Do you want to publish a course? Click here

Inadequacy of the Syrian Juvenile law to computers Juvenile

عدم ملائمة قانون الأحداث السوري لانحراف الأحداث المعلوماتي

1510   0   7   0 ( 0 )
 Publication date 2018
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

It is clear that the jurisdiction of juvenile court is stated in any crime committed by the juvenile whether it is a traditional crime or a new crime such as informatics crimes. Thus, a question arises about the importance of the Syrian juvenile Law No. 18 of 1974 which was amended by Law 51 of 1979, to be applied on the informatics juvenile delinquency in the absence of specialized judicial bodies concerned with juvenile cases.


Artificial intelligence review:
Research summary
تناقش الورقة البحثية موضوع عدم ملائمة قانون الأحداث السوري رقم 18 لعام 1974 المعدل بالقانون رقم 51 لعام 1979 للتعامل مع انحراف الأحداث في مجال المعلوماتية. تبرز الورقة أن فئة الشباب والمراهقين والأطفال هم الأكثر استخداماً لتقنية الحاسوب والإنترنت، مما أدى إلى ظهور جرائم معلوماتية يرتكبها الأحداث. تتناول الورقة التحديات التي تواجه تطبيق قانون الأحداث السوري على هذه الجرائم، مشيرة إلى غياب التخصص لدى الهيئات القضائية المختصة بقضايا الأحداث. كما تستعرض الورقة سمات الجريمة المعلوماتية ومرتكبيها، وتناقش مدى ملائمة القانون السوري الحالي للتصدي لهذه الجرائم. تقدم الورقة مقترحات لتحسين الوضع القانوني، منها إصدار قانون جديد للأحداث يتلاءم مع التغيرات التقنية، وإنشاء وحدات أمنية وقضائية متخصصة في الجرائم الرقمية، وتكوين كوادر مؤهلة للتعامل مع هذه الجرائم.
Critical review
تعد الورقة البحثية شاملة في تناولها لموضوع انحراف الأحداث المعلوماتي ومدى ملائمة قانون الأحداث السوري للتعامل معه. ومع ذلك، يمكن الإشارة إلى بعض النقاط التي قد تحتاج إلى مزيد من التوضيح أو التحسين. أولاً، كان من الممكن أن تقدم الورقة أمثلة عملية أو دراسات حالة توضح كيفية تطبيق القانون الحالي على جرائم معلوماتية محددة. ثانياً، بينما تقدم الورقة مقترحات مفيدة لتحسين الوضع القانوني، فإنها لم تتناول بشكل كافٍ كيفية تنفيذ هذه المقترحات في الواقع العملي، خاصة في ظل الظروف الراهنة التي تمر بها سوريا. ثالثاً، كان من الممكن أن تستفيد الورقة من مقارنة قانون الأحداث السوري مع قوانين مشابهة في دول أخرى لمزيد من الاستفادة من التجارب الدولية في هذا المجال.
Questions related to the research
  1. ما هي الجرائم المعلوماتية التي يرتكبها الأحداث؟

    تشمل الجرائم المعلوماتية التي يرتكبها الأحداث القدح والذم، الحض على الفجور والدعارة، الاحتيال، وسرقة بطاقات الائتمان.

  2. ما هي التحديات التي تواجه تطبيق قانون الأحداث السوري على الجرائم المعلوماتية؟

    تشمل التحديات غياب التخصص لدى الهيئات القضائية المختصة بقضايا الأحداث، وعدم ملائمة النصوص القانونية التقليدية للتعامل مع الجرائم المعلوماتية، وصعوبة اكتشاف وإثبات هذه الجرائم.

  3. ما هي مقترحات الورقة لتحسين الوضع القانوني للتعامل مع انحراف الأحداث المعلوماتي؟

    تقترح الورقة إصدار قانون جديد للأحداث يتلاءم مع التغيرات التقنية، وإنشاء وحدات أمنية وقضائية متخصصة في الجرائم الرقمية، وتكوين كوادر مؤهلة للتعامل مع هذه الجرائم.

  4. كيف يمكن تعريف الجريمة المعلوماتية وفقاً للورقة البحثية؟

    تعرف الجريمة المعلوماتية بأنها مجموعة من الأفعال غير المشروعة التي ينص المشرع على تجريمها، والتي تتعلق بالمعالجة الإلكترونية للمعلومات أو نقلها.


References used
Abo Alhajaj, 2010, The Most Famous Computer and Internet Crimes, first Edition, Dar Alkitab Alarabi, Syria- Damascus, pages 244
Abo Alkhir, Taha and Asra, Moneer, 1961 Juvenile Delinquency in the Arab and comparative Legislation and inّ Education and Psychology, Alma’aref in Alexandria, pages 554
Ahmad, Hilali Abedalelah, 2007Cybercrimes Crossed Border (methods of confrontation according to Budapest convention), Dar Alnahda Alarabiya, Egypt Cairo. Pages 206
rate research

Read More

Social welfare and tranquility in any society is connected with the extent to which the society provides care and attention to solve the problem of juvenile delinquents. This is because the problem of juvenile delinquency is one of the most important and complex social problems facing all societies in the contemporary world, those developed or developing. This era is witnessing a growing increase in juvenile delinquency, which is considered a loss to human development from an economic and social perspective. It's "forces unable to work and produce, corrupting an aspect of the lives of the families and societies. Scientific research has pointed out that crime is most common among young adults and that most adult criminals started their criminal lives since adolescence, where it has been noticed that 60% of the criminals committed crimes before they were sixteen years old (Shafiq, 1996, P. 365). Theoretically speaking, the social welfare institutions are considered the institutional shelter for individuals damaged by family and social circumstances, regardless of the extent or intensity of this damage. By vocational intervention we mean programs offered in the institutes to protect juvenile delinquents who have been damaged by social or psychological circumstances, and rehabilitate them.
Law is a social phenomenon that is subject to the law of the purpose of ensuring better conditions of life for the community. The life of the law are found in its application in practice, and the rules of the rent law considered relevant by the co mmunity. For this research included comments on the most important new rent law No. 20 dated 11/11/2015 materials to shed light on their compatibility with the principles and objectives of the law and therefore suitability for the community.
This study aims to specify the states that people prevented from witness in The Syrian Evidence Law, and to clarify the states that include the reason of prevention but they are not mentioned in law. Besides jurisprudence in this field.
In fact, the modern stage is one of the most important stages throughout the human as it is during this phase is determined by effervescence personal inclinations and selfcomposed and culture and highlight the social relations on the yard of his li fe. Child today is a man of tomorrow. And if they hauled him protection and affection, and security and care and free upbringing innate or acquired, and we have provided to him for safe living, including food and clothing and health condition-free organic diseases and psychiatric we were able to build a new man with a social tendencies is hostile against the other or against society and we stepped away from him through the deviation. The Syrian Juveniles Act launched in the event of the arrest of the principle of the benefit of the event, and did not set conditions and special controls limit the power of the judge to appreciate this interest, and authorized the detention for all events, regardless of the crime committed. Fearing the possibility of the occurrence of any abuse by the judge, on the basis of legal logic, should put special conditions arrest event and determine the scope and restricted to juveniles who have completed fifteen, when committed a felony and clear-cut enough of primary significance to condemn the event. As it is unreasonable to make such a restraining order against the dangerous and the rest of the events action, while it does not apply to them any penalty involving freedom, but apply to them reform measures provided for in Article IV of the Juvenile Delinquents Act. And must seek out an educational character of alternative measures and reform, would replace the detention and arrest.
Fully understanding narratives often requires identifying events in the context of whole documents and modeling the event relations. However, document-level event extraction is a challenging task as it requires the extraction of event and entity core ference, and capturing arguments that span across different sentences. Existing works on event extraction usually confine on extracting events from single sentences, which fail to capture the relationships between the event mentions at the scale of a document, as well as the event arguments that appear in a different sentence than the event trigger. In this paper, we propose an end-to-end model leveraging Deep Value Networks (DVN), a structured prediction algorithm, to efficiently capture cross-event dependencies for document-level event extraction. Experimental results show that our approach achieves comparable performance to CRF-based models on ACE05, while enjoys significantly higher computational efficiency.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا