{"id":27,"date":"2024-12-09T04:25:54","date_gmt":"2024-12-09T04:25:54","guid":{"rendered":"https:\/\/student.wp.odu.edu\/mston011\/?p=27"},"modified":"2024-12-09T04:25:54","modified_gmt":"2024-12-09T04:25:54","slug":"article-review-2","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/mston011\/2024\/12\/09\/article-review-2\/","title":{"rendered":"Article review 2"},"content":{"rendered":"\n<p>Matthew Stone Nov 11 2024<br>Article Review #2: The Global Reach of Cybercrime and Its Societal Impacts<br>Source: Cybercrime Journal Article<br>Introduction<br>This article review analyses the search by the study &#8220;The Electronic Contract in Civil and<br>Commercial Codes&#8221; in the Cybercrime Journal for the meeting point between cybersecurity and<br>societal structures, specifically within methods and findings of broader issues confronting the<br>marginalized. This research focuses on electronic contracts, highlighting their importance in<br>both theory and practice. It examines Jordanian laws, specifically the Electronic Transactions<br>Law No. 15 of 2015 and its updates, comparing electronic contracts to traditional ones. The<br>study explores how these contracts are created, their unique features, and their use in civil and<br>commercial settings. Using a descriptive and analytical approach, the research relies on<br>secondary sources and content analysis to gather and interpret data. The findings reveal that<br>electronic contracts often happen through online platforms, with email playing a key role in<br>commercial transactions. However, the study also identifies certain limitations and issues in<br>Jordanian legislation regarding electronic contracts, explaining their key effects. The present<br>study brings to light the growing prevalence of cybercrime and its significance socially and<br>politically, and the attempts at finding solutions to these problems within world frameworks.<br>Relevance to Social Sciences<br>The article relates deeply to some of the various principles applicable in social sciences,<br>especially in the study of sociology and criminology by looking at Jordan&#8217;s legal framework. It<br>gauges how cybercrime as a phenomenon reflects broader concerns in society such as power,<br>inequality, and access to resources. Through the study of the behaviors of cybercriminals and<br>the response mechanisms to them, the research will have engagement with social science<br>theories about deviance, social control, and the digital divide.<br>Research Questions or Hypotheses<br>Several of the key research questions are analyzed as follows:<br>\u2022 How does cybercrime affect societies differently depending on their technological<br>development?<br>\u2022 What does the socio-economic and political facilitators of cybercrime activities include?<br>As well as how okay it is to use the data of civilians for study.<br>It is hypothesized that &#8220;socioeconomically weak regions are more likely to be targeted by<br>cybercrime than others and, at the same time, to be less prepared to respond to such threats.&#8221;<br>Research Methods<br>Qualitative research methods are adopted for the study, and content analysis has been primarily<br>used to scan through available reports on cybersecurity and government policies and case<br>studies related to incidents of cybercrimes in various regions. The researchers also interview<a href=\"https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/267\/95\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Matthew Stone Nov 11 2024<br>cybersecurity experts and law enforcement officials about their challenges in fighting<br>cybercrime, thus giving a comprehensive perspective on the issue.<br>Electronic Contract<br>In the context of electronic contracts, a variety of technology platforms, such as international<br>internet networks, allow offers for goods and services to merge with acceptances from people in<br>other countries. In the field of electronic contracts, an effort is made to codify the agreements,<br>which are sometimes referred to as &#8220;smart contracts&#8221; in the literature. A remote electronic<br>contract is created. This indicates that the parties exchange offers and acceptances<br>electronically over the internet rather than in person while signing the contract. This kind of<br>arrangement is sometimes called a &#8220;cyber forum&#8221; due to the fact that it is created between<br>persons who are essentially absent. Establishing and confirming the identity of the contractual<br>parties is possible through data interchange via electronic intermediaries.<br>Data Types and Analysis<br>Data used in the study consists of secondary data from international crime reports, national<br>cybersecurity assessments, and interviews. The data analysis heavily leans on thematic coding,<br>looking for common patterns of cybercrime across different regions, focusing on various<br>vulnerabilities that are used by cybercriminals to conduct the said crime. Additionally, statistical<br>analysis is combined to quantify the growth of cybercrime over the last ten years.<br>Relationship to PowerPoint Concepts<br>This is directly related to class concepts on the digital divide, power dynamics, and access to<br>resources. So much of the discussion about the growth of cybercrime alludes to how inequitable<br>access to technology and cybersecurity resources increases vulnerabilities in general and, most<br>especially, in already marginalized communities. Such a perspective fits into our course<br>material, which called upon identifying and resolving issues of power imbalance within the digital<br>realm.<br>Marginalized Groups<br>This article pinpoints how politically and socioeconomically marginalized groups in low-income<br>or developing countries are greatly at risk from cybercrime. These populations generally cannot<br>afford the cost of cybersecurity protection. For these reasons, they have been found to have a<br>higher risk of identity theft, fraud, and online exploitation. This research calls for more focused<br>cybersecurity education and resources that could help vulnerable populations mitigate these<br>risks.<br>Contribution to Society<br>The article thus forms a valuable building block in the gradually growing body of knowledge<br>concerning the global reach of cybercrime and its implications for society. Valuable insights are<br>given as to how systemic issues, including inequality and technological exclusion, add to the<br>proliferation of cybercrime. The study also calls for developing international collaboration and<br>policy in helping to minimize the digital divide and enhancing global cybersecurity defenses.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Matthew Stone Nov 11 2024<br>Conclusion<br>In this paper, it offers a broader view of the global dimension of cybercrime, its implications on<br>society and the economy, and how this impacts the most vulnerable groups of the population. In<br>addressing these problems, the research calls for stronger international policies, more support<br>for vulnerable populations, and increased awareness about the type of societal risks brought by<br>the digital divide. The current study underlines the need for cooperation to protect the society<br>from this new threat of cybercrime.<br>References<br>[Ahmad Mahmoud Al Masadeh1*, Ahmed M.Khawaldeh2, Mohammad Assaf Al-salamat],<br>(2024). The Electronic Contract in Civil and Commercial Codes. International Journal of Cyber<br>Criminology. Vol 18 Issue 1. Retrieved from<br>https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/267\/95<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Matthew Stone Nov 11 2024Article Review #2: The Global Reach of Cybercrime and Its Societal ImpactsSource: Cybercrime Journal ArticleIntroductionThis article review analyses the search by the study &#8220;The Electronic Contract in Civil andCommercial Codes&#8221; in the Cybercrime Journal for the&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/mston011\/2024\/12\/09\/article-review-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":23864,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/posts\/27"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/users\/23864"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/comments?post=27"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/posts\/27\/revisions"}],"predecessor-version":[{"id":28,"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/posts\/27\/revisions\/28"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/media?parent=27"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/categories?post=27"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/mston011\/wp-json\/wp\/v2\/tags?post=27"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}