التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري"

The study aimed to assess the effectiveness of the procedural criminal system governing the process of criminal investigation and its methods in the field of cybercrime between UAE and Egypt's laws. It also aimed to clarify the legal procedures for investigating these crimes. The problem add...

Full description

Saved in:
Bibliographic Details
Main Authors: عبد الله حميد راشد الجنيبي, Abdulla Humaid Rashed Alsaedi alJneibi
Format: Thesis
Language:other
Subjects:
Online Access:https://oarep.usim.edu.my/bitstreams/e29fbfed-1201-493d-b0b7-b925e0747984/download
https://oarep.usim.edu.my/bitstreams/93d7102b-b270-44e5-a28f-470e7aa8f8f8/download
https://oarep.usim.edu.my/bitstreams/d678bb31-f8dc-49b3-b738-7317fa3e2530/download
https://oarep.usim.edu.my/bitstreams/62d87b0a-d240-4c2e-bff3-2c586704c30d/download
https://oarep.usim.edu.my/bitstreams/167cb379-68e8-4911-83a7-f76c36925adb/download
https://oarep.usim.edu.my/bitstreams/b1c90bfb-0a8b-44ee-84f3-6cc41045a88a/download
https://oarep.usim.edu.my/bitstreams/05e94e7e-a8cf-42f7-a845-d44dbddf216e/download
https://oarep.usim.edu.my/bitstreams/4650942c-86c3-4b8e-8fe2-4175031ae284/download
https://oarep.usim.edu.my/bitstreams/656bb51c-ef71-44bd-9c61-d8394dbd9deb/download
https://oarep.usim.edu.my/bitstreams/e7f04021-b6a3-4d77-8160-43d183aefd7b/download
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-usim-ddms-12684
record_format uketd_dc
institution Universiti Sains Islam Malaysia
collection USIM Institutional Repository
language other
topic Computer crimes--Law and legislation
Computer crimes--Law and legislation--United Arab Emirates
Computer crimes--Law and legislation--Egypt
Computer crimes--Prevention
Computer crimes--Law and legislation
spellingShingle Computer crimes--Law and legislation
Computer crimes--Law and legislation--United Arab Emirates
Computer crimes--Law and legislation--Egypt
Computer crimes--Prevention
Computer crimes--Law and legislation
عبد الله حميد راشد الجنيبي
Abdulla Humaid Rashed Alsaedi alJneibi
التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري"
description The study aimed to assess the effectiveness of the procedural criminal system governing the process of criminal investigation and its methods in the field of cybercrime between UAE and Egypt's laws. It also aimed to clarify the legal procedures for investigating these crimes. The problem addressed in this study was the emergence of legal and technical challenges in investigating cybercrimes and the extent to which the provisions and rules of the criminal procedural law can be applied to them. Considering that cybercrimes are newly emerging crimes without a specific procedural system for investigation, the study also aimed to highlight the new legal problems arising from the emergence of information technology and its various applications in the field of criminal law. The study followed an analytical and comparative approach between the Federal Criminal Procedures Law of the UAE, issued as Law No. (35) of 1992, with its latest amendments, and the Egyptian Criminal Procedures Law, Law No. 150 of 1950, with its latest amendments. The study concluded that there is a significant similarity between the investigation of cybercrimes and other crimes, as they all require similar general procedures such as inspection, search, surveillance, investigations, and interrogations, in addition to evidence collection and analysis. However, cybercrimes differ from other crimes, and the investigation into the appropriate legal system for their nature primarily aims to determine the legal provisions that should be applied to them, as well as the legal system of responsibility that should be applied to the responsible individuals. The study also highlighted various forms and applications that demonstrate the use of technology in crime prevention, including the use of computers, biometric technologies, digital fingerprints, remote sensing technology, and information surveillance systems. It emphasized the existence of flaws in society's crime protection tools, notably the Criminal Procedures Law, which does not keep pace with many emerging and evolving crimes. The study recommended the necessity of enacting a specific law to combat cybercrimes, expanding the scope of mandatory reporting in cybercrimes, regulating inspection, search, and remote control over the internet, and developing forensic evidence methods in line with scientific facts. It stressed the need for both objective and procedural criminal laws to keep up with the phenomenon of cybercrime due to the clear legislative gaps in providing criminal protection for information privacy. It also proposed the establishment of specialized units within the organizational structure of criminal investigations to deal with cybercrimes, equipped with laboratories and facilities at the highest levels.
format Thesis
author عبد الله حميد راشد الجنيبي
Abdulla Humaid Rashed Alsaedi alJneibi
author_facet عبد الله حميد راشد الجنيبي
Abdulla Humaid Rashed Alsaedi alJneibi
author_sort عبد الله حميد راشد الجنيبي
title التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري"
title_short التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري"
title_full التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري"
title_fullStr التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري"
title_full_unstemmed التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري"
title_sort التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري"
granting_institution Universiti Sains Islam Malaysia
url https://oarep.usim.edu.my/bitstreams/e29fbfed-1201-493d-b0b7-b925e0747984/download
https://oarep.usim.edu.my/bitstreams/93d7102b-b270-44e5-a28f-470e7aa8f8f8/download
https://oarep.usim.edu.my/bitstreams/d678bb31-f8dc-49b3-b738-7317fa3e2530/download
https://oarep.usim.edu.my/bitstreams/62d87b0a-d240-4c2e-bff3-2c586704c30d/download
https://oarep.usim.edu.my/bitstreams/167cb379-68e8-4911-83a7-f76c36925adb/download
https://oarep.usim.edu.my/bitstreams/b1c90bfb-0a8b-44ee-84f3-6cc41045a88a/download
https://oarep.usim.edu.my/bitstreams/05e94e7e-a8cf-42f7-a845-d44dbddf216e/download
https://oarep.usim.edu.my/bitstreams/4650942c-86c3-4b8e-8fe2-4175031ae284/download
https://oarep.usim.edu.my/bitstreams/656bb51c-ef71-44bd-9c61-d8394dbd9deb/download
https://oarep.usim.edu.my/bitstreams/e7f04021-b6a3-4d77-8160-43d183aefd7b/download
_version_ 1812444879444246528
spelling my-usim-ddms-126842024-05-29T20:05:25Z التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري" Al-tahqiq fi al-jara’im al-ma’lumatiyah “Dirasah tahliliyah muqaranah bayna al-qanun al-imarati wa al-misri عبد الله حميد راشد الجنيبي Abdulla Humaid Rashed Alsaedi alJneibi The study aimed to assess the effectiveness of the procedural criminal system governing the process of criminal investigation and its methods in the field of cybercrime between UAE and Egypt's laws. It also aimed to clarify the legal procedures for investigating these crimes. The problem addressed in this study was the emergence of legal and technical challenges in investigating cybercrimes and the extent to which the provisions and rules of the criminal procedural law can be applied to them. Considering that cybercrimes are newly emerging crimes without a specific procedural system for investigation, the study also aimed to highlight the new legal problems arising from the emergence of information technology and its various applications in the field of criminal law. The study followed an analytical and comparative approach between the Federal Criminal Procedures Law of the UAE, issued as Law No. (35) of 1992, with its latest amendments, and the Egyptian Criminal Procedures Law, Law No. 150 of 1950, with its latest amendments. The study concluded that there is a significant similarity between the investigation of cybercrimes and other crimes, as they all require similar general procedures such as inspection, search, surveillance, investigations, and interrogations, in addition to evidence collection and analysis. However, cybercrimes differ from other crimes, and the investigation into the appropriate legal system for their nature primarily aims to determine the legal provisions that should be applied to them, as well as the legal system of responsibility that should be applied to the responsible individuals. The study also highlighted various forms and applications that demonstrate the use of technology in crime prevention, including the use of computers, biometric technologies, digital fingerprints, remote sensing technology, and information surveillance systems. It emphasized the existence of flaws in society's crime protection tools, notably the Criminal Procedures Law, which does not keep pace with many emerging and evolving crimes. The study recommended the necessity of enacting a specific law to combat cybercrimes, expanding the scope of mandatory reporting in cybercrimes, regulating inspection, search, and remote control over the internet, and developing forensic evidence methods in line with scientific facts. It stressed the need for both objective and procedural criminal laws to keep up with the phenomenon of cybercrime due to the clear legislative gaps in providing criminal protection for information privacy. It also proposed the establishment of specialized units within the organizational structure of criminal investigations to deal with cybercrimes, equipped with laboratories and facilities at the highest levels. Universiti Sains Islam Malaysia 2023-08 Thesis other https://oarep.usim.edu.my/handle/123456789/12684 https://oarep.usim.edu.my/bitstreams/476aeb06-dd8b-460d-beb6-fad2dc229191/download 8a4605be74aa9ea9d79846c1fba20a33 https://oarep.usim.edu.my/bitstreams/e29fbfed-1201-493d-b0b7-b925e0747984/download 66b248dd93d09cf384feddf6d9e9e84a https://oarep.usim.edu.my/bitstreams/93d7102b-b270-44e5-a28f-470e7aa8f8f8/download 86b0cb3f646623d5189945f46fcb9d7d https://oarep.usim.edu.my/bitstreams/d678bb31-f8dc-49b3-b738-7317fa3e2530/download 22311d2872d6d1fc0a1d5ca3decacd68 https://oarep.usim.edu.my/bitstreams/62d87b0a-d240-4c2e-bff3-2c586704c30d/download 52a930cb84092dd23a34b7df81ca0fa1 https://oarep.usim.edu.my/bitstreams/167cb379-68e8-4911-83a7-f76c36925adb/download eab4c108fcdb950edb2a4b07d25c525e https://oarep.usim.edu.my/bitstreams/b1c90bfb-0a8b-44ee-84f3-6cc41045a88a/download aba250b9a728898c0dc63dc77798bc39 https://oarep.usim.edu.my/bitstreams/05e94e7e-a8cf-42f7-a845-d44dbddf216e/download d00b9315649370406759ce5008dbd42a https://oarep.usim.edu.my/bitstreams/4650942c-86c3-4b8e-8fe2-4175031ae284/download 81b46babfb5830a469a3b1d7dcc84d16 https://oarep.usim.edu.my/bitstreams/656bb51c-ef71-44bd-9c61-d8394dbd9deb/download dbea5aac573af07a78e2ea34af928086 https://oarep.usim.edu.my/bitstreams/e7f04021-b6a3-4d77-8160-43d183aefd7b/download 95e05de3900adead4f0667abacd3db4b https://oarep.usim.edu.my/bitstreams/8b628636-2aad-4473-8315-4dab2266b333/download 68b329da9893e34099c7d8ad5cb9c940 https://oarep.usim.edu.my/bitstreams/1ebdf99f-7dc0-4990-82ad-f112430c372b/download 04ae1a57a5c0588a087ece126152d86f https://oarep.usim.edu.my/bitstreams/cceaeea4-f7cf-447d-97b8-d34ab7c8d5e5/download c24a144a61262e647124d689d672cdce https://oarep.usim.edu.my/bitstreams/6ed3d51d-7e33-4b14-a41c-ef9c5955edc2/download 681aa24c5cc50f9e97e8ec281078614c https://oarep.usim.edu.my/bitstreams/2ee82630-fcec-4a9a-9a56-56628b1862af/download 8ac4546be5f7cdf917adcd1856b29b29 https://oarep.usim.edu.my/bitstreams/b43c4fbb-f68c-4442-a048-b6805e53a6d8/download 68a958ddb334a31b259f03862651295b https://oarep.usim.edu.my/bitstreams/e82ab69b-7386-48b1-a575-0fa958c7385e/download 42279d66305161c45539a2aef3c1c83b https://oarep.usim.edu.my/bitstreams/62fec1c4-5b40-463e-b417-bc4007b8cbba/download 1bf41cdaccc76b0266f968df63f3fa45 https://oarep.usim.edu.my/bitstreams/2265b221-ea7d-4ae5-a960-e68819c8bdc5/download b9045b3cae602f852849a554d69d69c4 https://oarep.usim.edu.my/bitstreams/523b30ce-0042-4b31-9e6d-b9f85dae7b11/download 01102fb7171f0986f7aad2ffaa1910e4 Computer crimes--Law and legislation Computer crimes--Law and legislation--United Arab Emirates Computer crimes--Law and legislation--Egypt Computer crimes--Prevention Criminal procedural law, Cybercrimes, Cyberspace.