{"id":347,"date":"2025-04-27T22:31:21","date_gmt":"2025-04-27T22:31:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/?page_id=347"},"modified":"2025-04-27T23:19:07","modified_gmt":"2025-04-27T23:19:07","slug":"article-reviews","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/article-reviews\/","title":{"rendered":"Article Reviews"},"content":{"rendered":"\n<p>On two occasions during the semester,&nbsp;Students will write an&nbsp;<strong>article review<\/strong>&nbsp;using social science cybersecurity studies and should follow the rubric closely.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Article 1 review will be derived from a scholarly journal.<\/strong><\/p>\n\n\n\n<p><strong>Article 2 review will be derived from a different scholarly journal than your Article 1 review.<\/strong><\/p>\n\n\n\n<p>Open and easy to access journals that students might select articles from include:<\/p>\n\n\n\n<p>International Journal of Cyber Criminology:&nbsp;<a href=\"https:\/\/www.cybercrimejournal.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.cybercrimejournal.com\/Links to an external site.<\/a><\/p>\n\n\n\n<p>International Journal of Cybersecurity Intelligence &amp; Cybercrime:&nbsp;<a href=\"https:\/\/vc.bridgew.edu\/ijcic\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/vc.bridgew.edu\/ijcicLinks to an external site.<\/a>&nbsp;<\/p>\n\n\n\n<p>and Journal of Cybersecurity:&nbsp;<a href=\"https:\/\/academic.oup.com\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/academic.oup.com\/cybersecurityLinks to an external site.<\/a><\/p>\n\n\n\n<p>The reviews should focus on (1) how the topic relates to the principles of the social sciences, (2) the study\u2019s research questions or hypotheses, (3) the types of research methods used, (4) the types of data and analysis done, (5) how concepts discussed in class relate to the article, (5) how the topic relates to the challenges, concerns, and contributions of marginalized groups, and (6) the overall contributions of the studies to society.<\/p>\n\n\n\n<p>Well-graded papers are between 350 &#8211; 500 words.\u00a0 They are constructed using the rubric provided in this syllabus.\u00a0 The professor uses Turnitin for each of the student submission.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/2025\/04\/27\/article-review-1\/\">Article Review #1<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/2025\/04\/27\/article-review-2\/\">Article Review #2<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>On two occasions during the semester,&nbsp;Students will write an&nbsp;article review&nbsp;using social science cybersecurity studies and should follow the rubric closely.&nbsp;&nbsp;&nbsp; Article 1 review will be derived from a scholarly journal. Article 2 review will be derived from a different scholarly journal than your Article 1 review. Open and easy to access journals that students might&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/article-reviews\/\">Read More<\/a><\/div>\n","protected":false},"author":27010,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/pages\/347"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/users\/27010"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/comments?post=347"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/pages\/347\/revisions"}],"predecessor-version":[{"id":375,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/pages\/347\/revisions\/375"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/media?parent=347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}