You are on page 1of 89

‫ﻓﺼﻞ ﲤﻬﻴﺪﻱ‬

‫ﺑﺮﳎﻴﺎﺕ ﺍﳊﺎﺳﺐ ﻭﺗﻄﻮﺭ ﲪﺎﻳﺘﻬﺎ‬


‫ﻧﺤﻮ ﺇﻳﺠﺎﺩ ﺣﻤﺎﻳﺔ ﻗﺎﻧﻮﻧﻴﺔ ﻣﻼﺋﻤﺔ ﻟﺒﺮﻣﺠﻴﺎﺕ ﺍﻟﺤﺎﺳﺐ ‪ :‬ﺩﺭﺍﺳﺔ ﻣﻘﺎﺭﻧﺔ‬ ‫ﺍﻟﻌﻨﻮﺍﻥ‪:‬‬
‫ﺭﺿﻮﺍﻥ‪ ،‬ﺇﻳﻬﺎﺏ ﻋﺒﺪﺍﻟﻤﻨﻌﻢ ﻣﺤﻤﺪ‬ ‫ﺍﻟﻤؤﻟﻒ ﺍﻟﺮﺋﻴﺴﻲ‪:‬‬
‫ﺳﺮﻭﺭ‪@ ،‬‬
‫ﻣﺤﻤﺪ ﺷﻜﺮﻱ‪ ،‬ﺍﻟﻘﻠﻴﻮﺑﻲ‪ ،‬ﺳﻤﻴﺤﺔ ﻣﺼﻄﻔﯩ)ﻤﺸﺮﻑ(‬ ‫·‪@:áîÔmë@†îè‬‬ ‫ﻣؤﻟﻔﻴﻦ ﺁﺧﺮﻳﻦ‪:‬‬
‫‪2016‬‬ ‫ﺍﻟﺘﺎﺭﻳﺦ ﺍﻟﻤﻴﻼﺩﻱ‪:‬‬
‫    
    
 
   
 !‪!" #
$%‬‬
‫ﺍﻟﻘﺎﻫﺮﺓ‬ ‫ﻣﻮﻗﻊ‪:‬‬
‫

‪$ $ 
 $ &'( #

  

 ')! * " & +  #‬‬
‫‪1 - 718‬‬ ‫ﺍﻟﺼﻔﺤﺎﺕ‪:‬‬
‫‪.+  * -‬‬
‫‪850735‬‬ ‫ﺭﻗﻢ ‪:MD‬‬
‫ﺟﺎﻣﻌﻴﺔ‪ 1  2 
 
 
 -.‬‬
‫ﺭﺳﺎﺋﻞ
‬
‫"  ‪/0‬‬ ‫ﻧﻮﻉ ﺍﻟﻤﺤﺘﻮﻯ‪:‬‬
‫‪ 3 4
 5-.
 67 2 /0   8  &+ 6‬‬ ‫ﺭﺳﺎﻟﺔ ‬
‫ﺩﻛﺘﻮﺭﺍﻩ‬ ‫"‬
‫ﺍﻟﺪﺭﺟﺔ ﺍﻟﻌﻠﻤﻴﺔ‪9  / 4 :‬‬
‫

‪.‬‬
‫ﺍﻟﻘﺎﻫﺮﺓ‬ ‫ ‪ :$ -.‬ﺟﺎﻣﻌﺔ‬ ‫ﺍﻟﺠﺎﻣﻌﺔ‪:‬‬
‫ﻛﻠﻴﺔ ﺍﻟﺤﻘﻮﻕ‬ ‫ﺍﻟﻜﻠﻴﺔ‪:‬‬
‫ ‪;3 
 & 7 
 
 
 
 .$ "+‬‬
‫ﻣﺼﺮ‬ ‫ﺍﻟﺪﻭﻟﺔ‪:‬‬
‫
‪ "
<  =
 ( )  + >  #
&! 0
$‬‬
‫‪Dissertations‬‬ ‫ﻗﻮﺍﻋﺪ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ‪:‬‬
‫
‪:$
" + + : ! 2    
   
 >
 2" 
.6‬‬
‫ﺑﺮﻣﺠﻴﺎﺕ ﺍﻟﺤﺎﺳﺒﺎﺕ ﺍﻹﻟﻜﺘﺮﻭﻧﻴﺔ‬ ‫ﻣﻮﺍﺿﻴﻊ‪:‬‬
‫
? ; "‪@  A$/ $

  +   
$
 
 /‬‬
‫‪http://search.mandumah.com/Record/850735‬‬ ‫ﺭﺍﺑﻂ‪:‬‬
‫ ‪?B43 "
 $/ 0 1 A    $
 
 "
  !  .‬‬
‫  ‪   &
C
 @ # =  &
  "
 ')! 2 " #‬‬
‫ ‪. "
 $ 4 B"
.
 $
 @     + A$/   
" +.‬‬

‫  ‪
   D -   + & !3  < 2 B &#"  A$/ 5‬‬
‫‪9‬‬
‫
 
‪=
   $
# &<   =
  $
E 2 &$‬‬
‫‪  42‬‬
‫ " ‪9 &
C
 @ #  
 ')!   0 # &  /‬‬
‫
" 
‪. 4 

 
 D 2 "( &F .‬‬

‫‬

‫© ‪ 2018‬ﺩﺍﺭ ﺍﻟﻤﻨﻈﻮﻣﺔ‪ .‬ﺟﻤﻴﻊ ﺍﻟﺤﻘﻮﻕ ﻣﺤﻔﻮﻇﺔ‪.‬‬


‫ﻫﺬﻩ ﺍﻟﻤﺎﺩﺓ ﻣﺘﺎﺣﺔ ﺑﻨﺎﺀ ﻋﻠﻰ ﺍﻹﺗﻔﺎﻕ ﺍﻟﻤﻮﻗﻊ ﻣﻊ ﺃﺻﺤﺎﺏ ﺣﻘﻮﻕ ﺍﻟﻨﺸﺮ‪ ،‬ﻋﻠﻤﺎ ﺃﻥ ﺟﻤﻴﻊ ﺣﻘﻮﻕ ﺍﻟﻨﺸﺮ ﻣﺤﻔﻮﻇﺔ‪ .‬ﻳﻤﻜﻨﻚ ﺗﺤﻤﻴﻞ ﺃﻭ ﻃﺒﺎﻋﺔ ﻫﺬﻩ ﺍﻟﻤﺎﺩﺓ ﻟﻼﺳﺘﺨﺪﺍﻡ‬
‫ﺍﻟﺸﺨﺼﻲ ﻓﻘﻂ‪ ،‬ﻭﻳﻤﻨﻊ ﺍﻟﻨﺴﺦ ﺃﻭ ﺍﻟﺘﺤﻮﻳﻞ ﺃﻭ ﺍﻟﻨﺸﺮ ﻋﺒﺮ ﺃﻱ ﻭﺳﻴﻠﺔ )ﻣﺜﻞ ﻣﻮﺍﻗﻊ ﺍﻻﻧﺘﺮﻧﺖ ﺃﻭ ﺍﻟﺒﺮﻳﺪ ﺍﻻﻟﻜﺘﺮﻭﻧﻲ( ﺩﻭﻥ ﺗﺼﺮﻳﺢ ﺧﻄﻲ ﻣﻦ ﺃﺻﺤﺎﺏ ﺣﻘﻮﻕ ﺍﻟﻨﺸﺮ ﺃﻭ ﺩﺍﺭ‬
‫ﺍﻟﻤﻨﻈﻮﻣﺔ‪.‬‬
‫ﻓﺼﻞ ﲤﻬﻴﺪﻱ‬

‫ﺑﺮﳎﻴﺎﺕ ﺍﳊﺎﺳﺐ ﻭﺗﻄﻮﺭ ﲪﺎﻳﺘﻬﺎ‬


‫·‪@ @:áîÔmë@†îè‬‬
‫    
    
 
   
 !‪!" #
$%‬‬
‫

‪$ $ 
 $ &'( #

  

 ')! * " & +  #‬‬
‫‪.+  * -‬‬

‫"  ‪ 1  2 


 
 
 -. 
 /0‬‬
‫"  ‪ 3 4
 5-.
 67 2 /0   8  &+ 6‬‬
‫ ‪9  / 4‬‬
‫ ‪.

 :$ -.‬‬

‫ ‪;3 
 & 7 
 
 
 
 .$ "+‬‬
‫
‪ "
<  =
 ( )  + >  #
&! 0
$‬‬
‫
‪:$
" + + : ! 2    
   
 >
 2" 
.6‬‬
‫
? ; "‪@  A$/ $

  +   
$
 
 /‬‬
‫ ‪?B43 "
 $/ 0 1 A    $
 
 "
  !  .‬‬
‫  ‪   &
C
 @ # =  &
  "
 ')! 2 " #‬‬
‫ ‪. "
 $ 4 B"
.
 $
 @     + A$/   
" +.‬‬

‫  ‪
   D -   + & !3  < 2 B &#"  A$/ 5‬‬
‫‪9‬‬
‫
 
‪=
   $
# &<   =
  $
E 2 &$‬‬
‫‪  42‬‬
‫ " ‪9 &
C
 @ #  
 ')!   0 # &  /‬‬
‫
" 
‪. 4 

 
 D 2 "( &F .‬‬

‫‬
:

 ;
 A
8 H"
 .
 )! #   &<$/

.<   =
  :


.=
  
 : 


.2 
C
 @ #  
   0 :  


."
  . 
 I4
 J-
 :  



‫ﺍﳌﺒﺤﺚ ﺍﻷﻭﻝ‬

‫ﺗﻌﺮﻳﻒ ﺍﳊﺎﺳﺐ ﻭﻣﻜﻮﻧﺎﺗﻪ‬


 .$ 4
 
 7  <+  – 6 – =
 !2 
.<$2  "/2 H)
 E7
 @


LL LL
LL LL <LL L   =LL L 
 LL L 
 LL L 2 =LL L  
 LL LL <LL L M &<LL L $/
."
 ')! D -  
 !
@/2 #  "/ 2 A/ &

/ ) #" # & 2 =$0  =


     &#"  A$/ 5 
9
. =$0  <  

‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‬

‫ﺗﻌﺮﻳﻒ ﺍﳊﺎﺳﺐ‬

.>01 
 # 91 2 H 7$
 
 ""
 )!  

@ @ZðìÌÜÛa@ÑíŠÈnÛa@Züëc
! 
 7$
 A
8 6$ N 7$
  Computer $   > 41 


 &#1 )!  H)
 6
 A$/ $02 
 .$ 4
 
  =


9 
 ')! #"4  5.
 E - "+ &" " ! 
 7$
  %

E  "  
N 
" S$0
" 
 :$ "4  .(Q)/ 

– 3 = 
 –  $
 #  
  + /   &
    !  ()

.QW I & T V! &TUUQ & !


 &;"
 = 
 " &
  +


5.
 E  "+ &(T)"  
N =
" S$0 E
 #"4  .(Q)X 

.(Y)
 ')! #"4 

"
Z # 
" S$0 #"4  - 5.
 E 2 " &B42  
.([)« Ordinateur »  .
 #>
+"
 
 ' /

)! #"4  "C .(\)"=


" S$0 #"4  -
  " 
 7$
 J 2
   ( 6$ N « Computer » $ 2 2  / A$/ S$0


 &"=
" ! .
 )!  /.
 M #   ?"=" '  “compute”
L$
 2 2 " &:
) A$/ >/ .
 7$
 J <
8 A   J @.  7$

"
]" $  BL L42 L L -8 2 $+ - #
«Computer» ! 6L$ N 7$


0 & 
–   &>$
#$
 " &//H6$  X + ^3 " 
 &# $  % ()

.TUTI &TUUT &Y`


" &/ /H6$ 8 ^   
  
 $0 X + &'
()  '  *+ (&)

" &' 
,- '
.' ? W[I &QWab &Q0 &" 
 ^ " &
 /0$
/
.\ I &." & !
 &
 .
 " &(Q)=
 # $/ $$ ^ 
 

/0$

 " &  
N =
 c
 
 
 &, '
0!
'
.' (/)

&"  


 ')! / , '
0!
'
.' J "+ .\I &QWab & !
 &

 X4
 
 3 ? " "=" $ #"4  - "  
N" 2 "
Z" $ d"8 E
'
0!
'
.' :  ./ 01 5)
    ٕ   
8
9 2 
]
9  


& "  " &5-
 #2 <.
 5] 5 -  & .
 "3 $
  $
 J
 &,
.Tb I ba V! &QWWW & !

&' " 
 &( $
 c) 0 
  $
 
 
 &2
  '  '
' 3 .' (1)

.[b I Q V! &QWWT &X / @ 


&5% $  56   + 7 8 (!
 9# 7 +  : !
 5+ :""/8 &
 # (4)

.`` I &TUUY &Y0 & !




 " 
. " /  .- 12 = &automated

 +  "
Z =
" S$0 #"4  H
 D
 2 )
 "
 
f  :
) &TUUT  
aT #+  
 "
 .
 $
 @  
E
; &(Q[U) "
  
C
 @  

 . $
$3 E
'""
(Q)
S$0 #"4  2 < 9  "+ " 8 (!
" <  & .......... » :)
.(T)« 
 7$
 J +2 $ "=
"

@ @Zïyýİ•üa@ÑíŠÈnÛa@ZbĆîãbq
  <  9.$ "" $
90    
8 6" < ( E
 </

(Y)
& "L $0
 c%
 d4  #  N 4"  "  
 #
  64  

.([)«+ $
+ 
]   c
» < ( E
 < L/

4"  " 
]    
 
 =
 #+  .
 )! @. 

#"4  &=
 X$ A$/ E 
  
 D   &(Q[U) "$
$3 I
  #
()

 B42 "  : !   < 2   & ". "=


" $ -   < 
"
Z =
" /
"
9 5-/3 E F + . H2  " "=
" A
8 - "
Z" $ -  
 D 
  2  " X$
 @  &"  2 "=
" $ J "
Z" $ -8 #  2 $0$

.$0
 " B   : !
&=
 X$

 
 .
   
 " 1  "  [\ & Ya  $
  0- : 
.= 
 A$/ &!" T` . &Q\ . &TUUT #/
&  " ^=
   I4  + #  & = '  2!
'
.' (&)

.Qb I T V! &TUUb &X / @  &' " 



&(X  ) =
 # $/  &4
 =
 A$/  &,$   > '
'+ (/)

.QQ I &TUUY &\ 0 & !



(4)
Arnold Burdett and others, A Glossary of Computing Terms, Longman,
Eighth Edition, 1995, p.100.
  

 2 18 .(c
) 9.$ "" $ J- @0 / 
  < 2 &H
#* +
9  =
   2 0  < 2  & "" c% A$/ 
 -  #
 

.(Q)
 )! =2 < +2  ! &%"
9 X
+    
*
9 
 2
LL L L  LL L L/  )LL L L.
LL L L   2 6LL L L» <LL L L ( LL L L
 #LL L L  <LL L L LL L L 
L L L L LL L L $/ LL L L $
 ')LL L L ! LL L L  &'""LL L L /8 @LL L L  L L L L$  ""LL L L 
 LL L L $

LL L L L L 64 LL L L L L.$ 4
 =LL L L L L
 56L L L L L 2 LL L L L L LL L L L L $
L L L L L  LL L L L L$/ 2 &LL L L L L0 
ALL L L  .LL L L
" 
 LL L L 
 #LL L L + ALL L L $/ LL L L $
 L L L L$ "LL L L   "LL L L + &/ LL L L 
)LL L ALL L 6L L 4 $
0LL L LL L cL L 
 LL L 
 6LL L4 .LL L 
9  LL L$
 L L $
.(T)«=


?c
 =
 6   
 6M < ! S-  
 )! 
=
 < #  "=
  $ # " A    $ #  9   ;
?/   64  
 
    
 &c 
 <
!"" 
 $

 &=$

 c
 !2 -2
9 &c$

 =
 !2 S- # 
.4Z / !"3 A * 1 > 

(1)
Ibid.
  &Analog  & Digital +  A
8 #
 ;  
  
&'
()  '  *+ & #"4  D 3 ')!  D 
&Sequential  & Hybrid
 #"4  ; &+
 
 ! / 
9 !2 D 3 :$ 2 
&W[I &@ J
%  #+(  
 6 
 #+3  A$/ $/  #  &$
 
 
 i 

.QTWI &@
 J
   : .
  "6
.(" & .)
.`` I &@ J &
 # (&)

 & 
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻧﻲ‬

‫ﻣﻜﻮﻧﺎﺕ ﺍﳊﺎﺳﺐ‬
=$
"
  
 ! :
) " 
 M =
   / ;"
 " /
:  &
 7$
  
 ')! A$/ @$0  "/ : ! .Hardware
-. &(Q)" 
 2 & 63 2 &=
   2 &H"
 
 2 &"
 6$ 

.  4 < 3 "" 
" S$0 #"4 

&6
 )!  "
 
 
 J0
 ! (" 
) =$
"
  

')! 6 ) &(T) $
  @%+ 2  > 2 6 2  "   5 
 
 D   &Software 
 !  
  
 /  

 $ # » L     (
 " 
) =
   
 "

.(Y)9.$  - 2   A$/ «=


4"N " &@+"


 c

 :! % #+2 2  =
   
.64
 " &d4N

:$  #+3 ')!  #+  

.TUQI &@ J &'


()  '  *+ ()

.TT &@ J &,$   > '


'+ (&)

5 # =  
    ("
  
) =
 " / 2 
 $  (/)


 >4 :
) & 5
 A$/ 
 0   0 
&/     3 D 41
=
  B    A$/ D 4 5 A$/ $
 " B"   "  
  )
:A 
 )!    . 

Vincent Chiappetta, Patentability of Computer Software Instruction as an
"Article of Manufacture": Software as such as The Right Stuff, Journal of
Computer & Information Law, Vol. XVII, 1998, p. 139.
 / 
@ @ZHòíŒ×Š½a@ò¦bȽa@ñ†yëI@ÕîÓ†Ûa@&bȽa@Züëc
6
 

 "
 4
 #1 ! Microprocessor @+"
 c


=$+ !   )8 ?=
   #!2 "2 ! Central Processing Unit (CPU)
. "/ " !  "
 + <. =
 ' / -.  : ! &=

5"2  #
 #   &0  B42  $/  .$ 4
 $
 5"( # 
.(Q)B43 "


" &@0 
 =
 " ) :! &562 >  @+"
 c

   
.( )
 " &#


:563 ')!  56 


 4 F $ 

:(Arithmetic & Logic Unit) (&),  (!


 ?'
 ( > )

LL L L  2 =LL L L  LL L L 


 ALL L L$/ LL L L 0 
 LL L L 
 LL L L$
 5L L L L8 # LL L L  LL L L
LL L $/ @LL L $0 LL L
 LL L   
N % "LL L
 LL L ""LL L / LL L   LL L . L L L
 #%LL L 
 cLL L 

.0 
 % "

(Y)
?< 
 2 
 "
 ')!   :(Control Unit) 0#
 ?'
 (()
 3 A$ 
  &.$ 4
 =
 562  +>
 # 0 /  ;
A  j
). 
 "
 ')!  #
 # !).
4
 "
 A
8 $
.<  5 1

.[Q I &@ J &' 


,- '
.' ()

0   &! 0  " – 4


 
 
 &23A '%$!  '
+ .0.' (&)

.!"  [\ I &QWW[ & !


 &
 "
.@
 J
 (/)

 1 
 % / A
8 # ! :(Main memory) 5%!%B  ?#C  (D)
:/
 )!  $  .(RAM , ROM) )


:(RAM) B$  -  ?#C ()


 ) #   &Random Access Memory 6$ N A
$/  
   &   5+  
 )
 ! &
 )
 2 

d    &c

   
  
 $4" J-
#"4  &$/  )
 2
c

 # 
)
 A
8  
 ')! 19 2  64
 "    2 A
8 c


=$0 )8 B42  64
 " A
8 !" #  
 ')! A$/  
 $
 5M
" c

  0    2 ! RAM )$
%
 .
 &3
.(Q)64


$/  5  2 A  volatile 7   6


  )
 ')!
A$/ 64  
 2 :
)  =
 .(T)=
 / 5
 D0  " A> 
.(Y)B     A$/ &=$
 I
  0 7
9 X
  

9 8 )
 :$

:(ROM) ,E ?FE  ?#C (&)

-2
9  &0 5
 ) H2 &Read Only Memory 6L$ N A

&) 2 $"  F  * $ 2 c A$/   & 
 )
 #
A$/ "  
  
 5+  .([)0 5
 ) A :
)
&0  5+ 

.QUT I &@ J &,$   > '


'+ ()

.Y`QI &@ J &'


()  '  *+ (&)
(3)
Joshua C. Liederman, Changing The Channel: The Copyright Fixation
Debate, Rutgers Computer & Technology Law Journal, Vol. 36, Issue 2, 2010,
footnote 7, p. 290.
.QUY I &@ J &,$   > '
'+ (1)

 4 
D0  
  A  $/  64
  $
 .  ; ?   2 )
 ')!
.  1 
 RAM % 
 
 )  X
 A$/ &6
 / 
 

.(Q) )  
 
 D0  
   $


( 
) %"
 c
 ROM 0 5
 ) A$/ J- 
 c
 A

 <- H)
 BIOS c  Firmware c $2  &Firmware
7
 6 07- " / =
 D>+M 5"$
ROM ) A$/ $
 

(T)
@+"
 " 
 # -2
9 c 
 )! A$/ @$0 . =
 7 #
#6>
 -

.Microprocessor @+"
 c

 A$/  < 2  / A$/ Microcode

:(/)Þb/…⁄a@pa†yë@Z@bĆîãbq

 H"C  &6>


 $
  
 =
 )7  4"N " # 
.A/3 #3  N  " =
 & k
X 
 <"C

(.
 &I+3 7 " &S .
 
:  
 4"N " $2 
& 
 A$/ 
 62 &X$
  &% -
 #$
 &=
3 / &  
N
.% -
 "/3 l+ & 
 S

:(1)xaŠ/⁄a@pa†yë@ZbĆrÛbq

$ 

 
 0 4 ٕ c%
 M "
 ')! # 
./
 &#
 1] &0
 &
 : $2  &=


.Yb[I &@ J &'


()  '  *+ ()

(2)
See: <ar.wikipedia.org/wiki/‫>بيوس‬, (Last visited 25/3/2015).
. Yb ^ Y` I 91 #%"
 c 
 " 
  
.Yb^Y` I &@ J &23A '%$!  '
+ .0.' (/)

.!"  `\ I &@
 J
 (1)

 G 
:()òîu‰b¨a@ëc@òíìãbrÛa@å팂nÛa@pa†yë@ZbĆÈia‰

$ 0  .
(m
8 ... c% &c & )  $
 64  "
 ')! # 
&0 7
 03 :"
 :$ $2  &1 + 2  "4  "/8 "
-
 )
 &(CD-ROM) "
 I+3 &$
 I+3 & 
 I+3
.Flash memory

.!"  \b I &@ J &' 


,- '
.' ()

  
‫ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﻧﻲ‬

‫ﺍﻟﺘﻌﺮﻳﻒ ﺑﱪﳎﻴﺎﺕ ﺍﳊﺎﺳﺐ‬


‫    !) 
; 
 
‪
 # &( 2 =$0) $
 .‬‬
‫
 
 )‪B" "
 53  
  / B"  # &( =$0‬‬
‫‪=$0) $
 
 
 / "  42‬‬
‫‪9 &(;
 =$0) :> >
 $+‬‬
‫‪.(J‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‬
‫ﺍﻟﺘﻌﺮﻳﻒ ﺍﻟﻔﻨﻲ ﺑﱪﳎﻴﺎﺕ ﺍﳊﺎﺳﺐ‬
‫ !) 
‪D 2 &( 2 D) =
  " 
 =$0‬‬ ‫   ‬
‫ 
= )‪#!. E
F- ٕ &(;
 D) c 
 ""/8  &( D‬‬
‫‪ 6
 42‬‬
‫
 )‪9 &(X4 D) c 
 =
  +>
 &(J D‬‬
‫
 ‪.(X" D)  
 "/+ c‬‬

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‬
‫ﺍﳌﻘﺼﻮﺩ ﺑﱪﳎﻴﺎﺕ ﺍﳊﺎﺳﺐ ‪Software‬‬

‫‪=$
".
 6$ 
" S$0 Software 
 A$/ E
 @$0‬‬
‫‪.(Q)Hardware "
 <%62 2 =
 " / / 
6‬‬
‫  ‪9‬‬

‫  ‪.(T)#
 $
 c
 “Software” "" $‬‬

‫ ‪% J &5N   
 c
  "  ( 
 A
8 E
 2‬‬

‫‪.YWT I &@ J &'


()  '  *+‬‬ ‫)(‬

‫
‪.YWY I &@
 J‬‬ ‫)&(‬

‫  ‬
J 2 @
 )!  &(Q)"=
 # A$/  2  
 & 0 

 
 J A$/ 
1"$
#"4  S$0" < ( "
" S$0 A
8 
 7$

7
6>
 c
 ! &#
 c :
)  &=
 #
"
 *
.(T)"=
 #"4  4
 c
 ! &0
 c &=


 "4 
 c
 J  
 7$
 J ')  2 >
 
*  
  ! / c 
 :$  4
 @%
 J 
8 9- &=

.=
 #
"


c " S$0 ! Software "


" S$0 0  4] S$0 : !
 "+ .“Program” "c 
" 2 &Computer program "=

< ( E
 </
& * $/ 5"3 
Z =
 <
S J    $
  / "
/ " < ( 
 7$
 J </ &(Y)" 
   2 - 
(  

(1)
Arnold Burdett and others, op. cit., p. 168.
 Procedure 5N 2 &c 
 562 "2 ! Routine  
 2 )
 "
 
=
 $0

 X 
 &2%!
'%!  .0 :  &$
$
 c 
.[Q I &TUU` &T0 & !
 &J6
  $
>! &//H6$ 8 ^   
N –   N ^
Z
.T`` I &@ J &
 # (&)
"
 J0
 B"8 
 2 &=
 #
"
 *  
 ! 
 ( " 

6 2 J-
"
 :  > 2  " J0+ X
c 
 &< ) =
 " /      

0 )  &H"  H3 c 
 "    1 ' )  .Hardware =
 " / 
<$7 " / c 
 &H" :
) #* < 
& N X  0  :" 1 I4 D  
&"
< 64 " / &
 
 < 
   
N ))
  /  / /   =
 " / 
:$  69 7 
 0 7 
  
  /  / /   =
 ) 
 "
  
 #  c 
 J-  / ;"
 " / .
 %6
 ')!    . )

.Y #+ \` I 1
9   ." * " A
8 5j

.YUb I &@ J &2%!


'%!  .0 (/)

  
!). = $0
 $
 <
=
 A
8 4" & ) %+ "  } |  3 
.(Q)" E* @

"4  "Computer Program" "Software" $0 M J+


 
&$!  1 "
D 
  S2 #"4 1 )! &
   "

:< ( Software S$0  ; &$
   X + :
) "2 "+
(T)
«Software as computer programs; "  " 
  
 $
"
.«instructions that make hardware work

A$/ 6 ; ?0  $0


 >  < 2 @
 
  >
"
 ')!  #"4    .=
 " 
 
 $
 ! &< ) c 
 ! 
.$
 J+
 <$/ H 
9 -2
9 "
 $0
 >

')! "2 =


 6   
 & /
9   
N 63   2
=
 c  $  2 #/2   Software  $ M & 63
S$0 &I4 #/  +>/ !   +>
   ; &Computer program
.I4
 ! Computer program S$0   &#
 S$0
 ! Software
B43 
  ""
 : ! 8 ; ?
 D 2  D ! =
 c 

 " / <-  !3 ~
  + 2 
%6
 ')! .=
 c >4
.(Y)$
 
 
 
(

.TTQ &@ J &


 # ()

(2)
Microsoft Computer Dictionary, Microsoft Press, Fifth Edition, 2002, p. 489.
.\T – \Q I 91   (/)

 &" 
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻧﻲ‬

‫ﺃﻧﻮﺍﻉ ﺑﺮﳎﻴﺎﺕ ﺍﳊﺎﺳﺐ‬

&0  &#


  :/ A
8 2 . 
 #
:/
 )
0 F $ 

:System Software âbÄäÛa@pbî©Ši@Züëc

&A$ 0 <"4  =


  ".  A+2 @

 ')! #"4 
:  $  &(Q)(
 7
7
 # ) : >
9 
:Operating Systems %6  0I –>

$4"
 "4
 % J  #  " H)
 c 
 ! 7
 #
"/  " c  H2 7 2 &=
 4" $/ 2 58   ; &=$

J   ; ?=


 4" H 
H"N "
    ! . 7
 #
A$/ "  
 c
  J <$ A
8 -N &=$
"
  
 
& )
 "8 :< #   #!2 .=
  ROM 0 5
 )  . .=

# .(T) $
 " ٕ &=
 " " ٕ &6
 

 " # " ٕ
.(Y)c

 I4
 " 
 .  J 9    2 = 7


:Programming Languages 5+   :6 (

#. #     3 ?=


 5   0 1" X.  
 7
 0

.a[ I &@ J &23A '%$!  '


+ .0.' ()

& "  " & $


 
 
 A " &2
! ?'  .'  J9+
%K! .' (&)

.!"  TYW I &QWWa &Q0


(3)
James V. Vergari and Virginia V. Shue, Fundamentals of Computer-High
Technology Law, ALI-ABA, 1991, p. 578.
 & 
A
8  N  $
  3   0 / &=
 7
#.  N 7

A
8 #"+3  
 7
#  .  $ 2 
(  E7 =

:(Q)

 
 A$/ ;"3

:Machine Language 5 8 56 

 & 3 
 7
2 Low Level Language E.4 
 B 
 7
A
@$0 
 ! 7$
 :$ .=
 J  =04  2  N D0  
 7$
 A
2
   %  #     
 2 :
) A  &Binary Code % 
 " 
 $/
   ; &=
 4"  %
 
 
  ! &(" &.) 
A$/  3  7  
  "+ .@$* 7 H2 (on , off) 
 B"8
  @ 
9 
9   ; &(" & .) +
   ~ %!
 
 ! "  5043    

9 &3 = " 9  =
L7$
 ')! 2 18 &  B 
  A$/2 B42 7
A
8  (


 #"4 1
.(T)!  
Z #. 1 
 7$
 ')! A
8 
3    2 " 1

:Assembly Language % +  56 &

!  #. 1 
 7$
  
Z 04  % 3 =
 5$/ :"2 "

*
"Z .3   $$   I4
 A$/   ; ?(" & .)
7
  A
8  (
)
?< (04
 D +  :
)   : 1 . "
9  3 "2
"
   &(Y)#  1"
9 
Z 7$  3 *  #  (c)  4 

.a\ I &@ J &23A '%$!  '


+ .0.' ()

&2
! ?'  .' 9+
%K! .' ? a\ I &@ J &23A '%$!  '
+ .0.' (&)

.YT[ I &@ J


(=) &.0
"  # " ." : &
 c .
 $
 & + .> ' (/)

 && 
; ?
Z 7
 
9 2 ! & 
 
 7
   
 &J
 7
J
  .     3  4 &#+3 6$ N  
  "4 
J 7
d  '6 0 </ = =  .
Z 7
 % 
 #
  -2

Z 7
A
8 J
 7
  #  2 = . 63 .  > 41 
9 < 4
@0 / :
) #  & 2   A$/ &!  =
 #. 1 
 (" & .)
.(Q)Assembler J
 A I4 # 

:High Level Languages J !  5%  :6  /

 7$
 $/ @$02 :
)
?   
  N 7$
   =+2 A!

Z) B 
 -.4  7$
  
 >
 A$/ =$7 $
7 ; ?B 

Fortran    7
9> &$ 4 #"4    
7$
  ""
 "  .(J

7
&
 E*3  #"4  Cobol   7
&$
 0
  #"4 
.(T)m
8 ... ""  E*2 #"4 %" $
7
! &Basic

#  ?
 
 >
 "" D ! 7$
 :$ D ""  =

.(Y) " 7
 7$
 " =
  < M

Compiler A #  A


8 -29 B 
 
/ 7$
  
 c
 d 
D

9 .(" & .) !* #. 1 
 
Z 7
A
8 B43 ! $   # 

A
8 7
 -2
9 $ 4 Compiler 
 c M B 
 
/ 7$
 > 4

.Q`b^Q`` I &QWWa &Q0 & !


 &

 
 
 

 
 (=)
72
! ?'  .'  9+
%K! .' ? a` I &@ J &23A '%$!  '
+ .0.' ()

.YT\ ^YT[ I &@ J


.!"  ab I &@ J &23A '%$!  '
+ .0.' (&)

.Q`W I &@ J & + .> ' (/)

 &/ 
.(Q)B42

(T)
:Application Software òîÔîjİnÛa@pbî©@Ûa@ZbĆîãbq
D 2 $ & "4   1 !  1 0
 
 8
 .%0 A
8 
  /
 ')! # . 
   A   ""/ "4 
: 2

#  
 ! & 6!
 c
 #6 $/ @$0  2 :5%,   :%+   
. $
% /   $

   $
 
 !""/M
"
 c &MS Word c   I 
 
 c :c
 ')! $2 
c &
 

 E*3 c &#
 c &Excel cL   

.@ 
   
   9.$ " c
 ')! .m
8 ... =
3

5>LL L/ =LL L$0 ALL L$/ 5L


9 L L   L L 
 !"LL L LL L
 LL L! :5LLLL-3  :LLLL%+   &
#LL L LL L-2
9 ALL L :
)LL L
?# LL L  LL L$ 2 # 0LL L ( LL L4 >LL L L L 
# LL L
6LL L L4 0LL L L-
2 &LL LL  LL LL LL L 4 cL L L :LL LL $2 LL L  &" LL L L.
 cL L L
"
LL L  cL L 
 LL L D LL L
 )LL L! .LL L  LL L 0LL L 2 LL L "/LL L$
2 &LL L J LL L
LL L L  4 .<LL L L >4 LL L L 
 1 LL L L 
 
"LL L L 
 7LL L L  cL L L L ?LL L L  LL L L 
!""LL L L/M cLL L L
 LL L L$ H)LL L L
 L L L 
 LL L L4 LL L L L L L 
cL L L 
 :LL L L$ #"4 LL L L
=LLL  LLL !""LL /M cLLL
 LLL$ LL   ٕ &9.$LLL "LL  1 cL L
 ')LLL .<LL   #%> LLL

<
LL L L ALL LL$/ cLL LL
 JLL L L L L L
 @LL LL.  LL L L 2
9 &<LL L L   =LL LL LL L L  ". LL LL


&2
! ?'  .' 9+
%K! .' ? WY I &@ J &23A '%$!  '
+ .0.' ()

. YT`^YT\ I &@ J


?'  .' 9+
%K! .' ? !"  W` I &@ J &23A '%$!  '
+ .0.' (&)

.!"  T\W I &@ J &2


!

 &1 
LL L L
 0LL L L 3 ) LL L L
 ALL L L$/ <LL L L6 LL L L

9 cLL L L 
 >7 LL L L @LL L L ALL L L$/
.<0

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻟﺚ‬

‫ﻣﺮﺍﺣﻞ ﺇﻋﺪﺍﺩ ﺍﻟﱪﻧﺎﻣﺞ‬

:

 
 A$/ ! &c 
 ""/8 " / /  =  "/ : !

@ @ZòÜØ’½a@†í†¤@Zµëþa@òÜyŠ½a
 :
) ?c $
%
 .
 2 $
 ""  c
 #  $
 ')! 
$
   #
 A  .(Q) = $$
-/ 0 04 2 "!2  
7   2 & 
 >4"
 #  $
  .

 "8  A 
.(T)c%
 4
  <
8 


Z(Y)pbîß‹‰aì¨a@…a†Çg@ZòîãbrÛa@òÜyŠ½a
 c 
  
 #  c 
 . 2 $
 A$/ c
   2 "
/ # 2 > A
8 c $
%
 .
  .  #  ; ?I4
 A
8 #

Module "  (/ c ) Subroutine   = :A &02 2
  =
 M  c 
   
 #
 "

9 &([)(0 " )

(1)
Robert Plotkin, From Idea to Action: Toward a Unified Theory of Software
and The Law, International Review of Law Computers & Technology, Vol.17,
Issue 3, November 2003, p. 339.
.YU` I &@ J &2
! ?'  .' 9+
%K! .' (&)
.`ba^`bb I &"$
@$ @
 6 4
 d)    (/)

   $/ H"C $


  /  / / (/.
 c 
)   =
 (1)

" 
     91" c 
  0 H2  <
8 
 " /   =
 A/"  ; ?  
(=) " 
 2 &[UT – [UQ I &@ J &'
()  '  *+ .' :  &    <.

 &4 

 $
 A
8 
 .7( 72 #+2 A
8 # 2  (/.
 c 
)
/.
 c
 =   c
 #  
 
  
  c $
%
 . $

@
  # 
 >/.
 "" &Modules 0
 "
 Subroutines
.(Q)#6 4
 #    
9 J  &c 
 "!
&c 
 $
0 
 
 <$/ @$0 &# * $
 2 &Algorithm "#6 4
"
5%M% > 5%E, 5# 
+> 2 :,3  2 ''
!! " < ( #6 4
 

    5%   :,3  2 5 + " < (   &(T)"5 K F'> >
."5%K 5,E 5%' 5,E N 2#  7K!! :,3  C% 0 % %
7(, 
"@"
 04" #   #"4  ! (#6 4
) 0 
 
 
0 -2
54
 A$/   1 "4  2 @"
 0%4 #"4  $-2  .Flowchart
.(Y)A   2  1  "4 
 6 
 2  &#!"

:([)=
  D 2 > #6 4
  #"4 

')!   "+ &$$ 


 $
  /  / / ! :!!  
.

 /
   2 0 $


0 $  $  1 >


 E : !   ; :% 3O &

" 
 & 
 c
 - "
9 "" # H"C $ /   (0
 "
) (=)
c
  ""
  #"4  2  H)
 &  =
 >4 " c 
#"4   "/
:  ..$ 4

James V. Vergari and Virginia V. Shue, op. cit, p.554.
(1)
Computer Associates Intern., Inc. v. Altai, Inc., 982 F.2d 693 (2d Cir. 1992),
at 697.
(2)
Microsoft Computer Dictionary, Microsoft Press, Fifth Edition, 2002, p.23.
.!"  aW I &@ J &' 
,- '
.' (/)
(4)
See: <https://ar.wikipedia.org/wiki/6 4>, (last visited 15/1/2015).

 &G 
  )M &
   0 
 E  4 A
8 >
 :$ d  " &$ $

4]  J %04   ) ٕ &$$  $ H   D  #   

. 41 2 
 )4  0
 ')! A &$
  $ 4

$ X. "/8 >


 E 
H -
    ; :#  /
.
  ""/  04


0%4 #  #"4 


6 
  /     $
3 "
 #+ "+
.(Q)@"


:Source Code C@‰†–½a@…ì× D@ …a†Çg@ZòrÛbrÛa@òÜyŠ½a

 04
    ! &Coding Phase "c 
 "  " # -2 9 
.(T) 7$   $ A
8 @"
 04  -/ # 


2 c
 <  & N =   5$
+ c " < ( "
 "  
@0 /  5$
+ * &J 7$ 2 B 
 
/  7$  0

.(Y)"=
 ').  2 + "
 "  A
8 #  2 A
8 d  &=


< M @"
 0%4 #  c
   2 " < 2 @
 
  S- 
004
 
  0%4
 ')!   = #  ?=
 A
8 
4"8 A
8 d 
:7
 &. 2  N J0  
 
 7
B"M = 
 
 A
8
""/8  $ A$/ @$0 .([)9.$  - 2   A$/ &  
 &:
 &  .

Writing a computer "=
 c   " S$0 "
 "  @"
 0%4

.YU` I &@ J &2


! ?'  .'  9+
%K! .' ()

.YUW I &@
 J
 (&)

(3)
Microsoft Computer Dictionary, op. cit., p. 491.
.YUW I &@ J &2
! ?'  .' 9+
%K! .' (1)

 & 
.(Q)program


  3 $
  "" #% + / / Source Code "
 " 
1  N . 
 
 7
B"M *  
&!). =
 A$/ =

Z 7
A
8  3 $
 :$  = =
 . A  &=
 .
.(T) N . 1 =
 . 
 (" & .)

2   )! &# 


 A   "
9 =  6  1 "
 "  2 )
 "
 
A
3 4
 d M &$
  2   c 
 5 M 0 
 3 



 I -2
9   )! &$ * <4  2   7$
$ < 
A
8 <
 2 ' #"/ "
 "   A$/ .
 A$/ 
 /6 
5 8 "/8  <$/    "
 "  / 
 ?(Y)c 
 "4 
  A  2 <$/ >" 4" ٕ  &([):
) 5  F2 @ c 
 J
."" c  < 2 '  #N c 


:Object Code Ò†Na@…ì×@…a†Çg@ZòÈiaŠÛa@òÜyŠ½a

2 Compiler # 
 @0 / '"
#  H)
 " 
" < ( "
 "  
 #. .(\)"c 
 I4
 "
 "   <  # H)
 &Assembler J

A  – $  2  < -   – c 
 I4
 "
 "  2 
 )!
(
Z 7
) =
 . 
 7$
 A
8 <  = =
 @0 / '). 

(1)
James V. Vergari and Virginia V. Shue, op. cit, p.p. 554-555.
(2)
Dennis S. Karjala, Copyright Protection of Computer Program Structure,
Brooklyn Law Review, Vol. 64, July 1998, footnote 1, p. 520.
(3)
Christina M. Reger, Let's Swap Copyright for Code: The Computer Software
Disclosure Dichotomy, Loyola of Los Angeles Entertainment Law Review, Vol.
24, Issue 2, 2004, p.p. 219-220.
(4)
Ibid., p. 220.
(5)
Microsoft Computer Dictionary, op. cit., p. 372.
 & 
# 
 A c  @0 / 
 $/ # .(" & .)   

3 &
 7
D = Assembler J
 A 4] c  2 &Compiler

#"4   
 &B 
 
/  7$ = 
 "
 "  
#"4 
.(Q)E.4 
 B 
 ) J
 7$ = 
 "
 " 

 &
 c  .   7
5042 A$/ c 
 H  2 0
 
 7$
 504j
c
 S " .  c
 #  &5043 :$ 2 A
8
&<  4 
 c%
   "( $
=
 A$/ <$7 c 
   # 
* c% A$/ 
 A
8 H"C 0  5042 "    ! :
)  =

2 =  2 E .
 2   "F0" 2 c
 =  2  &
.(T)"J"

Object "
 "     c 
   c 
 5042 J S "
) A$/ "
 "  64 "
 %$   =
 #  ; ?   "+ Code
J.   " )) € 5$
$+ * &(Y)% 8    =

.([)("." E.4   " ) &"" "

 €  $
 6 #  / . c
 2 )
 "
 
 #"4 >


9 >
9  c 
  S 
  
 ! &""
 " "  
.(\))
 .
 =j
"L
 "  / FN #  1 &$2  "/2 
 E*3

.QQa I &@ J &' 


,- '
.' ()

.@
 J
 (&)

(3)
Robert Plotkin, op. cit., p. 340.
(4)
Dennis S. Karjala, Copyright Protection of Computer Program Structure, op.
cit., footnote 1, p. 520.
(5)
Christina M. Reger, op. cit., p. 220.
 & 
@ @Zwßbã@Ûa@Õîqìm@Zòßb¨a@òÜyŠ½a
F   c
 #   &c 
 6  04 4] ? 04
 ')!  
')!   .c 
 7 0
F   #   &<
  4]  c 
 

&"    "+ c 


 /  . A    c
 3 & - 04

"  J     &$3 c
 >4 &4] c H2 J0  
:
)
@%
 A .(Q)$3 c
  F 18 c 
 7 / #. 2 &"

.".
 " 
" # 3 :
)
!" 


‫ﺍﻟﻔﺮﻉ ﺍﻟﺮﺍﺑﻊ‬

‫ﺇﻳﻀﺎﺡ ﻟﺒﻌﺾ ﻣﻔﺎﻫﻴﻢ ﺍﻟﱪﳎﻴﺎﺕ‬

""
  4 !2 

 &
 #!. E F-8 $  
.91 B    A$/ 
 $ 
 /6
 

:Program Interface <   5K+ :O>

interconnection  
 0
 interaction /.
 c 
  
 "4 
 J &" 
 
  !* J =
 " / 
  

; ?  !  562 ! c


   &(T)  # %  #$
:
) ?

" / &H
 #"4 
 :  
>4  #  
 )
 = 3   
.(Y)< 
 c 
 #"4  =
 A$/ / - 
 B43 c
 &=


.QQW I &@ J &' 


,- '
.' ()

(2)
Microsoft Corporation v. Commission of The European Communities,
Commission Decision of 24.03.2004, Case COMP/C-3/37.792 Microsoft, at 32.
(3)
Dannis S. Karjala, Copyright Protection of Computer Documents, Reverse
Engineering, and Professor Miller, University of Dayton Law Review, Vol. 19,
1994, p. 990.
 /" 
:A
8 c 
  #

:User Interface ↂn½a@òèuaë@HcI

#"4 
 <$  2 7     /
9 
] ( 4
 #"4 
   "
&!62 004 !  
 


 #"4 
  2 " >
9 ?
Z :$ 7

 "
 .$ 4
 ! 1   >
#"4  
 "
 $/ ! $


... 
 (.
 S .
 
  =$

 &/
 E.4 2 "6

F9+  S C" : (   c 


 4
 User Interface #"4 
  2 .(Q)m
8
70BE  5K+ 7  5K+ K  > 2  70'3 !  N$  % C  <   2
$
 2 0
 ! #"4 
  2 
 )!  S-  .(T)": !  5K+
 3 &c 
  
 A$/ E   &c 
 J  N  /.  

  4
 $3 2  .(Y)
 A$/  
  #" 
 0
 #% 

A$/  ; ?MS-Word $
 
 c  4
 
 &#"4 

@
 4
  3 &.$ 4
  3 #% + A
8 -N &+
  

.m
8 ... 0
 &<>4

&#% +  c 
  
 A$/    # .
 )!  4" 1 9  ٕ
"    + 
 #  c
 #  .6  
2 & 2 &  & 
 
 3 ?" 
 )!   + "   
   2  1 
&"


(1)
John C. Phillips, Sui Generis Intellectual Property Protection for Computer
Software, The George Washington Law Review, Vol.60, Issue 4, April 1992,
footnote 43, p. 1007.
(2)
Microsoft Computer Dictionary, op. cit., p.544.
(3)
Marci A. Hamilton and Ted Sabety, Computer Science Concepts in Copyright
Cases: The Path to A Coherent Law, Harvard Journal of Law & Technology,
Vol.10, No.2, Winter 1997, footnote 36, p. 247; John C. Phillips, op. cit.,
footnote 43, p. 1007.
 / 
=
 !).  "
 "      $  2 /  18 !  

H2 X" 2 
 ) c
 J0  &(Q) "4 
 "4  
 A$/ 

1 &(T)c 
 )! 
0 c   ‚   
<$7 5 2 c 
  ." 
    
   
  
   2 0 
.external interface 4
 
 # -2
9 #"4 


:Internal Interface 5%3'  5K+  (()

. 
 $
 2 $4"
 #
  / # c $
$4"
 
 
 /  J-  c
 #  .c 
     
 * 56
 !  
 /.
 @ A  c $
$4"
  $
< 5 2   0 $

A$/ / - 
 B43 c
 c 
 :
)  &  =
 " / c

H2 #   / A * 1 $4"
 
 M 

 .B42   =

&<-* @  A  =
   J /.  2 <
" 1 c 
 3 ?c 
/ :
)  .<-* @
=
 A$/ B43 c
 J /.  2 <
" | 1 -2
9
7
 c  E. ; ?=
 A$/ 7
 c  J <$/. 0
 c 

$4"
 
 # " /  / #  2 = 
  .
 $
  / 
( 
  .(Y)@   <  2 43 )
 A  0
 c $

(1)
Dennis S. Karjala, A Coherent Theory for The Copyright Protection of
Computer Software and Recent Judicial Interpretations, University of Cincinnati
Law Review, Vol. 66, October 1997, p. 96.
(2)
Pamela Samuelson and others, A Manifesto Concerning The Legal
Protection of Computer Programs, Columbia Law Review, Vol. 94, Issue 8,
December 1994, p. 2430.
(3)
See: Microsoft Corporation v. Commission of The European Communities,
Commission Decision of 24.03.2004, Case COMP/C-3/37.792 Microsoft.
Pamela Samuelson, Benson Revisited: The Case Against Patent Protection for
Algorithms and Other Computer Program-Related Inventions, Emory Law (=)
 /& 
#  J-  2 H -
  & .+3 <    / -  7
 #
 
9 > 2  A  .+3 :$ S . <    / c $
$4"
 

.@ # 

@ @ZáîÄänÛaë@ÉibnnÛaë@òîäjÛa@ZbĆîãbq
Structure, Sequence and Organization:

:Structure 5%  (>

c 
   2 Data structure  
   ! 52 "/ $/ @$0
. 4
9  
 2 Program structure

&=
 A$/  
 # 64
  0 ! =
 # $/   

  # "N $  #   
   @0 / . 5. "4   ;
)
 A
 ٕ   
 D  64  ; &#"4 1  
.  

.(Q)=$
 
 %


  =) /.
 c
 (Modules " 
) 0
 "
 % 8
J $/.  +>/ (6 4
) @"
 0%4     
 (Subroutines

 .Structure of the program c 
   <$/ @$0   E
 -
   
    =
 1 " 
 =  A$/  " "  c  H2 5.
.(T) 

(=) Journal, Vol.39, October 1990, p.p.1151-1152.


(1)
See: <ar.wikipedia.org/wiki/‫>بيانات_بنية‬, (Last visited 22/6/2014);
<http://en.wikipedia.org/wiki/Data_structure>, (Last visited 4/7/2014).
(2)
Whelan Associates, Inc. v. Jaslow Dental Laboratory, Inc., 797 F.2d 1222
(3d Cir. 1986) at 1230 ; Computer Associates Intern., Inc. v. Altai, Inc., 982
F.2d 693 (2d Cir. 1992) at 698.
 // 
2   "+ !"2 2 18 &
 ) "C   "   #*
 A$/
3 c 
 M J0
 .  =
 " 
 =  A$/ " /
9 4Z  5.
J0  
 @0
   ""/ : ! .
 +3 c 
  + 3 ! 


  0  &c 
   
 # >   $ 2 c

1+8
9 +2 2 2  
9 
9   H)
 )! &B43 0
 /  5.  $ 4
.(Q)<$/

"
9 3 6 4
 
2  0  $
" 9 3 #

#6 4
 &#  ." 
  " #  <
8  #
 )! &D2   (


 # 2 2  =
 ) -  
 #  3  
   A$/ " 
.(T)#6 4
 @0 /

:Sequence    ((

5N A
8 H"C event ;" 2 action 58 : !   2   J

 ""/ H2 -  2  J
 .9 "" = 
9 3  <



c 
 .J
   58 04  1 
=
 !).  
 5N
 58 04  8 #"/ J c 
 $  "   58  ).    
.(Y)4] 58 A
8  1 # 
'). +

:Organization 0%I  (D

 $

 $
 2 &Data organization  
 # -2
9 A
4
  
 /  #  
0 / / #
 &Data hierarchy

(1)
Ibid.
(2)
Marci A. Hamilton and Ted Sabety, op. cit., p. 254, p. 259.
(3)
See: <http://www.webopedia.com/TERM/S/sequence.html>, (Last visited
22/6/2014)
 /1 
 -  &
 
  $
#
 )4   
*
9 . "% 2 $
c 

.Files .$ &Records > &Data field  


2 >
9 "> m  ".  2 "  A$/ H   
 
<  / < -       0   /      

> /      $
 2 . .       J-  &'"> m
#    
&  QUU ""/ -    % "" I4
 $
  0 
:
) #  &$    "/+ A
8 .$
 c"  :
) " &< I4
 

@ @.(Q) 
 "/+ "8 # #"4 
:Macro ëŠ×b½a@ZbĆrÛbq

A
8 S$0
 )!  &$
  /    ". $  

"/ $
 ')! #"4  . 
 2 $
  ""/    2 $
.(T) $
 
9 "
 +

 /  @.   2
9 &91 <"4 
<.

  c
 # 
#"4 1    9  - 
  " /  A$/ 

(Y)
 8 &MS-Word I 
   c   &c
 E S  2
9 . : 

>
9 .c 
 )! A$/ +.  + 2  <"4 
< I4   #"4 
 #+
"/    I : ! &  I     c 
 )! #"4  I4  )8
  #
 c 
 <
S  

 ')! . & "
9 <      

(1)
See:<http://en.wikipedia.org/wiki/Data_hierarchy>, (Last visited 22/3/2015);
<http://www.techopedia.com/definition/30624/dataorganization>, (Last visited
22/3/2015).
.T`Q I &@ J &'
()  '  *+ (&)
.Qaa I &@ J & + .> ' (/)

 /4 
  6 A$/ 07-
 <+ ! & ". $  ! 4 #  ; &.
 :$

 .
 :$ d"8  =* < 2 c 
 #.   &<.  ' 4 S .
 

"/8 A
8 
  " " " I
 )! d"M c 
 #  &'"" H)
 J- 

.    <  

:Documentations wßbã@Ûbi@ò•b¨a@pa†än½aë@ÕöbqìÛa@ZbĆÈia‰

:c 
 4
 " 
 @%
  / : !

#  <%  " c


 !" 
 .
 " 
 @%
 : T 
)!     
  .
  $$
c $
>
9 9. - &c 

 5  ' 0 2 <$" 2 c 
   $  " 
 ')! ". .c 

. @%
 :$ .(Q):
) #  4] c H2 2 < H)
 c
 ) = 
# $/ @$0  2
9 ."2 $/ J$0 1 "
 "  J 9 <"
c

."-
 
"

" / c 
 J @ 
 &c 
 $
 " 
 @%
 :  T 
.0 -( c 
 #"4  . / '4 ; ?#"4 
 4 ! &< 
J =
  A$/ % 2 @
 A$/ / 0 8 :   B"8   (
.User Manual (T)"  1 = " #  2
9 $/ @$0 &c 


:Firmware HoibrÛaI@áöa†Ûa@wßbã@Ûa@ZbĆßb/

&Hardware " 
 62 - "   Software c  H2 ! #%"
 c 

< $2 #!2  &(Y) 63 ')!  ROM 0 5
 ) A$/ =
7
  J- 

(1)
Arnold Burdett and others, op. cit., p.p. 226-227.
(2)
Ibid., p. 86.
(3)
See: <ar.wikipedia.org/wiki/c _>, (Last visited 1/4/2015).

 /G 
" /  )   A$/ &=
 c
  ROM ) A$/ J-  H)
 c 

.=
   / ;"


 
&!" =
 62  ". 1 ROM 0 5
 ) #"4  

#%"
 c 
 A
8 d  
 &  
N 63  ""
   "( -2
9 #"4 
".
 =
2 62 &+
 
 &

   
 :  $7
Firmware
c
 63 ')! .  A  :
) & 63  !* &
 E &
6 
 #
) .6
 @>*8 " A 1 ; &$7  4
 $/ / - 
 %"

.(Q) 63 :$ Hardware " /  "  c
 :$  

)! d  #  ?4Z 6  $ 4 (< . ) 6 H2  E7


  

63 " / > 4 A
8 :
) B"2 " &B43 63 / $ 4 #%" c 
6

.6
 )!   $0
 . $

9 4Z 6  Hardware   
N
&ROM 0 5
 ) A$/ J-  Firmware #%"
 c 
 2 Zò•ý¨a
 ""
 " / - "   ٕ &0 =
 62 " / - " 1 )
 ')!
.$7
#%" c  A
8 d  
   
N 63

(1)
See:<en.wikipedia.org/wiki/Firmware>, (Last visited 25/3/2015); Pamela
Samuelson, The Uneasy Case for Software Copyrights Revisited, The George
Washington Law Review, Vol. 79 No. 6, September 2011, p. 1776.
 / 
‫ﺍﻟﻔﺮﻉ ﺍﳋﺎﻣﺲ‬

‫ﺍﻟﻌﻼﻗﺔ ﺑﲔ ﺍﳊﺎﺳﺐ ﻭﺍﻟﱪﻧﺎﻣﺞ‬

cLL L L L  LL L L L &Hardware "LL L L L / 2 =LL L L L LL L L L  LL L L L  =LL L L L


 #LL L L L 8
LL L L L LL L L L% LL L L L* LL L L L/  7LL L L L 2 <LL L L L  "LL L L L =LL L L L "LL L L L / &(Q)Software
"LL L L L / ALL L L L $/ )LL L L L .  LL L L L   ""LL L L L  LL L L L . H"CLL L L L  cLL L L L 
 2 LL L L L  LL L L L  &cL L L LL

General "#LL / ELL * ) LL " LL  ( LL 
 ALL
8 LL  )LL 
?(T)=LL 

L L L LL L  3 &Universal machines "$LL L  1]" 2 purpose computers
L L + :
)LLL
?(Y)cL L 
 @LLL0 LLL/ ""LL L LLL. LL L2 H"CLLL 2 LL L  5LL L-
 LL L $

| L L L  & "LL LL% >LL LL "LL LL"
 LL L L LL L L0+ =LL LL
 LL LL L L L  cLL LL 
 =LL LL* 8 :@LL LL
LL L L L
] LL L L L % LL L L L
 #$LL L L L.
 &LL L L L N LL L L L =LL L L L$
 f L L L LL
 =LL L L L
 LL L L L cLL L L L 

.([)E


LL L L  =LL L L


 ?cL L L 
 LL LL =LL L L
 LL L L LL L L+. $
LL LL4 LL L L!2 :LL L L !
#LL L 2 L L L &LL L  
  LL L + LL L  LL L "$
 "LL L / 
 <LL L  =LL L 
 #LL L  LL L  H"LL L 
LL L   &=LL L 
 #LL L  LL L  H LL L  LL L  &cL L L
 LL L 2 &LL L !* >LL L N +L LL

LL L/ LL L
9 LL L$ 4  (LL L =LL L  LL L
 #%L L 
 3 L
9 L L ?LL L
9 LL L.$ 4 LL L%  "LL L/ +
.(\)H"  < ) =$
< 
 "$
 #%


(1)
James V. Vergari and Virginia V. Shue, op. cit., p. 604.
(2)
Robert Plotkin, op. cit., p. 338.
(3)
Ibid.
.`I &@ J &  
N =
 c
 
 
 &, '
0!
'
.'@ @ (1)


 " &
Z =
 c
% 
 
  &  '
'
: .
  "6
(4)

 
 
  0 &,%6   > ,-  ? !"  \\I &TUUQ &" N & $
""

.` ^ \ I &TUU` &" N &
 .
 " &0 
  $

 / 
c :  &"
9   c
   
 %
 2 E*3 / 2
=
3 & 
 " &" 
  
 &
 c &I 
 

.m
8 ...   N 1 1 c &  
N

‫ﺍﻟﻔﺮﻉ ﺍﻟﺴﺎﺩﺱ‬

‫ﺍﻟﺘﻤﻴﻴﺰ ﺑﲔ ﺍﻟﱪﻧﺎﻣﺞ ﻭﻗﺎﻋﺪﺓ ﺍﻟﺒﻴﺎﻧﺎﺕ‬

LL L  LL L/ » LL L ( Database LL L 


 "LL L/+ LL L
 LL L 7$
 JLL L L L L/
.(Q)«.$ 4
  /  0 
 0 
 ""  A$/ .$  $

LL L L.
 LL L L$
 @ LL L L LL L L LL L L
 $LL L L 
 =LL L L  
 LL L L+.  LL L L$/ LL L L
LL L 
 LL L 
 JLL L  " :
LL L
 LL L 
 ALL L $/ (T/QU) "LL L 
 LL L  (TRIPS XL L L )
)8 &LL L4] LL L H2 2 LL L
]
9 5 LL L  LL L LL L LL L  5 L LL &BLL L43 " L L L
 2 LL L

.   =  2 5   9 9$4   

@ LL L L  L L L L4 1 &LL L L  ) "LL L L  LL L L  " L L L L


 2 LL L L 
 LL L L  1 LL L L 
 ')LL L L !
." ) " 
 2  
 ') $ 
 
C


LL L L L /  LL L L L   LL L L L  LL L L L 


 "LL L L L /+ 2 LL L L L
SLL L L L -  LL L L L 
 )LL L L L ! LL L L L 
"LL L L L L LL L L L L 
 ')LL L L L L! LL L L L L 1 LL L L L L
 2 &LL L L L L #LL L L L L LL L L L L
 LL L L L L 
 LL L L L L
LL L L L L  2 &LL L L L L 
 JLL L L L L  LL L L L L  )LL L L L L 
 " LL L L L L 
 LL L L L L  S LL L L L L  LL L L L L   ٕ &LL L L L L  )
JLL L L 
 LL L L  LL L L 8 LL L L  1 LL L L  "LL L L  JLL L L   H2 &LL L L 9 LL L L 9$4 LL L L  LL L L  &LL L L  
. 
 ')
= 
  2

.aU I &@ J &


 # ()

 / 
&LL L L L L$0
 >LL L L L L & "L 9 L L L L L 6LL L L L L4
 :LL L L L L 
 "LL L L L L/ + LL L L L L LL L L L L/ "LL L L L L 
 LL L L L 
 D LL L L L
 .(Q)=LL L L L 
 0LL L L L   LL L L LL
]
9 6LL L L L 4
 & LL L L L 
 L L L L L
" &. LL L L L 

.""
 )!    H)
 !

LL L L L L L  
N LL L L L L L 
 "LL L L L L L/ + 5LL L L L L L N LL L L L L L4 =LL L L L L L cL L L L L L  "LL L L L L L
LL L L L  8 LL L L L 
 "LL L L L /
cL L L L L
 ')LL L L L !  LL L L L &=LL L L L 
 L L L L L) ALL L L L $/ LL L L L  64
;"LL L L L L L L L
 )LL L L L L L L L
 LL L L L L L L L-k
LL L L L L L L L$+  LL L L L L L L L ;LL L L L L L L L ?LL L L L L L L L LL L L L L L L L-/
LL L L L L 
 "LL L L L L/+ c
LL L L L L H)LL L L L L
 LL L L L L! cLL L L L L 
 2 "LL L L L L LL L L L L ! LL L L L L .D LL L L L L1
LL L L L  L L L L  > LL L L L LL L L L :LL L L L 1 &L L L L $/.  LL L L L LL L L L LL L L L!
=LL L L L
 ALL L L L$/
.(T)4Z 0 / < 0 6 &4Z /

$7LL L L LL LL L L LL 


 "LL L L LL/+ 5LL L L L  8 LL L L LL  " cLL L L LL $
LL L L L  MLL L L LL #LL L L L  LL L L L 
LL L L L L * )LL L L L L  &cLL L L L L  LL L L L L  ) LL L L L L ! LL L L L L   &<LL L L L L  0$ LL L L L L 4 LL L L L L $ 1 :LL L L L L
) 2 18
&LL L L L   LL L L L
 LL L L L  ) LL L L L 
 LL L L L ! LL L L L 
 "LL L L L /+ 6LL L L L  LL L L L  #!(LL L L L  .SLL L L L 
ELL L L L L L L dLL L L L L L 8 LL L L L L L  =LL L L L L LL
 #"4 LL L L L L L L 8 – @LL L L L L L  – ELL L L L L L
 LL L L L L LL+ LL L L L L L 
LL L L L L L 
" LL L L L L L LL L L L L L 2  ٕ &. LL L L L L L
 ')LL L L L L L! LL L L L L L0 LL L L L L L LL L L L L L7 1 . LL L L L L L


 $
% " &c
  + $ 
Z =
 c
 
 
 &5 *! '
'  ()

.[Y I &TUU\ &Q0 &"3 ^/ &J6



/"
   ; &
 B"8  .$ 
"  #+2 m  $ 
 B /"
 B"8 A
.   
"
 )! 
  / "+ & "4 0  ( "2 9  .$
 
" .  "L L L L L L L L +
4
 
C
 @ 
9   " $/ A/"
 < + H)
 m
 ( -+ #  $3 
(

./"

See: Hutchinson Telephone Co. v. Fronteer Directory Co. of Minnesota, Inc.,
770 F.2d 128 (8th Cir. 1985), as cited in: James V. Vergari and Virginia V.
Shue, op. cit, p.p. 565-566.
.!"  W`I &@ J & = '  2!
'
.' (&)

 1" 
.(Q)% 8  =
 #"4 

‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻧﻲ‬

‫ﺍﻟﺘﻌﺮﻳﻒ ﺍﻟﻘﺎﻧﻮﻧﻲ ﻟﻠﱪﳎﻴﺎﺕ‬

D) 
    
 
 +  =$0
 )!    
.(;
 D) L 
 L  (L  2 # &( DL ) L 
L .
 L 
 &( 2

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‬

(T)
‫ﻣﻮﻗﻒ ﺍﻟﺘﺸﺮﻳﻌﺎﺕ ﺍﳌﻘﺎﺭﻧﺔ ﻣﻦ ﺗﻌﺮﻳﻒ ﺍﻟﱪﳎﻴﺎﺕ‬

:!  A
8 
  (  
 
  

@ @Zpbî©@Ûa@ÒŠÈm@V@SÛa@òã‰bÔ½a@pbÈ튒nÛa@ZÞëþa@êb£üa

A
8 
 ""  .  c $
""    3 
 E $4
.c 
 4
 -
 #
 " 

 .
 .
 $
  +  L112-2 "
  QY #+ .
  "
. 
    &4 . &$ » 2 A$/ QWWT #/ 
 Q  "


&@LL L JLL L &LL L  


N =LL L
 cL L 
LL L 
 LL L
 &LLLLL, 'LLLLL
0LLLLL!
'LLLLL
.' ()

.Tb^T` I
LL L  "LL L /+ >LL L 4 LL L  DLL L .
 )LL L ! LL L   )LL L 
 LL L 
   L L L
 I LL L  ALL L
8 D LL L 
 #LL L (&)

LL L L.
 LL L L$$
LL L L

 LL L L 
 JLL L L+  @LL L L0 LL L L/ LL L L 
 #
LL L L
 "LL L L
LL L L.
 LL L L$
   L L L +
:

 0
 A$/ &WIPO
http://www.wipo.int/wipolex/en/
 1 
: 
 )! @0   !)

.(Q)«-
 #
 "  :
)   :c
 ^QY

 
3  
 @ 
 
C
 @  +  (2)`W "
 " c
 X. A$/
:A$/ I QW`\ #/   W  "


    2  c


     =
 c M & 
 )! E*3»
.(T)« "  :
)

( TUUW #/ 2 TY  "


 TUUW/T[ #+  3 <
 2 >
E*3» :Q  (Q) "
  #
 ) - "+ =
 c
 
 

4
 -
 #
 "     "=
 c" S$0 M &<
 )!
.(Y)«

!* #% 
 @"
 0%4  
 c $
-
 #
 "  " 

&+
 :
) A  &  #
53 :$ &c $
<   5 2 c
 <- 
&c 
 5 N X2 0 !   ٕ & ""  ).  =
  $   A
8
@  @     ٕ A  c 
  596 ! / S
 *  



(1)
Article L112-2
"The following, in particular, shall be considered works of the mind within the
meaning of this Code:
……………
13°. software, including the preparatory design material;"
(2)
Article 69(a) Object of Protection
"(1) For the purposes of this Law, computer programs shall mean programs in any
form, including their design material."
(3)
Article 1 Object of protection
"1. …………….
For the purposes of this Directive, the term ‘computer programs’ shall include
their preparatory design material. "
 1& 
! -
 #
 "  .(Q)"3  .
 . $

 #j
9 
C

.
 4
 #!.
 E  )
 .
 .
 " 
  )

#"/   3 <


    "+  
2    >
9 2 ""
 )!  >

.-
 #
 "  A
8 c 
  ""   &c $
 "8
! c 
   –  
2   <%  –  3 <
 #+ #"/  =

&
   > 
  0
 A
8 
 "
9   

 2  /
(T)
9 
 S #  ? 6
  6   " 9 / 
 )! S "
A$/ "+

 - 4" 2  4
 ! 4Z =
 .(Y)

  0
 = 
)! d4 53 :$   & 2  =
 c @0 -   #  52
 3 0 
  

 ')! . &([)3 " 
 1
  @0

:
) & " 
 1
   3 0 
 <$/   9+0 J 2  A$/  2
.(Y " X
 +. ) 
"
 +. >
90

(1)
International IP Protection of Software – WIPO, p.p. 3 – 4. available at:
<www.wipo.int/edocs/mdocs/copyright/en/wipo
_ip_cm_07/wipo_ip_cm_07_www_82573.doc>, (Last visited 31/3/2015).
(2)
Pamela Samuelson, Symposium on U.S.-E.C. Legal Relations: Comparing
U.S. and EC Copyright Protection for Computer Programs: Are They More
Different Than They Seem?, University of Pittsburgh The Journal of Law and
Commerce, Vol,13, Issue 2, January 1994, p. 282.
&
 -
 " &(  ") 
Z =
 c " / &$% + ,!  '  2!
.' (/)
.W I &QWWa & !

(4)
Pamela Samuelson, Symposium on U.S.-E.C. Legal Relations:
Comparing U.S. and EC Copyright Protection for Computer Programs, Op. Cit.,
p. 282.
 1/ 
@ @Zpbî©@Ûa@ÒŠÈm@SÛa@òã‰bÔ½a@pbÈ튒nÛa@ZïãbrÛa@êb£üa
(Q)
c   A$/ <  (QUQ) #
  3 
C
 @  + I
 * 2    #"4  
  3 2 $
  / » < ( =

.«   @
=
 
"A ‘computer program’ is a set of statements or instructions to be used
directly or indirectly in a computer in order to bring about a certain
result."
  
 
 
  ' / 
 )
"
 #  "+

 
 
    0 c
   ; ?<- + "%
  <
8 $ H)
 
 A$/ "  #
&+
 )!     
 3 2  #*
 A$/  3 $
  6 < 3 
 )! "   .(T)1
1 ; @-
  < 2 X2 A$/ 
   "  .(Y)$
 D 2 B"8 !
.([)(< $
 &c 
  ) " 
 @%
 

‫ وتم تعديلـه بالقانون رقم‬،١٩٧٦ ‫ أكتوبر عام‬١٩ ‫ والصادر في‬١٧ ‫)( قانون حق المؤلف األمريكي رقم‬
١٠١ ‫ والذي بموجبه تم وضع تعريف للبرنامج في القسم‬١٩٨٠ ‫ ديسمبر عام‬١٢ ‫ والصادر في‬٩٦-٥١٧
.‫على النحو الموضح في المتن‬
U.S. Copyright Law, 17. U.S.C. §§ 101 et seq.
‫منشور في قاعدة بيانات قوانين الملكية الفكرية لدول العالم على موقع المنظمة العالمية للملكية الفكرية‬
.٢٠١٤/٧/١١ :‫ آخر زيارة‬،< http://www.wipo.int/wipolex/en/> :‫ على العنوان التالي‬،WIPO
:  &D - 
 )!  .
  "6
(&)
Michael A. Dryja, Looking to The Changing Nature of Software for Clues to Its
Protection, University of Baltimore Intellectual Property Law Journal, Spring,
1995, p.p. 111 et seqq.
$ –  
 $ &
Z =
 c 
3  
 #
 &'$! '
'$! .' (/)
.Q\ I &TUUT  2 
 ""
 ."/  @ 
 $ !"   +
(4)
William F. Patry, Copyright and Computer Programs: It's All in The
Definition, Cardozo Arts & Entertainment law journal, Vol.14, Jan. 1, 1996, p.32.
 11 
&c 
  596   1 /  <% c 
 "  2 B    ٕ
.
    2
E   :
) F-M #  
(Q)
$ /  » :< ( c 
  
 D
 / " B42  
.«   A$/ 
 #  &  $
=$
A0 
"program means an expression of combined instructions given to a
computer so as to make it function and obtain a certain result."
c 
 J- ) #
; ?A 
  
 6 7$
 .
  !
.(T)c 
 $/     H2 "" #
&H" 0 A$/
(Y)
  
   =
 c » :< ( c 
  
  
 /


B42 
] 2 =
 

 &$
  
 J
/ - 
5 2  8 #  
 -
 " 
 :
)   &   c
  

.«< ) c 
 @0 / "

 
 
 E 
 &c 
  0
"Computer program - means the representation in an objective form of
the whole body of data and instructions designed to make a computer
or other data processing machine operate to produce a specific result,
including the preparatory literature produced while the computer
program is being developed and the audiovisual displays generated by
the program itself."

(Q)
`  "
  
 
C
 @  +  .
 4
 (T) "
  
 )! "
.)
 
 
   J+  A$/   
 &TUQU/QT/Y  " 4Z 90 QWbU #/ 
.aYI &@ J & = '  2!
'
.' (&)
=
 c
 
 
 (  
 " 1  +  (Q) "
  
 )! " (/)


   J+     
 &QWWT #/   TY  "
 Y\TY^Q #+  
 "/ +
.)
 


 14 
  ٕ '" =
 6 A$/  
9 c 
  #
< 2 
 )
=
  0
 ')
"    & 
 

B42 
] 2 A$/ J-  2 
!""/8 #  
 &-
 " 
  < 2 <$/ )4C B42   . 2
E
 
  3 <
  5 $ c 
  596 c 
  0   5 2
.9.$  - 2   A$/  
3  .


c%
 "( 
 
 E 
 A$/ < 
 )! A$/ )4C 
A$/   1 
 1 c
 c  2 " 1 < &c 
 / "


 c  c 
 2 
  ')  . #  &
 
 E 

.=  
(Q)
/  /  ! c 
» < ( c 
 / " $6 
  
 / 2
&D H2  " /" A$/ / -  . 2 0 7$ $
   
2 & "2 2 & 62  2 & 
 

  2 1]   -
 
.« ""
 E*3 0
   & 2 +   A
8 " 
9 &0 "
"Software program is the expression of an organized set of
instructions in natural or code language, contained in a physical
support of any kind, necessarily employed in automatic machines for
the manipulation of data, devices, tools, or peripheral equipment,
based on digital or analog technique, so they will operate in the way
and with the purposes determined."
  ٕ 0 =
 62 A$/ c
 #"4   #
< ( 
 )! 6 
.B42 
] 2 6 H2 A$/ /

 
 "
 $6 
 $
.
 $
   +  (Q) "
  I
 )! 5 ()

.)
 
 
   J+     
 &QWWa #/  QW  W`UW #+

 1G 
I   "
 "
 H"  A$/ 
 ~2 < 2 
 )
= 
.(Q) . 2 0 7$   2 H  $
 2 A$/

+
   
 A$/  
 
  "4 
  
 + < 2 <$/ )4C
.  
  ""    " &0 


.$
! -/ 
 .
 -2 ! 
 )! 2 B

"
 .
 $
 @    + -  #$ H
  $

 2
 c 
  " 
&=
 c 
 H2 TUUT  
aT #+  

"
 
C
 @ 4
  
  ;

 = $
).
 %>
  F/Q "

/  :
Z =
 c » : 5 )8 ?TUU\  
[Wb #+ 56
 X% 
  H2 )4 
 & 8 2 6 2 7
(  / 
 $
  3
2 . 5"3 
] =   * 2  @0 "4   & 3
4]  H2  2 $3 $  $
  3 ')!   5  & @
.«
Z =
 >4  < 

& 3 $
  – 3 D
 – 6 '" 
 )!  (

.$
 D 2  D !  3 2  #*
 A$/

" 2   "
 "  "
 "   c 
     < 2  $
=
 &"4]  H2  2 $3 $  $
  3 ')!   5 " /
.> 
9  "+ c 
      3   
  ! <   6 

  A$/ =
 A$/ c 
 #"4  + < 2 
 )! A$/ )4C
. 2  <
E 

.aQI &@ J & = '  2!


'
.' ()

 1 
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻧﻲ‬
‫ﺍﻟﺘﻌﺮﻳﻒ ﺍﻟﻔﻘﻬﻲ ﻟﻠﱪﳎﻴﺎﺕ‬

&J  &@-  :+ A


8 $
.
 
 # 
:$  
 

Zpbî©@ÜÛ@ÕîšÛa@ÑíŠÈnÛa@Z@üëc
 N   
 $
 / »  ( =
 c 5.
 E /
.(Q)«   ).  
S 
 
Z A
8

2 #LL L* &0LL L LL L


Z ALL L
8 LL L$
 <LL L LL L+ <LL L 2 LL L
 )LL L! ALL L$/ )LL L4C
2 LL L L
] ALL L L
8 LL L L  LL L L$
 2 )LL L L 2 <LL L L ALL L L
3 LL L L 6L
9 L L L LL L L  =LL L L

 LLL 2 0 LLL <LLL 2 LL L-2
9 <LLL$/ )LLL4C LL L .1Z @LLL0 LLL !LLL 1 ALLL  6LL 
LL 2 &LL - LL  6 LL  =LL   LL  LL 3 )LL ! &LL  N LL  LL   LL $
 :LL $
cL L  ALL L
8 cL L  LL L <LL L LL L$ "LL L 2 LL L
 LL L LL L
  LL L0 JLL L Z
./ 01 5)
  2 @ B42

L $ " S 


 $
  / » : ( c
 5.
 E /
 2 L L L 2 L L. 6L L  8 2 5"2 2 L  L  5+ L
Z JL 0  L /" A$/
.(T)« $
 
 
] 0   

  ٕ '" =
 A$/ $
c 
 <  #
< 2 
 )
=
#!( =
 ) .*2 :
) #* < 
& $
 


] 2 A$/ *
 #/

(Q)
: #
8  &
 )  " )
  .
 5.
  
.Q`I &@ J &  
N =
 c
 
 
 &, '
0!
'
.'
(T)
&
 "   &<  % 
C
 @

 d)
 – 
C
 @ &2$# U .'
.T[U I &TUUU &Y0 &"3 ^/

 1 
. $
 

6

@ @@@@@@@@@@@@@@@@@@@Zpbî©@ÜÛ@ÉXaìÛa@ÑíŠÈnÛa@ZbĆîãbq
(T) (Q)
#-  ?$
J    A
8 <.
   =  =!)
A
8   &   H2   
 
  04
  / » :< ( c 

 . H( =
 #+   
 $$
$ 5  &
Z =
 6
A
8   2 &$
 ')! A
8    
9  2 #2 &  c% @ 7 <.%
.«< "/ 7 #"4 


  
 $
  / » :< ( c 
 (Y)4Z E
 /  
@%
 &c $
$.
 
 A$/   &  7
( &6
 A
8 #"4 


4" ٕ &H" 0 A$/ - " S ; ?<"4  < A$/ "/ 

.«  " 
 "
 @ 2 &   A$/ 
 =
 6 A
8

:562 >     =


 c  2 .
 ' 1 )!  ". 

.=$
 
 $
 /  ! &@-
 '  c 
 ^Q

Qa I &@ J &  


N =
 c
 
 
 &, '
0!
'
.' ()

&$% + ,!  '  2!


.' &!"  \W I &@ J &2
  '  '
' 3 .' ? !" 
> & 3  '
$+ 9 ? [[ I &@ J &  '
'
? QT I &@ J
!"  TQ I &TUUT &
 – "/  &  
 &
Z =
 c
 
 0

.
 $
  2V 5 -  
Z =
 c
 
 
 & K ,- ' 3 .' ?
.' ?QW^Qa I &TUU\ & " N & ""
 
 " &(  ") TUUT  
aT H

 " & !
 @  &' " 
 &
Z =
 c #8 "/ &5 *! '' 2!
 '  '

.T[^TY I &@ J &'$! '
'$! .' ?Qb I &m
.T[^TY I &@ J &'$! '
'$! .' (&)

.Qb I &@ J &5 *! '' 2!


 '  '
.' (/)

 1 
.c 
  "  ^T
.(Q)c 
 $
 " 
 ^Y

#
4"8 ! (J
 
) H

2 )!  2 J < $ 4  #!2 2 J+

 -/ " / <-   ! &c 
  - /  c 
 4
 " 

.
  D -    2

‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻟﺚ‬

‫ﺭﺃﻳﻨﺎ ﰲ ﺍﻟﺘﻌﺮﻳﻒ ﺍﻟﻘﺎﻧﻮﻧﻲ ﻟﻠﱪﳎﻴﺎﺕ‬

  


 568 .+    
 
  @   2

| @}-|  5.


 5]   :
) . 12 ] B42  /

J} 
.


:$  > 

$
 ! c 
 !  2 A$/ @. 9.$  )
 .
 J 2 ^Q
.   A$/ 
 E7 =$
 


$
 <
8 < H)
 6
 2 A$/ / . @. .
 2 ^T
.Computer =
 6 ! c 
 4


 / B" A$/ 5.


  &    
 
  9>4 : ! 2 ^Y
)!  596 (c 
 $
 &.
) /  c 
 4
 " 
 @%

.$ 1 2 c $
 
 
 $ ; &c 


:>
 ')! A$/ @$
 #  $ 

.Y` I < @   


  )
 @%
 " 
 /  " 
 F-8    ()

 4" 
Computer program , Software $0 2  ) 2 @L ^Q
&
   "
 "4  A$/ 
 d" (=
 c & 
)
2 #/2 Software S$0 M   
N 63   < 2 9.$  - 2 
S$0 #"4  A$/ B "+ 
 2 &(Q)Computer program S$0 
Hardware " / A
8  
 5  c
 D 2  D H2 A$/ 
1"$
Software

 Firmware %"
 c
 &4]   
8 6 H2 " / A
8  
 2 =

 A$/ =
 *   
N 63  ""
 4
 ROM ) A$/ J-
.(T)#%"
 c 
  
 " / 9.$  - 2 

Silicon Chip  $


 ++ &Electronic Circuits   
N % "

 4" -2
9  M &=
 " / =  4" 
 &$  % "  <  
$7
() A
8 d  
 B43   
N 63  ""
 =
.
9 =
 " / J c
 . $ ( . )    $0
 7
 @


 @0  Software 
 D 2 J 4"8 = < M # 
.Computer programs =
 c / ;"
 0 .  12 
 

&.$ 4
   
N 63 A$/ J- 
 c
 +   ( :
)
 
 !3
 
 
 ~ – 3 #
  – B43 "
  #
  
  
 D 2 J A$/ Computer Programs =
 c 4

.  
N 63  ""
 A$/ J- 
 Firmware %"
 c


H)LL L L
 @+"LL L L
 " 
LL L L  LL L L$ 
 LL L L -
 LL L L  LL L L  ALL L L $/ LL L L $
 LL L L $3 LL L L
ILL L L L L4
 cLL L L L L 
 :
)LL L L L L &Microprocessor @+"LL L L L L
 c
LL L L L L
 ALL L L L L$/ JLL L L L L- 

.TU – QW I &9.$ ' )    ()

.Yb ^ Y` I 9.$ ' )    (&)

 4 
LL L L L 0 
 cL L L L L
 &(LL L L L  HLL L L L 2) LL L L L 
6  #LL L L L  "LL L L L  =LL L L L 
2 6LL L L L  7LL L L L 

3 LL L 
 LL L  LL L 91 B LL L  LL L  LL L  ALL L $/ BLL L 42 LL L  1] LL L  LL L / 4
."
 ')!   


$/ > 
9 $
 
 
  ( 2 -3  < 2 B :5-*3 
Computer =
 c ! / 2 B"8 A$/ 0   12 / 2 
.Programs

! "
  /  "" $    "=
" $
 - = / 2
$
   +   9  "Computer Programs =
 c"  D 

 ! 
 
  4 
 "
 "/  &#

  .

. )   A$/ $6 
  
  $
. " / Software

" 
) /  c
 4
 @%
 " 
 d"8 I 4 2 ^T
5.
 J $ 4  M &
  - (c 
 $
 " 
 &.

:

 =j
:
)  "  )


 - 4" 2 d  1 c 


 4
 " 
 @%
 2  >
) $   
C
 @     3 ? 
 
 
8 "  A  c 

.(Q)$
J
 
  "   E

  $ ' / c 


 !  / d4 " 
 @%
 ')! 2  (
.  
N 63 Hardware " 

@ 1 #"4 $


c 
 F
4
 c 
 L L$
 " L L
 2  D
"4  
 c
  ""
 : ! 2  &- J 
c
  J

.T`I &@ J &  


N =
 c
 
 
 &, '
0!
'
.' ()

 4& 
4
 # ".
 =
2 c  & 4
 " 
 5+  "  
9 I43
 "  . @ "
9  c
 :$  #  ./ ( 

   
 .03
.
  @0  d4 2 = #  . 4 "  2 "2 2  2

 @  ; &<.


c
 !"  8 c $
.
 " 
 2  '
# 1 " 
  D
 )! &c 
   
 
 4
  .
  $

d4 #  ?
8 5 $
  "  <"
"
9  c 
 &5  c 
 #"4 
.=$
  $ '!     H)
 c 
  / -2
9

 F  &(Q)$
@-
 
  2 J @. &#"  A$/ 5 
9
:



5 A > 9K+  > 7(!


 5K+  : %$  2 5 + $ :%+  »
.«2%$ XY %E
S C 7:%  5+ $ 5--3 J3>

 > 
  0 $

9 
 
D
 B"  12 -.    ٕ
..
 "
 @0  
(
 ')!  2 & 
 )!


 A$/ 2 H2 1 !2 2 <
X
> 4 
 D 2 A
8 '
&(T)
 ')! 0    
0  
 
 @  
 &
 

"  &"
 " ) $  9 2 &( 8 &6 &7
)  / 
 $   29
 #"4  
 
Z 2 6
  29 &(> 
9  4]  H2 2 &"

.(</  29 4]   
8 6 &
] &=) c 


.WU^aW I &@ J & = '  2!


'
.' ()

^ c
 – 
Z =
)  $
 " 
 
 0
 &2  '%!  '
'%!  .' (&)
'
(%Y N 
 .' &!"  `[ I &QWWT &" N &
 
 C &("4

aT #+ ""
 .
 $
   +  ") 
Z =
 c 
C
"3 @
 & E
.QT I &TUU[ & !
 &
 -
 " &(TUUT  

 4/ 
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ‬

‫ﻣﺪﻯ ﺍﻋﺘﺒﺎﺭ ﺍﻟﱪﳎﻴﺎﺕ ﻣﻦ ﺍﻷﺷﻴﺎء ﺍﳌﺎﺩﻳﺔ‬


‫ﻭﻣﺪﻯ ﻗﺎﺑﻠﻴﺘﻬﺎ ﻟﻼﺳﺘﻬﻼﻙ‬
‫·‪@ @Z†îYè‬‬
‫" ‪& 
  .
  
  
  
 $0
  
 2‬‬
‫" "  
 ‪ #*
 A$ .$
 
 0
 "" "
  2 0‬‬
‫   
 ‪B  A$/ 
C
 @   + =  
 B 
 A$/‬‬
‫‪2   : ! 8 ; ?X
 +.    1 &-2‬‬
‫

‪9 
"
 +. 1  &#‬‬
‫‪ .
 "3 . 
 +  
  / A$/ 
"  D8 <$/ @$0‬‬
‫ ‪@ "/ 
&2  4 &#
 @0 2 18 )!  #* .>.‬‬
‫‪9‬‬ ‫‪B   A$/‬‬
‫"‪<.
  %‬‬
‫‪9‬‬ ‫
‪"
 6  1 & 
  ""
 <  6  1 
 A$/ 
C‬‬
‫ 
‪.$
 
 0‬‬

‫‪19 2 -    
( 2 D - 
2  5
 
 0
 "" 8‬‬
‫ ! !) 
‪/ ;
 #  :
) " # &<
6
 <%4 D - 
 2 5‬‬
‫
‪)! "/ + @0 &D - 
 2 5
 )! I%4 !
#%>
  
 #‬‬
‫
‪ ! 3 :
  "2 : ! <%4 5
 ! A$/ 
 " .<$/ #‬‬
‫>‪ $ " > &D - 
 2 5
 )
"$
 L  
  3 "L 2 "L / + 5‬‬
‫)
‪A
8 d  #  ?<
"$
  
  3  H2 5> #"/ !  
 &:‬‬
‫ "; ‪0" <
5
 )! 8 :  

 ')!  &<%>
""  + #‬‬
‫‪-2‬‬
‫‪9 d  6  < 0 2 H2 &Sui generis "4 0 " 2 "4  +‬‬
‫‪. 6  2 4  + "/ + A
8‬‬

‫ ‪ 41‬‬
 $+ B" "
 53  
  / B" 19 2 ; 2 B :
)

 4
 .
 A
8 %   
  0 "" / 2 &%4 @ :> >

5 &
C
 @ :  "/ + 5> B" :
) L+ E  ; &L"
 ')! 
.
 A$/ @0 >
 / S.
 *  $
 &D 41

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‬
(Q)
‫ﻣﻮﺿﻊ ﺍﻟﱪﻧﺎﻣﺞ ﻣﻦ ﺗﻘﺴﻴﻢ ﺍﻷﺷﻴﺎء ﺇﱃ ﻣﺎﺩﻳﺔ ﻭﻏﲑ ﻣﺎﺩﻳﺔ‬


  2 H2 &"   2  3 &" * " A
8 53 #
 #"
 ;" A  "
 53 B    
  #
.X  H" 6
53 E + @ . "+ &  + ) " * 52    N .

.(T)"


5LL ALL$/ "LL LL


 @ LL
" 2 ALL$/  "LL
  LL
 LL (a`) "LL
 LL "LL+
LL2 &X
LL 1 .
LL :"LL H"LL
 LL* 5LL
 ."LL4   L + LL H"LL LL*
..
 2  !)
 53  !)
 d ! "
 * 53

:$  >  M " * " A


8 53 # A$/ c
 E " /

# 3  /  J-  #+ c


 ? !) / ! c 
 # 2 ^Q
1 $
  /  
  
(@" 0%4) 6 4   *
.
C  & !)
  
 J c 
 @.  )!  .!)
   ٕ X 
 :"

2  ) &=
 #
"
 *  
 ! c
 2 ) 
 .
  2 2 @ ()
     
 "
 J0
 B"8 X
c 
 2 < " .
 :$  " 
 "
 #"/
#2 H" 5 ! ! &< )  c $

  Z '""   2 .=
 Hardware " /
.QY I &.$9 ' )    .H" *
J $
 @ – 
 56
 –  "
  
 F A 0
 &K!  '
> 9  ' .' (&)
.Q[I &QWWQ &T0 & !
 &
 -
 " &  3 5j
. F
 44 
.(Q)"
 * 2  
  0  &/ 4


Z A$/ <$7 <-  " "  H2 2 "% 2 <

c 
 2 ^T
<
X
 c
 "  M 

 .   A$/ 
 #  &(=
)
 
  
 >4 )! .(
Z A$/ c 
 7 ) 04
 ') #
  " +
.m
8 ... %  #$  $ A  2  $
 >
 2 5
 @0 /   ". 1

=
) 
Z " 
  $ / / %
 <$  c 
 2 ^Y
2 &(T)H" 5 ! &5
 <   
8 ))   :
) ?<$7 " / (9>
"
9 69 7 ; ?=
 ) A$/ < 64 " / 0 7  8  
.(Y)Bits  
 X )
 :$ 

0
 ))   
N ))
 M =
 A$/ c 
 7 5 2 < 2 J+

   0 "    Hardware =$
"
  
  @$0 (

  0 ))
 ')! M =
 5.0 ٕ c 
 7 8 " / 
&<$7
c $
  #  &</0  %
 
   &Volatile  6
 
.
 ')!  I4 H" " 

&<  <" 1 H2 & k


% * 
Z 7  / "2  )8 < 2 ^[
+0 2 "  .(H ) H" *  
 )!  /1 9 
9 " 1 :
) M

J &5 *! '' 2!


 '  '
.' [ 4I &@ J &2
  '  '
' 3 .' ()
.& I &@
.&1I &@ J &,%6   > ,-  [ /I &@ J &2
  '  '
' 3 .' (&)
> &%3 '
> '
?9 .' ["G"4I &@ J & = '  2!
'
.' (/)

&>N 
  "
  
    " ^
Z =
 X      "
 
%

.Y\`^Y\Q I &QWW[ & !
 @  &' " 


 4G 
.(Q) "    2 #* $/ $
  
 ))
  N :" 1  %1

  &H" * 2 €" %


9 c 
  / B" ( <.
 5]   "+
:!  A
8 5Z ')!

 > & 3 #


  € !) 9>/ " c 
 2 ' 2 B : \+ O
5 #!   c 
 M #  ?<" !)
 </    ٕ X 
 <"8
(Y)
" 0 "   +2 "+ H2
 )!  2  E   ٕ .(T)(H ) H" *
!€ !) >/
9 !  / :
) #* &c$

<-  < 2  / A$/ &H" 5 c 


 2 ' 2 B :  \+ O
– H" 5 ! –   02 A$/ <-  18 <  ". 1  1 $  $3
.([)6
 J $ 

0
  c 
  0$4 < 3 ?H2
 )!  "  3 ' 1  2 

.(\)<$/  H)
 6
 c 
  0$4  &<$/ J-  H)
 H"


.&\I &@ J &,%6   > ,-  [ a[I &@ J &2
  '  '
' 3 .' ()

Q\T I &@ J &  


N =
 c
 
 
 &, '
0!
'
.' (&)

J &2  '%!  '


'%!  .' ? a\I &@ J &2
  '  '
' 3 .' ? !" 
,!  '  2!
.' ? [TI &@ J &%3 '
> '
?9 .' ? !"  \\ I &@
.&\ ^T[I &@ J &,%6   > ,-  ? aU^bWI &@ J &$% +
I &@ J &,%6   > ,-  [ /I &@ J &2
  '  '
' 3 .' (/)

.&1
"
   
 @ 
 $ &
 = 
 c  
% & %9  '
> > .' (1)

'
.' :B"
<
8  &Qbb^QYQ I &QWW\ X & 
   $
 
 X$ /
.!"  QU\I &@ J & = '  2!

.& I &@ J &5 *! '' 2!


 '  '
.' (4)

 4 
=  / 0
 E* "+ )
 .
 ! 1  '    2 2 B
H"
 " 
 A
8 . $ #
=  !)
9 >/
9 c 
 B  &c 
 =   
X
c 
 2  #*
 A$/ &0 7      
8 )) &< I4

.
 ) (=
) 
Z A$/ '  18 + 1 "  <

#
c $
H"
 " 
  " )
  
 ' 1  2 M B42  
 
" 
 )! 1
4-
9 " 
9 c
 < )  !)  c 
 A
8  . $
.c 
 )!

 &E
 +  &(Hybrid !)  "6 . 
c
 M J+

2 H2 &(Q)c%
    /  A$/ $
!  #  (" )  . 
'  <$7 " c% /  A$/ 
 2  '  #  !)   c 

.(T) (=
) 
Z " / A$/

H"
 @
 ?H 
 H"
   J  "6 c 
 0 2 :
) B"C
@
 2 &=
 Hardware " /  c 
   
 4
 

 !

 

  c 
 "  ""/8  c
 <
) H)
  !)
 " 
  H 

.I   

(1)
Pamela Samuelson and others, A Manifesto Concerning The Legal Protection
of Computer Programs, op. cit., p. 2320.
.QUaI &@ J & = '  2!
'
.' (&)

 4 
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻧﻲ‬
‫ﻣﺪﻯ ﻗﺎﺑﻠﻴﺔ ﺍﻟﱪﻧﺎﻣﺞ ﻟﻼﺳﺘﻬﻼﻙ ﻣﻦ ﻋﺪﻣﻪ‬

‫ ‪
 ! :> >
$
 53» :2 A$/  "
  
  (a[) "
 I‬‬
‫‪ :> >
>+‬‬
‫   
 =  ‪9   &+. 8 2 >   <
"/2‬‬
‫ ‪.«J$
 
  "/2‬‬

‫‪7 2 A .  )8 :> >


>+‬‬
‫  ‪9   5
 2 @
 
  S-‬‬
‫  <  ‪ 2 &%)7
 " 
 :>   H" 8   :> 1 &<
  2‬‬
‫>‪+ *   5
 2 .‬‬
‫‪9 " 
 @. 8 2  $  
  +‬‬
‫
  "  ‪ 2  <   7 2 2 A . 2‬‬ ‫‪ 1‬‬ ‫
> >‪   :‬‬
‫ 
<)‪.(Q‬‬

‫ ‪0$ B   4 1 @ 
  /  : ! 2 +.
 ')! !2‬‬
‫  
‪18 !"     1 &(
 N)  1 @ D. 1 @ ?5‬‬
‫‪   > :> >
$+ 52 : !   )M .:> 1  1 
 53 A$/‬‬
‫‪D. 1 5  " !"  "  >%‬‬
‫  " !)' 
 @ ‪9  >  3 ?$/‬‬
‫)‪.(T‬‬

‫  ‪$
 * 53     2 " c
 A$/ @
 #
 @0‬‬

> >‪A
8  "+ ""/ 
 
  1  X
 A$/  &  2  :‬‬
‫‪c   "  "+ < 2 :
 !  * . 
  
  1    "/‬‬
‫‪;"3 #"4  3 
> 1 X
& !* "  #  "4 
  ;"2‬‬
‫  ‪. "% 2‬‬

‫>‪.!"  T`W I &@ J &@$



 
 &! # '
.'.‬‬ ‫)(‬

‫
‪.@
 J‬‬ ‫)&(‬

‫ ‪ 4‬‬
‫ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ‬

‫ﺩﻭﺍﻋﻲ ﺍﳊﻤﺎﻳﺔ ﺍﻟﻘﺎﻧﻮﻧﻴﺔ ﻟﻠﱪﳎﻴﺎﺕ‬


 $/ =$0
 "6 A
8 
    $7$7 
   B"2 "

.
.
  
 
   # !1  :
) A$/ =  "+ &0 3 $ 4
:$  !2  

 ')! A
8 /" 
 
  ""
 : !  

@ @ZŠ•bȽa@VbÈÛa@¿@pbî©@Ûa@òîàçc@Züëc
 
 
 $ 
 
 0 3   $* 
   = 8
 N  
 @0  . 6 
 %4 ".
   A
8 J  k

 
 /  =
 ) A$/  
  $
  # ( . 1 
&

  "+ +( &!  +" & 
 A    "N $$ . 
.2 H2 #"  / " 
 
 "
 +
  A
8 :
) H"C

A   "4    2 
  J  
  N A$/ =  "+
1 1 :/ 
 I4
 D0
  &"3 & "
 & 
 1


 @ A$/ 3 2 <
  &(Q)m
8 ... J 
 
   
N
 &<.
 $ &' 0 d N   .  
 ." +1
#/"  
  " A
8 -N .(T)$
 #"
 E 
 &: 
 >
 
 /  " >
9 ? )  " + + 
M &<-  " +1
2  .#/  1 " $ \U 
   
 4"
 A$/ 3 " 
 1


(1)
John C. Phillips, op. cit., p.p. 1000-1001.
&  '
'
:J &" +1 
 @  
  "  .
  "6
(&)

& YT^YQ I &@ J &2


  '  '
' 3 .' & `\^`[I &T\^TY I &@ J
.[QI &@ J & K ,- ' 3 .' & QW^QbI &@ J &,%6   > ,- 

 G" 
"4 1 ""   2 = &"6
     

 " +>

 !2
.(Q)( 2 
  0 "6  &versatile

@ @Zpbî©@Ûa@xbnã⁄@òÄçbjÛa@ÑîÛbØnÛa@ZbĆîãbq
 .
   ""/2 A
8 %  ٕ !""/N d  
  
  
 8
 &  "/  2
9 2 "/  8 @7  &
   4 

4
9 " 2 "
  &$%0    2 X C 
 
 
 $
.(T)"     c  #  #  "
9
'""/8  :  Pac-Man A
 0
 =
3 c "2 2 " >
9
  )! &2 1 "  $ Y,T 
  –   
  – $ I4 aUU
~
 "
9 3 c
 $ ; ?
 d 8   "
9 >%
9 - 7$
9
(Y)
. $%0

@ @Zpbî©@Ûa@óÜÇ@õa†nÇüa@òÛìèX@ZbĆrÛbq
$ 0
  
 !""/8  
   !"  
 !
 

 #*
 &@%+" - B  @7  1 c 
  4 / 2 18  @
 
 
0 <6$ ; &) %
9 
 :
) $ 1 & 0 m  2 $/

@      &#



  
   "% 3 " 
 1
   ()

@   @0 /  + 07 


  
 2 #
   " #  ?

."6
   A$/ J "  
 

 
.
 $

John C. Phillips, op. cit., p. 1001.
(2)
Ibid.
&YUI &@ J &  
N =
 c
 
 
 &, '
0!
'
.'
.[Q I &@ J &5 *! '' 2!
 '  '
.'
.YQI &@ J &  
N =
 c
 
 
 &, '
0!
'
.' (/)

 G 
 8 ^ Pirate $
 &(Q):
) #$
CD-ROM *   02 5
< #+ H)
 5" /1  5.4N / 2 #2 "/  c 
   #  2 – 
9
(T)
. ) 
 2  "

F2 A$/ 
 
 
/
9 Piracy  
 !   =2  
J  "
 $ 4 <  $  8 .  
  " "  H2 > 
4
.(Y)
 /  

(1)
David Einhorn, The Enforceability of "Tear Me-Open" Software License
Agreements, Journal of the Patent and Trademark Office Society, Vol. 67, No. 10,
October 1985, p. 510.
.Y\I &@ J &2
  '  '
' 3 .'
#%
 A
8 k
"5-V 2-V" S$0 #"4  
 A$/ 5" /1 @0  d"
 
+ c 
 A$/ >"
 E 4" &9 #2 "/
9 "4 
9  5  &5" /1 $/ A$/
."5-E " c 
 A$/ 5" /1 $/ A$/ @$0 &<4
 "4 
 < #  ; ?/ 9 3 ! : 3 D
 :c
  +  / : !
#+ " 
+3 A$/ 2 + 3  +  #"4  H2 8 )8 &$
$
 "

8 ; ? 
  
 #! ""/ 9 +3 #! : 
 D
 &/  *   c
 "2 m 
4 " 
 5.4 ٕ c
  A$/ 
  #! "   &
      51C!

    0 7
   ٕ &7  " !  c 
 !   &#!2   1 A 
.4
 

.TQ I &@ J & + .> ' (&)

.WYI &@ J &  '


'
(/)

/  .$ &%[W  c


  + 1" = + A
8 QWW[ #/  "
 2 "+
."%
  1 " $ QT,Y 
  

$$

"
 
 "+ &%QY   QWWW QWW[ /    
 -.4  "+
T,\ A
8 TUUU #/ -.4  &1 " $ T,b 
  3 
 / 
 .$ .

/ 
 

"
 $
A "3 "
 J- ! E.4 1 )!  =
 
.1 " $
(=) .TRIPS .
 $
 @   
 $ 
 =  
 +.  . @0

 G& 
  =
2   @0 /  
 !  
    "+
:
) &E* H3 m
 "- .
      ?$
D 
 * m
 J 
 ROM 0 5
 ) ++ A$/ J-  H)
 Cipher Key .
 F .  
"Software 
 X  A / c  J- 2 &=
  %"
  $
')!  #* 
.4 
 " /   03    S ; ?"Virus
c #"4  2 
 
  
08 2 < 2 18 –  !* –  

 
 J  A$/  "+ #"/ %
 ')!  ( &c
  
4
9 "
.(Q)$  


  
  . $

9 @ 
 A$/ " ] 
c
  + 8

 "   c
   A$/  .  ! &c 
 d 8 
 m

.(T)1 " $ QU 
   
9 
  %4 " .c
 d 8
 1 L 
< I4
 * mL 
 ( L L$
%L L04 L L : L L!   "L L+
 # 1  + 2 &Non-tangible  $
 *  0

9 $/ 5" /
9
 
&"4    # 
 "
 53 + >4 &"4  
.(Y):
)  #"/

(=) Aaron D. Charfoos, Comment: How Far Have We Come, And Where
Do We Go From Here: The Status of Global Computer Software Protection Under
The TRIPS Agreement, Northwestern Journal of International Law & Business,
Winter, 2002, p.p. 261-262.
(1)
James V. Vergari and Virginia V. Shue, op. cit., p. 569, p. 571.
(2)
Pamela Samuelson and others, A Manifesto Concerning The Legal
Protection of Computer Programs, op. cit., p.2339; Mikko Siponen, A
Justification for Software Rights, SIGCAS Computers and Society, Vol. 36, No.
3, September 2006, p. 11.
(3)
Mikko Siponen, op. cit., p.p. 12-13.
 G/ 
@ @Zpbî©@Ûa@xbnãg@óÜÇ@Éîv’nÛa@ZbĆÈia‰
 &
9 S2 (c$
D 
 * m
) c
  + 2    )8
 2 #$/ #*   "6
 d 8 A$/ 
   B"
6 H2 : !  
  
 d 8  &"1" ! N J0
 &†$

9 j S 
V! @ 
 d 8 A$/  . 2 
  0
 ;
 
 "  X3
 
 
 !2 6  !  ?(Q) 
 )!   1   
 S
" .(T) 
 )!  #"
 68 #  &d N A$/  
 6.
$

 &
   1 &

  1 J ! .
 $
 @  #
  
Z 
 D"
 "   18 "
 )! @  1 &(Y)

 
.#
 S

 @  D"N )!  </"8

-2
9    ٕ & "
 
 A$/ $
 
 
   1
"6
   A$/ #!6.  
  
 +
9 9 /"  
 &% 
 

. 

(1)
Pamela Samuelson, Why Do Software Startups Patent (or Not)?,
Communications of The ACM, Vol. 53, No. 11, November 2010. p. 31; John
Cady, Copyrighting Computer Programs: Distinguishing Expression From Ideas,
Temple Environmental Law & Technology Journal, Vol. 22, 2003, footnote 199 ,
p. 43
& Y[I &@ J &  
N =
 c
 
 
 &, '
0!
'
.' (&)
.Ta^TbI &@ J & 3  '
$+ 9
(3)
Daehwan Koo, Alternative Proposals and Effective Protection of Computer
Programs, Buffalo Intellectual Property Law Journal, Vol. 2, Fall 2003, p. 52.
 G1 
‫ﺍﳌﺒﺤﺚ ﺍﻟﺜﺎﻟﺚ‬

‫ﺗﻄﻮﺭ ﲪﺎﻳﺔ ﺍﻟﱪﳎﻴﺎﺕ ﺑﻨﻈﺎﻡ ﺣﻖ ﺍﳌﺆﻟﻒ ﻭﺃﺳﺒﺎﺑﻬﺎ‬

@ @ZáîÔmë@†îè·

$! 3 !)3  $


 
 
 D -  / ;"
 " /
&(Q)= 6 2   
 
"
  †1 #
.3 " 
 1
 A
8
@ =  B"
c  2  # -2
9  .=$
c  2  

.B    A$/ &c
 
J 2 " &
C


 + =  
 
& " 
 1
 $4 "
  ""
  "+
#

 / 2 " &:
) " ""
 )!  
"
 +. 1  # &
C
 @
. 
 " +1  + 
 
  
 !2

; &
C
 @ #  
   0 ;
 )!    
 0 # &( 2 =$0) 3 #
  
 
4
  0
  
 
  
   0 # &( =$0) 
"
  
  
 
.(J =$0) 
C
 @ #  
  =2 # &(;
 =$0) H


QW[` #/   # &QW[U #/ :


)  &ABC 6 ! c * = 6 2 ()

.
 E*j
= 2 ! &$
+   
8 + = 2 ! &ENIAC =

: 
<ar.wikipedia.org/wiki/= >, (Last visited 7/4/2015).

 G4 
‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‬

‫ﺍﻟﺘﻄﻮﺭ ﺍﻟﺘﺎﺭﳜﻲ ﳊﻤﺎﻳﺔ ﺍﻟﱪﳎﻴﺎﺕ ﰲ ﺍﻟﻨﻈﺎﻡ ﺍﻷﻣﺮﻳﻜﻲ‬


& ( 
C
 @   3 " 
 1
  
   #

 $ :=$0
 )!   $  .
 :$
"  "    ٕ

   3 
C
 @ =   " # &( 2 D) 
   +
.(;
 D) 
C
 @   
   # &( D)

‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‬

‫ﻣﺮﺣﻠﺔ ﻣﺎ ﻗﺒﻞ ﻇﻬﻮﺭ ﺍﳊﻤﺎﻳﺔ‬

62   #" . "  $


 
 
 A
8  : !  #

""
 .   2 c
  0  
 7  A
8 B"2    =

  = +>/ #  " 2 &   A$/ #$ 
 51C
" "

 4 : !  #


 & "

 / 
 ')L 
 0 2 ""L  H2 / ;L 

07 "% / A$/  $   
 H 0 2  &(Q)c
 A$/ 5" / D +
A$/  $
c
  "$ m J #
 "$
 J   #
&d N 

62 J D   Operating Systems 7
  2 c

 >
9 .F2
S$  #
c
 ')! 2  &c
 ')! #  63 ')!   #  &=

.(T)0 c 
 4
 63 " / A$/ 18 $

$. #    
7
9 Application Programs 0
 c
 2

.Qb I &@ J &2


  '  '
' 3 .' ()
(2)
Pamela Samuelson, The Uneasy Case for Software Copyrights Revisited, op.
cit., p.p. 1750-1751.
 GG 
. 
 )!  
 "  % 8 
   &5>
 "2   5>

@% - 6 D   / . "4 


9 3 0
 c$


=
 A$/ c
 = "4 #%>
   c
    &c 

c 
<%  2 4 "4 H  ( 
) #"4 
  

 & 
)8 18 c 
 c  A$/ @ . 6 A$/ 
 "$
  "  #$ #  &=
.(Q)<$ 4 "4 #"+

"+ .+
 :
)  $
 
 $
 : !  #$ <$/ 5 
.(T)
 +  "  #"/     
    
 /  !"6

#$/  
 ? "6  . ) < ( 
   1 6 

    $  0 &B42 c  "  
 #
  /   
"/ X + #    (
9 &< #$   2 
   X +1 .>
9
@
 % #   
*
9 
&!  " $ c
 "2  "    /

  1 $/  #$   
 M #  . "" #
2 ""
 #2  "  $
 +  "  #"/ 
.(Y)-2
9    ". 
.# +2 / 
 X +1  
 
 !!"6 "

(1)
Ibid., p.p. 1751-1752.
(2)
Ibid., p.p. 1750-1752.
(3)
Pamela Samuelson and others, A Manifesto Concerning The Legal Protection
of Computer Programs, op. cit., p.p. 2330-2331.
 G 
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻧﻲ‬

‫ﺩﻭﺭ ﻣﻜﺘﺐ ﺣﻖ ﺍﳌﺆﻟﻒ ﺍﻷﻣﺮﻳﻜﻲ ﰲ ﲪﺎﻳﺔ ﺍﻟﱪﳎﻴﺎﺕ‬

 J A$/ 5  3 2  


C
 @  + =  c
  ( #

@ =  @0 / 
 :$ 5   ٕ &%"
9 " 
 !  &c$

 :$
#/   = 
 @ ; ?American Copyright Office 3 
C

John F. Banzhaf A/" @ 
 $0 "2 < = c   A$/ QW`[
! "" 
X(
 ! <"!  &(Q):
) "  $
)9  2 S2 H)
 III
 :
) S- 2  &Copyright "
C
 @" @0 / =
 c   8
.(T)<
   


 9  H)
 ^ QWUW #/  "
 3 
C
 @  +  #

% 2 J # c
 ')!  #
&=
 c 4
9 
9 -  – +
 )!
J ! / 
C
 @ =  .  :
)
? 
 :
) $/ I 
 %.
 
.(Y)  "Writings" $

9 .
9 A0/2 ; ?Books "= 
" % -

d   @ 
 $  $
)9  2 

9  John F. Banzhaf III  
 ()
&
C
 @  
90 =
 c   8  9 "  QW`[ #/  . 0 
""/M #+ ;
 :
) @  .c
 / D 4 5 S  D 41 5 =  E " 4
)! 6  1 .=
0
 )! # <$  ' " #+ H)
 
C
 @ =  A
8 <"+ =$
c 
./
9 b\ 
  ~$ 
 "+ A$/ I4

See: <en.wikipedia.org/wiki/John_F._Banzhaf_III>, (Last visited 3/2/2015).
(2)
John Banzhaf, III, Computers and the Copyright Law: A Commentary,
Communications of the ACM Vol.10, No.1, January 1967, p.61.
&QWb` #/ "
 
C
 @  +  "  Book = 
 %  D
 A> "+ (/)
  
 >
 A>  A  &literary works ""3 . 
" %   91" J- ;
(=) :  ."= 
" % 

 G 
3 <"  ! c 
   
"= 
" %.

C
 @ =   4 

A$/ c
 H  2 :! = 
 J #5> 
 0 
 E c 
 
0 
9 5$

 
   $
#" 2 &      2 & $2 
(
.(Q)("
 " )

@ =  B"
c  2  A$/ /   " &QW`` #/ 
-  =
 
&= 
 B"
 9  \T B   #  #
3 
C

c
  #" #%>
 
 "  
 
 ! 
 A$/ +N
 #  #

 +
9  # A$/ # I4
 
C
 @ &:
)

 " / 18
.(T)c 



 $0   2 
 :$ 5"8 A
8 
 J" H)
 =
 

)! &(9 5$
$
 $
) c 
 I4
 "
 "  D"8 ^  )  ^
  ' 2 D"  < +  c 
 !  3 ?  04 <.  D"N

(=) James V. Vergari and Virginia V. Shue, op. cit., p.550; Brian C. Behrens
and Reuven R. Levary, Legal Aspects - Software Reverse Engineering and
Copyright: Past, Present and Future, The John Marshall Law Review, Vol.31,
Issue 1, 1997, p.p.2-3.
1 5 H2  /  $
 @0
 ! c
 ( 3 
C
 @ =  < #+ 
." "
9  
  
 %.
  B42 % J # 
William F. Patry, op. cit., p.p. 24-25.
(1)
Edward Samuels, The Idea-Expression Dichotomy in Copyright Law,
Tennessee Law Review, Vol. 56, January 1989, footnote 156, p.p. 356-357.
 /  < 2 8" < ( =
 c    QW`[ #/  
C
 @ =  #+ "+
 =
 @0 / >4   
 
  $$
J < 2 2 &=
 7 $
.>
 
William F. Patry, op. cit., p. 26.
(2)
John Banzhaf, III, op. cit., p. 61.
 G 
 < . 1 
  -. H)
 &< I4
 Source Code "
 " 

0  1 

 +
  "
 $ 4  
C
 @ =  8  .#"
H
 )
 =$
>
9 X
"
 "   0 56 D"8 18 "
c 
 D"8
.(Q)'>/2


C
 @  +  " + &QWb`   A  QW`[     .
 
@   c
  2 :
)  =
 &0 c  TUUU 18  #  #
&


.(T)+
 :
)  "%
9  #
#4-
&
9 (
9 
 /    2 ;" J "/  A$/  #

 

; ?< H)
 Hardware =
 " / / 
 . IBM  + !
"2 A  & 63 #% " / %>
 
9 
  
 ')!  
 1  0$  07-  QWbU #/      )
 ! +
 0  @   %!  A
8 
 )! B"2 "+ .Antitrust Authorities
1
  
 d 8  ""/  QWbU #/ . .$ 
 

> A
8 /- # &QWb\ #/  ""
 )! /-  Q[UU 
  " 

.(Y)QWaU #/  <
2

(1)
Christina M. Reger, op. cit., p. 216.
(2)
Edward Samuels, op. cit., footnote 156, p.p. 356-357.
(3)
Pamela Samuelson, The Uneasy Case for Software Copyrights Revisited, op.
cit., p.p. 1756-1757.
 " 
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻟﺚ‬

‫ﻇﻬﻮﺭ ﲪﺎﻳﺔ ﺍﻟﱪﳎﻴﺎﺕ ﺑﻘﺎﻧﻮﻥ ﺣﻖ ﺍﳌﺆﻟﻒ‬

@ @ZQYWV@âbÈÛ@ÑÛû½a@Õy@æìãbÔi@wßa@Ûa@òíb»
#( &(Q)QWb` #/  2 QW  "
 3 
C
 @  + 5 "


C
 @  +  / 6/ $
 @0
 !62 
  
 < 2  c
 ""
S$0 #"4   
 )!  
 %
   .QWUW #/  "

8 ; ?Books "= 
" S$0  1"
9 Literary works ""3 . 
"
E7    
 >
9 &X
1 = : S$0 43 S$0

  64 2 #$  A$/ 2 $  2 =  %! A$/ / 0   )8 / 

. $
  (QWb`) ""
  
 5 X
1 )! E.
.(T)=
 )
– 
 
 . 
 >4 – . 
»  (  QUQ #
  "3

 E7 &B42 %1" 2 + 2 .
6  2 &#+3 2 &$
  / 

  03 2 &0 04
 2 & "
 2 &= 
  &"
 53 0 /
.« " 
 +0
 2 &I+3 2 &0%
 2 &#>3 2 & 

«"Literary works" are works, other than audiovisual works, expressed
in words, numbers, or other verbal or numerical symbols or indicia,
regardless of the nature of the material objects, such as books,
periodicals, manuscripts, phonorecords, film, tapes, disks, or cards, in
which they are embodied.»
%.
  "8 #"/ #* &=
 c A$/ @0  @
 
 2 : 1
$   29 . 
 A$/ B /
9 9. 5 
 )! 3 ? 


U.S. Copyright Law, 17. U.S.C. §§ 101 et seq. : #  


 )! A ()

(2)
William F. Patry, op. cit., p.p. 26-27.
  
I+3   ) $ H)
 0
  29 &( %1" &6  &#+2 &$)  / 

.(Q)(Cards +0
 &Disks


C
 @  + - "=
 c" A$/  I
 #"/ = 

4"
"C   " 
 1
  %-
 #3 - " QWb` #/ "

.(T)
4"
E  "3 . 
 - c



4" #* &
C
 @  +  =
 c A$/ S
 I
 #"/ 56 ٕ
: 56 ٕ &'>/2 
 
 A$/ Literary Works "3 . 
  -
#/ 
C
 @  + " 5 " ? )
 
 - c
 4"  E

" A$/ 5  "
 )! 5 "+ .=
 c A$/ 
9  
9 - 
QWaU
c     3 E / " 
X 
 $ 
 $
 B"8  "/2
.Z <
   ! &=



5%
 :-  ?'%'+  5%+ #  : '3 !* 5% E  5+  '
:(CONTU) U ] 
"4 >
 
  $
»    +
9 QWb[/QT/YQ m  X 
 "2
The National Commission on 
C
 @ 
 . $
""
 


"!  &New Technological Uses of Copyrighted Works (CONTU)
" 3 " 
 1
  
C
 @   
$  / % 8
% -
   $
"
 

 #"4    
 >
  
c    &
C
 @ 
 . 
 #"4  J6 
(  


(1)
Edward Samuels, op. cit., footnote 156, p.p. 356-357.
& !
 @  &' " 
 & 
 . 
 .
C @  &'-  '   ! '
.' (&)

.[T\ I &TUUU

 & 
.(Q)=


 ! /" 2 # &  ;> A$/ "6 "


$/   $
   "+
"  - A$/    $
 5-/2 
* 2 
 )!  " "+ .QWba/b/YQ
 + & X
1 - 
C
 @ =
 c  

C
 @  +
2  +  & 
  QUQ #
 - <"8 #  =
 c
9.  $


 
C
 @

 @ 
 A$/ " 
   4] #+ QQb #
 " 
.(T)=
 c

@  + "   +
9 3 X 
 "2 QWaU #/ " QT 
&CONTU  
   
 )!  c" ; ?(Y)QWb` #/  "
 
C

: H2 A$/ 5-$
:
) ?"3 . 
 - S  =
 c  /
%+ - c
 -8 # #
< 2 3  
 
.""
 )!  X
2

J- 
& 
  (2)QUT #
 "
 &
C
 @ 
 / - 

 =
 .([) )   A$/ $/ 
C
 @

 " 
 A
8 -N 
Literary ""3 . 
" - J  2 !  )
 %
  c
 J- #"/

(1)
Final Report of The National Commission on New Technological Uses of
Copyrighted Works, p. 1.
Available at:
<http://people.ischool.berkeley.edu/~bcarver/mediawiki/images/8/89/CONTU.pdf>,
(Last visited 31/5/ 2013).
(2)
Ibid., p. 12.
(3)
Public Law 96-517—Dec. 12, 1980.
(4)
Edward Samuels, op. cit., footnote 156, p.p. 356-357.
: ! =
 c
 $
 <  H)
 

"A computer program is a set of statements or instructions to be used directly
or indirectly in a computer in order to bring about a certain result."
 * 2    #"4  
  3 2 $
  /  =
 c " ' 
f H)
 
 ) ! &".   @
=
 
.QWaU #/  
  9  J- |
 / 
#
  
C
 @ 
  3    ( $/ I  
 Works
.(Q)Q/2 QUT

:  4
 
0
 $  # #
CONTU  
 M 
 5 

B /"  
 - 
 -
 J-  &c
 I4  
C
 @
:$  c
 A$/ 
C
 @  + @0 568 = J-  c
 A$/ 5" /1
 B    A$/  ) c
 0  J  
 ')!  =
 .B /"

.(T) 3 =


‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻧﻲ‬

‫ﺗﻄﻮﺭ ﲪﺎﻳﺔ ﺍﻟﱪﳎﻴﺎﺕ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﻟﺪﻭﱄ‬


 " 19 2   &
"
 "
 A$/ 
   0 =$0
 )!  

 3 <
 # &( 2 D) 
   .
 $$


  

 
 $ 
 =  
 +.   
  42
9 &( D) 

.(;
 D) .
 $
 @ 

 +  
 / - 
 % I4
 (2)QUT #
  0  : ! 2 E
 ) ; ()

c
  " + 2  &c
  -2 ; &.
 I4
 QUQ #
  
C
 @
I4 (QWaU) "  +  QUQ #
 J " 2 9 * X
QQb #
  $/ I  

  A
8 H"C :
) M (2)QUT QUQ 
  /.
 < M #  ? 
  c
 -M
."3 . 
 - c
  /  D
 *
William F. Patry, op. cit., p.p.20-21.
(2)
Brian C. Behrens and Reuven R. Levary, op. cit., p. 3.
 1 
‫ﺍﻟﻔﺮﻉ ﺍﻷﻭﻝ‬

‫ﺩﻭﺭ ﺍﳌﻨﻈﻤﺔ ﺍﻟﻌﺎﳌﻴﺔ ﻟﻠﻤﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ ﰲ ﲪﺎﻳﺔ ﺍﻟﱪﳎﻴﺎﺕ‬

World Intellectual Property .


 $$


  
 (

 Q[  #
   }+ | X( "! A$/ 5  Organization (WIPO)
Qaa   -/  #- & " 
 #j
4 
 1
 B"8   &QW`b #/
 1 S   6  .
 $$

" #  0 "+ A
8 " .
"
.(Q)#3 J $
D"N

4
 ) 
 I 
  /  
    QWba #/ 
Model Provisions of the Protection of Computer 
 
   
 *  
 54
  /  !""/M #+ &Software
#%>
 
  " ""/N " 
 #3    $ A$/ 5 
9 .
 $

Model ) 
 I 
 ')!  E7
  .=
 c
 
 $

 #
.
  A$/ 0 
    + # 8  "
 "/ ! Provisions

&
 
$    +  I 
 ')
"
   !  -
 "

 +  
  A$/ %9 6 c"  &%
     - "
 :$

.(T)/ 
 *  
 2 &
 3 2 &
C
 @

(1)
"Our mission is to lead the development of a balanced and effective
international intellectual property (IP) system that enables innovation and
creativity for the benefit of all." Available at:
<http://www.wipo.int/about-wipo/en/>, (last visited 9/4/2015).
(2)
Measures to Enhance International Cooperation in The Field of Legal
Protection of Computer Software, World Intellectual Property Organization,
Expert Group on The Legal Protection of Computer Software, Geneva, November
27 to 30,1979 , p. 1.
Available at: (=)
 4 
c A$/ B  .
 "3 . 
 
 +.  2 54
 1 "+
')! I  
&"3 . 
 - J – c
 H2 – ! / =

#"4  "- 
 >
9 .$ 
  c
   07 1 +. 1
A 2 . "/ 
C
 @  07 1 =
 $/  #
  


4 "" "!   2 %
 "!
  8 = < 2 A
8 54

.(Q)'>/2 S- 
 
 A$/ ) 
 I  $
#- A
8 -N &


"  1 0 2 &


$
 J0
 A$/ I 
 ')! - "2 "+
5 2 
C
 @   2  $

 l"
 @0 / c
 

  I 
 J 
/  8 ) 
 I 
 .9> D 41
.(T).$ 4


4  +    H"  H)


 ' 1 =$7 
    4 "+
  - 0  #
)8 ?A 
 :
) /  ) 
 I 
 5 &$

+   ٕ &(9> D 41 5 2 


C
 @) ""  + # @ 

""  + "8 2 %
   
 "2   )
 I 
 @
8  8
.(Y) - 

(=) <http://www.wipo.int/mdocsarchives/LPCS_I_79/LPCS_I_2_E.pdf>, (last


visited 9/4/2015).
(1)
Ibid., p.p. 3-4.
^QWbI &@ J &  
N =
 c
 
 
 &, '
0!
'
.' (&)
.QWa
.QWWI &@
 J
 (/)

&""
9 "
9 $
4
 
 H"  H)
 ' 1 , '
0!
'
.' "  "+
– 
C
 @  1 – %
  
  3 6/ 
  18 <
8 5 $
 #"/  - A$/ "2
(=) .
 ) 
 I 
  
   +  "  .$
%>
 
  /

 G 
 " / 
 4
 
 = $2  
 #3 A$/ $3 #!2 
 " ""  4
 ! &(b) "
 <$/    $
) 
 I 

TU    A "3 "
 ( .
 "
A "2 A+2 "  - ; ?c

I4
 2 &N 2 & 3 J
 : H2 A$/ 2 &c $
3 #"4 1 A$/  
.(Q) 1 +

   T\    A+3 "
 2 &
" 2 

I 
 2 18 &""
 )!  
   
) 
 
 " 
 #*
 4 
" +.  D 

 ""/8 + < 2  &
" 2   #
) 

(T)
  
 0 7-
  
C
 @     A$/ H2
   

.J
 =$0
  B    A$/ 3 " 
 1


A
8  &
    
    "    * 2 "
.
 ) (   3 <
 

.#

 "      A$/ 
 

C
 @ # 5> A$/ "2 &)
 (=)
.TUU – QWW I &@
 J
 : 
(1)
Measures to Enhance International Cooperation in The Field of Legal
Protection of Computer Software, World Intellectual Property Organization, op.
cit., p. 7.
(2)
James V. Vergari and Virginia V. Shue, op. cit, p.593.
.QWUI &@ J &2
  '  '
' 3 .'

  
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻧﻲ‬

‫ﺍﻟﺘﻮﺟﻴﻪ ﺍﻷﻭﺭﺑﻲ ﳊﻤﺎﻳﺔ ﺍﻟﱪﳎﻴﺎﺕ‬

Q[  =
 c
 
 
 ( T\U/WQ #+  3 <
 "
 TY  "
 TUUW/T[ #+  3 <
 <$" # &QWWQ    
  -  3 " 1  5-/3 "
 <
 )! =
0 .(Q)TUUW   2
"2 .  ! /  <
 "  J @ =
 c 
  +
 <$/ I  
 !  " "  &
C
 @  
90 Literary Works
"=
 c" S$0   2 A$/ & .
 "3 . 
 
 "!
.(T)-
 
 A$/

   H2    c


  2 A
8 <
 4
 "
 2
c 
  
 56
 2 A
8 2  &Hardware " 
  " 
 c

 *  c 
   / H2 $/ #  
 l"
 3   &
 !
.(Y)
C
 @

J @
 @ A
8  3 " 1  !  3 <
  "
 

1
  Case Law %-
 @ 
  0 4] &3 
C
 @  +
3  
    <
 < 2  ""
 "  A
8 B"2  &3 " 

 + A  !> 2 "   .=
 c  @$    3 <

c 
   J   &"2 .  ! / !> &c
 

C
 @

(1)
Directive 2009/24/EC of the European Parliament and of the Council of 23
April 2009 on the legal protection of computer programs.
Available at:<http://www.wipo.int/wipolex/ar/text.jsp?file_id=208107>,
(Last visited 10/4/2015).
(2)
Ibid.
(3)
Ibid.
  
-2
9   .X $ 0 A$/ c $
3 
 
)  $  

< 2 2  : 1 .c 
 $/ #  
 l"
 2 3  " 
  
" 1  
 
  0 -N  1   )
 <

.(Q)3 " 
 1
  3

<.
   
9 2 18 3  
  3 <
  <
 < 2 #*
" A
8  3 <
 2 >
9   &  > 41 E "  1 3
:
)  <    ٕ  0  – X
 A$/ – 3  
    
*  A$/  0 "+ 3 %-
 @ 
 2 A
8 -N .   
 

C
 @  @0  @$   4  3 <
  " " J+ 
#   "
 > 4 A
8 > 41 = <.
 )! J2 .c $
$4"
 #

 =
7
 ' 1 &Common Law #
  
 # Civil Law I4
  

+" "/ + " ; ?I4
  
 # J  3 " 1  5-/3 "

– #
  
 # ; – 3  
    & 
 )
#
  
 
.(T) " A$/ 
  " X2 A$/  0  '"

(1)
Pamela Samuelson, Symposium on U.S.-E.C. Legal Relations: Comparing
U.S. and EC Copyright Protection for Computer Programs, op. cit., p.p. 281, 298-
299.
%LL -
 @ L 
 LL3  LL 
 LL L  LL  LL 3 <LL
 ! LL LL
 l"LL
 #LL!2 LL
&cL 
 :L. L
 L" 
 &@ 
 ')! A$/ " 
 c 
  

 @ 
 &3
:  & .
  "6
."  B    A$/
Céline M. Guillou, The Reverse Engineering of Computer Software in Europe
and the United States: A Comparative Approach, Columbia-VLA Journal of Law
& The Arts, Vol. 22, Winter 1998, p.p. 540-542.
(2) Pamela Samuelson, Symposium on U.S.-E.C. Legal Relations: Comparing
U.S. and EC Copyright Protection for Computer Programs, op. cit., p.p. 280, 299-
300.
  
""   @.42 < 2 :!2  3 < $
" 1  ""
  "+
3 0
 ! Originality 
3 0  3 $0
  

 3 " 1  5-/3 "
   
&3  
  
C
 @ 

 
  . A
8 B"2  &.$ 4 @0 <. '. # "  .   "

?c$

C
 @  < "  H)
 @0
 <
 S-  #
:
) . "
 :$

 0
  #
&c 
  .
  " 
  A$/ I
 A.  ;
#*
 @ !  3 <
  E7
   ٕ .  6 $
#
  H" 
" 1 " 4" =-
 A
8 H"C "+ " 1 :$ 2 18 &5-/3 "
   + 
.(Q) 3
‫ﺍﻟﻔﺮﻉ ﺍﻟﺜﺎﻟﺚ‬

‫ﲪﺎﻳﺔ ﺍﻟﱪﳎﻴﺎﺕ ﰲ ﺍﺗﻔﺎﻗﻴﺔ ﺍﳉﻮﺍﻧﺐ ﺍﳌﺘﺼﻠﺔ ﺑﺎﻟﺘﺠﺎﺭﺓ‬

‫ﻣﻦ ﺣﻘﻮﻕ ﺍﳌﻠﻜﻴﺔ ﺍﻟﻔﻜﺮﻳﺔ‬

.
 $
 @   
 $ 
 =  
 +.  A$/ J+
 # "

Trade Related Aspects of Intellectual Property Rights (TRIPS)(X )



   ( 2 
 &(GATT) 
 . $

 +. >
(d) Q @$
V  " 
 H   2 
  QWW[/[/Q\ m  :
) # &(WTO) 


.=7


:$  A$/ X


 +.   Q/QU "
  "+


 &
Z 7$ 2 "
 7$  2 5  &
Z =
 c J  ^Q»
.«(QWbQ)  "! =  "2 1/2
9 ! /

:  . 3 <


 A
8  
 "
 " 1  "6
()

Céline M. Guillou, op. cit., p.p. 542-545.


 " 
d
 A$/ 
C
 @   B » :< 2 A$/ +. 1  T/W "
 I
.«-
 #!.
 2 
 =
2 2 5N 2 3 " A$/ X


"
 #
 A$/ !  0 "2 "+ X
 +.  2 E
 1 "+
 >
9 2 : & Z  0
 !2 &
  @$   $/ @

d"8 :  &
C
 @ #
90    c 
  "
 "
 H" 
  58 2 "   ./6 
  
""
 5N - 
 
@ I    &(.
4
 D + " 
) 43 
 04  /6 

.(Q)(.
4
 ')
D" ) 3 N 
 04  ""
 
C


 5-/3 "
 #6
 :'-  9 X
 +.   (QQ) "
  -
. $
9 (
9 !(  2 68 @ c
 (=2) .
C S  +. 1
 4  
 . 
  c
 2 / ! #
 )! d"8  =

@0 /
–  
  
" (  M #  .
 2  " "
9 J
$ -N #  &/  *   4   A$/ "/ 2 – !(
" 
 "
 B"
H + '  " )
." 4 # 4 $/ @ 
 =2
.(T)!( + c
 =2  S A$/ 
  - 

"
 
 "
  - .
 >4 c
  " ( >4  "+
TU A
8 "    F  
 " ( .$ 4  + : !   &" 


C
 @   .
 "3 . 
  " )  
$7
   
& 
.(Y)<  "   \U 
8 9 - 
C
  " !

(1)
Aaron D. Charfoos, op. cit., p. 263.
.TTQ I &@ J &5 *! '
'  (&)

.TTT I &@
 J
 (/)

  
 - 
 +. 1 A$/  &

 
   A
8  -  "+
.(Q)QWW\  
bT #+ H 
 
 =  &X
 +.    &H  2 


& $
 +. 1 
 +.  A$/ "
 J+  < 2 )
 "
 
 2 &

 
    -/ A
8 #-  &X
 +.  4
~$ )8 .
/ 7 ) &"2 .  ! / &
C
 @ "/ + =  

: ! S2 " #  ?(T)Z A   -/
9 Q`T 

 
   5-/2 ""/
.
C
 @ 
  A$/ 
/ D8 <

‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻟﺚ‬

‫ﺗﻄﻮﺭ ﲪﺎﻳﺔ ﺍﻟﱪﳎﻴﺎﺕ ﰲ ﺍﻟﻘﺎﻧﻮﻥ ﺍﳌﺼﺮﻱ‬


:$  
 & 0 $
 " H
  
  
  

Zpbî©@Ûa@óÜÇ@ÑÛû½a@Õy@æìãbÓ@òíb»@ÎbjXg@Zµëþa@òÜyŠ½a

C
 @   + #2 E "  QWWT  
Ya #+  
 "
3 =
 c   ; ?QW\[  
Y\[ #+  
 "
 (7$
)
@ 
 %.
 A
8 "" %  
 )! -2 "+ .H
  
  
A$/  )
 &(7$
) 
C
 @  +  (T) "
  !"" B 
 
C

  "/ + c  
Z =
 . » :

 
 .-( & 
 

,-  :  .QWW\/`/Q\  &(J ) T[ ""


  
 "
  
 )!  ()

.QU[ I &@ J &,%6   >



  

 J+ 
  ) 4( 

 
    5-/3 "" I4
 
 (&)

:


<https://www.wto.org/english/thewto_e/whatis_e/tif_e/org6_e.htm>, (Last
visited 1/4/2016).
 & 
c   "
  .«
 6   "" .   $ 
.(Q)c
 A$/   ‡8   "  
 <$/ B   ! =


" 4
 (TU) "
  A
3 .$
" A$/  )
  
   
. 

 "   » :

 
 .-2 ; ?
C
 @ .  
.« 
 )! #3 9 </"8 m  2" &/
9 / 
Z =

@ @Zòîi…þa@pbÐä–½a@åß@wßa@Ûa@‰bjnÇa@ZòîãbrÛa@òÜyŠ½a
(7$
) 
C
 @  + #2 E "  QWW[  
TW #+  
 "
A$/  
 ) "
 >"
   "+ &QW\[  
Y\[ #+  
 "

c ( – )
 
 – QWWT  
Ya #+  
 " 
 >"

: / " &«"3 . 
  . 
 ')!   » : / .-2 ; ?=

  "" .   $    "/ + c  
Z =
 . »
. 

 "   » : / )  . 
  (T) "
  «
 6
  
 &« 
 )! #3 9 &</"8 m  2" &/
9 / 
Z =

. 
  (TU) "
  A
3 .
  A
8 -

:(T)2 @ (QWW[ #/) "


 )! "M D
 *  


 "   

 &"3 . 
 - =
 c 4"8 :

0- @$ &


C
 @   + "  + D  /  $
   5    ()

&=
 X$
X"
 
 .
   
 H"
 " 1  "   
  
 $

.QWWT/`/T  " 

 & $
-N )
 =
 X$ 
 #>/N 
  
 :  (&)

 " 
 X"
 
 .
  J
 H"
 " 1  "
4
 "
 $
 0-
.!"  T\ I &QWW[/Y/\

 / 

 "
  1"
9 &(<  "   \U 
C
   0) . 
 :$
"$

.(  TU) QWWT #/ " $/ I


4 :
) 3 ?c
 
– $ 5M – D"N 0  #"/ : 
 .
 . 
 
 +.  
4 < 2  &
C
 @  +  ([a) "

."3

ZRPPR@òäÛ@XR@áÓ‰@æìãbÔÛa@‰ë†•@ZòrÛbrÛa@òÜyŠ½a
(Q)
TUUT  
aT #+  
 "
 .
 $
 @    + "
$
»   "  +  / 
 $
  .
 "3 $
   J

+. >
#- 1    #6 $ 
 
"
 6
>
  &«.


 $ 
 =  
 +.  !4]  
 &.
 $
 @  0 
 
"

.(T)(X ) .
 $
 @  

 =
 c  / A$/  I
 -2 9  
 )! - "+
 
TW #+  
 < -    ! &(Q[U #) 
C
 @
"3 . 

c 4 #2 "/ ;"  .
 $
  + 
.)
 
 QWW[
&(Q[b #) c
 (  H% 1 @
 :#3 ')!  & 0 #5> =

 <
    A$/ &m
8 ... (QbQ #) c 
  0  4 /  @

."
 ')!  3 =


.TUUT/`/T   TT ""


 – 
 "
  
 )!  ()

 3 H"
 " 1  "   
 $
 0-
@$ & $
-N )
 :  (&)

.!"  T\W I &TUUQ #/ &=


 X$

 
 .


 1 
‫ﺍﳌﻄﻠﺐ ﺍﻟﺮﺍﺑﻊ‬

‫ﺃﺳﺒﺎﺏ ﺍﺧﺘﻴﺎﺭ ﻧﻈﺎﻡ ﺣﻖ ﺍﳌﺆﻟﻒ ﳊﻤﺎﻳﺔ ﺍﻟﱪﳎﻴﺎﺕ‬


&
 #

  
C
 @ #  
  D ) B"  2 2 "
A$/  2 " | > &
  = $3 ')!  4 A$/ 
/ D8 < " 
:=3 ')!  $  .
/
9 '" / = $3 )!  1 "2 
 =3

@ @ZÑÛû½a@Õ¡@pbî©@Ûa@òíbà§@ïi‰ëþa@…b¤üa@áÇ…ë@ñ†zn½a@pbíüìÛa@Ý/†m@Züëc
  &$
Sui generis 4
 
   
  
 .
 WIPO .
 $$


  
 :  .
 :$
/"
 
"2 "+ &(Q)
 0 J = 4  J-   " F +1 )!
.(T)4
 
 ')
X       

3 X 
 "  5 
   
 
 0 

 +8  CONTU  
 A  H)
 &QWaU #/  
C
 @  

$ !" " 


 1
  ."2 .  
C
 @  + =  

# .:
) 
 D +8 ! 
  2  .! ) ) ( B43 "
 D +N
<
 " $ 0  " .
C
 @ 
    3 
 D   4
.(Y)-2
9 
 ')!    QWWQ #/  3
! $ 3 " 
 1
  $4" 
 
 

 5 #
  .  
9  
9  X
 +.    ; ?H  2 
 - .

(1)
Pamela Samuelson and others, A Manifesto Concerning The Legal Protection
of Computer Programs, op. cit., p. footnote 146 at p. 2348.
(2)
Aaron D. Charfoos, op. cit., p. 266.
(3)
Pamela Samuelson and others, A Manifesto Concerning The Legal Protection
of Computer Programs, op. cit., p. footnote 146 at p. 2348.
 4 
%
  "4  & " A$/ 
"  J % 
 E .
 = $2 " 
 1


 &X
 +.  I4
 @$
 A$/  $
"
 A$/ 07-$

 ""

A$/ 
" D8 : !  "2  
 &=$
 J+    
  J
.(Q) 2   A$/ 
C
 @ 
 

B"

C
 @ 
  D  " 
 1
  ~

 # !1 


 ) 4 3 
  2  *
 ! 'C  "
 $ 4

 @    =  " 
 1
 A ; ?$4" $/  

.(T)



@ @ZÑÛû½a@Õ¡@òíbà§a@òÇŠXë@—/‰ë@òÛìèX@ZbĆîãbq
S  
 &%$   
  ! 
C
 @ #  6 #!2 8
*  58  D"k

 2 . 5N   " c 
   "

C
 @ # M #  ?c 
 @$  D6 D + " / N  ". $
#  
 . $

 -2
9 #%> &$
 
 7
 / 
 #%>
c
  8 :E
 + <$ )
.(Y)
 @   #4- @   6

-
 " &  $
  
 c   "
 ! 1 &2%!
)I  '  '
.' ()

.[\^[[ I &TUUQ^TUUU & !


 &

Pamela Samuelson and others, A Manifesto Concerning The Legal Protection of
Computer Programs, op. cit., p.2313.
.[`` I &@ J &2
  '  '
' 3 .' (&)
(3)
James V. Vergari and Virginia V. Shue, op. cit., p.518-519;
Harvard Law Review, Notes, Copyright Protection of Computer Program Object
Code, Harvard Law Review, Vol.96, No.7, May 1983, p.1742; David Bender,
Symposium: The Future of Software Protection: Protection of Computer
Programs: The Copyright/Trade Secret Interface, University of Pittsburgh Law
Review, Summer, 1986, p. 916.
 G 
.(Q)Convenient at-hand tool ""
  %> "2"  
C
 @ # 

ZbĆî½bÇ@ÑÛû½a@Õy@âbÄã@òîÛbÈÏ@ZbĆrÛbq
<   # < 2 
C
 @ #  
    =2  
Qaa`  +. ) #

 " 
* 
8 -  
 
"
 +. 1 >4  
/
9
X
 +.  &QWW` 
C
 @ ( 
 "! 
   & >"
"!
"
 #-  A$/ =  "+ .(QW`Q  
 @ $
  +.  &QWW[
@   +  ""
  
 @ 1  
 : ! S2 2 
C
 @ 
/ %$    
C
 @ 8 : + )
&.$ 4
 "
  $
 
C

9 < M #  .(T)Automatic transnational protection " "$



 7$


 ?-2
9 

  7

9 
 
 4 " 
C
 @ #

E >4   


 c%
 ) @ #

   H2  #"4 >
S$
.B43 . 


(1)
M. Joseph Hinshaw, The Role of Standardization and Interoperability in
Copyright Protection of Computer Software, Communication Law and Policy,
Vol.4, Issue 3, 1999, p.304;
Dennis S. Karjala, A Coherent Theory for The Copyright Protection of
Computer Software, op. cit., p.53.
&"3 . $
J
 
  d" =
 c   
< 2 5.
 E ) "+
.c
 
0
 S
 ! S2 
C
 @  + M
See, Dennis S. Karjala, Copyright Protection of Computer Documents, op. cit.,
p. 984.
" 
 =3 / ;
 = < 8 )8 ?= $0
 A$/ " " :
) M 
 A
' 4 H)
 J
 
   2    > &
C
 @   
  +N D

. - c
 4"  A
8 B"C "3 . $
D

(2)
David Bender, op. cit., p. 917; Dennis S. Karjala, Copyright Protection of
Computer Documents, Reverse Engineering, and Professor Miller, University of
Dayton Law Review, Vol. 19, 1994, p. 975.
  
@ @ZôŠ/þa@òàÄãþa@åß@òîÜàÇ@Šr×c@ÑÛû½a@Õ¡@òíbà§a@‰bjnÇa@ZbĆÈia‰
< 2  &I.
 =$0
 #"  50
 # 58 -  D 41 5 # 
/ 
 #%> 1 < M 

 ? 5
 A$/ 
 #  D. 1  $
#  $

 2 .  "/ @7  "+ 5
 "8 2 A
8 -N . 7

J6
 )  
 #%> 1 $  A
8 d  < M Trade Secret H
 

.(Q)
 #4-


@ @Zpbî©@ÜÛ@òí…b–nÓüa@òîàçþa@ZbĆßb/
4-
 .$ $

9 &

 " +1  $
" +1 !j

9
 J   # / ;
  - A
8 :
) B"2 " &
 ')! d N
."!3 :$ @ 
C
 @ #  4  

 ?5" /1  
 A$/

 D J- "
 &
C
 @ #  
   0  2 2 "
I4
 "
 "   8 @0 / !2  # "M 2 + 
 

."
  . 
 ! &

(1)
Harvard Law Review, Notes, op. cit., p. 1743; James V. Vergari and Virginia
V. Shue, op. cit., p. 523.
  
‫ﺍﳌﺒﺤﺚ ﺍﻟﺮﺍﺑﻊ‬

‫ﺍﻟﻮﺿﻊ ﺍﳋﺎﺹ ﺑﺎﻟﱪﳎﻴﺎﺕ ﻣﻔﺘﻮﺣﺔ ﺍﳌﺼﺪﺭ‬


:‫تمھيد‬
 8 A$/ X3  #  .Open source "
  . 
  8
H)
 H
 <- / d4 ; &c 
 I4
 Source Code "
 " 
< 2 c  H2  "
 "  !2  &$
 $
9 S

 <$-.
"4 
 
   =
2  c
 " >4 c 
 2 D" 
<$/  $0 1  
 0   9 <% A$/ 
  I )
?'""/8 
 2   A$/ 9 5$
$
 
 7
B"M  
9    %"
9 < 3 "2
9
.9.$

6  # & 2 =$0  


  "
  . 
 ! / 2
. =$0  "
  . 


‫ﺍﳌﻄﻠﺐ ﺍﻷﻭﻝ‬

‫ﻣﺎﻫﻴﺔ ﺍﻟﱪﳎﻴﺎﺕ ﻣﻔﺘﻮﺣﺔ ﺍﳌﺼﺪﺭ‬


  ; ? 
   *  "
  . 
  2"
; ?Unix A 7 #      :  &C 7
    

"
 "      "6 C 7
  J .7$
 :$  <   562  
.(Q):
)

9 Unix #  I4


:J+  :  & .


  "6
()

<ar.wikipedia.org/wiki/"_F .>, (Last visited, 14/4/2015).

  
"  ! ""
  . 
  " <$/ @$0 
$.
 XC
 

Free Software " 
 
 C"   
 % 2  X2 H)
 
 
7 # 

 ! &GNU D  C
 ')! A/ ،Foundation
A =
 7
c   D0  .
 &   <4 #   
.(Q)GNU/LINUX

 $/   c 
 I4
 "
 "   8 "
  . c
 "
.(T)4Z A$/ </6  <
" <4  <$  2 (c 2 #"4 ) I4 H2 
& J2  8 ! "
  . 
 
  " 
 3 .

:(Y)!

.E* H3 c 
 7  ^Q


 .#"4 
   = < % c 
 / . "  ^T
."
 )! @
@ 0 ! "
 " 

.4Z "/  c 


 m J6 "/8  ^Y

.J
 #"4  
 A$/  
 @>0 ٕ &c 
   ^[

:  N A$/ GNU D  I4


 J+ 
   ()

<http://www.gnu.org/>, (Last visited, 14/4/2015).


-
 " &  " &H
  
  
 
 &M$  9 'K  '  .' (&)

.Q` I &TUQT & !


 &

(3)
Brian W. Carver, Share and Share Alike: Understanding and Enforcing Open
Source and Free Software Licenses, Berkeley Technology Law Journal, Volume
20, Issue 1, 2005, p. 451.
 " 
‫ﺍﳌﻄﻠﺐ ﺍﻟﺜﺎﻧﻲ‬

‫ﲤﻴﺰ ﺍﻟﱪﳎﻴﺎﺕ ﻣﻔﺘﻮﺣﺔ ﺍﳌﺼﺪﺭ‬

/ 6 " d)   <"  Open Source "


  . 
 8
I4
 "
 "   8 2 : > &.
 $
 "/ + =  
 

$  .B43 c
 / c
 ')! 6   + ] <
$
c 

:/
 >  > 41 < 2 

@ @Z‰†–½a@sìnÐß@wßbã@Ûa@Éí‹ìmë@Ýí†Èmë@ƒã@¿@Õ§a@Z@üëc
– )
 .
 – "
  . 
  
 3 
  ". 
&"
 "  4 &c 
 m  #  2 <
@ 
 ')! #"4   2
J6 /  -  S  2
9 &< /  
 . 
   &<6 &<$"
"
 H) c 
 = - 
 I4
 0  #  :
)  .c 

d  
 "$
 c
 / F .
 "
 d)  6 I%4
 :$ .F .

.(Q)c 
 J6 "
 m $

C
 )% 1  "
9
:$ ( ‚04 " / D  A
8 "2 #"4 
 "  )
 
 "  8
!   
6$ N Free $ 2 :
)  =
 .  2 c

A
8 B"2 &(T) 
 
   &Free Software S$0 & 
 

:$  ""
 :  &‚04 " / )! &d) 
 ) 4
 c
   " /1

()
.١٤٢ ‫ ص‬،‫ مرجع سابق‬،‫ محمد حسن عبد ﷲ على‬.‫د‬
2  &"
  . 
 d) 
< d)  A$/ 
1"$
S$0
 )! #"4  (&)

 6 $
  .@ .
 E      ٕ !!  "

9 "
 $0
 > #"4 
.!"  QYa I &@
 J
 :/
 >

  
J"  )! .(Q)GNU-Linux 7
 # 2 A$/  (  D6 

$ " 
 S-  2 A
8 &"
  . 
  XC &
  " 

 J 2 E : ! X$ &“Free as in Freedom” : + ; “Free”
.(T)  $ +
 X. 

@ @ZsìnÐÛa@‰†–½a@pbî©Ši@òÈîju@òî•ì–/@ZbĆîãbq
. 0 ""   
 >
 E "
  . 
 
(Y)
A
3  
 @$02 c 
 ) " H)
 I4
 2 " Linux c 


 A 1 ""/ #+ " .
 .' 0 A
8 #

  /"
9   N A$/ <

" 
  2  " #

 5 2 $ 4  c 
 )!  0
D 0
 

:
) M #  .>/
9 :
)   )8 ? 0
 51C
< 2 8 H2 D 
 )
.   ( "
  . c
  E A
8 <.
 E J" H)
 !
.([)/

.Qa^QbI &@ J &M$  9 'K  ' .' ()

:<  2  ! ' % ) ; (&)


"The term "free software" is sometimes misunderstood, it has nothing to do with
price. It is about freedom. Here, therefore, is the definition of free software …….
Since "free" refers to freedom, not to price, there is no contradiction between
selling copies and free software."
Richard Stallman, The GNU Operating System and the Free Software
Movement,<http://www.oreilly.com/openbook/opensources/book/stallman.html >,
(Last visited 14/4/2015).
#  )
 
 GNU D  $02 
 "
  . c
 "2 ! Linux c  (/)
F . c  X"
 X 
$02 
 Linux ! 3 c 
   &GNU/Linux
 "6
 "  .GNU/Linux 7
 # 9  
GNU D   ! 0 # &"

:J+  A$/ D - 
 )!  .

<http://www.gnu.org/gnu/linux-and-gnu.html>, (Last visited, 14/4/2015).
.b[^bYI &@ J &M$  9 'K  '  .' (1)

 & 
 ""
 : ! 2 >  @
 $

 < M B42  
 #  : ! 2 &F .
 "
 H) c 
     ! 

"
 c  /  J  1 E
 2 " )
&c 
 6 8 ! 3 )!
#-

  #"/ )!    1 < 2 A$/  "C .  c F .

#
 #  &c 
 I4  #!  2 "   #!" #"/ 1 &E

.(Q)c 
 A$/ 
C
 @  
9
 . c
 d)  $/ #  
 .$.
   
< M 
  
" c 
  " &   0 A
8   c 
  / ! "

c 
 M 

 ?<$/   >" 4"8 A
8 #

 5 2   

/"  ! :
) M .%"    0  %"     * " "
 F .
H)
 "
  )M .c 
  0 A$/  %
  
 < #   ( $
E

?  3 = = 2 @    ""   2    9 c 
 A$/ 4"2
"2  ) ٕ .4] c   <" "+ 2 &c $
  % "
 - "
)8 2 &:  c  ""  ( 
  c $
$3 4
 A$/ >"



 .9  9.    < M $3 c 
 / $    >"
 
"
 H) c 
  0  #! 

C
 @  
  3 .
.(T)F .


&<   =
 
 <
>4  -  H"
 .
     2 "
I4
 J-
 42 9 &
C
 @ #     0 &
 

"/  
  A$/ 
" D8 : ! 2  .  ."
  . 


.ba^bb I &@
 J
 ()

.!"  aY I &@
 J
 (&)

 / 

  .
 "3 . 
 0 J 
 0 #  &
C
 @
0 J # X
 A$/  2 #2 †
 ) @  #  
C
 @ # 
J #  2 #2 †  @  #  D 41 5 #  
 / 41
) @   / S.
 *  $
 #  
 
  $
 0
$
 @    2 / 6 
9  +
9 -
9 $
2 #2 †! " 

†  )
 .


') 
  5> B" " >4  $%3 :$ / N 
:

 
 A$/ $    :
) ?  )
  3

.
C
 @ #  
  5> B" : ( 

.B42  ( 


  5> B" :  ( 

 1 

Powered by TCPDF (www.tcpdf.org)

You might also like