التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري"
The study aimed to assess the effectiveness of the procedural criminal system governing the process of criminal investigation and its methods in the field of cybercrime between UAE and Egypt's laws. It also aimed to clarify the legal procedures for investigating these crimes. The problem add...
Saved in:
id |
my-usim-ddms-12684 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Sains Islam Malaysia |
collection |
USIM Institutional Repository |
language |
other |
topic |
Computer crimes--Law and legislation Computer crimes--Law and legislation--United Arab Emirates Computer crimes--Law and legislation--Egypt Computer crimes--Prevention Computer crimes--Law and legislation |
spellingShingle |
Computer crimes--Law and legislation Computer crimes--Law and legislation--United Arab Emirates Computer crimes--Law and legislation--Egypt Computer crimes--Prevention Computer crimes--Law and legislation عبد الله حميد راشد الجنيبي Abdulla Humaid Rashed Alsaedi alJneibi التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري" |
description |
The study aimed to assess the effectiveness of the procedural criminal system governing
the process of criminal investigation and its methods in the field of cybercrime between
UAE and Egypt's laws. It also aimed to clarify the legal procedures for investigating
these crimes. The problem addressed in this study was the emergence of legal and
technical challenges in investigating cybercrimes and the extent to which the provisions
and rules of the criminal procedural law can be applied to them. Considering that
cybercrimes are newly emerging crimes without a specific procedural system for
investigation, the study also aimed to highlight the new legal problems arising from the
emergence of information technology and its various applications in the field of
criminal law. The study followed an analytical and comparative approach between the
Federal Criminal Procedures Law of the UAE, issued as Law No. (35) of 1992, with its
latest amendments, and the Egyptian Criminal Procedures Law, Law No. 150 of 1950,
with its latest amendments. The study concluded that there is a significant similarity
between the investigation of cybercrimes and other crimes, as they all require similar
general procedures such as inspection, search, surveillance, investigations, and
interrogations, in addition to evidence collection and analysis. However, cybercrimes
differ from other crimes, and the investigation into the appropriate legal system for their
nature primarily aims to determine the legal provisions that should be applied to them,
as well as the legal system of responsibility that should be applied to the responsible
individuals. The study also highlighted various forms and applications that demonstrate
the use of technology in crime prevention, including the use of computers, biometric
technologies, digital fingerprints, remote sensing technology, and information
surveillance systems. It emphasized the existence of flaws in society's crime protection
tools, notably the Criminal Procedures Law, which does not keep pace with many
emerging and evolving crimes. The study recommended the necessity of enacting a
specific law to combat cybercrimes, expanding the scope of mandatory reporting in
cybercrimes, regulating inspection, search, and remote control over the internet, and
developing forensic evidence methods in line with scientific facts. It stressed the need
for both objective and procedural criminal laws to keep up with the phenomenon of
cybercrime due to the clear legislative gaps in providing criminal protection for
information privacy. It also proposed the establishment of specialized units within the
organizational structure of criminal investigations to deal with cybercrimes, equipped
with laboratories and facilities at the highest levels. |
format |
Thesis |
author |
عبد الله حميد راشد الجنيبي Abdulla Humaid Rashed Alsaedi alJneibi |
author_facet |
عبد الله حميد راشد الجنيبي Abdulla Humaid Rashed Alsaedi alJneibi |
author_sort |
عبد الله حميد راشد الجنيبي |
title |
التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري" |
title_short |
التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري" |
title_full |
التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري" |
title_fullStr |
التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري" |
title_full_unstemmed |
التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري" |
title_sort |
التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري" |
granting_institution |
Universiti Sains Islam Malaysia |
url |
https://oarep.usim.edu.my/bitstreams/e29fbfed-1201-493d-b0b7-b925e0747984/download https://oarep.usim.edu.my/bitstreams/93d7102b-b270-44e5-a28f-470e7aa8f8f8/download https://oarep.usim.edu.my/bitstreams/d678bb31-f8dc-49b3-b738-7317fa3e2530/download https://oarep.usim.edu.my/bitstreams/62d87b0a-d240-4c2e-bff3-2c586704c30d/download https://oarep.usim.edu.my/bitstreams/167cb379-68e8-4911-83a7-f76c36925adb/download https://oarep.usim.edu.my/bitstreams/b1c90bfb-0a8b-44ee-84f3-6cc41045a88a/download https://oarep.usim.edu.my/bitstreams/05e94e7e-a8cf-42f7-a845-d44dbddf216e/download https://oarep.usim.edu.my/bitstreams/4650942c-86c3-4b8e-8fe2-4175031ae284/download https://oarep.usim.edu.my/bitstreams/656bb51c-ef71-44bd-9c61-d8394dbd9deb/download https://oarep.usim.edu.my/bitstreams/e7f04021-b6a3-4d77-8160-43d183aefd7b/download |
_version_ |
1812444879444246528 |
spelling |
my-usim-ddms-126842024-05-29T20:05:25Z التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري" Al-tahqiq fi al-jara’im al-ma’lumatiyah “Dirasah tahliliyah muqaranah bayna al-qanun al-imarati wa al-misri عبد الله حميد راشد الجنيبي Abdulla Humaid Rashed Alsaedi alJneibi The study aimed to assess the effectiveness of the procedural criminal system governing the process of criminal investigation and its methods in the field of cybercrime between UAE and Egypt's laws. It also aimed to clarify the legal procedures for investigating these crimes. The problem addressed in this study was the emergence of legal and technical challenges in investigating cybercrimes and the extent to which the provisions and rules of the criminal procedural law can be applied to them. Considering that cybercrimes are newly emerging crimes without a specific procedural system for investigation, the study also aimed to highlight the new legal problems arising from the emergence of information technology and its various applications in the field of criminal law. The study followed an analytical and comparative approach between the Federal Criminal Procedures Law of the UAE, issued as Law No. (35) of 1992, with its latest amendments, and the Egyptian Criminal Procedures Law, Law No. 150 of 1950, with its latest amendments. The study concluded that there is a significant similarity between the investigation of cybercrimes and other crimes, as they all require similar general procedures such as inspection, search, surveillance, investigations, and interrogations, in addition to evidence collection and analysis. However, cybercrimes differ from other crimes, and the investigation into the appropriate legal system for their nature primarily aims to determine the legal provisions that should be applied to them, as well as the legal system of responsibility that should be applied to the responsible individuals. The study also highlighted various forms and applications that demonstrate the use of technology in crime prevention, including the use of computers, biometric technologies, digital fingerprints, remote sensing technology, and information surveillance systems. It emphasized the existence of flaws in society's crime protection tools, notably the Criminal Procedures Law, which does not keep pace with many emerging and evolving crimes. The study recommended the necessity of enacting a specific law to combat cybercrimes, expanding the scope of mandatory reporting in cybercrimes, regulating inspection, search, and remote control over the internet, and developing forensic evidence methods in line with scientific facts. It stressed the need for both objective and procedural criminal laws to keep up with the phenomenon of cybercrime due to the clear legislative gaps in providing criminal protection for information privacy. It also proposed the establishment of specialized units within the organizational structure of criminal investigations to deal with cybercrimes, equipped with laboratories and facilities at the highest levels. Universiti Sains Islam Malaysia 2023-08 Thesis other https://oarep.usim.edu.my/handle/123456789/12684 https://oarep.usim.edu.my/bitstreams/476aeb06-dd8b-460d-beb6-fad2dc229191/download 8a4605be74aa9ea9d79846c1fba20a33 https://oarep.usim.edu.my/bitstreams/e29fbfed-1201-493d-b0b7-b925e0747984/download 66b248dd93d09cf384feddf6d9e9e84a https://oarep.usim.edu.my/bitstreams/93d7102b-b270-44e5-a28f-470e7aa8f8f8/download 86b0cb3f646623d5189945f46fcb9d7d https://oarep.usim.edu.my/bitstreams/d678bb31-f8dc-49b3-b738-7317fa3e2530/download 22311d2872d6d1fc0a1d5ca3decacd68 https://oarep.usim.edu.my/bitstreams/62d87b0a-d240-4c2e-bff3-2c586704c30d/download 52a930cb84092dd23a34b7df81ca0fa1 https://oarep.usim.edu.my/bitstreams/167cb379-68e8-4911-83a7-f76c36925adb/download eab4c108fcdb950edb2a4b07d25c525e https://oarep.usim.edu.my/bitstreams/b1c90bfb-0a8b-44ee-84f3-6cc41045a88a/download aba250b9a728898c0dc63dc77798bc39 https://oarep.usim.edu.my/bitstreams/05e94e7e-a8cf-42f7-a845-d44dbddf216e/download d00b9315649370406759ce5008dbd42a https://oarep.usim.edu.my/bitstreams/4650942c-86c3-4b8e-8fe2-4175031ae284/download 81b46babfb5830a469a3b1d7dcc84d16 https://oarep.usim.edu.my/bitstreams/656bb51c-ef71-44bd-9c61-d8394dbd9deb/download dbea5aac573af07a78e2ea34af928086 https://oarep.usim.edu.my/bitstreams/e7f04021-b6a3-4d77-8160-43d183aefd7b/download 95e05de3900adead4f0667abacd3db4b https://oarep.usim.edu.my/bitstreams/8b628636-2aad-4473-8315-4dab2266b333/download 68b329da9893e34099c7d8ad5cb9c940 https://oarep.usim.edu.my/bitstreams/1ebdf99f-7dc0-4990-82ad-f112430c372b/download 04ae1a57a5c0588a087ece126152d86f https://oarep.usim.edu.my/bitstreams/cceaeea4-f7cf-447d-97b8-d34ab7c8d5e5/download c24a144a61262e647124d689d672cdce https://oarep.usim.edu.my/bitstreams/6ed3d51d-7e33-4b14-a41c-ef9c5955edc2/download 681aa24c5cc50f9e97e8ec281078614c https://oarep.usim.edu.my/bitstreams/2ee82630-fcec-4a9a-9a56-56628b1862af/download 8ac4546be5f7cdf917adcd1856b29b29 https://oarep.usim.edu.my/bitstreams/b43c4fbb-f68c-4442-a048-b6805e53a6d8/download 68a958ddb334a31b259f03862651295b https://oarep.usim.edu.my/bitstreams/e82ab69b-7386-48b1-a575-0fa958c7385e/download 42279d66305161c45539a2aef3c1c83b https://oarep.usim.edu.my/bitstreams/62fec1c4-5b40-463e-b417-bc4007b8cbba/download 1bf41cdaccc76b0266f968df63f3fa45 https://oarep.usim.edu.my/bitstreams/2265b221-ea7d-4ae5-a960-e68819c8bdc5/download b9045b3cae602f852849a554d69d69c4 https://oarep.usim.edu.my/bitstreams/523b30ce-0042-4b31-9e6d-b9f85dae7b11/download 01102fb7171f0986f7aad2ffaa1910e4 Computer crimes--Law and legislation Computer crimes--Law and legislation--United Arab Emirates Computer crimes--Law and legislation--Egypt Computer crimes--Prevention Criminal procedural law, Cybercrimes, Cyberspace. |