The Mechanism of Preventing Cybercrimes in Iraq

Authors

  • Zinah Younis Hussein Al-Mustansiriya University

DOI:

https://doi.org/10.70411/MJLS.4.1.2026269

Keywords:

Cybercrime, Cyber laws, Hacking, Virus

Abstract

Despite the adoption of technological measures by corporate organisations and individuals, the frequency of cybercrimes has increased over the last decade. As the number of computer systems and internet users continues to grow rapidly worldwide, accessing any information within a few seconds has become easier through the internet, a vast medium for data exchange and global communication. The objective of this paper is to discuss cybercrime, its categories, preventive mechanisms, the professions contributing to its rise, its impact on businesses, and the necessary measures to be taken to control cybercrime. The result showed that there is a need for cyber police who are to be trained specially to handle cybercrimes in Iraq. In addition, a Central Computer Crime Response unit should be created to advise the government and other investigative agencies and to guide and coordinate computer-related crime investigations.

References

Bequai, (1998). A guide to cyber - crime investigations”, Computers & Security, vol. 17, issue 7.

Gordon, L. A. et al., (2003) A Framework for Using Insurance for Cyber-Risk Management, Communications of the ACM, 46(3(.

Kerela (2006): Cyber Crimes on the rise in state - Kerala: The Hindu Monday Oct 30.

Leagal Info (2009), Crime Overview Aiding and Abetting Or Accessory, Available at: http://www.legalinfo.com/content/criminal-law/crime-overview-aiding-and-abetting-or-accessory. html, Visited: 28/01/2012.

N. Leontiadis, T. Moore, and N. Christin. (2011) “Measuring and analyzing search - redirection attacks in the illicit online prescription drug trade”. In Proceedings of USENIX Security 2011, San Francisco, CA, August.

N.A. Azeez, O. Osunade, (2009). Towards ameliorating cybercrime and Cyber security (IJCSIS) International Journal of Computer Science and Information Security, Vol. 3, No. 1.

Neilson Ratings. (2011). Top ten global web parent companies, home and work. Retrieved February 24, 2012.

Nilkund Aseef, Pamela Davis, Manish Mittal, Khaled Sedky, Ahmed Tolba (2005), Cyber-Criminal Activity and Analysis, White Paper, Group 2.

S. Hinde, (2003) “The law, cybercrime, risk assessment and cyber protection”, Computers & Security, vol. 22, issue 2, pp. 90-95, February.

S.W. Brenner, (2010) Cybercrime: Criminal Threats from Cyberspace, an Imprint of ABC-CLIO, LLC, Santa Barbara, CA, ISBN 978-0-313-365461.

Shantosh Rout (2008), Network Interferences, Available at: http://www.santoshraut.com/ forensic/ cybercrime.htm, Visited: 28/01/2012.

www.cyberlawportal.com .

Downloads

Published

2026-01-01

How to Cite

The Mechanism of Preventing Cybercrimes in Iraq. (2026). Modern Journal of Legal Studies, 4(1), 38-48. https://doi.org/10.70411/MJLS.4.1.2026269