Article Reviews
Article Review #1
Open and easy-to-access journals that students might select articles from – include the International Journal of Cybercriminology, the International Journal of Cybersecurity Intelligence & Cybercrime, and the Journal of Cybersecurity.
https://www.cybercrimejournal.com/Links to an external site.
https://vc.bridgew.edu/ijcic/Links to an external site.
https://academic.oup.com/cybersecurity
.
The article review should focus on
- Describe how the topic relates to the principles of the social sciences;
- Describe the study’s research questions or hypotheses;
- Describe the types of research methods used;
- Describe the types of data and analysis done;
- Describe how concepts from the PowerPoint presentations relate to the article;
- Describe how the topic relates to the challenges, concerns, and contributions of marginalized groups
- Describe the overall contributions of the studies to society.
Reviewing cyberattacks, cyber threats, and attitudes toward cybersecurity policies
The article discusses that when people are exposed to new or different cyberattacks, they become influenced to give public support for intrusive cybersecurity policies and demand the government to help create these policies to protect them better from attacks. As they become willing to support government cybersecurity policies, the types of policies that would limit their personal civil liberties and privacy depend on the type and severity of the cyberattack the people experienced. “People’s willingness to accept government cybersecurity policies that limit personal civil liberties and privacy depends on the type of cyberattacks to which they were exposed and the perceptions associated” (Snider, p. 1)
The article discusses that when people are exposed to new or different cyberattacks, they become influenced to give public support for intrusive cybersecurity policies and demand the government to help create these policies to protect them better from attacks. As they become willing to support government cybersecurity policies, the types of policies that would limit their personal civil liberties and privacy depend on the type and severity of the cyberattack the people experienced. “People’s willingness to accept government cybersecurity policies that limit personal civil liberties and privacy depends on the type of cyberattacks to which they were exposed and the perceptions associated” (Snider, p. 1)
.
The article’s research study relates to the principles of social science because it relates to relativism. As newer cyberattacks become common while also threatening critical industries, more people want to create policies that fight against these intruders and limit the freedom of their privacy and security. As cybercrime rises, people’s behavioral dynamics change, influencing policy-making decisions on technology and increasing the influx of policies against cybercrimes. “In recent years, the increase in civilian exposure to cyberattacks has been accompanied by heightened demands for governments to introduce comprehensive cybersecurity policies” (Snider, p. 1)
.
The research question asks how the exposure of different types of cyberattacks leads to heightened support for these types of regulation policies and if the public knows the difference between interventionist and regulatory forms of cyber security policies. A hypothesis is made that the exposure of media reports about cyberattacks is the way to the exposure effect since at the time, the public has little to no information about the identity of the attacker and the type of attack that was carried out. “we propose that exposure to initial media reports about cyberattacks is key to the exposure effect since at this time the threat is magnified and the public has minimal information about the identity of the attacker and the type of cyberattack that was conducted.” (Snider, p. 2)
The research question asks how the exposure of different types of cyberattacks leads to heightened support for these types of regulation policies and if the public knows the difference between interventionist and regulatory forms of cyber security policies. A hypothesis is made that the exposure of media reports about cyberattacks is the way to the exposure effect since at the time, the public has little to no information about the identity of the attacker and the type of attack that was carried out. “we propose that exposure to initial media reports about cyberattacks is key to the exposure effect since at this time the threat is magnified and the public has minimal information about the identity of the attacker and the type of cyberattack that was conducted.” (Snider, p. 2)
.
Research studies that were used in the article revolve around a controlled randomized survey experiment that exposes participants to a simulated video news report of lethal and nonlethal attacks. “To test these questions, we ran a controlled randomized survey experiment that exposed 1022 Israeli participants” (Snider p. 2) Each different type of cyberattack would influence the increased support for distinct and specific types of cybersecurity policies. “This more nuanced breakdown of exposure types and policy options can help officials contend with certain policy debates without the need for a one-size-fits-all policy” (Snider, p. 2)
Research studies that were used in the article revolve around a controlled randomized survey experiment that exposes participants to a simulated video news report of lethal and nonlethal attacks. “To test these questions, we ran a controlled randomized survey experiment that exposed 1022 Israeli participants” (Snider p. 2) Each different type of cyberattack would influence the increased support for distinct and specific types of cybersecurity policies. “This more nuanced breakdown of exposure types and policy options can help officials contend with certain policy debates without the need for a one-size-fits-all policy” (Snider, p. 2)
.
The type of data that was used in the research paper is the controlled survey experiment to test the variance between the treatment groups regarding the reactions towards the implemented cybersecurity policies. These different research methods were used to get quantitative data on how each party would react to different types of cyberattack scenarios and what their opinion on it was. “To test our hypotheses, we conducted a controlled survey experiment that exposed respondents to simulated news reports about cyberattacks” (Snider p. 4)
The type of data that was used in the research paper is the controlled survey experiment to test the variance between the treatment groups regarding the reactions towards the implemented cybersecurity policies. These different research methods were used to get quantitative data on how each party would react to different types of cyberattack scenarios and what their opinion on it was. “To test our hypotheses, we conducted a controlled survey experiment that exposed respondents to simulated news reports about cyberattacks” (Snider p. 4)
.
The concepts from the PowerPoint presentations demonstrate what research methods were used in the article. The concept of experimentation with many people shows how different types of cybersecurity attacks would influence the behaviors of how policies are made. The Principles of Science, for example, points show how technological advances are connected to the creation of new types of crime which leads to people wanting new policies to counter these attacks while also taking into consideration the human factors of each person. The PowerPoint states that experiments are done to ask a question about something and test it based on the different types of input to see if the results support the hypothesis. “We argue that public support for governmental cybersecurity measures rises as a result of exposure to different forms of cyberattacks and that perceived threat plays a mediating role in this relationship” (Snider p. 2)
.
The topic challenges and concerns will most likely have a bias as different types of individuals are exposed to cybercrime in different ways. Victims will have a different opinion of how they think of the severity of the attacks in the experiment which could change the result of their policy voting. “within the NLC group the mediation model predicts stronger CPP than CAP. In other words, participants who were exposed to the nonlethal (NLC) condition were more likely to support CPP than CAP” (Snider
p. 7).
The topic challenges and concerns will most likely have a bias as different types of individuals are exposed to cybercrime in different ways. Victims will have a different opinion of how they think of the severity of the attacks in the experiment which could change the result of their policy voting. “within the NLC group the mediation model predicts stronger CPP than CAP. In other words, participants who were exposed to the nonlethal (NLC) condition were more likely to support CPP than CAP” (Snider
p. 7).
.
The concern is that lethal cyberattacks increase the perception of cyber threats to a degree compared to nonlethal/economic attacks which can influence the psychological opinion on these attacks. As a result, the severity of attacks influences what policies are supported. “Participants who were exposed to the lethal (LC) condition were more likely to support CPP than CAP.” (Snider p. 7)
The concern is that lethal cyberattacks increase the perception of cyber threats to a degree compared to nonlethal/economic attacks which can influence the psychological opinion on these attacks. As a result, the severity of attacks influences what policies are supported. “Participants who were exposed to the lethal (LC) condition were more likely to support CPP than CAP.” (Snider p. 7)
.
In conclusion, these studies have contributed that the findings could help researchers relate the study of psychological nature to media exposure of cyberattacks based on the reports given with minimum information. Sometimes people underestimate the severity of cybercrimes given to them with little information and can make policy voting based solely on psychological factors and experience, especially when the policies being voted for could affect the freedom, civil liberties, and privacy of network users.
.
This will help individuals be more informed about the policies they are voting for in the political system and the psychological impact these cybercrimes will have on any individual regardless of experience. “As this threat continues to grow all over the world, both in its public perception and in the true scope of the threat, the need to implement strong cybersecurity regulations will grow as well.” (Snider p. 9)
.
Sources:
• Snider, Keren L G, et al. “Cyberattacks, Cyber Threats, and Attitudes toward Cybersecurity
Policies.” OUP Academic, Oxford University Press, 7 Oct. 2021,
academic.oup.com/cybersecurity/article/7/1/tyab019/6382745?searchresult=1.
• CYSE201S weekly presentations (Module /Week 1-6)
• Snider, Keren L G, et al. “Cyberattacks, Cyber Threats, and Attitudes toward Cybersecurity
Policies.” OUP Academic, Oxford University Press, 7 Oct. 2021,
academic.oup.com/cybersecurity/article/7/1/tyab019/6382745?searchresult=1.
• CYSE201S weekly presentations (Module /Week 1-6)
.
.
Article review 2
We have completed Article Review #1 and now it’s time for Article Review #2. You have to select a different article from a different Journal ensuring it is not the same as the one chosen for Article Review #1 and proceed with your review. Assignments will not be graded if the same article or Journal is chosen.
The article review should focus on
- Describe how the topic relates to the principles of the social sciences;
- Describe the study’s research questions or hypotheses;
- Describe the types of research methods used;
- Describe the types of data and analysis done;
- Describe how concepts from the PowerPoint presentations relate to the article;
- Describe how the topic relates to the challenges, concerns, and contributions of marginalized
- groups; and Describe the overall contributions of the studies to society.
Journals:
https://www.cybercrimejournal.com/Links to an external site.
https://vc.bridgew.edu/ijcic/Links to an external site.
https://academic.oup.com/cybersecurity
.
Article Review #2
.
Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students
This article discusses the study of investigating the impact of cyberbullying on youth and the effects it has on both the victim and the perpetrator. The study of the measured cyberbullying and victimization measures the cause based on the exposure of the victim to family violence, exposure to violence, and participation.
This article discusses the study of investigating the impact of cyberbullying on youth and the effects it has on both the victim and the perpetrator. The study of the measured cyberbullying and victimization measures the cause based on the exposure of the victim to family violence, exposure to violence, and participation.
.
The Internet has been beneficial to the public economy, government services, education, and health improving productivity and providing remote access to various resources like social media and communication. The Internet has allowed young and adult users to gain access through the digital culture which can also introduce the darker side of it that leads to risks in digital natives like cyberbullying, social engineering, and fraud. Cyberbullying can take many forms on the internet like hateful comments or offensive language, but they all come from a psychological and sociological source. “The study measured cyberbullying victimization using a variety of scales, including a general bullying scale, a cyberbullying victimization scale, a cyberbullying perpetration scale, a self-report cyberbullying scale, and a vicarious cyberbullying scale.” (Cyberbullying Page 1)
The Internet has been beneficial to the public economy, government services, education, and health improving productivity and providing remote access to various resources like social media and communication. The Internet has allowed young and adult users to gain access through the digital culture which can also introduce the darker side of it that leads to risks in digital natives like cyberbullying, social engineering, and fraud. Cyberbullying can take many forms on the internet like hateful comments or offensive language, but they all come from a psychological and sociological source. “The study measured cyberbullying victimization using a variety of scales, including a general bullying scale, a cyberbullying victimization scale, a cyberbullying perpetration scale, a self-report cyberbullying scale, and a vicarious cyberbullying scale.” (Cyberbullying Page 1)
.
Bullying is defined as unwanted aggressive behavior toward non-siblings involved with repeated power imbalances. Sometimes this is caused by real-life harassment such as schoolyard bullying or childhood experiences caused by abusive parents. This is related to Sigmund Freud’s theory of psychodynamic Theory and Cyber Offending as individuals might be aggressive online because of past experiences. Some researchers “Cyberbullying – individuals might be aggressive online because of childhood experiences” (Presentation Module 5)
Bullying is defined as unwanted aggressive behavior toward non-siblings involved with repeated power imbalances. Sometimes this is caused by real-life harassment such as schoolyard bullying or childhood experiences caused by abusive parents. This is related to Sigmund Freud’s theory of psychodynamic Theory and Cyber Offending as individuals might be aggressive online because of past experiences. Some researchers “Cyberbullying – individuals might be aggressive online because of childhood experiences” (Presentation Module 5)
.
Researchers ask what kinds of theories are related to cyberbullying and how is it connected. There are many theories like Social Learning Theory, General Strain Theory, and behavior theory. Theories connect with researchers on how a cyberbullies behavior works and what becomes of the origin. “Key theories include Social Learning Theory, General Strain Theory, Routine Activity Theory, Anonymity and Deindividuation Theory, Self-Control Theory, Social Identity Theory, and The Theory of Planned Behavior” (Cyberbullying Page 6)
Researchers ask what kinds of theories are related to cyberbullying and how is it connected. There are many theories like Social Learning Theory, General Strain Theory, and behavior theory. Theories connect with researchers on how a cyberbullies behavior works and what becomes of the origin. “Key theories include Social Learning Theory, General Strain Theory, Routine Activity Theory, Anonymity and Deindividuation Theory, Self-Control Theory, Social Identity Theory, and The Theory of Planned Behavior” (Cyberbullying Page 6)
.
The behavioral theory also comes into play that bullying behavior can also be learned and shared. Individuals who witnessed the behavior of bullying of others from their family, schools, peers, or mass media can influence the hate towards someone else. This can cause them to learn from that behavior and become part of that. “Behavioral theories suggest that behavior is learned. Sources of learning could include (1) the family, (2) schools, (3) peers, (4) mass media, and (5) environmental influences.”
(Presentation Module 6)
The behavioral theory also comes into play that bullying behavior can also be learned and shared. Individuals who witnessed the behavior of bullying of others from their family, schools, peers, or mass media can influence the hate towards someone else. This can cause them to learn from that behavior and become part of that. “Behavioral theories suggest that behavior is learned. Sources of learning could include (1) the family, (2) schools, (3) peers, (4) mass media, and (5) environmental influences.”
(Presentation Module 6)
.
The rise in cyberbullying has also caused adolescent suicide which has grown into a worldwide concern. Researchers used a research survey to conduct their findings on adolescent behaviors relating to cyberbullying. A US survey was taken and found that 54% of adolescents have been cyberbullied on social media. “A US survey found that 54% of adolescents have been cyberbullied on social media (Facebook, YouTube, Twitter, and Instagram) (Cox Communications, 2009)” (Cyberbullying page 5) Cyberbullying also contributes to 10-50% of adolescents around the world having an increase in aggression, intentional acts from electronic use, and mental health effects that negatively impact them. “Cyberbullying affects 10% to 50% of adolescents worldwide, causing aggressive, intentional acts using electronic contact, leading to adverse health outcomes.” (Cyberbullying page 5)
The rise in cyberbullying has also caused adolescent suicide which has grown into a worldwide concern. Researchers used a research survey to conduct their findings on adolescent behaviors relating to cyberbullying. A US survey was taken and found that 54% of adolescents have been cyberbullied on social media. “A US survey found that 54% of adolescents have been cyberbullied on social media (Facebook, YouTube, Twitter, and Instagram) (Cox Communications, 2009)” (Cyberbullying page 5) Cyberbullying also contributes to 10-50% of adolescents around the world having an increase in aggression, intentional acts from electronic use, and mental health effects that negatively impact them. “Cyberbullying affects 10% to 50% of adolescents worldwide, causing aggressive, intentional acts using electronic contact, leading to adverse health outcomes.” (Cyberbullying page 5)
.
Researchers ask how someone who has been bullied stops from becoming a cyberbully. Parents should look into their child’s activities and behaviors to find a pattern. In the field of cyber-psychology, cyberbullying can lead to cybercrime because of the psychological factors that play into causing the victim to become a perpetrator, mainly affecting young groups of individuals. They can become risk-takers and often do things that can psychologically hurt someone which can spread. “Prevention efforts focus on creating safe online environments, educating adolescents and parents about the risks of cyberbullying, and promoting mental health resources to support those affected.”
(Cyberbullying page 19)
Researchers ask how someone who has been bullied stops from becoming a cyberbully. Parents should look into their child’s activities and behaviors to find a pattern. In the field of cyber-psychology, cyberbullying can lead to cybercrime because of the psychological factors that play into causing the victim to become a perpetrator, mainly affecting young groups of individuals. They can become risk-takers and often do things that can psychologically hurt someone which can spread. “Prevention efforts focus on creating safe online environments, educating adolescents and parents about the risks of cyberbullying, and promoting mental health resources to support those affected.”
(Cyberbullying page 19)
.
These findings of cyberbullying online and the psychological effects it can have on people can bring awareness of the dangerous nature of cyberbullying. Leaving adolescents uncontrolled on the internet can affect their behaviors in real life which can contribute to cyberbullying, mental health deterioration, behavior changes, and Cyberbullicide. “Findings of a logistic regression in this study showed that cyberbullying can lead to negative emotions, which in turn can lead to suicide.” (Cyberbullying page 18) Offering helps people who are victims of cyberbullying get the help they need while preventing them from creating possible cybercriminals. “Raising awareness that these issues exist at such dangerous rates may be a first step in awareness campaigns.” (Cyberbullying page 19)
These findings of cyberbullying online and the psychological effects it can have on people can bring awareness of the dangerous nature of cyberbullying. Leaving adolescents uncontrolled on the internet can affect their behaviors in real life which can contribute to cyberbullying, mental health deterioration, behavior changes, and Cyberbullicide. “Findings of a logistic regression in this study showed that cyberbullying can lead to negative emotions, which in turn can lead to suicide.” (Cyberbullying page 18) Offering helps people who are victims of cyberbullying get the help they need while preventing them from creating possible cybercriminals. “Raising awareness that these issues exist at such dangerous rates may be a first step in awareness campaigns.” (Cyberbullying page 19)
.
In conclusion, the widespread of technology has allowed many young individuals to use the internet which has led to cyberbullying. The harmful behavior has caused a new type of bullying which can lead to harmful behaviors that could lead to suicide. “This study supported the hypothesis that students’ cyberbullying victimization could lead to Cyberbullicide.” (Cyberbullying page 17)
In conclusion, the widespread of technology has allowed many young individuals to use the internet which has led to cyberbullying. The harmful behavior has caused a new type of bullying which can lead to harmful behaviors that could lead to suicide. “This study supported the hypothesis that students’ cyberbullying victimization could lead to Cyberbullicide.” (Cyberbullying page 17)
.
Cyberbullying is still growing but can still be prevented by offering mental support to the victims and offenders, bringing awareness to cyberbullying, educating the youth about the dangers of cyberbullying, and enforcing rules or laws to deter it from happening. “The study recommends a university awareness, educating youths about cyberbullying risks, setting and enforcing cyber laws, deterrent sanctions, and implementing counseling programs.” (Cyberbullying page 19)
.
Sources:
• “Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students.”
International Journal of Cyber Criminology, www.cybercrimejournal.com/. Accessed 18
Nov. 2024.
• CYSE201S weekly presentations (Module/Week 1-12)
• “Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students.”
International Journal of Cyber Criminology, www.cybercrimejournal.com/. Accessed 18
Nov. 2024.
• CYSE201S weekly presentations (Module/Week 1-12)