Show simple item record

dc.contributor.authorAlanazi, Fahad
dc.contributor.authorJones, Andrew
dc.contributor.authorMenon, Catherine
dc.date.accessioned2019-03-14T15:39:49Z
dc.date.available2019-03-14T15:39:49Z
dc.date.issued2018-12-19
dc.identifier.citationAlanazi , F , Jones , A & Menon , C 2018 , ' Sharia Law and Digital Forensics in Saudi Arabia ' , Journal of Digital Forensics, Security and Law , vol. 13 , no. 3 , 5 , pp. 5-19 . https://doi.org/10.15394/jdfsl.2018.1568
dc.identifier.issn1558-7215
dc.identifier.otherPURE: 16441264
dc.identifier.otherPURE UUID: 43370346-cd84-4a59-8766-f1dcd382b872
dc.identifier.urihttp://hdl.handle.net/2299/21197
dc.description© 2018 ADFSL
dc.description.abstractThese days, digital crime is one of the main challenges for law enforcement and the judicial system. Many of the laws which are used to protect the users of current technologies were derived from legislation and laws that are utilized in the control of crimes that are based in the physical realm. This applies not only in Western countries, but in countries that adopt Sharia law. There is a need to establish specific legislation and accepted best practice to deal with digital crimes that is compatible with Sharia law, which affects more than one billion Muslims. This paper presents a view of the approach to digital crime in Saudi Arabia under Sharia Law, demonstrating how this is founded on principles from the Qur'an and the Sunnah, which are the sayings and deeds of the Prophet Muhammad. We describe how Sharia law differs from Western law, and how evidence for digital forensics procedures can be obtained for use under Sharia law.en
dc.format.extent15
dc.language.isoeng
dc.relation.ispartofJournal of Digital Forensics, Security and Law
dc.rightsOpen
dc.subjectSharia Law
dc.subjectdigital forensics
dc.subjectLaw
dc.subjectprocedure
dc.subjectComputer Science(all)
dc.titleSharia Law and Digital Forensics in Saudi Arabiaen
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.contributor.institutionSchool of Computer Science
dc.description.statusPeer reviewed
dc.relation.schoolSchool of Computer Science
dc.description.versiontypeFinal Published version
dcterms.dateAccepted2018-12-19
rioxxterms.versionVoR
rioxxterms.versionofrecordhttps://doi.org/10.15394/jdfsl.2018.1568
rioxxterms.licenseref.urihttp://creativecommons.org/licenses/by-nc/4.0/
rioxxterms.typeJournal Article/Review
herts.rights.accesstypeOpen


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record