{"id":312,"date":"2024-04-21T21:17:57","date_gmt":"2024-04-21T21:17:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/?p=312"},"modified":"2024-04-21T21:17:57","modified_gmt":"2024-04-21T21:17:57","slug":"article-review-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/2024\/04\/21\/article-review-2\/","title":{"rendered":"Article review 2"},"content":{"rendered":"Article 2 review<br \/>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/186\/68<br \/>Cybercrime Laws in Iraq: Addressing Limitations for Effective Governance<br \/>Cybercrime happens in every country, but there are laws in place to try and deter<br \/>cybercrime from happening. Countries like Iraq do not have the policies in place to deter these<br \/>crimes and the government is unstable. It is one of the most open and vulnerable in the world<br \/>because it is ungoverned. Due to Iraq having conflict and war emerging, they have decided to<br \/>reject the anti-cybercrime laws.<br \/>I find this upsetting because the world is entering the age of technology and the people<br \/>of Iraq have no funds or policies to deter cybercrime. This article&#8217;s topic can relate to policy<br \/>studies, network science\/social networks, and media analytics, all of which we have covered in<br \/>class. The Iraqi government hardly ever releases information on the sorts of cybercrime that<br \/>occur there, so that relates to media analytics. We have studied policies, but Iraq has no<br \/>specific legislation on cybercrime, so this relates to \u201cpolicy studies\u201d. The purpose of this article is<br \/>to help Iraq improve its cybersecurity governance.<br \/>The article uses research philosophy and qualitative research to determine and obtain<br \/>results that would satisfy the study. According to the article, research philosophy is an<br \/>investigator&#8217;s basic research paradigm before proceeding through the data collection procedure.<br \/>This article utilizes qualitative research methodology to determine the recent legislative<br \/>frameworks thus implemented in Iraq regarding cybercrime. The reason behind using this<br \/>method allows the researcher to get an in-depth understanding of the research objectives.<br \/>The study uses NVivo software to get the data analysis. After they use the software, the<br \/>gathered data will be utilized further for thematic analysis because it helps researchers analyze<br \/>the data effectively and avoid repetition in the responses. 3 of the respondents believed that the<br \/>law enforcement agencies in Iraq lack effective resources, expertise, and training to investigate<br \/>cybercrimes, negatively impacting the safety of the associated individuals and<br \/>companies(Theme1: cybercrime challenges). This makes sense because Iraq has limited<br \/>resources and investments.<br \/>We talked about the media and how it affects the people living there. The article relates<br \/>to some of the modules we talked about because it shows how people are affected by<br \/>cybercrime. Iraq has no security so the people are open to all types of dangers, scams, and<br \/>phishing. This is a concern for everyone living there because people are susceptible to<br \/>cybercrime. No policies will lead to businesses losing money and individuals losing money. The<br \/>absence of cybersecurity will ultimately lead to the demise of Iraq.<br \/>In conclusion, this article analyzed the administrative laws and limitations. It concludes<br \/>with different themes and data from the research provided. The article reveals many flaws in the<br \/>legislative system. The result of this has shown how Iraq lacks training, resources, and working<br \/>agencies","protected":false},"excerpt":{"rendered":"<p>Article 2 reviewhttps:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/186\/68Cybercrime Laws in Iraq: Addressing Limitations for Effective GovernanceCybercrime happens in every country, but there are laws in place to try and detercybercrime from happening. Countries like Iraq do not have the policies in place to deter thesecrimes and the government is unstable. It is one of the most open and vulnerable in&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/2024\/04\/21\/article-review-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28624,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/posts\/312"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/users\/28624"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/comments?post=312"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/posts\/312\/revisions"}],"predecessor-version":[{"id":313,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/posts\/312\/revisions\/313"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/media?parent=312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/categories?post=312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/tags?post=312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}