Article Review #1

Howard Spencer 

February 11, 2024

Article Review #1

Laws In Iraq: Addressing Limitations For Effective Governance 

This topic relates to the principles of the social sciences because it touches on how laws from a different country help develop practices and confidence in their employees. The article’s research deals with exploring the cybercrime legislative and administrative laws within Iraq, with a focus on identifying limitations and gaps in the existing framework according to View of Cybercrime Laws in Iraq: Addressing Limitations for Effective Governance (cybercrimejournal.com). The methods used to solve this issue in Iraq includes the sampling strategy that Iraq is using to improve cybercrimes and their technology bases. They use purposive sampling technique choosing the correct research sample that will help gather

Authentic responses from the chosen sample regarding the laws thus executed in Iraq to

Avoid any risks from cybercrime at The administrative and legislative level, and it will support

The aim of enhancing the depth of the gathered knowledge. The data was collected through interview and the NVivo software for codification and to achieve the goal of what they are looking for to increase the cases of cybercrime in Iraq. This article relates to the behavioral theories from the powerpoint by explaining the techniques used in Iraq to figure out how to make a better country technically by using other respondents to get the information needed and teaching kids in schools about what cybercrime has done in Iraq. This article relates to the challenges, concerns, and contributions of the marginalized groups because the article gives great information about how they addressed the issue and what they did to improve the situation put in front of them and had a game plan to make the cybercrimes less effective. 

Bugs in our pockets: the risks of client-side scanning

This topic relates to the principles of the social sciences because it addresses the issue and it relates to the Behavioral theories and cyber offending topic that helps develop a plan on how to execute the problem. The research question is about whether privacy and purpose limitations can be enforced. The types of methods used to solve the problem are using these two different technologies called perceptual hashing and machine learning. According to Bugs in our pockets: the risks of client-side scanning | Journal of Cybersecurity | Oxford Academic (oup.com) “Hashes are specialized algorithms capable of digesting a large input file and producing a short unique “fingerprint” or hash”. These techniques are used to break down sex abuse easier via picture or text messages. The type of analysis done that these researchers used was scanning each text or any sight seeing abuse online to catch the enemy behind the scenes. This article relates to the powerpoint because it uses one of the theories called behavioral and cyber offending that justifies the steps of what was used to identify the problem. This article relates to the challenges, concerns and contributions of marginalized groups because this is a difficult task that implies two techniques to find out the issue behind these online cybercrimes. The article relates to the overall contributions of the study of social science because it gives great explained information on the techniques and how they handled the encounters of sex abuse and text message from a predator and uses one of the theories from the powerpoint that these researchers used to solve this issue on how to identify and stop this type of crime done by another individual.  This article gives detailed steps on figuring out how to use and what these two techniques they used to identify the issue through technology. This article primarily focuses on the behavioral theory heavy from the powerpoint addressing the techniques that were used to solve this issue and made these two techniques more helpful by explaining the concept of them and how they are used to solve the problem in the cybersecurity field. 

 Victimization by Deepfake in the Metaverse: Building a Practical Management Framework 

This article relates to the principles of the social sciences because it touches on the Psychodynamic Theory and Cyber Offending theory that comes in contact with cyber bullying as a factor. This topic explains how to prevent the deep fake and impersonating of another person on the internet that a person may come in contact with. According to Victimization by Deepfake in the Metaverse: Building a Practical Management Framework (bridgew.edu) research question is “to bridge the gap from the lack of research on mitigating deepfake-related interpersonal crime in the metaverse by developing a theoretical framework for effective methods of prevention, as well as for serving support to victims who suffer from the harmful psychological impacts of these crimes”. The type of method used to solve the issue was by getting information from experts by interviewing them in a different way like code based on notes and email responses. The article states how the methods were used and The responses of each expert were closely identified. “The responses of all experts were closely examined and compared to serve as a foundation for creating an effective framework for mitigating these types of crimes in the upcoming metaverse, as well as providing victim services for users who have already become victims. By collaborating these responses with prior research of traditional practices, it was determined which types of services need to be expanded to make the metaverse a safer place for the future of all users, including children, who can become victims of deepfake-related interpersonal cybercrime”. This has increasingly helped the organization figure out how to solve and identify the issues of finding the user behind these scams and cyber bullying accounts. This article relates to the challenges, concerns and contributions of marginalized groups because it uses the Psychodynamic Theory and Cyber Offending theory by explaining the steps of figuring out who are behind these accounts and email scams and how they executed the situation using metaverse expertise. The overall contribution that this article uses that relates to the study of society is for users to understand how an online cybercrime can be committed and its pros and cons behind it. 

Leave a Reply

Your email address will not be published. Required fields are marked *