The Role of Jordanian Legislation in Countering Cybercrime and its Impact on Library Information Security
Keywords:
Cybercrime, library information security, technical meansAbstract
The aim of this study was to identify the impact of electronic crimes on the information security in libraries, and to determine the adequacy of national legislation to confront and combat electronic crimes that threaten the information security in libraries and constitute a violation of it.the researcher used the analytical approach by analyzing the legal texts in the legislation and indicating the adequacy of their shortcomings, and the comparative descriptive approach through the legal description of electronic crimes and their impact on the information security of libraries in Jordanian legislation. The study reached a set of conclusions and recommendations, the most important of which was that information and data in libraries are threatened by risks generated by the technological revolution, and they need technical and legal means of protection at the same time to face their risks, and the need remains urgent to develop special texts for the law of electronic crimes that deal with this type of crime in detail and commensurate with the enormous development in the field of technological means, due to the lack of provisions of the law of electronic crimes related to the protection of information security of libraries in particular. The study recommended the need for international cooperation in combating cybercrime by holding conferences, exchanging experiences and concluding agreements.
Downloads
References
Al Adwan, M., & Alsalamat, N. (2016). The legality and authenticity of the evidence extracted from the electronic inspection in the Jordanian penal legislation. Dirasat: Shari’a and Law Sciences, 45(4). Retrieved from https://archives.ju.edu.jo/index.php/law/article/view/13887
Abdelbaqi, M. (2016). Investigating and proving cybercrime in Palestine: a comparative study. Dirasat: Shari’a and Law Sciences, 45(4). Retrieved from https://archives.ju.edu.jo/index.php/law/article/view/14120
McGraw,G., and Morriset, G. (2000). Attacking malicious code, a report to the infosec research council submitted IEEE software and presen-ted to the IRC,USA.
Arhumah, M. (2009). Procedural problems raised by transnational cybercrime, first Maghreb conference on informatics and Law, Academy of higher studies, Tripoli.
Al-Safo, N. (2014). Studies in comparative criminal law - the crime of disturbing public morals by means of Information Technology. Alexandria: new university House.
Almaini, S. (2011). Investigation of Information Technology crimes, police thought journal, Sharjah, 4.
Alolama’, M. (2004). Cybercrime and accounting, law, computer and Internet Conference, United Arab Emirates University-Faculty of Sharia and law.
Al-Hamoud, P. (2007). Globalization of economic crime, Naif Arab University for Security Sciences, Riyadh, Saudi Arabia.
Al-shawabkeh, M. (2011). Computer and Internet Crime-Information crime. Amman, Jordan: House of culture for publishing and distribution.
Al-kabji, B. (2013). Compliance of the provisions of Information Systems crimes in Jordanian law with the general provisions of the crime, master thesis, Middle East University, Amman.
Al-Akili, H., and Zubon, B. (2017). Information security and its applications in the Departments of Information Science and libraries, Jordanian Journal of libraries and information, 52(1).
Momani, N. (2008). Information crimes. (1st ed.). Jordan: House of culture for publishing and distribution.
Al-Afifi, J. (2013). Cybercrime in Palestinian legislation "comparative analytical study", master thesis, Islamic University, Gaza, Palestine.
Hosni, M. (1989). Explanation of the Penal Code-General section. Cairo, Egypt: Arab renaissance House.
David, H. (2004). Information network security. (1st ed.). Riyadh: General Directorate of printing and publishing.
Serihi, H. (2001). Electronic publishing: a study of the most important issues related to library and information science, recent trends in libraries and Information, 17.
Hassan, A. (2015). UAE legislator's policy to counter cybercrime, police thought, Sharjah, UAE, 24(95).
Ibrahim, K. (2009). Information crimes. (1st ed.). Alexandria: University think tank.
Saqf Alhaet, P. (2015). Crimes of slander, slander and contempt arranged through electronic media "comparative study". (2nd ed.). Amman: House of culture for publishing and distribution.
Khalid, F. (2017). Information security policy in libraries and information centers, Jordanian Journal of libraries and information, 52(4).
Elginbehy, M. and Elginbehy, M. (2006). Electronic information security. Egypt: Dar Alfikr.
Najam, P. (2000). Explanation of the Penal Code (General section-general theory of crime). (4th ed.). Amman, Jordan: House of culture for publishing and distribution.
Yousuf, H. (2011). The crime of honey money over internet networks and web banks. (1st ed.). Cairo: National Center for legal publications.
The Jordanian Penal Code No. 16 of 1961.
Jordanian code of Criminal Procedure No. 9 of 1961.
Jordanian Telecommunications Law No. 13 of 1995, as amended.
The publications and Publications Law, as amended No. 8 of 1998.
Egyptian Penal Code No. 58 of 1937.
Jordanian Cybercrime Law No. 27 of 2015.
UAE guiding law to Combat Information Technology Crimes.
Website of the Ministry of Justice of the United Arab Emirates, http://www.elaws.gov.ae .
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.


