Abdulhameed, R. S. (2021). Crimes of threats and cyber extortion through social media: A comparative study. Review of International Geographical Education Online, 11(12): 1022-1033.
Al-Habsi, A., Butler, M., & Percy, A. (2023). Blackmail and the self-disclosure of sensitive information on social media: prevalence, victim characteristics and reporting behaviours amongst Omani WhatsApp users. Security Journal, 37(2), 245–263.
https://doi.org/10.1057/s41284-023-00376-3
Alisawee, S. (2019). The crime of cyber extortion (A comparative study). University of Al-Qadisiyah.
Al-Masalha, H., Hnaif, A., Tarek, K. (2020). Cyber-crime effect on Jordanian society. International Journal of Advanced Soft Computing Applications, 12(3): 2074-8523.
Al-Najjar S. F. M., (2024). Criminal responsibilities arising from artificial intelligence crimes. Imam Ja’afar Al-Sadiq University of Legal Studies, 1(7), 80-111.
https://www.iasj.net/iasj/issue/321382
Bailey, L., Harinam, V., & Ariel, B. (2020). Victims, offenders and victim-offender overlaps of knife crime: A social network analysis approach using police records. PLOS ONE, 15(12), e0242621.
https://doi.org/10.1371/journal.pone.0242621
Chiancone, C. (2023). Smart Government: Practical Uses of Artificial Intelligence in Local Government (Improving Financial Management with AI). Taylor & Francis Online, 126.
Claussén-Karlsson, M. (2017). Artificial Intelligence and the External Element of the Crime: An Analysis of the Liability Problem [PhD thesis]. Örebro University.
Dai, D., & Boroomand, S. (2021). A Review of Artificial Intelligence to Enhance the Security of Big Data Systems: State-of-Art, Methodologies, Applications, and Challenges. Archives of Computational Methods in Engineering, 29(2), 1291–1309.
https://doi.org/10.1007/s11831-021-09628-0
Djenna, A., Barka, E., Benchikh, A., et al. (2023a). Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics. Sensors, 23(14), 6302.
https://doi.org/10.3390/s23146302
Djenna, A., Bouridane, A., Rubab, S., et al. (2023b). Artificial Intelligence-Based Malware Detection, Analysis, and Mitigation. Symmetry, 15(3), 677.
https://doi.org/10.3390/sym15030677
Fraga-Lamas, P., Fernández-Caramés, T., & Castedo, L. (2017). Towards the Internet of Smart Trains: A Review on Industrial IoT-Connected Railways. Sensors, 17(6), 1457.
https://doi.org/10.3390/s17061457
Hayward, K. J., & Maas, M. M. (2020). Artificial intelligence and crime: A primer for criminologists. Crime, Media, Culture: An International Journal, 17(2), 209–233.
https://doi.org/10.1177/1741659020917434
Hussein, J. M. (2023). Case Law Regarding the Legality of Social Media Cyber-Blackmail. Relações Internacionais Do Mundo Atual Unicuritiba, 1, 1-14.
Hussein, O. A., Manap, N. A., Rahman, M. R. A. (2022). Cyber Blackmail Crime against Women - A Case Study. Journal of Positive School Psychology, 6(3), 6882-6893.
Ibrahim, A. A. (2021). Applications of artificial intelligence in confronting cybercrimes. The Legal Journal. 2817.
Jada, I., & Mayayise, T. O. (2024). The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review. Data and Information Management, 8(2), 100063.
https://doi.org/10.1016/j.dim.2023.100063
King, T. C., Aggarwal, N., Taddeo, M., et al. (2019). Artificial Intelligence Crime: An Interdisciplinary Analysis of Foreseeable Threats and Solutions. Science and Engineering Ethics, 26(1), 89–120.
https://doi.org/10.1007/s11948-018-00081-0
Krishnamoorthy, S., Dua, A., & Gupta, S. (2021). Role of emerging technologies in future IoT-driven Healthcare 4.0 technologies: a survey, current challenges and future directions. Journal of Ambient Intelligence and Humanized Computing, 14(1), 361–407.
https://doi.org/10.1007/s12652-021-03302-w
Light, T. (2021). Data Privacy: One Universal Regulation Eliminating the Many States of Legal Uncertainty. St. Louis University Law Journal, 65(4), 873-896.
Martinez-Miranda, E., McBurney, P., & Howard, M. J. W. (2016). Learning unfair trading: A market manipulation analysis from the reinforcement learning perspective. 2016 IEEE Conference on Evolving and Adaptive Intelligent Systems (EAIS), 36, 103–109.
https://doi.org/10.1109/eais.2016.7502499
Nienhaus, V. (2021). The digital transformation of the global economy through artificial intelligence: Ethical, Behavioral and Legal Issues (Arabic). Mashura Journal.
https://doi.org/10.33001/m011020211591
O’Malley, R. L., & Holt, K. M. (2020). Cyber Sextortion: An Exploratory Analysis of Different Perpetrators Engaging in a Similar Crime. Journal of Interpersonal Violence, 37(1–2), 258–283.
https://doi.org/10.1177/0886260520909186
Østerlund, C., Jarrahi, M. H., Willis, M., et al. (2020). Artificial intelligence and the world of work, a co‐constitutive relationship. Journal of the Association for Information Science and Technology, 72(1), 128–135. Portico.
https://doi.org/10.1002/asi.24388
Rajaee, T., Khani, S., & Ravansalar, M. (2020). Artificial intelligence-based single and hybrid models for prediction of water quality in rivers: A review. Chemometrics and Intelligent Laboratory Systems, 200, 103978.
https://doi.org/10.1016/j.chemolab.2020.103978
Saleem, R., Hameed, A., Mohammed, T., Aziz, A. (2022). Crimes of Social Media in Iraq. Journal of Positive Psychology and Wellbeing, 6(1), 397-408.
Seymour, J., Tully, P. (2016). Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter. DEF CON.
Shafaq, N. (2023). What is the current landscape of crime in Iraq? Shafaq News.Com.
Siva Shankar, S., Hung, B. T., Chakrabarti, P., et al. (2023). A novel optimization based deep learning with artificial intelligence approach to detect intrusion attack in network system. Education and Information Technologies, 29(4): 3859-3883.
Spiezia, F. (2022). International cooperation and protection of victims in cyberspace: welcoming Protocol II to the Budapest Convention on Cybercrime. ERA Forum, 23(1), 101–108.
https://doi.org/10.1007/s12027-022-00707-8
Teo, S. A. (2023). Human dignity and AI: mapping the contours and utility of human dignity in addressing challenges presented by AI. Law, Innovation and Technology, 15(1), 241–279.
https://doi.org/10.1080/17579961.2023.2184132
Thakker, P., Japee, G. (2023). Emerging Technologies in Accountancy and Finance: A Comprehensive Review. European Economic Letters (EEL), 13(3): 993-1011.
Uma, S. (2017). Outlawing cybercrimes against women in India. Bharati Law Review. 5(4): 103-116.
Vasiu, I., & Vasiu, L. (2020). Cyber Extortion and Threats: Analysis of the United States Case Law. Masaryk University Journal of Law and Technology, 14(1), 3–28.
https://doi.org/10.5817/mujlt2020-1-1
Velasco, C. (2022). Cybercrime and Artificial Intelligence. An overview of the work of international organizations on criminal justice and the international applicable instruments. ERA Forum, 23(1), 109–126.
https://doi.org/10.1007/s12027-022-00702-z
Wehrli, S., Hertweck, C., Amirian, M., et al. (2021). Bias, awareness, and ignorance in deep-learning-based face recognition. AI and Ethics, 2(3), 509–522.
https://doi.org/10.1007/s43681-021-00108-6