Criminological approach to the theft of users' information in cyberspace with emphasis on prevention priorities.
indicators of the crime detection in a qualitative experiment with the case number of the 17 cyber police specialists as a target sample. They were asked about criminal identification. In the first step, after identifying some components through content analysis of documents and open interviews with relevant experts, the main components were identified, and then, in the second step, data were collected using a researcher-made questionnaire tool. superficial validity and Cronbach's alpha coefficient were respectively used to evaluate the validity and reliability of the measurement. After evaluating the results of the third step, Kendall's correlation coefficient was also above 0.7. The implementation of Delphi in the next steps was stopped and the results were summarized in this section.
The findings and results of this research indicate the concepts and implementing various steps of the Delphi technique, prioritization of dimensions, indicators and components of identity indicators of the theft criminalization was extracted. According to Friedman's table, in determining the prioritization of identity the theft dimensions, the causes and contexts are the first priority, the identity of the theft detection methods are the second priority, and the methods and tactics of identity the thieves are the third priority, respectively which were indicated as the most important dimensions in the cyber space for this subject.
- حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران میشود.
- پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانههای چاپی و دیجیتال را به کاربر نمیدهد.