Article Review 2

Ester Martinez Urias
CYSE201S
March 24, 2024
Article Review 2
Adapting Social science in Iraq laws
The following article that I chose for my Article 2 review was “Cybercrime Laws in Iraq: Addressing
limitations for Effective Governance.” As an American citizen learning cybersecurity, I know it is
important to know how my country handles issues regarding cybercrime. But, it is also vital for me to
know how other countries implement cybercrime laws. Iraq is a country in the middle east with different
social norms and social structures compared to those here in the United States. In the article, we learn
how Iraq is a developing country. The study that is conducted in this article experiments legislative and
administrative laws pf cybersecurity, exploring the limitations and providing suggestions for effective
governance. The data collection is then sent to their NVIVO software, dividing them into four themes of
different concepts which were limitations in current laws.
There were five methods used in this study. Research philosophy, a basic research procedure that collects
generalized results before proceeding through the data collection procedures. To do so, researchers utilize
interpretivism philosophy to pursue the methodological procedure for the present investigation, analyzing
norms, and perceptions.
Research methodology, utilizes qualitative research methodology. It determines present legislative
frameworks in Iraq regarding cybercrime. Analyzing the administrative measures that have been adopted
to lessen cybercrime risks in their country.
Sampling strategy and unit of analysis, the sampling strategy technique allows for more accurate
responses, within Iraq. The unit of analysis in this study refers to the population that researchers have
focused on for their data collection. In this study, the target is defined as eight legal experts from Iraq.
The small sample size is due to the qualitative methodology, avoiding thematic saturation in responses.
Data collection instrument, analyzes laws for controlling cybercrime in Iraq. This addresses the
limitations, as well as expands their perspective to achieve effective governance. Using the eight legal
experts in the experiment, the questions asked and the answers each give are examines and compared.
Data analysis, using the NVivo software, they generalize each answer given to them by the selected legal
experts, giving them general results. The gathered data is then utilized further to prevent repetition in responses.

After going over the method and study, one can determine how using tools such as NVivo software can
help summarize and interpret ideas better. By using PowerPoint, there are tools like such that help
eliminate repetitive wording or mistakes. Powerpoint and other writing documents analyze your work
and help you make it better or understandable.
Now, as to the concerns one may have regarding challenges and contributions of marginalized groups, i
believe that since the study was done in Iraq, this really relates tho those groups who are able to access
these networks. Since the country is still underdeveloped, not everyone is privileged enough to have the
opportunity to use certain technologies. Compared to the United States, there could be a similar study but
focused on larger populations. Legal experts, youth who use technology, companies and organizations.
The study may vary.
Overall, the contribution of this study helps eliminate and mitigate risk factors associated with cybercrime
in our society. Allowing a safe space for those who use it, as well as adopting new legislative action.
Citation Page
Article Review 2
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/186/68

Leave a Reply

Your email address will not be published. Required fields are marked *