ذاتية الجرائم الرقمية والامن السيبراني

المؤلفون

  • محمد زيدون خلف جبار المؤلف
  • د. حيدر غازي فيصل المؤلف

DOI:

https://doi.org/10.64184/ajlps.V2.I3.Y2025.P958-990.177

الكلمات المفتاحية:

الجرائم الرقمية, الامن السيبراني, الجرائم التقليدية, الجرائم الاقتصادية, امن المعلومات, الخصوصية الرقمية.

الملخص

تتمحور هذه الدراسة حول إشكالية الخلط المفاهيمي بين الجرائم الرقمية والجرائم التقليدية والاقتصادية من جهة، وبين الأمن السيبراني وأمن المعلومات والخصوصية الرقمية من جهة أخرى، وهو خلط يتترتب عليه قصور في فهم الطبيعة القانونية لهذه الظواهر وعدم وضوح في آليات مواجهتها. وتتجلى أهمية هذه الدراسة في جانبها العلمي من خلال الإسهام في ضبط المصطلحات وتحديد الفوارق الجوهرية بينها بما يعزز البناء النظري في الفقه الجنائي، وفي جانبها العملي من خلال توجيه المشرع وصناع القرار نحو وضع تشريعات أكثر دقة وملائمة لطبيعة البيئة الرقمية.

 وقد اعتمدت الدراسة المنهج الوصفي التحليلي  عبر استقراء النصوص القانونية والآراء الفقهية وتحليلها في ضوء التطورات التقنية المعاصرة. وخلصت النتائج إلى أن الجرائم الرقمية تمثل ظاهرة إجرامية مستقلة ذات بيئة تقنية خاصة، بينما يظل الأمن السيبراني إطارًا وقائيًا واسعًا يختلف في مضمونه من أمن المعلومات والخصوصية الرقمية، الأمر الذي يستدعي صياغة معالجات تشريعية دقيقة تستوعب هذه الفوارق وتحقيق حماية متكاملة للأمن الرقمي.

المراجع

First: Linguistic Dictionaries

1. Ibn Manzur, Lisan al-Arab, Al-Amiriya Press, Bulaq, Volume 8, 1st Edition, no date given.

Second: Legal Books

1. Abdullah Suleiman, Explanation of the Penal Code (General Section - Crime), University Publications Office, Lebanon, 1998.

2. Ghassan Rabah, Economic Penal Code, Al-Halabi Legal Publications, Beirut, Lebanon, 2012 ed.

3. Muhammad Jibril Ibrahim, Criminal Liability for Robot Crimes: A Prospective Analytical Study, Dar Al-Nahda Al-Arabiya, 2020 edition.

4. Muhammad Ali Suwailem, Criminal Protection of the Stock Exchange: Between Procedural Aspects and Substantive Provisions: A Comparative Study, Modern University Office, 2018.

5. Hana Mustafa Al-Khubairi, Cybercrimes and the Regulation of Digital Currencies - A Legal Study in International Legislation and Agreements, Dar Al-Nahda Al-Arabiya, 2022.

6. The National Cybersecurity Authority, Basic Controls for Cybersecurity, Kingdom of Saudi Arabia, Riyadh, 2018.

Third: Research and Research Papers

1. Ahmed Hassan Abu Al-Hassan, The Extent of the Impact of Digitization on the Severity of Economic Crimes, a study published in Aswan University Journal For Humanities, Volume (4), Issue (1), Faculty of Law, Aswan University, 2024.

2. Dr. Ahmed Hosni Ali Ashqar, Digital Privacy in the Era of Artificial Intelligence (A Reading of Jordanian and Palestinian Legislation), a research published in the Journal of Al-Quds Open University, Issue 66, Volume 7, Palestine, Ramallah, 2025.

3. Balasal Bint Nabi Yasmine, Muqdad Nabil, The Right to Digital Privacy, a research published in the Al-Mustaqbal Journal for Legal and Political Studies, Volume 5, Issue 1, Yahya Fares University of Medea, Medea, Algeria, 2021.

4. Hakim Sayyab, The Distinctive Features of Cybercrimes from Traditional Crimes, a research published in the Journal of Studies and Research, Volume (2009), Issue (1), University of August 20, 1955 Skikda, 2009.

5. Dr. Dhiyab Musa Al-Badayneh, Cybercrimes: Concept and Causes, a paper presented at the Scientific Forum on Emerging Crimes in Light of Regional and International Changes and Transformations, Jordan, Amman, 2014.

6. Dr. Rahmouni Muhammad, Characteristics of Cybercrime and its Areas of Use, a study published in Al-Haqiqa Journal for Social and Human Sciences, Issue (41), Ahmed Draia University - Adrar, Algeria, 2017.

7. Rashid bin Hamad Al-Balushi, Evidence in Cybercrime, a study published in the Journal of the Faculty of Law for Legal and Economic Research, Volume (2008), Issue (1), Alexandria University, 2008.

8. Reda Ibrahim Saleh, A Study of the Impact of Information Security Management on the Success of the Accounting Information Systems Security Program with a Field Study of Egyptian Companies, Journal of Contemporary Business Studies, Volume 6, Issue 10, Part One, 2020.

9. Saad Fahd Saad Adbis Al-Mutairi, The Concept of Cybercrime and Its Characteristics, a study published in the Legal Journal (a semi-annual peer-reviewed scientific journal), Volume 16, Issue 5, 2023.

10. Faisal Ja'ilan Al-Azmi, The Problem of Criminal Prosecution in Cybercrimes, a study published in the Journal of the Faculty of Sharia and Law, Tanta, Volume (39), Issue (2), Cairo University. Egypt, 2024.

11. Qasmiya Muhammad, Sources and Methods of Money Laundering Operations, Journal of Legal Studies and Research, Volume 9, Issue 1, 2024.

12. United Nations Office on Drugs and Crime, Laboratory and Scientific Affairs Section of the United Nations Office on Drugs and Crime in Vienna, Crime Scene and Physical Evidence (Awareness-Raising for Non-Criminal Analysis Staff), 2009.

13. Musa Masoud Arhuma, Criminal Policy in Confronting Cybercrimes, a study published in the Journal of Legal Studies, University of Benghazi - Faculty of Law, Issue 17, 2008.

14. Mansour Fahid Saeed Al-Harthi, Obstacles to Proving Information Technology-Related Crimes, a study published in the Legal Journal (a specialized journal in legal studies and research), a peer-reviewed scientific journal, Volume (15), Issue (4), 2023.

15. Dr. Zuhair Khuraibat Khalaf, Confronting Economic Crimes in Iraqi Legislation, a study published in the Journal of Basra Studies, Year (20), Issue (60), 2025.

16. Ziad Abdel Razzaq, Mustafa Zaghbi, Economic Cybercrimes: Concept and Motives, a study published in the Journal of Legal and Economic Studies, Volume (7), Issue (1), Algeria, 2024.

Fourth: Theses and Dissertations

A. Theses

1. Enas Ibrahim Al-Sheety, "Evaluating Information Security and Privacy Policies in Educational Institutions in the Kingdom of Saudi Arabia: An Applied Study at Qassim University," unpublished master's thesis, Qassim University, 2019.

2. Abdullah Hussein Ali Mahmoud: "Theft of Computer-Stored Information," Master's Thesis, Faculty of Law, Ain Shams University, 2001.

3. Abdullah Hussein Ali Mahmoud, "Theft of Computer-Stored Information," Master's Thesis, Ain Shams University, Faculty of Law, 2001.

4. Muhammad Nimah Kazim, "Trends in Criminal Policy in Combating Economic Crime," Master's Thesis, Al-Mustansiriya University, College of Law, Iraq, Baghdad, 2021.

5. Noura Al-Aqoun and Abdul Karim Basmaeel, "The Reality of Cyberspace and the Problem of National Defense," Master's Thesis, University of Kasdi Merbah, Algeria, Ouargla, 2019.

B. Theses

1. Basil Fayez Hamad Al-Qattatsheh, Mamdouh Hassan Matta, Criminal Protection of Digital Personal Data Privacy: A Comparative Study, PhD Thesis, International Islamic University of Science and Technology, Amman, 2022.

Fifth: Electronic Websites

1. Ahmed Fadel Al-Maamouri, Cybercrimes on Social Media: Limits of Complaint, Punishment, and Legislative Deficiencies in Iraqi Law, Al-Hewar Al-Mutamadin, Issue (5060), https://www.ahewar.org

2. Dr. Ali Adham, Information Security, Part Two, Al-Nahrain Center for Strategic Studies, an article published at the following link: https://www.alnahrain.iq/post/392

3. Dr. Mina Fayq, The Difference Between Cybercrimes and Traditional Crimes, an article available at the following link: https://www.menafayq.com/cybercrime-vs-traditional-crime/?utm_source=chatgpt.com

Sixth: Foreign sources

1. Arina Alexei ,Anatolie Alexei ,The difference between cyber security vs information security. Journal of Engineering Science, 29(4) , 2022.

2. Hathaway, R. M., McCreight, C., & Riley, J. (2012). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.

3. ISO/IEC 27001. (2013). Information technology - Security techniques - Information security management systems - Requirements. International Organization for Standardization, Appendix A Item.

4. Kizza, J. M. (2017). Guide to computer network security (4th ed.). Springer.

5. Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in computing (5th ed.). PearsonP.

6. Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). National Institute of Standards and Technology.

7. Shostack, A. (2014). Threat modeling: Designing for security. Wiley.

8. Whitman, M. E., & Mattord, H. J. (2018). Principles of information security (6th ed.). Cengage Learning.

التنزيلات

منشور

2025-09-01

كيفية الاقتباس

ذاتية الجرائم الرقمية والامن السيبراني. (2025). مجلة اشور للعلوم القانونية و السياسية تصدر عن الجمعية العراقية للعلوم القانونية, 2(3), 958-990. https://doi.org/10.64184/ajlps.V2.I3.Y2025.P958-990.177