1 4 4

:

  1. #1
    Jan 2006
    7,816








    ( IFFC ) 2000 ( ) 6087 5273 814 . 4.6 33% . 22% 5% .

    ( - Cyber Crime ) White Collar ɡ ( ). . - - . .

    ( ) . ( ( ) ( ) . ( )[1] .

    - . 1994 - .











    1- ʿ




    ǡ - [2]- " " [3] . - - [4]. (ߡ - ) ǡ .

    ʡ - - () ( ).

    ( ) [5] Ulrich Sieber [6] . 1994 [7] - : - . .

    .

    " " [8] " " [9] " " [10] " " [11]

    [12] Eslie D. Ball " " Tiedemaun " " " " [13]

    . 1979 " " . David Thompson " " . Stein Schjqlberg " " [14]

    Sheldon. J. Hecht : " " Donn B. Parker Fighting Computer Crime " ʡ " " ".

    OECD " " [15]

    ݡ [16] ǡ .

    () - - .

    ɡ :

    " / " [17]

    1983 ( ) Ulrich Sieher : ǡ ( ). ǡ .

    ѡ ɡ () . Thomas. J. Smedinghoff ( ). " ". ( ) ( ). Robert J. Lindquist Jack Bologna " mens Instrument " .

    Masse ( ) " " [18] .

    Le stanc, Vivant : " ".







    㿿

    () - !.

    . :

    " ( ) ѡ ... ... " [19]

    .

    ɡ . ɡ . () .

    ( ) ( ) .

    ǡ ( ) ( ) .

    : ɡ . ... ɡ ǡ ǡ ɡ .

    ( ) . .

    :-

    1- .

    2- - - . ( ) . . ( ).

    3- .

    4- ( ) .

    5- ( ) . ( )[20] ( ) . ( ) .


  2. #2
    Jan 2006
    7,816



    2-

    :-



    :- (Target of an offense ) .

    ( CONFIDENTIALITY ) ( INTEGRITY ) AVAILABILITY ) ( ) ( UNAUTHORIZED ACCESS ) (HACKING ) .

    . . .

    :- A tool in the commission of a traditional offense

    .



    :- .

    () ( ) ( ) ( ) ( ) .

    .



    3- .



    ɡ ɡ ɡ .

    ǡ ǡ ɡ ( ) ʡ ȡ .

    .



    3-1 .

    :-

    : ȡ ǡ ʡ () . ǡ ǡ ( ).

    : ɡ

    : ( ) .

    ݡ ɡ ޡ ʡ . ȡ ( ) ء .

    ɡ ȡ () . - - ʡ ǡ . ɡ ( ) ɡ .







    3-2 .



    ( ) ( ) . ( ) [21] . 2001 2000 1981 .

    .

    : - ( ) :-

    - ( ) .

    - .

    - .

    - .

    - .

    : : -

    - .

    - .

    : .

    : .



    3-3 .



    1998 Model State Computer Crimes Code - :-

    3-3-1 :-

    :-

    1- Non-***ual Crimes Against Persons Computer Murder Negligent Computer Homicide Soliciting or Encouraging Suicide Intentional Internet Homicide Solicitation Harassment via Computerized Communication Intimidation via Computerized Communication Malicious Infliction of Emotional Distress utilizing Computer Communication Reckless Infliction of Emotional Distress utilizing Computer Communication Stalking Online Voyeurism and Online Voyeurism Disclosure E-mail Bombing Spamming utilizing Computerized Communication Transmission of False Statements ( ) Personal trespass by computer



    2- ***ual Crimes :- Soliciting a Minor with a Computer for Unlawful ***ual Purposes Corrupting a Minor with the use of a Computer for Unlawful ***ual Purposes. Luring or Attempted Luring of a Minor by Computer for Unlawful ***ual Purposes Receiving or Disseminating Information about a Minor by Computer for Unlawful ***ual Purposes ****** ***ually Harassing a minor by use of a Computer for Unlawful ***ual Purposes Posting Obscene Material On The Internet. Posting Or Receiving Obscene Material On The Internet Trafficking In Obscene Material On The Internet Sending Obscene Material To Minors Over The Internet ( ) Indecent Exposure On The Internet Depicting Minors Engaged In ***ually Explicit Conduct--Pandering Obscenity Involving A Minor Using the Internet for Compelling Prostitution Using the Internet for Pimping Using the Internet for Soliciting Using the Internet for Promoting Prostitution Unauthorized Appropriation of Identity, Image, or Likeness for Unlawful ***ual Purposes .



    3-3-2 - Property Damage (Other than Theft) and Crimes Involving Intrusions



    Aggravated Computer Trespass Computer Trespass Disorderly Persons Offense Computer Vandalism Computer Mischief Extortion Creation of Harmful Programs Transmission of Harmful Programs Cybersquatting Introducing False Information Into a Computer or Computer System Unlawful Modification of Computer Equipment or Supplies ( ) Unlawful Modification of Computer Equipment or Supplies Unlawful Denial, Interruption, or Degradation of Access to Computer Unlawful Denial, Interruption, or Degradation of Access to Computer Services Computer Invasion of Privacy ( ) Disclosure of Anothers Password Unauthorized Possession of Computer Information Misuse of Computer Information Transmission of False Data .



    3-3-3 Fraud and Theft Crimes

    Fraud by Computer Manipulation Using a Computer to Fraudulently Obtain and Use Credit Card Information Damaging or Enhancing Anothers Credit Rating Computer Embezzlement Computer Information Theft Software Piracy ( ) Theft of Computer Services Computer Impersonation .



    3-3-4 Forgery

    Electronic Mail Forgery (E-Mail Forgery) Document/Record Forgery Identity Forgery .



    3-3-5 Gambling and Other Offenses Against Morality

    Owning and Operating an Internet Gambling business Facilitating the operation of an Internet gambling business Patronizing an Internet Gambling Business Using the Internet to provide liquor to minors Using the Internet to provide cigarettes to minors Using the Internet to provide prescription drugs .



    3-3-6 Crimes Against the Government

    Obstructing enforcement of law or other government function Failure to report a cybercrime Obtaining confidential government information False Reports of Cybercrimes Tampering with evidenc Tampering with a Computer Source Document Endangering Public Safety Anonymity Cyber-Terrorism Cyber-Vigilantism.



    3-4 .



    ( ) ( ) .

    .

    ( ) ( ( ) .

    ( ) .

    ( ) .

    . .



    .



    4- .

    .

    :- 1988 23 ROBER MORRIS ( ) 6 60000 3 .

    :- GLOBAL HELL .

    :- MELISSA 1999 40 500 19 .



    :- 19 1999 Eric burns 15 3 eric web bandit 1998 1999 4 USIA LASER.NET ZYKLON CRYSTAL .

    :- () 1998 () .



    :- omega Delaware Timothy Allen Lioyd (35 ) 17/2/1998 1996bomb 20 nasa 10 .







    5- -





    :-

    - .

    - .

    - .

    - .

    - . .

    . .[22]


  3. #3
    Jan 2006
    7,816






    .

    1- . - - .

    2- .

    3- (( )) .

    4- . .

    5- ( ) . ( ) . .



    .

    ɡ .

    .
















    --------------------------------------------------------------------------------

    [1] lawoffc@nol.com.jo

    [2] ɡ 1983 .

    [3] - ɡ ɡ ɡ 1989 40 .

    [4] 40 . 28 .

    [5] ʡ ɡ ء 1992.

    [6] 1998 .

    [7] 1994 .

    [8] Rosenblatt 31 .

    [9] ɡ ɡ 1992 20

    [10] Artar Solarz . 31 .

    [11] GOA :- www.goa.gov

    [12] Tom forester, Essential proplems to Hig-Tech Society First MIT Pres edition, Cambridge, Massachusetts, 1989, P. 104

    [13] . 29 30 .

    [14] . 32 .

    [15] www.oecd.org

    [16] . 35 .

    [17] .

    [18] . 3 .

    [19] - ա ɡ ɡ 1992. 4 .



    [20] .

    [21] . . . . ԡ ѡ ɡ ɡ ɡ 1992. Pieere Catala, Ebauche Duune Theorie Juridique de ,information ,1983. Andre Lucas, Protiction of information Bases, Kuwait First Conference, Ministry of Justice, 15-17 Feb.1999, Kuwait. .

    [22] :-

    - Cybercrime: Law Enforcement, Security, and Surveillance in the Information Age ,by Tom Douglas Brian Loader , Thomas Douglas,1st edition, ) Routledge, 2000

    - Digital Evidence and Computer Crime, by Eoghan Casey, 1st edition Academic Pr. 2000.

    - Criminal Profiling: An Introduction to Behavioral Evidence Analysis,by Brent E. Turvey, Diana Tamlyn, Jerry Chisum , 1 edition , Academic Press Limited 1999.

    - Fighting Computer Crime: A New Framework for Protecting Information, by Donn B. Parker, 1 edition, John Wiley & Sons 1998.

    - Information Warfare Principles and Operations, by Edward Waltz 1998.

    - Cyber Crime: How to Protect Yourself from Computer Criminals by Laura E. Quarantiello, Tiare Publications, 1996.

    :- . 1 1997 .

  4. #4
    Jul 2012
    3
    ( ) 3 )

: 1 (0 1 )

  1. :650
    Y_2288
    : 0
    : 18-04-2012, 03:16 PM
  2. l@w man
    : 0
    : 05-07-2010, 06:34 PM
  3. ( )
    /
    : 7
    : 01-07-2010, 08:27 PM
  4. : 0
    : 22-02-2009, 05:27 AM
  5. smsma.net
    : 1
    : 11-10-2008, 01:33 PM