الطبيعة القانونية لجريمة الاختراق الإلكتروني الماس بأمن الدولة في القانون الإماراتي

دراسة مقارنة

المؤلفون

  • فاطمة يعقوب يوسف
  • د. محمد شلال العاني

DOI:

https://doi.org/10.35246/6pewm537

الكلمات المفتاحية:

التجسس الإلكتروني، الجريمة السيبرانية، الأمن المعلوماتي، الاختراق، الجرائم الرقمية، أمن الدولة

الملخص

تعد جريمة الاختراق الإلكتروني الماسة بأمن الدولة من أخطر الجرائم الرقمية التي تهدد استقرار الدول وسلامة أنظمتها، بغرض التجسس أو التخريب أو تعطيل البنية التحتية الحيوية، لذا ينبغي علينا بيان ماهية أمن الدول الداخلي والخارجي، من أجل توضيح مفهوم الاختراق الماس بأمن الدول، أما بالنسبة لطبيعتها القانونية، فأن الجريمة الإلكترونية ذات طبيعتين مختلفتين أحداهما يتمثل في الجانب المادي والذي يتمثل في أن تكون المعلومات مخزنة على داعمة إلكترونية والأخير يتمثل في الجانب المعنوي وذلك عندما تكون المعلومات في حالة انتقال أو موجودة في ذاكرة النظام المعلوماتي، ومن أجل تتحقق هذه الجريمة لابد من توافر أركانها الرئيسية، وهي التي تتمثل في الركن المادي الذي يتمثل في الأفعال التي تؤدي للاختراق، والركن المعنوي الذي يتطلب نية الجاني للإضرار بأمن الدولة.

التنزيلات

تنزيل البيانات ليس متاحًا بعد.

المراجع

Sources and References:

Firstly: - Linguistic References:

I. Mohamed bin Makram bin Manzur, Lisan al-Arab, Dar Sader, Beirut, 1st Edition, (73/10).

II. Mohamed bin Abdulrazzaq Al-Husseini, known as Murtadha Al-Zabidi, Taj al-Arus Min Jawahir al-Qamus, Dar Al-Hidaya, (219/25).

Secondly: - Arabic Reference:

III. Ibrahim Shakir Mahmoud Al-Jubouri, Crimes Against National Security from Inside and Outside, National Center for Legal Publications, Cairo, 2011, p. 171.

IV. Ibrahim Mahmoud Al-Lubaydi, Criminal Protection of National Security, Dar Al-Kutub Al-Qanuniya, Egypt, 2010.

V. Ahmed Khalifa Al-Malta, Cyber Crimes, Dar Al-Fikr Al-Arabi, Alexandria, 2nd Edition, 2006.

VI. Ahmed Fathi Surour, Criminal Code: Special Part, Dar Al-Nahda Al-Arabiya, Cairo, 1992.

VII. Islam Hadeeb, Cybersecurity: Cyberattacks and Cybercrimes, Dar Misr for Publishing and Distribution, 1st Edition, 2024.

VIII. Bakar Youssef Bakar, Searching for Information in Modern Technology Tools, Dar Al-Fikr Al-Jami'i, Alexandria, 1st Edition, 2011.

IX. Jamal Sand Al-Suwaidi, The Security System in the Gulf Region: Internal and External Challenges, Emirates Center for Strategic Studies and Research, 1st Edition, 2008.

X. Hassan Rabea Mohamed, Explanation of the Federal Penal Code of the UAE (General Part) Part 1, Dubai Police Academy, 2nd Edition, 2004.

XI. Rami Metwally Al-Qadi, Combating Cyber Crimes in Comparative Legislation and in the Light of International Agreements and Treaties, Dar Al-Nahda Al-Arabiya, Cairo, 1st Edition, 2011.

XII. Raouf Obeid, Principles of the General Part in Penal Legislation, Dar Al-Fikr Al-Jami'i, Egypt, 1979.

XIII. Samir Alya, Concise Explanation of Crimes Against National Security: A Comparative Study, The University Foundation for Studies, Publishing, and Distribution, Beirut, 1999.

XIV. Samir Alya, Concise Explanation of Crimes Against National Security, The University Foundation for Studies, Publishing, and Distribution, Beirut, Lebanon, 2008.

XV. Abdulrahman Al-Dakheel, Description of Hacking Websites on the World Wide Web, Al-Rushd Library, Riyadh, 2005.

XVI. Abdul-Muhaymin Bakar Salem, Crimes Against National Security Abroad: A Comparative Study in Kuwaiti and Comparative Legislation, Kuwait University Publications, 1988.

XVII. Abdullah Muhammad Al-Nawaiseh, Information Technology Crimes: Explanation of the Substantive Provisions of the Cybercrime Law, Mutah University, Dar Wail for Publishing and Distribution, 1st Edition, 2017.

XVIII. Mohamed Al-Shanawi, Strategy for Combating Human Trafficking Crimes, National Center for Legal Publications, Cairo, 2014.

XIX. Mohamed Al-Qasim and Abdulrahman Bin Abdulaziz Al-Hamdan, Essentials of Information Security, Riyadh, 2008.

XX. Mohamed Shalal Al-Ani and Abdul-Ilah Muhammad Salem Al-Nawaiseh, Crimes Affecting National Security Both Domestic and Foreign in UAE Legislation: According to the Latest Amendments by Decree-Law No. (7) of 2016, No Publisher, 2018.

XXI. Mohamed Shalal Al-Ani, Provisions of the General Part in the UAE Federal Penal Code, Al-Afaq Al-Mushriqa Publishers, 2010.

XXII. Mahmoud Suleiman Mousa, Crimes Against National Security: A Comparative Study in Arab Legislations and French and Italian Law, Dar Al-Matboo'at Al-Jami'iya, Alexandria, 2009.

XXIII. Mahmoud Ouda Al-Jubour, Crimes Against National Security and Terrorism Crimes in Jordanian Law and Arab Laws, Dar Al-Thaqafa for Publishing and Distribution, Amman, 2nd Edition, 2010.

XXIV. Midhat Mohamed Abdulaziz Ibrahim, Cyber Crimes on Information Systems: A Comparative Study, 1st Edition, Dar Al-Nahda Al-Arabiya, Cairo, 2015.

XXV. Hani Shakir Hani, General Provisions of Informational Data Secrecy: A Comparative Study, Center for Arab Studies, Cairo, 2024.

XXVI. Wassim Al-Ahmad, Collection of Arab Laws Related to Combating Information Technology Crimes, Al-Dar Al-Manhajiya for Publishing and Distribution, Amman, 2020.

Thirdly: - Foreign References:

XXVII. MARWE VANDER, Computer Crimes and Other Crimes Against Information Technology in South Africa, R.I.D.P, 1993.

XXVIII. The Computer Misuse Act, Art 1-1: “He knows at the time when he causes the computer to perform the function that that is the case.”

Fourthly: - Academic Theses:

XXIX. Islam Mustafa Jumaa Mustafa, Cybersecurity Breaches and Protection of Data and Information Use in Egyptian Law, Doctoral Thesis, Legal Journal, Vol. 12, Issue 3, 2022.

XXX. Hamza Ben Aqoun, Criminal Behavior of Cybercriminals, Master's Thesis, Batna University, 2011.

XXXI. Sofiane Souir, Cybercrimes, Master's Thesis, Abou Bakr Belkaid Tlemcen University, Algeria, 2011.

XXXII. Sofiane Archouch, Crimes Affecting Internal National Security: A Comparative Study Between Sharia and Law, Doctoral Thesis, Faculty of Law and Political Science, Mohamed Khider University of Biskra, 2015-2016.

XXXIII. Abdulrazzaq Abdulrahim Al-Mazmi, Criminal Protection of Internal National Security from Organized Crime in UAE Penal Legislation, Doctoral Thesis, Dubai Police Academy, 2015.

XXXIV. Abdul Latif Bin Saleh Al-Suwaid, The Crime of Hacking and its Punishment: A Comparative Study, Master's Thesis, Imam Muhammad Bin Saud Islamic University, 1430 AH.

XXXV. Mohamed Amin Ben Hariga, Methods and Techniques of Investigation in Combating Cybercrime, Master's Thesis, Abdelhamid Ben Badis University, Mostaganem, Algeria, 2020.

XXXVI. Youssef Al-Afifi, Cybercrimes in Palestinian Legislation: An Analytical Study, Master's Thesis, Islamic University of Gaza, 2013.

Fifthly: - Scientific Journals and Articles:

XXXVII. Bakar Abdul Muhaymin, General Provisions on Crimes Affecting External National Security, Journal of Legal and Economic Sciences, Vol. 7, Issue 1, 1965.

XXXVIII. Samia Bouchoucha, Electronic Espionage and Methods of Combating It, Journal of Social and Human Sciences, Vol. 16, Issue 1, 2023.

XXXIX. Samira Beitam, Cybercrime and Emerging Criminal Technology, Article published on 3-10-2015, on the website Alukah.net.

XL. Abdullah Bin Saad Al-Qahtani, Internet Security from Hacking and Trojan Horses, Journal of Knowledge Affairs, King Abdulaziz Library, Riyadh, 2002.

XLI. Karim Ouragh, Electronic Hacking in Cyberspace and Best Methods of Protection Against It, Journal of Scientific Development in Studies and Research, Issue 4, 2021.

XLII. Mahrous Nassar Ghaib, Information Crime, Technician Magazine, Technical Institute - Anbar Province, Vol. 244, Issue 9, 2011.

XLIII. Mahmoud Abdullah Dheeb Abdullah, Hacking Crimes on Government Data and Websites: A Comparative Study, Al-Manara Journal for Legal and Administrative Studies, Special Issue, 2020.

XLIV. Nadia Salami, Electronic Espionage as a Consequence of the Illegal Use of Cyberspace on External National Security, Studies Journal of Ammar Thleiji University, Alghawat, Faculty of Law and Political Science, Khenchela University, Algeria, Issue 56, 2017.

XLV. Nermin Nabil Al-Azraq, Determinants of Criminal Responsibility for Hacking, Interception, and Impersonation Crimes and Mechanisms for Control and Deterrence in Arab Legislation in the Digital Age: A Comparative Analytical Study, Media Research Journal, Al-Azhar University, Issue 56, Part 3, January 2021.

Sixthly: - Websites:

XLVI. See Article (1) of the Computer Misuse Act in the UK, 1990 here.

Seventhly: - Laws:

XLVII. The Computer Misuse Act in the UK, 1990.

XLVIII. Saudi Cybercrime Control System, issued by the Communications and Information Technology Commission, 1428 AH.

XLIX. Federal Law No. (34) of 2021 on Combating Rumors and Cybercrimes.

L. Jordanian Cybercrime Law No. (17) of 2023.

LI. Criminal and Penal Code of the United Arab Emirates as per Federal Decree-Law No. (31) of 2021.

LII. Criminal and Penal Code of the United Arab Emirates according to the latest amendments by Federal Decree-Law No. (31) of 2021.

LIII. Egyptian Penal Code No. (95) of 2003.

LIV. Law No. (175) of 2018 on Combating Information Technology Crimes.

LV. Law No. (63) of 2015 on Combating Information Technology Crimes (Egypt).

LVI. Law No. (63) of 2015 on Combating Information Technology Crimes (Kuwait).

LVII. Federal Decree-Law No. (34) of 2021 on Combating Rumors and Cybercrimes.

LVIII. Combating Information Technology Crimes Law No. (175) of 2018.

التنزيلات

منشور

01-04-2026

كيفية الاقتباس

يوسف فاطمة, و العاني محمد. 2026. "الطبيعة القانونية لجريمة الاختراق الإلكتروني الماس بأمن الدولة في القانون الإماراتي: دراسة مقارنة". مجلة العلوم القانونية 40 (4): 481-524. https://doi.org/10.35246/6pewm537.

المؤلفات المشابهة

1-10 من 226

يمكنك أيضاً إبدأ بحثاً متقدماً عن المشابهات لهذا المؤلَّف.