Journal of International Commercial Law and Technology, 2010
€œOnline fatwas†and “Virtual Counseling†are a major concern for the global community. Th... more €œOnline fatwas†and “Virtual Counseling†are a major concern for the global community. The introduction, growth, and utilization of Information and Communication Technologies (ICTs) have created new public spheres where different concepts of coexistence between Islam and the State are discussed. With respect to cyberspace, the Internet brings ijtihad – related issues into sharp focus, when any individuals can proclaim themselves as an authority on Islam, qualified to make pronouncements and issue fatwas. Online religious forums are not exclusively to provide Islamic advice, but also allow Internet users to meet and interact with others who share their faith, beliefs, and values from the privacy of their homes. Whilst this advantage for petitioners has been overemphasized in cyber studies in general, in relation to Cyber Islamic Environments some unique themes are raised. These include issues linked to whether online Islamic advice is binding or not, and the implications on...
Le phenomene de la cybercriminalite n’est pas une generation spontanee mais le fruit d’une longue... more Le phenomene de la cybercriminalite n’est pas une generation spontanee mais le fruit d’une longue evolution economique conduite par le developpement accru des N. T. I. C. Cette nouvelle forme de criminalite connait, une ampleur exponentielle difficile a evaluer, laissant apparaitre comme une evidence incontournable l’adaptation du systeme judiciaire. La difficulte d’apprehender cette criminalite sur le reseau Internet tient en partie au fait que ce reseau etant un moyen de communication mondial permettant de vehiculer tous types de donnees. L’apprehension des delits constates sur ce reseau perd de sa nettete et se noie dans une approche globale de la criminalite, rendant de moins en moins visible une hierarchisation de ces infractions, tant au niveau de leur nature juridique qu’au niveau de leur gravite. Dans ce travail, nous traitons tour a tour dans la premiere partie la politique criminelle face aux N. T. I. C. Objet de l’infraction, puis cette politique face au N. T. I. C. Moyen...
JIPITEC 4 (2013) 2 - This paper addresses and analyses the growing threat of sexual harassment in... more JIPITEC 4 (2013) 2 - This paper addresses and analyses the growing threat of sexual harassment in cyberspace. Digital transactions and communications have, over the past decade, been increasingly transpiring at an increasingly accelerated rate. This non-linear progression has generated a myriad of risks associated with the utilization of information and communication technologies (ICTs) in cyberspace communications, amongst the most important of which is: the threat of sexual harassment. On such account, this paper aims to provide an overview of the issues and risks pertinent to sexual harassment and seeks to offer some solutions based on the necessity of pursuing a tri-fold policy encompassing strategic and regulatory, technical, and cultural approaches.
Cet article presente et analyse la menace grandissante que represente le vol d’identite dans le c... more Cet article presente et analyse la menace grandissante que represente le vol d’identite dans le cyberespace. Le developpement, dans la derniere decennie, du commerce electronique ainsi que des transactions et des communications numeriques s’accelere. Cette progression non lineaire a genere une myriade de risques associes a l’utilisation des technologies de l’information et de la communication (les TIC) dans le cyberespace, dont un des plus importants est sans conteste la menace du vol d’identite. Cet article vise a donner un apercu des enjeux et des risques relatifs au vol d’identite et cherche a offrir certaines solutions basees sur la necessite d’opter pour une politique a trois volets qui englobe des approches strategiques et reglementaires, techniques et culturelles.
COVID-19: Prediction, Decision-Making, and its Impacts
The very first novel coronavirus case (COVID-19) was found in China in December 2019. The COVID-1... more The very first novel coronavirus case (COVID-19) was found in China in December 2019. The COVID-19 pandemic has since spread to over 215 countries and areas in the world and has significantly affected every aspect of our daily lives. At the time of writing of this chapter, the numbers of cases and deaths were still increasing significantly and showing no sign of a well-controlled situation. To illustrate, as of July 24, 2020, a cumulative total of 15,839,649 COVID-19 cases had been reported around the world. There is no doubt that artificial intelligence (AI) can be an effective tool for rapidly developing diagnostic and therapeutic modalities for new diseases and outbreaks. In this chapter, the author outlines the myriad ways in which AI can be used to analyze the clinical and social patterns of a COVID-19 outbreak and prepare society to fight against this or other pandemics in a more effective way, such as monitoring treatments and research and development of drugs and vaccines for COVID-19.
The term “419” is coined from Section 419 of the Nigerian criminal code (part of Chapter 38: obta... more The term “419” is coined from Section 419 of the Nigerian criminal code (part of Chapter 38: obtaining property by false pretenses; cheating) dealing with fraud.
Proceedings of ICC '93 - IEEE International Conference on Communications, 1993
An interactive high density wavelength division multiplexing (HD WDM) optical network called M3I ... more An interactive high density wavelength division multiplexing (HD WDM) optical network called M3I NET using a two-electrode distributed feedback laser diode (DFB LD) as a multifunction device is reported. This device acts as a frequency shift keying (FSK) transmitter at one end and as an FSK receiver amplitude shift keying (ASK) transmitter at the other end. The selection of one
Computer hacking is the accessing of a computer system without the express or implied permission ... more Computer hacking is the accessing of a computer system without the express or implied permission of the owner of that computer system (Bainbridge 2004, p. 381). A person who engages in this activity is known as a computer hacker and may simply be motivated by the mere thrill of being able to outwit the security systems contained in a computer. Hackers may gain access remotely, using a computer in his own home or office connected to a telecommunications network (Ibid).
Phishing is the act of sending an email to a user falsely claiming to be an established legitimat... more Phishing is the act of sending an email to a user falsely claiming to be an established legitimate business, in an attempt to scam the user into surrendering private information that will be used for identity theft.
Anonymity, often considered a cornerstone of democracy and a First Amendment guarantee, is easier... more Anonymity, often considered a cornerstone of democracy and a First Amendment guarantee, is easier to attain than ever before, due to the emergence of cyberspace (du Pont 2001, p. 191).
One of the biggest headaches that come along with networked and internet-connected computers is t... more One of the biggest headaches that come along with networked and internet-connected computers is the absolute requirement of dealing with malicious code attacks (Erbschloe 2004). There is no choice; if your systems are not equipped in some way with antivirus protection, sooner or later some bug will eat them. There is also very little to be gained by whining about how vulnerable computer systems are to malicious code attacks.
Sexual harassment is a well-known social problem that affects people at work, school, military in... more Sexual harassment is a well-known social problem that affects people at work, school, military installations, and social gatherings (Barak 2005). A worldwide phenomenon (Barak 1997), it has been thoroughly investigated in recent decades in terms of prevalence, correlates, individual and organizational outcomes, and prevention; the range of studies provides an interdisciplinary perspective covering psychological, sociological, medical, legal, and educational aspects of the phenomenon. Although men face harassment, women are the most likely victims.
The investigation of cybercrime and the gathering of appropriate evidence for a criminal prosecut... more The investigation of cybercrime and the gathering of appropriate evidence for a criminal prosecution, the science of “forensic computing”, “digital forensics”, or “cyber forensics”, can be an extremely difficult and complex issue (Walden 2007, p. 205).
Advancements in modern technology have helped countries to develop and expand their communication... more Advancements in modern technology have helped countries to develop and expand their communication networks, enabling faster and easier networking and information exchange. In less than two decades, the internet has grown from a curiosity to an essential element of modern life for millions. In addition to the socio-economic benefits, there is no doubt about computer technology and the internet that enhances the capabilities of human interaction. But somewhere the growth of global connectivity is inherent to cybercrime. Table 1.1 illustrates some interesting facts about the usage of ICT.
Journal of International Commercial Law and Technology, 2010
€œOnline fatwas†and “Virtual Counseling†are a major concern for the global community. Th... more €œOnline fatwas†and “Virtual Counseling†are a major concern for the global community. The introduction, growth, and utilization of Information and Communication Technologies (ICTs) have created new public spheres where different concepts of coexistence between Islam and the State are discussed. With respect to cyberspace, the Internet brings ijtihad – related issues into sharp focus, when any individuals can proclaim themselves as an authority on Islam, qualified to make pronouncements and issue fatwas. Online religious forums are not exclusively to provide Islamic advice, but also allow Internet users to meet and interact with others who share their faith, beliefs, and values from the privacy of their homes. Whilst this advantage for petitioners has been overemphasized in cyber studies in general, in relation to Cyber Islamic Environments some unique themes are raised. These include issues linked to whether online Islamic advice is binding or not, and the implications on...
Le phenomene de la cybercriminalite n’est pas une generation spontanee mais le fruit d’une longue... more Le phenomene de la cybercriminalite n’est pas une generation spontanee mais le fruit d’une longue evolution economique conduite par le developpement accru des N. T. I. C. Cette nouvelle forme de criminalite connait, une ampleur exponentielle difficile a evaluer, laissant apparaitre comme une evidence incontournable l’adaptation du systeme judiciaire. La difficulte d’apprehender cette criminalite sur le reseau Internet tient en partie au fait que ce reseau etant un moyen de communication mondial permettant de vehiculer tous types de donnees. L’apprehension des delits constates sur ce reseau perd de sa nettete et se noie dans une approche globale de la criminalite, rendant de moins en moins visible une hierarchisation de ces infractions, tant au niveau de leur nature juridique qu’au niveau de leur gravite. Dans ce travail, nous traitons tour a tour dans la premiere partie la politique criminelle face aux N. T. I. C. Objet de l’infraction, puis cette politique face au N. T. I. C. Moyen...
JIPITEC 4 (2013) 2 - This paper addresses and analyses the growing threat of sexual harassment in... more JIPITEC 4 (2013) 2 - This paper addresses and analyses the growing threat of sexual harassment in cyberspace. Digital transactions and communications have, over the past decade, been increasingly transpiring at an increasingly accelerated rate. This non-linear progression has generated a myriad of risks associated with the utilization of information and communication technologies (ICTs) in cyberspace communications, amongst the most important of which is: the threat of sexual harassment. On such account, this paper aims to provide an overview of the issues and risks pertinent to sexual harassment and seeks to offer some solutions based on the necessity of pursuing a tri-fold policy encompassing strategic and regulatory, technical, and cultural approaches.
Cet article presente et analyse la menace grandissante que represente le vol d’identite dans le c... more Cet article presente et analyse la menace grandissante que represente le vol d’identite dans le cyberespace. Le developpement, dans la derniere decennie, du commerce electronique ainsi que des transactions et des communications numeriques s’accelere. Cette progression non lineaire a genere une myriade de risques associes a l’utilisation des technologies de l’information et de la communication (les TIC) dans le cyberespace, dont un des plus importants est sans conteste la menace du vol d’identite. Cet article vise a donner un apercu des enjeux et des risques relatifs au vol d’identite et cherche a offrir certaines solutions basees sur la necessite d’opter pour une politique a trois volets qui englobe des approches strategiques et reglementaires, techniques et culturelles.
COVID-19: Prediction, Decision-Making, and its Impacts
The very first novel coronavirus case (COVID-19) was found in China in December 2019. The COVID-1... more The very first novel coronavirus case (COVID-19) was found in China in December 2019. The COVID-19 pandemic has since spread to over 215 countries and areas in the world and has significantly affected every aspect of our daily lives. At the time of writing of this chapter, the numbers of cases and deaths were still increasing significantly and showing no sign of a well-controlled situation. To illustrate, as of July 24, 2020, a cumulative total of 15,839,649 COVID-19 cases had been reported around the world. There is no doubt that artificial intelligence (AI) can be an effective tool for rapidly developing diagnostic and therapeutic modalities for new diseases and outbreaks. In this chapter, the author outlines the myriad ways in which AI can be used to analyze the clinical and social patterns of a COVID-19 outbreak and prepare society to fight against this or other pandemics in a more effective way, such as monitoring treatments and research and development of drugs and vaccines for COVID-19.
The term “419” is coined from Section 419 of the Nigerian criminal code (part of Chapter 38: obta... more The term “419” is coined from Section 419 of the Nigerian criminal code (part of Chapter 38: obtaining property by false pretenses; cheating) dealing with fraud.
Proceedings of ICC '93 - IEEE International Conference on Communications, 1993
An interactive high density wavelength division multiplexing (HD WDM) optical network called M3I ... more An interactive high density wavelength division multiplexing (HD WDM) optical network called M3I NET using a two-electrode distributed feedback laser diode (DFB LD) as a multifunction device is reported. This device acts as a frequency shift keying (FSK) transmitter at one end and as an FSK receiver amplitude shift keying (ASK) transmitter at the other end. The selection of one
Computer hacking is the accessing of a computer system without the express or implied permission ... more Computer hacking is the accessing of a computer system without the express or implied permission of the owner of that computer system (Bainbridge 2004, p. 381). A person who engages in this activity is known as a computer hacker and may simply be motivated by the mere thrill of being able to outwit the security systems contained in a computer. Hackers may gain access remotely, using a computer in his own home or office connected to a telecommunications network (Ibid).
Phishing is the act of sending an email to a user falsely claiming to be an established legitimat... more Phishing is the act of sending an email to a user falsely claiming to be an established legitimate business, in an attempt to scam the user into surrendering private information that will be used for identity theft.
Anonymity, often considered a cornerstone of democracy and a First Amendment guarantee, is easier... more Anonymity, often considered a cornerstone of democracy and a First Amendment guarantee, is easier to attain than ever before, due to the emergence of cyberspace (du Pont 2001, p. 191).
One of the biggest headaches that come along with networked and internet-connected computers is t... more One of the biggest headaches that come along with networked and internet-connected computers is the absolute requirement of dealing with malicious code attacks (Erbschloe 2004). There is no choice; if your systems are not equipped in some way with antivirus protection, sooner or later some bug will eat them. There is also very little to be gained by whining about how vulnerable computer systems are to malicious code attacks.
Sexual harassment is a well-known social problem that affects people at work, school, military in... more Sexual harassment is a well-known social problem that affects people at work, school, military installations, and social gatherings (Barak 2005). A worldwide phenomenon (Barak 1997), it has been thoroughly investigated in recent decades in terms of prevalence, correlates, individual and organizational outcomes, and prevention; the range of studies provides an interdisciplinary perspective covering psychological, sociological, medical, legal, and educational aspects of the phenomenon. Although men face harassment, women are the most likely victims.
The investigation of cybercrime and the gathering of appropriate evidence for a criminal prosecut... more The investigation of cybercrime and the gathering of appropriate evidence for a criminal prosecution, the science of “forensic computing”, “digital forensics”, or “cyber forensics”, can be an extremely difficult and complex issue (Walden 2007, p. 205).
Advancements in modern technology have helped countries to develop and expand their communication... more Advancements in modern technology have helped countries to develop and expand their communication networks, enabling faster and easier networking and information exchange. In less than two decades, the internet has grown from a curiosity to an essential element of modern life for millions. In addition to the socio-economic benefits, there is no doubt about computer technology and the internet that enhances the capabilities of human interaction. But somewhere the growth of global connectivity is inherent to cybercrime. Table 1.1 illustrates some interesting facts about the usage of ICT.
Uploads
Papers by Mohamed Chawki