Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Business

Association of Arab Universities

Cybercrime

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Law

Crimes Of Assault On Electronic Programmes In Palestinian Legislation, عبدالله ذيب محمود, Mamoun Abu Helou, Waheeb Abu Ulbeh Feb 2023

Crimes Of Assault On Electronic Programmes In Palestinian Legislation, عبدالله ذيب محمود, Mamoun Abu Helou, Waheeb Abu Ulbeh

AAU Journal of Business and Law مجلة جامعة العين للأعمال والقانون

The development and great spread of information technology and communication devices and the increase in reliability of the Internet have led to its widespread use in the daily life of Palestinian citizens and thus the emergence of many related electronic crimes. This study revolves around talking about the crimes of assaulting electronic programs in Palestinian legislation, which are represented by obstructing or disrupting access to electronic services, devices, programs, or electronic information of all kinds. The object of protection in the crime of assaulting electronic devices and the electronic network is the programs that are configured or accessories to computers …


The Ethics And Legislation Of The New Media Use In The United Arab Emirates Analytical Study Of The Law - Combating It Crimes, Rahima Aissani Jun 2020

The Ethics And Legislation Of The New Media Use In The United Arab Emirates Analytical Study Of The Law - Combating It Crimes, Rahima Aissani

AAU Journal of Business and Law مجلة جامعة العين للأعمال والقانون

The study deals with an analytical reading (from an information and communication perspective) of the Law "Combating Information Technology Crimes" in the UAE. The law was passed in 2012 by Decree Law No: 5/2012, which was published in the Official Gazette No: 540, attached to the 42nd year, on 26/8/2012, and included amendments to the provisions of the law Federal No: (2) for the year 2006 establishing the Law "Combating Information Technology Crimes". The study adopts the method of content analysis of the materials covered by the law, based on two categories of analysis: • Form Category: for the detection …