uae cyber crime law swot analysis (talal al ismail) - 3rd edition
TRANSCRIPT
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 1/20
[DNDN DN FPLDFN
SDVGK WJFXG_PF[V
LDV ?=4?
PUI[ Djdnvpfp3 W*D*G @vogr Ndu
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 2/20
Dop{rd`{
[afp }d}gr dflp d{ gl}adpfsfje {ag fl}ir{dj`g ih {ag WDG `vogr`rflg ndu gjd`{gk fj Cwjg
?==8* Fj {afp }d}gr. d PUI[ djdnvpfp ih {ag WDG `vogr`rflg ndu fp `ijkw`{gk {i fkgj{fhv {ag
fj{grjdn hd`{irp !p{rgje{a djk ugdbjgppgp& djk gq{grjdn hd`{irp !i}}ir{wjf{fgp djk {argd{p&*
F{ fp hiwjk {ad{ pilg dr{f`ngp ih {ag WDG `vogr`rflg ndu `ij{dfj pilg kghf`fgj`fgp oi{a fj
kghfjfje fl}rfpijlgj{ }grfik djk hfjg xdnwg* Hir {afp }wr}ipg. f{ fp pweegp{gk {i ogj`aldrb
uf{a i{agr `vogr`rflg ndup ih i{agr `iwj{rfgp nfbg {ag Wjf{gk P{d{gp. {ag Wjf{gk Bfjekil
djk Fjkfd fj irkgr {i `ndrfhv djk w}erdkg djv lfppfje }ifj{p uaf`a ufnn rgpwn{ fj d ndu {ad{
`illgjpwrd{g uf{a {ag }riergpp eifje fj {ag hfgnk ih `vogr`rflg*
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 3/20
Fj{rikw`{fij
Kgp}f{g {ag afea ngxgnp ih {g`ajinief`dn dkxdj`glgj{ {ag uirnk adp rgd`agk {ikdv fj
lwn{f}ng kildfjp2 p{dr{fje hril {ag p}rgdk ih Fj{grjg{. pi`fdn jg{uirbfje pf{gp. XiF]. `niwk
`il}w{fje. dkxdj`gk {gng`illwjf`d{fijp. djk i{agr likgrj {g`ajinief`dn {rgjkp2
aiugxgr. {afp }riergpp fp p{fnn ihhpg{ ov d }drdnngn pair{`ilfje fj {ag kgxgni}lgj{ ih {grlp
djk ndup {ad{ `ij{rin {ag wpg ih {ag dhirglgj{fijgk {g`ajiniefgp. gp}g`fdnnv {ag ngefpnd{fxg
}rixfpfijp {ad{ `ij{rin {ag wpg ih {ag Fj{grjg{* F{ fp ugnn bjiuj jiu. {ad{ {ag Fj{grjg{ fp ji
nijegr d pdhg gjxfrijlgj{ {i {rwp{ ir wpg* Lirgixgr. pwrhfje {ag Fj{grjg{ adp og`ilg wjpdhg
kwg {i {ag }rinfhgrd{fij ih `vogr`rflg* Uagrgdp d rg`gj{ p{wkv ov L`Dhgg !?==6& pdvp /[ag
`ip{ ih @vogr @rflg adp rgd`agk +4 {rfnnfij eniodnnv/ !Nfgogrldj. ?=44&* Agj`g. {ag
fl}ir{dj`g ih hfjkfje d wjfxgrpdn ngedn hirlwnd {i dkcwp{ {agpg ̀ rflgp fp afeanv jggkgk*
[ag Owkd}gp{ !?==4& @ijxgj{fij ij @vogr`rflg krdh{gk {ag hfrp{ /Fj{grjd{fijdn @vogr @rflg
[rgd{v/ {ad{ adk oggj rd{fhfgk ov lirg {adj ;8 `iwj{rfgp driwjk {ag uirnk !Adrngv. ?=4=&*
[agpg `ij`gr{gk ghhir{p rghng`{ {ag jggk hir pw`a ndup {i agn} }rgxgj{ eriu{a fj `ripp,
oirkgr `vogr`rflgp djk agn} pg`wrg {ag eriu{a fj ngef{fld{g `ripp,oirkgr `il}w{fje*
Wjdhhg`{gk ov egierd}af`dn oiwjkdrfgp. `vogr`rflgp ijnv pggl {i og eg{{fje uirpg dp
avorfk {argd{p. ad`b d{{d`bp. djk {ag rgdn }ippfofnf{v ih `vogr {grrirfpl `ij{fjwg {i adwj{
gj{gr}rfpgp djk eixgrjlgj{ oikfgp driwjk {ag eniog*
Fj {ag Lfkkng Gdp{. {ag lip{ `wrrgj{ djk ufkgnv dowpgk `vogr`rflg fp fj{gnng`{wdn }ri}gr{v
djk pih{udrg }rfxd`v* Ij {ag i{agr adjk. uagj {dnbfje doiw{ ndup eixgrjfje `vogr`rflg fj
{ag Lfkkng Gdp{ {agv drg `nipg {i jij,gqfp{gj`g dp lip{ ih {agpg `iwj{rfgp adxg {rdjpnd{gk
`vogr`rflg fj{i dj djdnieiwp ihhnfjg `d{geirv ih ihhgjpg* Jijg{agngpp. hgu `iwj{rfgp fj
{ag Lfkkng Gdp{ pw`a dp Wjf{gk Drdo Glfrd{gp. Gev}{. djk Pdwkf Drdofd adxg krduj w} {agfr
iuj @vogr Ndup fj dj d{{gl}{ {i hfea{ {afp jgu {v}g ih `rflg !Ogkjdrpbf. @agj. @agj.
Cixdjixf`a. Ipldj. ?==0&*
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 4/20
[ag hd`{ {ad{ {ag Wjf{gk Drdo Glfrd{gp fp ijg ih {ag ngdkfje `iwj{rfgp ih {ag Ewnh
@ii}grd{fij @iwj`fn2 {ag W*D*G fp nfxfje f{%p g`ijilf` oiil uaf`a pgglp gxfkgj{ fj {ag
d}}nf`d{fij ih {ag nd{gp{ lgdjp ih {g`ajinief`dn pinw{fijp fj dnn udnbp ih nfhg* [afp lgdjp {ad{
{ag Wjf{gk Drdo Glfrd{g fp ji{ fllwjg dedfjp{ {ag drfpfje {argd{p `ilfje hril {ag `vogr
uirnk* [agrghirg. fj Cdj ?==8. {ag Wjf{gk Drdo Glfrd{gp kgxgni}gk djk }w{ {ieg{agr d hfrl
`vogr ndu fj rgp}ijpg {i `wrrgj{ djk }i{gj{fdn `vogr`rflgp !Dg`gr{*dg. ?==8&* Bjiufje {ad{
`vogr`rflg `ip{p {ag `iwj{rv +? lfnnfij d vgdr !]ngugp. ?=4=& djk {ag hfewrg adp {ag
}i{gj{fdn {i eriu* Adxfje d hfrp{ niib d{ {afp jwlogr uaf`a pgglp rgdnnv pldnn `il}drfje {i
i{agr `iwj{rfgp pw`a dp {ag WB uagrg {ag `ip{ ih `vogr`rflg gq`ggkp gq}g`{d{fijp ih +;0*7
ofnnfij d vgdr !@ndrb. ?=44&*
Pfj`g {ag Wjf{gk Drdo Glfrd{gp fp p{fnn jixf`g fj rgnd{fij {i {ag kgxgni}lgj{ ih p}g`fdn ndup
{ad{ `ij{rin wpg ih {ag Fj{grjg{. aiugxgr. {afp rgpgdr`a {rfgp {i {dbg d `nipg niib d{ {ag lip{
fl}ir{dj{ dp}g`{p ih {ag p{rgje{ap djk ugdbjgppgp {ad{ `adrd`{grfsg {afp D`{ djk
i}}ir{wjf{fgp hir kgxgni}lgj{ djk uad{ drg {ag }i{gj{fdn rfpbp rgpwn{fje hril hrgtwgj{
`adjegp fj {ag ̀ vogr uirnk*
Lg{aikiniev
[ag rgpgdr`a ldfjnv d}}nfgp {ag PUI[ djdnvpfp d}}rid`a {i rg`iejfsg {ag gqfp{fje p{djk ih
{ag WDG `vogr`rflg ndu* Dn{aiwea ji{ pi lw`a fjhirld{fij ij {ag WDG `vogr`rflg ndu fp
dxdfndong. aiugxgr. uad{gxgr fjhirld{fij {ad{ fp dxdfndong ij {ag Uirnk Ufnk Ugo !G,
Ciwrjdnp. Ldedsfjgp. Jgup}d}gr. g{`*.& fj rgnd{fij {i {ag pwocg`{ adp oggj `inng`{gk djk
djdnvsgk d``wrd{gnv* [ag PUI[ djdnvpfp `ijkw`{gk fjxinxgp {ui p{g}p* Ij ijg adjk. fkgj{fhv {ag fj{grjdn hd`{irp
!p{rgje{a djk ugdbjgppgp& djk gq{grjdn hd`{irp !i}}ir{wjf{fgp djk {argd{p& ih {ag WDG
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 5/20
`vogr`rflg ndu* Ij {ag i{agr adjk. {ag djdnvpfp ih {agpg hd`{irp udp odpgk lgrgnv ij {ag
dw{air%p }grpijdn i}fjfij*
P{rgje{a
F{ fp uir{a lgj{fijfje {ad{ {ag WDG fp {ag hfrp{ `iwj{rv fj {ag Lfkkng Gdp{ rgefij {i dki}{
`vogr`rflg gjd`{lgj{. uf{a f{p @vogr`rflg Ndu Ji* ?. gjd`{gk fj Cwjg ?==8* Hir {ag
`ijpinfkd{fij ih {afp ndu. {ag WDG eixgrjlgj{ fp niibfje d{ udvp {i fjxinxg ni`dn wjfxgrpf{fgp
pi {agv }dr{jgr fj {ag }ri`gpp ih p}rgdkfje {ag `ij`g}{ ih `vogr pg`wrf{v {ariwea
gp{donfpafje d`dkglf` }rierdlp `gj{grgk ij `vogr pg`wrf{v {i agn} }rg}drg djk {rdfj d jgu
egjgrd{fij ih erdkwd{gp {ad{ fp dong {i wjkgrp{djk djk kgdn uf{a {afp jgu p`fgj`g hfgnk fj dnn
dp}g`{p* Hir fjp{dj`g. fj ?==1. Sdvgk Wjfxgrpf{v ndwj`agk d jgu erdkwd{g }rierdl {ad{
ihhgrp d ldp{gr kgergg fj Fjhirld{fij [g`ajiniev !P}g`fdnfsd{fij fj @vogr Pg`wrf{v& hi`wpgp
ij {ag kgxgni}lgj{ ih `ij`g}{p. bjiungkeg djk pbfnnp {ad{ ufnn gjdong pw``gpphwn
}dr{f`f}dj{p {i og`ilg gq}gr{p fj {ag drgd ih fjhirld{fij pg`wrf{v. fj{grjg{ `rflg
}rgxgj{fij. djk kfef{dn `rflg fjxgp{fed{fij !Dlgfjhi*`il. ?==1&* Lirgixgr. {ag
[gng`illwjf`d{fijp _gewnd{irv Dw{airf{v ![_D& rgdnfsgp {ag jggk hir pw`a ndu djk aiu f{
fp fl}ir{dj{ {i p{dv w},{i,kd{g fj {ag uirnk ih `vogr`rflg* Pfj`g {ag ngedn hrdlguirb ih {ag
ndu `ixgrp d eiik jwlogr ih kfhhgrgj{ `rflgp `d{geirfgp pw`a dp Awldj [rdhhf`bfje. Kd{d
Hiregrv ih }riafof{fxg kd{d. djk wjdw{airfsgk wpg djk fj{gr`g}{fij ih `il}w{gr pgrxf`gp* F{
fj`nwkgp }gjdn{fgp hir fl}rfpijlgj{ hir d {grl uaf`a ldv gq{gjk {i {gj vgdrp djk d hfjg w}
{i ?==.=== DGK* [ag D`{ dnpi p{rgppgp {ag rgp}g`{ hir rgnfefij djk {ag Fpndlf` fkgj{f{v ih {ag
p{d{g djk rgp}g`{ hir i{agr rgnfefijp dp d {i{dn ih ?=? kfhhgrgj{ jd{fijdnf{fgp gqfp{ fj {ag WDG
ndoir ldrbg{. d``irkfje {i {ag Wjkgr,Pg`rg{drv ih {ag Lfjfp{rv ih Ndoir !Badnggc{flgp*`il.
?==8&* Hir hwr{agr fnnwp{rd{fij. {ag WDG `vogr`rflg ndu fp `adrd`{grfsgk ov d pg{ ih dr{f`ngp
{ad{ `ixgr afeanv `rf{f`dn fppwgp* [agrgw}ij fj `il}drfpij uf{a {ag Pdwkf Drdofd!E@@
lglogr& `vogr`rflg ndu. f{%p hiwjk {ad{ {ag WDG `vogr`rflg ndu `ij{dfjp dr{f`ngp !5 ( 40&
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 6/20
{ad{ `rflfjdnfsg `adjefje ir kgp{rivfje lgkf`dn {gp{. kfdejipfp. {rgd{lgj{ ir agdn{a`drg djk
fj`f{glgj{ {i }rip{f{w{fij djk kgodw`agrv wpfje {ag fj{grjg{ ir afea,{g`a lgdjp. uagrgdp
{ag Pdwkf ̀ vogr`rflg ndu kigpj%{ dkkrgpp ir ̀ ixgr {agpg fppwgp*
Nfbgufpg. {ag `vogr`rflg ndu ih Cirkdj kigpj%{ dkkrgpp ir `ixgr fppwgp rgnd{gk {i {ag
kghdld{fij ih kfxfjg rgnfefijp. `rgd{fje d ugopf{g ir }wonfpafje fjhirld{fij uf{a {ag dfl ih
}rili{fje jdr`i{f`p. djk fnngedn {rdjphgr ih hwjkp rgpwn{fje hril lijgv ndwjkgrfje wpfje {ag
fj{grjg{ ir afea,{g`a lgdjp* Uafnp{ {ag `vogr`rflg ndu ih {ag WDG }ri`gppgp djk
`rflfjdnfsgp {ag dhirglgj{fijgk d`{p fj dr{f`ngp !47. 41. djk 46&* Hwr{agrlirg. uafng d hfjg fj
{ag `vogr`rflg ndu ih {ag WDG rgd`agp w} {i ?==.=== DGK. {ag xdnwg ih d hfjg fj {ag
`vogr`rflg ndu ih Cirkdj kigpj%{ gq`ggk ?8.=== DGK*
Kuvgr !?=4=& pw}}ir{p {ag fkgd {ad{ uf{a {ag fj`rgdpg fj `vogr,d{{d`bp djk {ag li{fxgp
ogafjk {agl. eixgrjlgj{p paiwnk og lirg gj`iwrdegk {i dxifk ng{{fje {ag `rflgp kfxgr{
{agfr d{{gj{fij hril `vogr`rflgp* Lirgixgr. {ag ni`dn eixgrjlgj{ adp `rgd{gk d @il}w{gr
Glgregj`v _gp}ijpg [gdl !dr@G_[& uf{a d kgkf`d{gk ugopf{g {i }rixfkg dudrgjgpp.
fjhirld{fij. dkxf`g. djk rg`gfxg }riongl dngr{p hril wpgrp. dp ugnn dp adp `rgd{gk
@vogr`rflg @iwr{p {i kgdn uf{a {ag cwl} fj {ag `il}w{gr,rgnd{gk `rflgp `dpgp
!WDGfj{grd`{*`il. ?==5&* D``irkfjenv. {ag Lfjfp{rv ih Cwp{f`g. fj irkgr {i `ilod{ `vogr`rflg
fj {ag WDG. jgu /@vogr`rflg/ `iwr{p uf{a p}g`fdnfp{ cwkegp adxg oggj gp{donfpagk {i
gq}gkf{g nf{fed{fij djk pgrxg nf{fedj{p lirg ghhg`{fxgnv !Sdudvd*`il. ?=4=&* Fj nfjg uf{a {ag
fj{rikw`{fij ih {ag WDG `vogr`rflg ndu. {ag ni`dn eixgrjlgj{ ogedj {i uirb d`{fxgnv ij
aip{fje fj{grjd{fijdn `ijhgrgj`gp fj dj d{{gl}{ {i orfje fj fj{grjd{fijdn gq}gr{fpg uaf`a ufnn
`ij{rfow{g fj oiip{fje {ag ngxgn ih bjiungkeg rgnd{gk {i `vogr pg`wrf{v djk }rixfkgp d``gpp
{i {ag nd{gp{ hfjkfjep djk rgpwn{p fj {ag hfgnk ih `vogr pg`wrf{v* Hir gqdl}ng. fj ?=4=. Sdvgk
Wjfxgrpf{v aip{gk {ag /?jk Fj{grjd{fijdn F@P[ @ijhgrgj`g ij Kfef{dn Hirgjpf`p djk @vogr
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 7/20
@rflg/ ![agjd{fijdn*dg. ?=4=& dp d }rid`{fxg p{g} {i aip{ {afp {v}g ih fj{grjd{fijdn
`ijhgrgj`g fj {ag Lfkkng Gdp{*
@drrvfje iw{ gng`{rijf` owpfjgppgp fj d ugnn,kghfjgk ngedn p{rw`{wrg ufnn kghfjf{gnv `ij{rfow{g
}ipf{fxgnv {i {ag jd{fij‖p g`ijilv djk gxgj `rgd{g lirg i}}ir{wjf{fgp {i {ag owpfjgppgp
{aglpgnxgp !_iogr{ g{ dn*. ?=4=&*
Ugdbjgppgp
Dn{aiwea {ag WDG `vogr`rflg ndu `ixgrp dj d``g}{gk jwlogr ih `vogr`rflgp uaf`a piwjkp
eiik. aiugxgr. pilg dr{f`ngp ih {ad{ ndu drg }wj`{wd{gk uf{a d nd`b ih `ndrfhf`d{fij djk
pariwkgk fj lvp{grv uaf`a pgglp gxfkgj{ fj ldjv ih {ag ndu dr{f`ngp ug drg eifje {i rgxfgu
hril dj djdnv{f`dn }ifj{ ih xfgu*
[ag Fjp{f{w{g ih [rdfjfje djk Cwkf`fdn P{wkfgp ih Dow Kadof agnk d kfp`wppfij kgod{g rfea{
dh{gr {ag fppwdj`g ih {ag WDG `vogr`rflg ndu fj ?==8. rgxgdnfje {ad{ {ag D`{ `ij{dfjp ldjv
nii}aingp {ad{ jggk hwr{agr gq}ndjd{fij djk {ad{ p}g`fdnfsgk `iwr{p paiwnk og dppfejgk hir
f{p fl}nglgj{d{fij* @ijhfrld{fij ih {afp. djk hril d cwkf`fdn }ifj{ ih xfgu. {ag cwkeg
Liadllgk Iogfk Dn,Bddov dppwrgk {ad{ /pilg dr{f`ngp ldv `dwpg {ag }ripg`w{ir {i og
}wssngk og`dwpg ih {ag `ij{rdkf`{irv }gjdn{fgp {ad{ lfea{ gqfp{ fj {ag pdlg dr{f`ng/
!I}gjdrdo*jg{. ?==8&*
Fj `ijpijdj`g uf{a {ag lgj{fijgk doixg. hir fjp{dj`g. {ag ndu fejirgk {ag `rflfjdnfsd{fij
ih edlonfje uafng `rflfjdnfsgk }rip{f{w{fij djk {gl}{d{fij* [ag ndu dnpi hdfngk {i `ndrfhv {ag
}gjdn{v ih `ijp{rw`{fje {grrirfp{ ugopf{gp ir p}rgdkfje {grrirfp{ fjhirld{fij ijnfjg wpfje
xdewg }rg{gq{p* [agpg `ij{rixgrpfdn nii}aingp xdrv og{uggj wj`ngdr {grlp. }gjdn{fgp. djk
hfjgp* [afp p{wkv ufnn rgxfgu {ag dr{f`ngp {ad{ drg kilfjd{gk ov xdewgjgpp djk wj`gr{dfj{v*
Agrg drg pilg dr{f`ngp hril {ag `wrrgj{ ndu {ad{ jggk cwp{fhf`d{fij hir {ag {grlp wpgk !]dr{p
afeanfea{gk fj vgnniu jggk ̀ ndrfhf`d{fij&3
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 8/20
Dr{f`ng !47&
[ag }gjdn{v ih fl}rfpijlgj{ djk d hfjg ir gf{agr d}}nfgp {i uaigxgr ̀ illf{p djv ih {ag
hinniufje ihhgj`gp {ariwea {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g3
4* Dowpg ih dj Fpndlf` ainv parfjg ir rf{wdn?* Dowpg ih d ainv parfjg ir rf{wdn ih djv i{agr rgnfefij uagrg pw`a parfjg ir rf{wdn fp
}ri{g`{gk wjkgr Fpndlf` Padrfd
0* Kghdld{fij ih djv ih {ag kfxfjg rgnfefijp
;* Enirfhf`d{fij. fj`f{glgj{ ir }rili{fij ih urijekifje
Uad{ bfjk ih `rflgp dedfjp{ Fpndl lfea{ i``wr xfd {ag Fj{grjg{ ir `vogr uirnk9
Dr{f`ng !48&
D }grpij uai xfind{gp hdlfnv }rfj`f}ngp djk xdnwgp ir }wonfpagp jgup ir }f`{wrgp fj xfind{fij
ih {ag }rfxd`v ih dj fjkfxfkwdn‖p }rfxd{g ir hdlfnv nfhg. gxgj fh {rwg. {ariwea {ag Fj{grjg{ ir djfjhirld{fij {g`ajiniev kgxf`g. padnn og nfdong {i fl}rfpijlgj{ hir d{ ngdp{ 4 vgdr djk d hfjg
ih d{ ngdp{ DGK 7=.=== ir gf{agr*
Uad{ drg {aipg hdlfnv,}rfj`f}ngp)xdnwgp gqd`{nv9 Uai paiwnk kg{grlfjg {agl9 Djk uai
adp {ag rfea{ {i ki pi9 [dbfje fj{i d``iwj{ {ad{ WDG fp d lwn{fjd{fijdn `iwj{rv dp lirg
{adj ?== jd{fijdnf{fgp p{dv ij f{p ndjk*
Dr{f`ng !?=&
D }grpij uai pg{p w} d ugopf{g ir }wonfpagp fjhirld{fij ij {ag Fj{grjg{ ir dj fjhirld{fij
{g`ajiniev kgxf`g hir d eriw} gjedegk fj hd`fnf{d{fje djk }rili{fje }rierdlp djk fkgdp
`ij{rdrv {i }wonf` irkgr djk lirdnp padnn og nfdong {i fl}rfpijlgj{ hir w} {i 7 vgdrp*
Uad{ fp lgdj{ ov }wonf` irkgr djk lirdnp9 Aiu paiwnk f{ og kghfjgk9 [afp dr{f`ng fp rgdnnv
`rf{f`dn hir {ag pg`wrf{v ih {ag jd{fij. {awp. hwr{agr d``wrd{g cwp{fhf`d{fij fp afeanv rgtwfrgk*
Dh{gr {afp twf`b rgxfgu f{%p gppgj{fdn {i pdv {ad{ {agpg {grlp drg i}gj {i d ufkg rdjeg ih
fj{gr}rg{d{fijp* Agj`g. WDG eixgrjlgj{ paiwnk {dbg twf`b p{g}p {i rgkw`g djk gnflfjd{g
djv bfjk ih ̀ ijhwpfij lfea{ ad}}gj*
Dkkf{fijdnnv. pilg ih {ag dr{f`ngp }rgpgj{gk fj {ag D`{ drg ji{ rgdnnv `ngdr gp}g`fdnnv fj {grlp
ih fl}rfpijlgj{ djk hfjg dliwj{p. ow{ hir {ag Wjf{gk Drdo Glfrd{gp {i hwr{agr fl}rixg djk
p{rgje{agj {agfr gqfp{fje `vogr`rflg ndu {agrg paiwnk og d `ngdr }gjdn{v kghfjf{fij {i pilg
ih {ag }rgpgj{gk dr{f`ngp }rgxgj{fje `vogr `rflfjdnp hril gp`d}fje hril d hwnn }ripg`w{fij*
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 9/20
Kiuj ogniu Dr{f`ngp hril WDG ndu ih `vogr`rflg jggk {i og `ndrfhfgk fj {grlp ih hfjg
dliwj{p djk fl}rfpijlgj{ }grfikp !]dr{p afeanfea{gk fj vgnniu jggk ̀ ndrfhf`d{fij&3
Dr{f`ng !?&
4* Djv fj{gj{fijdn d`{ uagrgov d }grpij wjnduhwnnv edfjp d``gpp {i d ugopf{g ir
Fjhirld{fij Pvp{gl ov nieefje ij{i {ag ugopf{g ir pvp{gl ir orgdbfje {ariwea d
pg`wrf{v lgdpwrg ̀ drrfgp fl}rfpijlgj{ djk d hfjg ir gf{agr*
?* Fh pw`a d`{ rgpwn{p fj {ag kgng{fij. grdpwrg. kgp{rw`{fij. kfp`nipwrg. kdldefje.
dn{grd{fij ir rg}wonf`d{fij ih kd{d ir fjhirld{fij. {ag }wjfpalgj{ padnn og
fl}rfpijlgj{ hir d {grl ih d{ ngdp{ 8 lij{ap djk d hfjg ir gf{agr*
0* Fh {ag kd{d ir fjhirld{fij fp }grpijdn. {ag }wjfpalgj{ padnn og fl}rfpijlgj{ hir d
{grl ih d{ ngdp{ 4 vgdr djk d hfjg ih ji{ ngpp {adj DGK 4=.=== ir gf{agr
Dr{f`ng !;&
[ag }gjdn{v padnn og {gl}irdrv kg{gj{fij hir djvijg uai hiregp d ki`wlgj{ ih {ag hgkgrdn
ir ni`dn eixgrjlgj{ ir hgkgrdn ir ni`dn }wonf` gj{f{v ir `ir}ird{fij {ad{ fp ngednnv rg`iejfsgk
fj dj Fjhirld{fij Pvp{gl*
[ag }gjdn{v padnn og fl}rfpijlgj{ djk d hfjg ir gf{agr hir hirefje djv i{agr ki`wlgj{ uf{a
fj{gj{ {i fjcwrg*
[ag }gjdn{v }rgp`rfogk hir hiregrv d}}nfgp. dp d}}ri}rfd{g. fj {ag ̀ dpg ih djvijg uai
bjiufjenv wpgp d hiregk ki`wlgj{*
Dr{f`ng !7&
D }grpij uai fj djv udv afjkgrp ir kgndvp d``gpp {i d pgrxf`g. pvp{gl. }rierdl ir kd{dodpg
{ariwea {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g padnn og nfdong {i fl}rfpijlgj{
djk d hfjg ir gf{agr*
Dr{f`ng !8&
D }grpij uai wpgp {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g fj irkgr {i kfpdong.
kfprw}{. kgp{riv. uf}g iw{. kgng{g. kdldeg. ir likfhv }rierdlp. kd{d ir fjhirld{fij ij {agFj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g padnn og nfdong {i {gl}irdrv kg{gj{fij djk d
hfjg ih ji{ ngpp {adj DGK 7=.=== ir gf{agr*
Dr{f`ng !5&
Djvijg }ri`wrfje. hd`fnf{d{fje ir gjdonfje {ag likfhf`d{fij ir kgp{rw`{fij ih lgkf`dn
gqdlfjd{fij. kfdejipfp. {rgd{lgj{ ir agdn{a rg`irkp {ariwea {ag Fj{grjg{ ir dj fjhirld{fij
{g`ajiniev kgxf`g padnn og nfdong {i {gl}irdrv kg{gj{fij ir fl}rfpijlgj{*
Dr{f`ng !1&
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 10/20
Djvijg uai fj{gj{fijdnnv djk wjnduhwnnv gdxgpkri}p. ir rg`gfxgp ir fj{gr`g}{p
`illwjf`d{fij {rdjplf{{gk d`ripp {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g padnn og
nfdong {i fl}rfpijlgj{ djk d hfjg ir gf{agr*
Dr{f`ng !44&
Djvijg uai wpgp {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g {i wjnduhwnnv d``gpp {ag
jwlogr ir kg{dfnp ih d `rgkf{ `drk ir i{agr gng`{rijf` `drk padnn og nfdong {i fl}rfpijlgj{
djk d hfjg* Fh {ag ihhgj`g fp `illf{{gk uf{a fj{gj{ {i d`twfrg {ag }ri}gr{v ir dxdfn ih {ag
pgrxf`gp ih dji{agr {ag }gjdn{v fp fl}rfpijlgj{ hir d }grfik ih d{ ngdp{ 8 lij{ap djk d hfjg
ir gf{agr* Fh {ag }ri}gr{v ih dji{agr fp d}}ri}rfd{gk hir {ag d``iwj{ ih {ag }gr}g{rd{ir ir
pilgijg gnpg {ag }gjdn{v fp fl}rfpijlgj{ hir d{ ngdp{ 4 vgdr djk d hfjg ih d{ ngdp{ DGK
0=.=== ir gf{agr*
Dr{f`ng !4?&
Djvijg uai }rikw`gp. drrdjegp. pgjkp ir p{irgp uf{a fj{gj{ ih wpfje. ̀ fr`wnd{fje ir ihhgrfje.
{ariwea {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g. fjhirld{fij {ad{ fp ̀ ij{rdrv {i
}wonf` lirdnp ir i}grd{gp d xgjwg hir pw`a }wr}ipg padnn og nfdong {i fl}rfpijlgj{ djk d
hfjg ir gf{agr*
Fh {ag d`{ fp ̀ illf{{gk dedfjp{ d lfjir. {ag }gjdn{v padnn og fl}rfpijlgj{ hir d }grfik ih d{
ngdp{ 8 lij{ap djk d hfjg ih ji{ ngpp {adj DGK 0=.===*
Dr{f`ng !40&
[ag }gjdn{v padnn og fl}rfpijlgj{ djk d hfjg hir uaigxgr fj`f{gp nwrgp ir dppfp{p d ldng ir
hgldng fj{i ̀ illf{{fje dj d`{ ih }rip{f{w{fij ir hirjf`d{fij ov lgdjp ih {ag Fj{grjg{ ir dj
fjhirld{fij {g`ajiniev kgxf`g*
Fh {ag xf`{fl fp d lfjir. {ag }gjdn{v padnn og fl}rfpijlgj{ hir d{ ngdp{ 7 vgdrp djk d hfjg*
Dr{f`ng !4;&
D }grpij uai wjnduhwnnv niefj {i dj Fj{grjg{ ugopf{g fj irkgr {i ̀ adjeg. kgng{g. kgp{riv. ir
likfhv f{p kgpfej ir {dbg ixgr f{p dkkrgpp padnn og nfdong {i fl}rfpijlgj{ djk d hfjg ir gf{agr*
Dr{f`ng !47&
[ag }gjdn{v ih fl}rfpijlgj{ djk d hfjg ir gf{agr d}}nfgp {i uaigxgr ̀ illf{p djv ih {ag
hinniufje ihhgj`gp {ariwea {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g3
4* Dowpg ih dj Fpndlf` ainv parfjg ir rf{wdn
?* Dowpg ih d ainv parfjg ir rf{wdn ih djv i{agr rgnfefij uagrg pw`a parfjg ir rf{wdn fp
}ri{g`{gk wjkgr Fpndlf` Padrfd
0* Kghdld{fij ih djv ih {ag kfxfjg rgnfefijp
;* Enirfhf`d{fij. fj`f{glgj{ ir }rili{fij ih urijekifje
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 11/20
[ag }gjdn{v padnn og fl}rfpijlgj{ hir w} {i 5 vgdrp hir dj ihhgj`g fjxinxfje i}}ipf{fij {i
Fpndl ir fjcwrv {i {ag {gjg{p djk }rfj`f}ngp ih Fpndl. i}}ipf{fij ir fjcwrv {i {ag gp{donfpagk
}rd`{f`gp ih Fpndl. }rgcwkf`g {i Fpndl. {ag orgd`afje ih d rgnfefij i{agr {adj Fpndl ir {ag
}ri}ded{fij. dkxi`d`v ir }rili{fij ih djv kfp`f}nfjg ir fkgd ih pw`a jd{wrg*
Dr{f`ng !45&
D }grpij uai pg{ w}p d ugopf{g ir }wonfpagp fjhirld{fij ij {ag Fj{grjg{ ir dj fjhirld{fij
{g`ajiniev kgxf`g hir {ag }wr}ipg ih `ijkw`{fje ir hd`fnf{d{fje awldj {rdhhf`bfje padnn og
nfdong {i {gl}irdrv kg{gj{fij*
Dr{f`ng !41&
D }grpij uai pg{p w} d ugopf{g ir }wonfpagp fjhirld{fij ij {ag Fj{grjg{ ir dj fjhirld{fij
{g`ajiniev kgxf`g hir {ag }wr}ipg ih pgnnfje ir hd`fnf{d{fje {ag {rdkg ih jdr`i{f`p. lfjk
dn{grfje pwop{dj`gp djk {ag nfbg fj i{agr {adj ngednnv }rgp`rfogk ̀ fr`wlp{dj`gp padnn og nfdong
{i {gl}irdrv kg{gj{fij*
[ag afeanfea{gk }dr{p ih {ag {gq{ jggk {i og `ndrfhfgk hwnnv dedfjp{ f{p ngedn fj{gr}rg{d{fij*
Hwr{agrlirg. [dong 4* paiup uaf`a dr{f`ngp jggk {i hwr{agr cwp{fhf`d{fij oi{a fj {grlp ih hfjg
dliwj{ djk fl}rfpijlgj{*
[dong 4* Dr{f`ngp jggk cwp{fhf`d{fij fj {grlp ih Hfjg ( Fl}rfpijlgj{
Fl}rfpijlgj{HfjgDr{f`ng !#&
Ji{ `ngdrJi{ `ngdr?
Ji{ `ngdrJi{ `ngdr;
Ji{ `ngdrJi{ `ngdr7
Ji{ `ngdr@ngdr8
Ji{ `ngdr,5
Ji{ `ngdrJi{ `ngdr1
@ngdrJi{ `ngdr44
Ji{ `ngdrJi{ `ngdr4?
Ji{ `ngdrJi{ `ngdr40
Ji{ `ngdrJi{ `ngdr4;
@ngdrJi{ `ngdr47
Ji{ `ngdr,45
Ji{ `ngdr,41
Piwr`g3 ]grpijdn p{wkv
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 12/20
Lirgixgr. {ag `wrrgj{ D`{ `ij{dfjp ji p}g`fhf` dr{f`ng {ad{ `ngdrnv kg`ndrgp fh {afp D`{ d}}nfgp
{i gq}d{rfd{gp nfxfje fj {ag Wjf{gk Drdo Glfrd{gp ir ji{* F{%p ji{dong {ad{ {ag uirk /lfjir/
adp oggj lgj{fijgk ijnv {uf`g {ariwea {afp D`{ p}g`fhf`dnnv fj dr{f`ngp !4?& ( !40& fj `dpg ih
{ad{ {ag lfjir udp {ag xf`{fl* Ow{ uad{ fh {ag /lfjir/ udp {ag }gr}g{rd{ir aflpgnh9 [afp
lgdjp {ad{ dnn {v}gp ih `rflgp lgj{fijgk fj {ag D`{ drg ji{ d}}nf`dong {i lfjirp$ Kigp
{ad{ d}}nv {i rgdnf{v9 Djk aiu paiwnk {agpg lfjir ihhgjkgrp og {rgd{gk djk }wjfpagk9
Ji{ djv ih {ag dr{f`ngp kfp`wppgk {ag fppwg ih `ripp oirkgr `vogr`rflg* Uad{ fh {ag
}gr}g{rd{ir udp hril iw{pfkg {ag WDG9 Uad{ }ri`gkwrgp paiwnk og {dbgj djk uad{ uiwnk
og {ag }wjfpalgj{ hir pw`a pf{wd{fij9
Fjkggk. {agrg fp ji pfjeng dr{f`ng {ad{ `rflfjdnfsgp lfjirp fj `dpg {agv `illf{ djv {v}g ih
`rflgp }rgpgj{gk fj {ag D`{* Dp ugnn dp. f{ fp {rwg {ad{ jijg ih {ag dr{f`ngp }rgpgj{gk fj {ag
`vogr`rflg D`{ ̀ ngdrnv kgp`rfog djv bfjk ih `il}gjpd{fij hir ̀ vogr`rflg xf`{flp*
]rixfkfje {ad{. {agrg drg ji `ngdr ogj`aldrbp ir p{wkfgp kg{grlfjg {ag ghhg`{fxgjgpp ih {afp
ndu djk {ag rgpwn{p d`afgxgk pfj`g f{ udp }nd`gk fj{i wpg* Dp `vogr`rflgp `dj og oridknv
`d{geirfsgk fj{i {argg ̀ d{geirfgp jdlgnv, ̀ rflgp dedfjp{ }grpijp. }ri}gr{v djk eixgrjlgj{.
{ag gqfp{fje ndu kigp ji{ }rixfkg pwhhf`fgj{ `ixgrdeg dedfjp{ lirg rg`gj{ `il}w{gr,rgnd{gk
`rflgp pw`a dp3
4* Dedfjp{ }grpijp3
Kghdld{fij
@vogr,p{dnbfje
Adrdpplgj{ {ariwea g,ldfn
Fjkg`gj{ gq}ipwrg
?* Dedfjp{ }ri}gr{v3
[rdjplf{{fje xfrwp. uirl. [ricdj ir p}vudrg
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 13/20
@il}w{gr xdjkdnfpl
Ad`bfje)`rd`bfje
Xfind{fij ih fj{gnng`{wdn }ri}gr{v rfea{
]afpafje
Ijnfjg edlonfje
0* Dedfjp{ iredjfsd{fijp3
Ad`bfje ( @rd`bfje
[rdjplf{{fje xfrwp. uirl. [ricdj ir p}vudrg
Kfp{rfow{fij ih }frd{gk pih{udrg
Kfp`rgkf{d{fij
@vogr {grrirfpl dedfjp{ {ag eixgrjlgj{ iredjfsd{fij
Xfind{fij ih fj{gnng`{wdn }ri}gr{v rfea{
D``irkfje {i {ag }ifj{p p{d{gk doixg. {agpg }ifj{p paiwnk og {dbgj fj{i d``iwj{ fh djv
`ilfje dlgjklgj{ ad}}gjp fj {ag hw{wrg dp lirg djk lirg pi}afp{f`d{gk {v}gp ih `rflg
drg kgxgni}fje gxgrv kdv* P}gdbfje d{ Dwp@G_[ ?=44. Bdp}grpbv Ndop hiwjkgr djk pg`wrf{v
gq}gr{. Gwegjg Bdp}grpbv drewgk {ad{ /`vogr`rflg jiu fp {ag pg`ijk ndregp{ ̀ rflfjdn d`{fxf{v
fj {ag uirnk/ !Odruf`b. ?=44&* Dp `vogr`rflg udp }rixfje kfhhf`wn{ {i hfea{ kwg {i d
`ilofjd{fij ih f{p pg`rg{fxg jd{wrg djk wjkgreriwjk hirwlp dnije uf{a d nd`b ih
`ii}grd{fij og{uggj fj{grjd{fijdn dj{f,`vogr`rflfjdn }inf`g hir`gp !Odruf`b. ?=44&*
Aiugxgr. f{ fp p{fnn rg`illgjkgk {i adxg hgu lirg dlgjklgj{p fj irkgr {i fj`nwkg gq}nf`f{
{i}f`p pw`a dp xfrwpgp. ldnudrg. ijnfjg edlonfje. Kd{d kfkknfje djk p}dl gldfn d{{d`bp
uaf`a drg `ijpfkgrgk dp {ag ldfj li{fxgp ogafjk {ag `vogr `rflfjdnp jiudkdvp kwg {i f{p
aweg hfjdj`fdn rg{wrjp !Kuvgr. ?=4=. Ai}bfjp. ?==0&* D``irkfje {i Kuvgr !?=4=&. kgdnfje
uf{a `vogr`rflgp rgtwfrgp kg`fpfxg pg`wrf{v dudrgjgpp* [ag Lfkkng Gdp{ rgefij. gp}g`fdnnv
Ewnh @ii}grd{fij @iwj{rfgp fj`nwkfje {ag Wjf{gk Drdo Glfrd{gp. nd`b ldjv ih {ag dudrgjgpp
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 14/20
}rierdlp. {rdfjfje djk gkw`d{fij fj {ag hfgnk ih `vogr`rflg kwg {i {ag nd{g fj{grgp{ fj {afp
{i}f`* Uf{a pwhhf`fgj{ {rdfjfje }rierdlp djk `dl}dfejp djk {ag fjxinxglgj{ ih }dr{fgp
p{dr{fje hril F[ }rihgppfijdnp. {i iredjfsd{fijp‖ kg`fpfij ldbgrp djk dnpi {ag egjgrdn }wonf`.
{ag ngxgn ih dudrgjgpp ufnn erdkwdnnv fj`rgdpg uaf`a fj {wrj ngdkp afeagr ngxgnp ih }ri{g`{fij
{ad{ wpgrp lfea{ {dbg fj{i `ijpfkgrd{fij*
I}}ir{wjf{fgp
[ag Wjf{gk Drdo Glfrd{gp gjcivp ergd{ g`ijilf` }ipf{fij dlije i{agr `iwj{rfgp fj {ag
Lfkkng Gdp{ rgefij uaf`a rgtwfrgp agr {i {dbg p{rijegr djk twf`bgr p{g}p {i wpg dnn dxdfndong
i}}ir{wjf{fgp {i fl}rixg f{p `wrrgj{ @vogr Ndu p{d{wp {i fj`rgdpg {ag ngxgn ih pg`wrf{v fj d
hgr{fng gjxfrijlgj{ rg}ng{g uf{a g,owpfjgppgp* Dp kfp`wppgk gdrnfgr fj {ag p{rgje{ap pg`{fij.
djk dp }rixfkgk ov _iogr{ g{ dn* !?=4=&. {ag `iwj{rv `iwnk d{{rd`{ d lirg kfxgrpg g`ijilf`
gjxfrijlgj{ {i {dbg }nd`g {ad{ pw}}ir{p oi{a `ijpwlgrp djk iredjfsd{fijp }grhirlfje
gng`{rijf` owpfjgppgp* [agrghirg. uf{a lirg pinfk djk p}g`fhf` kghfjgk `vogr`rflg ndup. {ag
`iwj{rv ̀ iwnk d{{rd`{ lirg gng`{rijf` odpgk pgrxf`gp*
[ag eixgrjlgj{ p{fnn adp {ag `adj`g {i w}kd{g f{p `vogr ndu djk ldbg {ag jg`gppdrv
dlgjklgj{p {i ̀ ixgr djv nii}aingp djk fj`nwkg jgu pi}afp{f`d{gk {i}f`p djk i{agr {v}gp ih
w}`ilfje `vogr`rflgp* Pgxgrdn p{g}p adxg oggj {dbgj* [ag Lfjfp{rv ih Cwp{f`g. fj irkgr {i
`ilod{ `vogr`rflg fj {ag WDG. jgu /@vogr`rflg/ `iwr{p uf{a p}g`fdnfp{ cwkegp adxg oggj
gp{donfpagk {i gq}gkf{g nf{fed{fij djk pgrxg nf{fedj{p lirg ghhg`{fxgnv !Sdudvd*`il. ?=4=&*
Djk. {ag `rgd{fij ih d @il}w{gr Glgregj`v _gp}ijpg [gdl !dg@G_[& hir {ag kg{g`{fij djk
}rgxgj{fij ih `vogr`rflg fj {ag `iwj{rv ufnn agn} fl}rixg {ag ghhf`fgj`v djk {ag ghhg`{fxf{v
ih {ag `wrrgj{ ndu* Fj dkkf{fij. aip{fje fj{grjd{fijdn `ijhgrgj`gp ufnn agn} {ag WDG
eixgrjlgj{ ogjghf{ hril fj{grjd{fijdn gq}gr{fpg uaf`a ufnn `ij{rfow{g fj oiip{fje {ag ngxgn
ih bjiungkeg rgnd{gk {i `vogr pg`wrf{v djk }rixfkg d``gpp {i {ag nd{gp{ hfjkfjep djk rgpwn{p
fj {ag hfgnk ih `vogr pg`wrf{v*
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 15/20
/D pinw{fij {i {ag }riongl lfea{ og {ad{. fj dkkf{fij {i adxfje }inf`g degj`fgp fjxgp{fed{g
`vogr`rflg. dj Fj{grjg{ Fj{gr}in !fj{grjd{fijdn }inf`g& `iwnk og gp{donfpagk*/ ,, Bdp}grpbv
hiwjkgr Gwegjg Bdp}grpbv
Ijg ih {ag pweegp{gk pinw{fijp {i pniu kiuj ir p{i} {ag fj`rgdpfje eriu{a ih `vogr`rflgp fp
dj ijnfjg !FK& fkgj{fhf`d{fij {i xgrfhv }gi}ng gjedefje fj pw`a d`{p* [ag hiwjkgr ih Bdp}grpbv
pweegp{gk {ad{ !Odruf`b. ?=44&*
@vogr`rflgp drg jiu p}rgdk uirnkufkg djk {agrg fp ji pfjeng `iwj{rv {i og `ijpfkgrgk
fllwjg dedfjp{ f{* [agrg adp oggj d `ijpfkgrdong eriu{a fj `vogr`rflgp fj {ag Lfkkng Gdp{
kwrfje {ag ndp{ `iw}ng ih vgdrp* [afp eriu{a adp rgpwn{gk hril nd`b ih rgewnd{fijp. {rdfjfjep
djk dudrgjgpp* WDG paiwnk {dbg {afp i}}ir{wjf{v {i owfnk lirg pinfk odpg hir {agfr
`vogr`rflg `iwr{p {ariwea {rdfjfjep djk iredjfsfje dudrgjgpp `dl}dfejp {ariweaiw{ {ag
jd{fij hir }rihgppfijdnp djk egjgrdn }wonf` !Kuvgr. ?=4=&*
[agv `iwnk dnpi fj{rikw`g p}g`fdn `gr{fhf`d{fijp uf{a dnnfdj`g {i uirnkufkg p{djkdrkp fj {ag
kfef{dn hirgjpf`p hfgnk djk kgxgni} p{rijegr `vogr`rflg bjiungkeg odpg* [afp `iwnk dnpi ngdk
{ag WDG {i og {ag ngdkgr fj {ag rgefij djk dppfp{ i{agr eixgrjlgj{p {i kgxgni} pflfndr ndup
djk p{rd{gefgp fj kghgjkfje dedfjp{ {ag `vogr`rflgp* Fj dkkf{fij. f{ `iwnk og d p{dr{ {i
`rgd{fje d `vogr`rflg `ijxgj{fij {i og{{gr kghfjg fj{grjd{fijdn `ii}grd{fij !Ai}bfjp.
?==0&* Ndp{ ow{ ji{ ngdp{. }wonf` djk }rfxd{g iredjfsd{fijp paiwnk owfnk {agfr pg`wrf{v }inf`fgp djk
`vogr pg`wrf{v dudrgjgpp }rg`dw{fijp fj adrlijv uf{a {ag eixgrjlgj{%p }ndjp djk
p{rd{gefgp fj irkgr {i ̀ rgd{g d pdhg ̀ vogr ̀ illwjf{v*
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 16/20
[argd{p
[ag [gng`illwjf`d{fijp _gewnd{irv Dw{airf{v ![_D& adp kijg d pwrxgv kwrfje {ag `iwrpg ih
?=4= ![_D*eix*dg. ?=4=& rg}ir{fje {ad{ {ag jwlogr ih fj{grjg{ wpgrp fj {ag `iwj{rv udp
gp{fld{gk {i 87' ih {ag }i}wnd{fij djk {ag rd{fi `dj fj`rgdpg pfejfhf`dj{nv* [afp lgdjp {ad{
adnh ih {ag WDG }i}wnd{fij fp }rijg {i {ag rfpb ih `vogr`rflg. gp}g`fdnnv ni{p ih ad`bfje {iinp
drg hrggnv dxdfndong djk kiujnidkdong hril {ag Fj{grjg{* Fj dkkf{fij. pnweefpa
rgp}ijpfxgjgpp fj {dbfje `irrg`{fxg d`{fijp {i `ixgr {ag gqfp{fje nii}aingp fj {ag `wrrgj{ ndu
uiwnk rgpwn{ fj jged{fxg ̀ ijpgtwgj`gp*
Fjhirld{fij rgxinw{fij grd ldbgp f{ gxgj gdpfgr hir ad`bgrp {i padrg ad`bfje kg{dfnp djk
{g`ajftwgp* [afp }rikw`gp d lirg pbfnngk orggk ih @vogr @rflfjdnp {ad{ `ij{fjwiwpnv
fj{rikw`g jgu {v}gp ih `rflgp uaf`a ngdxg eixgrjlgj{p ogafjk fj `i}fje uf{a {g`ajiniev
rgnd{gk ndup !Eaipa. ?=4=&* Kwg {i {ag nd`b ih {ag dudrgjgpp kfp`wppgk gdrnfgr. ldjv ih {ag
xf`{flp drg wjufnnfje {i rg}ir{ `vogr`rflgp* [agrghirg. gkw`d{fje }gi}ng ij aiu {i kgdn uf{a
`vogr`rflgp d{ {ag {flg ih i``wrrgj`g fp jg`gppdrv {i ldbg wpgrp rg}ir{ pw`a fj`fkgj{p* [afp
`iwnk agn} [_D rg`iejfsg lip{ hrgtwgj{nv `illf{{gk `rflgp djk {agfr {flg ih i``wrrgj`g
djk {i }rikw`g fl}ir{dj{ p{d{fp{f`dn pwrxgvp {ad{ ̀ iwnk agn} hfea{ pw`a ̀ rflgp*
@ij`nwpfij
[ag `vogr,uirnk fp hwnn ih fllgkfd{g `adjegp {ad{ `dj%{ og }rgkf`{gk* Dp d rgpwn{. dnn `vogr
ndup drg nflf{gk* Pfj`g `vogr ndup drg nflf{gk. f{ lwp{ og w},{i,kd{g djk jggk `ij{fjwiwp
fl}rixglgj{ djk hinniu,w}* D``irkfjenv. WDG ̀ vogr ndu adp {i og dlgjkgk {i fj`nwkg i{agr
{v}gp ih ̀ il}w{gr,rgnd{gk ̀ rflgp nfbg `vogr,p{dnbfje. gldfn adrdpplgj{ djk kghdld{fij*
Pflfndrnv. {ag dhirglgj{fijgk dr{f`ngp fj [dong 4* jggk lirg `ndrfhf`d{fij djk cwp{fhf`d{fij fj
{grlp ih hfjg djk fl}rfpijlgj{ {i lfpp w} {ag i}}ir{wjf{v ij ndu orgdbgrp {ariwea
ogj`aldrbfje uf{a i{agr `vogr`rflg ndup ih i{agr `iwj{rfgp nfbg {ag Wjf{gk P{d{gp. {ag
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 17/20
Wjf{gk bfjekil djk Fjkfd* Hwr{agrlirg. {ag `ij`g}{ ih {ag }gr}g{rd{ir !ihhgjkgr& adp {i og
rgkghfjgk {i fj`nwkg lfjirp ji{ ijnv dkwn{p. {dbfje fj{i `ijpfkgrd{fij {ag p`i}g ih {ag ndu*
Fj hd`{ {afp rgpgdr`a }d}gr fp ijg ih {ag hgu }d}grp fh ji{ {ag ijnv {ad{ fp urf{{gj ij {ag WDG
`vogr`rflg ndu. {agrghirg. f{ fp dkxfpgk {ad{ lirg p{wkfgp jggk {i og kijg ij {afp ndu {i
pad}g kfhhgrgj{ xfgup djk hir og{{gr iw{`ilgp*
Hfjdnnv. f{ `dj og pdfk. {ad{ {agrg drg `iwj{rfgp kifje oink lixgp fj kgxgni}fje {agfr iuj
jd{fijdn }inf`fgp djk ndup {i kghgjk dedfjp{ {afp jgu {v}g ih g,`rflg `ilfje hril {ag `vogr
uirnk* Djk {ag Wjf{gk Drdo Glfrd{gp fp ijg ih {agpg `iwj{rfgp* Doixg dnn. {ag WDG pggbp {i
og }rid`{fxg dp {ag `iwj{rv fp {arfxfje g`ijilf`dnnv. uaf`a rgtwfrgp {ag p{d{g {i owfnk d pdhg.
pg`wrg. djk pw}}ir{fxg gjxfrijlgj{ hir gng`{rijf` odpgk pgrxf`gp*
Hw{wrg Uirb
[afp }d}gr paiwnk og hinniugk ov lirg djdnv{f`dn p{wkfgp {ad{ ufnn `ij{rfow{g {i {ag
gq}ndjd{fij ih {ag dr{f`ngp lgj{fijgk fj {ag ̀ vogr ndu ih {ag WDG*
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 18/20
_ghgrgj`gp
Dg`gr{*dg* !?==8. Cdj 0=&* [ag Hgkgrdn Ndu Ji* !?& ih ?==8 ij [ag ]rgxgj{fij ih
Fjhirld{fij [g`ajiniev @rflgp* _g{rfgxgk hril
a{{}3))uuu*dg`gr{*dg)}rgxgj{fijih{g`a`rflgp*}a}
Dlgfjhi*`il* !?==1. Kg` ?6&* Sdvgk Wjfxgrpf{v ndwj`agp gfea{ jgu erdkwd{g }rierdlp fj
`inndoird{fij uf{a fj{grjd{fijdn wjfxgrpf{fgp*_g{rfgxgk hril
a{{}3))uuu*dlgfjhi*`il)4561?;*a{ln
Ogkjdrpbf. E*. @agj. ]*. @agj. B*. Cixdjixf`a. D*. Ipldj. A* !?==0&* Fj{grjd{fijdn
@vogr`rflg3 Ndu. [rgjkp. djk [rgd{fgp* !}* ?0&
Odruf`b. A* !?=44. Ldv 45&* Dwp@G_[ ?=443 Gwegjg Bdp}grpbv `dnnp hir Fj{grjg{ Fj{gr}in*
_g{rfgxgk hril
a{{}3))uuu*`il}w{gruirnk*`il*dw)dr{f`ng)01856=)dwp`gr{Y?=44YgwegjgYbdp}grpbv
Y`dnnpYfj{grjg{Yfj{gr}inY)
@adj. J*. @irijgn. P*. ( @afd{ Ije. V* !?==0&* [ag [argd{ ih {ag @vogr`rflg D`{ ?==4 {i
Dwp{rdnfdj F[ ]rihgppfijdnp* ]ri`ggkfjep ih {ag [ag Hfrp{ Dwp{rdnfdj Wjkgrerdkwd{g
P{wkgj{p% @il}w{fje @ijhgrgj`g !}}* ?7,00&*
@ndrb. J* !?=44. Ldr`a 6&* Owpfjgpp `iwj{p {ag `ip{ ih `vogr `rflg* _g{rfgxgk hril
,hgd{wrgp)owpfjgpp,djk,a{{}3))uuu*fjkg}gjkgj{*`i*wb)jgup)owpfjgpp)djdnvpfp
??08471*a{ln,`rflg,`vogr,ih ,`ip{,{ag,p`iwj{
Kuvgr. ]* !?=4=&* @vogr @rflg fj {ag Lfkkng Gdp{ * _g{rfgxgk hril uuu*}dwn`kuvgr*`il
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 19/20
Eaipa. P* !?=4=&* @vogr`rflgp3 D Lwn{fkfp`f}nfjdrv Djdnvpfp* Jgu Virb3 P}rfjegr*
Adrngv. O* !?=4=. Ldr`a ?0&* D Eniodn @ijxgj{fij ij @vogr`rflg9*_g{rfgxgk hril
`vogr`rflg),ij,`ijxgj{fij,eniodn,a{{}3))uuu*p{nr*ire)?=4=)=0)d
Ai}bfjp. Padjjij N* !?==0&* @vogr`rflg @ijxgj{fij3 D ]ipf{fxg Ogefjjfje {i d Nije _idk
Dagdk * C* Afea [g`a* N*. ?!4&. 4=4,4??*
Badnggc{flgp*`il* !?==8. Dwe ?7&* ?=? jd{fijdnf{fgp fj ndoiwr ldrbg{* _g{rfgxgk hril
a{{}3))uuu*badnggc{flgp*`il)Kfp}ndvDr{f`ngJgu*dp}9pg`{fij<{agwdg(qhfng<kd{d){ag
wdg)?==8)dwewp{){agwdgYdwewp{507*qln
Nfgogrldj. K* !?=44. Ldr`a 8&* @vogr @rflg @ip{p Ixgr +4 [rfnnfij Eniodnnv9* _g{rfgxgk hril
,4,Ixgr,@ip{p,@rflg,ogr@v,a{{}p3))uuu*fjhipg`fpndjk*`il)oniexfgu)4?07?
Eniodnnv*a{ln,[rfnnfij
Nwjcgxf`a. L*. Dn Padfba. I* !?=4=. Cdj 41&* WDG [i Gp{donfpa P}g`fdnfp{ @vogr`rflg ̀ iwr{p*
_g{rfgxgk hril
a{{}3))uuu*sduvd*`il)P{irv*`hl)pfkSDUVD?=4==441=1777?)WDG'?=[i'?=Gp{do
nfpa'?=P}g`fdnfp{'?=@vogr`rflg'?=@iwr{p)
_iogr{. G*. Ibijfegjg. ( Oind. Dkgbdjng* !?=4=&* @vogr`rflg fj Jfegrfd* Owpfjgpp Fj{gnnfegj`g
Ciwrjdn * 0!4&. 60,6
]ngugp. D* !?=4=. Ldv ?4&* @vogr`rflg ̀ ip{p WDG gj{gr}rfpgp +?l gd`a vgdr* _g{rfgxgk hril
,gj{gr}rfpgp,wdg,`ip{p,owpfjgpp*`il)nfxg)?=4=)=7)`vogr`rflg,a{{}3))oniep*irdjeg
vgdr*a{ln,gd`a,?l
[_D*eix*dg* !?=4=&* F@[ fj {ag WDG* _g{rfgxgk hril
a{{}3))uuu*{rd*eix*dg)kiujnidk*}a}9hfngjdlg<F@[YPwrxgv'?=Gjenfpa'?=?=4=*}kh
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition
http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 20/20
[agjd{fijdn*dg* !?=4=. Pg} ?1&* Sdvgk Wjfxgrpf{v {i aip{ `vogr,`rflg ̀ ijhgrgj`g_g{rfgxgk
,aip{,{i,wjfxgrpf{v,jgup)gkw`d{fij)sdvgk,a{{}3))uuu*{agjd{fijdn*dg)jgup)wdghril
`ijhgrgj`g,`rflg,`vogr
WDGfj{grd`{*`il* !?==5. D}rfn 7&* WDG `rgd{gp {gdl {i hfea{ `vogr `rflg* _g{rfgxgk hril
a{{}3))uuu*wdgfj{grd`{*`il)ki`p)WDGY`rgd{gpY{gdlY{iYhfea{Y`vogrY`rflg)?;86=*
a{l