Article Reviews

Article Review #1: Exploring Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students

Introduction:
The article “Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students” by
Diab Al-Badayneh, Maher Khelifa, and Anis Ben Brik addresses the growing concern of
cyberbullying and its impact on mental health, particularly among college students. This topic is significant in the field of social sciences as it relates to human behavior, societal norms, mental health, and the influence of technology on social interactions. Using Social Science Research: Principles, Methods, and Practices by Anol Bhattacherjee, this review aims to explore how the study relates to social science principles, outline its research questions and methods, and discuss its findings considering various theoretical frameworks.


Relation to Social Science Principles:
Cyberbullying is a social phenomenon deeply rooted in the interplay of individual behaviors and societal influences, fitting well within the scope of social sciences. According to Bhattacherjee (2012), social science research seeks to explain and understand human behavior and societal dynamics. The study of cyberbullying in the article follows this principle by exploring the psychological and social impact of cyberbullying on students, highlighting the relationships between individual actions (bullying) and broader societal consequences (mental health issues like suicide ideation).


Research Questions and Hypotheses:
The study aimed to investigate the prevalence and impact of cyberbullying among Jordanian
college students, with a specific focus on its correlation with suicidal ideation (cyberbullicide).
The research questions focused on identifying how widespread cyberbullying is among college
students and how it influences their mental health. The study hypothesized that cyberbullying
experiences are positively correlated with increased levels of cyberbullicide ideation among the
student population.
Research Methods:
The research employed a survey method, a common approach in social sciences that allows for
data collection from a large sample (Bhattacherjee, 2012). Surveys were distributed to Jordanian college students to gather information about their experiences with cyberbullying, their emotional responses, and their thoughts about self-harm or suicide. This method is appropriate for collecting both quantitative data (e.g., frequency of cyberbullying incidents) and qualitative data (e.g., emotional impact) to provide a comprehensive understanding of the issue.
Data and Analysis:
The data collected were primarily self-reported responses from the survey participants. The
researchers employed statistical analysis to identify trends and correlations between experiences of cyberbullying and levels of cyberbullicide ideation. By using quantitative methods, they could measure the extent of cyberbullying’s impact on mental health and evaluate the relationship between cyberbullying frequency and suicidal thoughts. The study’s findings provided empirical evidence to support the hypothesis, indicating a significant correlation between cyberbullying and cyberbullicide ideation.
The article aligns with several concepts discussed in social science theory, including:
1. Relativism: The study acknowledges that experiences and perceptions of cyberbullying
can vary across cultural and individual contexts, emphasizing that what constitutes
bullying may be subjective.
2. Determinism: The research explores how certain behaviors (cyberbullying) can
deterministically influence psychological outcomes (suicidal ideation), reinforcing the
cause-and-effect nature of human actions.
3. Objectivity: The study strives for objectivity by using statistical methods to assess the
relationship between cyberbullying and mental health, minimizing researcher bias.
4. Empiricism: Through the collection of survey data, the research adopts an empirical
approach, relying on observable and measurable evidence to support its conclusions.
5. Maslow’s Hierarchy of Needs: Cyberbullying can threaten an individual’s sense of
belonging and self-esteem, as posited by Maslow, potentially leading to higher levels of
distress and suicidal ideation.
6. Cognitive and Behavioral Theories: The study connects cyberbullying experiences with
cognitive and emotional responses, such as depression and anxiety, influencing students’
thoughts and behaviors.
Relation to Marginalized Groups:
Cyberbullying disproportionately affects marginalized groups, including those based on gender, ethnicity, and socioeconomic status. In the context of Jordanian society, cultural and societal norms may exacerbate the vulnerability of certain groups to cyberbullying. The study sheds light on the need for increased support and resources for students who are at greater risk of victimization. This aligns with social science principles that emphasize the importance of
understanding and addressing inequalities within society.

Contributions to Society:
The study provides valuable insights into the prevalence and impact of cyberbullying,
contributing to societal awareness and the need for mental health interventions in academic
settings. It underscores the importance of educational institutions and policymakers
implementing strategies to mitigate cyberbullying’s harmful effects and support at-risk students. By highlighting the link between cyberbullying and suicide ideation, the study advocates for more research and resources to address this public health concern.
Conclusion:
The article “Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students”
offers a crucial exploration of the impact of cyberbullying on mental health, particularly in the
context of higher education. Utilizing survey methods, the study provides empirical evidence of
the significant relationship between cyberbullying and suicidal ideation. By connecting its
findings to social science theories and emphasizing the effects on marginalized groups, the
research makes a meaningful contribution to understanding and addressing cyberbullying’s
challenges. The article reinforces the need for continued efforts to create safe and supportive
environments for students in the digital age.

References:
• Al-Badayneh, D., Khelifa, M., & Ben Brik, A. (Year). Cyberbullying and Cyberbullicide
Ideation Among Jordanian College Students.
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/329/
98

• Bhattacherjee, A. (2012). Social Science Research: Principles, Methods, and Practices.

Article Review #2: Cyberattacks, Cyber Threats, and Attitudes Toward
Cybersecurity Policies

Introduction:
Cybersecurity has become a cornerstone of modern society, shaping how individuals,
organizations, and governments navigate an increasingly digital world. The article
“Cyberattacks, Cyber Threats, and Attitudes Toward Cybersecurity Policies” by Snider,
Shandler, Zandani, and Canetti examines how psychological and sociopolitical factors shape
public attitudes toward cybersecurity policies. The authors adopt a multidisciplinary approach,
combining elements of psychology, sociology, and political science to analyze the interplay of
fear, trust, and demographic variables in shaping public opinion.
This review evaluates the article through a social science lens, examining its research questions,
methodology, and findings. The study’s relevance to structural functionalism, conflict theory,
symbolic interactionism, and human-centered cybersecurity is explored. Additionally, its
implications for marginalized groups and overall societal contributions are discussed, situating
the article as vital to interdisciplinary research on cybersecurity.

Relation to the Principles of Social Sciences:
The study investigates societal attitudes toward cyber threats and policies, focusing on how
public perceptions shape acceptance of cybersecurity measures. This approach reflects key
principles of social sciences, particularly the study of societal structures, behavior, and
interactions in the face of technological change. Cybersecurity is presented not merely as a
technical problem but as a social phenomenon shaped by trust, ideology, and cultural norms.
This relationship aligns with social stratification theories, which analyze how societal
inequalities influence public perceptions. For instance, marginalized groups may distrust
cybersecurity policies due to their historical experiences with systemic surveillance and
exclusion. The study also connects to social exchange theory, emphasizing trust as a key factor
in determining whether individuals prioritize collective security over individual rights (Snider,
2023). Moreover, cybersecurity is intertwined with behavioral psychology, exploring how
perceived risks and benefits influence policy support. The human dimension of cybersecurity
policy development underscores the need for multidisciplinary approaches that bridge technical, social, and cultural perspectives (Bada, 2019).
Research Questions or Hypotheses:
The researchers aimed to answer critical questions about the intersection of societal attitudes and
cybersecurity policy acceptance:
1. How do societal attitudes toward cyber threats shape policy acceptance?
This question addresses how public risk perception and trust in institutions impact
support for cybersecurity measures.

2. What demographic and ideological patterns predict attitudes toward cybersecurity
measures?
It hypothesizes that individuals with conservative political ideologies and higher
institutional trust are more likely to support stringent measures, while privacy-focused
groups may oppose them (Snider, 2023).
3. How does perceived vulnerability to cyber threats influence policy preferences?
The study hypothesizes that personal experiences with cyberattacks heighten awareness
and support for proactive policies. Previous research supports this link, indicating that
individuals with higher exposure to digital risks often adopt risk-averse attitudes.
Research Methods:
The researchers employed a mixed-methods approach, integrating quantitative surveys and
qualitative focus groups to gather data:
1. Quantitative Methods:
o Surveys were distributed to over 2,000 participants across varied demographics.
o Questions used Likert scales to gauge trust in institutions, perceived threat levels,
and attitudes toward cybersecurity policies.
o Statistical analysis, including regression models, identified relationships between
demographic variables (e.g., age, gender, education) and policy preferences
(Snider, 2023).
2. Qualitative Methods:

o Focus groups were conducted to explore in-depth attitudes toward cybersecurity.
o Thematic analysis identified recurring concerns, such as fears of surveillance
abuse and disparities in cybersecurity access among marginalized groups.
o Contextual data from participants enriched the findings, highlighting societal and
cultural nuances often absent in quantitative studies.
Data and Analysis:
The analysis combined quantitative data with qualitative insights to offer a nuanced perspective:
1. Quantitative Findings:
o Statistical analysis showed that trust in government institutions strongly predicts
policy acceptance. Participants with higher trust levels were significantly more
likely to support cybersecurity policies, echoing findings from prior studies
(Bada, 2019).
o Perceived risk of cyber threats positively correlated with support for stringent
measures, suggesting that heightened vulnerability drives policy endorsement
(Snider, 2023).
2. Qualitative Findings:
o Focus group discussions revealed skepticism among marginalized groups,
particularly regarding government-led cybersecurity initiatives. These
communities expressed fears that policies might disproportionately target them,
reflecting broader societal inequities.

o Privacy concerns emerged prominently, particularly among younger participants
and activists, who emphasized the need for transparent and equitable policy
frameworks.
Concepts from PowerPoint Presentations:
1. Cybersecurity and Religion:
Religious ideologies often shape public attitudes toward risk and trust. For instance,
individuals from faith-based communities may interpret cybersecurity policies through
moral or ethical lenses, impacting their perceptions of governmental authority and digital
surveillance.
2. Human-Centered Cybersecurity:
The study’s emphasis on public perceptions highlights the importance of human-centered
cybersecurity, which prioritizes user trust and accessibility. Policies designed without
considering human behavior risk alienating key societal groups (Bada, 2019).
3. Structural Functionalism:
From this perspective, cybersecurity policies serve as mechanisms to maintain societal
order in the face of digital threats. The research highlights how policies aim to stabilize
societal structures by addressing vulnerabilities in critical infrastructures (Snider, 2023).
4. Conflict Theory:
The study identifies tensions between different societal groups, particularly concerning
privacy rights and surveillance. Marginalized groups often perceive cybersecurity policies as tools of control rather than protection, reflecting power imbalances and
systemic inequalities.
5. Symbolic Interactionism:
Cybersecurity policies gain meaning through public discourse and social interactions.
Media narratives, cultural values, and personal experiences significantly shape
individuals’ attitudes toward these policies.
Challenges, Concerns, and Contributions of Marginalized Groups:
The study highlights the unique challenges faced by marginalized groups, emphasizing their
underrepresentation in cybersecurity discourse.
1. Challenges:
o Limited digital literacy and access to cybersecurity resources leave marginalized
communities vulnerable to cyber threats (Bada, 2019).
o Historical experiences with systemic surveillance foster distrust in government-
led cybersecurity measures, complicating policy implementation.
2. Concerns:
o Marginalized groups often view cybersecurity policies as invasive, prioritizing
surveillance over protection.

o Privacy rights are a significant concern, with fears that policies might exacerbate
societal inequalities by disproportionately targeting vulnerable populations
(Snider, 2023).
3. Contributions:
o By incorporating diverse perspectives, the study advocates for inclusive
cybersecurity frameworks that address both security and equity concerns.
o It underscores the need for targeted digital literacy initiatives to empower
underrepresented communities, fostering equitable access to cybersecurity
protections.
Contributions to Society:
The article’s findings have far-reaching implications for policymaking, education, and public
trust:
1. Policymaking:
The research informs policymakers about the importance of balancing security with
privacy concerns. By considering public attitudes, governments can design policies that
resonate with diverse demographic groups, enhancing trust and compliance (Snider,
2023).
2. Education:
Public education on cybersecurity is vital for fostering informed attitudes. The study
advocates for increased digital literacy, particularly among marginalized groups, to equip individuals with the knowledge and skills needed to navigate the digital landscape
securely (Bada, 2019).
3. Social Impact:
The study contributes to a broader understanding of cybersecurity as a societal issue.
Addressing the human dimensions of cybersecurity, it emphasizes the need for
interdisciplinary approaches that bridge technological advancements with societal needs
Conclusion:
The article provides a valuable interdisciplinary exploration of how societal attitudes influence
the acceptance of cybersecurity policies. By employing a mixed-methods approach, the
researchers effectively highlight the complex interplay between trust, ideology, and perceived
risks in shaping public support for cybersecurity measures. The study underscores the
importance of adopting human-centered approaches to cybersecurity that prioritize equity,
inclusivity, and public trust. Moreover, the findings shed light on the unique challenges faced by marginalized groups, emphasizing the need for targeted digital literacy programs and equitable policy frameworks. By bridging the gap between technical solutions and societal expectations, this research makes significant contributions to cybersecurity policymaking and public awareness. It also serves as a call to action for stakeholders to consider diverse perspectives, ensuring that cybersecurity solutions are not only effective but also socially just. In an increasingly digital world, fostering trust and collaboration among all societal groups is essential for achieving sustainable and inclusive cybersecurity practices.

References
• Bada, M., Sasse, M. A., & Nurse, J. R. C. (2019). Cybersecurity awareness
campaigns: Why do they fail to change behavior? Computers & Security, 87, 101-
108. https://arxiv.org/abs/1901.02672
• Snider, K. L. G., Shandler, R., Zandani, S., & Canetti, D. (2023). Cyberattacks, cyber
threats, and attitudes toward cybersecurity policies.
https://academic.oup.com/cybersecurity/article/7/1/tyab019/6382745?login=false