Do you want to publish a course? Click here

مدى فاعلية تجريم الدخول غير المشروع لنظام الحاسب الآلي في القانون السوري

1120   0   0   0 ( 0 )
 Publication date 2018
  fields Law
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

The research reviewed the Syrian project plan in criminalizing illegal entry, where it addressed first the jurisprudential conflict over the importance of criminalization illegal entry and the justification for this criminalization.

References used
Ibrahim, Khaled, 2009, IT crimes, University Thought House
Alkhn, Mohamed Tarek, 2012 Information crime, Syrian Virtual University
Al shawwa, Mohamed Sami,2003, Information revolution and its impact on the Penal Code, Egyptian General Book Authority
rate research

Read More

استعرض البحث التعريف بالاستخدام غير المشروع لنظام الحاسوب و طبيعته القانونية، تم تناول إمكانية تجريم هذا الاستخدام بموجب نصوص قانون العقوبات الحالية المتعلقة بالسرقة و الاحتيال و خيانة الأمانة و إخفاء الأشياء. و خلص من حيث النتيجة إلى أن هذه النصوص ل ا تنطبق على الاستخدام غير المشروع لنظام الحاسوب، و ينبغي أن يتدخل المشرع لسد هذا النقص التشريعي.
The unlawful income is that of constitutes a violation of law, public order and morals. Presently, it is numerous and various. What increases its importance is that it has not been enacted by Law whether in the Syrian law of income tax or in the l aws in comparison. Therefore, the door is open before jurisprudence and judgment to have theirown say.
This research is a step to show the eligibility of computer programs to have patents, and provide the required legal protection, hoping it may be a bright spot among favors provided by the people of this country.
Computer crimes are Intelligent crimes committed in secret. The offender has a high level of technical expertise, and the main objective is to undermine the owners of the programs and information and their rights, whether natural or legal persons, and may extend to include the state and its secrets. The multiplicity of these crimes makes it difficult to detect, and pursue the offender, because they do not leave any trace behind. This makes it more difficult to prove and investigate.
Intellectual property laws regulate and protect the rights arising from the design of computer programs and its production along with its special legislation. Thus, the attack on these programs pose a threat to those rights, which its owners did t heir best to produce and benefit their communities. The crime of damaging programs and information is an IT crime considered as a serious attacks mainly on information property. However it's different in the case of damaging crime, as it is not aimed at the enrichment at the expense of others, nor get the programs of others illegally, but targets only damage, destruction and vandalism to others property information without any enrichment.

suggested questions

comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا