1,433 research outputs found

    The Scope of the Digital Classifications\u27 Criminal Protection A Comparative Study of Arab Laws to Protect Copyright

    Get PDF
    The research has revealed that the scope of the criminal protection of digital classifications include computer programs and databases; however, legislations agree with respect to the first type and differ with respect to the second. The scope of criminal protection of computer programs include all their forms and types. However, the scope of criminal protection of databases is limited to innovation. The study discusses this limited scope and recommends the necessity of legislation clarifying said protection

    The Difficulties Which Oppose the Application of Texts of Robbery Crime Upon Computer Programs- الصعوبات التي تعترض تطبيق نصوص جريمة السرقة على برامج الحاسب الآلي

    Get PDF
    We started this article by an introduction regarding the importance of Computer, its parts, and the meaning of program and its sorts. In Chapter One we talked about the firmness of the utility of (money) on Computer programs, this chapter consists of three sections, in sec. 1 we talked about the attitudes of legislations regarding the firmness of the utility of (money) on Computer programs, these legislations are quite differed in their definition to robbery and its applications on the concept of money and things, we also detailed that computer has its own material and semantic identity. In sec. 2, we studied that opinion which do not regard computer programs to be money, we also disproved it. In sec. 3, we gave evidences that computer programs have money attribute, we also discussed the nature of computer programs, and the results which depend on mental imagination of this nature. In Ch. 2, we discussed to what extant computer programs can be submitted to embezzlement doing, in sec.1, we presented the meaning of embezzlement and the opinions on it, particularly the traditional and modern opinions. In sec. 2, we discussed the computer programs under the concept of embezzlement: How non-material things can be submitted to embezzlement, the legislations’ attitude from stealing electricity, the attitude of Jurisprudence and judgment of this matter, and if we can use the same attitude of electricity to be applied to computer programs. In sec. 3, we discussed the problems of computer programs embezzlement.

    Criminal Protection of Credit Cards Towards Bearer’s Acts

    Get PDF
    Financial institutions found more advanced means of settlement than the common commercial papers in the commercial environment, and more advanced than prevailing monies in the economic environment, which strengthened the credit and settlement environment through non-traditional tools, the most important of which is the credit and settlement cards innovated by the commercial transactions with widely spread grand stores, as a substitute for money. This made people use it excessively, a case which resulted in wide spread and consequently more legal complications the most important of which is the forgery and distortion. This dictates a necessity to study the criminal liability emanating from such acts and to search for an effective mechanism for a criminal protection of the card. Accordingly, the study has been divided into three parts, the first part studies the use of expired or cancelled card, the second part studies the responsibility of not returning the card after expiry while the third studies the responsibility emanating from exceeding the allowed limit of monies which can be drawn with the car

    Feminising a Cultural Issue: The case of informed consent

    Get PDF
    Commen

    Criminal Protection for Personal Data and Information Stored in Computer

    Get PDF
    The first chapter includes the meaning of information and data, its kinds and mane points of resemblance, and difference between data and information, and the most important characteristics of information. The second chapter putting for ward the necessity of research about criminal protection for personal data and information stored in computer which are represented in the following :- 1- The logical justification to search for protection. 2- The risks which the life specially exposed to, in particular, after depending on computer to store the personal data and information. 3- The importance for criminal protection. But the third chapter which comprises the difficulties which face the research during the application provision of penal law. These difficulties can be defined specifically by the following:- 1- Nature of the aggression which personal data and information exposed to. 2- Extent of application or applying the condition which requisite at information crime. 3- The risk which face applying the provision of penal law. In the fourth chapter which includes showing the criminal protection to personal data and information through the provision of supporting or protecting special life in Egyptian legislation. Within this legislation we discuss the crime against special life, and we review eavesdropping crime, wire tapping crime, recording and transcription of personal conversation. Also, we review picking up by receiving set, taking photographs or pictures by any receiver from special place. And we discuss the provision of supporting special life in Libyan legislation, and Iraqi legislation, and we explain the weak points of this provision, and it s failure to protect personal data and information stored in computer. At last we show that the French legislation is the best in this respect or field. Finally within the fifth chapter we discuss the criminal protection for personal data and information stored in computer through secret revealing crime which we declare the mane basic element, and we declare that these elements can not be stratification at the personal data and information, and incapable of the its protectio

    Towards Culture-Oriented Medical Philosophy, Education, Research and Practice

    Get PDF
    Medicine is a sociotechnical system wherein culture manifests itself in all its aspects. Culture, however, is often intangible and is frequently neglected in formal healthcare education, research and practice. This sounding board article attempts to generate interest in making culture a serious component of healthcare systems at different levels, including its founding philosophical underpinnings, educational systems, research activities and clinical practice. It is recommended that a framework of culture-oriented medical philosophy, education, research and practice be implemented. Each component of this framework is briefly discussed in relation to healthcare. Culture should be reflected explicitly in healthcare through research activities, medical humanities, cultural competence, communication and ethics. Keywords: Medicine; Medical Education; Medical Philosophy; Biomedical Research; Communication; Bioethics; Culture; Policy Making

    Advantages and Disadvantages of Maintenance Outsourcing in Manufacturing Companies: With Special References to Jubail Industrial City – KSA

    Get PDF
    The research study presents, discusses and offers understanding on outsourcing, the most important benefits (advantages) and potential risks (disadvantages) associated with-in. It emphasizes the outsourcing specialized maintenance activities and its role in business success. In this research, a hypothesis were develop whether the benefits of outsourcing maintenance in manufacturing companies are more than expected risk associated on this. Overall result of the survey ruled out that outsourcing provides more advantage than disadvantage in a manufacturing industry. Manufacturing industry is the major contributor to the Kingdom's economy wherein Jubail is the largest industrial city in the Middle East. This is also the home of Middle East's largest and world's fourth largest petrochemical company. Outsourcing maintenance has been one of the pillars of manufacturing industries in Jubail as become apparent thru the outcome of the study. The research has paved a way for everyone who are engaged in outsourcing maintenance in providing them wise decision making. Managers need to contemplate maintenance outsourcing if it provides potential advantage to their company. Contractor qualification classifications established on the set conditions done by the government is recommended. More studies regarding maintenance outsourcing is needed in the academics as well as in advance forums. The author has successfully developed statistical survey wherein the respondents are professionals, engineers and management of prestigious manufacturing industries in Jubail, It is an impressive feedback that majority of manufacturing industries most likely practice and recommend outsourcing for the maintenance. 84.6% of the overall respondents practice outsourcing in the manufacturing industries and 80.0 % of them is highly recommending outsourcing here in Jubail Industrial City. Likewise, the author recommended future expanded studies interrelated with outsourcing and maintenance. Keywords: Outsourcing, Maintenance, Manufacturing Industries. Jubail Industrial City
    • …
    corecore