Proceedings of International Conference on Applied Innovation in IT
2025/06/27, Volume 13, Issue 2, pp.181-188

Artificial Intelligence for Cybersecurity: Analyzing Legal Frameworks and Policy Implications


Muath Mohammed Alashqar, Haider Abdulrazaq Hameed and Qusay Kanaan Kadhim


Abstract: The paper deeply studies three existing security mandates like the GDPR, NIST CSF, and CCPA so it can evaluate properly how they respond to Artificial Intelligence (AI) defines issues. The research finds significant problems in regulations about AI cybersecurity especially with attacks from outside sources, biased systems, and poor clarity, which create serious ethical problems. A doctrinal and analytical research methodology was applied within this study, which combines legal text analysis and case law review to define judicial rulings along with a framework evaluation and an investigation into social-moral effects on AI cybersecurity. In addition, actual data is collected from legal practitioners, IT security specialists, and policymakers through structured interviews to present a concrete approach of practical problems and regulatory requirements in an ever-growing field of this nature. The results stress the demand for powerful, proactive laws that make security demands and technological development compatible to each other, and emphasize the need for international collaboration and preventive regulatory approach. The recommendation for comprehensive legislative framework in regulating AI in cybersecurity is the concluding part of the study, seeking to promulgate laws that would weave its way through the makeovers engineered by AI in protecting cyber space, including realizing balance, practicality, and ethical vigilance.

Keywords: Cybersecurity, Artificial Intelligence, Legal Frameworks, Machine Learning, Deep Learning.

DOI: 10.25673/120436

Download: PDF

References:

  1. B. Saha and Z. Anwar, “A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework,” J. Inf. Secur., vol. 15, no. 01, pp. 24-39, 2024, [Online]. Available: https://doi.org/10.4236/jis.2024.151003.
  2. A. I. Altameemi, S. J. Mohammed, Z. Q. Mohammed, Q. K. Kadhim, and S. T. Ahmed, “Enhanced SVM and RNN Classifier for Cyberattacks Detection in Underwater Wireless Sensor Networks,” Int. J. Saf. Secur. Eng., vol. 14, no. 5, pp. 1409-1417, Oct. 2024, [Online]. Available: https://doi.org/10.18280/ijsse.140508.
  3. L. A. Ogundele, F. E. Ayo, A. M. Adeleye, and S. O. Hassan, “A Hybrid Network Intrusion Detection Framework using Neural Network-Based Decision Tree Model,” Int. J. Appl. Sci. (IJApSc), vol. 2, no. 1, pp. 74-93, Mar. 2025, [Online]. Available: https://doi.org/10.69923/95zt9v71.
  4. D. A. S. George, D. T. Baskar, and D. P. B. Srikaanth, “Cyber Threats to Critical Infrastructure: Assessing Vulnerabilities Across Key Sectors,” Partners Univers. Int. Innov. J., vol. 2, no. 1, pp. 51-75, 2024, [Online]. Available: https://doi.org/10.5281/zenodo.10639463.
  5. J. Laux, S. Wachter, and B. Mittelstadt, “Trustworthy artificial intelligence and the European Union AI act: On the conflation of trustworthiness and acceptability of risk,” Regul. Gov., vol. 18, no. 1, pp. 3-32, 2024, [Online]. Available: https://doi.org/10.1111/rego.12512.
  6. H. A. A. Mohammed, A. A. Kasim Jizany, I. M. Mahmood, and Q. K. Kadhim, “Predicting Alzheimer’s Disease Using a Modified Grey Wolf Optimizer and Support Vector Machine,” Ing. des Syst. d’Information, vol. 29, no. 2, pp. 669-676, 2024, [Online]. Available: https://doi.org/10.18280/isi.290228.
  7. V. V. Zinchenko et al., “Methodology for Conducting Post-Marketing Surveillance of Software as a Medical Device Based on Artificial Intelligence Technologies,” Sovrem. Tehnol. v Med., vol. 14, no. 5, pp. 15-25, 2022, [Online]. Available: https://doi.org/10.17691/stm2022.14.5.02.
  8. M. James, “The Ethical and Legal Implications of Using Big Data and Artificial Intelligence for Public Relations Campaigns in the United States,” Int. J. Commun. Public Relat., vol. 9, no. 1, pp. 38-52, 2024, [Online]. Available: https://doi.org/10.47604/ijcpr.2273.
  9. A. U. Akang, “Regulatory Compliance and Access To Finance: Implications for Business Growth in Developing Economies,” Sci. J. Educ. Humanit. Soc. Sci., vol. 1, no. 2, pp. 8-23, 2024, [Online]. Available: https://doi.org/10.62536/sjehss.2023.v1.i2.pp8-23.
  10. A. Khalaf and K. Lakhtaria, “A Hybrid System Based on Three Levels to Hide Information using JPEG Color Images,” Int. J. Appl. Sci. (IJApSc), vol. 1, no. 2, pp. 30-45, Sep. 2024, [Online]. Available: https://doi.org/10.69923/8rjqxq24.
  11. H.-W. Liu and C.-F. Lin, “Artificial Intelligence and Global Trade Governance: A Pluralist Agenda,” Artif. Intell. Glob. Trade Gov. A Plur. Agenda, vol. 61, no. 2, p. 61, 2020, [Online]. Available: https://perma.cc/6ZFR-2LRT.
  12. A. Mishra, Y. I. Alzoubi, M. J. Anwar, and A. Q. Gill, “Attributes impacting cybersecurity policy development: An evidence from seven nations,” Comput. Secur., vol. 120, p. 102820, Sep. 2022, [Online]. Available: https://doi.org/10.1016/j.cose.2022.102820.
  13. N. Rawindaran, A. Jayal, E. Prakash, and C. Hewage, “Perspective of small and medium enterprise (SME’s) and their relationship with government in overcoming cybersecurity challenges and barriers in Wales,” Int. J. Inf. Manag. Data Insights, vol. 3, no. 2, p. 100191, Nov. 2023, [Online]. Available: https://doi.org/10.1016/j.jjimei.2023.100191.
  14. P. Permatasari and J. Gunawan, “Sustainability policies for small medium enterprises: WHO are the actors?,” Clean. Responsible Consum., vol. 9, no. October 2022, p. 100122, Jun. 2023, [Online]. Available: https://doi.org/10.1016/j.clrc.2023.100122.
  15. C. Labadie and C. Legner, “Building data management capabilities to address data protection regulations: Learnings from EU-GDPR,” J. Inf. Technol., vol. 38, no. 1, pp. 16-44, Mar. 2023, [Online]. Available: https://doi.org/10.1177/02683962221141456.
  16. H. Taherdoost, “Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview,” Electronics, vol. 11, no. 14, pp. 1-20, Jul. 2022, [Online]. Available: https://doi.org/10.3390/electronics11142181.
  17. R. Creemers, “Cybersecurity Law and Regulation in China: Securing the Smart State,” China Law Soc. Rev., vol. 6, no. 2, pp. 111-145, Mar. 2023, [Online]. Available: https://doi.org/10.1163/25427466-06020001.
  18. K. Yeung and L. A. Bygrave, “Demystifying the modernized European data protection regime: Cross‐disciplinary insights from legal and regulatory governance scholarship,” Regul. Gov., vol. 16, no. 1, pp. 137-155, Jan. 2022, [Online]. Available: https://doi.org/10.1111/rego.12401.
  19. E. Buçaj and K. Idrizaj, “The need for cybercrime regulation on a global scale by the international law and cyber convention,” Multidiscip. Rev., vol. 8, no. 1, pp. 1-30, Sep. 2024, [Online]. Available: https://doi.org/10.31893/multirev.2025024.
  20. I. M. Alramamneh and A. Abuanzeh, “International and National Procedural Framework for Combating Cybercrime,” Int. J. Cyber Criminol., vol. 17, no. 2, pp. 330-349, 2023, [Online]. Available: https://doi.org/10.5281/zenodo.4766719.
  21. A. Abdullahi and I. G. Musa, “The legitimacy of international law: challenges and the emerging issues,” J. Glob. Soc. Sci., vol. 4, no. 16, pp. 14-34, Nov. 2023, [Online]. Available: https://doi.org/10.58934/jgss.v4i16.217.
  22. A. Abdulkarem and A. Krivtsun, “An Analysis of Automated Essay Scoring Frameworks,” Int. J. Appl. Sci. (IJApSc), vol. 1, no. 3, pp. 71-81, Dec. 2024, [Online]. Available: https://doi.org/10.69923/av1gt264.
  23. Q. K. Kadhim, A. I. Altameemi, R. M. Abdulkader, and S. T. Ahmed, “Enhancement of Data Center Transmission Control Protocol Performance in Network Cloud Environments,” Ing. des Syst. d’Information, vol. 29, no. 3, pp. 1115-1123, 2024, [Online]. Available: https://doi.org/10.18280/isi.290329.
  24. S. T. Ahmed and S. M. Kadhem, “Alzheimer’s disease prediction using three machine learning methods,” Indones. J. Electr. Eng. Comput. Sci., vol. 27, no. 3, pp. 1689-1697, 2022, [Online]. Available: https://doi.org/10.11591/ijeecs.v27.i3.pp1689-1697.
  25. A. H. Salem, S. M. Azzam, O. E. Emam, and A. A. Abohany, “Advancing cybersecurity: a comprehensive review of AI-driven detection techniques,” J. Big Data, vol. 11, no. 1, pp. 1-38, Aug. 2024, [Online]. Available: https://doi.org/10.1186/s40537-024-00957-y.
  26. J. Afolabi, “Enhancing Cybersecurity Through Artificial Intelligence: Challenges and Opportunities,” Researchgate, vol. 9, no. 1, pp. 50-67, 2024.
  27. R. Mühlhoff, “Predictive privacy: Collective data protection in the context of artificial intelligence and big data,” Big Data Soc., vol. 10, no. 1, pp. 1-24, Jan. 2023, [Online]. Available: https://doi.org/10.1177/20539517231166886.
  28. M. Shahvaroughi Farahani and G. Ghasemi, “Artificial Intelligence and Inequality: Challenges and Opportunities,” Qeios, vol. 2, no. 21, pp. 1-14, Feb. 2024, [Online]. Available: https://doi.org/10.32388/7HWUZ2.
  29. H. S. Mahdi Alsultani and A. H. Aliwy, “Boosting Arabic Named Entity Recognition with K-Fold Cross Validation on LSTM and Bi-LSTM Models,” J. Comput. Sci., vol. 18, no. 9, pp. 792-800, Sep. 2022, [Online]. Available: https://doi.org/10.3844/jcssp.2022.792.800.
  30. V. P. Shehu and V. Shehu, “Human rights in the technology era – Protection of data rights,” Eur. J. Econ. Law Soc. Sci., vol. 7, no. 2, pp. 1-10, Jun. 2023, [Online]. Available: https://doi.org/10.2478/ejels-2023-0001.
  31. I. Technology, “A comparative analysis between General Data Protection Regulations and California Consumer Privacy Act,” J. Comput. Sci. Inf. Technol. Telecommun. Eng., vol. 4, no. 1, pp. 326-332, Mar. 2023, [Online]. Available: https://doi.org/10.30596/jcositte.v4i1.13330.
  32. I. Mishkhal, N. Abdullah, H. H. Saleh, N. I. R. Ruhaiyem, and F. H. Hassan, "Facial Swap Detection Based on Deep Learning: Comprehensive Analysis and Evaluation," Iraqi Journal for Computer Science and Mathematics, vol. 6, no. 1, pp. 109-123, 2025.
  33. K. Pipyros and S. Liasidou, “A new cybersecurity risk assessment framework for the hospitality industry: techniques and methods for enhanced data protection and threat mitigation,” Worldw. Hosp. Tour. Themes, vol. 1, no. 1, pp. 1-14, Feb. 2025, [Online]. Available: https://doi.org/10.1108/WHATT-12-2024-0296.
  34. B. Solaiman and A. Malik, “Regulating algorithmic care in the European Union: evolving doctor–patient models through the Artificial Intelligence Act (AI-Act) and the liability directives,” Med. Law Rev., vol. 33, no. 1, pp. 1-22, Jan. 2025, [Online]. Available: https://doi.org/10.1093/medlaw/fwae033.
  35. T. H. Hadi, J. Kadum, Q. K. Kadhim, and S. T. Ahmed, “An Enhanced Cloud Storage Auditing Approach Using Boneh-Lynn- Shacham ’ s Signature and Automatic Blocker Protocol,” Ingénierie des Systèmes d’Information, vol. 29, no. 1, pp. 261-268, 2024, [Online]. Available: https://doi.org/10.18280/isi.290126.
  36. S. L. Shaelou and Y. Razmetaeva, “Challenges to Fundamental Human Rights in the age of Artificial Intelligence Systems: shaping the digital legal order while upholding Rule of Law principles and European values,” ERA Forum, vol. 24, no. 4, pp. 567-587, Dec. 2023, [Online]. Available: https://doi.org/10.1007/s12027-023-00777-2.
  37. I. Mishkhal, S. A. AL Kareem, H. H. Saleh, A. Alqayyar, I. Hussein, and I. A. Jassim, "Solving Course Timetabling Problem Based on the Edge Coloring Methodology by Using Jedite," in 2019 1st AL-Noor International Conference for Science and Technology (NICST), Sulimanyiah, Iraq, 2019, pp. 68-72, [Online]. Available: https://doi.org/10.1109/NICST49484.2019.9043794.
  38. Y. Liu, W. Fu, and D. Schiller, “The making of government-business relationships through state rescaling: a policy analysis of China’s artificial intelligence industry,” Eurasian Geogr. Econ., vol. 00, no. 00, pp. 1-29, Aug. 2024, [Online]. Available: https://doi.org/10.1080/15387216.2024.2388890.
  39. H. S. M. Alsultani and A. H. Aliwy, “Improving Arabic Named Entity Recognition with a Modified Transformer Encoder,” J. Comput. Sci., vol. 19, no. 5, pp. 599-609, May 2023, [Online]. Available: https://doi.org/10.3844/jcssp.2023.599.609.
  40. A. Drake et al., “Legal contestation of artificial intelligence-related decision-making in the United Kingdom: reflections for policy,” Int. Rev. Law, Comput. Technol., vol. 36, no. 2, pp. 251-285, May 2022, [Online]. Available: https://doi.org/10.1080/13600869.2021.1999075.
  41. O. Akinrinola, C. C. Okoye, O. C. Ofodile, and C. E. Ugochukwu, “Navigating and reviewing ethical dilemmas in AI development: Strategies for transparency, fairness, and accountability,” GSC Adv. Res. Rev., vol. 18, no. 3, pp. 050-058, Mar. 2024, [Online]. Available: https://doi.org/10.30574/gscarr.2024.18.3.0088.
  42. M. Alkaeed, A. Qayyum, and J. Qadir, “Privacy preservation in Artificial Intelligence and Extended Reality (AI-XR) metaverses: A survey,” J. Netw. Comput. Appl., vol. 231, p. 103989, Nov. 2024, [Online]. Available: https://doi.org/10.1016/j.jnca.2024.103989.
  43. L. Cavalcante Siebert et al., “Meaningful human control: actionable properties for AI system development,” AI Ethics, vol. 3, no. 1, pp. 241-255, Feb. 2023, [Online]. Available: https://doi.org/10.1007/s43681-022-00167-3.
  44. P. S. Dhoni, “Synergizing Generative AI and Cybersecurity: Roles of Generative AI Entities, Companies, Agencies, and Government in Enhancing Cybersecurity,” TechRxiv, pp. 1-10, 2023.
  45. S. Reddy, “Global Harmonization of Artificial Intelligence-Enabled Software as a Medical Device Regulation: Addressing Challenges and Unifying Standards,” Mayo Clin. Proc. Digit. Heal., vol. 3, no. 1, p. 100191, Mar. 2025, [Online]. Available: https://doi.org/10.1016/j.mcpdig.2024.100191.
  46. A. Papathanasiou, G. Liontos, A. Katsouras, V. Liagkou, and E. Glavas, “Cybersecurity Guide for SMEs: Protecting Small and Medium-Sized Enterprises in the Digital Era,” J. Inf. Secur., vol. 16, no. 01, pp. 1-43, 2025, [Online]. Available: https://doi.org/10.4236/jis.2025.161001.
  47. O. Hoxhaj, B. Halilaj, and A. Harizi, “Ethical Implications and Human Rights Violations in,” Balk. Soc. Sci. Rev., vol. 22, pp. 153-171, 2023.
  48. O. F. Alwan, Q. K. Kadhim, R. B. Issa, and S. T. Ahmed, “Early Detection and Segmentation of Ovarian Tumor Using Convolutional Neural Network with Ultrasound Imaging,” Rev. d’Intelligence Artif., vol. 37, no. 6, pp. 1503-1509, 2023, [Online]. Available: https://doi.org/10.18280/ria.370614.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.