التحقيق في الجرائم المعلوماتية "دراسة تحليلية مقارنة بين القانون الإماراتي والمصري"

The study aimed to assess the effectiveness of the procedural criminal system governing the process of criminal investigation and its methods in the field of cybercrime between UAE and Egypt's laws. It also aimed to clarify the legal procedures for investigating these crimes. The problem add...

Full description

Saved in:
Bibliographic Details
Main Authors: عبد الله حميد راشد الجنيبي, Abdulla Humaid Rashed Alsaedi alJneibi
Format: Thesis
Language:other
Subjects:
Online Access:https://oarep.usim.edu.my/bitstreams/e29fbfed-1201-493d-b0b7-b925e0747984/download
https://oarep.usim.edu.my/bitstreams/93d7102b-b270-44e5-a28f-470e7aa8f8f8/download
https://oarep.usim.edu.my/bitstreams/d678bb31-f8dc-49b3-b738-7317fa3e2530/download
https://oarep.usim.edu.my/bitstreams/62d87b0a-d240-4c2e-bff3-2c586704c30d/download
https://oarep.usim.edu.my/bitstreams/167cb379-68e8-4911-83a7-f76c36925adb/download
https://oarep.usim.edu.my/bitstreams/b1c90bfb-0a8b-44ee-84f3-6cc41045a88a/download
https://oarep.usim.edu.my/bitstreams/05e94e7e-a8cf-42f7-a845-d44dbddf216e/download
https://oarep.usim.edu.my/bitstreams/4650942c-86c3-4b8e-8fe2-4175031ae284/download
https://oarep.usim.edu.my/bitstreams/656bb51c-ef71-44bd-9c61-d8394dbd9deb/download
https://oarep.usim.edu.my/bitstreams/e7f04021-b6a3-4d77-8160-43d183aefd7b/download
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The study aimed to assess the effectiveness of the procedural criminal system governing the process of criminal investigation and its methods in the field of cybercrime between UAE and Egypt's laws. It also aimed to clarify the legal procedures for investigating these crimes. The problem addressed in this study was the emergence of legal and technical challenges in investigating cybercrimes and the extent to which the provisions and rules of the criminal procedural law can be applied to them. Considering that cybercrimes are newly emerging crimes without a specific procedural system for investigation, the study also aimed to highlight the new legal problems arising from the emergence of information technology and its various applications in the field of criminal law. The study followed an analytical and comparative approach between the Federal Criminal Procedures Law of the UAE, issued as Law No. (35) of 1992, with its latest amendments, and the Egyptian Criminal Procedures Law, Law No. 150 of 1950, with its latest amendments. The study concluded that there is a significant similarity between the investigation of cybercrimes and other crimes, as they all require similar general procedures such as inspection, search, surveillance, investigations, and interrogations, in addition to evidence collection and analysis. However, cybercrimes differ from other crimes, and the investigation into the appropriate legal system for their nature primarily aims to determine the legal provisions that should be applied to them, as well as the legal system of responsibility that should be applied to the responsible individuals. The study also highlighted various forms and applications that demonstrate the use of technology in crime prevention, including the use of computers, biometric technologies, digital fingerprints, remote sensing technology, and information surveillance systems. It emphasized the existence of flaws in society's crime protection tools, notably the Criminal Procedures Law, which does not keep pace with many emerging and evolving crimes. The study recommended the necessity of enacting a specific law to combat cybercrimes, expanding the scope of mandatory reporting in cybercrimes, regulating inspection, search, and remote control over the internet, and developing forensic evidence methods in line with scientific facts. It stressed the need for both objective and procedural criminal laws to keep up with the phenomenon of cybercrime due to the clear legislative gaps in providing criminal protection for information privacy. It also proposed the establishment of specialized units within the organizational structure of criminal investigations to deal with cybercrimes, equipped with laboratories and facilities at the highest levels.