Lance Jenkins
February 16, 2025
Article Review #1: E-Contracts
Contracts are legally binding statements that are signed by one or more parties. Electric contracts are digitally signed documents of the same type. These forms of promise ensure all sides get what they want out of an agreement, while also protecting certain aspects of those parties. In the article: The Electronic Contract in Civil and Commercial Codes, electronic contracts are labeled under Jordian Law as “the recording of a contract through electronic communications, such as data messages.” (The Electronic Contract in Civil and Commercial Codes). It describes that all electronic contracts, by nature, are to be signed, written, and formed online. The parties are thus not present or in person to write up a physical contract.
Electronic contracts can be used much more effectively than physical contracts, as they can be monitored, edited, copied, or otherwise changed easily with the proper authority. A physical contract can be easily forged, stolen, destroyed, or altered by any odd means, but a digital copy of a signed agreement is much more protected.
This does not come without its own risks. Digital works such as contract are still subject to attacks. Hundreds of cases around the world have shown breaches in security and contracts voided or altered to defame or defraud, as well as illegally gain wealth and riches. This is why cybersecurity efforts are always being sought after.
The article goes on to clarify the differences between online contracts, as there are several types worth reviewing. Oral contracts are verbal agreements that are solidified via a telephone call. These have little proof of signature other than word of mouth. There are purely electronic contracts, which are digitally signed using the mouse or keyboard. These can be easily proved through those personal signatures.
Electronic contracts pose many challenges, however, in the affairs of evidence, availability, and enforceability. As the forms of authorization are digitally made, it is imperative that signatures and contracts are proofed and accounted for correctly. Online contracts are formed delicately and with utmost security in mind.
In conclusion, electronic contracts serve as a trusted form of agreement, but it is clear that there are flaws that can be exploited in the wrong scenario.
Work Cited:
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/267/95
Lance Jenkins
4/07/2025
CYSE 201S
Article Review #2: Cyberbullying and Social Media
Introduction
The world today is vastly different than it was forty to fifty years ago. Technology has given us countless innovations and advancements in everything from medical science to education. It is a cornerstone of modern society as we know it, and that is shown in no small part through the various forms of social media. Social media has become a culture in and of itself. Instagram, Twitter, YouTube, TikTok; These are just some of the many examples out there. Each one has its own role to play in the development of modern society as a whole, but there’s more to the story than just a fancy social interaction site. With the good, always comes the bad. What happens when you take these social interactions and twist them into something malicious?
The Underlying Issues
With the rise of social media, inevitably came massive problems. Cyberbullying is one of the main problems within the cyberspace many of us use every day. With all sorts of social media platforms, there is an increase in the chance you will meet people online who are just there to cause trouble. Cyberbullying, in many ways, is the same as actual bullying, but there are some key takeaways. For example, when you go to YouTube or Twitter, you are essentially anonymous unless you post information about you on these platforms. Nothing is stopping someone from making an account on these platforms and then going ahead to bullying others through their comments and posts.
Now each of these platforms has its own system of dealing with these attacks, but they have no way of stopping them, only deterring them. Your YouTube channel can be suspended or even terminated for things like excessive mean comments, threats, derogatory comments, and more. In the article Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges, it says in detail what cyberbullying is and how it is defined. In the article, cybersecurity is defined as, “…a form of bullying that involves the use of electronic means, such as social media sites, emails, forums, and instant messaging, to subject an individual to threatening behavior.” (Journal of Cybersecurity, Volume 10: Issue 1; Ray; McDermott; Nicho)
Cyberbullying Explained
Certain personality traits can affect how cyberbullying is achieved. Antisocial traits, namely sadism and narcissism, play key roles in deciding why a person would cyberbully. Not everyone that has antisocial traits will become a cyberbully, but it is important to note that they increase the chances, nonetheless. These traits, inherent to the individual, can be enhanced when exposed to social media and the online barrier between them and the victim. Other factors that can have an affect on a person’s ability to commit cyberbullying are psychological and environmental issues, behavioral misconduct, and general differences.
What Can Be Done?
Cyberbullying has become a severe problem for those affected by it. It can be emotionally and psychologically draining or scarring to go through depending on the severity of the attacks. It is this weakness that trolls and bullies use to exploit. They get a sense of power over others. Can this be prevented? Knowing the signs of cyberbullying and the traits needed to be susceptible to it are a way to start preventing further attacks. In the article, a sub article goes into the susceptibility of cyberbullying. It mentions how attacks start and grow, with low self-esteem and self-worth being a prominent factor in people falling under cyberbullying. It is crucial that we treat cyberbullying victims with care and dignity. As attacks continue to happen every day, it should be a top priority to protect others, especially children, from these attacks. If we cannot, then we need to mitigate the damages and provide adequate healing responses such as therapy to those affected.
Conclusion
Cyberbullying is a growing problem of our world today. It is caused by many factors, both behavioral and psychological, and it is widespread across all social medias. With the increased possibility of anonymity online, more and more attacks will occur. We as a society need to ensure the safety of others online and help prevent further attacks from ever starting by understanding the source of the attacks.
Works Cited:
Cyberbullying on social media: Definitions, prevalence, and impact challenges | journal of cybersecurity | oxford academic. (n.d.). https://academic.oup.com/cybersecurity/article/10/1/tyae026/7928395