The Role of CyberSecurity Effectiveness in Iraq for Artificial Intelligence Technology: Exploratory Study

Authors

  • Zahraa Mousa Saad College of administration and Economics, University of Misan, Amarah, Iraq

Keywords:

CyberSecurity of Effectiveness, Cybersecurity threats, Cybersecurity challenges, Artificial Intelligence Technology, CyberAttacks in Iraq

Abstract

Balancing between innovation in Artificial Intelligence and Cybersecurity is crucial for ensuring information security and successful modern technological applications in Iraq. As it achieving these objectives will contribute in building a secure cyber environment supporting innovation and achieves sustainable development in Iraq. And the importance of research in enhancing cybersecurity in Iraq and highlights to future challenges and the importance of continuing research in this field. So, previous studies have shown that Iraq faces major challenges in the field of cybersecurity, especially with increasing use of artificial intelligence technologies. And reflect the results the need to develop comprehensive strategies enhance from security effectiveness with a focus on: 1) Cooperation between the public sectors and private sectors: to enhance mutual understanding between government institutions and private companies around the importance of cybersecurity. 2) Training human resources: from through educational programs targeted to ensure the availability of specialists in these fields. 3) Investment in research and development: to ensure that remain proposed solutions for facing cybersecurity threats advanced and effective. 4) Developing appropriate legislation: to ensure data protection and strengthen the legal frameworks necessary for investing in artificial intelligence technologies.

 

References

R. Abeyratne, “Aviation and cybersecurity in the digital world,” in Aviation in the Digital Age: Legal and Regulatory Aspects, 2020, pp. 173–211.

M. A. Abdel Rahim, “Artificial intelligence and its impact on liability in Islamic jurisprudence: A comparative jurisprudential study,” Journal of Legal Studies, no. 55, pt. I, p. 8, Mar. 2022.

A. Bhardwaj, M. D. Alshehri, K. Kaushik, H. J. Alyamani, and M. Kumar, “Secure framework against cyber attacks on cyber-physical robotic systems (Retracted),” Journal of Electronic Imaging, vol. 31, no. 6, pp. 061802-1–061802-?, 2022.

P. Chithaluru, F. Al-Turjman, M. Kumar, and T. Stephan, “Computational-intelligence-inspired adaptive opportunistic clustering approach for industrial IoT networks,” IEEE Internet of Things Journal, vol. 10, no. 9, pp. 7884–7892, 2023.

A. H. Hadawi, D. A. Muslim, and S. T. Mohammed, “Digital leadership and its role in enhancing cybersecurity behavior in organizations: An analytical study of a sample of employees in private banks in Najaf Al-Ashraf,” Journal of Human and Natural Sciences, vol. 5, no. 1, 2023.

M. Dahmani, “Artificial intelligence as a mechanism to enhance cybersecurity,” Journal of Legal and Political Thought, vol. 7, no. 2, pp. 597–608, 2023.

M. A. Al-Samhan, “Requirements for achieving cybersecurity for management information systems at King Saud University,” Journal of the Faculty of Education, Mansoura University, no. 111, pp. 3–29, 2020.

A. B. S. Al-Otaibi, “The role of cybersecurity in achieving Vision 2030,” M.S. thesis, Naif Arab University for Security Sciences, 2020.

F. M. Al-Masri, “The role of artificial intelligence in improving cybersecurity,” Elite Journal for Studies and Research, vol. 3, no. 2, 2024.

S. Egelman and E. Peer, “Scaling the security wall: Developing a security behavior intentions scale (SeBIS),” in Proc. 33rd Annu. ACM Conf. Human Factors in Computing Systems (CHI), Apr. 2015, p. 2979.

M. Mukhtar, “Cybersecurity: Concepts of the future,” Journal of Trends of Events, no. 2, pp. 6–7, 2023.

A. Moussa and A. H. Bilal, Artificial Intelligence: A Revolution in Modern Technology. Cairo, Egypt: Arab Group for Training and Publishing, 2019.

P. Boucher, Artificial Intelligence: How Does It Work, Why Does It Matter, and What Can We Do About It? (STOA). Brussels, Belgium: European Parliamentary Research Service, Jun. 2020.

H. Abdel Moneim and M. Ismail, Economic Implications of the Fourth Industrial Revolution (Artificial Intelligence), Arab Monetary Fund, Economic Studies Series, 2021, p. 7.

“Types of Artificial Intelligence,” Javatpoint. [Online]. Available: https://www.javatpoint.com. Accessed: Oct. 7, 2019.

A. Athamnia, Fundamental Concepts of Artificial Intelligence. Berlin, Germany: Arab Democratic Center for Strategic, Political, and Economic Studies, 2019.

Saudi Data and AI Authority (SDAIA), AI for Executives. Riyadh, Saudi Arabia, 2022.

J. H. Li, “Cyber security meets artificial intelligence: A survey,” Frontiers of Information Technology & Electronic Engineering, vol. 19, no. 12, pp. 1462–1474, 2018.

J. S. Al-Khudari, H. J. Salami, and N. N. M. Kleibi, “Cybersecurity and artificial intelligence in Saudi universities: A comparative study,” Journal for University Performance Development, Mansoura University, vol. 12, no. 1, pp. 217–233, 2020.

A. bin Y. Al-Zahrani and H. bin A. Al-Shahri, “Cybersecurity strategies in light of modern technologies and challenges: A comparative study,” M.S. thesis, Naif Arab University for Security Sciences, 2020.

S. Zeadally, E. Adi, Z. Baig, and I. A. Khan, “Harnessing artificial intelligence capabilities to improve cybersecurity,” IEEE Access, vol. 8, pp. 23817–23837, 2020.

B. Alhayani, H. J. Mohammed, I. Z. Chaloob, and J. S. Ahmed, “Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry,” Materials Today: Proceedings, 2021, doi: 10.1016/… (incomplete in source).

F. Tao, M. S. Akhtar, and J. Z. (Jiayuan), “The future of artificial intelligence in cybersecurity: A comprehensive survey,” EAI Endorsed Transactions on Creative Technologies, vol. 8, no. 28, pp. 3–e3, 2021.

M. M. A. J. El-Dagher, “Elite attitudes toward using security media and AI applications to combat cybercrime and enhance cybersecurity in Egypt: A field study,” Arab Journal for Media and Communication Research, Ahram Canadian University, no. 33, pp. 4–110, 2021.

K. bin M. M. Saidi, “Artificial intelligence as a necessary trend in cybersecurity protection: Present reality and future challenges,” Peace Journal for Humanities and Social Sciences, vol. 6, no. 4, pp. 25–37, 2022.

J. A. A. Karim Al-Adwan, “Roles and challenges of AI-based cybersecurity: A case study,” Jordanian Journal of Business Administration, Univ. of Jordan, vol. 18, no. 3, pp. 437–456, 2022.

F. A. I. Ahmed, R. F. A. Youssef, and W. M. El-Sayed, “Cybersecurity and digital hygiene,” Egyptian Journal of Information Sciences, vol. 9, no. 2, pp. 3900–422, 2022.

S. M. R. Abdel Aziz, “Hybrid security threats in international relations: Cybersecurity and artificial intelligence as models,” Nile Valley Journal for Humanities and Educational Studies, Cairo Univ.–Khartoum Branch, vol. 33, no. 334, pp. 663–700, 2022.

L. Ben Barghouth, “Cybersecurity and digital data privacy protection in Algeria in the age of digital transformation and AI: Threats, technologies, challenges, and countermeasures,” International Journal of Social Communication, vol. 10, no. 1, pp. 443–457, 2023.

S. Dambe, S. Gochhait, and S. Ray, “The role of artificial intelligence in enhancing cybersecurity and internal audit,” in Proc. 3rd Int. Conf. Advancement in Electronics & Communication Engineering (AECE), Nov. 2023, pp. 88–93.

M. M. Abdel Razek, “AI technologies in media: Current reality and future developments—An applied study on Egyptian and Arab media practitioners,” Egyptian Journal of Media Research, no. 81, pp. 1–74, 2022.

D. M. Al-Ameen and B. Jamal Al-Din, “Implications of artificial intelligence on national security,” Journal of Private Law, vol. 2, no. 1, pp. 100–122, 2024.

M. J. G. Al-Fatlawi and H. A. M. J. Al-Asam, “The contributions of AI technologies to strategic leadership: A descriptive analytical study at Najaf International Airport,” Al-Ghari Journal of Economic and Administrative Sciences, vol. 18, no. 1, pp. 157–179, 2022.

A. Buchmann and G. C. Bowker, “Unsupervised by any other name: Hidden layers of knowledge production in artificial intelligence on social media,” Big Data & Society, pp. 1–11, Jan.–Jun. 2019. [Online]. Available: https://journals.sagepub.com/doi/full/10.1177/2053951718819569

A. El-Sayed Mohamed and K. Mahmoud Mohamed, AI Applications and the Future of Educational Technology. Cairo, Egypt: Arab Group for Training and Publishing, 2020.

A. S. A. El-Borai, “Applications of AI and robotics from the perspective of Islamic jurisprudence,” Dar Al-Iftaa Journal, vol. 14, no. 48, Jan. 2022. [Online]. Available: https://dftaa.journals.ekb.eg/article_231631.html

N. S. El-Demerdash, “The impact of AI-supported virtual elements and knowledge management tools on developing cybersecurity skills among computer and AI students,” Journal of Research in the Fields of Qualitative Education, Minia University, no. 41, pp. 1331–1427, 2022.

A. H. Hadawi, D. M. Ali, and S. T. Mohammed, “Digital leadership and cybersecurity behavior in organizations,” Journal of Human and Natural Sciences, vol. 5, no. 1, 2024.

Iraqi Ministry of Communications, Reports on Cybersecurity and Digital Transformation.

International Telecommunication Union (ITU) and other international cybersecurity organizations/agencies, relevant reports and publications.

K. Gammon, “5 ways artificial intelligence will change the world by 2050,” USC News, 2019; and “Types of Artificial Intelligence,” Javatpoint. [Online]. Available: https://www.javatpoint.com

L. Jin, “Investigation on potential application of artificial intelligence in preschool children’s education,” Journal of Physics: Conference Series, vol. 1288, no. 1, p. 2, 2019.

P. Grover, A. K. Kar, and Y. K. Dwivedi, “Understanding artificial intelligence adoption in operations management: Insights from the review of academic literature and social media discussions,” Annals of Operations Research, Jun. 16, 2020. [Online]. Available: https://link.springer.com/article/10.1007/s10479-020-03683-90

Research and Information Center, “Artificial intelligence in Saudi Arabia,” 2021. [Online]. Available: https://www.abhacci.org.sa/

D. F. Salem, “Effectiveness of AI technologies on social media from the perspective of educational media students: Facebook as a model,” Egyptian Journal for Public Opinion Research, vol. 1, no. 3, pp. 1–61, 2021.

D. Shi, P. Wang, and K. Abbas, “A survey of deep learning and its applications: A new paradigm to machine learning,” Archives of Computational Methods in Engineering, p. 1, 2021. [Online]. Available: https://doi.org/10.1016/j.cosrev.2021.10037

V. Nunavath and M. Goodwin, “The role of artificial intelligence in social media big data analytics for disaster management—Initial results of a systematic literature review,” in Proc. 5th Int. Conf. Information and Communication Technologies for Disaster Management (ICT-DM), 2018.

Downloads

Published

2026-02-06

How to Cite

Saad, Z. M. . (2026). The Role of CyberSecurity Effectiveness in Iraq for Artificial Intelligence Technology: Exploratory Study. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 7(1), 354–374. Retrieved from https://cajmtcs.casjournal.org/index.php/CAJMTCS/article/view/876

Issue

Section

Articles