The role of information exchange management in the process of preventing cybercrime

Document Type : Original Article


1 Assistant Professor, Amin University of Law Enforcement, Tehran, Iran

2 PhD., in Criminal Law and Criminology, Science and Research Branch, Islamic Azad University, Tehran, Iran

3 Assistant Professor, Amin University of Law Enforcement, Tehran, Iran.


Objectives: Information management and information exchange today, as one of the important concerns of developed countries, is at the forefront of planning in these societies. This study was conducted with the aim of the role of information exchange management in the process of preventing cybercrime among FATA employees in Tehran.
Methods: The method of this study is a quantitative and cross-sectional survey that was conducted in 2021 and the statistical population of this study includes FATA police officers in Tehran, using Cochran's formula, 90 of them as a sample. were chosen. To ensure the indexing of variables in the questionnaire, the validity of the questionnaire, face validity, content validity and construct validity were examined and data analysis was performed using SPSS software.
Results: The research findings showed that the correlation coefficient between the independent variables and the dependent variable is 0.539, which shows that there is a relatively strong correlation between the set of independent and dependent variables of the research. However, the value of the adjusted coefficient of determination is equal to 0.421, indicating the statistical fact that 42% of the total rate of cybercrime prevention depends on 6 independent variables; Operational capability, speed utility, accuracy utility, automation, information, transformation. In other words, independent variables estimate (predict) 42% of the variance of the dependent variable of cybercrime prevention.
Conclusion: The development of information in today's world has affected many life processes and changed many life processes. In the field of criminology, information management components can also play a constructive role in the prevention of cybercrime.


Main Subjects

Aalipour, H. (2016). Information Technology Criminal Law. Tehran: Khorsandi Publications, fifth edition. [in persian]
Afzali, M. (2011). Feasibility study of the use of information and communication technology in teaching physics and laboratory of Isfahan high schools from the perspective of physics teachers, school principals and information and communication technology experts. Supervisor: S.I.M.Sh.J.; Consultant Professor: M.R. Nili. Master Thesis. Educational Planning. Faculty of Educational Sciences and Psychology, University of Isfahan. [in persian]
Aghadavoud, S.R., Hatami, M. & Hakiminia, B. (2010). Investigating the Factors Affecting Organizational Innovation among Managers (Case Study of Senior Telecommunication Managers in Isfahan Province). Social Sciences, 4(11): 127-179. [in persian]
Alipour, M.R. (2006). Investigating the effect of information technology on the organizational structure of Iran Insurance Company in Tehran. Master Thesis. Allameh Tabatabai University. [in persian]
Asemani, N. (2016). Familiarity with the concepts of big data. Educational booklet of Statistics and Information Technology Management of Tabriz University of Medical Sciences for officials and information technology experts of the units. [in persian]
Ayati, M., Ataran, M. & Mehrmohammadi, M. (2007). Model for developing a curriculum based on information and communication technology (ICT) in teacher training. Curriculum Studies, 1(5): 55-80. [in persian]
Bagheri, A.S. (2016). Investigating the role of mobile social networks in the occurrence of various crimes, Isfahan study area. Supervisor: R. Abdolrahmani. Master Thesis. Faculty of Security and Information Science Management, Amin University of Law Enforcement Sciences. [in persian]
Bastani, B. (2007). Computer and cybercrime. Tehran: Behnami Publications, second edition.
[in persian]
Biglari, A. & Agahi, H. (2010). Investigating the effective factors on the application of information and communication technology by the faculty members of Razi University of Kermanshah. Journal of Information Processing and Management, 26(1): 29-44. [in persian]
Biriyaee, H.S., Jamprazmi, M. (2010) The Challenge of Business and Information Technology Alignment: Implementing Organizational Architecture, a Strategy for Strategic Alignment. Production and Operations Management, 1(1): 87-102. [in persian]
Chanopas, A., KrairIT, D. & Khang, D.B. (2006). Managing information technologyinfrastructure: A new flexibilIT y framework. Management Research News, 29(10): 633-651.
Farajollahi, M. & Zarif Sanee, N. (2009). ICT-based education in higher education. Teaching Strategies in Medical Sciences, 2(4): 167-171. [in persian]
Fathiyan, M. (2007). Fundamentals and management of information technology. Tehran: Iran University of Science and Technology Publications, second edition. [in persian]
Fink, L. & Neumann, S. (2009). Exploring the perceived business value of flexibilIT y enabled by information technology infrastructure. Information and Management, 46(2): 90-99.
Gouyabadi, A.L. & Riyahi, M.R. (2003). The prosperity of Iranian women in a knowledge-based society. Rihanna, 1(4).
Gupta, D. (2009). A lost profits for information technology. Start up. A Thesis of Master of Business Administration. University of Nebraska.
Hadizadeh Moghadam, A. & Salehi, A. (2009). Information technology and its role on organizational characteristics and consequences. Management and Development, 10(40). [in persian]
Harkin, D. & Whelan, C. (2021). Perceptions of police training needs in cyber-crime. International Journal of Police Science & Management. 24(1): 66-76.
Hennessy, S., Harrison D. & Wamakote, L. (2007). Pedagogical approaches for technology-integrated science teaching. Journal of Computer & Education. 48: 137-152.
Hitt, L.M. & Brynjolfsson, E. (1996). Productivity, business profit abilit y and consumer surplus: three different measures of information technology value. MIS Quarterly, 20(2): 121-142.
Keramati Moez, H. (2020). Child Victimology in Virtual Networks. Tehran: Justice Publications. [in persian]
Khalafi, A. (2016). Crime prevention with a focus on crime detection. Detective, 10(34): 23-38.
[in persian]
Laak, B. (2012). Identify and prevent cyber ambushes in cyberspace. Detective, 6(18): 90-109.
[in persian]
Mollahosseini, A. & Moshkdanian, F. (2011). The impact of information technology on the organizational structure of customs according to the year of economic jihad. In: Special Issue of New Marketing Research, Kerman: Proceedings of the International Conference on Economic Jihad: 59-80. [in persian]
Niazpour, A.H. (2021). Crime Prevention. Tehran: Justice Publications. [in persian]
Nilipour Tabatabaee, S.A., Khayambashi, B., Karbasian, M. & Shariati, M. (2012). Optimization of information technology application in supply chain management and marketing of aviation products by AHP method. New Marketing Research, 2(5): 143-146. [in persian]
Payne, J. & Fryer, J. (2020). Knowledge management and information management: A tale of two siblings. Business Information Review, 37(2): 69-77.    
Portela, F., Lima, L. & Santos, M. F. (2016). Why Big Data? Towards a Project Assessment Framework. Procedia Computer Science, 98: 604-609.
Raeesi Dana, F.L. (2002) Applications and benefits of information technology. Educational technology, 2. [in persian]
Razavi, M. (2007) Cybercrime and the role of the police in preventing and detecting these crimes. Disciplinary Knowledge, 1(9): 120-140. [in persian]
Razmi, J. & Dehghan, S. (2004) The role of information technology in the supply chain of its application and implementation. In: Tehran: The first logistics seminar. [in persian]
Sanaee, A., Feyzpour, M.A. & Naderpour, M. (2012). The Impact of Information Technology on the Value Chain of Iranian Export Companies. Modern Marketing Research, 2(7): 23-44.
[in persian]
Sen, S. (2019). Book review: Debarati Halder and K. Jaishankar, Cyber Crimes Against Women in India. Sociological Bulletin, 68(1): 114-115. DOI:
Sohrabi, B. & Eraj, H. (2015). Macro data management in the private and public sectors. Tehran: Samat. Publications. [in persian]
Talebiyan, H. (2012). Explain the process of forming a police intelligence cloud in crime detection. Detective, 6(19): 126-157. [in persian]
Turban, R., Rainer, K. & Potter, R. (2005). Introduction To Information Technology. John Wiley & Sons, inc. Third Edition.
Word, J. (2000). Strategic Planning for Information Systems. Prentice Hall,
Xianfeng, Q., Boxing, L. & Zhenwei, G. (2008). Conceptual model of IT infrastructure capability and IT's emperical justification. Tsinghua Science and Technology, 13(3): 390-394.
Yadegarnejad, A., Habibzadeh, A. & Niknafs, A. (2014). The role of information exchange management on the crime detection process in the Kerman Disciplinary Command. Kerman Disciplinary Knowledge, 3(9): 78-108. [in persian]
Zalaghi, A. (2020). Legal and enforcement gaps and strategies to prevent cybercrime. Detective, 14(52): 82-98. [in persian]