{"id":1927,"date":"2019-05-14T11:51:10","date_gmt":"2019-05-14T11:51:10","guid":{"rendered":"http:\/\/ishik.edu.iq\/conf\/ilic\/?page_id=1927"},"modified":"2019-05-20T08:49:30","modified_gmt":"2019-05-20T08:49:30","slug":"research-31-ilic-2019","status":"publish","type":"page","link":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/","title":{"rendered":"Research 31 ILIC 2019"},"content":{"rendered":"<h3>Research Title:&nbsp;<strong>\u0627\u0644\u0645\u0648\u0627\u062c\u0647\u0629 \u0627\u0644\u062a\u0634\u0631\u064a\u0639\u064a\u0629 \u0644\u062c\u0631\u0627\u0626\u0645 \u0627\u0644\u0625\u0631\u0647\u0627\u0628 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a<\/strong><\/h3>\n<p><strong>Author:  \u0627\u0644\u062f\u0643\u062a\u0648\u0631 \u0645\u0645\u062f\u0648\u062d \u062d\u0633\u0646 \u0645\u0627\u0646\u0639 \u0627\u0644\u0639\u062f\u0648\u0627\u0646<\/strong><\/p>\n<div align=\"justify\"><strong><strong>Abstract:&nbsp;<\/strong><\/strong>     The world experienced a tremendous development and acceleration in information technology; the widespread use of the Internet and social media made it easier for perpetrators to commit cyber crimes. The easy and remote means cyber crimes have; in addition to the difficulties of obtaining evidence in the event of cyber crimes warranted widening the division of those exposed to the evils of offenders.<br \/>\n There is no doubt that cybercrime is one of the most serious crimes committed by electronic means, which necessitates confronting this danger by forcing specific legislative provisions to govern the nature of such crimes. These legislative provisions must be comprehensive in their criminal framework to cover the multiple forms of terrorist activity committed by electronic means.<br \/>\nIn this paper, we will discuss the concept of electronic terrorism \u201ccyber terrorism\u201d, the means of committing it and its motives; as well as the statement of legal forms of cybercrime, the analysis of legislative statements, their applicability to these crimes, and the shortcomings of the legislative confrontation.<br \/>\nKeywords: terrorism, cyber, crimes, means, legislation, shortcomings.\n<\/div>\n<p style=\"text-align: center;\">Download the PDF Document&nbsp;<a href=\"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-content\/uploads\/2019\/05\/\u0627\u0644\u0645\u0648\u0627\u062c\u0647\u0629-\u0627\u0644\u062a\u0634\u0631\u064a\u0639\u064a\u0629-\u0644\u062c\u0631\u0627\u0626\u0645-\u0627\u0644\u0625\u0631\u0647\u0627\u0628-\u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a.pdf\"><b>from here<\/b><\/a>.<\/p>\n<p style=\"text-align: center;\"><strong>doi:10.23918\/ilic2019.31<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n<p style=\"text-align: center;\"><strong> PROCEEDINGS OF 4th iNTERNATIONAL LEGAL ISSUES CONFERENCE 2019<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>Faculty of Law\/ Tishk International University<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>Date: 30th April 2019<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>Venue: Kurdistan Region_Erbil<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>ISBN:9789922903620<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research Title:&nbsp;\u0627\u0644\u0645\u0648\u0627\u062c\u0647\u0629 \u0627\u0644\u062a\u0634\u0631\u064a\u0639\u064a\u0629 \u0644\u062c\u0631\u0627\u0626\u0645 \u0627\u0644\u0625\u0631\u0647\u0627\u0628 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a Author: \u0627\u0644\u062f\u0643\u062a\u0648\u0631 \u0645\u0645\u062f\u0648\u062d \u062d\u0633\u0646 \u0645\u0627\u0646\u0639 \u0627\u0644\u0639\u062f\u0648\u0627\u0646 Abstract:&nbsp; The world experienced a tremendous development and acceleration in information technology; the widespread use of the Internet and social media made it easier for perpetrators to commit cyber crimes. The easy and remote means cyber crimes have; in addition to the difficulties &hellip; <\/p>\n","protected":false},"author":27,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1927","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Research 31 ILIC 2019 - ILIC TIU<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Research 31 ILIC 2019 - ILIC TIU\" \/>\n<meta property=\"og:description\" content=\"Research Title:&nbsp;\u0627\u0644\u0645\u0648\u0627\u062c\u0647\u0629 \u0627\u0644\u062a\u0634\u0631\u064a\u0639\u064a\u0629 \u0644\u062c\u0631\u0627\u0626\u0645 \u0627\u0644\u0625\u0631\u0647\u0627\u0628 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a Author: \u0627\u0644\u062f\u0643\u062a\u0648\u0631 \u0645\u0645\u062f\u0648\u062d \u062d\u0633\u0646 \u0645\u0627\u0646\u0639 \u0627\u0644\u0639\u062f\u0648\u0627\u0646 Abstract:&nbsp; The world experienced a tremendous development and acceleration in information technology; the widespread use of the Internet and social media made it easier for perpetrators to commit cyber crimes. The easy and remote means cyber crimes have; in addition to the difficulties &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"ILIC TIU\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-20T08:49:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/\",\"name\":\"Research 31 ILIC 2019 - ILIC TIU\",\"isPartOf\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/#website\"},\"datePublished\":\"2019-05-14T11:51:10+00:00\",\"dateModified\":\"2019-05-20T08:49:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research 31 ILIC 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/#website\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/\",\"name\":\"ILIC TIU\",\"description\":\"TIU Universsity\",\"publisher\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/#organization\",\"name\":\"TIU\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-content\/uploads\/2022\/03\/cropped-0.png\",\"contentUrl\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-content\/uploads\/2022\/03\/cropped-0.png\",\"width\":512,\"height\":512,\"caption\":\"TIU\"},\"image\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Research 31 ILIC 2019 - ILIC TIU","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/","og_locale":"en_US","og_type":"article","og_title":"Research 31 ILIC 2019 - ILIC TIU","og_description":"Research Title:&nbsp;\u0627\u0644\u0645\u0648\u0627\u062c\u0647\u0629 \u0627\u0644\u062a\u0634\u0631\u064a\u0639\u064a\u0629 \u0644\u062c\u0631\u0627\u0626\u0645 \u0627\u0644\u0625\u0631\u0647\u0627\u0628 \u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a Author: \u0627\u0644\u062f\u0643\u062a\u0648\u0631 \u0645\u0645\u062f\u0648\u062d \u062d\u0633\u0646 \u0645\u0627\u0646\u0639 \u0627\u0644\u0639\u062f\u0648\u0627\u0646 Abstract:&nbsp; The world experienced a tremendous development and acceleration in information technology; the widespread use of the Internet and social media made it easier for perpetrators to commit cyber crimes. The easy and remote means cyber crimes have; in addition to the difficulties &hellip;","og_url":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/","og_site_name":"ILIC TIU","article_modified_time":"2019-05-20T08:49:30+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/","url":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/","name":"Research 31 ILIC 2019 - ILIC TIU","isPartOf":{"@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/#website"},"datePublished":"2019-05-14T11:51:10+00:00","dateModified":"2019-05-20T08:49:30+00:00","breadcrumb":{"@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-31-ilic-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conferences.tiu.edu.iq\/ilic\/"},{"@type":"ListItem","position":2,"name":"Research 31 ILIC 2019"}]},{"@type":"WebSite","@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/#website","url":"https:\/\/conferences.tiu.edu.iq\/ilic\/","name":"ILIC TIU","description":"TIU Universsity","publisher":{"@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conferences.tiu.edu.iq\/ilic\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/#organization","name":"TIU","url":"https:\/\/conferences.tiu.edu.iq\/ilic\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/#\/schema\/logo\/image\/","url":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-content\/uploads\/2022\/03\/cropped-0.png","contentUrl":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-content\/uploads\/2022\/03\/cropped-0.png","width":512,"height":512,"caption":"TIU"},"image":{"@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/pages\/1927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/comments?post=1927"}],"version-history":[{"count":2,"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/pages\/1927\/revisions"}],"predecessor-version":[{"id":2236,"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/pages\/1927\/revisions\/2236"}],"wp:attachment":[{"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/media?parent=1927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}