{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T05:05:09Z","timestamp":1761282309920,"version":"build-2065373602"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,1]]},"DOI":"10.1109\/idsta66210.2025.11202812","type":"proceedings-article","created":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T17:48:51Z","timestamp":1761241731000},"page":"96-102","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity and Criminal Protection of DNA Fingerprinting Data in UAE Law"],"prefix":"10.1109","author":[{"given":"Sultan Abdullah","family":"Al-kutbi","sequence":"first","affiliation":[{"name":"College of Law, Al Ain University,Al Ain,UAE"}]},{"given":"Mohammad Amin","family":"Alkrisheh","sequence":"additional","affiliation":[{"name":"College of Law, Al Ain University,Al Ain,UAE"}]},{"given":"Khawlah M.","family":"Al-tkhayneh","sequence":"additional","affiliation":[{"name":"College of Education, Humanities and Social Sciences, Al Ain University,Al Ain,UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2966\/scrip.020105.20"},{"volume-title":"Genome editing in humans: A survey of law, regulation and governance principles","year":"2022","author":"Nordberg","key":"ref2"},{"key":"ref3","first-page":"163","article-title":"Protection of Private Life in Criminal Law: A Comparative Study","volume-title":"PhD Dissertation","author":"Bahr","year":"1983"},{"issue":"4","key":"ref4","article-title":"Guarantees to the use of telecommunication technology in criminal proceedings in the United Arab Emirates legislation","volume":"10","author":"Alkrisheh","year":"2020","journal-title":"The Lawyer Quarterly"},{"key":"ref5","article-title":"Le droit au r\u00e9spect de lavie priv\u00e9e","author":"Badinter","year":"1968","journal-title":"JCP"},{"key":"ref6","first-page":"254","article-title":"Personnalit\u00e9, incapacite\u00e9 personnes morales","volume-title":"Coll. Themis Droit Pic\u00e9 PUF","author":"Carbonnier","year":"1995"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.62271\/pjc.16.2.47.60"},{"key":"ref8","first-page":"46","volume-title":"The probative value of genetic fingerprinting in criminal evidence","author":"Habtour","year":"2018"},{"key":"ref9","first-page":"94","article-title":"Challenges of Genetic Data Protection in Light of Technological Advancements: An Analytical Study in UAE Law","author":"Bin Issa","year":"2020","journal-title":"University of Sharjah Journal of Sharia and Legal Sciences"},{"journal-title":"Official Gazette, UAE","article-title":"Federal Decree-Law No. 39 of 2023 Concerning the Regulation of the Federal DNA Fingerprinting Database","year":"2023","key":"ref10"},{"journal-title":"Official Gazette, UAE","article-title":"Federal Decree-Law No. 39 of 2023 Concerning the Regulation of the Federal DNA Fingerprinting Database","year":"2023","key":"ref11"},{"key":"ref12","first-page":"130","volume-title":"Fundamentals of forensic medicine and toxicology for judicial and security authorities","author":"Al-Omari","year":"2014"},{"key":"ref13","first-page":"53","volume-title":"Criminal investigation - Theoretical principles and practical applications: An analytical study according to UAE and Egyptian legislation","author":"Al-Alfi","year":"2017"},{"key":"ref14","first-page":"150","volume-title":"Human rights: A critical foundational study concerning the constitutional organisation of rights and public freedoms in the UAE","author":"Al-Badri","year":"2016"},{"key":"ref15","first-page":"42","article-title":"Genetic fingerprinting and its rulings in Islamic jurisprudence and contemporary law: A comparative jurisprudential study","volume-title":"Doctoral dissertation","author":"Al-Rifai","year":"2005"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.33327\/ajee-18-7.3-a000302"},{"key":"ref17","first-page":"136","article-title":"Criminal protection of genetic data in Kuwaiti law: A comparative study","volume-title":"Doctoral dissertation, Kuwait University, Kuwait","author":"Al-Shammari","year":"2022"},{"journal-title":"Official Gazette, UAE","article-title":"Federal Decree-Law No. 39 of 2023 Concerning the Regulation of the Federal DNA Fingerprinting Database","year":"2023","key":"ref18"},{"key":"ref19","first-page":"115","article-title":"The role of genetic fingerprinting in criminal evidence between Sharia and law","author":"Fouad","year":"2016","journal-title":"Paper presented at the Conference on Genetic Engineering Between Sharia and Law, May 5-7, 2016, Faculty of Sharia and Law, United Arab Emirates University"},{"journal-title":"Official Gazette, UAE","article-title":"Federal Decree-Law No. 39 of 2023 Concerning the Regulation of the Federal DNA Fingerprinting Database","year":"2023","key":"ref20"},{"issue":"1","key":"ref21","first-page":"15","article-title":"Security for Genetic Data","volume":"14","author":"Kravitz","year":"2016","journal-title":"IEEE Security & Privacy"},{"journal-title":"Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1","year":"2018","key":"ref22"},{"volume-title":"Computer Security: Art and Science","year":"2018","author":"Bishop","key":"ref23"},{"volume-title":"ISO\/IEC 27001:2022 - Information security, cybersecurity and privacy protection","year":"2022","key":"ref24"},{"volume-title":"Guidelines on Security Measures for Digital Services","year":"2023","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT57182.2022.9994174"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/snams60348.2023.10375402"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.33327\/ajee-18-8.2-r000110"}],"event":{"name":"2025 Sixth International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","start":{"date-parts":[[2025,9,1]]},"location":"Varna, Bulgaria","end":{"date-parts":[[2025,9,4]]}},"container-title":["2025 Sixth International Conference on Intelligent Data Science Technologies and Applications (IDSTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11202699\/11202765\/11202812.pdf?arnumber=11202812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T05:00:23Z","timestamp":1761282023000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11202812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/idsta66210.2025.11202812","relation":{},"subject":[],"published":{"date-parts":[[2025,9,1]]}}}