Article Reviews

Article Review #1 Cyberbullying and Cyberbullicide Ideation

Paul Cumiskey

Diwakar Yalpi

Cybersecurity and the Social Sciences

October 2, 2024

Article Review #1 Cyberbullying and Cyberbullicide Ideation

Introduction

One of the most prominent issues among youth in the twenty-first century is cyberbullying and cyberbullicide ideation. Diab Al-Badayneh, Maher Khelifa, and Anis Ben Brik studied these important issues in-depth in an article titled Cyberbullying and CyberbullicideIdeation Among Jordanian College Students. The article goes over the concepts of bullying and cyberbullying, suicide in adolescents because of cyberbullying, as well as theories created by physiologists and sociologists about cyberbullying. The study hypothesizes that students’ cyberbullying victimization could lead to cyberbullicide and cyberbullicide ideation. In simpler terms, the hypothesis is victims of cyberbullying may have an increased chance to kill themselves or think about killing themselves.  

What is cyberbullying and cyberbullicide

Cyberbullying is the act of using the internet to hurt others. Cyberbullying is especially dangerous because the animosity provided by the internet makes many people more critical and ruthless online. The victims of cyberbullying will often experience depression, anxiety, social frustration, and emotional pressure(Al-Badayneh et al., 2024). Cyberbullicide is a term used for suicide committed as an outcome of cyberbullying. The article gives an apt and in-depth definition of both cyberbullying and cyberbullicide as well as a long list of real-life examples of the consequences. 

The research

The research for the article was conducted via an electronic questionnaire, this is a type of survey research that was learned in class. The questionnaire was sent to 1000 Jordanian students from all 12 governorates. These students were selected at random and all attended college. Diab Al-Badayneh, Maher Khelifa, and Anis Ben Brik (2024) found that 45.4% of the students were male while 54.6% were females. The questionnaire used a variety of metrics to measure cyberbullying victimization some of which included a scale for bullying, cyberbullying, victimization, perpetration, and self-reported cyberbullying. They found that all students had experienced cyberbullying of some nature. 26% of the students had experienced cyberbullying in general, while 73% knew cyberbullying victims.

The data and analysis done

The data collected through the survey proved very valuable allowing the researchers to make many statistical models to prove a link between cyberbullying and cyberbullicide. The two main types of analysis used were regression analysis and correlational analysis. Regression analysis is a way to relate a dependent variable to any number of independent variables. This was used to identify which factors significantly predicted cybulicide ideation. Correlational analysis is used to discover the linear direction and strength of two different variables.  This was used to study the relationship between cyberbullying and cyberbullicide ideation using correlation coefficients. We have gone over many similar statistical analysis methods in class. 

Marginalized groups

The study relates to the challenges and concerns of marginalized groups in multiple ways. In this study, they succeeded at representing all 12 governorates of Jordan. This helped to define all Jordan students without excluding certain groups. The article also helped bring awareness to cyberbullying victims, who are a marginalized group in their respect. The article did a wonderful job of showcasing the challenges of cyberbullying victims. 

In conclusion, the article successfully supported its hypothesis that students’ cyberbullying victimization could lead to cyberbullicide and cyberbullicide ideation. It also successfully relates to many principles of social science. The article successfully implemented relativism by challenging many of the preconceived notions of cyberbullying. It also remained objective by only stating facts and avoiding opinionated statements. The article also maintains parsimony by relating their findings to simple solutions. The overall societal contribution of the study was raising awareness about the deadly nature of cyberbullying. This improved awareness can have a ripple effect. Some campuses might start to take cyberbullying more seriously and introduce new policies to combat it and improve mental health resources. 

Reference

 Al-Badayneh, D., Khelifa, M., & Ben Brik, A. (2024). Cyberbullying and cyberbullicide ideation among Jordanian college students. International Journal of Cyber Criminology, 18, 1-25. https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/329?__cf_chl_tk=i81YKHmLIJzw9wQV3yPnzYME9y_SRPO6XNaWZhJ5AFc-1727926374-0.0.1.1-8276

Article Reveiw 2

Paul Cumiskey
Diwakar Yalpi
Cybersecurity and the Social Sciences
November 17, 2024
Article Review #2 How cybersecurity relates to intimate relationships
Introduction
The article “Privacy Threats in Intimate Relationships” by Karen Levy and Bruce
Schneier investigates how intimate relationships can lead to privacy risks via modern
surveillance technologies, when cyberthreats are studied and analyzed most privacy threats due
to intimate relationships are almost always overlooked. Even though in the everyday lives of
most people privacy breaches are perpetrated by people very close to the victim. This is
essentially the phenomenon that Karen Levy and Bruce Schneier explore. This relates to
cybersecurity and social sciences in many ways.
Questions asked
The article asked many pressing questions that, if answered, would illuminate an
unexplored area of cybersecurity and social sciences. How do new salience technologies affect
privacy in interpersonal relationships? What are the risks of digital surveillance and data
sharing? What are the social and legal implications of privacy breaches in interpersonal
relationships? These are some of the main questions that are asked in this article.
Research methods
While this article does not conduct any new research endeavors it does successfully
compile available data. Karen Levy and Bruce Schneier use existing research from disciplines
such as sociology and criminology. They use this data to analyze trends and patterns to see how
technology is affecting privacy in relationships. They also use anecdotal examples of technology
being used to invade victims’ privacy such as stalking. So simply put this article mainly analysed
data to come to their findings.
Data Analysis
When it comes to the data analysis they used a wide array of different methods. They did
a Theoretical analysis to connect their findings to the concept of privacy and control in
relationships. They also used a qualitative analysis with the data that they retrieved from
secondary sources. Lastly, Karen Levy and Bruce Schneier also analyze the data from a legal and
ethical point of view.
Social Science Principles
This article relied on real-world cases and data from prior research to see how technology
can affect privacy in relationships. The article also relied on an interdisciplinary approach. It
analyzed data from sociology, criminology, psychology, and legal studies to give an insight into
privacy risks in relationships. The article also examines the social norms around trust and
privacy’s evolution. This gives good social context to the issue.
How it relates to class
In class, we have gone over many topics that can relate to this one. One of which is the
theory that criminals commit their acts because they think there is no victim. Many people who
breach the privacy of their friends and family do not realize that they are victimizing the one they
care about. Also similar to hackers sometimes the reason the privacy breach is committed is
because they believe that they are doing something for the greater good. Lastly, I think this topic
interacts oddly with Maslow’s hierarchy. While it does fall under a base need of security most
people don’t think of it as a very critical issue. Which just shows to show how underrepresented
this issue is.
Marginalized groups
The study provides critical insights into how power dynamics in relationships are
evolving with modern technology, particularly in marginalized groups such as victims of
domestic abuse. Women, who are disproportionately affected by intimate privacy violations, are
highlighted as a group that requires additional protection. Issues like cyberstalking, coercive
control, and the widespread availability of surveillance tools are addressed, underscoring the
urgency of developing policies to safeguard these vulnerable populations.
Conclusion and overall societal contributions of the study
The study on privacy threats in intimate relationships offers meaningful contributions to
society by spotlighting an underrepresented issue. It highlights how technology can be misused
to breach personal boundaries, disrupt trust, and exert control in relationships. By exposing gaps
in current laws and advocating for stronger legal protections, the article calls for urgent policy
changes. Furthermore, it promotes ethical technology design, urging developers to prioritize user
privacy and consent. Overall, the research fosters a deeper understanding of the complex
interplay between technology, privacy, and relationships, encouraging a safer and more equitable
digital environment for all.
Reference
Karen Levy, Bruce Schneier. (2020). Privacy threats in intimate relationships.Journal of
Cybersecurity, Volume 6, Issue 1, 2020, tyaa006,
https://academic.oup.com/cybersecurity/article/6/1/tyaa006/5849222