Article Review

Cynthia Espinosa
10/02/2024
Article review #1 Cyberbullying and Cyberbullicide Ideation Among Jordanian College Students

How the topic relates to the principles of the social sciences
The topic of cyberbullying and cyberbullicide ideation among Jordanian college students relates
to the principles of social sciences through its use of scientific experimentation to determine the
effects cyberbullying has on cyberbullicide ideation within a community of Jordanian college
students. It studies the social and psychological impact cyberbullying have on young adults.
The study’s research questions or hypotheses
The hypotheses is “cyberbullying victimization could lead to cyberbullicide and in the least
scenario to cyberbullicide ideation” (Al-Badayneh, Khelifa, & Brik, 2024). It seeks to identify
the relation between cyberbullying and suicidal thoughts that occur as a result of a victim being
cyberbullied.

The types of research methods used
The research was conducted using several methods to include sampling, data collection,
measurement scales, general bullying scales, cyberbullying subscales, violence measures,
dependent measure suicide measures. Data was collected by 1000 students, more men than
women. They were asked to fill out a questionnaire that help identify their experience with
cyberbullying and assess the effect it had on their mental state.

The types of data and analysis done
The data collected was analyzed using descriptive statistical and logistical regression analysis.
How concepts discussed in class relate to the article
The article seeks to relate the offenses of cyberbullying and the effects they can have on the
victims. This week’s slides provided possible reasons and theories as to why people may engage
in the acts of committing crimes like cyberbullying. Cyberbullies may use the theory of
neutralization to justify their offenses, not seeing the victims as victims, or not realizing or
accepting that their behavior is causing actual harm to others.

How the topic relates to the challenges, concerns, and contributions of marginalized groups
The topic focuses on a group of people are not typically the subject for research. It helped to
bring awareness of the challenges cyberbullying and the impact it can have on the lives of the
Jordanian college community.

The overall contributions of the studies to society
The overall contribution of the study provides the need for more intervention and awareness to
combat the effects of cyberbullying. Although there had been campaigns in the past to bring
awareness to cyberbullying, more needs to be done. Females are more likely than males to be
victims and have cyberbullicide ideations. People who are victims of cyberbullying are likely to
engage in risky behavior such as engaging in drugs and alcohol and having bad heal

Al-Badayneh, D., Khelifa, M., & Brik, A. B. (2024, June). Cyberbullying and Cyberbullicide
Ideation Among Jordanian College Students. International Journal of Cyber
Criminology, 18(1), 58-82.
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/329/98


Cynthia Espinosa
11/17/2024
Article review #2 Cyber Victimization in the Healthcare Industry: Analyzing Offender
Motivations and Target Characteristics through Routine Activities Theory (RAT) and Cyber-
Routine Activities Theory (Cyber-RAT)
How the topic relates to the principles of the social sciences
The paper explores the motivation and behaviors of offenders through routine activities theory
and cyber routine activities theory which is related to psychology. The impact of such
cybercrimes in the healthcare environment can lead to mistrust in confidentiality between
patients and providers which can negatively impact the people in a social society.
The study’s research questions or hypotheses
“This study advances the field of healthcare cybersecurity by applying the core principles of
Routine Activities Theory (RAT) and the Cyber-Routine Activities Theory (C-RAT) framework
to identify, analyze, and offer preventive measures against the underlying motives and
characteristics of cyberattacks targeting the healthcare sector.”
The types of research methods used
Secondary data from Hackmageddon was used. Data was collected spring of 2023 and focused
on cases that occurred in from 2018 to 2023. In total the sample size consisted of 1138 cases of
cybercrime on healthcare systems.
The types of data and analysis done
The data included dependent variables; type of healthcare organization, and independent
variables; motives, method, state sponsored, country of origin, new state, and advanced
persistent threats.
How concepts discussed in class relate to the article
The article is exploring the attacks on healthcare system. As learned in module 1, economics and
cybersecurity go hand in hand. The hacker have their reasons for committing crimes. It is
possible that it helps them financially in society, though it causes harm to others who are in
vulnerable positions. The hackers seem to adopt a Marxian economic theory and use their
knowledge to exploit the systems that are left vulnerable due to lack of knowledge or security
practices.
How the topic relates to the challenges, concerns, and contributions of marginalized groups
The healthcare system needs to be protected. People in a society need to be able to trust that their
sensitive and PII data will be protected in care of doctors and technology systems. Everyone in
society can become victims if the healthcare systems are not protected from data breaches and
exploitation.
The overall contributions of the studies to society
The study provides some insight into the motives of cyberattacks on the healthcare systems.
Financial gain seems to be the highest motivating factor of most cybercriminals who attack the
healthcare system because they understand that most companies will pay the ransom to get their

systems back running limiting the downtime effects to their patients. Critical care and patient
services are primary targets in healthcare cyberattacks.

Reference:

Praveen, Y., Kim, M., & Choi, K.-S. (2024, September 16). Cyber Victimization in the
Healthcare Industry: Analyzing Offender Motivations and Target Characteristics through
Routine Activities Theory (RAT) and Cyber-Routine Activities Theory (Cyber-RAT).
International Journal of Cybersecurity Intelligence & Cybercrime, 7(2), 3-27.
https://vc.bridgew.edu/ijcic/vol7/iss2/2/