International legislative obstacles related to artificial intelligence
Keywords:
international dimension, artificial intelligence crimes, comparative legislationAbstract
This study gains its importance from its approach to artificial intelligence from the perspective of the negative side related to cybercrime and its impact on the components of society. In the face of this new type of crime, current national penal laws do not appear as adequate or effective as required.
Downloads
References
[1] Osama Mohamed Mohieldin Awad, Computer Crimes and Other Crimes in the Field of Information Technology, Research presented to the Sixth Conference of the Egyptian Society of Criminal Law, Cairo, October 34, 1993
[2] Jamil Al-Saghir - Crimes Arising from the Use of Computers, Cairo, Dar Al-Nahda Al-Arabiya, p. 23.
[3] Jamil Abdel Baqi Al-Saghir, Substantive Provisions for Internet-Related Crimes, Dar Al-Nahda Al-Arabiya, Cairo, 1999.
[4] Abdel Razek Mukhtar Mahmoud, Applications of Artificial Intelligence, An Introduction to the Development of Education in Light of the Covid-19 Pandemic, International Journal of Research in Educational Sciences, Vol. 3, No. 4, 2020.*
[5] Dictionary of meanings available on the internet https://www.almaany.com/ar/dict/ar-a? Accessed November 20 , 2024.
[6] Jamil Abdel Baqi in his book - Crimes arising from the computer - a report submitted to the Sixth Conference of the Egyptian Society of Criminal Law - Dar Al-Nahda Al-Arabiya, Cairo, 1996.
[7] Hisham Mohamed Farid Rostom, research presented to the Conference on Law, Computer and the Internet from 1 to 3 May 2000 at the United Arab Emirates University entitled Information Crimes).
[8] Friedman. 445 F. 2d 1076, 1087 (9th Cir.) (The theft of grand jury minutes and the information contained therein was theft of government property.) The certificate was rejected. 404 U.S. 958 (1971) United States v. Morison, 604 F. Supp. 655, 663-65 (D. Md. 1985) ("theft" of confidential information supports a conviction for embezzlement); United States vs United States. DiGillo, 538 F. 2d 972 (3d Cir). The certificate was rejected. 429 US 871 (1971) (theft by photographing sufficient government records to support and 641 advocacy): United States v. MeAusland, 979 F.2d 970 (4th Cir. 1992) (theft of confidential bid information of the competitor violates & 641).
[9] (Nicholson) Keith – International Computer Crime: A Global Village Under Siege
[10] (SIEBER) D. Ulrich Computer and Other IT-Related Crimes, rev. inter.de droit penal, 1991, p. 1033
[11] 31. Lester, Martin. Duffy, John. Giddings, Seth. Grant, Ian. Kelly, Kieran. (January 29, 2009) New Media: A Critical Introduction, USA/UK Europe: Routledge. 2 edition.
[12] A Regona, Massimo & Yigitcanlar, Tan & Xia, Bo & Li, R.Y.M. (2022). Opportunities and Challenges of Adoption in the Construction Industry: A PRISMA Review. Journal of Open Innovation Technology Market and Complexities, 8(45). https://doi.org/10.3390/joitmc8010045
[13] Bernard B. Zajack Jr., Police Responses to Computer Crime in the United States, July – Uigh 1985 Computer Law and Security Report, pp. 16-17
[14] Cardona, Artificial Intelligence and the Future of Education, USA, (2) Miguel Office of Educational Technology, May 2023, p.13
[15] Cybercrime, Fall 1996, p. 1. "Accountability offence is any violation of the law involving knowledge of computer technology to be committed, investigated or prosecuted" available online in February 2000 at:
[16] Definitions: "For the purposes of this Agreement: devices connected to a computer system or related devices, one device or means any other device or group of devices, according to the program, automatically processes data" computer-related crimes
[17] Donn, B., Parkar, Weaknesses in the Electronic Remittance System for Intentionally Causing Losses to Computers and the Electronic Money Transfer System Banking, and Public Policy edited by Kent W. Colton and Kenneth L. Kramer, Full Translation Press 1980, p. 97
[18] FGSSC - Available online in February 2000 at: http://www.usdoj.gov/criminal/cybercrime/search docs/toc.htm
[19] Friedman, L., Blair Black, N., Walker, E., & Rochelle, J. (November 8, 2021) Al in Education Secure Needs You. Association of Computing Machines https://cacm.acm.org/blogs/blog-cacm/256657-safe-ai-in-education- Blog, Need You/ Full Text
[20] of support provided http://www.witsa.com December 2000 available online in December 2000, at: http://www.mcconnellinternational.com/services/cybercrime.html
[21] Gartner (n.d.) Gartner Glossary: Augmented Intelligence. Gartner: https://www. Intelligence
[22] gartner.com/en/informationtechnology/glossary/augmented-
[23] http://wings.buffallo.edu/complaw/complawpapers/scalion.html
[24] http://www.mcconnellinternational.com
[25] J.Tappolet , La fracuc infiromatieque, rev, int, crim poltech 1988, p.351
[26] Jack Bologona Faro Company Prevention and Detection Base, Butterworth Publishers 1984, p.75
[27] Jay, J. Baker Computer Crimes Trial (1980), 2 Computer Law, Journal 441
[28] John Eaton and Jeremy Smithers, that's it. Amangagrs Guide to Information Technology, London, Philip Allan, 1982 p.263
[29] Network Prof. Dr. med. Henrik W. K. Threats and Opportunities Criminal Perspective, p. 258. Five European criminal justice cases: corruption, women in the criminal justice system, criminal policy indicators, community crime prevention and cybercrime procedures of the Sixth European Symposium on Crime and Criminal Policy, Helsinki, 10-12 December 1998, European Institute for Crime Prevention and Control, United Nations Affiliated (HEUNI), P.O. Box 161, f. 00131 Helsinki Finland Publication Series No. 34 - Thumir
[30] Technical difficulties are related to the encryption methods used on the network.
[31] Manfred Motherin Schlager, Computer and Other Crimes against Information Technology in Bermani, rev, inter, D.P. leret 2e trimesters 1993, p. 351.
[32] International and Comparative Law in New England Annual 1996
[33] New England College of Law P. I. Available online September 2001 at: http://www.nest.edu/annual/vol2/computer.htm
[34] Rcmp op-cita Computers and telecommunications explode in the next century Prosecutors and prosecutors face a new type explosion in the next century Prosecutors and prosecutors have begun to face a new kind of problem
[35] Richard Tutta and Antong Hardcastle, Computer Related Crime in Information Technology Law edited by Chris Edwards and Nigel Savage Macmillan Publisher 1986, p.201
[36] Russell, S. (2019). Compatible with human: artificial intelligence and the problem of control. Viking. ISBN978-0-525-55861-3 .
[37] Thoumyre - Abuse in Cyberspace op. cit. P.9 Think globally and act locally
[38] The transient nature of cyberspace, (cybercrime and the ancient law of global cyber punishment< Information p. 2 Report by McConnell International
[39] UNITED STATES V. SAMPSONM, 6 COMP, L. SERV. REP. 879 (N.D. Cal. 1978)
[40] Voir website: Temp (Royal Canadian Mounted Police) "Computer crime is any illegal act involving computer systems whether a computer is a crime, a tool used to commit a crime, or a response available on the Internet in the February 2000 crime." Guide related to http://www.rcmp.com (Mac D. Rush - Criminal Law and Internet - Internet and Society). © Copyright 1996 by Computer Law Society, in: Inc. P.6, Donn Parker of Sri,
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 The International tax journal

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.