{"id":322,"date":"2023-11-12T11:10:00","date_gmt":"2023-11-12T11:10:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/david3-cyberport\/?p=322"},"modified":"2023-12-15T16:23:04","modified_gmt":"2023-12-15T16:23:04","slug":"article-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/david3-cyberport\/2023\/11\/12\/article-2\/","title":{"rendered":"Article 2"},"content":{"rendered":"\n<p>Article Review 2: The article I decided to review is \u201cCybercrime Laws in Iraq: Addressing Limitations for Effective Governance.\u201d The author of this journal is Nashwan Mohammed Suleiman, Ahmed Hatim, Mohamed Amer Alseidi, Karrar Shareef Mohsen, Wesam Khalid Abd Al Aali, Alaa Hussein Abdulaal, Mustafa Asaad Rasol, Abdulnaser Khalid Hamzah, Khudr Bary Freeh Alsrray. The article goes over how some countries have started to bring technology into their society. The country that they used as an example was Iraq. The issue that is coming up is that there are no proper legal marks in place to take care of people. So things are starting to happen and develop to where these nations are learning that safety measures are needed. Like my previous article, this article\u2019s research was done through teams using software data analysis. This connects to the course in almost every way. This article goes over the need to be educated about internet safety, the ways that cybercrime develops, and why it develops. This shows the overall development of society technically across the world.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review 2: The article I decided to review is \u201cCybercrime Laws in Iraq: Addressing Limitations for Effective Governance.\u201d The author of this journal is Nashwan Mohammed Suleiman, Ahmed Hatim, Mohamed Amer Alseidi, Karrar Shareef Mohsen, Wesam Khalid Abd Al Aali, Alaa Hussein Abdulaal, Mustafa Asaad Rasol, Abdulnaser Khalid Hamzah, Khudr Bary Freeh Alsrray. The&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/david3-cyberport\/2023\/11\/12\/article-2\/\">Read More<\/a><\/div>\n","protected":false},"author":25883,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/david3-cyberport\/wp-json\/wp\/v2\/posts\/322"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/david3-cyberport\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/david3-cyberport\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david3-cyberport\/wp-json\/wp\/v2\/users\/25883"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david3-cyberport\/wp-json\/wp\/v2\/comments?post=322"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/david3-cyberport\/wp-json\/wp\/v2\/posts\/322\/revisions"}],"predecessor-version":[{"id":323,"href":"https:\/\/sites.wp.odu.edu\/david3-cyberport\/wp-json\/wp\/v2\/posts\/322\/revisions\/323"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/david3-cyberport\/wp-json\/wp\/v2\/media?parent=322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david3-cyberport\/wp-json\/wp\/v2\/categories?post=322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david3-cyberport\/wp-json\/wp\/v2\/tags?post=322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}