International Journal of Humanities and Social Science

      ISSN 2220-8488 (Print), 2221-0989 (Online) 10.30845/ijhss

      Call for Papers

      The Brooklyn Research and Publishing Institute (BRPI) invites academics, scholars, researchers, and professionals from around the world to submit their manuscripts for publication in our wide range of highly esteemed peer-reviewed academic journals.

      Read more...

      Recruitment of Reviewers

      The Brooklyn Research and Publishing Institute (BRPI), a distinguished international publisher of open-access academic journals, is currently inviting qualified scholars to join its esteemed pool of peer reviewers.

      Read more...

      Legal Form of Cyber Fraud Crime in the Jordanian and Comparative Legislation
      Dr. Ibtisam Saleh, Dr. Hanan Al Daher

      Abstract
      This paper addresses the legal form of a cyber fraud crime in the Jordanian and comparative legislation. The Jordanian legislator restricts the object of criminal protection to funds and overlooks, despite technology advancement and information revolution, protecting information funds from fraudulent seizure. There is a special provision in the Cybercrime Law, which is stated in general terms, that stipulates punishment of any person who commits a crime stated in any law if committed by technical means, by the penalty set in this Law. However, it does not cover data and information as an object of fraud. In order to achieve the envisaged objectives of the study, this study has initially looked into the object of cyber fraud to indicate whether information and data serve as an object of traditional fraud crime. The computer and IT fraud was then examined, and the legislation and jurisprudence perspective vis-a-vis this crime was illustrated. The material element of the cyber fraud crime was demonstrated next. This paper tackles cyber fraud means set forth in comparative legislation. It demonstrates the special nature of delivery in cyber fraud, as well as delivery by means of information systems. It concludes that data and information do not fit for physical delivery required by the legislator in the traditional fraud crime and that that there is a need for the legislator to intervene and deal with cyber fraud through an explicit provision.

      Full Text: PDF

      主站蜘蛛池模板: 调教办公室在线观看| 一区二区三区四区精品视频| 欧美精品18videosex性欧美| 国产V亚洲V天堂无码网站| 在线免费视频你懂的| 岛国片免费在线观看| 久久精品国产精油按摩| 欧美视频第一页| 动漫美女被吸乳羞羞网站动漫| 黑人巨茎美女高潮视频| 国产麻豆天美果冻无码视频| 丁香花高清在线观看完整版| 日韩在线视频导航| 亚洲护士毛茸茸| 男女抽搐动态图| 四虎永久精品免费网址大全| 国模欢欢炮交150视频| 国产麻豆欧美亚洲综合久久 | 调教奴性同桌h| 国产精品一区高清在线观看| chinese乱子伦xxxx国语对白| 无人高清视频完整版在线观看| 乱子伦xxxx| 欧美日韩不卡高清| 优优里番acg※里番acg绅士黑| 脱了美女内裤猛烈进入gif| 国产成人久久久精品二区三区| 337p日本欧洲亚洲大胆裸体艺术| 女人与大拘交口述| 中文字幕国产欧美| 日本边添边摸边做边爱喷水| 亚洲一区二区三区丝袜| 欧美视频日韩视频| 人善交video欧美| 精品国产一区二区三区久久| 国产一区二区不卡老阿姨| 黄色软件网站大全| 国产精品一级二级三级| 87福利电影网| 特级毛片a级毛片在线播放www| 女人被免费视频网站|