{"id":12,"date":"2024-09-04T18:48:09","date_gmt":"2024-09-04T18:48:09","guid":{"rendered":"https:\/\/wp.pprd.odu.edu\/spring2017-met330-template\/?page_id=12"},"modified":"2024-12-06T05:47:30","modified_gmt":"2024-12-06T05:47:30","slug":"hw","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/scottworm\/hw\/","title":{"rendered":"Article Reviews"},"content":{"rendered":"<p>Article Review #1<\/p>\n<p>Open and easy-to-access journals that students might select articles from &#8211; include the International Journal of Cybercriminology, the International Journal of Cybersecurity Intelligence &amp; Cybercrime, and the Journal of Cybersecurity.<br \/>\nhttps:\/\/www.cybercrimejournal.com\/Links to an external site.<br \/>\nhttps:\/\/vc.bridgew.edu\/ijcic\/Links to an external site.<br \/>\nhttps:\/\/academic.oup.com\/cybersecurity<br \/>\n.<br \/>\nThe article review should focus on<\/p>\n<ul>\n<li>Describe how the topic relates to the principles of the social sciences;<\/li>\n<li>Describe the study&#8217;s research questions or hypotheses;<\/li>\n<li>Describe the types of research methods used;<\/li>\n<li>Describe the types of data and analysis done;<\/li>\n<li>Describe how concepts from the PowerPoint presentations relate to the article;<\/li>\n<li>Describe how the topic relates to the challenges, concerns, and contributions of marginalized groups<\/li>\n<li>Describe the overall contributions of the studies to society.<\/li>\n<\/ul>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Reviewing cyberattacks, cyber threats, and attitudes toward cybersecurity policies<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The article discusses that when people are exposed to new or different cyberattacks, they become influenced<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> to give public support for intrusive cybersecurity policies and demand the government to help create<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0these policies to protect them better from attacks. As they become willing to support government<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0cybersecurity policies, the types of policies that would limit their personal civil liberties and privacy<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> depend on the type and severity of the cyberattack the people experienced. \u201cPeople\u2019s willingness to<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> accept government cybersecurity policies that limit personal civil liberties and privacy depends on the type<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> of cyberattacks to which they were exposed and the perceptions associated\u201d (Snider, p. 1)<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>.<\/div>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The article&#8217;s research study relates to the principles of social science because it relates to relativism<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. As newer cyberattacks become common while also threatening critical industries, more people<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> want to create policies that fight against these intruders and limit the freedom of their privacy and security<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. As cybercrime rises, people\u2019s behavioral dynamics change, influencing policy-making decisions on<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> technology and increasing the influx of policies against cybercrimes. \u201cIn recent years, the increase in civilian<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> exposure to cyberattacks has been accompanied by heightened demands for governments to introduce<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0comprehensive cybersecurity policies\u201d (Snider, p. 1)<\/span><\/div>\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The research question asks how the exposure of different types of cyberattacks leads to heightened support<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> for these types of regulation policies and if the public knows the difference between interventionist<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> and regulatory forms of cyber security policies. A hypothesis is made that the exposure of media<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> reports about cyberattacks is the way to the exposure effect since at the time, the public has little to no<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> information about the identity of the attacker and the type of attack that was carried out. \u201cwe propose that<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> exposure to initial media reports about cyberattacks is key to the exposure effect since at this time the threat<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> is magnified and the public has minimal information about the identity of the attacker and the type of<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0cyberattack that was conducted.\u201d (Snider, p. 2)<\/span><\/div>\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Research studies that were used in the article revolve around a controlled randomized survey experiment that<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> exposes participants to a simulated video news report of lethal and nonlethal attacks. \u201cTo test these questions<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, we ran a controlled randomized survey experiment that exposed 1022 Israeli participants\u201d <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(Snider p. 2) Each different type of cyberattack would influence the increased support for distinct and specific<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> types of cybersecurity policies. \u201cThis more nuanced breakdown of exposure types and policy options<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> can help officials contend with certain policy debates without the need for a one-size-fits-all policy<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201d (Snider, p. 2)<\/span><\/div>\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The type of data that was used in the research paper is the controlled survey experiment to test the variance<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> between the treatment groups regarding the reactions towards the implemented cybersecurity policies<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. These different research methods were used to get quantitative data on how each party would react<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> to different types of cyberattack scenarios and what their opinion on it was. \u201cTo test our hypotheses, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">we conducted a controlled survey experiment that exposed respondents to simulated news reports about<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0cyberattacks\u201d (Snider p. 4)<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>.<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\">The<span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> concepts from the PowerPoint presentations demonstrate what research methods were used in the article<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. The concept of experimentation with many people shows how different types of cybersecurity attacks<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> would influence the behaviors of how policies are made. The Principles of Science, for example, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">points show how technological advances are connected to the creation of new types of crime which leads to<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> people wanting new policies to counter these attacks while also taking into consideration the human factors<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> of each person. The PowerPoint states that experiments are done to ask a question about something<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> and test it based on the different types of input to see if the results support the hypothesis. \u201cWe argue<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> that public support for governmental cybersecurity measures rises as a result of exposure to different<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> forms of cyberattacks and that perceived threat plays a mediating role in this relationship\u201d <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(Snider p. 2)<\/span><\/div>\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The topic challenges and concerns will most likely have a bias as different types of individuals are exposed<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> to cybercrime in different ways. Victims will have a different opinion of how they think of the severity<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> of the attacks in the experiment which could change the result of their policy voting. \u201cwithin the NLC<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> group the mediation model predicts stronger CPP than CAP. In other words, participants who<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0were exposed to the nonlethal (NLC) condition were more likely to support CPP than CAP\u201d (Snider<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">p. 7).<\/span><\/div>\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The concern is that lethal cyberattacks increase the perception of cyber threats to a degree compared to nonlethal<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\/economic attacks which can influence the psychological opinion on these attacks. As a result, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the severity of attacks influences what policies are supported. \u201cParticipants who were exposed to the lethal<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0(LC) condition were more likely to support CPP than CAP.\u201d (Snider p. 7)<\/span><\/div>\n<div>.<\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In conclusion, these studies have contributed that the findings could help researchers relate the study of psychological<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> nature to media exposure of cyberattacks based on the reports given with minimum information<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. Sometimes people underestimate the severity of cybercrimes given to them with little information<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> and can make policy voting based solely on psychological factors and experience, especially when<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> the policies being voted for could affect the freedom, civil liberties, and privacy of network users.<\/span><\/div>\n<div>.<\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This will help individuals be more informed about the policies they are voting for in the political system and<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> the psychological impact these cybercrimes will have on any individual regardless of experience. \u201cAs this<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> threat continues to grow all over the world, both in its public perception and in the true scope of the threat<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, the need to implement strong cybersecurity regulations will grow as well.\u201d (Snider p. 9)<\/span><\/div>\n<div>.<\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Sources:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Snider, Keren L G, et al. \u201cCyberattacks, Cyber Threats, and Attitudes toward Cybersecurity<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Policies.\u201d<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">OUP Academic<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, Oxford University Press, 7 Oct. 2021,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">academic.oup.com\/cybersecurity\/article\/7\/1\/tyab019\/6382745?searchresult=1.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CYSE201S weekly presentations (Module \/Week 1-6)<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"endOfContent textLayer--absolute active\">.<\/div>\n<div>.<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"PDFAnnotationLayer-container\">Article review 2<\/div>\n<div><\/div>\n<div class=\"PDFAnnotationLayer-container\">We have completed Article Review #1 and now it&#8217;s time for Article Review #2. You have to select a different article from a different Journal ensuring it is not the same as the one chosen for Article Review #1 and proceed with your review. Assignments will not be graded if the same article or Journal is chosen.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<p>The article review should focus on<\/p>\n<ul>\n<li>Describe how the topic relates to the principles of the social sciences;<\/li>\n<li>Describe the study&#8217;s research questions or hypotheses;<\/li>\n<li>Describe the types of research methods used;<\/li>\n<li>Describe the types of data and analysis done;<\/li>\n<li>Describe how concepts from the PowerPoint presentations relate to the article;<\/li>\n<li>Describe how the topic relates to the challenges, concerns, and contributions of marginalized<\/li>\n<li>groups; and Describe the overall contributions of the studies to society.<\/li>\n<\/ul>\n<p>Journals:<\/p>\n<p>https:\/\/www.cybercrimejournal.com\/Links to an external site.<\/p>\n<p>https:\/\/vc.bridgew.edu\/ijcic\/Links to an external site.<\/p>\n<p>https:\/\/academic.oup.com\/cybersecurity<\/p>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div>.<\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Article Review #2 <\/span><\/div>\n<div>.<\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cyberbullying<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0and Cyberbullicide Ideation Among Jordanian College Students<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This article discusses the study of investigating the impact of cyberbullying on youth and the effects<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> it has on both the victim and the perpetrator. The study of the measured cyberbullying and victimization<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> measures the cause based on the exposure of the victim to family violence, exposure to violence<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, and participation.<\/span><\/div>\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The Internet has been beneficial to the public economy, government services, education, and health<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> improving productivity and providing remote access to various resources like social media and communication<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. The Internet has allowed young and adult users to gain access through the digital culture which<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> can also introduce the darker side of it that leads to risks in digital natives like cyberbullying, social engineering<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, and fraud. Cyberbullying can take many forms on the internet like hateful comments or offensive<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> language, but they all come from a psychological and sociological source. \u201cThe study measured cyberbullying<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> victimization using a variety of scales, including a general bullying scale, a cyberbullying victimization<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> scale, a cyberbullying perpetration scale, a self-report cyberbullying scale, and a vicarious cyberbullying<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0scale.\u201d (Cyberbullying Page 1)<\/span><\/div>\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Bullying is defined as unwanted aggressive behavior toward non-siblings involved with repeated power<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> imbalances. Sometimes this is caused by real-life harassment such as schoolyard bullying or childhood<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> experiences caused by abusive parents. This is related to Sigmund Freud\u2019s theory of psychodynamic<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> Theory and Cyber Offending as individuals might be aggressive online because of past experiences<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. Some researchers \u201cCyberbullying \u2013 individuals might be aggressive online because of childhood<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0experiences\u201d (Presentation Module 5)<\/span><\/div>\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Researchers ask what kinds of theories are related to cyberbullying and how is it connected. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">There are many theories like Social Learning Theory, General Strain Theory, and behavior theory. Theories<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> connect with researchers on how a cyberbullies behavior works and what becomes of the origin. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201cKey theories include Social Learning Theory, General Strain Theory, Routine Activity Theory, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Anonymity and Deindividuation Theory, Self-Control Theory, Social Identity Theory, and The Theory of Planned<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> Behavior\u201d (Cyberbullying Page 6)<\/span><\/div>\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The behavioral theory also comes into play that bullying behavior can also be learned and shared. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Individuals who witnessed the behavior of bullying of others from their family, schools, peers, or mass media<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> can influence the hate towards someone else. This can cause them to learn from that behavior and become<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> part of that. \u201cBehavioral theories suggest that behavior is learned. Sources of learning could include<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0(1) the family, (2) schools, (3) peers, (4) mass media, and (5) environmental influences.\u201d<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(Presentation Module 6)<\/span><\/div>\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The rise in cyberbullying has also caused adolescent suicide which has grown into a worldwide concern<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. Researchers used a research survey to conduct their findings on adolescent behaviors relating to cyberbullying<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. A US survey was taken and found that 54% of adolescents have been cyberbullied on <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">social media. \u201cA US survey found that 54% of adolescents have been cyberbullied on social media <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(Facebook, YouTube, Twitter, and Instagram) (Cox Communications, 2009)\u201d (Cyberbullying page 5) <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cyberbullying also contributes to 10-50% of adolescents around the world having an increase in aggression<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, intentional acts from electronic use, and mental health effects that negatively impact them. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201cCyberbullying affects 10% to 50% of adolescents worldwide, causing aggressive, intentional acts using electronic<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0contact, leading to adverse health outcomes.\u201d (Cyberbullying page 5)<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Researchers ask how someone who has been bullied stops from becoming a cyberbully. Parents should<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> look into their child\u2019s activities and behaviors to find a pattern. In the field of cyber-<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">psychology, cyberbullying can lead to cybercrime because of the psychological factors that play into causing<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> the victim to become a perpetrator, mainly affecting young groups of individuals. They can become<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> risk-takers and often do things that can psychologically hurt someone which can spread. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201cPrevention efforts focus on creating safe online environments, educating adolescents and parents about the<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0risks of cyberbullying, and promoting mental health resources to support those affected.\u201d<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(Cyberbullying page 19)<\/span><\/div>\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">These findings of cyberbullying online and the psychological effects it can have on people can bring<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> awareness of the dangerous nature of cyberbullying. Leaving adolescents uncontrolled on the internet<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> can affect their behaviors in real life which can contribute to cyberbullying, mental health deterioration<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, behavior changes, and Cyberbullicide. \u201cFindings of a logistic regression in this study showed<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> that cyberbullying can lead to negative emotions, which in turn can lead to suicide.\u201d\u00a0<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(Cyberbullying page 18) Offering helps people who are victims of cyberbullying get the help they need while<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> preventing them from creating possible cybercriminals. \u201cRaising awareness that these issues exist at such<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0dangerous rates may be a first step in awareness campaigns.\u201d (Cyberbullying page 19)<\/span><\/div>\n<div class=\"textLayer\">.<br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In conclusion, the widespread of technology has allowed many young individuals to use the internet<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> which has led to cyberbullying. The harmful behavior has caused a new type of bullying which can<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> lead to harmful behaviors that could lead to suicide. \u201cThis study supported the hypothesis that students&#8217;<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u00a0cyberbullying victimization could lead to Cyberbullicide.\u201d (Cyberbullying page 17)<\/span><\/div>\n<div>.<\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cyberbullying is still growing but can still be prevented by offering mental support to the victims and offenders<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, bringing awareness to cyberbullying, educating the youth about the dangers of cyberbullying, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and enforcing rules or laws to deter it from happening. \u201cThe study recommends a university awareness<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, educating youths about cyberbullying risks, setting and enforcing cyber laws, deterrent sanctions<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, and implementing counseling programs.\u201d (Cyberbullying page 19)<\/span><\/div>\n<div>.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Sources:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201cCyberbullying and Cyberbullicide Ideation Among Jordanian College Students.\u201d<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">International Journal of Cyber Criminology<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, www.cybercrimejournal.com\/. Accessed 18<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Nov. 2024.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2022<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CYSE201S weekly presentations (Module\/Week 1-12)<br \/>\n<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #1 Open and easy-to-access journals that students might select articles from &#8211; include the International Journal of Cybercriminology, the International Journal of Cybersecurity Intelligence &amp; Cybercrime, and the Journal of Cybersecurity. https:\/\/www.cybercrimejournal.com\/Links to an external site. https:\/\/vc.bridgew.edu\/ijcic\/Links to&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/scottworm\/hw\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29416,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/pages\/12"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/users\/29416"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":110,"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/pages\/12\/revisions\/110"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}