ARTICLE 1

The article I will be discussing is “Discrimination and Cyberbullying against women in Iraq: Exploring Social Media and Perceived Norms.” The article goes in depth about the cyberbullying of women in Iraq and how the legal system should better improve with cyberbullying against women. The social sciences that the article involves are psychology, sociology, and political science. Political science is noticed in the article because of the political change that women are trying to make to better their lives. The Iraq government is falling short in protecting these women from abuse and cyberbullying. In the article it talks about how women in Iraq are prone to domestic abuse, rape, and other associated issues. And how women predominantly are attacked on social media. Sociology has a big part in this article because how the article talks about the society and human behavior that affects these women. To better understand the causes and effects of cyberbullying, they interviewed a few Iraqi women to talk about the experience. An example of the questions was, “What role does social media play in the prevalence of cyberbullying common against women in Iraq?” and “Have you ever faced discrimination and cyberbullying in your personal or professional life?” The research method that was used for this article is called interpretivism philosophy. This is defined by understanding human regarding a particular aspect. The researchers interviewed 9 Iraqi women and used sampling technique by using a small group of women and not men. This technique helps the interviewer to gather and analyze data. The data was collected from the participants by conducting semi-structed interviews, the participants were briefed about the purpose of conducting this interview. After the interview the data is gathered and imported to the NVivo software, this is an effective tool for analyzing data. After this, the data has been further subjected to thematic analysis because it helps the researcher to analyze it effectively without repetition. For the research ethics, the researcher avoids discriminating against the participants and respects the participants values, perspectives, and maintains a trustworthy relationship with the participants in order to conduct the research properly. This article has relative concepts from our class, for example cyber criminology, cyber risk, cybercrime, and human factors. Human factors are a big concept in this article, because the researchers are trying to find out the behavioral characteristics on why women are being cyber bullied. Researchers asked the Iraqi women on why they think they are the targeted group. Many said that Iraq is a male dominant society and women don’t have equal resources and rights. The legal system in Iraq is not effective in protecting women’s rights, leading to domestic violence and other issues. The marginalized group of women face challenges because of the unequal rights and opportunities in Iraq. They also face many challenges because of low and middle-income countries discrimination against woman is persistent. Not many organizations are helping to protect these women against cyberbullying, but the women have come with an idea of internet education in against cyberbullying. In efforts, the Iraq government and legal system isn’t moving in a path of trying to help these women. So, they want to teach women about online education on the prevention of cyberbullying against Iraqi women.

Source https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/190/72

ARTICLE 2                     

The article I will be discussing is “Cybersecurity Determinants in Iraq’s Digital Workplace: Attitude, Policy, and Compliance Roles.” This article is about Iraq improving its cybersecurity skills and because they would embrace innovations without any proper measures and facing different challenges to combat cyber issues. This article relates to many social sciences such as psychology. For example, “Another cross-cultural study has evaluated smartphone usage for work purposes in increasing rates of cybersecurity breaches and illustrated that those companies who understand the importance of smartphone cybersecurity behavior should focus on the National policies about cybersecurity and must maintain the trust of their customers.” Psychology studies human behavior and how human behavior is in businesses and workplaces. For another example, I found that this article relates to geography. The article explains, “The study also explored the impact of cybersecurity policies on the overall environment of a digital workplace in the context of Iraq’s organization. The findings of this research highlighted the importance of organizational determinants of cybersecurity in designing and ensuring a secure and productive digital workplace.” The studies research questions are about how attitudes are about learning new skills to improve cybersecurity practices. Research shows that employees had a good attitude with learning new skills. The research methods used where a well-planned research design is necessary for a study as it assists the researcher in ensuring that the method employed matches the research objectives of the study. The data and analysis are done by employing advance analysis using SEM. Following it, SEM is utilized by the researcher to evaluate the formulated hypothesis in the section of literature review. Moreover, this study is to analyze the direction of organizational cybersecurity, policy compliance on dependent variable digital workplace, and attitude toward cyber security. The challenges that marginalized groups in Iraq face were that study highlights the significance of organizational determinants of workplace performance in Iraq. A study has investigated the cybersecurity challenges faced by employees and have discussed the lack of training, inside risks, social engineering attacks, and insufficient authentication as crucial factors that influence the behaviors for using the cybersecurity practices. The overall contribution of the study to society is the ability of the employees with improved cybersecurity factors improves the employees’ work-life balance, and it has been analyzed to stimulate the digital workplace performance.

Source https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/184/66