1 3 3

:

  1. #1
    Jan 2006
    7,816






    - /

    ɡ .

    ɡ . ȡ .

    . ɡ ȡ .

    ȡ :

    ɡ







    ӡ .



    ɡ . .

    ɔ ɡ . .

    . ڡ ʡ Ǻ .



    ɡ . .

    18 % 2000 27% 2004 62% 2006.(1)

    2007 200 ѡ 240 .(2) . 65 % 2007 50 .(3)

    ʺ ɡ ʡ ȡ .(4) . ɺ ʡ ڡ .

    ȡ 16- 24 (5) . ȡ ɡ .

    ɺ (6)

    ڡ ȡ ɡ . ڡ .

    ء ѡ ɡ ʡ ǡ ɡ .





    1-

    ȿ



    1-

    2-

    3-

    4- ȿ

    5-



    . . ɡ .



    1- ɡ .

    2- ɡ SOAR S Strong ɡ O Opportunities ա A Aspiration R Result. . .(7)



    ɡ .



    ɡ ȡ ɡ ʡ ʡ (8)



    :

    1- : ǡ . .

    2- : ȡ .

    3- ȡ .



    .



    ǡ ɡ 1998(9) 18 35 ǡ ʡ . : ʡ .

    2006(10) ɡ . 44,84% . - ѡ . 63.44%- .

    ʡ2007(11) ѡ . . ɡ .

    2007(12) 200 . ʡ . ǡ . . .

    ʡ ɡ 2009(13) ɡ . ɡ , ǡ , . ɡ .



    ɔ Rogers, M 1997(14) ѡ 381 ɡ . ɡ ɡ . ء .

    William F" ʡ 1997 (15) ѡ (581) Southern . ɡ ѡ .

    Csonka P 2002(16) (358) ʡ ǡ 85% ɡ 64% 35% 378 2000 265 .

    40 % 25% 2000 91% ɡ 79% 2000 94% .

    S Escrigas : 2008 (17) ɡ (214) ɡ ʡ ɡ . . The results of this study show noticeable agreement on the priority challenges that human and social development poses for higher education, particularly within each region. ɡ ѡ ɡ ɡ .

    Vladimir Golubev ѡ 2009(18) ѡ : 66% % ɡ 17% ɡ 7 % 5 % . 33 % 20 ǡ 45 % 20- 40 ǡ 13 % 40 ǡ 13- 20 . 7.5 % .



    ɡ ɡ ɡ . ˡ .

    : :

    1- :

    ɡ Computer-Related Economic Crime .(19)

    . White Collar Crime ڡ ɡ ɡ ɺ .(20)

    Ǻ ɡ ɺ .

    Cyber Crime ʡ Cyber . Computer-Related Crimes ɡ . Computer Crimes .(21) . Ȕ(22). .

    (23) . .

    .(24) . .

    ѡ .

    ʔ.(25) . : ڡ .

    ȡ ɡ ʡ ʡ (26)

    ɔ ɡ ɡ .

  2. #2
    Jan 2006
    7,816



    ǡ .



    (Digital Form) ʡ .



    ѡ . . An intellectual property infringement is the infringement or violation of an intellectual property right . . (27)Therefore, an intellectual property infringement may for instance be a



    . ɡ ɡ ʡ (28).



    ǡ .(29)



    ɡ ʡ .



    ˡ ʡ ɡ ɡ ǡ ɡ . ɡ .(30)



    , .



    ʡ , ɡ . (31)



    , (32).



    Ѻ , ɡ .(33) .



    ǡ . .



    ɡ ɡ . (34) .

    35)

    - & Hackers Crackers : ɡ ȡ . .

    - : ɡ ǡ .

    - : ɡ ɡ . ɡ . ǡ .

    - : ֡ ( ) ɔ . ɡ () .

    ɡ ȡ .

    - : (25- 45) ǡ ȡ .

    (36)

    1- ɡ ɡ ɡ ǡ .

    2- ǡ . ɡ .

    2-

    .( 37)

    -

    ʡ ɡ ɡ 11.48 Ǻ .

    -

    ʡ ʡ ٺ ɡ ǡ ѡ .

    -

    ɡ ͡ Emergency Laws ɡ : .

    -

    ɡ . ʡ .

    -

    .

    . Jihad Online . ߡ ϡ ɡ . ɡ ʺ ڡ .

    3-

    ڡ ѡ .

    -

    (38) ɡ .

    ȡ .

    (39)

    - ɡ ѡ ǡ . ȡ .

    - .

    - ɡ : .(40)

    - .

    - ɡ .

    - ɡ .

    - ɡ Ϻ ɡ ɡ ɡ .

    - ѡ ͡ .

    - .

    - ɺ .

    - ݡ .

    - . 41)



    : (42)

    knowledge, which continuously seeds new generations of applied research, .

    Universities play a central and strategic role in educating and training the .

    scientists, teachers, researchers, entrepreneurs and other skilled workers that ɡ .

    4-4equity and level the playing field through the dissemination of knowledge and ȡ ideas by way of student education, faculty interactions, collabor ӡ ɡ mechanisms such as online training, digital librarie ɡ .

    - .

    - .

    - offering specialized help for small-to-medium sized businesses for planning, resour8- .

    providing conference and meeting facilities .

    ɡ ں ɺ ɡ ɡ . ɡ . ʺ ɺ . . . ɡ ڡ .(43)

    .

    ɡ ɡ .

    ˡ .(44)

    :



    ڡ : .



    ɡ . ɡ ɡ ӡ ɡ ȡ (ICT) ȡ ɡ ɡ .

  3. #3
    Jan 2006
    7,816



    Science Parks ɡ .(45)



    ɺ ɡ ɡ : ǡ ǡ ʡ ɡ ȡ .(46)

    -

    :

    1-

    . . . . ʡ :

    - . .

    - ɡ ǡ .

    - ݡ .(47)

    2-

    ڡ ѡ ɡ . ڡ ڡ ɡ . .

    ء ڡ ɡ ɡ . . ӡ ǡ ɡ ڡ .(48)

    3-

    ɡ :

    1- ɡ .

    2- ɡ .

    3- ǡ . (49)

    ɡ ɡ ɡ .

    4-

    Ǻ 2.4 ӡ 225 ǡ 63.000 . 18 ɡ 15 ɡ 12 ɡ 115 .(50)

    ѡ :

    1- ѡ .

    2- .

    3- .

    4- .

    5- ɡ ɡ ̡ ǡ .(51)

    6- .

    7- ʡ .

    8- .

    9- ɡ ԡ 500 .

    10- ʡ ʡ ɡ .(52)

    . ɡ ɡ ɡ ɡ .(53)

    ʡ ӡ ʡ . .(54)

    :

    ɡ . ɡ ʡ ޡ ɡ ȡ . :

    1- ɡ ɡ .

    2- ɡ .

    3- .

    4- ɡ .

    5- .

    6- .

    7- ȡ .

    8- .

    9- .

    10- .

    11- .

    12- ʡ ˡ ʡ ɡ ɡ .

    :

    ȡ ɡ . SOAR ʡ Strong Opportunities Aspiration Results.

    .

    1- Strong

    :

    - ӡ .

    - ʡ .

    - ɡ ɡ .

    - ǡ .

    - ɡ .

    - .

    - ɡ Ǻ ڡ ʡ .

    - ա .

    - .

    - ʡ ɡ .

    - ʡ .

    - ʡ ɺ .

    - ʡ ʡ .

    2- Opportunities

    - .

    - ʺ .

    - ɡ ǡ ʡ .

    - ɡ .

    - ݡ ʡ .

    - ϡ ͡ Ǻ ǡ ɺ ɡ ʡ ɡ .

    - ɡ ʡ ǡ .

    - .

    - ʡ .

    - .

    Aspiration

    :

    -

    :

    1- ɡ ȡ ɡ . ʡ .. .

    2- ɡ ʡ ǡ ߡ , ǡ .

    3- ɡ ѡ .

    4- ѡ ͡ ڡ .

    5- ʡ .

    6- ɡ ޡ ڡ ɡ ˡ .

    7- ɡ . ǡ .

    8- ʺ ɡ ʡ ɡ . ɡ ʡ ߡ ɡ ڡ ɡ . .

    9- ɡ ǡ ǡ ѡ ǡ . ɡ ɡ .

    10- Ǻ . ɡ ɡ ʡ ޺ .

    11- ʡ ǡ .

    12- ɡ .

    ɡ - ɡ ɡ ɡ . ڡ . ȡ ǡ ǡ ޡ ɡ .

    2-

    ȡ ǡ :

    1- ʡ ڡ ߡ ɡ ɡ ʡ ɡ .

    2- ʡ ɡ ʡ ɡ .

    3- ɡ ǡ ǡ .

    4- ɡ ʺ ʡ .

    5- ɺ ʡ .

    6- ɡ ɡ .

    7- ɡ ɡ ʡ ɡ .

    8- ʡ ɡ ϡ .

    9- ʡ ڡ ڡ ǡ ɡ .

    10- ɡ ɡ ˡ ͺ ɡ .

    11- ʡ ѡ ɡ .

    12- ȡ ɡ ǡ ɡ .

    13- ɡ ɡ ʡ ɡ ʡ ɡ ʡ ɡ .

    3-

    ȡ :

    1- ѡ ɡ ʡ ǡ . ں .

    - ɡ :

    ѡ ɡ ѡ ɡ ʡ ߡ .

    .

    ɡ ȡ .

    ڡ ɡ ʺ .

    ɡ ʡ ʡ ʡ .

    ʡ ʡ ǡ .

    ȡ ɡ ɡ ɡ ǡ ȡ ǡ ɡ .

    : Result

    ɡ ǡ ɡ .

    : . .

    : ҡ ɡ .

    : ʡ . ȡ ʡ ɡ ޡ ȡ .

    : .

    : ʡ ں .

    : ɡ ɡ ɡ ɡ ݡ ȡ .



    1- U.K, Department of Trade and Industry, Information Security Breaches Survey: Technical Report, April, 2006, p.1.

    2- Cyber Crime, http://en.wikinews.org/UK_nears_US_cyber crime, ahead of Nigeria, crime, Romania, 31/1/2010,p.1.

    3- ɡ :

    http://www.ecipit.org.eg/Arabic/homepage_A.aspx,1/1/,2009,p.1

    4- ʡ ѡ ֡ ɡ ѡ 2007 9.

    5- :

    - ɡ ȡ ɡ 25 27 1998 325.

    - William F., A Social Learning Theory Analysis of Computer Crime among College Students, Journal of Research in Crime and Delinquency, Vol. 34, No. 4, 1997, p.495

    6- ʡ ɡ (ɡ 2008) 2.

    7- Jacqueline Stavros, David Cooper rider & D. Lynn Kelley, A New Framework for Strategic Planning (Stavros: Cooper Rider and Kelley) 2003.p.11.

    8- David Icove, Karl Seger & William Von Storch, Computer Crime, a Crime

    Fighters Handbook (New Jersey: Prentice Hall), August 1995.P.7.

    9- .

    10- : ǡ ѡ ѡ 2006.

    11- ɡ : ʡ ɡ ɡ ˡ 2007.

    12- ݡ ֡ ɡ 5 2007.

    13- ʡ ɡ ɡ ޡ 25-27 2009.

    14- Rogers, M., Psychology of Computer Criminals. , http://www.gocsi.com, 1997,

    22/12/2009,p.1

    15- William F., Op.cit.

    16- Csonka P., Internet Crime, the Draft Council of Europe Convention on Cyber-

    Crime: A Response to the Challenge of Crime in the Age of the internet,

    Computer Law & Security Report, Vol.16, No.5, 2002

    17- Escrigas S.,, Higher Education: New Roles and Emerging Challenges for Human

    And Social Development, 4th International Barcelona Conference on Higher

    Education, 31March -2 April, 2008.

    18- Vladimir Golubev, Criminal in Computer Related Crimes, Computer Crime

    Research center, http://www.polcyb.org,12/10/2009.

    19- ȡ ( : ɡ 2002 ) 7.

    20- White Collar Crime ,http://www.libraryindex.com/pages/491/White-Collar- Crime-Computer Crime ,html, 1/11/2009.

    21- Mcquade, S., Understandingand Managing Cyber Crime (Boston: Allyn & Bacon, 2006) .p 45.

    22- ___________, The Encyclopedia of Cybercrim(, Westport, CT: Greenwood Press,2009) , p.141

    23- ɡ ѡ ɡ ɡ 2006 15.

    24- 8.

    25- ޡ 16.

    26- Karl Seger, Op. cit, p.4

    27- Csonka P., Internet Crime; the Draft Council of Europe Convention on Cyber- Crime: A Response to the Challenge of Crime in the Age of the Internet, Computer Law & Security Report, Vol.No.5, 2002 , p.3.

    28- Grabosky, P. Electronic Crime( New Jersey: Prentice Hall, 2006 ) p.24.

    29-Computer Crime, http://en.wikipedia.org/wiki/Compute crime, 20/11/2009.p.1.

    30- Warren B.Chik, Challenges to Criminal Law Making in the New Global Information Society, a Critical Comparative Study of the Adequacies of Computer- Related Criminal Legislation in the United States, the United Kingdom and Singapore, New York: Hill publisher, 2007, p.2

    31- Grabosky, P. Electronic Crime( New Jersey: Prentice Hall, 2006),p.15

    32- Mcquade, S. , Op.cit., p. 45.

    33- The Encyclopedia of Cybe Crime(Westport, CT: Greenwood Press,2009) , p.141.

    34- ޡ 15.

    35 - Walden, I. , Computer Crimes and Digital Investigations( Oxford: Oxford University press, 2007 ), p.26.

    36- ȡ ޡ 9.

    37- ء ʡ ɡ 2008 2003 39.

    38- Knowledge Society, en.wikipedia.org/wiki/Knowledge_society,1 /9/2009,p.1.

    39 Zhiyun Liu, Mission of Modern Universities and Development of Modern Society, US-China Education Review, Wuhan University of Technology, Volume 2, No.3, Mar.2005, p.2.

    40- ( : 2008)

    172.

    41- Jane Knight, Internationalization of Higher Education Practices and Priorities:

    Ph.D., International Association of Universities, Rockford College, 2007.p.23.

    42- Judith Stutz, The Role of Universities in Knowledge Production, Himalayan

    Journal of Science, Vol.3, No.5, 2005. p. 53-56

    43- NIU Outreach, the Role of Higher Education in Economic Development,

    Higher Education Alliance for the Rock River Region Contributors Northern

    Illinois University Rock, Valley College University of Illinois College of

    Medicine at Rock.2006, p.9.

    44- ɡ ɡ 24-26 2006 5.

    45- (: ) 2008 6.

    46- (: ڡ 2008) 196.

    47- Zhiyun Liu., Op. cit, p.28.

    48- Saleem Badat, the Role of Higher Education in Society (Cape Town: Waterfront), 2009, p.60.

    49- Ken Kemprener, the Social Role of Higher education, Comparative Perspective,

    (U.S.A: library of Congress Cataloging in Publishing Data, 1997), p.11.

    50-Education in Egypt: a Vision towards Quality Education, Tempus Conference on

    Quality Enhancement in Higher Education , Cairo, Egypt, 7-8 May , 2008,p.4.

    51- ɡ (2004-2008 ) ɡ ɡ 2008 12.

    52- ( ӡ ɡ 2005) 2.

    53- ɡ 2021 2005- 2021 (: ʡ 2006 ) 3.

    54- :

    , 20/12/2009. http://www.heep2.edu.eg/about.html#2

: 1 (0 1 )

  1. smsma.net
    : 1
    : 12-02-2013, 04:26 AM
  2. /
    : 2
    : 13-12-2010, 02:49 PM
  3. : 0
    : 26-10-2010, 12:12 PM
  4. /
    : 0
    : 21-05-2010, 08:34 PM
  5. almasry
    : 4
    : 13-03-2008, 03:38 PM