Self-Cybercrime and Cybersecurity
DOI:
https://doi.org/10.64184/ajlps.V2.I3.Y2025.P958-990.177Keywords:
Digital crimes, Cyber security, Traditional crimes, Economic crimes Information security, Digital privacy.Abstract
This study focuses on the problem of conceptual confusion between digital crimes and traditional and economic crimes on the one hand, and between cybersecurity, information security and digital privacy on the other hand, a confusion that results in a lack of understanding of the legal nature of these phenomena and a lack of clarity in the mechanisms to confront them. The importance of this study is manifested in its scientific aspect by contributing to the control of terminology and identifying the essential differences between them in order to enhance the theoretical construction in criminal jurisprudence, and in its practical aspect by guiding the legislator and decision makers towards the development of legislation more accurate and appropriate to the nature of the digital environment.
The study adopted the descriptive analytical approach by extrapolating legal texts and doctrinal opinions and analyzing them in the light of contemporary technical developments. The results concluded that digital crimes represent an independent criminal phenomenon with a special technical environment, while cybersecurity remains a broad preventive framework that differs in content from information security and digital privacy, which requires the formulation of precise legislative treatments to accommodate these differences and achieve integrated protection of digital security.
References
First: Linguistic Dictionaries
1. Ibn Manzur, Lisan al-Arab, Al-Amiriya Press, Bulaq, Volume 8, 1st Edition, no date given.
Second: Legal Books
1. Abdullah Suleiman, Explanation of the Penal Code (General Section - Crime), University Publications Office, Lebanon, 1998.
2. Ghassan Rabah, Economic Penal Code, Al-Halabi Legal Publications, Beirut, Lebanon, 2012 ed.
3. Muhammad Jibril Ibrahim, Criminal Liability for Robot Crimes: A Prospective Analytical Study, Dar Al-Nahda Al-Arabiya, 2020 edition.
4. Muhammad Ali Suwailem, Criminal Protection of the Stock Exchange: Between Procedural Aspects and Substantive Provisions: A Comparative Study, Modern University Office, 2018.
5. Hana Mustafa Al-Khubairi, Cybercrimes and the Regulation of Digital Currencies - A Legal Study in International Legislation and Agreements, Dar Al-Nahda Al-Arabiya, 2022.
6. The National Cybersecurity Authority, Basic Controls for Cybersecurity, Kingdom of Saudi Arabia, Riyadh, 2018.
Third: Research and Research Papers
1. Ahmed Hassan Abu Al-Hassan, The Extent of the Impact of Digitization on the Severity of Economic Crimes, a study published in Aswan University Journal For Humanities, Volume (4), Issue (1), Faculty of Law, Aswan University, 2024.
2. Dr. Ahmed Hosni Ali Ashqar, Digital Privacy in the Era of Artificial Intelligence (A Reading of Jordanian and Palestinian Legislation), a research published in the Journal of Al-Quds Open University, Issue 66, Volume 7, Palestine, Ramallah, 2025.
3. Balasal Bint Nabi Yasmine, Muqdad Nabil, The Right to Digital Privacy, a research published in the Al-Mustaqbal Journal for Legal and Political Studies, Volume 5, Issue 1, Yahya Fares University of Medea, Medea, Algeria, 2021.
4. Hakim Sayyab, The Distinctive Features of Cybercrimes from Traditional Crimes, a research published in the Journal of Studies and Research, Volume (2009), Issue (1), University of August 20, 1955 Skikda, 2009.
5. Dr. Dhiyab Musa Al-Badayneh, Cybercrimes: Concept and Causes, a paper presented at the Scientific Forum on Emerging Crimes in Light of Regional and International Changes and Transformations, Jordan, Amman, 2014.
6. Dr. Rahmouni Muhammad, Characteristics of Cybercrime and its Areas of Use, a study published in Al-Haqiqa Journal for Social and Human Sciences, Issue (41), Ahmed Draia University - Adrar, Algeria, 2017.
7. Rashid bin Hamad Al-Balushi, Evidence in Cybercrime, a study published in the Journal of the Faculty of Law for Legal and Economic Research, Volume (2008), Issue (1), Alexandria University, 2008.
8. Reda Ibrahim Saleh, A Study of the Impact of Information Security Management on the Success of the Accounting Information Systems Security Program with a Field Study of Egyptian Companies, Journal of Contemporary Business Studies, Volume 6, Issue 10, Part One, 2020.
9. Saad Fahd Saad Adbis Al-Mutairi, The Concept of Cybercrime and Its Characteristics, a study published in the Legal Journal (a semi-annual peer-reviewed scientific journal), Volume 16, Issue 5, 2023.
10. Faisal Ja'ilan Al-Azmi, The Problem of Criminal Prosecution in Cybercrimes, a study published in the Journal of the Faculty of Sharia and Law, Tanta, Volume (39), Issue (2), Cairo University. Egypt, 2024.
11. Qasmiya Muhammad, Sources and Methods of Money Laundering Operations, Journal of Legal Studies and Research, Volume 9, Issue 1, 2024.
12. United Nations Office on Drugs and Crime, Laboratory and Scientific Affairs Section of the United Nations Office on Drugs and Crime in Vienna, Crime Scene and Physical Evidence (Awareness-Raising for Non-Criminal Analysis Staff), 2009.
13. Musa Masoud Arhuma, Criminal Policy in Confronting Cybercrimes, a study published in the Journal of Legal Studies, University of Benghazi - Faculty of Law, Issue 17, 2008.
14. Mansour Fahid Saeed Al-Harthi, Obstacles to Proving Information Technology-Related Crimes, a study published in the Legal Journal (a specialized journal in legal studies and research), a peer-reviewed scientific journal, Volume (15), Issue (4), 2023.
15. Dr. Zuhair Khuraibat Khalaf, Confronting Economic Crimes in Iraqi Legislation, a study published in the Journal of Basra Studies, Year (20), Issue (60), 2025.
16. Ziad Abdel Razzaq, Mustafa Zaghbi, Economic Cybercrimes: Concept and Motives, a study published in the Journal of Legal and Economic Studies, Volume (7), Issue (1), Algeria, 2024.
Fourth: Theses and Dissertations
A. Theses
1. Enas Ibrahim Al-Sheety, "Evaluating Information Security and Privacy Policies in Educational Institutions in the Kingdom of Saudi Arabia: An Applied Study at Qassim University," unpublished master's thesis, Qassim University, 2019.
2. Abdullah Hussein Ali Mahmoud: "Theft of Computer-Stored Information," Master's Thesis, Faculty of Law, Ain Shams University, 2001.
3. Abdullah Hussein Ali Mahmoud, "Theft of Computer-Stored Information," Master's Thesis, Ain Shams University, Faculty of Law, 2001.
4. Muhammad Nimah Kazim, "Trends in Criminal Policy in Combating Economic Crime," Master's Thesis, Al-Mustansiriya University, College of Law, Iraq, Baghdad, 2021.
5. Noura Al-Aqoun and Abdul Karim Basmaeel, "The Reality of Cyberspace and the Problem of National Defense," Master's Thesis, University of Kasdi Merbah, Algeria, Ouargla, 2019.
B. Theses
1. Basil Fayez Hamad Al-Qattatsheh, Mamdouh Hassan Matta, Criminal Protection of Digital Personal Data Privacy: A Comparative Study, PhD Thesis, International Islamic University of Science and Technology, Amman, 2022.
Fifth: Electronic Websites
1. Ahmed Fadel Al-Maamouri, Cybercrimes on Social Media: Limits of Complaint, Punishment, and Legislative Deficiencies in Iraqi Law, Al-Hewar Al-Mutamadin, Issue (5060), https://www.ahewar.org
2. Dr. Ali Adham, Information Security, Part Two, Al-Nahrain Center for Strategic Studies, an article published at the following link: https://www.alnahrain.iq/post/392
3. Dr. Mina Fayq, The Difference Between Cybercrimes and Traditional Crimes, an article available at the following link: https://www.menafayq.com/cybercrime-vs-traditional-crime/?utm_source=chatgpt.com
Sixth: Foreign sources
1. Arina Alexei ,Anatolie Alexei ,The difference between cyber security vs information security. Journal of Engineering Science, 29(4) , 2022.
2. Hathaway, R. M., McCreight, C., & Riley, J. (2012). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.
3. ISO/IEC 27001. (2013). Information technology - Security techniques - Information security management systems - Requirements. International Organization for Standardization, Appendix A Item.
4. Kizza, J. M. (2017). Guide to computer network security (4th ed.). Springer.
5. Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in computing (5th ed.). PearsonP.
6. Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). National Institute of Standards and Technology.
7. Shostack, A. (2014). Threat modeling: Designing for security. Wiley.
8. Whitman, M. E., & Mattord, H. J. (2018). Principles of information security (6th ed.). Cengage Learning.