لوازم التحول الرقمي : "الأمن السيبراني نموذجا" : دراسة فقهية مقاصدية
Other Title(s)
Digital transformation kits : "cyber security as a model" : a purposeful doctrinal study
Author
Source
مجلة الشريعة و القانون بالقاهرة
Issue
Vol. 2022, Issue 40 (31 Oct. 2022), pp.947-1000, 54 p.
Publisher
al-Azhar University Faculty of Sharia and Law
Publication Date
2022-10-31
Country of Publication
Egypt
No. of Pages
54
Main Subjects
Islamic Jurisprudence and its Foundation
Topics
- Public enterprises
- Research methods
- Electronicl equipment
- Provisions of sharia
- Computer security
- Electronics
- Maqasid al-Shari'ah
- Persons
- Penal damages
- Judicial decisions
- Analytical approach
Abstract EN
This research aims to show the jurisprudence and intent related to cyber security as one of the electronic devices for the success of the digital transformation process launched by the Egyptian state, which has become a modern necessity that cannot be left behind.
In this research, I followed two scientific methods: First, the descriptive approach: through which I have described both the terms "digital transformation" and "cyber security" in order to arrive at its jurisprudence and afterwards the intended purpose of it based on legitimate evidence.
Second, the analytical method.
Through this method, I have explained and analyzed the Islamic texts of the Great Quran, the Holy Prophet's Year, the Islamic rules and the jurisprudential and fundamentalist texts that have informed the jurisprudence contained in the research.
The research concluded with a number of important results, including: the jurisprudence of digital transformation at the general level is that it is necessary to establish and modernize society for the general human movement in the surrounding global environment.
It is certain that the legitimate interest of individuals also applies to it, depending on their individual capabilities.
The State, on the legal and constitutional side, should provide a secure digital climate for all State institutions and public society.
The personal legal responsibility of each individual who engages in the digital sphere is to protect himself from destructive and destructive attacks.
The achievement of cybersecurity is related to the purposes of the Islamic Shariah, which are necessary, namely, the preservation of religion, self-preservation, the preservation of mind, the preservation of money and the preservation of offspring.
This digital potential is needed in the Muslim community for the purpose of protection and the ability to face adversaries.
Ethical hackers must abide by the scope of their work and be responsible for overstepping the limits that are not permissible.
A punitive penalty clause may, in principle, be established by imprisonment or a fine for violating this requirement; Because in that case it's kind of dishonesty.
.
American Psychological Association (APA)
حمودة، أحمد صدقي عبد المنعم. 2022. لوازم التحول الرقمي : "الأمن السيبراني نموذجا" : دراسة فقهية مقاصدية. مجلة الشريعة و القانون بالقاهرة،مج. 2022، ع. 40، ص ص. 947-1000.
https://search.emarefa.net/detail/BIM-1456324
Modern Language Association (MLA)
حمودة، أحمد صدقي عبد المنعم. لوازم التحول الرقمي : "الأمن السيبراني نموذجا" : دراسة فقهية مقاصدية. مجلة الشريعة و القانون بالقاهرة ع. 40 (تشرين الأول 2022)، ص ص. 947-1000.
https://search.emarefa.net/detail/BIM-1456324
American Medical Association (AMA)
حمودة، أحمد صدقي عبد المنعم. لوازم التحول الرقمي : "الأمن السيبراني نموذجا" : دراسة فقهية مقاصدية. مجلة الشريعة و القانون بالقاهرة. 2022. مج. 2022، ع. 40، ص ص. 947-1000.
https://search.emarefa.net/detail/BIM-1456324
Data Type
Journal Articles
Language
Arabic
Notes
-
Record ID
BIM-1456324