References
[1] Shulzhenko, N., & Romashkin, S. (2020). Internet fraud and transnational organized crime. Juridical Tribune. https://tribunajuridica.eu
[2] Al-Qaaida, M. S. S. (2021). Establishing effective legal framework for new generation: A comparison of the Jordanian and some European constitutions. https://pte.hu
[3] Ololade, B. M., Salawu, M. K., & Adekanmi, A. D. (2020). E-fraud in Nigerian banks: Why and how? Journal of Financial Risk Management, 9(3), 211–228. https://scirp.org
[4] Tambe Ebot, A. C., Siponen, M., & Topalli, V. (2024). Towards a cybercontextual transmission model for online scamming. European Journal of Information Systems, 33(4), 571–596. https://jyu.fi
[5] Razaq, L., Ahmad, T., Ibtasam, S., Ramzan, U., & Mare, S. (2021). “We even borrowed money from our neighbor”: Understanding mobile-based frauds through victims’ experiences. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW1), 1–30.
[6] Malik, A. A., Asad, M., & Azeem, W. (2022). The frauds in banking and entrepreneurs by electronic devices and combating using software and employment of demilitarized zone in the networks. International Journal for Electronic Crime Investigation, 6(4), 5–12.
[7] Stapleton, A. H. (2022). The financial fraud epidemic and how it has changed business fraud.
[8] Cole, T. (2023). How are financial institutions enabling online fraud? A developmental online financial fraud policy review. Journal of Financial Crime.
[9] Khater, M. N., Issa, H. A., Alsheyab, M. S., & Alwerikat, N. (2024). The crime of goods fraud in the Jordanian penal code. Multidisciplinary Reviews, 7(2), Article 2024035.
[10] Jabber, M. N. (2025). NATO from formation to expansion: A perspective on international relations. Al-Biruni Journal of Humanities and Social Sciences, 3(10). https://doi.org/10.64440/BIRUNI/BIR006
[11] Jalghoum, Y., Tahtamouni, A., Khasawneh, S., & Al-Madadha, A. (2021). Challenges to healthcare information systems development: The case of Jordan. International Journal of Healthcare Management, 14(2), 447–455.
[12] Volobuieva, O., Leheza, Y., Pervii, V., Plokhuta, Y., & Pichko, R. (2023). Criminal and administrative legal characteristics of offenses in the field of countering drug trafficking: Insights from Ukraine. Yustisia.
[13] Saghir, W., & Kafteranis, D. (2022). The applicable law on digital fraud. In Finance, law, and the crisis of COVID-19: An interdisciplinary perspective (pp. 221–235). Springer.
[14] Baechler, S. (2020). Document fraud: Will your identity be secure in the twenty-first century? European Journal on Criminal Policy and Research.
[15] Оразхан, A. B., & Татаринов, D. V. (2020). National legislation of foreign countries on cybercrime. Meridian Scientific Electronic Journal, (9), 382–384.
[16] Toubat, H. S., Halim, R., & Magableh, N. (2020). The impact of technological development on legal rules: A case study of Jordan. Journal of Critical Reviews.
[17] JAMAL AWWAD ALKHARMAN (2025). Cyber-Terrorism Crimes And Their Impact On Maritime Transport Operations. Al-Biruni Journal of Humanities and Social Sciences, 3(10). https://doi.org/10.64440/BIRUNI/BIR005
[18] Madi, H., & Malhas, F. (2024). Applying FIDIC contracts in Jordan. In FIDIC Contracts in Africa and the Middle East.
[19] Abu Sarhan, T. M., & Fouché, A. (n.d.). Child sexual grooming: Listening to victims in Jordan. SSRN. https://ssrn.com
[20] Svensson-Hoglund, S., Richter, J. L., Maitre-Ekern, E., Russell, J. D., Pihlajarinne, T., & Dalhammar, C. (2021). Barriers, enablers and market governance: A review of the policy landscape for repair of consumer electronics in the EU and the US. Journal of Cleaner Production, 288, 125488.
[21] Triviño, R., Franco-Crespo, A., & Ochoa-Urrego, R. L. (2020). Network neutrality: The case of five South American countries. In XV Multidisciplinary International Congress on Science and Technology (pp. 150–161). Springer.
[22] Brown, I., & Marsden, C. T. (2023). Regulating code: Good governance and better regulation in the information age.
[23] Halalsheh, M., Kassab, G., & Shatanawi, K. (2021). Impact of legislation on olive mill wastewater management: Jordan as a case study. Water Policy.
[24] Chhabra Roy, N., & Prabhakaran, S. (2023). Internal-led cyber frauds in Indian banks: An effective machine-learning–based defense system for fraud detection, prioritization, and prevention. Aslib Journal of Information Management, 75(2), 246–296.
[25] Seetharama, Y. D. (n.d.). Architecting fraud resilience: A multidimensional strategy. Academia.edu.