IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 4 - Issue 11, November 2015 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Internet Governance & Cyber Crimes In UAE

[Full Text]

 

AUTHOR(S)

Ayesha Al Neyadi, Alia Al Kaabi, Laila Al Kaabi, Mariam Al Ghufli, Maitha Al Shamsi, Dr. Muhammad Khan

 

KEYWORDS

Index Terms: Internet Governance, Cyber Crimes, UAE Cyber Crimes, UAE Internet Governance, Cyber Crime Law

 

ABSTRACT

Abstract: Most people in UAE don't feel safe while they are use the Internet, because most internet users have been a victim for cyber crime. Cyber crime threat rate has increased which has targeted on citizen privacy, property and governments also the reputation problems. There are many criminal activities such as indecent acts, Copyright issues, Terrorist Acts, State security and Contempt of religion. Cyber crimes due to several reasons, such as they have lack of social intelligence, they are being greedy and not being content also some of them have financial troubles, these reasons usually exploited by criminals. Thus, the decree will be a punishment or criminalizes formally on any person who using any kind of information technology and any other’s private life to blackmail or to threaten others online. In addition, at the present time, with the most detailed new cybercrime law that can be used to prove found guilty. As well, the author discusses that the new cyber-crime law provides protection of personal information including banking information, credit cards and electronic payment information.

 

REFERENCES

[1] 7DAYS. (2014, August 10). Abu Dhabi Police say people are still falling prey to “indecent” cyber crime. Retrieved March 11, 2015, from http://7daysindubai.com/abu-dhabi-police-say-people-still-falling-prey-indecent-cyber-crime

[2] Amin Hasbini, M. (2014, June 23). The Rise of Cybercrime in Dubai and UAE. Retrieved April 7, 2015, from https://securelist.com/blog/research/63682/the-rise-of-cybercrime-in-dubai-and-uae/

[3] Berger, H. (2012, July 28). Vigilance key to reducing internet cyber attacks in UAE. The National. Retrieved April 6, 2015, from http://www.thenational.ae/lifestyle/personal-finance/vigilance-key-to-reducing-internet-cyber-attacks-in-uae#full

[4] Bisson, D. (2014, October 30). Authentication and Awareness: The Anti-Cybercrime Duo. Retrieved March 8, 2015, from http://www.tripwire.com/state-of-security/security-awareness/authentication-and-awareness-the-anti-cybercrime-duo/

[5] Ctb.ku. (2014). Collecting and Analyzing Data. Retrieved May 12, 2015, from http://ctb.ku.edu/en/table-of-contents/evaluate/evaluate-community-interventions/collect-analyze-data/main

[6] Emirates247. (2013, January 14). . ‘Banking is the most targeted sector for cybercrime in UAE’. Retrieved April 12, 2015, from http://www.emirates247.com/news/emirates/banking-is-the-most-targeted-sector-for-cybercrime-in-uae-2013-01-14-1.490928

[7] Enzer, G. (2011, September 18). UAE faces high rates of cyber-crime: 1.4m UAE residents have been affected by online crime in 12 months. Retrieved April 6, 2015, from http://www.itp.net/586180-uae-faces-high-rates-of-cyber-crime

[8] Gaskell, H. (2015, March 18). UAE is top-two victim of regional cyber attacks: Country is second most hit victim in the Middle East and 15th worldwide. Retrieved April 8, 2015, from http://www.itp.net/602495-uae-is-top-two-victim-of-regional-cyber-attacks

[9] Gercke, M. (2012). UNDERSTANDING CYBERCRIME: Phenomena, Challenges and Legal Response. Retrieved March 12, 2015, from http://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime legislation EV6.pdf

[10] Malek, C. (2014, April 3). UAE calls for stronger cybercrimes laws. Retrieved March 12, 2015, from http://www.thenational.ae/uae/technology/uae-calls-for-stronger-cybercrimes-laws
[11] Menting, M. (2015). Academia.Edu. CybercrimePPT. Retrieved April 10, 2015, from http://www.academia.edu/217243/Cybercrime_PPT

[12] Moukhallati, D. (2014, April 28). Cyber crimes in Dubai nearly double in 2012. Retrieved March 11, 2015, from http://www.thenational.ae/uae/cyber-crimes-in-dubai-nearly-double-in-2012

[13] Moyenorient3. (2014, March 11). United Arab Emirates: Tracking “cyber-criminals” Telecommunications Regulatory Authority and cyber-crime units. Retrieved March 13, 2015, from http://12mars.rsf.org/2014-en/2014/03/11/united-arab-emirates-tracking-cyber-criminals/

[14] Mustafa, A. (2012, November 13). Cyber-crime law to fight internet abuse and protect privacy in the UAE. Retrieved April 13, 2015, from http://www.thenational.ae/news/uae-news/cyber-crime-law-to-fight-internet-abuse-and-protect-privacy-in-the-uae

[15] Mustafa, A. (2012, November 13). Cyber-crime law to fight internet abuse and protect privacy in the UAE. Retrieved March 13, 2015, from http://www.thenational.ae/news/uae-news/cyber-crime-law-to-fight-internet-abuse-and-protect-privacy-in-the-uae

[16] Noorhan, B. (2014, May 31). Most common cyber crimes in UAE are fraud involving money and extortion. Retrieved April 12, 2015, from http://gulfnews.com/news/uae/general/most-common-cyber-crimes-in-uae-are-fraud- involving-money-and-extortion-1.1341312

[17] Nykodym, N. (2005). Criminal profiling and insider cyber crime. Retrieved March 12, 2015, from http://www.sciencedirect.com/science/article/pii/S1742287605000915

[18] Princeton. Education. (n.d.). What is a Primary Source?. Retrieved May 12, 2015, from http://www.princeton.edu/~refdesk/primary2.html

[19] Sagepub. (n.d.). The Research Process. Retrieved April 12, 2015, from http://www.sagepub.com/upm-data/44129_1.pdf

[20] UAECyber. (n.d.). UAE Federal Cyber Crime Laws. Retrieved March 12, 2015, from http://uaecyber.com/en/about/government-initiatives/uae-federal-cyber-crime-laws/

[21] VBTUTOR. (2013). Chapter 7: Data Collection. Retrieved April 3, 2015, from http://www.vbtutor.net/research/research_chp7.htm

[22] Wam. (2012, November 14). New UAE cyber crime laws: Jail for indecent posts. Retrieved March 17, 2015, from http://www.emirates247.com/news/government/new-uae-cyber-crime-laws- jail-for-indecent-posts-2012-11-14-1.482836

[23] Wyse, S. (2011, September 16). What is the Difference between Qualitative Research and Quantitative Research? Retrieved April 13, 2015, from http://www.snapsurveys.com/blog/what-is-the-difference-between-qualitative-research-and-quantitative-research/

[24] Wyse, S. (2014, October 29). Benefit From 3 Types of Survey Research. Retrieved April 12, 2015, from http://www.snapsurveys.com/blog/benefit-3-types-survey-research/

[25] Wyse, S. (2014, October 29). Benefit From 3 Types of Survey Research. Retrieved March 17, 2015, from http://www.snapsurveys.com/blog/benefit-3-types-survey-research/