Investigating Electronic Defamation Using The Internet
Abstract
The study was aimed at identifying the most important methods that help in developing criminal investigation skills to confront cyber-crimes. The study was based on more than one approach. It was based on the inductive method, which is based on the deductive approach. The most important findings were: Electronic evidence has a specific scientific value in referring to the facts it contains, but it is indispensable that it be legitimate, both in terms of existence, to be among the legally accepted evidence as a means of proof. 1. The reasons for the difficulty of detecting cybercrime can be explained by the fact that this crime does not leave any visible external impact that the offender can commit this crime in other countries and continents because cybercrime is a transnational crime. 2. The lack of technical and technical expertise in the police, prosecutors, and the judiciary. This is a major obstacle to proving cybercrime. This type of crime requires training and qualification in information technology, evidence collection, research, and trial in the computer and Internet environment. 3. Cybercrime may be part of traditional crime, in the sense that there is a traditional crime involving an electronic aspect.
References
2. Adetayo, J. O., S.A. Sanni, and M.O. Ilori (1999). The Impact of Information Technology on Product Marketing: A Case Study of Multinational Company in Nigeria, Technovation, Elsevier Science Ltd.
3. Akpore, S. A (1998). The Backbone of Banks Service Regeneration , Money watch, J 22.
4. Al - Alfi, Mohamed Mohamed (N.D.) Subjective Provisions and Patterns, Working Paper on Legislation Combating Electronic Terrorism Crimes.
5. Al-Afifi, Youssef Khalil Youssef (2013) Electronic Crimes in Palestinian Legislation "Comparative Analytical Study", Department of Public Law, Faculty of Sharia and Law, Islamic University.
6. Al-Balawi, Salem Hamed Ali (2009) Modern techniques in criminal investigation and its role in crime control, Department of Police Sciences, Faculty of Graduate Studies, Naif University for Security Sciences.
7. Ali, Manal El-sayed (2016). The Role of Assistive Technology in the Integration of the Visually Impaired Group with the Availability of Information and Free Trade and the Impediments of its Application in the Arab Countries, Kuwait Annual Conference.
8. Almatarneh, A., (2011) Privacy implications for information and communications technology (ICT): The case of the Jordanian egovernment, Journal of International Commercial Law and Technology, 6 (3).
9. Al-Qahtani, Abdullah Hussein Al-Hajraf (2014) Development of criminal investigation skills in the face of cybercrime. An applied study on the investigators of the Investigation and Prosecution Department in Riyadh, Master Thesis, Police Sciences Department, Graduate School, Naif Arab University for Security Sciences.
10. Arim, Abdul-Jabbar (1970) Theories of Criminology, Dar al-Ma'aref, Baghdad.
11. Ashour, Mohamed Hamdan (2010) Methods of Investigation and Criminal Research, Department of Curricula, Academic Affairs, Palestine Academy for Security Sciences.
12. Attai, Ibrahim Ramadan Ibrahim (2015) Electronic Crime and Ways to Confront it in Islamic Law and International Systems (Applied Analytical Study), Faculty of Sharia and Law, Tanta, Vol. 30, Part 2.
13. Attaran, M. (2003). "Information technology and business-process redesign." Business Process Management Journal 9(4).
14. Badia, Thiab (2014) Cyber Crimes: The Concept and the Causes, The Scientific Forum The crimes that were created in light of regional and international changes and changes during the period from 2-4 / 9/2014, Amman.
15. Beig, Mina, Mohammad Hassan Pourhasomi, Yaser Ghorbanzad (2012). The Role of Information Technology and Customer Relation Management in The Supply Chain, Interdisciplinary Journal of Contemporary Research in Business, Vol. 4, No. 8.
16. Boulmain, Naguib (2008) Crime and the sociological question A study of its sociocultural and legal dimensions, Ph.D., Department of Sociology and Demography, Faculty of Humanities and Social Sciences, Montessori University of Constantine.
17. Bounaara, Yasmina (N.D.) Electronic Crime, Prince Abdul Qader University of Islamic Sciences.
18. Bushati, Brilanda, Damir Šehoviý, and Ilir Binaj (2015). The Importance of Information Technology Use in Business Management, Academic Journal of Interdisciplinary Studies, Vol 4, No 2.
19. Choi, Hyunsang, Hanwoo Lee, Heejo Lee, Hyogon Kim (2007). Botnet Detection by Monitoring Group Activities in DNS Traffic, in Proc. 7th IEEE International Conference on Computer and Information Technology (CIT 2007).
20. Cuel, Roberta ,and Roberta Ferrario (2006) The impact of technology in organizational communication processes: toward constructivism, Italian National Research Council.
21. Dacey, Raymond, & Kenneth Gallant (1997). Crime control and harassment of the innocent, Journal of Criminal Justice, Elsevier, vol. 25(4)
22. Dilio, Fadel (2010). New Media and Communication Technology, Concept-Uses-Horizons, House of Culture, Hashemite Kingdom of Jordan, Amman.
23. Hassan, Ehsan Mohamed (1993) Criminology, An Analytical Study on the Role of Social Factors in Crime, University of Baghdad
24. Hijazi, Abdul Fattah Bayoumi (2004) Consumer Protection from Commercial Fraud and Counterfeiting in E-Commerce Contracts via the Internet, Third Symposium on Combating Commercial Fraud and Counterfeiting in the GCC Countries, Riyadh, September 2004.
25. Hijazi, Mohamed (2005) Crimes of Accounts and the Internet "Cyber Crime", Egyptian Center for Intellectual Property.
26. Hindi, Amani Ahmed Mashhour, and Basma Salih al-Din Rifai (2017). 5th International Applied Arts Conference, Damietta, Ras El Bar, Applied Arts and Future Prospects, Faculty of Applied Arts, Damietta University.
27. https://sites.google.com/site/callingoffcybercrime/types-of-cyber-crime
28. Jain, Neelesh, & Vibhash Shrivastava (2014). Cyber Crime Changing Everything – an Empirical Study, International Journal of Computer Application, Vol.1, Issue 4.
29. Jain, Neelesh, & Vibhash Shrivastava (2014). Cyber Crime Changing Everything – an Empirical Study, International Journal of Computer Application, Vol.1, Issue 4.
30. Jain, Neelesh, Vibhash Shrivastava (2014). Cyber Crime Changing Everything – An Empirical Study, International Journal of Computer Application Issue 4, Vol. 1.
31. Jamal, Brahimi (2018) Criminal Investigation of Cybercrime, PhD Thesis, Department of Law, Faculty of Law and Political Science, Mouloud Mameri University, Tizi Ouzou.
32. Jamal, Brahimi (2018) Criminal Investigation of Electronic Crimes, PhD Thesis, Department of Law, Faculty of Law and Political Science, Mouloud Mameri University, Tizi Ouzou.
33. Kaur, Navneet (2018). Introduction of Cyber Crime and Its Type, International Research Journal of Computer Science, Vol. 5, Issue 08.
34. Kumar, M.Prasanna (2014) Information Technology: Roles, Advantages and Disadvantages, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 6.
35. Kurt, İbrahim, Hakan GÖK (2015) Impact of Technology on the Perceptions of Culture Shock , Mevlana International Journal of Moral and Values Education (MIJMVE), Vol. 2(2).
36. Lee, Heejin, and Edgar A. Whitley (2002) Time and Information Technology: Temporal Impacts on Individuals, Organizations, and Society, The Information Society, 18.
37. Li, Chu-Fen (2007) The Role of Information Technology in Operating Cost and Operational Efficiency of Banks: An Application of Frontier Efficiency Analysis, Asian Journal of Management and Humanity Sciences, Vol. 2, Nos.
38. Longe, Olumide, Oneurine Ngwa, Friday Wada, Victor Mbarika (2009) Criminal Uses of Information & Communication Technologies in Sub-Saharan Africa: Trends, Concerns and Perspectives, Journal of Information Technology Impact, Vol. 9, No. 3.
39. Marquezia, Jean (1983) Crime, translated by Issa Asfour, Oweidat Publications, Beirut.
40. Murtala, Dalhatu Daboh (2005). an Assessment of The Impact of Globalization on Information and Communication Technology (ICT) in NIGERIA, Department of Business Administration, Faculty of Administration, Ahmadu Bello University.
41. Nasser, Mazen Khalaf (N.D.) Principles of Criminal Investigation, Lecture Series for students of the fourth stage, Faculty of Law, University of Mustansiriya.
42. Oluwatolani, Oluwagbemi, Abah Joshua and Achimugu Philip (2011). The Impact of Information Technology in Nigeria's Banking Industry, Journal of Computer Science and Engineering, Volume 7, Issue 2.
43. Research and Studies Complex (2016) Cyber Crime in the Gulf Society and how to face it, the first winner of the competition, Sultan Qaboos Academy for Police Sciences, Nizwa, Sultanate of Oman.
44. Tan, Khong Sin , Siong Choy Chong, Binshan Lin, Uchenna Cyril Eze, (2009). Internet based ICT adoption: evidence from Malaysian SMEs, Industrial Management & Data Systems, Vol. 109 Issue: 2.
45. Tarizi, Nadim Mohammed Hassan (2017) Prosecution authorities pubic in informatics crimes (inspection - inspection), Andalus Journal of Humanities and Social Sciences, No. 13, vol.
46. Thong, J. Y. L. and C. S. Yap (1995). "CEO characteristics, organizational characteristics and information technology adoption in small businesses." Omega 23(4).
47. Tommy, Abdul Razzaq (2006). Information Technology and its Role in National Development - A Field Study in the State of Umm al-Bouaqi, Department of Library and Information Science, University of Constantine.
48. Williams, Luther S. (n.d.). Information Technology: Its Impact on Undergraduate Education in Science, Mathematics, Engineering, and Technology, Report on an NSF Workshop, Directorate for Education and Human Resources, Division of Undergraduate Education.
49. Yeganeh, Mehri Ezadi (2002) The impact of national and organizational culture on information technology (IT), MLS in Library and information Science, Islamic Azad University, Qom branch.