جرائم الاتصال عبر الإنترنت وضبط أخلاقياته في ضوء الاتجاهات البحثية الحديثة (رؤية تحليلية ونقدية)

نوع المستند : المقالة الأصلية

المؤلف

أستاذ الإذاعة والتلفزيون المساعد بکلية الإعلام جامعة بني سويف

المستخلص

تحددت مشکلة الدراسة في رصد أبرز الاتجاهات البحثية والنظرية، وتقييم نتائجها، وکشف نواحي الضعف فيها، واقتراح اتجاهات جديدة للبحث، اعتمادًا على التحليل الکيفي وتحليل المستوى الثاني لعينة متاحة من الإنتاج العلمي المنشور في دوريات علمية عالمية محکَّمة تتعلق ببحوث جرائم الاتصال عبر الإنترنت وأخلاقياته، کما تهتم الدراسة الحالية برصد مسار تطور الأطر المعرفية والنظرية والمنهجية في تلک البحوث، وهو ما يساعد في وضع خريطة أولية لأجندة الاهتمامات البحثية في هذا المجال.
اعتمدت الباحثة على عدد من المناهج البحثية منها: منهج المسح بالعينة، والمنهج المقارن، وتمثلت أداة جمع البيانات في استمارة تحليل، وتوصلت الدراسة إلى: أهمية سنِّ القوانين التي تتيح وتکفل حرية التعبير عن الرأي، والقوانين التي تحد من الجرائم الإلکترونية.

الكلمات الرئيسية

الموضوعات الرئيسية


-Almarkaz Alearabi Adiymuqrati. (2019) , aljarimat almaelumatiat watharuha eali altanmiat alaiqtisadia
-Youssef, R.  (2015), jarayim alkutub al'iiliktrunia "dirasat tahliliat liwade astiratijiat himayat liha", majalat maktabat Almalik Fahd Alwatania , 2(21), 209- 298.
-Mikkola ,Marko , Oksanen ,Atte&als(2021), Situational and Individual Risk Factors for Cybercrime Victimization in a Cross-national Context, International Journal of Offender Therapy and Comparative Criminology, p.p1-19
-Borwell, Jildau et als(2021), The Psychological and Financial Impact of Cybercrime Victimization: A Novel Application of the Shattered Assumptions Theory, Social Science Computer Review ,pp 1-22
-Brants ,Chrisje& Johnson ,Derek (2020), New Wine in Old Bottles:Alternative Narratives of Cybercrime and Criminal Justice? The Journal of Criminal Law
, Vol. 84(5) 403–406
-Johnson, Derek& Faulkner, Erin(2020) Police Functional Adaptation to the Digital or Post Digital Age: Discussions with Cybercrime Experts, The Journal of Criminal Law, Vol. 84(5) 427–450
-https:// pulpit.alwatanvoice.com/articles/2020/04/11/518932.html
-Chang, L. Y. C., Zhong, L. Y., & Grabosky, P. N. (2018). Citizen co-production of cyber security: Self-help, vigilantes, and cybercrime. Regulation &Governance, 12(1), 101–114
-R. Louderback, Eric& Antonaccio ,Olena(2017) Exploring Cognitive Decision-making Processes, Computer focused Cyber Deviance Involvement and Victimization: The Role of Thoughtfully Reflective Decision-making, Journal of Research in Crime and Delinquency , Vol. 54(5) 639-679
 
-Jabouri, I. (2020), dawr al'amn alsiybiranii fi muajahat altahdidat al'iiliktruniat darisat halat aljazayar, majalat tahawulati, 2(3), 65- 80.
-Hay, C., & Ray, K. (2019). General strain theory and cybercrime. In T. J. Holt & A. M. Bossler (Eds.), The Palgrave handbook of international cybercrime and cyberdeviance (pp. 583–600). Springer International Publishing AG
 
 
-Marei, E. (2018), aljarayim al'iiliktrunia "al'ahdaf - al'asbab - taruq aljarimat wamuealajatiha", majalat aldirasat al'iielamiati, Almarkaz Aldiymuqratii Alearabia, 1, 420 - 453.
-Altaebir Alraqmi,(2018) markaz Hirdu, altanzim alqanuniu waljarayim al'iiliktruniat ma bayn 'amn almaelumat wataqyid alhuriyaat
-Dinisman, T., & Moroz, A. (2017). Understanding victims of crime: The impact of the crime and supportneeds. VS.
 
- Jansen, J., & Leukfeldt, R. (2018). Coping with cybercrime victimization: An exploratory study into impact and change. Journal of Qualitative Criminal Justice and Criminology, 6(2), 205–228
- Thomas J. Holt,& Leukfeldt,Rutger(2020) An Examination of Motivation and Routine Activity Theory to Account for Cyberattacks Against Dutch Web Sites, Criminal justice and behavior, Vol. 47, No. 4, April 2020, 487–505
-Randa, R., & Reyns, B. W. (2019). The physical and emotional toll of identity theft victimization: A situational and demographic analysis of the national crime victimization survey. Deviant Behavior, 41, 1290–1304
-van de Weijer et al.(2019), Determinants of reporting cybercrime: A comparison between identity theft,consumer fraud, and hacking, European Journal of Criminology, Vol. 16(4) 486–508
-Holt, T. J., Burruss, G. W., & Bossler, A. M. (2018). Assessing the macro-level correlates of malware infections using a routine activities framework. International Journal of Offender Therapy and Comparative Criminology, 62(6), 1720–1741
- Correia, S. G. (2019). Responding to victimisation in a digital world: A case study of fraud and computer misuse reported in Wales. Crime Science, 8(4), 1–12.
-Goldsmith, Andrew&als(2019) The seductions of Cybercrime :Adolescence and the thrills of digital transgression, European Journal of Criminology1–20
-Maggi, F., Balduzzi, M., Flores, R., Gu, L., & Ciancaglini, V. (2018). Investigating   web defacement campaigns at large. In Proceedings of the 2018 on Asia Conference on Computer and   Communications Security (pp. 443–456). Association for Computing Machinery
-Van der Wagen, W., & Pieters, W. (2018). The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory. European Journal of Criminology, 17(4), 480–497
-Holt, T. J., Freilich, J. D., & Chermak, S. M. (2017). Exploring the subculture of ideologically motivated cyber-attackers.Journal of Contemporary Criminal Justice, 33(3), 212–233.
-Van de Weijer SGA and Leukfeldt ER (2017) Big five personality traits of cybercrime victims.Cyberpsychology, Behavior, and Social Networking 20(7): 407–412.
-Romagna, M., & Van den Hout, N. J. (2017). Hacktivism and website defacement: Motivations, capabilities and potential threats. 27th Virus Bulletin International Conference, 1, 1–10
-Hutchings, A., & Clayton, R. (2016). Exploring the provision of online booter services. Deviant Behavior, 37(10), 1163–1178.
-Golladay, K., & Holtfreter, K. (2017). The consequences of identity theft victimization: An examination of emotional and physical health outcomes. Victims & Offenders, 12(5), 741–760
-Chen, Hongliang&als(2016) Protecting Oneself Online:The Effects of Negative Privacy Experiences on Privacy Protective Behaviors, Journalism & Mass Communication Quarterly 2016, Vol. 93(2) 409–429
-Attwood F, Smith C and Barker M (2018) ‘I’m just curious and still exploring myself: Young people and pornography. New Media & Society 20(1): 3738–3759
-Brewer R, Cale J, Goldsmith A and Holt T (2018) Young people, the Internet, and emerging pathways into criminality: A study of Australian adolescents. International Journal of Cyber Criminology 12(1): 115–132
-Dearden L (2019) Hacker who blackmailed porn users into handing him money after they clicked on his pop-up adverts jailed. Independent, 9 April. URL (accessed 11 November2019)
:https://www.independent.co.uk/news/uk/crime/porn-hacker-blackmail-zain-qaiser-trialprison-sentence-a8861236.html
-Donevan M and Mattebo M (2017) The relationship between frequent pornography consumption,behaviours, and sexual preoccupancy among male adolescents in Sweden. Sexual andReproductive Healthcare 12: 82–87
-Shun,Yung Kevin Wang& Ming-Li Hsieh et als(2021) Collaboration between Law Enforcement Agencies in Combating Cybercrime: Implications of a Taiwanese Case Study about ATM Hacking, International Journal of Offender Therapy and Comparative Criminology 2021, Vol. 65(4) 390– 408
-Badi, N. (2020), almaswuwliat aljazayiyat ean almisas binitaq altijarat al'iiliktruniati, majalat alqanun alduwalii waltanmiat 1(8), 53-73
-Thomas J. Holt&Dupont, Benoit(2019), Exploring the Factors Associated With Rejection From a Closed Cybercrime Community, International Journal of Offender Therapy and Comparative Criminology , Vol. 63(8) 1127–1147
-Dupont, B., Côté, A.-M., Savine, C., & Décary-Hétu, D. (2016). The ecology of trust among hackers. Global Crime, 17, 129-151.
-Brands, J., & Van Wilsem, J. (2019). Connected and  fearful? Exploring  fear of online financial crime, Internet behaviour and their relationship. European Journal of Criminology, 1, 1–22.
-Benjamin, Perrin(2019),Social Media Crime in Canada:
AnnotatedCriminal Code, R.S.C., 1985, C-46, 2nd ed., The Peter A. Allard School of Law allard Research Commons.
-Décary-Hétu, D., & Leppnen, A. (2016). Criminals and signals: An assessment of criminal performance in the carding underworld. Security Journal, 29, 442-460
-Décary-Hétu, D., & Leppnen, A. (2016). Criminals and signals: An assessment of criminal performance in the carding underworld. Security Journal, 29, 442-460
-Youssef, N. (2020), altahkim fi munazaeat almilakiat alfikriat wifq qawaeid alwibu,kaliat Alhuquq , jamieat Alsharq Al'awsata.
- Muhamed, O. (2017). mihwariat alamin alfikrii fi muajahat altataruf aldiynii , alsiyasat aljinayiyat almueasirat fi mukafahat aljarimat , waraqat bahthiat muqadimat 'iilay warshat aleamal alduwaliat ,jamieat Aghadir, 85- 102
 
-Kassaa, S., Kassaa, K. 2020), tahadiyat al'amn almaelumatii fi muajahat aljarimat al'iiliktruniat fi zili al'iielam aljadid , majalat almieyari,kaliyat 'usul aldiyn, jamieat Al'amir Aabdalqadir lileulum al'iislamiati,Aljazayir), 50(24), 376 - 389 .
-Aleishri, W. (2020), ruyat alsahafiiyn almisriiyn lildawabit almihniat wal'akhlaqiat almunazimat liaistikhdamat shabakat altawasul alaijtimaeii fi aleamal alsuhufii waealaqatiha bi'asalib almumarasat alsaayidati, almajalat Alearabiat libuhuth alaelam walaitisal - (28), 86-205
-Ibrahim, L. (2020), 'akhlaqiaat alnashr faa alsahafat alraqamiat almisriat waltahadiyat alati tuajihuha (dirasat tatbiqiati), almajalat Alearabiat libuhuth Alaelam walaitisal, 29 ,148- 188.
-karam Allah , M. (2019) , waqie 'akhlaqiaat alnashr ealaa mawaqie altawasul alaijtimaeii fi 'awqat al'azamat )'akhlaqiaat altaeamul mae masadir al'akhbar namozagan (,mjalat Aldirasat al'iielamiat almarkaz aldiymuqratia Alearabia , Berlin, 52 .
-Radwan, S., Mhenna, S. (2019) , albiyat al'iielamiat aljadidat fi alwatan alearabii : almafahim waldawabit , maehad alhuquq waleulum alsiyasiat bialjazayir , majalat alaijtihad lildirasat Alqanuniat walaiqtisadiat, 19, 360-380
-Benjamin, V., Zhang, B., Nunamaker, J. F., & Chen, H. (2016). Examining hacker participation length in cybercriminal internet-relay-chat communities. Journal of Management Information Systems, 33, 482-510
-Lewis, S. C., Sanders, A. K., & Carmody, C. (2019). Libel by algorithm?  Automated journalism and the threat of legal liability. Journalism & Mass Communication Quarterly, 96(1), 60-81
-Ananny, M. (2016). Toward an ethics of algorithms: Convening, observation, probability,and timeliness. Science, Technology, & Human Values, 41, 93-117
-Dörr, K. N., & Hollnbuchner, K. (2017). Ethical challenges of algorithmic journalism. Digital Journalism, 5, 404-419.
-Linden, C.-G. (2017). Decades of automation in the newsroom: Why are there still so many jobs in journalism? Digital Journalism, 5, 123-140
-Sobih, Y.(2019),almasyuwliat al'iijtimaeiat wal'akhlaqiat lisahafat almuatin eabr al'iielam alraqmi(drasat halat lilqayimin bial'iitisal fi qism sahafat almuatin bimawqie alyawm alsaabiei),almajalat alearabiat libuhuth alaelam walaitisal - (26), 394-423
-Bishara, A., Al-Faki, F.  (2019),almaswuwliat al'akhlaqiat limustakhdimi shabakat altawasul alaijtimaeii, ruyat 'akhlaqiat watasawulati)dirasat eali eayinat min tulaab jamieat kardifan(,mjalat aldirasat al'iielamiat almarkaz aldiymuqratiu alearabia, Berlin, 9, 473
-Christina, Lucas (2018), Digital Ethics Framework Recommendations for Social Media Archiving Applications, Georgia Institute of Technology
-Al'ahmad ,A., Omar, M. (2017), al'akhlaqiaat alraqamiat walhadathat fi altawasul al'iinsanii, almajalat Al'urduniyat lileulum alaijtimaeiat, 2(10).
-Shawsh, J. (2020). almumarasat alsahafiat fi almashhad al'iielamii alraqamii bayn haymanat altaqniat watahawul alhuiaat almihniati, majalat albahith fi aleulum al'iinsaniat waliajtimaeiati,jamieat Qasid Mirbah - wariqlatu, 1(12), 187: 202
-Craig, David et als(2017),To Post or Not to Post:Online Discussion of Gun Permit Mapping and the Development of Ethical Standards in Data journalism,Journalism & Mass Communication Quarterly,2017, Vol. 94(1) 168– 188
-Al'amir ,H., Gardain,H. (2017), waqie jarayim tiknulujia al'iielam walaitisal wasubul altasadiy laha mhlyaan werbyaan wdwlyaan , majalat maealim lildirasat alqanuniat walsiyasiat , 1, 158- 186
-Karlsson ,Michael et al(2017),DoNot Stand Corrected: Transparency and Users’ Attitudes to Inaccurate Journalism , Journalism & Mass News and Corrections in Online Communication Quarterly , Vol. 94(1) 148–167
 
-Mi Rosie Jahng and Jeremy Littau,2016, nteracting Is Believing: Interactivity, Social Cue, and Perceptions of Journalistic Credibility on Twitter, Journalism & Mass Communication Quarterly, Vol. 93(1) 148–167
 

 

 
-Pathak, Juhi P(2016), Digital Age 2.0 and its challenges on media ethics, Journal of Humanities and Social Science, Vol. 21(1), 18-24
-JC Suárez Villegas, J Cruz Álvarez (2016): “The ethical dilemmas of using social networks as information sources. Analysis of the opinion of journalists from three countries”. Revista Latina de Comunicación Social, 71, p.p. 66 to 84.
-Farhat, A. (2019), alfada' alsiybirani: tashkil sahat almaerakat fi alqarn alhadi waleishrina,majalat Aleulum Alqanuniat walsiyasiati, 3(10), 88: 107
-Sharif, W.(2018), 'asalib aljarimat al'iilikturuniati: masar al'iintiqal min al'iirhab altaqlidii 'iilay al'iirhab al'iiliktrunii fi zili almujtamae almaelumati, majalat Alhiwar walthaqafat , 1(8), 54- 65
-Dmello,Jared & Bichler Gisela(2021), Assessing the Impact of Civil Gang Injunctions on the Use of Online Media by Criminal Street Gangs, International Journal of Cyber Criminology,vol 14, issue 1
-Saidul, I. (2019). Cyber Crimes and Its Effects on Teens Perception of Social Security: An Empirical Study, International Journal of Cyber Criminology; 3 (2).
-Mshana, J. A. (2018). Cybercrime: An Empirical Study of its Impact in Social Security of Tanzania, International Review of Law, Computers and Technology; 3 Pahuja ,Rekha (2018), impact of social networking on cyber crimes: a study,international journal of multidisciplinary research ,Vol. 4, Issue 4
-Ayres, Leandro& Veleda Jéssica(2020),Project Leaked: Research on Non-Consensual sharing of Intimate Images in Brazil, International Journal of Cyber Criminology,vol 14, issue1
-Herlina, M., & Jati, R. P. (2019). The Influence of Cybercrime Against Teens Dealing with Social Security in Online Media, Advances in Social Science, Education and Humanities Research, volume 343, 1st International Conference on Administration Science (ICAS 2019
-Monni, S. S. (2018). Investigating Cybercrimes: Pervasiveness, Causes and Impact on Adolescent Girls Perception of Social Security, MA Thesis, Shahjalal University of Science and Technology
-Gupta, Shalini&els (2017), Impact of cyber crime on adolescents through social networking sites, International Journal of Law, Volume 3; Issue 6; November 2017; Page No. 104-106
-Ali, H. (2020),alwastiat fi al'iislam waealaqatuha bial'amn alfikrii : "dirasat tasiliat fi daw' alquran alkarimi,Jurnal Studi Al-Qur'an, 16(2).
-Pyanov ,Alexander& Kalyugina,Svetlana& Republic,Czech(2019),
Advances in Social Science, Education and Humanities
Research,Atlantis Press, volume 386 5th International Conference on Social, Economic, and Academic Leadership
-Elsherif , Ahmed(2018), Automatic Intrusion Detection System Using Deep Recurrent Neural Network Paradigm, Journal of information security and cybercrimes research,( Naif Arab University for Security Sciences) Vol. 1, Issue 1, June pp 28-41 https://journals.nauss.edu.sa/index.php/JISCR
- Al-Juaid ,Nouf A& . Gutub ,Adnan A & Khan Esam A.(2018), Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography, Journal of information security and cybercrimes research,(Naif Arab University for Security Sciences) Vol. 1, Issue 1, June, pp 8-18, https://journals.nauss.edu.sa/index.php/JISCR
-Alelyani, Salem& Kumar, Harish(2018), Overview of Cyberattack on Saudi-          Organizations Naif Arab University for Security Sciences, Journal of information security and cybercrimes research,(Naif Arab University for Security Sciences) Vol. 1, Issue 1, June, pp 42-50, https://journals.nauss.edu.sa/index.php/JISCR
-Motawa ,Dyaa Eldeen Nasr, El Shrief -Ahamed (2019), A URL with Image-based Feature Extraction for Preventing Phishing Attacks, Journal of information security and cybercrimes research,( Naif Arab University for Security Sciences) Vol. 2, Issue 1, June , https://journals.nauss.edu.sa/index.php/JISCR
-Al-gohany ,Nora Abdullah& Almotairi ,Sultan(2019),  Comparative Study of Database Security In Cloud Computing Using AES and DES Encryption Algorithms , Journal of information security and cybercrimes research,(Naif Arab University for Security Sciences) Vol. 2, Issue 1, June, pp 47-57 https://journals.nauss.edu.sa/index.php/JISCR
-A.K. Jain, B. Gupta (2016), A novel approach to protect against phishing attacks at client side using auto-updated white-list EURASIP J. Inf. Sec , p.p. 1-11.
-A.K. Jain, B. Gupta (2016), A novel approach to protect against phishing attacks at client side using auto-updated white-list EURASIP J. Inf. Sec , p.p. 1-11.
-Sidhom, K. (2017), himayat huquq almilkiat alfikriat lilmusanafat alraqamiat fi biyat alaintirnti, 'aemal almutamar alduwalii alraabie eashar (aljarimat alalkitrunia ) markaz jil albahth aleilmii wajamieat talmisan kuliyat Aleulum Alaiqtisadiat - mukhbir alhawkamat aleumumiat walaiqtisad alaijtimaeii .
-Shaker, R . (2018),al'amn alfikriu wal'arhabi: aleiraq anmwdhjaan, majalat almustansiriat lildirasat alearabiat walduwaliat , markaz aldirasat alastiratijiat walduwaliati,jamieat baghdad ,68, 123-142
-Najmi, A. Othman, H. (2019), al'akhtar alfikriat alsiyasiat liwasayil altawasul alaijtimaeii eali tulaab jamieat tbuk, almajalat alearabiat lildirasat al'amniati, jamieat Nayif lileulum Al'amniati, 2(35), 233- 247.
-Abdelmajeed, Nabih T.(2018), Parental Role in Protecting Children and Dangers of Social Networks Sites, Journal of information security and cybercrimes research,(Naif Arab University for Security Sciences) Vol. 1, Issue 1, June, pp 19-27, https://journals.nauss.edu.sa/index.php/JISCR
 
 
-Alorwa, R. (2018), madaa 'iidrak talibat almarhalat althaanawiat liljawanib almaerifiat walfaniyat lilaistikhdam alamin limawaqie altawasul alaijtimaeii, almajalat Al'iiliktruniat Alshaamilat mutaeadidat Almaerifati, 5 .
-Alkafiri, W. (2020) , dawr almadaris al'urduniyat fi taeziz al'amn alfikrii ladaa altalabati, almajalat alearabiat lildirasat al'amniati, jamieat Nayif lileulum Al'amniati, 1(36), 75- 89
-Suhayl, F., Numaylat, A. (2019), al'amn alnafsiu waealaqatuh bialaintima' alwatanii ladaa talbat jamieat alquds almaftuhati,majalat jamieat filastin altaqniat lil'abhath, 2(7), 1-14
-Al-Sabihin, H., Al-Ra’i, M. (2018), dawr almadrasat wamanahij altaelim fi tahqiq al'amn almujtamaeii min wijhat nazar alqadat altarbawiiyn fi al'urduni , majalat dirasat aleulum al'iinsaniat walaijtimaeiati, 2(45), 191- 203
-Dinu, A. (2017), dawr mudayri almadaris alkhasat fi taeaziyz al'amn alfikrii ladaa talbat almarhalat althaanuyt min wijhat nazar almuealimyn fi aleasimat Amman, jamieat Alsharq Al'awsat, Amman
-Waswas, D,. & Gasaymeh, M. (2017). The Role of School Principals in the Governorate of Ma’an in Promoting Intellectual Security among Students . Journal of Education and Learning, 6, (1). 193-206.
 
-Ahmed, F. (2017) ,dawr aljamieat almisriat fi tahqiq al'amn alfikrii litulaabiha, majalat kuliyat Altarbiat , jamieat Alazhr, 175(3).
-Al-Qahtani, A. (2019), mutatalabat taeziz al'amn alfikrii ladaa altaalibat aljamieiat min manzur tariqat aleamal mae aljamaeat )dirasat wasfiat min wijhat nazar altaalibat wa'aeda' hayyat altadrisi), almajalat alearabiat lildirasat al'amniati, jamieat Nayif lileulum Al'amniati, 2(35), 157- 174
-Mansour, M. (2017) ,taqyim dawr aljamieat fi tahqiq al'amn alfikrii litulaabiha min wijhat nazarihim wa'aeda' hayyat altadrisi,mjalat kuliyat Altarbiati, jamieat Al'azhar, 172(1).
-Shehata, A. (2017), faeiliat barnamaj 'iirshadiun fi taeziz al'amn alfikrii ladaya eayinat min tulaab almarhalat althaanawiati, almajalat Almisria lildirasat alnafsiat ,aljameiat Almisriat lildirasat Alnafsiat, 95(27), 83-123
-Al-Otaibi, D. (2017 ), madaa 'iisham muealimat altakhasusat aleilmiat fi 'iiksab mutatalibat al'amn alfikrii litalibat almarhalat althaanawiat min wijhat nazar almuealimat bimadinat alriyad ", majalat dirasat tarbawiat wanafsiatin, aljamieat Al'iislamia, Gaza, 3(25).
-Al-Ghamdi, A. ( 2017 ), dawr muealimat alsufuf al'awaliat fi taeziz al'amn , alfikrii ladaa mutaealimat almarhalati, almajalat alduwaliat Altarbawiat Almutakhasisati, 1(6), 27
 
-Al Hammadi, K. (2017),ashamat minasaat altawasul alaijtimaeii fi almajal Al'amnii,markaz buhuth alshurtat , majalat Alfikr Alshurtii , 100(26), 19-51
-Perrott ,Andrew T.) 2017),Into Dabiq: A Content Analysis of ISL’s Jihadist, Magazine, Unpublished Master Thesis, USA, Pennsylvania, Point Park University
-Langemeijer ,H.A.H. (2016) Don’t Hear about Us, Hear from Us: The role of ISIS’ online magazine Dabiq in shaping foreign fighter motivations, Unpublished,Netherlands, Utrecht University
-Amin, R. (2019),shabakat altawasul alaijtimaeii waealaqatuha bialhifaz eali 'amn almujtamae (dirasat maydaniat eali alnukhbat al'iielamiat bimamlakat albahrayn ),almajalat alearabiat lildirasat al'amniati,jamieat Nayif lileulum Al'amniati, 2(35), 175- 189
-Al-Hazani, N. (2018), alshabakat aliajtimaeiat wa'atharuha eali alamin alfikriu ladayi talibat jamieat alamirat nurat , majalat maktabat Almalik Fahd Alwataniati, 2(24), 181-207.
-AL-Osaim, Bashayer& AL-Sufyani, Dala(2018),the intellectual  security concepts in the  English textbooks of the  intermediate stage in  Saudi Arabia(an analytical study)International Interdisciplinary Journal of Education –January, 2018, Volume,7 Issue 1
-Zein El-Abdein, Mohamed, and Nor-Eldein Mohamed( 2019)“The Use of Social Networking Sites and Their Impact on the Development of Intellectual Security from the Perspective of Umm Al Qura University Students”. SVU-Journal of Abstracts 1 (1), 21. https://portal.svu.edu.eg/svusrc/index.php/abstracts/article/view/151
-AL-Osaim, Bashayer& AL-Sufyani, Dala(2018),the intellectual  security concepts in the  English textbooks of the  intermediate stage in  Saudi Arabia(an analytical study)International Interdisciplinary Journal of Education –January, 2018, Volume,7 Issue 1
-Al-dajah, Hasan Abdullah (2019), Contemporary Theory of Intellectual Security,Canadian Social Science,Vol. 15, No. 3, 2019, p.p 11-22.
-Attia, E. (2020),mkanat al'amn alsiybiranii fi manzumat al'amn alwatanii aljazayirii, misdaqia (almadrasat aleulya aleaskariat lilaealam walaitisal), 2(1), 100- 121
-Gabdulhakov, Rashid(2020),(Con)trolling the Web: Social Media User Arrests,State-Supported Vigilantism and Citizen Counter-Forces in Russia, Global Crime, DOI:10.1080/17440572.2020.1719836,
-Kadwani, S. (2020) , aldawabit alqanuniat almunazimat lil'iielam alraqamii fi sir(dirasat tahliliati), almajalat alearabiat libuhuth Alaelam walaitisal, 29, 380- 443.
-Bouamama, E. (2019), mustakhdimi alfada' al'azraq bayn daeayim alqiamiat wajarayim altiqnia (dirasat halati) , majalat Aleulum al'iinsaniat waliajtimaeiat , jamieat Abdalhamid Mahri , 52 , 441- 453
-Benamra, Belkacem Amin(2018),New Media, New Ethics Confronting Ethical Issues in the Digital Era 
-Thomas J. Holt(2018),Regulating Cybercrime through Law Enforcement and Industry Mechanisms, ANNALS, AAPSS, 679, p.p140-158
-Bououn, Z. (2018) , dawr alhayyat alwataniat lilwiqayat min aljarayim alalkitruniat fi himayat almustahliki, majalat aleulum al'iinsaniat - jamieat Minturi Qisntinata, 49 , 419- 431.
-Mohammadi, A., Tafer, Z. (2018). subul aistighlal aldhaka' alaiqtisadii fi muajahat almakhatir alraqamiati, majalat albashayir al'aqtisadiat ,kuliyat aleulum al'aqtisadiat waleulum altijariat waeulum altaysiri,jamieat Bashar Muhamed Tahiri , 3(4), 521 - 536.
-Abdul Rahim, Wahiba., Abdul Rahim, S. (2017), waqie tasawuq almustahlik eabr shabakat al'iintirnit bayn alhimayat waljarimat , majalat alaijtihad alqadayiy, jamieat Muhamad Khudayr, 14 , 121- 138.
-El-Bahi, R. (2018). alrade alsaybiraniu almafhum wal'iishkaliaat w almutatalabat , majalat aldirasat al'iielamiat ,almarkaz aldiymuqratii alearabii, 1, 201 - 243
-Deesh, S. (2018), 'anwae aljarayim al'iilikturuniat wa'iijra'at mukafahatiha majalat aldirasat al'iielamiat ,almarkaz aldiymuqratii alearabii, 1 , 244 - 258
-Muhammad, M., Youssef, Y. (2018) , tawzif baramij alealaqat aleamat fi altaweiat bimakhatir aljarayim al'iiliktrunia (dirasat tahliliat wasfiat eali al'iidarat almasyuwlat ean aljarayim al'iiliktrunia (wizarat aleadl -wizarat aldaakhiliat - wizarat alaitisalat watiknulujia almaelumat fi alfatrat min 2016- 2017 ma), majalat aleulum al'iinsaniat ,jamieat Alsuwdan lileulum waltiknulujia, 2(19), 144- 161
-Khalil, A. (2018) , "astikhdam almustahlik alraqmaa aleiraqaa litatbiqat altasawuq bialhatif almahmul waliaat himayatih rqmyaan, almajalat al'iiliktruniat alshaamilat mutaeadidat almaerifat linashr Al'abhath aleilmiat waltarbawiat, 8
-Abdul-Baqi, M. (2018) , altahqiq fi aljarimat al'iiliktruniat wathbatha fi filastin dirasat muqaranat , majalat dirasat eulum alsharieat walqanun ,( kuliyat Alhuquq wal'iidarat aleamat - jamieat Birzeit-Filastin), 4(45), 284 - 299
-Nademily, R. (2017) , khususiat aljarimat al'iiliktruniat fi alqanun aljazayirii walqawanin almuqaranat, 'aemal almutamar alduwalii alraabie eashar : aljarayim al'iiliktruniat 24-25 mars
-Boudiaf, A. (2018), aljarimat al'iiliktruniat wal'iijra'at altashrieiat limuajahatiha fi aljazayir,mjalat al'ustadh albahith lildirasat Alqanuniat walsiyasiati, 11 , 348 - 375
-Juhi P., Pathak(2016), Digital Age 2.0 and its challenges on media ethics,IOSR Journal Of Humanities And Social Science (IOSR-JHSS) Volume 21, Issue 1,P.P 18-24,
  http://www.revistalatinacs.org/071/paper/1084/04en.html                       
 
-Amra, A. ( 2019),muqtarib 'iitqi lilfada' alsiybirani:nzariat aleadalat eind jun rawlz nmwdhjaan, majalat alnaasiriat lildirasat al'iijtimaeiat waltaarikhiat, 2(10), 680-727
-Abualeiz, A. (2018), aljawanib al'akhlaqiat walmihniat bialsuhuf almisriat almatbueat khilal fatarat altahawul alsiyasii- dirasat tahliliatan muqaranat almajalat alearabiat libuhuth al'iielam walaitisal jamieat Al'ahram Alkanadiat 27 .
-Alkurwi, S.(2018),alandiraghujia wamihniat alaelami, almajalat Alearabiat libuhuth alaelam waliatisali, 20, 96-107
-Salah Eldin ,Mennat Allah Ehab(2017) ,Photojournalism’s ethics in the digital age of ”manipulation
-Gedi, R. (2018) , 'akhlaqiaat almumarasat al'iielamiat fi alwasayit aljadidat : dirasat astikshafiat liltahadiyat al'akhlaqiat alati tueiq alnashr Alsahufia al'iiliktrunia , jamieat Wahran , majalat Alsuwrat walaitisal, 22, 35 - 62
-Abd Alrahman, F.  (2017(, altawajuhat almihniat lilqayimin bialaitisal nahw dawabit alnashr alsuhfaa alaliikrunaa fee Misr almajalat aleilmiat libuhuth Alsahafati, kuliyat Al'iielami, jamieat Alqahira, 11 .
-Sabry, M. (2016 (, mudrikat alsahafayn lisubul himayat alnashr alsuhufaa ealaa alaintirnit walmumarasat almihniat almutasilat biha, almajalat aleilmiat libuhuth Alsahafati, kuliyat Al'iielami, jamieat Alqahira, 8.
-Zhang ,Yuan , et al (2017), Solution of Media Risk and Social Responsibility Governance of Social Media , ITM Web of Conferences, 1 November, available at : https://www.researchgate.net/.
-Mukherjee mKoustaf(2017), Comparison Between Social Communication Ethics and Social media Ethics : a paradigm Shift, Global Media Journal -Indian Edition, Volume: 7 / Number: 2
-Aldaaghir, M.(2017), atijahat alnukhbat almisriat nahw 'akhlaqiaat altaghtiat alaelamiat lilazimat alaminiat fi Misr baed 30 yunih 2013 ma. : mawaqie altawasul alaijtimaeii namudhajana ,hawliaat aladab waleulum al'iinsaniati,jamieat Alkuayt
-Craft, S. (2017), Distinguishing features: Reconsidering the link between journalism's professional status and ethics. Journalism and Communication Monographs, 19(4)
-Luengo, M., Maci.-Barber, C., & Requejo-Alem.n, J. L. (2016) Evaluating organizational ethics in Spanish news media. Journalism, 18(9).
-Acharya, B. B. (2019). Accountability in Online News Media: A Case Study of Nepal.Athens. Journal of mass Media and Communications, 5(1), 17-34.
-Spear, S. (2017) Impression Management Activity in Vision, Mission, and Values Statements: A Comparison of Commercial and Charitable Organizations. International Studies of Management & Organization, 47(2), pp.159-175.
-Martono, H. H. (2017). Teaching journalism ethics: Constructing model for teaching journalism ethics on the basis of local wisdom to create peace journalism. Cogent Arts & Humanities, 4(1)10