
1401]
Ansari Mahyari.Alireza
The principle of Proportionality in Light of the Use of Artificial Intelligence in Armed Conflicts
[
Vol.3,
Issue
1
- SpringYear
1403]
Ansari Mahyari.Alireza
Examining the position of deep web and dark web in international law
[
Vol.3,
Issue
2
- SummerYear
1403]
Ansari Mahyari.Alireza
The strategy of international and regional organizations in facing cyber attacks
[
Vol.3,
Issue
3
- AutumnYear
1403]
Arabian.MohammadJavad
Challenges of Applying the Principles of Armed Conflict to Cyber Attacks Case Study: Observance of the Principle of Prohibition of the Use of Force and the Principle of Distinction in Cyber Attacks
[
Vol.1,
Issue
2
- SummerYear
1401]
arman.ali
Imbalance Between Cybercrime Punishments with Some of the Corresponding Traditional Crimes
[
Vol.1,
Issue
2
- SummerYear
1401]
Asgari.Soheila
Analyzing the Current Status of the Forensic Linguistics and Its Development Strategies in Cyber Linguistics
[
Vol.2,
Issue
3
- AutumnYear
1402]
azimzadeh.عظیمزاده
The Free Circulation of Information and Interference of competences in the Procedure of the Supreme Council of Cyberspace
[
Vol.2,
Issue
4
- WinterYear
1402]
B
Babai.Samaneh
Jurisprudential Feasibility Of The Right To Anonymity In Cyberspace
[
Vol.3,
Issue
1
- SpringYear
1403]
Baghban.Esmaeil
The challenge of the conflict of Law in cyberspace and its solution in the judicial procedure of the United States of America
[
Vol.3,
Issue
3
- AutumnYear
1403]
bagheri.jahangir
Right to “Self-Defense” against Cyber-attacks with an Emphasis on the Attacks of the United States of America
[
Vol.2,
Issue
1
- SpringYear
1402]
Bagheri.Jahangir
The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America
[
Vol.3,
Issue
2
- SummerYear
1403]
barzi.vadood
Disclosure of E-commerce Secrets Stipulated Under the Competition Law of Iran and Law of European Union
[
Vol.1,
Issue
3
- AutumnYear
1401]
bashiri.akbar
The domain of Jurisprudence at the Analysis of Meta-Contract in the Cyber Space
[
Vol.3,
Issue
3
- AutumnYear
1403]
behdadi.amirali
The Nature of the Decision of the Working Group to Determine Examples of Cyberspace Criminal Content and Its Consequences
[
Vol.1,
Issue
4
- WinterYear
1401]
Beigi.Jamal
Situational Prevention Approaches of Iran's Criminal Policy Against Cyber Security
Violations in the Light of International Documents
[
Vol.2,
Issue
1
- SpringYear
1402]
Beiki shouroki.Mahdi
Examining the Necessary Changes in the Structure, Organization and Systems in Judiciary for Implementation of the Electronic Proceedings
[
Vol.3,
Issue
2
- SummerYear
1403]
bidarvand.mokhtar
A Study of the Preventive Role of the Media Literacy in Occurrence of Cybercrimes in Iran Over Duration of the COVID-19 Pandemic
[
Vol.3,
Issue
1
- SpringYear
1403]
D
darrehshiri.davood
A Legal Analysis of the Harassment of Women in Cyberspace
[
Vol.2,
Issue
2
- SummerYear
1402]
dehghanfar.azadeh
A Study of the Role of Environmental Factors in Committing Crimes by the Cyberspace Users: A Case Study of the Youth in Shiraz
[
Vol.2,
Issue
2
- SummerYear
1402]
Dolat.Mohammad Ali
A Pathology of the Government’s Actions and Policies in Managing and Regulating of the Virtual Space
[
Vol.2,
Issue
4
- WinterYear
1402]
E
Eid koshayesh.Saeid
The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America
[
Vol.3,
Issue
2
- SummerYear
1403]
Eid koshayesh.Saeid
Right to “Self-Defense” against Cyber-attacks with an Emphasis on the Attacks of the United States of America
[
Vol.2,
Issue
1
- SpringYear
1402]
Ekhlasi.Mehdi
Financial Income of the Digital Game Developers and Providers creators from the Perspective of the Islamic Jurisprudence
[
Vol.1,
Issue
2
- SummerYear
1401]
Elahimanesh.Mohammadreza
The Principle of Immediacy in Legal Sanctions for the Violation of Fashion Designers’ Intellectual Property Rights
[
Vol.2,
Issue
2
- SummerYear
1402]
eydaee Gel Sefidi.Seyed Nurbakhsh S
Identifying the Elements of Citizenship Rights and Prioritizing Them in the Cyberspace Using Theme Analysis and Fuzzy DEMATEL Technique (Case Study: Fouladshahr City
[
Vol.1,
Issue
4
- WinterYear
1401]
F
fallah tafti.fatemeh
Jurisprudential Rules Governing the Interaction of the Islamic System with Other Muslim Nations in Cyberspace
[
Vol.1,
Issue
4
- WinterYear
1401]
fallah tafti.fatemeh
Jurisprudential Feasibility Of The Right To Anonymity In Cyberspace
[
Vol.3,
Issue
1
- SpringYear
1403]
fallah.Mohammadreza
Examining the Necessary Changes in the Structure, Organization and Systems in Judiciary for Implementation of the Electronic Proceedings
[
Vol.3,
Issue
2
- SummerYear
1403]
Famil Modaberan.Ashkan
Effectiveness Requirements for Foreign Criminal Laws and Sentences in The National Territory: Developments, Obstacles and Solutions in the Field of Cybercrimes
[
Vol.3,
Issue
1
- SpringYear
1403]
Farazandehpour.Faezeh
Analyzing the Current Status of the Forensic Linguistics and Its Development Strategies in Cyber Linguistics
[
Vol.2,
Issue
3
- AutumnYear
1402]
farhadi.farhad
Identifying the Elements of Citizenship Rights and Prioritizing Them in the Cyberspace Using Theme Analysis and Fuzzy DEMATEL Technique (Case Study: Fouladshahr City
[
Vol.1,
Issue
4
- WinterYear
1401]
fatemi.hamid
Criminological Investigation of the Principles of Crime Survey in the Prevention of Cyberspace Crimes
[
Vol.2,
Issue
4
- WinterYear
1402]
forati.maryam
The Role of Virtual Social Networks in Changing People's Tolerance Threshold with an Emphasis on Divergence in the Anti-security Protests Atmosphere
[
Vol.2,
Issue
4
- WinterYear
1402]
G
ghaderi.reza
Pathology of Whistleblowing Phenomenon in Virtual Social Networks
[
Vol.3,
Issue
1
- SpringYear
1403]
ghaderi.reza
A Comparative Study of the Electronic Evidence in Criminal Justice Systems of Iran and China
[
Vol.1,
Issue
1
- SpringYear
1401]
ghavamipour sereshkeh.mohadeseh
Legal challenges of digital currencies with an approach to money laundering
[
Vol.1,
Issue
3
- AutumnYear
1401]
ghavamipour sereshkeh.mohadeseh
Legal issues of Metavers perspective from the public international law
[
Vol.3,
Issue
3
- AutumnYear
1403]
Gholamloo.Jamshid
Analyzing the Current Status of the Forensic Linguistics and Its Development Strategies in Cyber Linguistics
[
Vol.2,
Issue
3
- AutumnYear
1402]
Givkey.Azar
Foreign Intervention in the Internal Affairs of Governments through Cyber Operations According to Tallinn Manual 2
[
Vol.1,
Issue
1
- SpringYear
1401]
Givkey.Azar
Possible Responses to Cyber Attacks from the perspective of International Law
[
Vol.2,
Issue
1
- SpringYear
1402]
Givkey.Azar
Effectiveness Requirements for Foreign Criminal Laws and Sentences in The National Territory: Developments, Obstacles and Solutions in the Field of Cybercrimes
[
Vol.3,
Issue
1
- SpringYear
1403]
H
hajipour.ali
The Free Circulation of Information and Interference of competences in the Procedure of the Supreme Council of Cyberspace
[
Vol.2,
Issue
4
- WinterYear
1402]
hakakzadeh.Mohammadreza
Foreign Intervention in the Internal Affairs of Governments through Cyber Operations According to Tallinn Manual 2
[
Vol.1,
Issue
1
- SpringYear
1401]
hakimzade.peyman
The Scope of the Principle of Non-Use of Force in Cyber Attacks in the Framework of the United Nations Charter
[
Vol.2,
Issue
1
- SpringYear
1402]
Hosseini.Zahra sadat
Examining the position of deep web and dark web in international law
[
Vol.3,
Issue
2
- SummerYear
1403]
Hosseini.Zahra sadat
Cyber Attacks from the Perspective of the Use of Force Stipulated Under International Law
[
Vol.1,
Issue
2
- SummerYear
1401]
I
Irvanian.Amir
A Study of the Role of Environmental Factors in Committing Crimes by the Cyberspace Users: A Case Study of the Youth in Shiraz
[
Vol.2,
Issue
2
- SummerYear
1402]
K
karami.hojat
An Elaboration on Protection of the Internet Broadcasting Right in the Light of Literary and Artistic Property
[
Vol.2,
Issue
4
- WinterYear
1402]
Karimi.Sahar
A Comparative Study of Digital Signatures in Smart Contracts Under the Laws of Iran and the United States of America
[
Vol.3,
Issue
2
- SummerYear
1403]
kazemi motlagh.kazemi motlagh
A Feasibility Study of the Actualization and Occurrence of Pretence in Cyberspace and Its Manifestations
[
Vol.1,
Issue
3
- AutumnYear
1401]
khalili bandli.hosien
Instances and Obstacles of the International Bank Payments
[
Vol.2,
Issue
4
- WinterYear
1402]
kiankhah.ehsan
The role and position of territorialization and border guarding of cyber space in exercising sovereignty over national cyberspace
[
Vol.3,
Issue
2
- SummerYear
1403]
L
lorkojori.atefeh
Examining the Role of Forensic Nurses in Cybersecurity and Preventing Crimes in Cyberspace
[
Vol.3,
Issue
1
- SpringYear
1403]
M
Mahdavisabet.MohammadAli
Criminological Explanation of The Influence of Lived Experiences on The Strengthening of Criminal Tendencies in Cyber Space
Subject of Study: Great Tehran Prison (Fashafouye)
[
Vol.2,
Issue
1
- SpringYear
1402]
mahmoodi.hadi
Investigation of the Ways to Reduce Cyberattacks from the Perspective of the International Humanitarian Law
[
Vol.1,
Issue
3
- AutumnYear
1401]
Mahmoudi.Amirreza
Legal challenges of digital currencies with an approach to money laundering
[
Vol.1,
Issue
3
- AutumnYear
1401]
Mahmoudi.Amirreza
Analysis of Insurance Mechanisms for Non-Fungible Tokens
[
Vol.1,
Issue
1
- SpringYear
1401]
Mahmoudi.Amirreza
Examining the Role of Forensic Nurses in Cybersecurity and Preventing Crimes in Cyberspace
[
Vol.3,
Issue
1
- SpringYear
1403]
Mahmoudi.Amirreza
Legal issues of Metavers perspective from the public international law
[
Vol.3,
Issue
3
- AutumnYear
1403]
Mahmoudi.Asghar
A Comparative Study of Cryptocurrencies from Perspectives of the Contract Law and Banking Law
[
Vol.2,
Issue
3
- AutumnYear
1402]
Mahmoudi.Mohsen
Metaverse and Its Impact on Lifestyle
[
Vol.1,
Issue
2
- SummerYear
1401]
malaki.mostafa
A Survey on Preventive Approaches (Culture-Oriented Management) Of Cyberspace and Its Effect on the Occurrence of Election Violations and Crimes and the Options Governing the Political System of Iran
[
Vol.2,
Issue
3
- AutumnYear
1402]
malakooti.Rasool
A Study of the Pillars of Actualization of Civil Liability in Cyberspace
[
Vol.1,
Issue
3
- AutumnYear
1401]
masuodi.naser
Disclosure of E-commerce Secrets Stipulated Under the Competition Law of Iran and Law of European Union
[
Vol.1,
Issue
3
- AutumnYear
1401]
mohamad zade.alireza
A Comparative Study of Cryptocurrencies from Perspectives of the Contract Law and Banking Law
[
Vol.2,
Issue
3
- AutumnYear
1402]
Mohammadbagheri.Zahra
Fast Fashion in Real World and Metaverse
[
Vol.1,
Issue
4
- WinterYear
1401]
mohammadi.ali
Criminological Investigation of the Principles of Crime Survey in the Prevention of Cyberspace Crimes
[
Vol.2,
Issue
4
- WinterYear
1402]
Momeni.Abedin
A Feasibility Study of the Actualization and Occurrence of Pretence in Cyberspace and Its Manifestations
[
Vol.1,
Issue
3
- AutumnYear
1401]
mousavifard.mohamadreza
A Survey on Preventive Approaches (Culture-Oriented Management) Of Cyberspace and Its Effect on the Occurrence of Election Violations and Crimes and the Options Governing the Political System of Iran
[
Vol.2,
Issue
3
- AutumnYear
1402]
mousavifard.mohamadreza
The Role of Virtual Social Networks in Changing People's Tolerance Threshold with an Emphasis on Divergence in the Anti-security Protests Atmosphere
[
Vol.2,
Issue
4
- WinterYear
1402]
Musavi.Seyyed Mohammad Sadegh
The Liability of the Re-senders of Misleading Content in Cyberspace Envisaged by Law and Islamic Jurisprudence
[
Vol.1,
Issue
1
- SpringYear
1401]
N
Naghibi.Seyed Ab-Alghasem
The Liability of the Re-senders of Misleading Content in Cyberspace Envisaged by Law and Islamic Jurisprudence
[
Vol.1,
Issue
1
- SpringYear
1401]
naji zavareh.morteza
The Nature of the Decision of the Working Group to Determine Examples of Cyberspace Criminal Content and Its Consequences
[
Vol.1,
Issue
4
- WinterYear
1401]
Nargesi.Fateme
Analysis of Rulings on Digital Currency Transactions from the Point of View of the Islamic Jurists Centered on Ayatollah Khamenei's Point of View
[
Vol.2,
Issue
2
- SummerYear
1402]
Negahdar.Eraj
Situational Prevention Approaches of Iran's Criminal Policy Against Cyber Security
Violations in the Light of International Documents
[
Vol.2,
Issue
1
- SpringYear
1402]
Norouzian.Hamid reza
A Survey on Preventive Approaches (Culture-Oriented Management) Of Cyberspace and Its Effect on the Occurrence of Election Violations and Crimes and the Options Governing the Political System of Iran
[
Vol.2,
Issue
3
- AutumnYear
1402]
P
Paknahad.Amir
A Study of the Role of Environmental Factors in Committing Crimes by the Cyberspace Users: A Case Study of the Youth in Shiraz
[
Vol.2,
Issue
2
- SummerYear
1402]
pourghahramani.babak
A Comparative Study of the Electronic Evidence in Criminal Justice Systems of Iran and China
[
Vol.1,
Issue
1
- SpringYear
1401]
pourghahramani.babak
Situational Prevention Approaches of Iran's Criminal Policy Against Cyber Security
Violations in the Light of International Documents
[
Vol.2,
Issue
1
- SpringYear
1402]
pourghahramani.babak
The challenge of the conflict of Law in cyberspace and its solution in the judicial procedure of the United States of America
[
Vol.3,
Issue
3
- AutumnYear
1403]
Pourmohammad.Abasat
The domain of Jurisprudence at the Analysis of Meta-Contract in the Cyber Space
[
Vol.3,
Issue
3
- AutumnYear
1403]
R
Radman.Ahmad
Examining the position of deep web and dark web in international law
[
Vol.3,
Issue
2
- SummerYear
1403]
rae.masoud
The principle of Proportionality in Light of the Use of Artificial Intelligence in Armed Conflicts
[
Vol.3,
Issue
1
- SpringYear
1403]
Rafiee Tabatabaei.Dr. Seyyed Hesamoddin
Analysis of Rulings on Digital Currency Transactions from the Point of View of the Islamic Jurists Centered on Ayatollah Khamenei's Point of View
[
Vol.2,
Issue
2
- SummerYear
1402]
Rafiee Tabatabaei.Motahhare Sadat
Analysis of Rulings on Digital Currency Transactions from the Point of View of the Islamic Jurists Centered on Ayatollah Khamenei's Point of View
[
Vol.2,
Issue
2
- SummerYear
1402]
Rahimi.Seyed Dariush
Identifying the Elements of Citizenship Rights and Prioritizing Them in the Cyberspace Using Theme Analysis and Fuzzy DEMATEL Technique (Case Study: Fouladshahr City
[
Vol.1,
Issue
4
- WinterYear
1401]
Rahpeik.Zahra
A Feasibility Study of Crime Prevention in the Dark Web
[
Vol.2,
Issue
3
- AutumnYear
1402]
raisi.Leila
The strategy of international and regional organizations in facing cyber attacks
[
Vol.3,
Issue
3
- AutumnYear
1403]
ramak.mehrab
The role and position of territorialization and border guarding of cyber space in exercising sovereignty over national cyberspace
[
Vol.3,
Issue
2
- SummerYear
1403]
Rashidi.Mohammad
The domain of Jurisprudence at the Analysis of Meta-Contract in the Cyber Space
[
Vol.3,
Issue
3
- AutumnYear
1403]
Rezaei.GHolam Hosein
Differential Criminal Policy of the Armed Forces of the Islamic Republic of Iran in the Crime of Computer Espionage
[
Vol.2,
Issue
1
- SpringYear
1402]
S
sadat hossaini.maghdad
The Role of Virtual Social Networks in Changing People's Tolerance Threshold with an Emphasis on Divergence in the Anti-security Protests Atmosphere
[
Vol.2,
Issue
4
- WinterYear
1402]
Sadeghi.Salar
Metaverse and Its Impact on Lifestyle
[
Vol.1,
Issue
2
- SummerYear
1401]
Sadeghi.Tajmohammad
The strategy of international and regional organizations in facing cyber attacks
[
Vol.3,
Issue
3
- AutumnYear
1403]
Sadeghi.Zohre
Challenges of Applying the Principles of Armed Conflict to Cyber Attacks Case Study: Observance of the Principle of Prohibition of the Use of Force and the Principle of Distinction in Cyber Attacks
[
Vol.1,
Issue
2
- SummerYear
1401]
safari.majid
The Liability of the Re-senders of Misleading Content in Cyberspace Envisaged by Law and Islamic Jurisprudence
[
Vol.1,
Issue
1
- SpringYear
1401]
saghiri.esmaeil
Disclosure of E-commerce Secrets Stipulated Under the Competition Law of Iran and Law of European Union
[
Vol.1,
Issue
3
- AutumnYear
1401]
Salehi.Ali Reza
Differential Criminal Policy of the Armed Forces of the Islamic Republic of Iran in the Crime of Computer Espionage
[
Vol.2,
Issue
1
- SpringYear
1402]
Sedghi Sabet.mitra
Examining the Role of Forensic Nurses in Cybersecurity and Preventing Crimes in Cyberspace
[
Vol.3,
Issue
1
- SpringYear
1403]
SHakeri.Yasser
Differential Criminal Policy of the Armed Forces of the Islamic Republic of Iran in the Crime of Computer Espionage
[
Vol.2,
Issue
1
- SpringYear
1402]
shayeganfar.amir
A comparative study of the challenges of holding an electronic hearing in Iran, the European Union and UNCITRAL
[
Vol.3,
Issue
3
- AutumnYear
1403]
Sheikholeslami vatani.Gelavizh
Criminological Explanation of The Influence of Lived Experiences on The Strengthening of Criminal Tendencies in Cyber Space
Subject of Study: Great Tehran Prison (Fashafouye)
[
Vol.2,
Issue
1
- SpringYear
1402]
shoja.akbar
Phenomenology of Violations of Fundamental Human Rights by the Actions of Authoritarian States in Cyberspace
[
Vol.2,
Issue
2
- SummerYear
1402]
sinambari.parisa
A Comparative Study of Digital Signatures in Smart Contracts Under the Laws of Iran and the United States of America
[
Vol.3,
Issue
2
- SummerYear
1403]
Soltani.Hatam
Phenomenology of Violations of Fundamental Human Rights by the Actions of Authoritarian States in Cyberspace
[
Vol.2,
Issue
2
- SummerYear
1402]
soltani.nasrollah
Divergences and Convergences in Normalization and Codification of Soft Cyber Law: A Case Study of the Proposed Resolution by the Russian Federation (1998-2021)
[
Vol.2,
Issue
3
- AutumnYear
1402]
soltani.nasrollah
Analysis and Assessment of the the performance of the Committee on Disarmament and International Security of the United Nations General Assembly in the Area of International Information Security: Case study of " Government Experts"
[
Vol.1,
Issue
3
- AutumnYear
1401]
Sorayyai Azar.Hossein
The conflict of cyber attacks with the principle of non-intervention in international law, focusing on the actions of the United States of America
[
Vol.3,
Issue
2
- SummerYear
1403]
Sorayyai Azar.Hossein
Right to “Self-Defense” against Cyber-attacks with an Emphasis on the Attacks of the United States of America
[
Vol.2,
Issue
1
- SpringYear
1402]
T
Tabatabaie nik.Fatemeh sadat
A comparative study of the challenges of holding an electronic hearing in Iran, the European Union and UNCITRAL
[
Vol.3,
Issue
3
- AutumnYear
1403]
Tabrizi.Sadegh
The proportion of seizure of crime-related data and criminal jurisdiction in the cybercrime process
[
Vol.3,
Issue
3
- AutumnYear
1403]
taghizadeh.ebrahim
A Comparative Study of Cryptocurrencies from Perspectives of the Contract Law and Banking Law
[
Vol.2,
Issue
3
- AutumnYear
1402]
Teymouri.Mehrdad
An Analysis of the FATA Police Structure in the Light of the Theory of the Left Realist Criminology
[
Vol.1,
Issue
1
- SpringYear
1401]
V
valizadeh.mohammad javad
A Pathology of the Government’s Actions and Policies in Managing and Regulating of the Virtual Space
[
Vol.2,
Issue
4
- WinterYear
1402]
Y
yazdani.sadegh
An Elaboration on Protection of the Internet Broadcasting Right in the Light of Literary and Artistic Property
[
Vol.2,
Issue
4
- WinterYear
1402]
Yussefpour Nezami.Ayyub
A Deconstructive Elaboration on the Ratio of Crime to “Body-Psyche-Culture” in the Context of Cyber Lifestyle
[
Vol.2,
Issue
2
- SummerYear
1402]
Z
zande.mohamdreza
The Nature of the Decision of the Working Group to Determine Examples of Cyberspace Criminal Content and Its Consequences
[
Vol.1,
Issue
4
- WinterYear
1401]