Cybercrime in the Jordanian and Malaysian legal systems: criminal procedures and evidence /
Cybercrimes are an ever growing threat to both states and many persons throughout the globe. Cybercrimes offenders had even intruded governmental websites. Members of communities are no less at risk too from these sorts of crimes perpetrated on them knowingly or unknowingly. Things like Malwares, sp...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
Kuala Lumpur:
Ahmad Ibrahim Kulliyyah of Laws, International Islamic University Malaysia, 2012.
2012
|
Subjects: | |
Online Access: | http://studentrepo.iium.edu.my/handle/123456789/1461 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 045360000a22003610004500 | ||
---|---|---|---|
008 | 130114t2012 my a g m 000 0 eng d | ||
040 | |a UIAM |b eng | ||
041 | |a eng | ||
043 | |a a-my--- | ||
050 | |a KPG80.C65 | ||
100 | 1 | |a Rjoub, Feras Khaled Alabdallah | |
245 | 1 | |a Cybercrime in the Jordanian and Malaysian legal systems: |b criminal procedures and evidence / |c by Feras Khaled Alabdallah Rjoub | |
260 | |a Kuala Lumpur: |b Ahmad Ibrahim Kulliyyah of Laws, International Islamic University Malaysia, 2012. |c 2012 | ||
300 | |a xiii, 264 leaves : |b ill. ; |c 30cm. | ||
500 | |a Abstract in English and Arabic. | ||
500 | |a "A thesis submitted in fulfilment of the requirement for the degree of Doctor of Philosophy in Law."--On t.p. | ||
502 | |a Thesis (Ph.D)--International Islamic University Malaysia, 2012. | ||
504 | |a Includes bibliographical references (leaves 254-262). | ||
520 | |a Cybercrimes are an ever growing threat to both states and many persons throughout the globe. Cybercrimes offenders had even intruded governmental websites. Members of communities are no less at risk too from these sorts of crimes perpetrated on them knowingly or unknowingly. Things like Malwares, spywares, spamming, phishing, viruses such as Trojan, Worms etc. have continuously affected computer and internet users financially, personally, and professionally. Computers and internet users' privacy, confidentiality, security etc. are compromised. Their data and communications are compromised without their consent. By so doing, unwittingly or wittingly, those who do them commit offences that do not just fall foul under the Computer Crimes Act, but also under other Acts governing a person's personal data (Personal Data Protection Act), internet usage (Multimedia and Communication Act), personal account (Banking and financial Institution Act) and perhaps many more. This thesis revolves around the various issues faced by the Jordanian legal system in the investigation and prosecution of cybercrimes who is currently addressing them through her the traditional criminal laws i.e. the Penal Code. Developed countries have been very conscious of this matter over the past years. Several agreements have taken place through international treaties, and specific laws were formulated for these types of crimes. This lead to the facilitation of professionally held investigations, as well as prosecutions, in a more legally systematic manner, which in turn resulted in a better degree of control over cybercrimes. England and her former Commonwealth countries such Australia and even Malaysia already have several cybercrime laws. Considering how wide-spread cybercrime has become, serious questions must be raised whether the current Jordanian traditional criminal laws can stand up against the threat by the cybercrimes perpetrators. Does Jordan have the necessary substantive laws on computer crimes to deal with cybercrimes, and the necessary procedural and evidential laws to complement the computer crimes law? Malaysia has adopted a specific set of laws in order to exclusively address the issue of cybercrime including the necessary provisions in her Criminal Procedure Code (Act 593) and the Evidence Act 1950 to complement her cybercrime laws. Malaysia's Computer Crimes Act of 1997 could be an ideal model for Jordan who has yet to have one. A comparative analysis will be carried out between the Malaysian and Jordanian legal systems, with regards to their investigations and prosecutions of cybercrimes, and their procedural and evidential matters such as proof and punishment. | ||
596 | |a 1 | ||
650 | |a Computer crimes |z Malaysia | ||
650 | |a Computer crimes |z Jordan | ||
650 | |a Computers |x Law and legislation |z Malaysia | ||
650 | |a Computers |x Law and legislation |z Jordan | ||
655 | 7 | |a Theses, IIUM local | |
690 | |a Dissertations, Academic |x Ahmad Ibrahim Kulliyyah of Laws |z IIUM | ||
710 | 2 | |a International Islamic University Malaysia. |b Ahmad Ibrahim Kulliyyah of Laws | |
856 | 4 | |u http://studentrepo.iium.edu.my/handle/123456789/1461 | |
900 | |a hab-zhmn | ||
999 | |c 436848 |c 436848 |d 468705 |d 468705 | ||
999 | |c 436848 |c 436848 |d 468705 |d 468705 | ||
952 | |0 0 |6 T KPG 000080 C000065 R000627C 002012 |7 0 |8 THESES |9 758502 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o t KPG 80 C65 R627C 2012 |p 00011276940 |r 2017-10-20 |t 1 |v 0.00 |y THESIS | ||
952 | |0 0 |6 TS CDF KPG 000080 C000065 R000627C 002012 |7 0 |8 THESES |9 850163 |a IIUM |b IIUM |c MULTIMEDIA |g 0.00 |o ts cdf KPG 80 C65 R627C 2012 |p 00011276939 |r 2017-10-26 |t 1 |v 0.00 |y THESISDIG |