{"id":133,"date":"2023-01-23T00:29:46","date_gmt":"2023-01-23T00:29:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2023-04-26T01:18:01","modified_gmt":"2023-04-26T01:18:01","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/it-cyse-200t-2\/","title":{"rendered":"Article 1 Review"},"content":{"rendered":"\n<p class=\"has-small-font-size\">1. The article review should focus on (1) how the topic relates to the principles of the social sciences; (2) the study&#8217;s research questions or hypotheses; (3) the types of research methods used; (4) the types of data and analysis done; (5) how concepts from the PowerPoint presentations relate to the article; (6) how the topic relates to the challenges, concerns and contributions of marginalized groups; and (7) the overall contributions of the studies to society.<\/p>\n\n\n\n<p>1. https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/86\/23<br>The social phenomena of criminology and political science is examined in this essay. The<br>article&#8217;s main goal is to educate readers on the challenges journalists and human rights activists<br>experienced when they opposed the cybercrime draft war. Any promotion of human rights<br>advocates through social media would be illegal under the cybercrime law, which would impose<br>restrictions online. The article is made up of qualitative information that was gathered by<br>looking through archives, court records, and legal cases. They employed context analysis to<br>obtain data, according to the report. I noticed that the article and the PowerPoint that was given<br>to us had some similarities as I was reading it. Since they both go into detail on how cybercrimes<br>are on the rise as new technology is introduced to society, I was able to draw a connection<br>between both. According to the article, people&#8217;s right to free speech is being restricted. They are<br>forbidden from expressing their emotions for fear of incurring fines or even jail time. Overall,<br>this article describes the struggles faced by human activists who speak out against the law<br>against cybercrime. Government officials use severe penalties and sanctions, such as life<br>imprisonment, to silence their critics.<\/p>\n\n\n\n<p>2. https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/88\/25<br>This article examines the social phenomena of criminology. This article&#8217;s query aims to<br>alert readers to the fact that online fraudsters are buying property using forged documents. The<br>essay also discusses the development of land regulations, the history of electronic land, data<br>encryption, and the significance of protecting electronic land certifications in Indonesia. The<br>study uses qualitative research data to assemble its information. Some of the data and analyses<br>were gathered and reviewed from a variety of sources, including case studies, legal archives,<br>library resources, and conversations with land authorities who were stationed throughout<br>Indonesia.I discovered that both the PowerPoint presentation and the article I read discuss the<br>rise in internet crimes when I compared my notes from the two sources. Both the PowerPoint<br>presentation and the essay discuss the significance of protecting your data. For instance, the<br>article highlights the significance of the Indonesian Ministry of Agrarian Affairs and Spatial<br>Planning and the National Land Agency&#8217;s regulations, which help lower the danger of fake and<br>duplicate documents. The purpose of this article is to provide information that can be helpful to<br>all properties and homeowners who would like to know more about how to keep their personal<br>papers safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. The article review should focus on (1) how the topic relates to the principles of the social sciences; (2) the study&#8217;s research questions or hypotheses; (3) the types of research methods used; (4) the types of data and analysis done; (5) how concepts from the PowerPoint presentations relate to the article; (6) how the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":24717,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/users\/24717"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/pages\/133\/revisions\/319"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}