Annotated Bibliography

Ray, G., McDermott, C. D., & Nicho, M. (2024). Cyberbullying on social media: Definitions, prevalence, and impact challenges. Journal of Cybersecurity, 10(1). https://doi.org/10.1093/cybsec/tyae026
Summary:
This article, written by Geraldine Ray, Christopher D McDermott, and Mathew Nico, is an exhaustive study of the problems of cyberbullying and the impact it has on people and society at large. The article aims to analyze the demographics most affected by cyberbullying and advocate for a more universally standardized definition of cyberbullying, as most studies at the time of the journal’s creation had varying views on what constitutes cyberbullying. The article fits well for social science since it explores not just the behavioral traits that some individuals who commit cyberbullying have, such as Machiavellianism, psychopathy, narcissism, and sadism, but it delves deeper into other avenues, since people with these negative traits do not always participate in acts of cyberbullying. This analysis also works perfectly for cybersecurity, since the article examines the technological platforms and digital environments where cyberbullying frequently occurs, as well as the methods used to harass victims, such as flaming, trolling, and harassment. With further study and practice, a better understanding of cyberbullying can be formed to help recognize and prevent it from happening in more social circles.


Krügel, S., Ostermaier, A., & Uhl, M. (2022). Zombies in the loop? Humans trust untrustworthy AI-advisors for ethical decisions. Philosophy & Technology, 35(1). https://doi.org/10.1007/s13347-022-00511-9
Summary:
This article, created by Sebastian Krügel, Andreas Ostermaier, and Matthias Uhl, is an exploration of how many individuals online overly rely on artificial intelligence to the point where they are now trusting machines for all of their ethical dilemmas. This journal article presents the argument that users readily trust AI, despite its dubious methods for collecting and training data. Not all users are skeptical enough to question some of the advice that the AI algorithms tell them. After running three tests, they concluded that more people willingly trust AI, regardless of how sketchy and untransparent the algorithm is. Due to this, the article advocates for improved digital literacy to ensure the proper use of AI.


Quayyum, F., & Freberg, G. N. (2023). Designing Cybersecurity Awareness Solutions for the Young People in Rural Developing Countries: The Need for Diversity and Inclusion. ArXiv (Cornell University). https://doi.org/10.48550/arxiv.2312.12073
Summary:
This journal article, written by Farzana Quayyum and Giske Naper Freberg, discusses the increasing need for cybersecurity training for developing countries of the world as technology continues to intertwine with our world. It relates to social science since the writers explain why the need for more diverse groups and inclusion in cybersecurity is important. It is because the field is ever-expanding with ever-expanding risks that more individuals need to be informed about. The article delves deeper into the cultural and societal backgrounds of developing nations, exploring reasons why more youths are falling behind, including a lack of accessibility, inadequate formal training, limited digital literacy, and an overall potential lack of interest.


Alsharida, R. A., Al-rimy, B. A., Al-Emran, M., & Zainal, A. (2023). A systematic review of Multi Perspectives on Human Cybersecurity Behavior. Technology in Society, 73, 102258. https://doi.org/10.1016/j.techsoc.2023.102258
Summary:
This journal article, written by Rawan A. Alsharida, Bander Ali Saleh Al-rimy, Mostafa Al-Emran, and Anazida Zainal, explores the relationship between human behavior and cybersecurity. The article recognizes that the human factor is a foundational need in cybersecurity, and it explores this concept in great detail, examining how certain human behaviors shape frameworks, security, and risk mitigation. In the end, the writers advocated for a greater focus on diversified theoretical approaches, broader participant groups, and an investigation into country- and sector-specific risks, with the understanding that the human element is at the core of cybersecurity.

Leave a Reply

Your email address will not be published. Required fields are marked *