Article Review #2


Article Review #3: Digital Human Rights in Jordanian Legislation and International
Agreements

Introduction
The article “Digital Human Rights in Jordanian Legislation and International Agreements” by
Fahad Yousef Al-Kasassbeh et al. explores the legal frameworks safeguarding digital rights in
Jordan and their alignment with international standards. This review examines how the study
relates to social science principles, outlines the research questions, methods, and data analysis,
connects classroom concepts, evaluates its relevance to marginalized groups, and discusses the
societal contributions of the research.
Relation to Social Sciences Principles
The article aligns with principles of the social sciences, particularly:
• Behavioral Theory: Examining how legislative and societal behaviors adapt to emerging
digital challenges.
• Sociology of Law: Highlighting the role of laws in shaping and regulating digital human
rights, focusing on issues such as privacy and equitable access to technology.
• Ethics and Policy Studies: Addressing ethical concerns about personal data exploitation
and advocating for robust legal protections in a digitally interconnected society.
Research Questions or Hypotheses
The study seeks to answer key questions:
1. How do Jordanian laws address the complexities of digital human rights?
2. In what ways do these laws align with international digital rights agreements?
3. What legislative, strategic, and technical challenges impede the protection of digital
rights?

The hypothesis suggests that Jordanian legislation, while reflective of international
norms, requires further refinement to address rapid technological changes and protect
digital human rights.


Research Methods
The authors employ a qualitative legal research method. They conduct a detailed content analysis
of Jordanian legislation and international agreements related to digital rights. Data was sourced
from legal texts, online platforms, and international human rights documents.


Data and Analysis
The study examines both domestic and international legal frameworks, with a focus on privacy,
equitable access, and data protection. The authors highlight the discrepancies between Jordanian
laws and global digital rights standards, emphasizing the necessity for regulatory mechanisms to
address issues such as the exploitation of data by technology corporations.
Relation to Classroom Concepts
This article connects with social science concepts discussed in class, particularly:
• Digital Ethics: Examining how technology challenges traditional ethical boundaries in
privacy and data protection areas.
• Regulatory Policy Development: Relating to how governments balance individual
freedoms with societal concerns like public morality and national security.
• Human Rights Frameworks: Reflecting the integration of digital rights within the
broader spectrum of human rights as discussed in the Universal Declaration of Human
Rights.


Relation to Marginalized Groups
The study highlights how unequal access to technology and communication infrastructure
disproportionately affects marginalized groups. Vulnerable populations may face challenges in
exercising digital rights due to systemic inequities in internet access or legal protections,
exacerbating existing social disparities.
Overall Contributions to Society
The research underscores the importance of embedding digital rights within national and

international legal frameworks to protect freedoms like privacy, data protection, and equitable
access. The study identifies gaps in Jordanian legislation and contributes to the ongoing global
discourse on strengthening digital rights protections and fostering a more inclusive digital
society.


Conclusion
Fahad Yousef Al-Kasassbeh et al.’s article provides valuable insights into the evolving field of
digital human rights. It bridges local and global perspectives, emphasizing the need for robust
legal and ethical frameworks to safeguard digital freedoms while addressing challenges faced by
marginalized communities.


References
Al-Kasassbeh, F. Y., Awaisheh, S. M., Odeibat, M. A., Awaesheh, S. M. A., Al-Khalaileh, L., &
Al-Braizat, M. (2024). Digital Human Rights in Jordanian Legislation and International
Agreement. International Journal of Cyber Criminology, 18(1), 37–57.
https://doi.org/10.5281/zenodo.4766803


Article Review #4: Investigating the Intersection of AI and Cybercrime: Risks, Trends, and
Countermeasures

Introduction
The article “Investigating the Intersection of AI and Cybercrime: Risks, Trends, and
Countermeasures” by Sanaika Shetty, Kyung-Shick Choi, and Insun Park examines how
cybercriminals exploit Artificial Intelligence (AI) technologies and discusses countermeasures.
This review highlights the study’s links to social science principles, its research questions and
methods, and its relevance to marginalized groups and societal contributions.
Relation to Social Sciences Principles
The study connects to social science principles, particularly:
• Behavioral Theory: Investigating how cybercriminals adapt AI to exploit human
vulnerabilities.
• Sociology of Risk: Highlighting societal vulnerabilities to AI-driven cyberattacks.
• Policy Development: Emphasizing the necessity of policies that address the ethical and
practical implications of AI in cybersecurity.


Research Questions or Hypotheses
The research examines:

1. What are the risks and trends associated with AI-driven cybercrime?
2. How can theoretical frameworks like Cyber Routine Activities Theory (Cyber-RAT)
inform countermeasures?
3. What policies can mitigate emerging AI-driven cyber threats?
The authors hypothesize that AI amplifies both the scale and sophistication of
cybercrime, necessitating innovative countermeasures and heightened awareness.

Research Methods
The authors use a qualitative approach that incorporates:
• Theoretical Frameworks: Cyber Routine Activities Theory (Choi, 2008) to analyze
patterns in cybercrime.
• Social Media Analytics: To assess the use of AI in social engineering and malware
distribution.
Data and Analysis
The study evaluates case studies, AI tools used in cybercrime (e.g., GPT-like applications), and
social media activity. Content analysis highlights risks like AI-driven malware and solutions
such as enhanced cyber hygiene and policy frameworks.
Relation to Classroom Concepts
The article ties to concepts such as:
• Cyber Routine Activities: Demonstrating how habitual online activities create
vulnerabilities that AI exploits.
• Cyber Hygiene: Emphasizing personal and organizational practices to mitigate risks.
• AI Ethics: Discussing the dual-use nature of AI in both protecting and compromising
cybersecurity.
Relation to Marginalized Groups
Marginalized groups often do not have access to resources such as advanced cybersecurity tools,
which makes them more vulnerable to AI-driven cybercrime. Increasing awareness and ensuring
equitable access to cyber defense mechanisms are critical for addressing these disparities.
Overall Contributions to Society
This study offers crucial insights into the changing relationship between AI and cybercrime,
highlighting the necessity of proactive measures to prevent the exploitation of AI. It aids in
shaping policies and enhancing cybersecurity education, promoting a more secure digital
landscape.

Conclusion
Shetty, Choi, and Park’s research highlights the urgent need for awareness and policies to address
the dual-use nature of AI in cybersecurity. It provides both theoretical and practical frameworks
to protect individuals and organizations from emerging threats.
References
Shetty, S., Choi, K., & Park, I. (2024). Investigating the Intersection of AI and Cybercrime:
Risks, Trends, and Countermeasures. International Journal of Cybersecurity Intelligence &
Cybercrime, 7(2), 28-53. https://doi.org/10.52306/2578-3289.1187