The Legal Structure of the Electronic Terrorism Crime in the Jordanian Penal Legislation

Ibtisam Saleh


This study investigates the Jordanian legislator’s prevention of the electronic terrorism crime which is considered most dangerous amongst terrorism types at present. This is due to the wide usage of modern technology around the world and to the huge loss that might be caused by a successful operation that takes place under its concept.In order to meet the study objectives, it is quite crucial to look first into the general concepts  and the electronic terrorism ones. Second , we have explained the several sorts of electronic terrorism represented in spreading and exchanging data throughout the Internet, creating electronic websites, destroying websites and damaging data and information systems. Third, we have moved to the Jordanian legislator’s processing manner in preventing electronic terrorism crimes in which we have clarified the limits of applying the legal texts that spoke about general terrorism in the Penal Code if it is done electronically. After that, we have made it clear that the cybercrime law did not mention terrorism because there is a text in The Terrorism Prevention Act that accuses these texts, as it was considered the same as the terrorism acts in the strict terrorism prevention act. This is the reason why it has criminalized using the information system, internet or any other publishing means to publish, inform or create electronic websites to facilitate terrorism acts or to support a terrorism community, organization or association in promoting its ideas or financing them.

Keywords: Electronic Terrorism, Electronic Websites, Information Systems, financing terrorism.

Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email:

ISSN (Paper)2224-3240 ISSN (Online)2224-3259

Please add our address "" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright ©