الملخص
یوصف العصر الذی نعیشه بعصر الثورة المعلوماتیة ، عصر معالجة ونقل المعلومات التی غدت المحدد الاستراتیجی للبناء الثقافی والانجاز الاقتصادی ،واذ کان خطر میلاد تقنیة المعلومات ونمائها قد اظهر فی البدایات اکتشاف وتطور وسائل التقنیة العالیة المتمثلة بالحاسوب ووسائل الاتصال المستقلة عن بعضها البعض ، فان قطاعات التقنیة قد تداخلت وتحقق الدمج المعقد بین الحاسبات الالیة ووسائل الاتصال وبرز فی فضاء التقنیة من بین وسائلها الکثیرة الحاسوب کاداة للتحکم فی المعلومات وتجمیعها ومعالجتها واختزانها ،واسترجاعها فی کافة مجالات النشاط الانسانی وظاهرة سرقة المعلومات ، ظاهرة اجرامیة مستحدثة تقرع فی جنباتها اجراس الخطر لتنبه مجتمعات العصر الراهن لحجم المخاطر وفداحة الخسائر الناجمة عنها ، فهی جریمة تقنیة تنشأ فی الخفاء ویقترفها مجرمون اذکیاء یمتلکون ادوات المعرفة یوجهون نشاطهم نحو الاعتداء فی الحق على المعلومات المعالجة الیاً سواء کانت مخزنة او منقولة عبر نظم شبکة المعلومات
الكلمات الرئيسة
الموضوعات
أصل المقالة
جریمة سرقة المعلومات المعالجة آلیا -(*)-
The crime of stealing information processed automatically
محمد حسین الحمدانی کلیة الحقوق/ جامعة الموصل Mohammad Hosain AlHamdany College of law / University of Mosul Correspondence: Mohammad Hosain AlHamdany E-mail: |
(*) أستلم البحث فی 5/2/2005 *** قبل للنشر فی 23/2/2005.
(*) Received on 5/2/2005 *** accepted for publishing on 23/2/2005.
Doi: 10.33899/alaw.2011.160585
© Authors, 2011, College of Law, University of Mosul This is an open access articl under the CC BY 4.0 license
(http://creativecommons.org/licenses/by/4.0).
الملخص
یوصف العصر الذی نعیشه بعصر الثورة المعلوماتیة ، عصر معالجة ونقل المعلومات التی غدت المحدد الاستراتیجی للبناء الثقافی والانجاز الاقتصادی ،واذ کان خطر میلاد تقنیة المعلومات ونمائها قد اظهر فی البدایات اکتشاف وتطور وسائل التقنیة العالیة المتمثلة بالحاسوب ووسائل الاتصال المستقلة عن بعضها البعض ، فان قطاعات التقنیة قد تداخلت وتحقق الدمج المعقد بین الحاسبات الالیة ووسائل الاتصال وبرز فی فضاء التقنیة من بین وسائلها الکثیرة الحاسوب کاداة للتحکم فی المعلومات وتجمیعها ومعالجتها واختزانها ،واسترجاعها فی کافة مجالات النشاط الانسانی وظاهرة سرقة المعلومات ، ظاهرة اجرامیة مستحدثة تقرع فی جنباتها اجراس الخطر لتنبه مجتمعات العصر الراهن لحجم المخاطر وفداحة الخسائر الناجمة عنها ، فهی جریمة تقنیة تنشأ فی الخفاء ویقترفها مجرمون اذکیاء یمتلکون ادوات المعرفة یوجهون نشاطهم نحو الاعتداء فی الحق على المعلومات المعالجة الیاً سواء کانت مخزنة او منقولة عبر نظم شبکة المعلومات
الکلمات الرئیسة: جریمة السرقة المعلوماتیة المعالجة آلیا
الموضوعات: القانون الجنائی
Abstract
The era of the information revolution is characterized by the era of information processing and transfer, which has become the strategic determinant of cultural construction and economic achievement. While the danger of the birth and development of information technology has shown in the beginning the discovery and development of the high-tech means of computer and communication means independent of each other, The complex integration between computers and communication means has emerged and has emerged in the technical space among its many means of computer as a tool for information control, collection, processing and storage, and retrieval in all areas of human activity and the phenomenon of theft of Information is a modern criminal phenomenon that rings alarm bells to alert the societies of the present age to the magnitude of the risks and the magnitude of the losses resulting from them. It is a technical crime that is created in secret and committed by intelligent criminals who possess the tools of knowledge directing their activity towards aggression against the right to processed information, whether stored or transmitted through systems Information Network
Keywords: The crime of theft informatics Automated processing
Main Subjects: Criminal Law
The Author declare That there is no conflict of interest
References (Arabic Translated to English)
First - Books:
1- Ahmed Hussam Taha, Crimes arising from the use of computers, Arab Renaissance House, Cairo, 2002
2 - Bill Gates, (Informatics after the Internet - the way of the future), translated by Abdul Salam Radwan, World of Knowledge, Kuwait, 1980
3 - Jamil Abdul Baqi Al-Saghir, Crimes arising from the use of computers, - I 1, Dar Al-Nahda Al-Arabiya, Cairo, 1992.
4 - Hosni Mustafa, theft crimes, the emergence of knowledge, Alexandria, 1987
5. Ramses Behnam, Penal Code - Special Section, I 1, El Maaref Establishment, Alexandria, 1999
6. Raouf Obeid, Crimes of Assault on Money and Persons, Arab Renaissance House, Cairo, 1985.
Richard Rosenberg, The Social Impact of Computers. Sorour Ali Ibrahim, Al-Mareekh Publishing House, Riyadh, 2000.
8 - Tarek Sorour, subjective crimes of electronic media, I 1, the Arab Renaissance House, Cairo, 2001.
9- Abdel Fattah Bayoumi Hegazy, Criminal Protection of the Electronic Commerce System, Dar Al-Fikr Al-Jama'i, Alexandria, 2001
10۔ Abdel Fattah Mustafa Saifi, Lebanese Penal Code - Crimes of Assault on State Security and Money, Dar al-Nahda al-Arabiya, Beirut, 1972.
11. Abdullah Hussein Ali, Theft of information stored in the computer, i 3, Dar Arab Renaissance, Cairo, 2004.
12۔ Abdul-Muhaimen Bakr, Special Section in the Penal Code - Crimes of Assault on Persons and Money, Dar Al-Nahda Al-Arabiya, Cairo, 1970.
13- Ali Abdul Qader Al-Qahwaji, Criminal Protection of Computer Programs, University Press, Cairo, 1997
14. Omar Al-Sa'id Ramadan, Explanation of the Penal Code, Special Section, Dar Al-Nahda Al-Arabiya, Cairo, 1977; Reflections on some forms of criminal protection of computer programs, Kuwait Foundation Publications, 1994; D, Cairo, 1995
15- Omar Al-Waqqad, Information Crimes, University Press, Alexandria, 1997
16- Fattouh Abdullah Al-Shazli, Crimes of Assault on Persons and Money, Dar Al-Nahda Al-Arabiya, Cairo, 2002.
17- Mohamed Amin El-Roumi, Computer Crimes and the Internet, University Press, Alexandria, 2004
18- Mohammad Sami Al-Shawa, Legal Protection of Logical Entities, Vol. 2, Dar Al-Nahda Al-Arabiya, Cairo, 1994;
19- Mohamed Ali El-Erian, Information Crimes, New University House, Cairo, 2004.
20- Mohammad Farid Rustom, Penal Code and Information Technology Risks, 1st Floor, Office of Modern Machines, Assiut, 1992.
21- Mohamed Mohamed Sheta, The idea of criminal protection of computer programs, I 1, New University House, Alexandria, 2001.
22- Medhat Ramadan, General Provisions of Criminal Law and Cybercrime, Cairo University Press, 1998
23- Huda Kashkosh, Computer Crimes in Comparative Legislation, Dar Al-Nahda Al-Arabiya, Cairo, 1992.
Second . Messages :
24- Ahmad Kailan, Emerging Crimes when Using Computer, Master Thesis submitted to the Council of the College of Law, University of Baghdad, 2002
25- Bilal Ayoub Hussein, Internet Data Protection Procedures, Higher Diploma Thesis, Institute of Graduate Studies in Computer and Informatics, Baghdad, 1999
Research
26. Abdul-Sattar al-Kubaisi, Criminal Responsibility arising from the Use of Computer.
27. Ghannam Mohammed Ghannam, Inadequacy of Traditional Rules in the Penal Code to Combat Computer Crimes, Paper presented to the Conference of Law, Computer and Internet, College of Sharia and Law, United Arab Emirates, 2000.
28- Kamel Hamed Al-Saeed, Computer and Computer Crimes and Other Crimes in the Field of Technology, Paper presented to Bahrain Scientific Conference on Computer Crimes, 2000.
29- Walid Abdel-Hay, The Problem of Electronic Justice in Intellectual Property Rights, First Scientific Conference on Property held at the Faculty of Law, Yarmouk University, Jordan, 2000.
Fourth: Laws:
30. The Egyptian Penal Code No. (58) of 1937, as amended
31. The Iraqi Penal Code No. (111) of 1969, as amended.
32. The Egyptian Copyright Protection Act No. 38 of 1992, as amended.
33. Jordanian Copyright Protection Law No. 22 of 1992.