{"id":285,"date":"2025-04-16T18:32:11","date_gmt":"2025-04-16T18:32:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/myduuteportfolio\/?page_id=285"},"modified":"2025-04-26T03:35:46","modified_gmt":"2025-04-26T03:35:46","slug":"article-review","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/myduuteportfolio\/article-review\/","title":{"rendered":"Article Review"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">ARTICLE REVIEW #1.<\/h2>\n\n\n\n<p><strong>NAME:&nbsp;<\/strong><em>DUUT EMMANUEL<\/em><\/p>\n\n\n\n<p><strong>DATE:&nbsp;<\/strong><em>02\/16\/2025<\/em><\/p>\n\n\n\n<p><strong>ARTICLE REVIEW #1:&nbsp;<\/strong><em>NAVIGATING THROUGH THE ARTICLE \u201cPREVENTING AND COMBATING CYBERCRIME IN INDONESIA\u201d<\/em><\/p>\n\n\n\n<p><strong><em>PRINCIPLES OF SOCIAL SCIENCES AND CYBERSECURITY IN INDONESIA<\/em><\/strong><\/p>\n\n\n\n<p>The topic of cybercrime lines up with some key principles of social sciences, emphasizing on the interconnections of technology, laws and societal behaviors. The study looks at how technology and social systems work together to help combat digital data hacking, showing the critical role, social sciences which is the study of human behaviors in society, plays in this regard. The principle of social sciences highlights he significance of community engagement and collective responsibility in fostering cyber resilience, showing that technological solutions alone are inadequate without public cooperation and education.<\/p>\n\n\n\n<p><strong><em>RESEARCH QUESTIONS OR HYPOTHESIS<\/em><\/strong><\/p>\n\n\n\n<p>The study mainly concentrates on finding effective ways to prevent cybercrime and the legal framework available to fight it in Indonesia. It checks if these policies follow Indonesian laws and how effective they are used. The study also looks at how present policies and preventive strategies work in fighting cybercrime in Indonesia. The study poses questions like; how effective is the present laws on cybercrime in Indonesia? What part do public awareness and education play in cybercrime prevention?<\/p>\n\n\n\n<p><strong><em>RESEARCH METHOD<\/em><\/strong><\/p>\n\n\n\n<p>The study uses qualitative research method, concentrating on a descriptive approach to scrutinize data from archives, case studies and other legal documents related to cybercrime laws of Indonesia. This method helps to provide better understanding of the laws and social issues involved in combating digital data threats and attacks.<\/p>\n\n\n\n<p><strong><em>DATA AND ANALYSIS<\/em><\/strong><\/p>\n\n\n\n<p>The research study uses data analysis laws and existing cybercrime records instances, particularly by reviewing documents to ascertain accurate and reliable information. Content analysis is used to assess the data carefully and organize the information to provide clear understanding on how well to defend individuals and systems against cyber threats or attacks.<\/p>\n\n\n\n<p><strong><em>CONCEPTS FROM POWERPOINT PRESENTATIONS<\/em><\/strong><\/p>\n\n\n\n<p>The research study uses some ideas from the PowerPoint slides, including human factors, psychological theories, and the role of disadvantaged groups. Understanding human factors in cybersecurity, for instance, means using psychological ideas to make better security policies and systems. The psychological theories of cyber offending such as Psychodynamic, cognitive, and behavioral theories try to explain why people commit cybercrime. The challenges of marginalized group are also highlighted indicating the need for diversity in cybersecurity study and practice.<\/p>\n\n\n\n<p><strong><em>MARGINALIZED GROUPS AND CYBERSECURITY<\/em><\/strong><\/p>\n\n\n\n<p>Cybercrime like gender based cyberviolence often affects the marginalized and vulnerable groups in society, who don\u2019t have means to avoid online dangers and how to get legitimate help. Some of these challenges are outlined in the article, as a major social issue that demands comprehensive measures to fight against cyber risks or attacks, to offer protection, safety and fair justice for everyone. The article advocates for intentionally drafted initiatives to empower those groups with knowledge and resources to reduce their susceptibility to promote societal resilience against digital attacks or threats.<\/p>\n\n\n\n<p><strong><em>CONTRIBUTIONS OF THE STUDIES TO SOCIETY<\/em><\/strong><\/p>\n\n\n\n<p>The study offers a comprehensive understanding of cybercrime in Indonesia, proposing ways to improve safety parameters and strengthen the legal architect to protect everyone in the society. The study also emphasizes on both the technical and social aspects of combating cybercrime. The creation of preventive laws and the increase of public knowledge and awareness about cybercrime helps in the fight against cyber-attacks on vulnerable persons and institutions.<\/p>\n\n\n\n<p><strong><em>CONCLUSION<\/em><\/strong><\/p>\n\n\n\n<p>In conclusion, the article highlighted the importance of interdisciplinary sectors of study to work together in tracking and tackling issues of cybercrime. The emphasis on social sciences is imperative in creating workable laws and preventive mechanisms to combat cybercrime. Again, the study seeks to provide support and protection for the marginalized and vulnerable individuals in the society.<\/p>\n\n\n\n<p><strong>&nbsp;<em>REFERENCE:<\/em><\/strong>&nbsp;<em>MF Imran. (2023). Preventing and Combating Cybercrime in Indonesia. Retrieved from https:\/\/cybercrimejournal.com\/menuscript\/index.php\/cybercrimejournal\/article\/download\/225\/87\/419<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>ARTICLE REVIEW #2<\/strong><\/h2>\n\n\n\n<p><strong>NAME: <\/strong>DUUT EMMANUEL<\/p>\n\n\n\n<p><strong>DATE: <\/strong>03\/30\/2025<\/p>\n\n\n\n<p><strong>ARTICLE REVIEW #2: <\/strong>CYBERBULLYING ON SOCIAL MEDIA: DEFINITIONS, PREVALENCE AND IMPACT CHALLENGES.<\/p>\n\n\n\n<p>The article \u201cCyberbullying on Social Media: Definitions, Prevalence and Impact Challenges\u201d systematically reviews the existing literature on cyberbullying to provide a clearer understanding of its definitions, prevalence and impact. This topic is deeply intertwined with the principles of social sciences, particularly sociology and psychology, as it examines how social interactions and individual behaviors are influenced by digital environments.<\/p>\n\n\n\n<p><strong><em>PRINCIPLES OF SOCIAL SCIENCES<\/em><\/strong><\/p>\n\n\n\n<p>Cyberbullying is a social problem that shows bigger problems in society, like how power works, what the rules are, and how technology changes how people act. Sociology helps us understand how social groups are put together and how relationships within these groups can lead to bad things like cyberbullying. Psychological research, on the other hand, helps us understand how cyberbullying affects people and their mental health.<\/p>\n\n\n\n<p><strong><em>QUESTIONS OR HYPOTHESES FOR RESEARCH<\/em><\/strong><\/p>\n\n\n\n<p>&nbsp;The study&#8217;s main goals were to answer the following questions:<\/p>\n\n\n\n<p>1. What does the research say about cyberbullying?<\/p>\n\n\n\n<p>2. What makes harassment happen, and how can you measure it?<\/p>\n\n\n\n<p>3. Why do certain personality traits increase cyberbullying risk?<\/p>\n\n\n\n<p>4. How do direct and indirect situations with cyberbullying affect how common it is?<\/p>\n\n\n\n<p>5. What are the effects of harassment on individuals and what steps can we take to mitigate them?<\/p>\n\n\n\n<p><strong><em>RESEARCH METHOD USED<\/em><\/strong><\/p>\n\n\n\n<p>The study utilized a systematic review methodology, following the guidelines of the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA). This involved comprehensive search of relevant literature across multiple databases, including Scopus, Google scholar, and Science Direct. The inclusion criteria were broad, encompassing various types of papers such as empirical studies, case studies and theoretical papers. The review analyzed 71 articles published between 2007 and 2022.<\/p>\n\n\n\n<p><strong><em>TYPES OF DATA AND ANALYSES<\/em><\/strong><\/p>\n\n\n\n<p>The data extracted from the selected articles included author(s), year of publication, region, sample type, journal, article type and methods. Descriptive statistics and Meta-Analysis were used to summarize the findings. The study highlighted inconsistencies in the definitions of cyberbullying, the prevalence rate, and the impact on mental health. It also identified gaps in research, particularly the under exploration of cyberbullying among adult populations.<\/p>\n\n\n\n<p><strong><em>CONCEPTS FROM POWERPOINT PRESENTATIONS<\/em><\/strong><\/p>\n\n\n\n<p>The article relates to several concepts discussed in the PowerPoint presentations, such as the influence of social norms and values on cybersecurity practices. It also touches on the role of different subcultures within the cybersecurity community, including the hacker subculture and the professional cybersecurity subculture. The study\u2019s focus on personality traits aligns with the discussions on the psychological aspects of cybersecurity.<\/p>\n\n\n\n<p><strong><em>CHALLENGES, CONCERNS, AND CONTRIBUTIONS OF THE MARGINALIZED GROUP<\/em><\/strong><\/p>\n\n\n\n<p>The article addresses challenges faced by the marginalized group, especially the adolescents and young adults, who are most at risk of cyberbullying. It highlights the highest victimization rates among females, and the different impacts of mental health for male and female victims. The study calls for more research on cyberbullying among adults and the development of effective prevention and intervention strategies.<\/p>\n\n\n\n<p><strong><em>OVERALL CONTRIBUTIONS TO SOCIETY<\/em><\/strong><\/p>\n\n\n\n<p>The study makes significant contributions to society by providing a comprehensive synthesis of the current understanding of cyberbullying. It proposes a standardized definition of cyberbullying, which can help unify future research and policy-making efforts. By identifying gaps in the literature, the study sets the stage for more targeted and cohesive future research. It also emphasizes the need for effective interventions to mitigate the negative impacts of cyberbullying on mental health and well-being.<\/p>\n\n\n\n<p><strong><em>CONCLUSION<\/em><\/strong><\/p>\n\n\n\n<p>In conclusion, the article \u201cCyberbullying on Social Media: Definitions, Prevalence and Impact Challenges\u201d offers a valuable insight into the complex phenomenon of cyberbullying. It underscores the importance of understanding the social and psychological dimensions of cyberbullying and calls for more research to address the challenges faced by the marginalized groups. The study\u2019s contributions to society are significant, as they pave the way for more effective strategies to combat cyberbullying and enhance the well-being of individuals in the digital world.<\/p>\n\n\n\n<p><strong><em>REFERENCE: <\/em><\/strong><em>Ray, G. (2024). Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges. Journal of Cybersecurity, Volume 10, Issue 1, https:\/\/doi.org\/10.1093\/cybsec\/tyae026<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ARTICLE REVIEW #1. NAME:&nbsp;DUUT EMMANUEL DATE:&nbsp;02\/16\/2025 ARTICLE REVIEW #1:&nbsp;NAVIGATING THROUGH THE ARTICLE \u201cPREVENTING AND COMBATING CYBERCRIME IN INDONESIA\u201d PRINCIPLES OF SOCIAL SCIENCES AND CYBERSECURITY IN INDONESIA The topic of cybercrime lines up with some key principles of social sciences, emphasizing on the interconnections of technology, laws and societal behaviors. The study looks at how technology &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/myduuteportfolio\/article-review\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Article Review<\/span><\/a><\/p>\n","protected":false},"author":30354,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/myduuteportfolio\/wp-json\/wp\/v2\/pages\/285"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/myduuteportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/myduuteportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/myduuteportfolio\/wp-json\/wp\/v2\/users\/30354"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/myduuteportfolio\/wp-json\/wp\/v2\/comments?post=285"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/myduuteportfolio\/wp-json\/wp\/v2\/pages\/285\/revisions"}],"predecessor-version":[{"id":312,"href":"https:\/\/sites.wp.odu.edu\/myduuteportfolio\/wp-json\/wp\/v2\/pages\/285\/revisions\/312"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/myduuteportfolio\/wp-json\/wp\/v2\/media?parent=285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}