استخدام التقنيات الحديثة في تجنيد الشباب لأهداف إرهابية وآلية مواجهتها في القانون الإماراتي: دراسة مقارنة
Recent technological advancements have led to the proliferation of tools such as social media, websites, digital currencies, the Internet of Things (IoT), and interactive online games. There is a risk that terrorist organizations might exploit these tools for nefarious purposes. This study aims to e...
Saved in:
id |
my-usim-ddms-13160 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Sains Islam Malaysia |
collection |
USIM Institutional Repository |
language |
other |
topic |
Internet of Things (IoT) UAE law UAE legislation Cybercrime Digital currencies Comparative law Computer crimes-- Law and legislation -- United Arab Emirates Terrorist organizations Cyberterrorism |
spellingShingle |
Internet of Things (IoT) UAE law UAE legislation Cybercrime Digital currencies Comparative law Computer crimes-- Law and legislation -- United Arab Emirates Terrorist organizations Cyberterrorism سلطان عبيد الطنيجي Sultan Obaid Al Teneiji استخدام التقنيات الحديثة في تجنيد الشباب لأهداف إرهابية وآلية مواجهتها في القانون الإماراتي: دراسة مقارنة |
description |
Recent technological advancements have led to the proliferation of tools such as social media, websites, digital currencies, the Internet of Things (IoT), and interactive online games. There is a risk that terrorist organizations might exploit these tools for nefarious purposes. This study aims to explore how modern technologies are employed to recruit youth for terrorist activities, focusing on the context of UAE law. It assesses the effectiveness of UAE legislation in countering such threats and compares it with the legal framework in Egypt, proposing potential solutions. Qualitative research methods, including textual and comparative analysis, along with critical evaluation, are employed to understand the use of modern technologies by terrorist groups. The study incorporates interviews with UAE experts in law and cybercrime and concludes that, while UAE law includes mechanisms to counteract the misuse of technology for terrorism, there is an evident need for specialized training and enhancement in enforcement. The findings highlight that to effectively counter the misuse of technology for the recruitment of youth, there must be a joint effort among various security entities. Additionally, it is essential to increase community awareness through educational and religious institutions. The research recommends the updating of laws and regulations to stay abreast of technological advancements, continuous monitoring of diverse online platforms and services, and the bolstering of the capacity of companies, organizations, and governments to address cyber threats. |
format |
Thesis |
author |
سلطان عبيد الطنيجي Sultan Obaid Al Teneiji |
author_facet |
سلطان عبيد الطنيجي Sultan Obaid Al Teneiji |
author_sort |
سلطان عبيد الطنيجي |
title |
استخدام التقنيات الحديثة في تجنيد الشباب لأهداف إرهابية وآلية مواجهتها في القانون الإماراتي: دراسة مقارنة |
title_short |
استخدام التقنيات الحديثة في تجنيد الشباب لأهداف إرهابية وآلية مواجهتها في القانون الإماراتي: دراسة مقارنة |
title_full |
استخدام التقنيات الحديثة في تجنيد الشباب لأهداف إرهابية وآلية مواجهتها في القانون الإماراتي: دراسة مقارنة |
title_fullStr |
استخدام التقنيات الحديثة في تجنيد الشباب لأهداف إرهابية وآلية مواجهتها في القانون الإماراتي: دراسة مقارنة |
title_full_unstemmed |
استخدام التقنيات الحديثة في تجنيد الشباب لأهداف إرهابية وآلية مواجهتها في القانون الإماراتي: دراسة مقارنة |
title_sort |
استخدام التقنيات الحديثة في تجنيد الشباب لأهداف إرهابية وآلية مواجهتها في القانون الإماراتي: دراسة مقارنة |
granting_institution |
Universiti Sains Islam Malaysia |
url |
https://oarep.usim.edu.my/bitstreams/560e6929-973f-418e-8a5c-de9d2c80597d/download https://oarep.usim.edu.my/bitstreams/e14ec487-d1a4-453f-bede-681faf6e0314/download https://oarep.usim.edu.my/bitstreams/24115e81-79b5-4685-ac24-145d3700b6ab/download https://oarep.usim.edu.my/bitstreams/8e48e5c0-8218-4ca3-a7f2-90755b07315e/download https://oarep.usim.edu.my/bitstreams/3a21cba8-242e-4013-aa25-875bf936c966/download https://oarep.usim.edu.my/bitstreams/83c1dd1a-ab33-4b85-a3d5-daedb7eb35ce/download https://oarep.usim.edu.my/bitstreams/88b44299-0fad-471f-81e3-ed38d07604a4/download https://oarep.usim.edu.my/bitstreams/b472df47-9fe7-4a64-baa6-84e09bf325fc/download |
_version_ |
1812444743334887424 |
spelling |
my-usim-ddms-131602024-05-29T18:47:40Z استخدام التقنيات الحديثة في تجنيد الشباب لأهداف إرهابية وآلية مواجهتها في القانون الإماراتي: دراسة مقارنة Istikhdam al-taqniyat al-hadithah fi tajnid al-shabab li-ahdaf irhabiyah wa- aliyah muwajahatiha fi al-qanun al-imarati : dirasah muqaranah سلطان عبيد الطنيجي Sultan Obaid Al Teneiji Recent technological advancements have led to the proliferation of tools such as social media, websites, digital currencies, the Internet of Things (IoT), and interactive online games. There is a risk that terrorist organizations might exploit these tools for nefarious purposes. This study aims to explore how modern technologies are employed to recruit youth for terrorist activities, focusing on the context of UAE law. It assesses the effectiveness of UAE legislation in countering such threats and compares it with the legal framework in Egypt, proposing potential solutions. Qualitative research methods, including textual and comparative analysis, along with critical evaluation, are employed to understand the use of modern technologies by terrorist groups. The study incorporates interviews with UAE experts in law and cybercrime and concludes that, while UAE law includes mechanisms to counteract the misuse of technology for terrorism, there is an evident need for specialized training and enhancement in enforcement. The findings highlight that to effectively counter the misuse of technology for the recruitment of youth, there must be a joint effort among various security entities. Additionally, it is essential to increase community awareness through educational and religious institutions. The research recommends the updating of laws and regulations to stay abreast of technological advancements, continuous monitoring of diverse online platforms and services, and the bolstering of the capacity of companies, organizations, and governments to address cyber threats. Universiti Sains Islam Malaysia 2024-03 Thesis other https://oarep.usim.edu.my/handle/123456789/13160 https://oarep.usim.edu.my/bitstreams/560e6929-973f-418e-8a5c-de9d2c80597d/download 340322ee8bac49dadb5197832dba4cd0 https://oarep.usim.edu.my/bitstreams/e14ec487-d1a4-453f-bede-681faf6e0314/download 6f6360b41155db88749e1038ad7d8b81 https://oarep.usim.edu.my/bitstreams/24115e81-79b5-4685-ac24-145d3700b6ab/download 7619d99cc527678fb2f816b9214b9900 https://oarep.usim.edu.my/bitstreams/8e48e5c0-8218-4ca3-a7f2-90755b07315e/download e2ed8af427fe0ff02836ffad821a3a97 https://oarep.usim.edu.my/bitstreams/3a21cba8-242e-4013-aa25-875bf936c966/download f7bd659f949ac54e40b07c205700e171 https://oarep.usim.edu.my/bitstreams/83c1dd1a-ab33-4b85-a3d5-daedb7eb35ce/download 57742e1301a543f56d9b3c236a9c9060 https://oarep.usim.edu.my/bitstreams/88b44299-0fad-471f-81e3-ed38d07604a4/download cef9233d41afbde8e50838de8d3a9ac3 https://oarep.usim.edu.my/bitstreams/b472df47-9fe7-4a64-baa6-84e09bf325fc/download d23958edb303c73668442755f1cc5f27 https://oarep.usim.edu.my/bitstreams/01ba6e94-168f-421c-8aab-01e1e4b39144/download 8a4605be74aa9ea9d79846c1fba20a33 https://oarep.usim.edu.my/bitstreams/42040387-08fe-4fc6-b3f6-af8be54314a7/download fd076d62f9047500feca39dfefc45f6d https://oarep.usim.edu.my/bitstreams/77812f5c-76aa-49e0-a9d5-241418ea1a95/download b40b01b5b32c98da1e8b9f6954ea7968 https://oarep.usim.edu.my/bitstreams/a982244c-b338-4fd9-9868-5d6c15402923/download 85587c923857503c5bd7e489c731d929 https://oarep.usim.edu.my/bitstreams/efb13596-0ec9-447f-b4d9-929860d7ebce/download c43dce5d6ed83cc8b06c485e108bc38c https://oarep.usim.edu.my/bitstreams/78a9d395-7a30-4925-9ac3-32e2ab54bf73/download d262072c53c64a903fecfa4546d607eb https://oarep.usim.edu.my/bitstreams/1a681941-3569-4653-984f-eb18401a70b3/download 9ae17fd846c800f57d808551770307ee https://oarep.usim.edu.my/bitstreams/d5fb0ac4-eb5f-4d08-8dbc-a268d8781463/download 58d4158016d87334a048e28e1a42e510 https://oarep.usim.edu.my/bitstreams/61b09d24-d721-456f-8670-cc2c2fb1e233/download a761107e39d1ae8d3f6e9119c0211f9c Internet of Things (IoT); UAE law; UAE legislation; Cybercrime; Digital currencies Comparative law Computer crimes-- Law and legislation -- United Arab Emirates Terrorist organizations Cyberterrorism |