THE CONFLICT BETWEEN RETRIBUTIVE CRIMINOLOGY AND HUMAN RIGHTS PRINCIPLES: A LEGAL CHALLANGE IN EXPORTING CRYPTOGRAPHY PRODUCTS

سال انتشار: 1389
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,596

فایل این مقاله در 8 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ECDC05_017

تاریخ نمایه سازی: 22 خرداد 1391

چکیده مقاله:

The huge wide-spread changes resulted from globalization, in particular the globalization of economy, the revolution of ICT technologies and the hegemony of critical social theory affecting the countries’ economic and legal policy making process, have altogether converted the issue of human rights into one of the most important challenges ahead of the global community. Human rights, as a discourse related both to ethics and law, includes such micro discourses as freedom, security, sustainable development, and respect for individual privacy. The turning point in the interaction between human rights and criminal law lies in securing the protection of humanistic norms through guaranteeing the enforcement of criminal sanctions. However, the risk of an expanded terrorism as emerging in the year 2001 has weakened the efficiency of the interaction of criminal law and human rights because due to the dominance of security-orienteddiscourse over the contemporary discourse of criminal laws by making use of methods aimed at fighting against terrorism such as the interception of citizens’ telephone dialogues or getting into their cyber privacy through intelligence services of countries actually been targeted by terrorism or those claiming to be terrorism victims, the human rights are continuously and severely deviated. This implies the replacement of protection patterns of criminal law in respect of human rights by the alternative annihilation atterns.The present paper will firstly deal with a description of characteristics and dimensions of modern criminal policies as adopted in fighting against terrorism not necessarily in legally totalitarian regimes and then, it will explain what increasing human rights barriers to exporting cryptography products (including hardware, software, and mere algorithms all aimed at increasing the citizens’ e-security against interception and hack systems) do exist in the laws and executive jurisprudence of the two sets of countries in question. The paper will end up in an assessment of the possibility of solutions proposed in returning the criminal law to its former status as protecting human rights.

نویسندگان

Mehdi Khaghani

Ph. D. researcher in Criminal Law and Criminology School of Law, University of Qom, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Baker S., (1997). UK Plans for Trusted Third Party Encryption, ...
  • (February) at: http: //www. us _ net/ stepto e/ukcrypto .htm ...
  • Bessette R., (2001). Against All Odds: Why There Is No ...
  • Braithwaite J., (2002). Restorative Justice and Responsive Regulation, Melbourne: Oxford ...
  • Brenner S., (2004). Toward a Criminal Law for Cyberspace: Distributed ...
  • Chen, Y and Laih, C., (2004). Generating visible RSA public ...
  • _ W and Landan _ The Export of Cryptography in ...
  • Douglas S., (2002). Cryptography: Theory and Practice (2nd edition), Chapman ...
  • Hayes H., (2005). Assessing Reoffending in Restorative Justice Conferences, the ...
  • Herson D., (2001). The Changing Face of International Cryptography Policy: ...
  • Khaghani M., (2009). Hegemony of S ecurity- oriented Discourse Over ...
  • _ and published at _ _ International _ on E-commerc ...
  • Lewis J., (2005). Aux armes, citovens: Cvber security and regulation ...
  • Long W., (1998). Legal Principles for Regulating Financial Services On ...
  • Van Ness D., (2005). An Overview of Restorative Justice around ...
  • Walker D., (1999). Privacy in the Digital Age: Encryption Policy-A ...
  • نمایش کامل مراجع