Article Review

Article Review 1

The Electronic Contract in Civil and Commercial Codes Article Review

BLUF: The Electronic Contract in Civil and Commercial Codes article explains how cyber communication impacts electronic commerce, how the Jordanian legislation frameworks are applicable to electronic contracts, and exploration of electronic contracts themselves.

Relation to Social Sciences and Concepts

Cybersecurity is an interdisciplinary discipline that deals with multiple disciplines. For example, economics is one of the main disciplines because a lot of the time whenever someone attempts a cyber attack onto another person, the motive is for monetary purposes. This article explains both sides of the relationship between cybersecurity and economics. With the rapid increase in technology, people have transformed from formal, time-intensive transactional methods to digital and technological means of communication (Masadeh et al., 2024). This is just one example of how technology relates to the social sciences.

Challenges and Concerns

Since technology is growing, so is cybersecurity. When technology grows, especially with finances and personal information, we want to keep our information secure hence, the growth of cybersecurity as well. The issue that comes around is the policies and laws cybersecurity deals with. For example, when doing an electronic commerce, a.k.a. E-commerce, transaction, sometimes it deals with parties from diverse geographical locations; The laws in the diverse locations could be different, therefore both parties need to agree on the laws for their areas (Masadeh et al., 2024). This can become an issue when the laws are significantly different resulting in possible conflict or cancellation of the transaction.

Research Questions, Methods, and Data

The main question the article describes is how the Jordanian legislative fundamentals execute electronic contract laws. The article used archival research by studying the data from books, articles, and websites. It analyzes the methods, structure, and application of electronic contracts in commercial and civil concepts (Masadeh et al., 2024).

Overall Contributions 

The article explains the basic concepts of e-commerce and electronic contracts. It explains the significance of these concepts and implements them into civil and commercial matters, while showing the legal implementations as well. Overall, the focus of this article demonstrates the limitations of the Jordanian law that hinder its ability to fully cover the advancements of electronic contracts (Masadeh et al., 2024).

Conclusion

The Electronic Contract in Civil and Commercial Codes article uses archival research to collect data about electronic contracts and Jordanian law. It analyzes the applications of electronic contracts in civil and commercial matters, as well as the limitations the Jordanian laws have to the advancing electronic contracts. It helps the reader understand the concepts first to then explain the relationships between them.

References

Al Masadeh, A., Khawaldeh, A., & Al-salamat, M. (2024, January). The Electronic Contract in Civil and Commercial Codes. International Journal of Cyber Criminology. https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/267/95 

Article Review 2

Article Review of “Development and Evaluation on Cybersecurity Behavior Measurement Instruments for Undergraduate Students” 

Introduction

This article describes a quantitative research study about developing and evaluating a measurement instrument for undergraduate students’ cybersecurity behavior. It had a sample size of 820 undergraduate students. Its aim was to determine how safe these students were on the internet because of the fast increase of technology. Statistics from the Royal Thai Police on online fraud incidents between January and June of 2024 revealed 50,781 cases. Of those cases about 19% involved individuals aged between 18-22 (Ngamcharoen et al.). This is why this research focused on undergraduate students as well as that age range being frequent internet users and a study by Watts et al. (2017) showed that problematic internet use is more prevalent among students than other population groups.

Data and Research

This study used a quantitative research method to develop and evaluate a robust measurement instrument for assessing cybersecurity behavior. This includes item quality testing, exploratory factor analysis, and confirmatory factor analysis. They used a multi-stage quota random sampling method to collect data ensuring equal representation across a large sample. They proposed three hypothesis: Exploratory factor analysis can effectively evaluate the cybersecurity behavior measurement instrument, exploratory factor analysis can account for more than 60% of the variance in cybersecurity behavior, and confirmatory factor analysis will validate that the model satisfactory fits the empirical data.

Relations

This study uses all of the scientific principles but mainly focuses on determinism because it measures previous events that have happened to undergraduate students, and then uses this to determine how well their cybersecurity behavior is. They tested three groups with all having different amounts of people, and randomly picked. This helps us determine more general data about how much we need to teach people cybersecurity practices to protect their data from attackers. This would help with the economy as well due to less financial loss from cyber attacks.

References

Ngamcharoen,Pannika, Sakdapat, Naksit, Emma Bhanthumnavin, Duchduen (2024). Development and Evaluation on Cybersecurity Behavior Measurement Instruments for Undergraduate Students. International Journal of Cyber Criminology,  https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/351/103