Lutfi Mohamed Zain2024-05-302024-05-302020-11-18978-967-440-859-6http://inpac-fsu.usim.edu.my/https://oarep.usim.edu.my/handle/123456789/16598E-PROCEEDING 3rd INTERNATIONAL CONFERENCE OF THE POSTGRADUATE STUDENTS AND ACADEMICS IN SYARIAH AND LAW 2020 (3rd INPAC 2020) "Syariah and Law Approach in Solving Contemporary Issues" Organized by: Faculty of Syariah and Law Date: 18 November 2020The emergence of computers and the Internet have a dramatic impact on the progress of mankind in most areas of life, economic, educational, medical and many other areas, and emergence of experts in adapting this technology to commit contemporary criminal acts that rely on technology in implementation their actions with new criminal methods were not known before. The development of the means of modern information have helped these criminals, to increase the speed of deployment of their crimes until they became threatening information system, but also they can cause in the creation of complete paralysis of the systems, civil and military, terrestrial and satellite, and others by Informatics bombs which been sent by computer keyboard from spaces exceed tens of thousands of miles away, and that without leaving the offender or information criminal any impact for the prosecution and identifiable. These criminal acts has already attracted the attention of countries and international bodies that I realized its dangerous, ease of commission and its direct impact; to make control of the first priorities of the international community and governments, so it is important to protect it legally for the face of these criminal acts. However, most developing countries do not adopt a comprehensive national plan based on a deliberate strategy to protect their information, to keep pace with the development that occurred in the performance of the business in the developed world. So we must develop a comprehensive national plan to set out a clear strategy and well-studied for the protection and security of information.otherCybercrime, computer, network information.ماهية الجرائم الإلكترونية وخصائصها وأركانهاCybercrime, Its Characteristics And PillarsArticle777795