{"id":367,"date":"2024-12-08T23:42:43","date_gmt":"2024-12-08T23:42:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/?page_id=367"},"modified":"2024-12-08T23:42:43","modified_gmt":"2024-12-08T23:42:43","slug":"article-review-2-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/article-review-2-2\/","title":{"rendered":"Article Review #2"},"content":{"rendered":"\n<p><br><strong>Article Review #3: Digital Human Rights in Jordanian Legislation and International<br>Agreements<\/strong><br><strong>Introduction<\/strong><br>The article \u201cDigital Human Rights in Jordanian Legislation and International Agreements\u201d by<br>Fahad Yousef Al-Kasassbeh et al. explores the legal frameworks safeguarding digital rights in<br>Jordan and their alignment with international standards. This review examines how the study<br>relates to social science principles, outlines the research questions, methods, and data analysis,<br>connects classroom concepts, evaluates its relevance to marginalized groups, and discusses the<br>societal contributions of the research.<br><strong>Relation to Social Sciences Principles<\/strong><br>The article aligns with principles of the social sciences, particularly:<br>\u2022 Behavioral Theory: Examining how legislative and societal behaviors adapt to emerging<br>digital challenges.<br>\u2022 Sociology of Law: Highlighting the role of laws in shaping and regulating digital human<br>rights, focusing on issues such as privacy and equitable access to technology.<br>\u2022 Ethics and Policy Studies: Addressing ethical concerns about personal data exploitation<br>and advocating for robust legal protections in a digitally interconnected society.<br><strong>Research Questions or Hypotheses<\/strong><br>The study seeks to answer key questions:<br>1. How do Jordanian laws address the complexities of digital human rights?<br>2. In what ways do these laws align with international digital rights agreements?<br>3. What legislative, strategic, and technical challenges impede the protection of digital<br>rights?<\/p>\n\n\n\n<p>The hypothesis suggests that Jordanian legislation, while reflective of international<br>norms, requires further refinement to address rapid technological changes and protect<br>digital human rights.<\/p>\n\n\n\n<p><br><strong>Research Methods<\/strong><br>The authors employ a qualitative legal research method. They conduct a detailed content analysis<br>of Jordanian legislation and international agreements related to digital rights. Data was sourced<br>from legal texts, online platforms, and international human rights documents.<\/p>\n\n\n\n<p><br><strong>Data and Analysis<\/strong><br>The study examines both domestic and international legal frameworks, with a focus on privacy,<br>equitable access, and data protection. The authors highlight the discrepancies between Jordanian<br>laws and global digital rights standards, emphasizing the necessity for regulatory mechanisms to<br>address issues such as the exploitation of data by technology corporations.<br>Relation to Classroom Concepts<br>This article connects with social science concepts discussed in class, particularly:<br>\u2022 Digital Ethics: Examining how technology challenges traditional ethical boundaries in<br>privacy and data protection areas.<br>\u2022 Regulatory Policy Development: Relating to how governments balance individual<br>freedoms with societal concerns like public morality and national security.<br>\u2022 Human Rights Frameworks: Reflecting the integration of digital rights within the<br>broader spectrum of human rights as discussed in the Universal Declaration of Human<br>Rights.<\/p>\n\n\n\n<p><br><strong>Relation to Marginalized Groups<\/strong><br>The study highlights how unequal access to technology and communication infrastructure<br>disproportionately affects marginalized groups. Vulnerable populations may face challenges in<br>exercising digital rights due to systemic inequities in internet access or legal protections,<br>exacerbating existing social disparities.<br>Overall Contributions to Society<br>The research underscores the importance of embedding digital rights within national and<\/p>\n\n\n\n<p>international legal frameworks to protect freedoms like privacy, data protection, and equitable<br>access. The study identifies gaps in Jordanian legislation and contributes to the ongoing global<br>discourse on strengthening digital rights protections and fostering a more inclusive digital<br>society.<\/p>\n\n\n\n<p><br><strong>Conclusion<\/strong><br>Fahad Yousef Al-Kasassbeh et al.\u2019s article provides valuable insights into the evolving field of<br>digital human rights. It bridges local and global perspectives, emphasizing the need for robust<br>legal and ethical frameworks to safeguard digital freedoms while addressing challenges faced by<br>marginalized communities.<\/p>\n\n\n\n<p><br><strong>References<\/strong><br>Al-Kasassbeh, F. Y., Awaisheh, S. M., Odeibat, M. A., Awaesheh, S. M. A., Al-Khalaileh, L., &amp;<br>Al-Braizat, M. (2024). Digital Human Rights in Jordanian Legislation and International<br>Agreement. International Journal of Cyber Criminology, 18(1), 37\u201357.<br>https:\/\/doi.org\/10.5281\/zenodo.4766803<\/p>\n\n\n\n<p><br><strong>Article Review #4: Investigating the Intersection of AI and Cybercrime: Risks, Trends, and<br>Countermeasures<\/strong><br><strong>Introduction<\/strong><br>The article \u201cInvestigating the Intersection of AI and Cybercrime: Risks, Trends, and<br>Countermeasures\u201d by Sanaika Shetty, Kyung-Shick Choi, and Insun Park examines how<br>cybercriminals exploit Artificial Intelligence (AI) technologies and discusses countermeasures.<br>This review highlights the study&#8217;s links to social science principles, its research questions and<br>methods, and its relevance to marginalized groups and societal contributions.<br>Relation to Social Sciences Principles<br>The study connects to social science principles, particularly:<br>\u2022 Behavioral Theory: Investigating how cybercriminals adapt AI to exploit human<br>vulnerabilities.<br>\u2022 Sociology of Risk: Highlighting societal vulnerabilities to AI-driven cyberattacks.<br>\u2022 Policy Development: Emphasizing the necessity of policies that address the ethical and<br>practical implications of AI in cybersecurity.<\/p>\n\n\n\n<p><br><strong>Research Questions or Hypotheses<br>The research examines:<\/strong><br>1. What are the risks and trends associated with AI-driven cybercrime?<br>2. How can theoretical frameworks like Cyber Routine Activities Theory (Cyber-RAT)<br>inform countermeasures?<br>3. What policies can mitigate emerging AI-driven cyber threats?<br>The authors hypothesize that AI amplifies both the scale and sophistication of<br>cybercrime, necessitating innovative countermeasures and heightened awareness.<\/p>\n\n\n\n<p><strong>Research Methods<\/strong><br>The authors use a qualitative approach that incorporates:<br>\u2022 Theoretical Frameworks: Cyber Routine Activities Theory (Choi, 2008) to analyze<br>patterns in cybercrime.<br>\u2022 Social Media Analytics: To assess the use of AI in social engineering and malware<br>distribution.<br><strong>Data and Analysis<br><\/strong>The study evaluates case studies, AI tools used in cybercrime (e.g., GPT-like applications), and<br>social media activity. Content analysis highlights risks like AI-driven malware and solutions<br>such as enhanced cyber hygiene and policy frameworks.<br>Relation to Classroom Concepts<br>The article ties to concepts such as:<br>\u2022 Cyber Routine Activities: Demonstrating how habitual online activities create<br>vulnerabilities that AI exploits.<br>\u2022 Cyber Hygiene: Emphasizing personal and organizational practices to mitigate risks.<br>\u2022 AI Ethics: Discussing the dual-use nature of AI in both protecting and compromising<br>cybersecurity.<br><strong>Relation to Marginalized Groups<\/strong><br>Marginalized groups often do not have access to resources such as advanced cybersecurity tools,<br>which makes them more vulnerable to AI-driven cybercrime. Increasing awareness and ensuring<br>equitable access to cyber defense mechanisms are critical for addressing these disparities.<br>Overall Contributions to Society<br>This study offers crucial insights into the changing relationship between AI and cybercrime,<br>highlighting the necessity of proactive measures to prevent the exploitation of AI. It aids in<br>shaping policies and enhancing cybersecurity education, promoting a more secure digital<br>landscape.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><br>Shetty, Choi, and Park&#8217;s research highlights the urgent need for awareness and policies to address<br>the dual-use nature of AI in cybersecurity. It provides both theoretical and practical frameworks<br>to protect individuals and organizations from emerging threats.<br>References<br>Shetty, S., Choi, K., &amp; Park, I. (2024). Investigating the Intersection of AI and Cybercrime:<br>Risks, Trends, and Countermeasures. International Journal of Cybersecurity Intelligence &amp;<br>Cybercrime, 7(2), 28-53. https:\/\/doi.org\/10.52306\/2578-3289.1187<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #3: Digital Human Rights in Jordanian Legislation and InternationalAgreementsIntroductionThe article \u201cDigital Human Rights in Jordanian Legislation and International Agreements\u201d byFahad Yousef Al-Kasassbeh et al. explores the legal frameworks safeguarding digital rights inJordan and their alignment with international standards. This review examines how the studyrelates to social science principles, outlines the research questions, methods,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/claudell-nurse\/article-review-2-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28667,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/pages\/367"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/users\/28667"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/comments?post=367"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/pages\/367\/revisions"}],"predecessor-version":[{"id":368,"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/pages\/367\/revisions\/368"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/media?parent=367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}