Search In this Thesis
   Search In this Thesis  
العنوان
جرائم الأموال فى البيئة الإلكترونية فى التشريع الإماراتى /
المؤلف
العلوي، سيف راشد سيف خميس،
هيئة الاعداد
باحث / سيف راشد سيف خميس العلوي
مشرف / أكمل يوسف السعيد
مناقش / أحمد لطفي السيد
مناقش / خالد عبدالهادي الزناتي
الموضوع
القانون الجنائي.
تاريخ النشر
2023.
عدد الصفحات
345 ص. ؛
اللغة
العربية
الدرجة
ماجستير
التخصص
قانون
تاريخ الإجازة
01/01/2023
مكان الإجازة
جامعة المنصورة - كلية الحقوق - قسم القانون الجنائي
الفهرس
يوجد فقط 14 صفحة متاحة للعرض العام

from 354

from 354

المستخلص

The reason for choosing the topic of money crimes resulting from the use of computers as the subject of study is due to the novelty of the topic and its connection to practical reality, and the extension of its danger to all economic institutions affiliated with the state, especially after the introduction of the computer and its network into the scope of their work and their increasing dependence on it. In addition to the desire to try to establish the main features of money crimes resulting from the use of computers, as they are new criminal phenomena, and to prepare a study showing the legislative treatment methods followed by other countries in combating the aforementioned crimes. In order to benefit from it in criminalizing and confronting financial attacks. Second - The importance of the study: This study seeks to achieve the following objectives: 1. Defining the reality of cybercrimes and their committed patterns, and then knowing their risks and the effects that result from them. 2. Review the legislation issued in the United Arab Emirates to confront cybercrimes and punish their perpetrators. 3. Identifying the intellectual trends of the Emirati legislator when he formulates legislation related to confronting cybercrimes and punishing their perpetrators, which is called legislative policy. 4. Highlighting the interest of the Emirati legislator and the extent to which it keeps pace with the rapid changes of the era of the technical revolution and its outcomes to preserve the security of society from all its risks and threats. Third: Results and recommendations: We reached some of the following results: 1. Money crimes through information technology are new crimes and an expression that has not been mentioned in penal laws before in the use of modern technology. Likewise, societies are not accustomed to such crimes, and the actions involved have been dealt with in more than one penal law, including the Penal Code and the Penal Code. Combating terrorism and other laws. 2. Money varies from material to moral, and the opinion has been established that information that is processed automatically - and is governed by data stored whether in computer programs or in its memory - is included in money, and therefore enjoys the established criminal protection, and that the conditions for theft can apply to the theft of programs. As well as credit cards and wireless network service. 3. Cybercrime is a new and emerging criminal phenomenon that rings alarm bells. To alert present-day societies to the extent of the risks and the huge losses resulting from computer crime, which aims to attack data with its broad technical significance. 4. Computer and information crimes have a number of characteristics that are completely different from the characteristics of traditional crimes, and the cybercriminal (electronic criminal) is also different from the ordinary criminal. 5. There is a legislative vacuum in the field of cybercrimes. This vacuum is due to the novelty of this type of crime, but the United Arab Emirates issued Decree Law No. 34 of 2021 regarding combating rumors and cybercrimes. 6. The lack of qualified human resources with the experience and competence to work on modern devices and design advanced, high-quality programs that contribute to monitoring and prosecuting the perpetrators of these crimes. 7. Difficulty in reaching cybercrime perpetrators. Because these crimes can be committed from other countries in the world, the perpetrator may be in one country and the victim in another country, in addition to the difficulty of finding concrete evidence convicting the perpetrator because he used fictitious names or other personal names. Data theft - for example - cannot be found through it. Evidence that points to its perpetrator or convicts its perpetrator. 8. Information crime that occurs via the World Wide Web (the Internet) has a special nature, unlike other traditional crimes, and this special nature may be derived from the field in which it can be committed or from the place where the attack occurs.