Please use this identifier to cite or link to this item: http://studentrepo.iium.edu.my/handle/123456789/1461
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRjoub, Feras Khaled Alabdallahen_US
dc.date.accessioned2020-08-20T08:42:50Z-
dc.date.available2020-08-20T08:42:50Z-
dc.date.issued2012-
dc.identifier.urihttp://studentrepo.iium.edu.my/jspui/handle/123456789/1461-
dc.description.abstractCybercrimes are an ever growing threat to both states and many persons throughout the globe. Cybercrimes offenders had even intruded governmental websites. Members of communities are no less at risk too from these sorts of crimes perpetrated on them knowingly or unknowingly. Things like Malwares, spywares, spamming, phishing, viruses such as Trojan, Worms etc. have continuously affected computer and internet users financially, personally, and professionally. Computers and internet users’ privacy, confidentiality, security etc. are compromised. Their data and communications are compromised without their consent. By so doing, unwittingly or wittingly, those who do them commit offences that do not just fall foul under the Computer Crimes Act, but also under other Acts governing a person’s personal data (Personal Data Protection Act), internet usage (Multimedia and Communication Act), personal account (Banking and financial Institution Act) and perhaps many more. This thesis revolves around the various issues faced by the Jordanian legal system in the investigation and prosecution of cybercrimes who is currently addressing them through her the traditional criminal laws i.e. the Penal Code. Developed countries have been very conscious of this matter over the past years. Several agreements have taken place through international treaties, and specific laws were formulated for these types of crimes. This lead to the facilitation of professionally held investigations, as well as prosecutions, in a more legally systematic manner, which in turn resulted in a better degree of control over cybercrimes. England and her former Commonwealth countries such Australia and even Malaysia already have several cybercrime laws. Considering how wide-spread cybercrime has become, serious questions must be raised whether the current Jordanian traditional criminal laws can stand up against the threat by the cybercrimes perpetrators. Does Jordan have the necessary substantive laws on computer crimes to deal with cybercrimes, and the necessary procedural and evidential laws to complement the computer crimes law? Malaysia has adopted a specific set of laws in order to exclusively address the issue of cybercrime including the necessary provisions in her Criminal Procedure Code (Act 593) and the Evidence Act 1950 to complement her cybercrime laws. Malaysia’s Computer Crimes Act of 1997 could be an ideal model for Jordan who has yet to have one. A comparative analysis will be carried out between the Malaysian and Jordanian legal systems, with regards to their investigations and prosecutions of cybercrimes, and their procedural and evidential matters such as proof and punishment.en_US
dc.language.isoenen_US
dc.publisherKuala Lumpur : Ahmad Ibrahim Kulliyyah of Laws, International Islamic University Malaysia, 2012en_US
dc.rightsCopyright International Islamic University Malaysia
dc.subject.lcshComputer crimes--Malaysiaen_US
dc.subject.lcshComputer crimes--Jordanen_US
dc.subject.lcshComputers--Law and legislation--Malaysiaen_US
dc.subject.lcshComputers--Law and legislation--Jordanen_US
dc.titleCybercrime in the Jordanian and Malaysian legal systems: criminal procedures and evidenceen_US
dc.typeDoctoral Thesisen_US
dc.identifier.urlhttps://lib.iium.edu.my/mom/services/mom/document/getFile/w3j1PLdVWNzcgAaN65Jvt2HGelKfhoUl20130919121558581-
dc.description.identityt00011276940FerasKhaleden_US
dc.description.identifierThesis : Cybercrime in the Jordanian and Malaysian legal systems: criminal procedures and evidence /by Feras Khaled Alabdallah Rjouben_US
dc.description.kulliyahAhmad Ibrahim Kulliyyah of Lawsen_US
dc.description.programmeDoctor of Philosophy in Lawen_US
dc.description.degreelevelDoctoral
dc.description.callnumbert KPG 80 C65 R627C 2012en_US
dc.description.notesThesis (Ph.D)--International Islamic University Malaysia, 2012en_US
dc.description.physicaldescriptionxiii, 264 leaves : ill. ; 30cm.en_US
dc.subject.icsiHarmonisation of Shari'ah and lawen_US
item.openairetypeDoctoral Thesis-
item.grantfulltextopen-
item.fulltextWith Fulltext-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
Appears in Collections:AIKOL Thesis
Files in This Item:
File Description SizeFormat 
t00011276940FerasKhaled_SEC_24.pdf24 pages file567.64 kBAdobe PDFView/Open
t00011276940FerasKhaled_SEC.pdf
  Restricted Access
Full text secured file1.46 MBAdobe PDFView/Open    Request a copy
Show simple item record

Page view(s)

30
checked on May 17, 2021

Download(s)

60
checked on May 17, 2021

Google ScholarTM

Check


Items in this repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please give due acknowledgement and credits to the original authors and IIUM where applicable. No items shall be used for commercialization purposes except with written consent from the author.