The Mechanism of Preventing Cybercrimes in Iraq
DOI:
https://doi.org/10.70411/MJLS.4.1.2026269Keywords:
Cybercrime, Cyber laws, Hacking, VirusAbstract
Despite the adoption of technological measures by corporate organisations and individuals, the frequency of cybercrimes has increased over the last decade. As the number of computer systems and internet users continues to grow rapidly worldwide, accessing any information within a few seconds has become easier through the internet, a vast medium for data exchange and global communication. The objective of this paper is to discuss cybercrime, its categories, preventive mechanisms, the professions contributing to its rise, its impact on businesses, and the necessary measures to be taken to control cybercrime. The result showed that there is a need for cyber police who are to be trained specially to handle cybercrimes in Iraq. In addition, a Central Computer Crime Response unit should be created to advise the government and other investigative agencies and to guide and coordinate computer-related crime investigations.
References
Bequai, (1998). A guide to cyber - crime investigations”, Computers & Security, vol. 17, issue 7.
Gordon, L. A. et al., (2003) A Framework for Using Insurance for Cyber-Risk Management, Communications of the ACM, 46(3(.
Kerela (2006): Cyber Crimes on the rise in state - Kerala: The Hindu Monday Oct 30.
Leagal Info (2009), Crime Overview Aiding and Abetting Or Accessory, Available at: http://www.legalinfo.com/content/criminal-law/crime-overview-aiding-and-abetting-or-accessory. html, Visited: 28/01/2012.
N. Leontiadis, T. Moore, and N. Christin. (2011) “Measuring and analyzing search - redirection attacks in the illicit online prescription drug trade”. In Proceedings of USENIX Security 2011, San Francisco, CA, August.
N.A. Azeez, O. Osunade, (2009). Towards ameliorating cybercrime and Cyber security (IJCSIS) International Journal of Computer Science and Information Security, Vol. 3, No. 1.
Neilson Ratings. (2011). Top ten global web parent companies, home and work. Retrieved February 24, 2012.
Nilkund Aseef, Pamela Davis, Manish Mittal, Khaled Sedky, Ahmed Tolba (2005), Cyber-Criminal Activity and Analysis, White Paper, Group 2.
S. Hinde, (2003) “The law, cybercrime, risk assessment and cyber protection”, Computers & Security, vol. 22, issue 2, pp. 90-95, February.
S.W. Brenner, (2010) Cybercrime: Criminal Threats from Cyberspace, an Imprint of ABC-CLIO, LLC, Santa Barbara, CA, ISBN 978-0-313-365461.
Shantosh Rout (2008), Network Interferences, Available at: http://www.santoshraut.com/ forensic/ cybercrime.htm, Visited: 28/01/2012.
www.cyberlawportal.com .
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Modern Journal of Legal Studies

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The users are free to:
- Share — copy and redistribute the material in any medium or format.
- Adapt — remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.









