Cybercrime in the Jordanian and Malaysian legal systems: criminal procedures and evidence /

Cybercrimes are an ever growing threat to both states and many persons throughout the globe. Cybercrimes offenders had even intruded governmental websites. Members of communities are no less at risk too from these sorts of crimes perpetrated on them knowingly or unknowingly. Things like Malwares, sp...

Full description

Saved in:
Bibliographic Details
Main Author: Rjoub, Feras Khaled Alabdallah
Format: Thesis
Language:English
Published: Kuala Lumpur: Ahmad Ibrahim Kulliyyah of Laws, International Islamic University Malaysia, 2012. 2012
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/1461
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 045360000a22003610004500
008 130114t2012 my a g m 000 0 eng d
040 |a UIAM  |b eng 
041 |a eng 
043 |a a-my--- 
050 |a KPG80.C65 
100 1 |a Rjoub, Feras Khaled Alabdallah 
245 1 |a Cybercrime in the Jordanian and Malaysian legal systems:   |b criminal procedures and evidence /  |c by Feras Khaled Alabdallah Rjoub 
260 |a Kuala Lumpur:   |b Ahmad Ibrahim Kulliyyah of Laws, International Islamic University Malaysia, 2012.   |c 2012 
300 |a xiii, 264 leaves :  |b ill. ;  |c 30cm. 
500 |a Abstract in English and Arabic. 
500 |a "A thesis submitted in fulfilment of the requirement for the degree of Doctor of Philosophy in Law."--On t.p. 
502 |a Thesis (Ph.D)--International Islamic University Malaysia, 2012. 
504 |a Includes bibliographical references (leaves 254-262). 
520 |a Cybercrimes are an ever growing threat to both states and many persons throughout the globe. Cybercrimes offenders had even intruded governmental websites. Members of communities are no less at risk too from these sorts of crimes perpetrated on them knowingly or unknowingly. Things like Malwares, spywares, spamming, phishing, viruses such as Trojan, Worms etc. have continuously affected computer and internet users financially, personally, and professionally. Computers and internet users' privacy, confidentiality, security etc. are compromised. Their data and communications are compromised without their consent. By so doing, unwittingly or wittingly, those who do them commit offences that do not just fall foul under the Computer Crimes Act, but also under other Acts governing a person's personal data (Personal Data Protection Act), internet usage (Multimedia and Communication Act), personal account (Banking and financial Institution Act) and perhaps many more. This thesis revolves around the various issues faced by the Jordanian legal system in the investigation and prosecution of cybercrimes who is currently addressing them through her the traditional criminal laws i.e. the Penal Code. Developed countries have been very conscious of this matter over the past years. Several agreements have taken place through international treaties, and specific laws were formulated for these types of crimes. This lead to the facilitation of professionally held investigations, as well as prosecutions, in a more legally systematic manner, which in turn resulted in a better degree of control over cybercrimes. England and her former Commonwealth countries such Australia and even Malaysia already have several cybercrime laws. Considering how wide-spread cybercrime has become, serious questions must be raised whether the current Jordanian traditional criminal laws can stand up against the threat by the cybercrimes perpetrators. Does Jordan have the necessary substantive laws on computer crimes to deal with cybercrimes, and the necessary procedural and evidential laws to complement the computer crimes law? Malaysia has adopted a specific set of laws in order to exclusively address the issue of cybercrime including the necessary provisions in her Criminal Procedure Code (Act 593) and the Evidence Act 1950 to complement her cybercrime laws. Malaysia's Computer Crimes Act of 1997 could be an ideal model for Jordan who has yet to have one. A comparative analysis will be carried out between the Malaysian and Jordanian legal systems, with regards to their investigations and prosecutions of cybercrimes, and their procedural and evidential matters such as proof and punishment. 
596 |a 1 
650 |a Computer crimes  |z Malaysia 
650 |a Computer crimes  |z Jordan 
650 |a Computers  |x Law and legislation  |z Malaysia 
650 |a Computers  |x Law and legislation  |z Jordan 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Ahmad Ibrahim Kulliyyah of Laws  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Ahmad Ibrahim Kulliyyah of Laws 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/1461 
900 |a hab-zhmn 
999 |c 436848  |c 436848  |d 468705  |d 468705 
999 |c 436848  |c 436848  |d 468705  |d 468705 
952 |0 0  |6 T KPG 000080 C000065 R000627C 002012  |7 0  |8 THESES  |9 758502  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t KPG 80 C65 R627C 2012  |p 00011276940  |r 2017-10-20  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF KPG 000080 C000065 R000627C 002012  |7 0  |8 THESES  |9 850163  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf KPG 80 C65 R627C 2012  |p 00011276939  |r 2017-10-26  |t 1  |v 0.00  |y THESISDIG