{"id":324,"date":"2025-12-04T01:09:06","date_gmt":"2025-12-04T01:09:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/derrickamissah\/?page_id=324"},"modified":"2025-12-04T01:25:25","modified_gmt":"2025-12-04T01:25:25","slug":"article-review","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/derrickamissah\/article-review\/","title":{"rendered":"Article Reviews"},"content":{"rendered":"\n<p>Article #1 review will be derived from a scholarly journal.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Open and easy-to-access journals that students might select articles from &#8211; include the International Journal of Cybercriminology, the International Journal of Cybersecurity Intelligence &amp; Cybercrime, and the Journal of Cybersecurity.&nbsp;&nbsp;&nbsp;<\/h1>\n\n\n\n<h1 class=\"wp-block-heading\">The article review should focus on<\/h1>\n\n\n\n<ul>\n<li>Describe how the topic relates to the principles of the social sciences;<\/li>\n\n\n\n<li>Describe the study&#8217;s research question ,hypotheses, IV [Independent Variable] and DV [Dependent Variable] ;<\/li>\n\n\n\n<li>Describe the types of research methods used;<\/li>\n\n\n\n<li>Describe the types of data and analysis done;<\/li>\n\n\n\n<li>Describe how concepts from the PowerPoint presentations relate to the article;<\/li>\n\n\n\n<li>Describe how the topic relates to the challenges, concerns and contributions of marginalized groups; and<\/li>\n\n\n\n<li>Describe the overall contributions of the studies to society.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Please note the rubric that I will follow to grade your Article# 1 Review is in the syllabus.&nbsp; &nbsp;<\/p>\n\n\n\n<p> <\/p>\n\n\n\n<p>Article Review #1<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-content\/uploads\/sites\/38704\/2025\/12\/annotated-Article20Review.202321.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Article20Review.202321.\"><\/object><a id=\"wp-block-file--media-461eeacd-6546-4ded-89e5-f8f79684e506\" href=\"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-content\/uploads\/sites\/38704\/2025\/12\/annotated-Article20Review.202321.pdf\">annotated-Article20Review.202321<\/a><a href=\"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-content\/uploads\/sites\/38704\/2025\/12\/annotated-Article20Review.202321.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-461eeacd-6546-4ded-89e5-f8f79684e506\">Download<\/a><\/div>\n\n\n\n<p>Article #2<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-content\/uploads\/sites\/38704\/2025\/12\/annotated-Article20Review202322028129.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Article20Review202322028129.\"><\/object><a id=\"wp-block-file--media-d98e6e2b-7b67-4a90-9782-56494d2e2cfb\" href=\"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-content\/uploads\/sites\/38704\/2025\/12\/annotated-Article20Review202322028129.pdf\">annotated-Article20Review202322028129<\/a><a href=\"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-content\/uploads\/sites\/38704\/2025\/12\/annotated-Article20Review202322028129.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d98e6e2b-7b67-4a90-9782-56494d2e2cfb\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Article #1 review will be derived from a scholarly journal. Open and easy-to-access journals that students might select articles from &#8211; include the International Journal of Cybercriminology, the International Journal of Cybersecurity Intelligence &amp; Cybercrime, and the Journal of Cybersecurity.&nbsp;&nbsp;&nbsp; The article review should focus on Please note the rubric that I will follow to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/derrickamissah\/article-review\/\">Read More<\/a><\/div>\n","protected":false},"author":30656,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/pages\/324"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/users\/30656"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/comments?post=324"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/pages\/324\/revisions"}],"predecessor-version":[{"id":331,"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/pages\/324\/revisions\/331"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/derrickamissah\/wp-json\/wp\/v2\/media?parent=324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}