Documente Academic
Documente Profesional
Documente Cultură
TALAL AL ISMAIL
M80001181
ZAYED UNIVERSITY
MARCH 2011
users is beginning to draw attention in several global capitals. Although, there are
countries that have laws against cybercrimes, however, those laws are likely to be
unenforceable against such crimes. The shortcoming in legal protection means that
businesses and governments must apply self-protection against those who would
In light of the changes that happen in the world of technology, Cyber Crime has
all walks of life. Hence, the need for legislations to keep pace with these changes
is most vital. Since the United Arab Emirate is living its technological boom, is
not immune against these arising threats. In Jan 2006 (Aecert.ae, 2006), the
Cyber Law of the UAE has been issued and put in practice in order to have
control over these crimes to some extent. In this paper, a SWOT (strengths,
weaknesses, opportunities, and threats) analysis of the UAE Cyber Law will be
carried out.
Strengths
Authority (TRA) realizes the need for that law and how it is important to stay
Develops a broad line of a law that deals with the protection of Internet users.
Urges to respect the religious beliefs of the UAE citizens and to respect the
(Datadubai.com, 2011).
Weaknesses
Some of the conditions and legal terms mentioned are not illustrated or defined.
The existing law doesn't cover recent concepts e.g., cyber-stalking and
harassment through e-mails, and digital piracy, as well as, technologies such as
Lack of clear vision, as the existing law doesn’t keep pace with the technological
Opportunities
country will help improve the efficiency and the effectivity of the current law.
Crime in the state will increase awareness among Internet users and the local
Threats
Internet usage in the UAE has grown 212 per cent exponentially from 2000, and
as a result 49.8 per cent of the country's citizens are prone to cyber-crime today,
the ratio can be increased (Ameinfo.com, 2009), and the need for a strong and
Widespread of hacking and malicious tools that would put any network system
under the line of danger as no technical expertise is needed to use these tools.
References
Aecert.ae. (2006). The Federal Law No. (2) of 2006 on The Prevention of
http://www.aecert.ae/preventionoftechcrimes.php
Ameinfo.com. (2009). UAE Under Constant Attack from Cyber Criminals. Retrieved
http://gulfnews.com/news/gulf/uae/crime/uae-to-create-cybercrime-courts-
1.562337
March, from
http://www.uaeinteract.com/docs/UAE_creates_team_to_fight_cyber_crime/24690.
htm