The Legal Framework of Electronic Data Crimes
Abdel-Rahman, K. H. (1992). The legal protection of logical entities (information programs) (Unpublished doctoral thesis) (p.60). Faculty of Law, University of Ain Shams, Cairo.
Abdullah, K. O. (1942). The criminal protection of private life and data banks (p.48). ED3, Al Nahda Al Arabyeh, Cairo.
Ahmed, H. A. E. (1997). Witness commitment in the media of electronic data crimes: A comparative study (p.66). Dar Al Nahda Al Arabeyah, Cairo.
Al Cheniqi, A. R. (1993). Security confrontation of computer crimes. Life and Security Magazine, 11(129), p.46.
Al Kareeb, I. N. (1994). The security of computer and law (p.81). Dar Alratib Al Jameiyah, Beirut.
Al kbasi, A. S. (1999). Criminal liability from the use of computer, al maiedah al hurrah series (p.127). The Seminar of Law and Computer, bayt al hekmah.
Al Khater, S. H. (1999). Contracts guarantees for the transfer of information. Journal of Law, 3(3), 121.
Al Saqeer, J. A. B. (2001). Criminal confrontation to paid television programs piracy (p.11). Dar Al Nahda Al Arabeyah, Cairo.
Al-Faruq Al-Husseini, O. (1995). The important problems in computer-related crimes and international dimensions (2nd ed.) (p.127). Cairo.
Almnaash, O. A., et al. (1992). Computer crimes and Internet (p.72). Computer crimes in the comparison legislation.
Alois, M. (1983). The impact of technological development on public freedoms (p.46). Al Maarif Institution, Alexandria.
Al-Shawa, M. S. (1994). Information revolution and their reflection to the penal code (p.173). Dar Al Nahdah Al Arabia, Cairo.
Awad, M. M. (1993). Contemporary criminal policy problems in information systems crimes (p.6). Paper submitted by Sixth Conference of the Egyptian Criminal Law, Cairo.
Bakri, S. H. (1990). Networks and employment information against crime. Arab Journal for Security Studies and Training, 6(11), p.210.
Baqi, J. A. (1992). Criminal law and modern technology (p.16). Dar al nahdah al arabeyah, Cairo.
Ismail, R. (1999). The preventive of crimes which are arising from the use of computer. Islamic Economics Journal, (219), 34.
Jameel, A. B. (1999). Internet, and criminal law, the subjective rules of crimes which belong to the Internet (p.177). Dar Al Nahda Al Arabeyah, Cairo.
Kashoosh, & Hamid, H. (1992). Computer crimes in the comparison legislation (p.1). Dar Al Nahda Al Arabeyah, Cairo.
Muti kayal, M. S. A.. (1998). The Internet and some of the legal aspects (p.12). Dar Al Nahda library, Cairo.
Ramadan, M. A. H. (2001). The criminal protection of electronic commerce: A comparative study (p.35). Dar Al Nahda Al arabeyah, Cairo.
Rustam, H. M. F. (1992). The penal code and the risks of information technology (p.24). AL Allat Al Hadeetha Library, Assiut.
Rustom, H. (1999). The technical origins of the criminal investigation. Journal of Security and Law, (2), 110.
Sageer, J. A. B. (2001). The procedural aspects of crimes, related to the Internet (p.4). Dar Al Nahdah Al Arabeyah, Cairo.
Shamboor, T., et al. (1993). Banking secrecy (p.82). Research and discussions of the seminar organized by the Federation of Arab banks, Lebanon.
Shuqayr, R. S. (1997). Computer data attacking crimes. (Unpublished master’s thesis) (p.10). Faculty of Law, University of Mosul.
- There are currently no refbacks.
If you have already registered in Journal A and plan to submit article(s) to Journal B, please click the CATEGORIES, or JOURNALS A-Z on the right side of the "HOME".
We only use three mailboxes as follows to deal with issues about paper acceptance, payment and submission of electronic versions of our journals to databases: firstname.lastname@example.org; email@example.com; firstname.lastname@example.org
Copyright © Canadian Academy of Oriental and Occidental Culture
Address: 730, 77e AV, Laval, Quebec, H7V 4A8, Canada
Telephone: 1-514-558 6138