{"id":343,"date":"2024-12-07T06:52:55","date_gmt":"2024-12-07T06:52:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/njomimukete1\/?p=343"},"modified":"2024-12-07T07:39:18","modified_gmt":"2024-12-07T07:39:18","slug":"article-review-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/njomimukete1\/2024\/12\/07\/article-review-1\/","title":{"rendered":"Article Review #1"},"content":{"rendered":"\n<p>Njomi Mukete<br>CYES201S<br>Professor Yalpi<br>10\/2\/2024<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>                                                                        Article Review 1<br>One of these articles comes from the International Journal of Cyber Criminology, the<br>journal of choice to learn how the Internet changes the dynamics of crime, criminals, and<br>criminal organizations-which is, after all, why cybercrime has become a serious and fascinating<br>area of social science research. It has been argued that the issue of online abuse is probably one<br>of the highest-profile areas of our digital output for finding the codification of offline power in<br>the mechanics of technology.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Relationship to Social Sciences Principles<br>Cyberbullying lends itself quite easily to social sciences theory, whereby the debilitating<br>behaviors can be understood by considering human behavior contextualized within and<br>streamlined by the existential implications of a digital structure. Boundaries that once prohibited<br>violence against others are thus diluted when such behaviors can transcend into a digital context,<br>allowing what might have otherwise been pursued in privacy to instead take place in the public<br>sphere.<br>This means explanation of human behaviors requires an understanding of the interface<br>between individual-level agency and macro-level phenomena-that is, the structure invariable in<br>sociology. Interventions, by extension, involve the capability of explaining such complex<br>behaviors as a precursor to any meaningful approach to correcting them.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>Research Questions and Hypothesis<br>The article&#8217;s primary research questions include:<br>What are the most prevalent forms of harassment online?<br>The victims of cyber harassment were beginning to face all sorts of problems: starting<br>from demographic factors such as age, gender, and economic status. A huge point within the<br>hypothesis says that women, together with other targets of discrimination, most especially sexual<a href=\"https:\/\/www.cybercrimejournal.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n\n\n\n<p>minorities or LGBTQ+, experience online harassment more often because there is greater power<br>disparity in society both offline and online.<\/p>\n\n\n\n<p><br><strong>Research Methods<\/strong><br>It is a mixed-methods study combining strengths from quantitative surveys and<br>qualitative interviews. Even though quantitative surveys have their strength in revealing broad-<br>based, easily replicable trends, since they can cover large numbers of respondents, qualitative<br>interviews facilitate the unpacking of certain experiential phenomena beyond the binary levels of<br>frequency and prevalence behind which people are living their lives.<\/p>\n\n\n\n<p><br><strong>Data and Analysis<\/strong><br>In these regards, the quantitative data analysis will be done by using statistical techniques<br>that may indicate the correlations of some demographic variables with gender, race\/ethnicity,<br>socio-economic status, types of harassment, and numbers of harassment incidents. Qualitative<br>data through intensive interviewing are analyzed using the method called Thematic Analysis,<br>which summarizes variants of key themes and their modification across interviews.<br>A combined quantitative-qualitative approach to harassment will thus afford an in-depth<br>insight into the problem in such a way as to paint the picture not only in terms of numbers-that is,<br>&#8216;how also in terms of experience giving meaning to those numbers: &#8216;How are people affected?&#8217;.<\/p>\n\n\n\n<p><br><strong>Relation to Course Concepts<\/strong><br>This also tangentially relates to class content about the ways that social power is enacted<br>online, especially for those coming from less powerful groups and who are more often in<br>jeopardy compared with their more powerful peers. This will also relate to the idea of social<br>capital and community in promoting resiliency to cyber threats.<\/p>\n\n\n\n<p><br><strong>Impact on Subordinate Groups<\/strong><br>People of color, LGBTQ+, the poor, cis women, people with disabilities, and anyone not<br>male-identified are highly vulnerable because of their experiences with online harassment. The<br>plethora of these experiences exacerbates existing inequalities, pushing many into unsustainable<br>levels of stress and exclusion. It is here that perhaps Haidle&#8217;s discussion of such groups creates<br>the most significant turn in discussing technology&#8217;s role in the perpetuation of lived inequalities.<\/p>\n\n\n\n<p><strong>Social Contributions<\/strong><br>In other words, this study impressively fulfills the purpose of societal relevance by<br>extending our knowledge about online harassment. This contribution will first let policymakers,<br>educators, and advocates know what kind of online abuse is especially problematic to vulnerable<br>groups. It allows for targeted interventions that can grant more support.<\/p>\n\n\n\n<p><br><strong>In conclusion<\/strong><br>The contribution of this study to a safe online environment lies in its dealing with one of<br>the causes of cyber harassment. Framing cyber harassment in the context of a social science,<br>added to the characteristic of online behavior being human, serves to underline additional work<br>yet to be accomplished in terms of protecting vulnerable communities and inducing the right<br>kind of stigma in the digital era. Without studies like this, there simply will not be a movement<br>toward an equitable future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Njomi MuketeCYES201SProfessor Yalpi10\/2\/2024 Article Review 1One of these articles comes from the International Journal of Cyber Criminology, thejournal of choice to learn how the Internet changes the dynamics of crime, criminals, andcriminal organizations-which is, after all, why cybercrime has become a serious and fascinatingarea of social science research. It has been argued that the issue&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/njomimukete1\/2024\/12\/07\/article-review-1\/\">Read More<\/a><\/div>\n","protected":false},"author":28606,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[15],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/posts\/343"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/users\/28606"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/comments?post=343"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/posts\/343\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/posts\/343\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/media?parent=343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/categories?post=343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/tags?post=343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}