Cyber Security Crime and Punishment: Comparative Study of the Laws of Jordan, Kuwait, Qatar, Oman, and Saudi Arabia

Cyber Security Crime and Punishment: Comparative Study of the Laws of Jordan, Kuwait, Qatar, Oman, and Saudi Arabia

Evon Abu-Taieh, Auhood Alfaries, Shaha Al-Otaibi, Ghadah Aldehim
Copyright: © 2018 |Pages: 14
DOI: 10.4018/IJCWT.2018070104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cyberspace and the existence of the internet allows different types of crimes to appear. Hence, there is a need for new laws to be set with a collective, comprehensive, view of crime and a global understanding. This article studies 5 different countries' laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These different countries issued different laws at different times, some in 2007 others are as new as 2015. The article looks at the laws from an academic definition of different crimes, and also describes the laws from a perspective of each country.
Article Preview
Top

Introduction

Cyber-crime is a global worry that touched the world, the new technology of internet and smart tools spawned new types of crime and they are on the rise. In the UK, (NCA, 2016) stated that “cybercrime now accounts for more than 50% of all crimes in the UK.” Worldwide “According to the PandaLabs report, 18 million new malware samples were captured in this quarter alone, an average of 200,000 each day” (Pandasecurity, 2016). “Policing, especially in cyberspace, is no longer the exclusive preserve of law enforcement. The private sector, academia, and citizens themselves all need to be involved,” the Interpol chief said (Interpol, 2016). Furthermore, “ensuring that police around the world are provided with the basic equipment and training they need”. According to a study conducted by Cukier there is a hack attempt every 39 seconds (Cukier, 2018). There is a 600% increase of attacks against IoT devices from the year 2016 to 2017, also average number of malicious mobile apps blocked each day is 24,000 (Symantec, 2018). Nearly 700 million people in 21 countries experienced some form of cybercrime (Symantec, 2018). Crimes are spreading to the entire world, since the whole world is interconnected. One the Major destructive malware attacks is Shamoon use against Saudi Arabia in 2012 and 2016 according to Symantec (2018).

Saudi Arabia ranked number 5 according to (Symantec, 2018) in email malware rate followed by Kuwait as 8. Saudi Arabia ranked number 1 according to (Symantec, 2018) in Spam rate by country followed by Kuwait as 6 and Oman 7.

According to (Stalling, 2011) attacks on computers can be categorized into two categories: Passive and active attacks. Passive attacks imply interception of data or information hence threatening the secrecy, which can be classified to release of contents and traffic analysis. On the other hand, active type of threat can be categorized into four categories: masquerade, replay, modification of message, and denial of service. The masquerade active attack implies impersonating an entity. Replay involves retransmission of data to produce “unauthorized effect” (Stalling, 2011). The modification of message as the name implies is to alter/delay a message to produce an unauthorized effect. The denial of service is to prevent “a normal use or management of communications facilities” (Stalling, 2011). Defining the different types of threats academically does not make the act illegal. Hence, laws, rules, regulations must define such acts as criminal acts in order to make such act punishable by law.

Furthermore, other uses of data, information, and websites were made illegal by different laws and regulations according to countries: transfers, copy and modifications to data, information, websites that pertains to financial matters, sex, national security, national economy, and public safety of the country. Uses of websites and other electronic sources for the purpose of human trafficking, drugs, and terrorism were made illegal.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing