The Legal Framework of Electronic Data Crimes

Shayma Muhammed Saeed, Ali Ahmad Al Zubi

Abstract


In order to determine the legal framework of these crimes, we should distinguish between two types of crimes or attack electronic data, the first type when the technology of electronic data process and telecommunication have used in remote to commit crimes. In other words these crimes are committed through computer and the criminal description of these businesses belongs to the known of types of traditional crimes like theft, fraud and other crimes. This type of crimes call un informatics in the global information network “ internet” also this field includes the crimes of usage of “internet” and electronic data processes tools to show the pornographic images or diffusion a messages which are inciting to racism, racial, religious, discrimination or exposure to the personal liberty or intellectual property. The second types of electronic data process crimes when the technology of the electronic data and telecommunications are on remote and make it as a means of this crimes and their purpose too. And now we are in front of anew criminal acts which associated mostly to the exposure of security and integrity of electronic data systems and the confidentiality of the data and information that consist on. And this type of criminal information network called “internet”, this is done in the case of illegal entry in to these systems and exposure to it or to the information that contain it. So this research will base on the electronic data crimes which are connected to the internet, when it becomes a direct target and a goal in their contents, and regardless on the impulsive of behind of committing.

Keywords


Legal framework; Data crimes

Full Text:

PDF

References


Abdel-Rahman, K. H. (1992). The legal protection of logical entities (information programs) (Unpublished doctoral thesis) (p.60). Faculty of Law, University of Ain Shams, Cairo.

Abdullah, K. O. (1942). The criminal protection of private life and data banks (p.48). ED3, Al Nahda Al Arabyeh, Cairo.

Ahmed, H. A. E. (1997). Witness commitment in the media of electronic data crimes: A comparative study (p.66). Dar Al Nahda Al Arabeyah, Cairo.

Al Cheniqi, A. R. (1993). Security confrontation of computer crimes. Life and Security Magazine, 11(129), p.46.

Al Kareeb, I. N. (1994). The security of computer and law (p.81). Dar Alratib Al Jameiyah, Beirut.

Al kbasi, A. S. (1999). Criminal liability from the use of computer, al maiedah al hurrah series (p.127). The Seminar of Law and Computer, bayt al hekmah.

Al Khater, S. H. (1999). Contracts guarantees for the transfer of information. Journal of Law, 3(3), 121.

Al Saqeer, J. A. B. (2001). Criminal confrontation to paid television programs piracy (p.11). Dar Al Nahda Al Arabeyah, Cairo.

Al-Faruq Al-Husseini, O. (1995). The important problems in computer-related crimes and international dimensions (2nd ed.) (p.127). Cairo.

Almnaash, O. A., et al. (1992). Computer crimes and Internet (p.72). Computer crimes in the comparison legislation.

Alois, M. (1983). The impact of technological development on public freedoms (p.46). Al Maarif Institution, Alexandria.

Al-Shawa, M. S. (1994). Information revolution and their reflection to the penal code (p.173). Dar Al Nahdah Al Arabia, Cairo.

Awad, M. M. (1993). Contemporary criminal policy problems in information systems crimes (p.6). Paper submitted by Sixth Conference of the Egyptian Criminal Law, Cairo.

Bakri, S. H. (1990). Networks and employment information against crime. Arab Journal for Security Studies and Training, 6(11), p.210.

Baqi, J. A. (1992). Criminal law and modern technology (p.16). Dar al nahdah al arabeyah, Cairo.

Ismail, R. (1999). The preventive of crimes which are arising from the use of computer. Islamic Economics Journal, (219), 34.

Jameel, A. B. (1999). Internet, and criminal law, the subjective rules of crimes which belong to the Internet (p.177). Dar Al Nahda Al Arabeyah, Cairo.

Kashoosh, & Hamid, H. (1992). Computer crimes in the comparison legislation (p.1). Dar Al Nahda Al Arabeyah, Cairo.

Muti kayal, M. S. A.. (1998). The Internet and some of the legal aspects (p.12). Dar Al Nahda library, Cairo.

Ramadan, M. A. H. (2001). The criminal protection of electronic commerce: A comparative study (p.35). Dar Al Nahda Al arabeyah, Cairo.

Rustam, H. M. F. (1992). The penal code and the risks of information technology (p.24). AL Allat Al Hadeetha Library, Assiut.

Rustom, H. (1999). The technical origins of the criminal investigation. Journal of Security and Law, (2), 110.

Sageer, J. A. B. (2001). The procedural aspects of crimes, related to the Internet (p.4). Dar Al Nahdah Al Arabeyah, Cairo.

Shamboor, T., et al. (1993). Banking secrecy (p.82). Research and discussions of the seminar organized by the Federation of Arab banks, Lebanon.

Shuqayr, R. S. (1997). Computer data attacking crimes. (Unpublished master’s thesis) (p.10). Faculty of Law, University of Mosul.




DOI: http://dx.doi.org/10.3968/j.css.1923669720141001.2789

Refbacks

  • There are currently no refbacks.


Copyright (c)



Reminder

  • How to do online submission to another Journal?
  • If you have already registered in Journal A, then how can you submit another article to Journal B? It takes two steps to make it happen:

Submission Guidelines for Canadian Social Science

We are currently accepting submissions via email only. The registration and online submission functions have been disabled.

Please send your manuscripts to [email protected],or [email protected] for consideration. We look forward to receiving your work.

 Articles published in Canadian Social Science are licensed under Creative Commons Attribution 4.0 (CC-BY).

 

Canadian Social Science Editorial Office

Address: 1020 Bouvier Street, Suite 400, Quebec City, Quebec, G2K 0K9, Canada.
Telephone: 1-514-558 6138 
Website: Http://www.cscanada.net; Http://www.cscanada.org 
E-mail:[email protected]; [email protected]

Copyright © Canadian Academy of Oriental and Occidental Culture