uae cyber crime law swot analysis (talal al ismail) - 3rd edition

20
7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 1/20 [ DNDN DN FPLDFN S DVGK W JFXG_PF[V LDV ?=4? PUI[ Djdnvpfp3 W*D*G @vogr Ndu 

Upload: miozzoni-concepts

Post on 11-Feb-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 1/20

[DNDN DN FPLDFN 

SDVGK WJFXG_PF[V

LDV ?=4? 

PUI[ Djdnvpfp3  W*D*G @vogr Ndu 

Page 2: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 2/20

 Dop{rd`{ 

[afp }d}gr dflp d{ gl}adpfsfje {ag fl}ir{dj`g ih {ag WDG `vogr`rflg ndu gjd`{gk fj Cwjg

?==8* Fj {afp }d}gr. d PUI[ djdnvpfp ih {ag WDG `vogr`rflg ndu fp `ijkw`{gk {i fkgj{fhv {ag

fj{grjdn hd`{irp !p{rgje{a djk ugdbjgppgp& djk gq{grjdn hd`{irp !i}}ir{wjf{fgp djk {argd{p&*

F{ fp hiwjk {ad{ pilg dr{f`ngp ih {ag WDG `vogr`rflg ndu `ij{dfj pilg kghf`fgj`fgp oi{a fj

kghfjfje fl}rfpijlgj{ }grfik djk hfjg xdnwg* Hir {afp }wr}ipg. f{ fp pweegp{gk {i ogj`aldrb

uf{a i{agr `vogr`rflg ndup ih i{agr `iwj{rfgp nfbg {ag Wjf{gk P{d{gp. {ag Wjf{gk Bfjekil

djk Fjkfd fj irkgr {i `ndrfhv djk w}erdkg djv lfppfje }ifj{p uaf`a ufnn rgpwn{ fj d ndu {ad{

`illgjpwrd{g uf{a {ag }riergpp eifje fj {ag hfgnk ih `vogr`rflg*

Page 3: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 3/20

Fj{rikw`{fij

Kgp}f{g {ag afea ngxgnp ih {g`ajinief`dn dkxdj`glgj{ {ag uirnk adp rgd`agk {ikdv fj

lwn{f}ng kildfjp2 p{dr{fje hril {ag p}rgdk ih Fj{grjg{. pi`fdn jg{uirbfje pf{gp. XiF]. `niwk

`il}w{fje. dkxdj`gk {gng`illwjf`d{fijp. djk i{agr likgrj {g`ajinief`dn {rgjkp2

aiugxgr. {afp }riergpp fp p{fnn ihhpg{ ov d }drdnngn pair{`ilfje fj {ag kgxgni}lgj{ ih {grlp

djk ndup {ad{ `ij{rin {ag wpg ih {ag dhirglgj{fijgk {g`ajiniefgp. gp}g`fdnnv {ag ngefpnd{fxg

}rixfpfijp {ad{ `ij{rin {ag wpg ih {ag Fj{grjg{* F{ fp ugnn bjiuj jiu. {ad{ {ag Fj{grjg{ fp ji

nijegr d pdhg gjxfrijlgj{ {i {rwp{ ir wpg* Lirgixgr. pwrhfje {ag Fj{grjg{ adp og`ilg wjpdhg

kwg {i {ag }rinfhgrd{fij ih `vogr`rflg* Uagrgdp d rg`gj{ p{wkv ov L`Dhgg !?==6& pdvp /[ag

`ip{ ih @vogr @rflg adp rgd`agk +4 {rfnnfij eniodnnv/ !Nfgogrldj. ?=44&* Agj`g. {ag

fl}ir{dj`g ih hfjkfje d wjfxgrpdn ngedn hirlwnd {i dkcwp{ {agpg ̀ rflgp fp afeanv jggkgk*

[ag Owkd}gp{ !?==4& @ijxgj{fij ij @vogr`rflg krdh{gk {ag hfrp{ /Fj{grjd{fijdn @vogr @rflg

[rgd{v/ {ad{ adk oggj rd{fhfgk ov lirg {adj ;8 `iwj{rfgp driwjk {ag uirnk !Adrngv. ?=4=&*

[agpg `ij`gr{gk ghhir{p rghng`{ {ag jggk hir pw`a ndup {i agn} }rgxgj{ eriu{a fj `ripp,

oirkgr `vogr`rflgp djk agn} pg`wrg {ag eriu{a fj ngef{fld{g `ripp,oirkgr `il}w{fje*

Wjdhhg`{gk ov egierd}af`dn oiwjkdrfgp. `vogr`rflgp ijnv pggl {i og eg{{fje uirpg dp

avorfk {argd{p. ad`b d{{d`bp. djk {ag rgdn }ippfofnf{v ih `vogr {grrirfpl `ij{fjwg {i adwj{

gj{gr}rfpgp djk eixgrjlgj{ oikfgp driwjk {ag eniog*

Fj {ag Lfkkng Gdp{. {ag lip{ `wrrgj{ djk ufkgnv dowpgk `vogr`rflg fp fj{gnng`{wdn }ri}gr{v

djk pih{udrg }rfxd`v* Ij {ag i{agr adjk. uagj {dnbfje doiw{ ndup eixgrjfje `vogr`rflg fj

{ag Lfkkng Gdp{ {agv drg `nipg {i jij,gqfp{gj`g dp lip{ ih {agpg `iwj{rfgp adxg {rdjpnd{gk

`vogr`rflg fj{i dj djdnieiwp ihhnfjg `d{geirv ih ihhgjpg* Jijg{agngpp. hgu `iwj{rfgp fj

{ag Lfkkng Gdp{ pw`a dp Wjf{gk Drdo Glfrd{gp. Gev}{. djk Pdwkf Drdofd adxg krduj w} {agfr

iuj @vogr Ndup fj dj d{{gl}{ {i hfea{ {afp jgu {v}g ih `rflg !Ogkjdrpbf. @agj. @agj.

Cixdjixf`a. Ipldj. ?==0&*

Page 4: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 4/20

[ag hd`{ {ad{ {ag Wjf{gk Drdo Glfrd{gp fp ijg ih {ag ngdkfje `iwj{rfgp ih {ag Ewnh 

@ii}grd{fij @iwj`fn2 {ag W*D*G fp nfxfje f{%p g`ijilf` oiil uaf`a pgglp gxfkgj{ fj {ag

d}}nf`d{fij ih {ag nd{gp{ lgdjp ih {g`ajinief`dn pinw{fijp fj dnn udnbp ih nfhg* [afp lgdjp {ad{

{ag Wjf{gk Drdo Glfrd{g fp ji{ fllwjg dedfjp{ {ag drfpfje {argd{p `ilfje hril {ag `vogr

uirnk* [agrghirg. fj Cdj ?==8. {ag Wjf{gk Drdo Glfrd{gp kgxgni}gk djk }w{ {ieg{agr d hfrl

`vogr ndu fj rgp}ijpg {i `wrrgj{ djk }i{gj{fdn `vogr`rflgp !Dg`gr{*dg. ?==8&* Bjiufje {ad{

`vogr`rflg `ip{p {ag `iwj{rv +? lfnnfij d vgdr !]ngugp. ?=4=& djk {ag hfewrg adp {ag

}i{gj{fdn {i eriu* Adxfje d hfrp{ niib d{ {afp jwlogr uaf`a pgglp rgdnnv pldnn `il}drfje {i

i{agr `iwj{rfgp pw`a dp {ag WB uagrg {ag `ip{ ih `vogr`rflg gq`ggkp gq}g`{d{fijp ih +;0*7

ofnnfij d vgdr !@ndrb. ?=44&*

Pfj`g {ag Wjf{gk Drdo Glfrd{gp fp p{fnn jixf`g fj rgnd{fij {i {ag kgxgni}lgj{ ih p}g`fdn ndup

{ad{ `ij{rin wpg ih {ag Fj{grjg{. aiugxgr. {afp rgpgdr`a {rfgp {i {dbg d `nipg niib d{ {ag lip{

fl}ir{dj{ dp}g`{p ih {ag p{rgje{ap djk ugdbjgppgp {ad{ `adrd`{grfsg {afp D`{ djk

i}}ir{wjf{fgp hir kgxgni}lgj{ djk uad{ drg {ag }i{gj{fdn rfpbp rgpwn{fje hril hrgtwgj{

`adjegp fj {ag ̀ vogr uirnk*

Lg{aikiniev 

[ag rgpgdr`a ldfjnv d}}nfgp {ag PUI[ djdnvpfp d}}rid`a {i rg`iejfsg {ag gqfp{fje p{djk ih 

{ag WDG `vogr`rflg ndu* Dn{aiwea ji{ pi lw`a fjhirld{fij ij {ag WDG `vogr`rflg ndu fp

dxdfndong. aiugxgr. uad{gxgr fjhirld{fij {ad{ fp dxdfndong ij {ag Uirnk Ufnk Ugo !G,

Ciwrjdnp. Ldedsfjgp. Jgup}d}gr. g{`*.& fj rgnd{fij {i {ag pwocg`{ adp oggj `inng`{gk djk

djdnvsgk d``wrd{gnv* [ag PUI[ djdnvpfp `ijkw`{gk fjxinxgp {ui p{g}p* Ij ijg adjk. fkgj{fhv {ag fj{grjdn hd`{irp

!p{rgje{a djk ugdbjgppgp& djk gq{grjdn hd`{irp !i}}ir{wjf{fgp djk {argd{p& ih {ag WDG

Page 5: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 5/20

`vogr`rflg ndu* Ij {ag i{agr adjk. {ag djdnvpfp ih {agpg hd`{irp udp odpgk lgrgnv ij {ag

dw{air%p }grpijdn i}fjfij*

P{rgje{a

F{ fp uir{a lgj{fijfje {ad{ {ag WDG fp {ag hfrp{ `iwj{rv fj {ag Lfkkng Gdp{ rgefij {i dki}{

`vogr`rflg gjd`{lgj{. uf{a f{p @vogr`rflg Ndu Ji* ?. gjd`{gk fj Cwjg ?==8* Hir {ag

`ijpinfkd{fij ih {afp ndu. {ag WDG eixgrjlgj{ fp niibfje d{ udvp {i fjxinxg ni`dn wjfxgrpf{fgp

pi {agv }dr{jgr fj {ag }ri`gpp ih p}rgdkfje {ag `ij`g}{ ih `vogr pg`wrf{v {ariwea

gp{donfpafje d`dkglf` }rierdlp `gj{grgk ij `vogr pg`wrf{v {i agn} }rg}drg djk {rdfj d jgu

egjgrd{fij ih erdkwd{gp {ad{ fp dong {i wjkgrp{djk djk kgdn uf{a {afp jgu p`fgj`g hfgnk fj dnn

dp}g`{p* Hir fjp{dj`g. fj ?==1. Sdvgk Wjfxgrpf{v ndwj`agk d jgu erdkwd{g }rierdl {ad{

ihhgrp d ldp{gr kgergg fj Fjhirld{fij [g`ajiniev !P}g`fdnfsd{fij fj @vogr Pg`wrf{v& hi`wpgp

ij {ag kgxgni}lgj{ ih `ij`g}{p. bjiungkeg djk pbfnnp {ad{ ufnn gjdong pw``gpphwn

}dr{f`f}dj{p {i og`ilg gq}gr{p fj {ag drgd ih fjhirld{fij pg`wrf{v. fj{grjg{ `rflg

}rgxgj{fij. djk kfef{dn `rflg fjxgp{fed{fij !Dlgfjhi*`il. ?==1&* Lirgixgr. {ag

[gng`illwjf`d{fijp _gewnd{irv Dw{airf{v ![_D& rgdnfsgp {ag jggk hir pw`a ndu djk aiu f{

fp fl}ir{dj{ {i p{dv w},{i,kd{g fj {ag uirnk ih `vogr`rflg* Pfj`g {ag ngedn hrdlguirb ih {ag

ndu `ixgrp d eiik jwlogr ih kfhhgrgj{ `rflgp `d{geirfgp pw`a dp Awldj [rdhhf`bfje. Kd{d

Hiregrv ih }riafof{fxg kd{d. djk wjdw{airfsgk wpg djk fj{gr`g}{fij ih `il}w{gr pgrxf`gp* F{

fj`nwkgp }gjdn{fgp hir fl}rfpijlgj{ hir d {grl uaf`a ldv gq{gjk {i {gj vgdrp djk d hfjg w}

{i ?==.=== DGK* [ag D`{ dnpi p{rgppgp {ag rgp}g`{ hir rgnfefij djk {ag Fpndlf` fkgj{f{v ih {ag

p{d{g djk rgp}g`{ hir i{agr rgnfefijp dp d {i{dn ih ?=? kfhhgrgj{ jd{fijdnf{fgp gqfp{ fj {ag WDG

ndoir ldrbg{. d``irkfje {i {ag Wjkgr,Pg`rg{drv ih {ag Lfjfp{rv ih Ndoir !Badnggc{flgp*`il.

?==8&* Hir hwr{agr fnnwp{rd{fij. {ag WDG `vogr`rflg ndu fp `adrd`{grfsgk ov d pg{ ih dr{f`ngp

{ad{ `ixgr afeanv `rf{f`dn fppwgp* [agrgw}ij fj `il}drfpij uf{a {ag Pdwkf Drdofd!E@@

lglogr& `vogr`rflg ndu. f{%p hiwjk {ad{ {ag WDG `vogr`rflg ndu `ij{dfjp dr{f`ngp !5 ( 40&

Page 6: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 6/20

{ad{ `rflfjdnfsg `adjefje ir kgp{rivfje lgkf`dn {gp{. kfdejipfp. {rgd{lgj{ ir agdn{a`drg djk

fj`f{glgj{ {i }rip{f{w{fij djk kgodw`agrv wpfje {ag fj{grjg{ ir afea,{g`a lgdjp. uagrgdp

{ag Pdwkf ̀ vogr`rflg ndu kigpj%{ dkkrgpp ir ̀ ixgr {agpg fppwgp*

Nfbgufpg. {ag `vogr`rflg ndu ih Cirkdj kigpj%{ dkkrgpp ir `ixgr fppwgp rgnd{gk {i {ag

kghdld{fij ih kfxfjg rgnfefijp. `rgd{fje d ugopf{g ir }wonfpafje fjhirld{fij uf{a {ag dfl ih 

}rili{fje jdr`i{f`p. djk fnngedn {rdjphgr ih hwjkp rgpwn{fje hril lijgv ndwjkgrfje wpfje {ag

fj{grjg{ ir afea,{g`a lgdjp* Uafnp{ {ag `vogr`rflg ndu ih {ag WDG }ri`gppgp djk

`rflfjdnfsgp {ag dhirglgj{fijgk d`{p fj dr{f`ngp !47. 41. djk 46&* Hwr{agrlirg. uafng d hfjg fj

{ag `vogr`rflg ndu ih {ag WDG rgd`agp w} {i ?==.=== DGK. {ag xdnwg ih d hfjg fj {ag

`vogr`rflg ndu ih Cirkdj kigpj%{ gq`ggk ?8.=== DGK*

Kuvgr !?=4=& pw}}ir{p {ag fkgd {ad{ uf{a {ag fj`rgdpg fj `vogr,d{{d`bp djk {ag li{fxgp

ogafjk {agl. eixgrjlgj{p paiwnk og lirg gj`iwrdegk {i dxifk ng{{fje {ag `rflgp kfxgr{

{agfr d{{gj{fij hril `vogr`rflgp* Lirgixgr. {ag ni`dn eixgrjlgj{ adp `rgd{gk d @il}w{gr

Glgregj`v _gp}ijpg [gdl !dr@G_[& uf{a d kgkf`d{gk ugopf{g {i }rixfkg dudrgjgpp.

fjhirld{fij. dkxf`g. djk rg`gfxg }riongl dngr{p hril wpgrp. dp ugnn dp adp `rgd{gk

@vogr`rflg @iwr{p {i kgdn uf{a {ag cwl} fj {ag `il}w{gr,rgnd{gk `rflgp `dpgp

!WDGfj{grd`{*`il. ?==5&* D``irkfjenv. {ag Lfjfp{rv ih Cwp{f`g. fj irkgr {i `ilod{ `vogr`rflg

fj {ag WDG. jgu /@vogr`rflg/ `iwr{p uf{a p}g`fdnfp{ cwkegp adxg oggj gp{donfpagk {i

gq}gkf{g nf{fed{fij djk pgrxg nf{fedj{p lirg ghhg`{fxgnv !Sdudvd*`il. ?=4=&* Fj nfjg uf{a {ag

fj{rikw`{fij ih {ag WDG `vogr`rflg ndu. {ag ni`dn eixgrjlgj{ ogedj {i uirb d`{fxgnv ij

aip{fje fj{grjd{fijdn `ijhgrgj`gp fj dj d{{gl}{ {i orfje fj fj{grjd{fijdn gq}gr{fpg uaf`a ufnn

`ij{rfow{g fj oiip{fje {ag ngxgn ih bjiungkeg rgnd{gk {i `vogr pg`wrf{v djk }rixfkgp d``gpp

{i {ag nd{gp{ hfjkfjep djk rgpwn{p fj {ag hfgnk ih `vogr pg`wrf{v* Hir gqdl}ng. fj ?=4=. Sdvgk

Wjfxgrpf{v aip{gk {ag /?jk Fj{grjd{fijdn F@P[ @ijhgrgj`g ij Kfef{dn Hirgjpf`p djk @vogr

Page 7: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 7/20

@rflg/ ![agjd{fijdn*dg. ?=4=& dp d }rid`{fxg p{g} {i aip{ {afp {v}g ih fj{grjd{fijdn

`ijhgrgj`g fj {ag Lfkkng Gdp{*

@drrvfje iw{ gng`{rijf` owpfjgppgp fj d ugnn,kghfjgk ngedn p{rw`{wrg ufnn kghfjf{gnv `ij{rfow{g

}ipf{fxgnv {i {ag jd{fij‖p g`ijilv djk gxgj `rgd{g lirg i}}ir{wjf{fgp {i {ag owpfjgppgp

{aglpgnxgp !_iogr{ g{ dn*. ?=4=&*

Ugdbjgppgp

Dn{aiwea {ag WDG `vogr`rflg ndu `ixgrp dj d``g}{gk jwlogr ih `vogr`rflgp uaf`a piwjkp

eiik. aiugxgr. pilg dr{f`ngp ih {ad{ ndu drg }wj`{wd{gk uf{a d nd`b ih `ndrfhf`d{fij djk

pariwkgk fj lvp{grv uaf`a pgglp gxfkgj{ fj ldjv ih {ag ndu dr{f`ngp ug drg eifje {i rgxfgu

hril dj djdnv{f`dn }ifj{ ih xfgu*

[ag Fjp{f{w{g ih [rdfjfje djk Cwkf`fdn P{wkfgp ih Dow Kadof agnk d kfp`wppfij kgod{g rfea{

dh{gr {ag fppwdj`g ih {ag WDG `vogr`rflg ndu fj ?==8. rgxgdnfje {ad{ {ag D`{ `ij{dfjp ldjv

nii}aingp {ad{ jggk hwr{agr gq}ndjd{fij djk {ad{ p}g`fdnfsgk `iwr{p paiwnk og dppfejgk hir

f{p fl}nglgj{d{fij* @ijhfrld{fij ih {afp. djk hril d cwkf`fdn }ifj{ ih xfgu. {ag cwkeg

Liadllgk Iogfk Dn,Bddov dppwrgk {ad{ /pilg dr{f`ngp ldv `dwpg {ag }ripg`w{ir {i og

}wssngk og`dwpg ih {ag `ij{rdkf`{irv }gjdn{fgp {ad{ lfea{ gqfp{ fj {ag pdlg dr{f`ng/

!I}gjdrdo*jg{. ?==8&*

Fj `ijpijdj`g uf{a {ag lgj{fijgk doixg. hir fjp{dj`g. {ag ndu fejirgk {ag `rflfjdnfsd{fij

ih edlonfje uafng `rflfjdnfsgk }rip{f{w{fij djk {gl}{d{fij* [ag ndu dnpi hdfngk {i `ndrfhv {ag

}gjdn{v ih `ijp{rw`{fje {grrirfp{ ugopf{gp ir p}rgdkfje {grrirfp{ fjhirld{fij ijnfjg wpfje

xdewg }rg{gq{p* [agpg `ij{rixgrpfdn nii}aingp xdrv og{uggj wj`ngdr {grlp. }gjdn{fgp. djk

hfjgp* [afp p{wkv ufnn rgxfgu {ag dr{f`ngp {ad{ drg kilfjd{gk ov xdewgjgpp djk wj`gr{dfj{v*

Agrg drg pilg dr{f`ngp hril {ag `wrrgj{ ndu {ad{ jggk cwp{fhf`d{fij hir {ag {grlp wpgk !]dr{p

afeanfea{gk fj vgnniu jggk ̀ ndrfhf`d{fij&3

Page 8: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 8/20

Dr{f`ng !47& 

[ag }gjdn{v ih fl}rfpijlgj{ djk d hfjg ir gf{agr d}}nfgp {i uaigxgr ̀ illf{p djv ih {ag

hinniufje ihhgj`gp {ariwea {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g3

4*  Dowpg ih dj Fpndlf` ainv parfjg ir rf{wdn?*  Dowpg ih d ainv parfjg ir rf{wdn ih djv i{agr rgnfefij uagrg pw`a parfjg ir rf{wdn fp

}ri{g`{gk wjkgr Fpndlf` Padrfd

0*  Kghdld{fij ih djv ih {ag kfxfjg rgnfefijp

;*  Enirfhf`d{fij. fj`f{glgj{ ir }rili{fij ih urijekifje

Uad{ bfjk ih `rflgp dedfjp{ Fpndl lfea{ i``wr xfd {ag Fj{grjg{ ir `vogr uirnk9

Dr{f`ng !48& 

D }grpij uai xfind{gp hdlfnv }rfj`f}ngp djk xdnwgp ir }wonfpagp jgup ir }f`{wrgp fj xfind{fij

ih {ag }rfxd`v ih dj fjkfxfkwdn‖p }rfxd{g ir hdlfnv nfhg. gxgj fh {rwg. {ariwea {ag Fj{grjg{ ir djfjhirld{fij {g`ajiniev kgxf`g. padnn og nfdong {i fl}rfpijlgj{ hir d{ ngdp{ 4 vgdr djk d hfjg

ih d{ ngdp{ DGK 7=.=== ir gf{agr*

Uad{ drg {aipg hdlfnv,}rfj`f}ngp)xdnwgp gqd`{nv9 Uai paiwnk kg{grlfjg {agl9 Djk uai

adp {ag rfea{ {i ki pi9 [dbfje fj{i d``iwj{ {ad{ WDG fp d lwn{fjd{fijdn `iwj{rv dp lirg

{adj ?== jd{fijdnf{fgp p{dv ij f{p ndjk*

Dr{f`ng !?=& 

D }grpij uai pg{p w} d ugopf{g ir }wonfpagp fjhirld{fij ij {ag Fj{grjg{ ir dj fjhirld{fij

{g`ajiniev kgxf`g hir d eriw} gjedegk fj hd`fnf{d{fje djk }rili{fje }rierdlp djk fkgdp

`ij{rdrv {i }wonf` irkgr djk lirdnp padnn og nfdong {i fl}rfpijlgj{ hir w} {i 7 vgdrp*

Uad{ fp lgdj{ ov }wonf` irkgr djk lirdnp9 Aiu paiwnk f{ og kghfjgk9 [afp dr{f`ng fp rgdnnv

`rf{f`dn hir {ag pg`wrf{v ih {ag jd{fij. {awp. hwr{agr d``wrd{g cwp{fhf`d{fij fp afeanv rgtwfrgk* 

Dh{gr {afp twf`b rgxfgu f{%p gppgj{fdn {i pdv {ad{ {agpg {grlp drg i}gj {i d ufkg rdjeg ih 

fj{gr}rg{d{fijp* Agj`g. WDG eixgrjlgj{ paiwnk {dbg twf`b p{g}p {i rgkw`g djk gnflfjd{g

djv bfjk ih ̀ ijhwpfij lfea{ ad}}gj*

Dkkf{fijdnnv. pilg ih {ag dr{f`ngp }rgpgj{gk fj {ag D`{ drg ji{ rgdnnv `ngdr gp}g`fdnnv fj {grlp

ih fl}rfpijlgj{ djk hfjg dliwj{p. ow{ hir {ag Wjf{gk Drdo Glfrd{gp {i hwr{agr fl}rixg djk

p{rgje{agj {agfr gqfp{fje `vogr`rflg ndu {agrg paiwnk og d `ngdr }gjdn{v kghfjf{fij {i pilg

ih {ag }rgpgj{gk dr{f`ngp }rgxgj{fje `vogr `rflfjdnp hril gp`d}fje hril d hwnn }ripg`w{fij*

Page 9: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 9/20

Kiuj ogniu Dr{f`ngp hril WDG ndu ih `vogr`rflg jggk {i og `ndrfhfgk fj {grlp ih hfjg

dliwj{p djk fl}rfpijlgj{ }grfikp !]dr{p afeanfea{gk fj vgnniu jggk ̀ ndrfhf`d{fij&3

Dr{f`ng !?& 

4*  Djv fj{gj{fijdn d`{ uagrgov d }grpij wjnduhwnnv edfjp d``gpp {i d ugopf{g ir

Fjhirld{fij Pvp{gl ov nieefje ij{i {ag ugopf{g ir pvp{gl ir orgdbfje {ariwea d

pg`wrf{v lgdpwrg ̀ drrfgp fl}rfpijlgj{ djk d hfjg ir gf{agr*

?*  Fh pw`a d`{ rgpwn{p fj {ag kgng{fij. grdpwrg. kgp{rw`{fij. kfp`nipwrg. kdldefje.

dn{grd{fij ir rg}wonf`d{fij ih kd{d ir fjhirld{fij. {ag }wjfpalgj{ padnn og

fl}rfpijlgj{ hir d {grl ih d{ ngdp{ 8 lij{ap djk d hfjg ir gf{agr*

0*  Fh {ag kd{d ir fjhirld{fij fp }grpijdn. {ag }wjfpalgj{ padnn og fl}rfpijlgj{ hir d

{grl ih d{ ngdp{ 4 vgdr djk d hfjg ih ji{ ngpp {adj DGK 4=.=== ir gf{agr

Dr{f`ng !;& 

[ag }gjdn{v padnn og {gl}irdrv kg{gj{fij hir djvijg uai hiregp d ki`wlgj{ ih {ag hgkgrdn

ir ni`dn eixgrjlgj{ ir hgkgrdn ir ni`dn }wonf` gj{f{v ir `ir}ird{fij {ad{ fp ngednnv rg`iejfsgk

fj dj Fjhirld{fij Pvp{gl*

[ag }gjdn{v padnn og fl}rfpijlgj{ djk d hfjg ir gf{agr hir hirefje djv i{agr ki`wlgj{ uf{a

fj{gj{ {i fjcwrg*

[ag }gjdn{v }rgp`rfogk hir hiregrv d}}nfgp. dp d}}ri}rfd{g. fj {ag ̀ dpg ih djvijg uai

bjiufjenv wpgp d hiregk ki`wlgj{*

Dr{f`ng !7& 

D }grpij uai fj djv udv afjkgrp ir kgndvp d``gpp {i d pgrxf`g. pvp{gl. }rierdl ir kd{dodpg

{ariwea {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g padnn og nfdong {i fl}rfpijlgj{

djk d hfjg ir gf{agr*

Dr{f`ng !8& 

D }grpij uai wpgp {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g fj irkgr {i kfpdong.

kfprw}{. kgp{riv. uf}g iw{. kgng{g. kdldeg. ir likfhv }rierdlp. kd{d ir fjhirld{fij ij {agFj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g padnn og nfdong {i {gl}irdrv kg{gj{fij djk d

hfjg ih ji{ ngpp {adj DGK 7=.=== ir gf{agr*

Dr{f`ng !5& 

Djvijg }ri`wrfje. hd`fnf{d{fje ir gjdonfje {ag likfhf`d{fij ir kgp{rw`{fij ih lgkf`dn

gqdlfjd{fij. kfdejipfp. {rgd{lgj{ ir agdn{a rg`irkp {ariwea {ag Fj{grjg{ ir dj fjhirld{fij

{g`ajiniev kgxf`g padnn og nfdong {i {gl}irdrv kg{gj{fij ir fl}rfpijlgj{*

Dr{f`ng !1& 

Page 10: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 10/20

Djvijg uai fj{gj{fijdnnv djk wjnduhwnnv gdxgpkri}p. ir rg`gfxgp ir fj{gr`g}{p

`illwjf`d{fij {rdjplf{{gk d`ripp {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g padnn og

nfdong {i fl}rfpijlgj{ djk d hfjg ir gf{agr*

Dr{f`ng !44& 

Djvijg uai wpgp {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g {i wjnduhwnnv d``gpp {ag

jwlogr ir kg{dfnp ih d `rgkf{ `drk ir i{agr gng`{rijf` `drk padnn og nfdong {i fl}rfpijlgj{

djk d hfjg* Fh {ag ihhgj`g fp `illf{{gk uf{a fj{gj{ {i d`twfrg {ag }ri}gr{v ir dxdfn ih {ag

pgrxf`gp ih dji{agr {ag }gjdn{v fp fl}rfpijlgj{ hir d }grfik ih d{ ngdp{ 8 lij{ap djk d hfjg

ir gf{agr* Fh {ag }ri}gr{v ih dji{agr fp d}}ri}rfd{gk hir {ag d``iwj{ ih {ag }gr}g{rd{ir ir

pilgijg gnpg {ag }gjdn{v fp fl}rfpijlgj{ hir d{ ngdp{ 4 vgdr djk d hfjg ih d{ ngdp{ DGK

0=.=== ir gf{agr*

Dr{f`ng !4?& 

Djvijg uai }rikw`gp. drrdjegp. pgjkp ir p{irgp uf{a fj{gj{ ih wpfje. ̀ fr`wnd{fje ir ihhgrfje.

{ariwea {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g. fjhirld{fij {ad{ fp ̀ ij{rdrv {i

}wonf` lirdnp ir i}grd{gp d xgjwg hir pw`a }wr}ipg padnn og nfdong {i fl}rfpijlgj{ djk d

hfjg ir gf{agr*

Fh {ag d`{ fp ̀ illf{{gk dedfjp{ d lfjir. {ag }gjdn{v padnn og fl}rfpijlgj{ hir d }grfik ih d{

ngdp{ 8 lij{ap djk d hfjg ih ji{ ngpp {adj DGK 0=.===*

Dr{f`ng !40& 

[ag }gjdn{v padnn og fl}rfpijlgj{ djk d hfjg hir uaigxgr fj`f{gp nwrgp ir dppfp{p d ldng ir

hgldng fj{i ̀ illf{{fje dj d`{ ih }rip{f{w{fij ir hirjf`d{fij ov lgdjp ih {ag Fj{grjg{ ir dj

fjhirld{fij {g`ajiniev kgxf`g*

Fh {ag xf`{fl fp d lfjir. {ag }gjdn{v padnn og fl}rfpijlgj{ hir d{ ngdp{ 7 vgdrp djk d hfjg*

Dr{f`ng !4;& 

D }grpij uai wjnduhwnnv niefj {i dj Fj{grjg{ ugopf{g fj irkgr {i ̀ adjeg. kgng{g. kgp{riv. ir

likfhv f{p kgpfej ir {dbg ixgr f{p dkkrgpp padnn og nfdong {i fl}rfpijlgj{ djk d hfjg ir gf{agr*

Dr{f`ng !47& 

[ag }gjdn{v ih fl}rfpijlgj{ djk d hfjg ir gf{agr d}}nfgp {i uaigxgr ̀ illf{p djv ih {ag

hinniufje ihhgj`gp {ariwea {ag Fj{grjg{ ir dj fjhirld{fij {g`ajiniev kgxf`g3

4*  Dowpg ih dj Fpndlf` ainv parfjg ir rf{wdn

?*  Dowpg ih d ainv parfjg ir rf{wdn ih djv i{agr rgnfefij uagrg pw`a parfjg ir rf{wdn fp

}ri{g`{gk wjkgr Fpndlf` Padrfd

0*  Kghdld{fij ih djv ih {ag kfxfjg rgnfefijp

;*  Enirfhf`d{fij. fj`f{glgj{ ir }rili{fij ih urijekifje

Page 11: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 11/20

[ag }gjdn{v padnn og fl}rfpijlgj{ hir w} {i 5 vgdrp hir dj ihhgj`g fjxinxfje i}}ipf{fij {i

Fpndl ir fjcwrv {i {ag {gjg{p djk }rfj`f}ngp ih Fpndl. i}}ipf{fij ir fjcwrv {i {ag gp{donfpagk

}rd`{f`gp ih Fpndl. }rgcwkf`g {i Fpndl. {ag orgd`afje ih d rgnfefij i{agr {adj Fpndl ir {ag

}ri}ded{fij. dkxi`d`v ir }rili{fij ih djv kfp`f}nfjg ir fkgd ih pw`a jd{wrg*

Dr{f`ng !45& 

D }grpij uai pg{ w}p d ugopf{g ir }wonfpagp fjhirld{fij ij {ag Fj{grjg{ ir dj fjhirld{fij

{g`ajiniev kgxf`g hir {ag }wr}ipg ih `ijkw`{fje ir hd`fnf{d{fje awldj {rdhhf`bfje padnn og

nfdong {i {gl}irdrv kg{gj{fij*

Dr{f`ng !41& 

D }grpij uai pg{p w} d ugopf{g ir }wonfpagp fjhirld{fij ij {ag Fj{grjg{ ir dj fjhirld{fij

{g`ajiniev kgxf`g hir {ag }wr}ipg ih pgnnfje ir hd`fnf{d{fje {ag {rdkg ih jdr`i{f`p. lfjk

dn{grfje pwop{dj`gp djk {ag nfbg fj i{agr {adj ngednnv }rgp`rfogk ̀ fr`wlp{dj`gp padnn og nfdong

{i {gl}irdrv kg{gj{fij*

[ag afeanfea{gk }dr{p ih {ag {gq{ jggk {i og `ndrfhfgk hwnnv dedfjp{ f{p ngedn fj{gr}rg{d{fij*

Hwr{agrlirg. [dong 4* paiup uaf`a dr{f`ngp jggk {i hwr{agr cwp{fhf`d{fij oi{a fj {grlp ih hfjg

dliwj{ djk fl}rfpijlgj{*

[dong 4* Dr{f`ngp jggk cwp{fhf`d{fij fj {grlp ih Hfjg ( Fl}rfpijlgj{

Fl}rfpijlgj{HfjgDr{f`ng !#&

Ji{ `ngdrJi{ `ngdr?

Ji{ `ngdrJi{ `ngdr;

Ji{ `ngdrJi{ `ngdr7

Ji{ `ngdr@ngdr8

Ji{ `ngdr,5

Ji{ `ngdrJi{ `ngdr1

@ngdrJi{ `ngdr44

Ji{ `ngdrJi{ `ngdr4?

Ji{ `ngdrJi{ `ngdr40

Ji{ `ngdrJi{ `ngdr4;

@ngdrJi{ `ngdr47

Ji{ `ngdr,45

Ji{ `ngdr,41 

Piwr`g3 ]grpijdn p{wkv 

Page 12: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 12/20

Lirgixgr. {ag `wrrgj{ D`{ `ij{dfjp ji p}g`fhf` dr{f`ng {ad{ `ngdrnv kg`ndrgp fh {afp D`{ d}}nfgp

{i gq}d{rfd{gp nfxfje fj {ag Wjf{gk Drdo Glfrd{gp ir ji{* F{%p ji{dong {ad{ {ag uirk /lfjir/

adp oggj lgj{fijgk ijnv {uf`g {ariwea {afp D`{ p}g`fhf`dnnv fj dr{f`ngp !4?& ( !40& fj `dpg ih 

{ad{ {ag lfjir udp {ag xf`{fl* Ow{ uad{ fh {ag /lfjir/ udp {ag }gr}g{rd{ir aflpgnh9 [afp

lgdjp {ad{ dnn {v}gp ih `rflgp lgj{fijgk fj {ag D`{ drg ji{ d}}nf`dong {i lfjirp$ Kigp

{ad{ d}}nv {i rgdnf{v9 Djk aiu paiwnk {agpg lfjir ihhgjkgrp og {rgd{gk djk }wjfpagk9

Ji{ djv ih {ag dr{f`ngp kfp`wppgk {ag fppwg ih `ripp oirkgr `vogr`rflg* Uad{ fh {ag

}gr}g{rd{ir udp hril iw{pfkg {ag WDG9 Uad{ }ri`gkwrgp paiwnk og {dbgj djk uad{ uiwnk

og {ag }wjfpalgj{ hir pw`a pf{wd{fij9

Fjkggk. {agrg fp ji pfjeng dr{f`ng {ad{ `rflfjdnfsgp lfjirp fj `dpg {agv `illf{ djv {v}g ih 

`rflgp }rgpgj{gk fj {ag D`{* Dp ugnn dp. f{ fp {rwg {ad{ jijg ih {ag dr{f`ngp }rgpgj{gk fj {ag

`vogr`rflg D`{ ̀ ngdrnv kgp`rfog djv bfjk ih `il}gjpd{fij hir ̀ vogr`rflg xf`{flp*

]rixfkfje {ad{. {agrg drg ji `ngdr ogj`aldrbp ir p{wkfgp kg{grlfjg {ag ghhg`{fxgjgpp ih {afp

ndu djk {ag rgpwn{p d`afgxgk pfj`g f{ udp }nd`gk fj{i wpg* Dp `vogr`rflgp `dj og oridknv

`d{geirfsgk fj{i {argg ̀ d{geirfgp jdlgnv, ̀ rflgp dedfjp{ }grpijp. }ri}gr{v djk eixgrjlgj{.

{ag gqfp{fje ndu kigp ji{ }rixfkg pwhhf`fgj{ `ixgrdeg dedfjp{ lirg rg`gj{ `il}w{gr,rgnd{gk

`rflgp pw`a dp3

4*  Dedfjp{ }grpijp3

  Kghdld{fij 

  @vogr,p{dnbfje

  Adrdpplgj{ {ariwea g,ldfn

  Fjkg`gj{ gq}ipwrg

?*  Dedfjp{ }ri}gr{v3

  [rdjplf{{fje xfrwp. uirl. [ricdj ir p}vudrg

Page 13: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 13/20

  @il}w{gr xdjkdnfpl

  Ad`bfje)`rd`bfje

  Xfind{fij ih fj{gnng`{wdn }ri}gr{v rfea{

  ]afpafje

  Ijnfjg edlonfje

0*  Dedfjp{ iredjfsd{fijp3

  Ad`bfje ( @rd`bfje

  [rdjplf{{fje xfrwp. uirl. [ricdj ir p}vudrg

  Kfp{rfow{fij ih }frd{gk pih{udrg

  Kfp`rgkf{d{fij

  @vogr {grrirfpl dedfjp{ {ag eixgrjlgj{ iredjfsd{fij

  Xfind{fij ih fj{gnng`{wdn }ri}gr{v rfea{

D``irkfje {i {ag }ifj{p p{d{gk doixg. {agpg }ifj{p paiwnk og {dbgj fj{i d``iwj{ fh djv

`ilfje dlgjklgj{ ad}}gjp fj {ag hw{wrg dp lirg djk lirg pi}afp{f`d{gk {v}gp ih `rflg

drg kgxgni}fje gxgrv kdv* P}gdbfje d{ Dwp@G_[ ?=44. Bdp}grpbv Ndop hiwjkgr djk pg`wrf{v

gq}gr{. Gwegjg Bdp}grpbv drewgk {ad{ /`vogr`rflg jiu fp {ag pg`ijk ndregp{ ̀ rflfjdn d`{fxf{v

fj {ag uirnk/ !Odruf`b. ?=44&* Dp `vogr`rflg udp }rixfje kfhhf`wn{ {i hfea{ kwg {i d

`ilofjd{fij ih f{p pg`rg{fxg jd{wrg djk wjkgreriwjk hirwlp dnije uf{a d nd`b ih 

`ii}grd{fij og{uggj fj{grjd{fijdn dj{f,`vogr`rflfjdn }inf`g hir`gp !Odruf`b. ?=44&*

Aiugxgr. f{ fp p{fnn rg`illgjkgk {i adxg hgu lirg dlgjklgj{p fj irkgr {i fj`nwkg gq}nf`f{

{i}f`p pw`a dp xfrwpgp. ldnudrg. ijnfjg edlonfje. Kd{d kfkknfje djk p}dl gldfn d{{d`bp

uaf`a drg `ijpfkgrgk dp {ag ldfj li{fxgp ogafjk {ag `vogr `rflfjdnp jiudkdvp kwg {i f{p

aweg hfjdj`fdn rg{wrjp !Kuvgr. ?=4=. Ai}bfjp. ?==0&* D``irkfje {i Kuvgr !?=4=&. kgdnfje

uf{a `vogr`rflgp rgtwfrgp kg`fpfxg pg`wrf{v dudrgjgpp* [ag Lfkkng Gdp{ rgefij. gp}g`fdnnv

Ewnh @ii}grd{fij @iwj{rfgp fj`nwkfje {ag Wjf{gk Drdo Glfrd{gp. nd`b ldjv ih {ag dudrgjgpp

Page 14: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 14/20

}rierdlp. {rdfjfje djk gkw`d{fij fj {ag hfgnk ih `vogr`rflg kwg {i {ag nd{g fj{grgp{ fj {afp

{i}f`* Uf{a pwhhf`fgj{ {rdfjfje }rierdlp djk `dl}dfejp djk {ag fjxinxglgj{ ih }dr{fgp

p{dr{fje hril F[ }rihgppfijdnp. {i iredjfsd{fijp‖ kg`fpfij ldbgrp djk dnpi {ag egjgrdn }wonf`.

{ag ngxgn ih dudrgjgpp ufnn erdkwdnnv fj`rgdpg uaf`a fj {wrj ngdkp afeagr ngxgnp ih }ri{g`{fij

{ad{ wpgrp lfea{ {dbg fj{i `ijpfkgrd{fij*

I}}ir{wjf{fgp

[ag Wjf{gk Drdo Glfrd{gp gjcivp ergd{ g`ijilf` }ipf{fij dlije i{agr `iwj{rfgp fj {ag

Lfkkng Gdp{ rgefij uaf`a rgtwfrgp agr {i {dbg p{rijegr djk twf`bgr p{g}p {i wpg dnn dxdfndong

i}}ir{wjf{fgp {i fl}rixg f{p `wrrgj{ @vogr Ndu p{d{wp {i fj`rgdpg {ag ngxgn ih pg`wrf{v fj d

hgr{fng gjxfrijlgj{ rg}ng{g uf{a g,owpfjgppgp* Dp kfp`wppgk gdrnfgr fj {ag p{rgje{ap pg`{fij.

djk dp }rixfkgk ov _iogr{ g{ dn* !?=4=&. {ag `iwj{rv `iwnk d{{rd`{ d lirg kfxgrpg g`ijilf`

gjxfrijlgj{ {i {dbg }nd`g {ad{ pw}}ir{p oi{a `ijpwlgrp djk iredjfsd{fijp }grhirlfje

gng`{rijf` owpfjgppgp* [agrghirg. uf{a lirg pinfk djk p}g`fhf` kghfjgk `vogr`rflg ndup. {ag

`iwj{rv ̀ iwnk d{{rd`{ lirg gng`{rijf` odpgk pgrxf`gp*

[ag eixgrjlgj{ p{fnn adp {ag `adj`g {i w}kd{g f{p `vogr ndu djk ldbg {ag jg`gppdrv

dlgjklgj{p {i ̀ ixgr djv nii}aingp djk fj`nwkg jgu pi}afp{f`d{gk {i}f`p djk i{agr {v}gp ih 

w}`ilfje `vogr`rflgp* Pgxgrdn p{g}p adxg oggj {dbgj* [ag Lfjfp{rv ih Cwp{f`g. fj irkgr {i

`ilod{ `vogr`rflg fj {ag WDG. jgu /@vogr`rflg/ `iwr{p uf{a p}g`fdnfp{ cwkegp adxg oggj

gp{donfpagk {i gq}gkf{g nf{fed{fij djk pgrxg nf{fedj{p lirg ghhg`{fxgnv !Sdudvd*`il. ?=4=&*

Djk. {ag `rgd{fij ih d @il}w{gr Glgregj`v _gp}ijpg [gdl !dg@G_[& hir {ag kg{g`{fij djk

}rgxgj{fij ih `vogr`rflg fj {ag `iwj{rv ufnn agn} fl}rixg {ag ghhf`fgj`v djk {ag ghhg`{fxf{v

ih {ag `wrrgj{ ndu* Fj dkkf{fij. aip{fje fj{grjd{fijdn `ijhgrgj`gp ufnn agn} {ag WDG

eixgrjlgj{ ogjghf{ hril fj{grjd{fijdn gq}gr{fpg uaf`a ufnn `ij{rfow{g fj oiip{fje {ag ngxgn

ih bjiungkeg rgnd{gk {i `vogr pg`wrf{v djk }rixfkg d``gpp {i {ag nd{gp{ hfjkfjep djk rgpwn{p

fj {ag hfgnk ih `vogr pg`wrf{v*

Page 15: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 15/20

/D pinw{fij {i {ag }riongl lfea{ og {ad{. fj dkkf{fij {i adxfje }inf`g degj`fgp fjxgp{fed{g

`vogr`rflg. dj Fj{grjg{ Fj{gr}in !fj{grjd{fijdn }inf`g& `iwnk og gp{donfpagk*/ ,, Bdp}grpbv 

 hiwjkgr Gwegjg Bdp}grpbv 

Ijg ih {ag pweegp{gk pinw{fijp {i pniu kiuj ir p{i} {ag fj`rgdpfje eriu{a ih `vogr`rflgp fp

dj ijnfjg !FK& fkgj{fhf`d{fij {i xgrfhv }gi}ng gjedefje fj pw`a d`{p* [ag hiwjkgr ih Bdp}grpbv

pweegp{gk {ad{ !Odruf`b. ?=44&*

@vogr`rflgp drg jiu p}rgdk uirnkufkg djk {agrg fp ji pfjeng `iwj{rv {i og `ijpfkgrgk

fllwjg dedfjp{ f{* [agrg adp oggj d `ijpfkgrdong eriu{a fj `vogr`rflgp fj {ag Lfkkng Gdp{

kwrfje {ag ndp{ `iw}ng ih vgdrp* [afp eriu{a adp rgpwn{gk hril nd`b ih rgewnd{fijp. {rdfjfjep

djk dudrgjgpp* WDG paiwnk {dbg {afp i}}ir{wjf{v {i owfnk lirg pinfk odpg hir {agfr

`vogr`rflg `iwr{p {ariwea {rdfjfjep djk iredjfsfje dudrgjgpp `dl}dfejp {ariweaiw{ {ag

jd{fij hir }rihgppfijdnp djk egjgrdn }wonf` !Kuvgr. ?=4=&*

[agv `iwnk dnpi fj{rikw`g p}g`fdn `gr{fhf`d{fijp uf{a dnnfdj`g {i uirnkufkg p{djkdrkp fj {ag

kfef{dn hirgjpf`p hfgnk djk kgxgni} p{rijegr `vogr`rflg bjiungkeg odpg* [afp `iwnk dnpi ngdk

{ag WDG {i og {ag ngdkgr fj {ag rgefij djk dppfp{ i{agr eixgrjlgj{p {i kgxgni} pflfndr ndup

djk p{rd{gefgp fj kghgjkfje dedfjp{ {ag `vogr`rflgp* Fj dkkf{fij. f{ `iwnk og d p{dr{ {i

`rgd{fje d `vogr`rflg `ijxgj{fij {i og{{gr kghfjg fj{grjd{fijdn `ii}grd{fij !Ai}bfjp.

?==0&* Ndp{ ow{ ji{ ngdp{. }wonf` djk }rfxd{g iredjfsd{fijp paiwnk owfnk {agfr pg`wrf{v }inf`fgp djk

`vogr pg`wrf{v dudrgjgpp }rg`dw{fijp fj adrlijv uf{a {ag eixgrjlgj{%p }ndjp djk

p{rd{gefgp fj irkgr {i ̀ rgd{g d pdhg ̀ vogr ̀ illwjf{v*

Page 16: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 16/20

[argd{p

[ag [gng`illwjf`d{fijp _gewnd{irv Dw{airf{v ![_D& adp kijg d pwrxgv kwrfje {ag `iwrpg ih 

?=4= ![_D*eix*dg. ?=4=& rg}ir{fje {ad{ {ag jwlogr ih fj{grjg{ wpgrp fj {ag `iwj{rv udp

gp{fld{gk {i 87' ih {ag }i}wnd{fij djk {ag rd{fi `dj fj`rgdpg pfejfhf`dj{nv* [afp lgdjp {ad{

adnh ih {ag WDG }i}wnd{fij fp }rijg {i {ag rfpb ih `vogr`rflg. gp}g`fdnnv ni{p ih ad`bfje {iinp

drg hrggnv dxdfndong djk kiujnidkdong hril {ag Fj{grjg{* Fj dkkf{fij. pnweefpa

rgp}ijpfxgjgpp fj {dbfje `irrg`{fxg d`{fijp {i `ixgr {ag gqfp{fje nii}aingp fj {ag `wrrgj{ ndu

uiwnk rgpwn{ fj jged{fxg ̀ ijpgtwgj`gp*

Fjhirld{fij rgxinw{fij grd ldbgp f{ gxgj gdpfgr hir ad`bgrp {i padrg ad`bfje kg{dfnp djk

{g`ajftwgp* [afp }rikw`gp d lirg pbfnngk orggk ih @vogr @rflfjdnp {ad{ `ij{fjwiwpnv

fj{rikw`g jgu {v}gp ih `rflgp uaf`a ngdxg eixgrjlgj{p ogafjk fj `i}fje uf{a {g`ajiniev

rgnd{gk ndup !Eaipa. ?=4=&* Kwg {i {ag nd`b ih {ag dudrgjgpp kfp`wppgk gdrnfgr. ldjv ih {ag

xf`{flp drg wjufnnfje {i rg}ir{ `vogr`rflgp* [agrghirg. gkw`d{fje }gi}ng ij aiu {i kgdn uf{a

`vogr`rflgp d{ {ag {flg ih i``wrrgj`g fp jg`gppdrv {i ldbg wpgrp rg}ir{ pw`a fj`fkgj{p* [afp

`iwnk agn} [_D rg`iejfsg lip{ hrgtwgj{nv `illf{{gk `rflgp djk {agfr {flg ih i``wrrgj`g

djk {i }rikw`g fl}ir{dj{ p{d{fp{f`dn pwrxgvp {ad{ ̀ iwnk agn} hfea{ pw`a ̀ rflgp*

@ij`nwpfij

[ag `vogr,uirnk fp hwnn ih fllgkfd{g `adjegp {ad{ `dj%{ og }rgkf`{gk* Dp d rgpwn{. dnn `vogr

ndup drg nflf{gk* Pfj`g `vogr ndup drg nflf{gk. f{ lwp{ og w},{i,kd{g djk jggk `ij{fjwiwp

fl}rixglgj{ djk hinniu,w}* D``irkfjenv. WDG ̀ vogr ndu adp {i og dlgjkgk {i fj`nwkg i{agr

{v}gp ih ̀ il}w{gr,rgnd{gk ̀ rflgp nfbg `vogr,p{dnbfje. gldfn adrdpplgj{ djk kghdld{fij*

Pflfndrnv. {ag dhirglgj{fijgk dr{f`ngp fj [dong 4* jggk lirg `ndrfhf`d{fij djk cwp{fhf`d{fij fj

{grlp ih hfjg djk fl}rfpijlgj{ {i lfpp w} {ag i}}ir{wjf{v ij ndu orgdbgrp {ariwea

ogj`aldrbfje uf{a i{agr `vogr`rflg ndup ih i{agr `iwj{rfgp nfbg {ag Wjf{gk P{d{gp. {ag

Page 17: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 17/20

Wjf{gk bfjekil djk Fjkfd* Hwr{agrlirg. {ag `ij`g}{ ih {ag }gr}g{rd{ir !ihhgjkgr& adp {i og

rgkghfjgk {i fj`nwkg lfjirp ji{ ijnv dkwn{p. {dbfje fj{i `ijpfkgrd{fij {ag p`i}g ih {ag ndu*

Fj hd`{ {afp rgpgdr`a }d}gr fp ijg ih {ag hgu }d}grp fh ji{ {ag ijnv {ad{ fp urf{{gj ij {ag WDG

`vogr`rflg ndu. {agrghirg. f{ fp dkxfpgk {ad{ lirg p{wkfgp jggk {i og kijg ij {afp ndu {i

pad}g kfhhgrgj{ xfgup djk hir og{{gr iw{`ilgp*

Hfjdnnv. f{ `dj og pdfk. {ad{ {agrg drg `iwj{rfgp kifje oink lixgp fj kgxgni}fje {agfr iuj

jd{fijdn }inf`fgp djk ndup {i kghgjk dedfjp{ {afp jgu {v}g ih g,`rflg `ilfje hril {ag `vogr

uirnk* Djk {ag Wjf{gk Drdo Glfrd{gp fp ijg ih {agpg `iwj{rfgp* Doixg dnn. {ag WDG pggbp {i

og }rid`{fxg dp {ag `iwj{rv fp {arfxfje g`ijilf`dnnv. uaf`a rgtwfrgp {ag p{d{g {i owfnk d pdhg.

pg`wrg. djk pw}}ir{fxg gjxfrijlgj{ hir gng`{rijf` odpgk pgrxf`gp*

Hw{wrg Uirb 

[afp }d}gr paiwnk og hinniugk ov lirg djdnv{f`dn p{wkfgp {ad{ ufnn `ij{rfow{g {i {ag

gq}ndjd{fij ih {ag dr{f`ngp lgj{fijgk fj {ag ̀ vogr ndu ih {ag WDG*

Page 18: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 18/20

_ghgrgj`gp

Dg`gr{*dg* !?==8. Cdj 0=&* [ag Hgkgrdn Ndu Ji* !?& ih ?==8 ij [ag ]rgxgj{fij ih 

Fjhirld{fij [g`ajiniev @rflgp* _g{rfgxgk hril

a{{}3))uuu*dg`gr{*dg)}rgxgj{fijih{g`a`rflgp*}a} 

Dlgfjhi*`il* !?==1. Kg` ?6&* Sdvgk Wjfxgrpf{v ndwj`agp gfea{ jgu erdkwd{g }rierdlp fj

`inndoird{fij uf{a fj{grjd{fijdn wjfxgrpf{fgp*_g{rfgxgk hril

a{{}3))uuu*dlgfjhi*`il)4561?;*a{ln 

Ogkjdrpbf. E*. @agj. ]*. @agj. B*. Cixdjixf`a. D*. Ipldj. A* !?==0&* Fj{grjd{fijdn 

@vogr`rflg3 Ndu. [rgjkp. djk [rgd{fgp* !}* ?0&

Odruf`b. A* !?=44. Ldv 45&* Dwp@G_[ ?=443 Gwegjg Bdp}grpbv `dnnp hir Fj{grjg{ Fj{gr}in* 

_g{rfgxgk hril

a{{}3))uuu*`il}w{gruirnk*`il*dw)dr{f`ng)01856=)dwp`gr{Y?=44YgwegjgYbdp}grpbv

 Y`dnnpYfj{grjg{Yfj{gr}inY)

 

@adj. J*. @irijgn. P*. ( @afd{ Ije. V* !?==0&* [ag [argd{ ih {ag @vogr`rflg D`{ ?==4 {i

 Dwp{rdnfdj F[ ]rihgppfijdnp* ]ri`ggkfjep ih {ag [ag Hfrp{ Dwp{rdnfdj Wjkgrerdkwd{g

P{wkgj{p% @il}w{fje @ijhgrgj`g !}}* ?7,00&*

@ndrb. J* !?=44. Ldr`a 6&* Owpfjgpp `iwj{p {ag `ip{ ih `vogr `rflg* _g{rfgxgk hril

 ,hgd{wrgp)owpfjgpp,djk,a{{}3))uuu*fjkg}gjkgj{*`i*wb)jgup)owpfjgpp)djdnvpfp 

??08471*a{ln,`rflg,`vogr,ih ,`ip{,{ag,p`iwj{ 

Kuvgr. ]* !?=4=&* @vogr @rflg fj {ag Lfkkng Gdp{ * _g{rfgxgk hril uuu*}dwn`kuvgr*`il 

Page 19: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 19/20

Eaipa. P* !?=4=&* @vogr`rflgp3 D Lwn{fkfp`f}nfjdrv Djdnvpfp* Jgu Virb3 P}rfjegr*

Adrngv. O* !?=4=. Ldr`a ?0&* D Eniodn @ijxgj{fij ij @vogr`rflg9*_g{rfgxgk hril

 `vogr`rflg),ij,`ijxgj{fij,eniodn,a{{}3))uuu*p{nr*ire)?=4=)=0)d 

Ai}bfjp. Padjjij N* !?==0&* @vogr`rflg @ijxgj{fij3 D ]ipf{fxg Ogefjjfje {i d Nije _idk 

 Dagdk * C* Afea [g`a* N*. ?!4&. 4=4,4??*

Badnggc{flgp*`il* !?==8. Dwe ?7&* ?=? jd{fijdnf{fgp fj ndoiwr ldrbg{* _g{rfgxgk hril

a{{}3))uuu*badnggc{flgp*`il)Kfp}ndvDr{f`ngJgu*dp}9pg`{fij<{agwdg(qhfng<kd{d){ag

wdg)?==8)dwewp{){agwdgYdwewp{507*qln

 

Nfgogrldj. K* !?=44. Ldr`a 8&* @vogr @rflg @ip{p Ixgr +4 [rfnnfij Eniodnnv9* _g{rfgxgk hril

,4,Ixgr,@ip{p,@rflg,ogr@v,a{{}p3))uuu*fjhipg`fpndjk*`il)oniexfgu)4?07? 

Eniodnnv*a{ln,[rfnnfij 

Nwjcgxf`a. L*. Dn Padfba. I* !?=4=. Cdj 41&* WDG [i Gp{donfpa P}g`fdnfp{ @vogr`rflg ̀ iwr{p* 

_g{rfgxgk hril

a{{}3))uuu*sduvd*`il)P{irv*`hl)pfkSDUVD?=4==441=1777?)WDG'?=[i'?=Gp{do

nfpa'?=P}g`fdnfp{'?=@vogr`rflg'?=@iwr{p) 

_iogr{. G*. Ibijfegjg. ( Oind. Dkgbdjng* !?=4=&* @vogr`rflg fj Jfegrfd* Owpfjgpp Fj{gnnfegj`g

 Ciwrjdn * 0!4&. 60,6

]ngugp. D* !?=4=. Ldv ?4&* @vogr`rflg ̀ ip{p WDG gj{gr}rfpgp +?l gd`a vgdr* _g{rfgxgk hril

,gj{gr}rfpgp,wdg,`ip{p,owpfjgpp*`il)nfxg)?=4=)=7)`vogr`rflg,a{{}3))oniep*irdjeg 

vgdr*a{ln,gd`a,?l 

[_D*eix*dg* !?=4=&* F@[ fj {ag WDG* _g{rfgxgk hril

a{{}3))uuu*{rd*eix*dg)kiujnidk*}a}9hfngjdlg<F@[YPwrxgv'?=Gjenfpa'?=?=4=*}kh  

Page 20: UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

7/23/2019 UAE Cyber Crime Law SWOT Analysis (Talal Al Ismail) - 3rd edition

http://slidepdf.com/reader/full/uae-cyber-crime-law-swot-analysis-talal-al-ismail-3rd-edition 20/20

 

[agjd{fijdn*dg* !?=4=. Pg} ?1&* Sdvgk Wjfxgrpf{v {i aip{ `vogr,`rflg ̀ ijhgrgj`g_g{rfgxgk

,aip{,{i,wjfxgrpf{v,jgup)gkw`d{fij)sdvgk,a{{}3))uuu*{agjd{fijdn*dg)jgup)wdghril 

`ijhgrgj`g,`rflg,`vogr 

WDGfj{grd`{*`il* !?==5. D}rfn 7&* WDG `rgd{gp {gdl {i hfea{ `vogr `rflg* _g{rfgxgk hril

a{{}3))uuu*wdgfj{grd`{*`il)ki`p)WDGY`rgd{gpY{gdlY{iYhfea{Y`vogrY`rflg)?;86=*

a{l