منابع مشابه
Hadith Web Browser Verification Extension
Internet users are more likely to ignore Internet content verification and more likely to share the content. When it comes to Islamic content, it is crucial to share and spread fake or inaccurate content. Even if the verification process of Islamic content is becoming easier every day, the Internet users generally ignore the verification step and jump into sharing the content. “How many clicks ...
متن کاملWestern Works and Views On Hadith : Beginnings , Nature , and Impact
This is a brief history of the beginning of the Orientalist studies of hadith, which will shed light on the most prominent works and views Western scholars on hadith, the nature as well as the impact of their outcomes on Muslims and Western worlds. The beginning era of such studies was between 1890 to 1950. In this period, two influential and founding works of Ignatz Goldziher and Josef Schacht...
متن کاملtraditions of transmission of hadith in a comparativeanalysis of orientalists’ views
the issue of transmission of hadith, in western views, is an influential factor concerning the historical reliability of hadith. many western scholars dealing with muslim tradition assumed that in the main the hadith had been transmitted orally and consequently through the oral transmission process, it has been distorted and changed. the reason for this idea is the existence of some prophetic h...
متن کاملOrientalists’ humanly untaught prophet
This paper has studied orientalists’ arguments for Prophet’s awareness of reading and writing. Their claim has been founded on two historical narrations. As narrated, the Prophet has written the words Mohammad ibn a’bdollah down at the time of Hodaibiyah and at the end of his life he ordered the people around him to bring pen and paper to write some advices for them. Considering the Prophe...
متن کاملAdopting Hadith Verification Techniques in to Digital Evidence Authentication
Problem statement: The needs of computer forensics investigators have been directly influenced by the increasing number of crimes performed using computers. It is the responsibility of the investigator to ascertain the authenticity of the collected digital evidence. Without proper classification of digital evidence, the computer forensics investigator may ended up investigating using untrusted ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Academic Research in Business and Social Sciences
سال: 2019
ISSN: 2222-6990
DOI: 10.6007/ijarbss/v9-i11/6677