Document Type : Original Article

Authors

1 asa

2 sd

3 as

4 sas

Abstract

In recent decades, the Internet has entered the daily lives of humanity and its use has expanded day by day. This research has been done by analytical-descriptive method with the aim of investigating the nature and effects of "free access to the Internet". It was concluded that the Internet was, at first sight, a tool, and according to similar arguments, its use had the same nature and legal effect as defined for the principle of the act. Accordingly, whatever punishment is prescribed by law for the use of the Internet as a tool is of the same criminal nature. According to international law documents, respect for the privacy of individuals is recommended and the implementation of this principle is entrusted to the domestic laws of countries, which is also one of the frameworks governing the Internet. Governments have a responsibility to provide the minimum access to the Internet in the national interest and have no right to disconnect except in special circumstances. To ensure the equal rights of all human beings, governments are required to provide special Internet facilities for people with disabilities and people with disabilities to be able to do things that they are unable to do due to disability. Finally, national security is the most important concern of governments in setting the framework for the use of the Internet.

Keywords

احمدی، سید محمدصادق؛ ناصری، علیرضا؛ قاسم‌آبادی، مرتضی (۱۳۹۵) بررسی تطبیقی محدودیت‌های آزادی بیان در تلویزیون از منظر اسناد بین‌الملل حقوق بشر و حقوق موضوعه ایران، پژوهش حقوق عمومی  52 (18) 153-177.
‏‫انصاری، باقر (۱۳۸۳)حریم خصوصی در رسانه‌های همگانی، پژوهش‌های ارتباطی 39-40(11) 193-232. بجنوردی، ‌محمدحسین (1419 ه.ق) ‌ قواعد فقهیه، قم، نشر الهادی،  جلد اول، چاپ اوّل.
‏‫آزادی، افشین؛ ترابی، محمد و حیدرپور، ماشاءالله (1399). جمهوری اسلامی ایران و فضای مجازی؛ راهکارهایی برای حل چالش‌ها، فصلنامه مطالعات دفاع مقدس، 6(3)، 147-178.
بختیاری، لطفعلی و ادیبی، علیرضا (1399). الگوی تصمیم گیری در پیشگیری انتظامی از جرم، فصلنامه مطالعات دفاع مقدس، 6(4)، 31-53.
جواهری، غلامرضا؛ اسماعیلی، مهدی؛ حاجی تبار فیروز چائی، حسن (۱۳۹۹) هرزه‌نگاری سایبری از مبانی نظری تا الگوهای واکنش کیفری، پژوهش حقوق کیفری 30 (8) 173-200.
‏‫شهبازی، آرامش (۱۳۹۶)در تکاپوی توسعه حقوق بین‌الملل اینترنت، پژوهش حقوق عمومی  54 (18)، 219-246.
صدری، سید محمد، (1388) معاملات الکترونیک، کاشان، گلاب آدینه، جلد اول، چاپ اوّل
طوسی، ابی جعفر محمد بن الحسن بن علی (413 ه.ق) تهذیب الاحکام، قم، آل بیت، جلد اول، چاپ اوّل.
فخرالمحققین (760 ه.ق) ایـضـاح الـفـوأد فى شرح اشکالات القواعد، قم، نشر اسماعیلیان، جلد اول، چاپ اوّل.
‏‏‫قاری سید فاطمی، محمد (۱۳۸۸) حقوق بشر در جهان معاصر، تهران، مؤسسه مطالعات و پژوهش‌های حقوقی شهر دانش، جلد اول، چاپ دوم.
‏‫کازرونی، سید مصطفی (۱۳۹۵)چالش تطبیق حق آزادی بیان با منع استفاده تروریسم از فضای مجازی. مطالعات بین‌المللی 48(12)  167-198.
مرتضایی، سید احمد؛ حسینی، سید ابراهیم (1392) آزادی بیان و مبانی گستره آن از دیدگاهع فقه و حقوق، مجله معرفت حقوقی 2 (4) 49-72.
‏‫معتمد نژاد، رؤیا (۱۳۹۲) نقش شورای اروپا در ارتقای حقوق ارتباطات،  علوم خبری  6 (1) 5-25.
Arshadi, L., & Jahangir, A. H. (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, 40, 194-205.
Bartolucci, A. F., & Peluso, J. J. (2021). Necessity is the mother of invention and the evolutionary force driving the success of in vitro fertilization. Biology of Reproduction, 104(2), 255-273.
Burns, R. G., Whitworth, K. H., & Thompson, C. Y. (2004). Assessing law enforcement preparedness to address Internet fraud. Journal of Criminal Justice, 32(5), 477-493.
CA, J. (2020). GLOBAL INTERNET GOVERNANCE: IMPLICATIONS FOR THE SOUTH. Indian Journal of Asian Affairs, 33.
Chik, W. B. (2010). ‘Customary internet-ional law’: Creating a body of customary law for cyberspace. Part 1: Developing rules for transitioning custom into law. Computer Law & Security Review, 26(1), 3-22.
Clegg, R. G., Di CaIrano-Gilfedder, C., & Zhou, S. (2010). A critical look at power law modelling of the Internet. Computer Communications, 33(3), 259-268.
Clough, J. (2014). A world of difference: the Budapest convention of cybercrime and the challenges of harmonisation. Monash UL Rev., 40, 698.
Cosmas, Y. (2020). Examination on Section 30 of the Cyber Crime Act No. 14 Of 2015 (Doctoral dissertation, Mzumbe University).
Kelmali, E. (2018). The development of interagency cooperation amongst FRONTEX, EMSA and EFCA in the light of the european legislation and policy.
La Rue, F. (2011). Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression.
Lubua, E. W., (2020) Cyber-security Policy Framework and Procedural Compliance in Public Organisations.
Moskalenko, K. (2015). The right of publicity in the USA, the EU, and Ukraine. International Comparative Jurisprudence, 1(2), 113-120.
O’Flaherty, M. (2015). International Covenant on Civil and Political Rights: interpreting freedom of expression and information standards for the present and the future. The United Nations and freedom of expression and information, Critical perspectives, Cambridge, 55-88.
Rossi, R., Fitzgerald, S., Molina, S., Mereuta, O. M., Douglas, A., Pandit, A., ... & Doyle, K. M. (2021). The administration of rtPA before mechanical thrombectomy in acute ischemic stroke patients is associated with a significant reduction of the retrieved clot area but it does not influence revascularization outcome. Journal of Thrombosis and Thrombolysis, 51(2), 545-551.
Ruggie, J. (2011). Report of the special representative of the secretary-general on the issue of human rights and transnational corporations and other business enterprises: Guiding principles on business and human rights: implementing the united nations ‘protect, respect and remedy’framework. Netherlands Quarterly of Human Rights, 29(2), 224-253.
Sadri, Seyed Mohammad, (2009) Electronic Transactions, Kashan, Gulab Adineh, Volume One, First Edition.
Sarah, J. (2002). Human Rights Committee: General Comment 29. Hum. Rts. L. Rev., 2, 81.
Stone, Geoffrey R. (1988). Precedent, the Amendment Process, and Evolution in Constitutional Doctrine. Harvard Journal of Law & Public Policy, 11, 67.
Svantesson, D. J. B. (2014). Between a rock and a hard place–An international law perspective of the difficult position of globally active Internet intermediaries. Computer Law & Security Review, 30(4), 348-356.
Watt, E. (2017). The right to privacy and the future of mass surveillance. The International Journal of Human Rights, 21(7), 773-799.
Zeldin, W. (2012). UN Human Rights Council: First Resolution on Internet Free Speech. In The Library of Congress. Global Legal Monitor (Vol. 12).