لوازم التحول الرقمي : "الأمن السيبراني نموذجا" : دراسة فقهية مقاصدية

Other Title(s)

Digital transformation kits : "cyber security as a model" : a purposeful doctrinal study

Author

حمودة، أحمد صدقي عبد المنعم

Source

مجلة الشريعة و القانون بالقاهرة

Issue

Vol. 2022, Issue 40 (31 Oct. 2022), pp.947-1000, 54 p.

Publisher

al-Azhar University Faculty of Sharia and Law

Publication Date

2022-10-31

Country of Publication

Egypt

No. of Pages

54

Main Subjects

Islamic Jurisprudence and its Foundation

Topics

Abstract EN

This research aims to show the jurisprudence and intent related to cyber security as one of the electronic devices for the success of the digital transformation process launched by the Egyptian state, which has become a modern necessity that cannot be left behind.

In this research, I followed two scientific methods: First, the descriptive approach: through which I have described both the terms "digital transformation" and "cyber security" in order to arrive at its jurisprudence and afterwards the intended purpose of it based on legitimate evidence.

Second, the analytical method.

Through this method, I have explained and analyzed the Islamic texts of the Great Quran, the Holy Prophet's Year, the Islamic rules and the jurisprudential and fundamentalist texts that have informed the jurisprudence contained in the research.

The research concluded with a number of important results, including: the jurisprudence of digital transformation at the general level is that it is necessary to establish and modernize society for the general human movement in the surrounding global environment.

It is certain that the legitimate interest of individuals also applies to it, depending on their individual capabilities.

The State, on the legal and constitutional side, should provide a secure digital climate for all State institutions and public society.

The personal legal responsibility of each individual who engages in the digital sphere is to protect himself from destructive and destructive attacks.

The achievement of cybersecurity is related to the purposes of the Islamic Shariah, which are necessary, namely, the preservation of religion, self-preservation, the preservation of mind, the preservation of money and the preservation of offspring.

This digital potential is needed in the Muslim community for the purpose of protection and the ability to face adversaries.

Ethical hackers must abide by the scope of their work and be responsible for overstepping the limits that are not permissible.

A punitive penalty clause may, in principle, be established by imprisonment or a fine for violating this requirement; Because in that case it's kind of dishonesty.

.

American Psychological Association (APA)

حمودة، أحمد صدقي عبد المنعم. 2022. لوازم التحول الرقمي : "الأمن السيبراني نموذجا" : دراسة فقهية مقاصدية. مجلة الشريعة و القانون بالقاهرة،مج. 2022، ع. 40، ص ص. 947-1000.
https://search.emarefa.net/detail/BIM-1456324

Modern Language Association (MLA)

حمودة، أحمد صدقي عبد المنعم. لوازم التحول الرقمي : "الأمن السيبراني نموذجا" : دراسة فقهية مقاصدية. مجلة الشريعة و القانون بالقاهرة ع. 40 (تشرين الأول 2022)، ص ص. 947-1000.
https://search.emarefa.net/detail/BIM-1456324

American Medical Association (AMA)

حمودة، أحمد صدقي عبد المنعم. لوازم التحول الرقمي : "الأمن السيبراني نموذجا" : دراسة فقهية مقاصدية. مجلة الشريعة و القانون بالقاهرة. 2022. مج. 2022، ع. 40، ص ص. 947-1000.
https://search.emarefa.net/detail/BIM-1456324

Data Type

Journal Articles

Language

Arabic

Notes

-

Record ID

BIM-1456324