{"id":270,"date":"2024-12-09T01:12:22","date_gmt":"2024-12-09T01:12:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/?page_id=270"},"modified":"2024-12-09T01:14:52","modified_gmt":"2024-12-09T01:14:52","slug":"article-reviews","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/article-reviews\/","title":{"rendered":"Article Reviews"},"content":{"rendered":"\n<p>Article Review #1 Cyberbullying and Cyberbullicide Ideation<\/p>\n\n\n\n<p>Paul Cumiskey<\/p>\n\n\n\n<p>Diwakar Yalpi<\/p>\n\n\n\n<p>Cybersecurity and the Social Sciences<\/p>\n\n\n\n<p>October 2, 2024<\/p>\n\n\n\n<p>Article Review #1 Cyberbullying and Cyberbullicide Ideation<\/p>\n\n\n\n<p>Introduction<\/p>\n\n\n\n<p>One of the most prominent issues among youth in the twenty-first century is cyberbullying and cyberbullicide ideation. Diab Al-Badayneh, Maher Khelifa, and Anis Ben Brik studied these important issues in-depth in an article titled Cyberbullying and CyberbullicideIdeation Among Jordanian College Students. The article goes over the concepts of bullying and cyberbullying, suicide in adolescents because of cyberbullying, as well as theories created by physiologists and sociologists about cyberbullying. The study hypothesizes that students\u2019 cyberbullying victimization could lead to cyberbullicide and cyberbullicide ideation. In simpler terms, the hypothesis is victims of cyberbullying may have an increased chance to kill themselves or think about killing themselves.&nbsp;&nbsp;<\/p>\n\n\n\n<p>What is cyberbullying and cyberbullicide<\/p>\n\n\n\n<p>Cyberbullying is the act of using the internet to hurt others. Cyberbullying is especially dangerous because the animosity provided by the internet makes many people more critical and ruthless online. The victims of cyberbullying will often experience depression, anxiety, social frustration, and emotional pressure(Al-Badayneh et al., 2024). Cyberbullicide is a term used for suicide committed as an outcome of cyberbullying. The article gives an apt and in-depth definition of both cyberbullying and cyberbullicide as well as a long list of real-life examples of the consequences.&nbsp;<\/p>\n\n\n\n<p>The research<\/p>\n\n\n\n<p>The research for the article was conducted via an electronic questionnaire, this is a type of survey research that was learned in class. The questionnaire was sent to 1000 Jordanian students from all 12 governorates. These students were selected at random and all attended college. Diab Al-Badayneh, Maher Khelifa, and Anis Ben Brik (2024) found that 45.4% of the students were male while 54.6% were females. The questionnaire used a variety of metrics to measure cyberbullying victimization some of which included a scale for bullying, cyberbullying, victimization, perpetration, and self-reported cyberbullying. They found that all students had experienced cyberbullying of some nature. 26% of the students had experienced cyberbullying in general, while 73% knew cyberbullying victims.<\/p>\n\n\n\n<p>The data and analysis done<\/p>\n\n\n\n<p>The data collected through the survey proved very valuable allowing the researchers to make many statistical models to prove a link between cyberbullying and cyberbullicide. The two main types of analysis used were regression analysis and correlational analysis. Regression analysis is a way to relate a dependent variable to any number of independent variables. This was used to identify which factors significantly predicted cybulicide ideation. Correlational analysis is used to discover the linear direction and strength of two different variables.&nbsp; This was used to study the relationship between cyberbullying and cyberbullicide ideation using correlation coefficients. We have gone over many similar statistical analysis methods in class.&nbsp;<\/p>\n\n\n\n<p>Marginalized groups<\/p>\n\n\n\n<p>The study relates to the challenges and concerns of marginalized groups in multiple ways. In this study, they succeeded at representing all 12 governorates of Jordan. This helped to define all Jordan students without excluding certain groups. The article also helped bring awareness to cyberbullying victims, who are a marginalized group in their respect. The article did a wonderful job of showcasing the challenges of cyberbullying victims.&nbsp;<\/p>\n\n\n\n<p>In conclusion, the article successfully supported its hypothesis that students\u2019 cyberbullying victimization could lead to cyberbullicide and cyberbullicide ideation. It also successfully relates to many principles of social science. The article successfully implemented relativism by challenging many of the preconceived notions of cyberbullying. It also remained objective by only stating facts and avoiding opinionated statements. The article also maintains parsimony by relating their findings to simple solutions. The overall societal contribution of the study was raising awareness about the deadly nature of cyberbullying. This improved awareness can have a ripple effect. Some campuses might start to take cyberbullying more seriously and introduce new policies to combat it and improve mental health resources.&nbsp;<\/p>\n\n\n\n<p>Reference<\/p>\n\n\n\n<p>\u00a0Al-Badayneh, D., Khelifa, M., &amp; Ben Brik, A. (2024). Cyberbullying and cyberbullicide ideation among Jordanian college students. International Journal of Cyber Criminology, 18, 1-25. https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/view\/329?__cf_chl_tk=i81YKHmLIJzw9wQV3yPnzYME9y_SRPO6XNaWZhJ5AFc-1727926374-0.0.1.1-8276<\/p>\n\n\n\n<p>Article Reveiw 2 <\/p>\n\n\n\n<p>Paul Cumiskey<br>Diwakar Yalpi<br>Cybersecurity and the Social Sciences<br>November 17, 2024<br>Article Review #2 How cybersecurity relates to intimate relationships<br>Introduction<br>The article &#8220;Privacy Threats in Intimate Relationships&#8221; by Karen Levy and Bruce<br>Schneier investigates how intimate relationships can lead to privacy risks via modern<br>surveillance technologies, when cyberthreats are studied and analyzed most privacy threats due<br>to intimate relationships are almost always overlooked. Even though in the everyday lives of<br>most people privacy breaches are perpetrated by people very close to the victim. This is<br>essentially the phenomenon that Karen Levy and Bruce Schneier explore. This relates to<br>cybersecurity and social sciences in many ways.<br>Questions asked<br>The article asked many pressing questions that, if answered, would illuminate an<br>unexplored area of cybersecurity and social sciences. How do new salience technologies affect<br>privacy in interpersonal relationships? What are the risks of digital surveillance and data<br>sharing? What are the social and legal implications of privacy breaches in interpersonal<br>relationships? These are some of the main questions that are asked in this article.<br>Research methods<br>While this article does not conduct any new research endeavors it does successfully<br>compile available data. Karen Levy and Bruce Schneier use existing research from disciplines<br>such as sociology and criminology. They use this data to analyze trends and patterns to see how<br>technology is affecting privacy in relationships. They also use anecdotal examples of technology<br>being used to invade victims&#8217; privacy such as stalking. So simply put this article mainly analysed<br>data to come to their findings.<br>Data Analysis<br>When it comes to the data analysis they used a wide array of different methods. They did<br>a Theoretical analysis to connect their findings to the concept of privacy and control in<br>relationships. They also used a qualitative analysis with the data that they retrieved from<br>secondary sources. Lastly, Karen Levy and Bruce Schneier also analyze the data from a legal and<br>ethical point of view.<br>Social Science Principles<br>This article relied on real-world cases and data from prior research to see how technology<br>can affect privacy in relationships. The article also relied on an interdisciplinary approach. It<br>analyzed data from sociology, criminology, psychology, and legal studies to give an insight into<br>privacy risks in relationships. The article also examines the social norms around trust and<br>privacy\u2019s evolution. This gives good social context to the issue.<br>How it relates to class<br>In class, we have gone over many topics that can relate to this one. One of which is the<br>theory that criminals commit their acts because they think there is no victim. Many people who<br>breach the privacy of their friends and family do not realize that they are victimizing the one they<br>care about. Also similar to hackers sometimes the reason the privacy breach is committed is<br>because they believe that they are doing something for the greater good. Lastly, I think this topic<br>interacts oddly with Maslow\u2019s hierarchy. While it does fall under a base need of security most<br>people don\u2019t think of it as a very critical issue. Which just shows to show how underrepresented<br>this issue is.<br>Marginalized groups<br>The study provides critical insights into how power dynamics in relationships are<br>evolving with modern technology, particularly in marginalized groups such as victims of<br>domestic abuse. Women, who are disproportionately affected by intimate privacy violations, are<br>highlighted as a group that requires additional protection. Issues like cyberstalking, coercive<br>control, and the widespread availability of surveillance tools are addressed, underscoring the<br>urgency of developing policies to safeguard these vulnerable populations.<br>Conclusion and overall societal contributions of the study<br>The study on privacy threats in intimate relationships offers meaningful contributions to<br>society by spotlighting an underrepresented issue. It highlights how technology can be misused<br>to breach personal boundaries, disrupt trust, and exert control in relationships. By exposing gaps<br>in current laws and advocating for stronger legal protections, the article calls for urgent policy<br>changes. Furthermore, it promotes ethical technology design, urging developers to prioritize user<br>privacy and consent. Overall, the research fosters a deeper understanding of the complex<br>interplay between technology, privacy, and relationships, encouraging a safer and more equitable<br>digital environment for all.<br>Reference<br>Karen Levy, Bruce Schneier. (2020). Privacy threats in intimate relationships.Journal of<br>Cybersecurity, Volume 6, Issue 1, 2020, tyaa006,<br>https:\/\/academic.oup.com\/cybersecurity\/article\/6\/1\/tyaa006\/5849222<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #1 Cyberbullying and Cyberbullicide Ideation Paul Cumiskey Diwakar Yalpi Cybersecurity and the Social Sciences October 2, 2024 Article Review #1 Cyberbullying and Cyberbullicide Ideation Introduction One of the most prominent issues among youth in the twenty-first century is cyberbullying and cyberbullicide ideation. Diab Al-Badayneh, Maher Khelifa, and Anis Ben Brik studied these important&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/article-reviews\/\">Read More<\/a><\/div>\n","protected":false},"author":29376,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/pages\/270"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/users\/29376"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/comments?post=270"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/pages\/270\/revisions"}],"predecessor-version":[{"id":273,"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/pages\/270\/revisions\/273"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/eportfolio-paulcumiskey\/wp-json\/wp\/v2\/media?parent=270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}