The field of information technology ethics represents a significant and growing area of study in the contemporary era, especially because new ethical problems are appearing that people did not face before. One of the main difficulties is how these problems are usually studied. Most of the time, researchers treat them like general social issues they examine how technology affects society and use ethical theories to judge those effects afterwards. In light of this, the present study explores the topic: “Shariah Guidelines for the Use of Modern Technology from the Perspective of the Qur’an and Sunnah.” This research uses a descriptive and analytical method. It aims to: define the concept of Shariah guidelines, show their foundations in the Qur’an and Sunnah, examine the religious, Islamic preaching (da‘wah related), and legal (Fiqh related) rules that control how technology is used. This study is divided into an introduction, four main chapters, and a conclusion, followed by a list of key sources and references. The introduction outlines why the topic was selected, the research problem, questions, objectives, and overall structures. Chapter One defines what Shariah guidelines mean in language and technical terms. - Chapter Two investigates these guidelines based on the Qur’an and Prophetic texts. - Chapter Three explores about how technology use relates to Islamic beliefs and efforts to spread Islam (da‘wah). Chapter Four discusses the rules of Islamic law that apply in using of technology. Key findings show that ethical rules based on Shariah are essentials to protect people’s digital rights, whether the content is free or paid. According to Islamic law, it is not permissible to violate these rights, for example: by accessing content without permission, stealing intellectual property, or using harmful software—unless there is a valid reason accepted in Shariah. Such exceptions might be allowed if the government believes that certain digital platforms are dangerous to the country’s politics, cultural, social, moral, or security risks to society.
Ahmad Ibn Hanbal. (n.d.). Musnad Imam Ahmad Ibn Hanbal (Shu'ayb Al-Arna'ut, Ed.). Syria: Al-Resalah Foundation.
Ibn Majah. (2009). Sunan Ibn Majah (Shu'ayb Al-Arna'ut et al., Eds.). Syria, Lebanon: Al-Resalah Al-Alamiyyah.
Ibn Manzur. (n.d.). Lisan Al-Arab. Beirut, Lebanon: Dar Sadir.
Al-Tayalisi, D. (1999). Musnad Abu Dawood (Muhammad Bin Abdul Mohsen Al-Turki, Ed.). Egypt: Dar Hijr.
Al-Bukhari, M. I. (n.d.). Sahih Al-Bukhari. Egypt: Al-Amiriya Press; Reprinted by Dar Tawq Al-Najah, Beirut.
Al-Tirmidhi, M. I. (1937). Al-Jami' Al-Sahih (Sunan Al-Tirmidhi) (Ahmed Shakir, Ed.). Egypt: Mustafa Al-Babi Al-Halabi Press.
Kingdom of Saudi Arabia. (2021). Coexistence and civilizational communication. Riyadh: King Fahd National Library.
Joules, A. J. (2014). Shariah regulations for the use of modern communication platforms. Paper presented at the International Conference "Modern Media and Its Impact on Society."
Al-Zarqa, M. A. (2004). General introduction to Islamic jurisprudence. Damascus, Syria: Dar Al-Qalam.
Al-Saadi, I. A. (2013). Studies on the distinctiveness of the Islamic nation and Orientalists' perspectives. Qatar: Ministry of Awqaf and Islamic Affairs.
Al-Sufyani, A. M. (1988). Permanence and universality in Islamic Shariah. Mecca, Saudi Arabia: Al-Manara Library.
Al-Qaradaghi, A. M. (2025). General ethical guidelines in economic transactions. Retrieved February 27, 2025.
Al-Maani Al-Kabir Dictionary. (n.d.). Retrieved from https://2u.pw/axedvah
Noor, A. A. (2020). The negative effects of information technology on adolescents' cognitive and value development: A descriptive analytical study. Arab Journal for Scientific Publishing, (22).
Habermas, J. (2012). Ethics and communication (A. H. Abu Al-Nur & A. Al-Nur, Trans.). Beirut, Lebanon: Dar Al-Tanweer.
Hassan, A. H. M., El-Ddesoky, E. M. A., Deib, A. A. M. El, Mahmoud, H. A. A., Al-Haddad, A. W., & Elsayed, N. M. M. (2025). Shariah Guidelines for the Use of Modern Technology from the Perspective of the Qur’an and Sunnah. International Journal of Academic Research in Business and Social Sciences, 15(6), 815-825.
Copyright: © 2025 The Author(s)
Published by Knowledge Words Publications (www.kwpublications.com)
This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode