{"id":128,"date":"2025-12-05T06:56:42","date_gmt":"2025-12-05T06:56:42","guid":{"rendered":"https:\/\/student.wp.odu.edu\/ithom017\/?p=128"},"modified":"2025-12-05T06:56:42","modified_gmt":"2025-12-05T06:56:42","slug":"article-review-2","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/ithom017\/2025\/12\/05\/article-review-2\/","title":{"rendered":"Article Review #2"},"content":{"rendered":"\n<p><strong>Article Review #2: Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges<\/strong><\/p>\n\n\n\n<p>Israel Thompson<\/p>\n\n\n\n<p>School of Cybersecurity, Old Dominion University<\/p>\n\n\n\n<p>CYSE 201S: Cybersecurity and the Social Science<\/p>\n\n\n\n<p>Professor Yalpi<\/p>\n\n\n\n<p>11\/11\/2025<\/p>\n\n\n\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>The article I\u2019m reviewing is talking about \u201cCyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges\u201d that some user\u2019s may or may not deal with. Cyberbullying is something that happens often to users that causes them to have depression or even cause them to harm themselves.<\/p>\n\n\n\n<p><strong>Relation\/Connection to Social Science Principles<\/strong><\/p>\n\n\n\n<p>This article relates to the social science principles by addressing the problem of cyberbullying and the challenges that are at hand when users go through it. For example, this article connects to the social principle of Relativism which is the cause and effect as to how an event might occur. Cyberbullying mostly occurs due to the increase of encountering situations with strangers online as stated in the article.<\/p>\n\n\n\n<p><strong>Research Question \/Hypothesis\/Independent Variable\/Dependent Variable<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Theres multiple questions that can be taken from this article but the main one that I feel like is addressed throughout the whole writing is \u201cWhat factors contribute to cyberbullying, and how can they be measured?&#8221;. The author talks about how the internet is an enhancement to daily life, but it also comes with downsides since bullying still can happen online even when you think it\u2019s not. Trolling and harassment are ways that people cyberbully users, using multiple accounts on several different platforms to seem like it\u2019s more than one but it just be the same person. Being passive and knowing who you are connecting with on social media is ways to prevent being cyberbullied or even hacked through different kinds of methods.<\/p>\n\n\n\n<p><strong>Types of Research Methods used<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Research methods used in this article were found by using databases. There\u2019s a list of the databases named \u201cScopus, Google Scholar, and Science Direct.\u201d The author was able to generate the proper research and information by applying keywords to the three databases. By doing that it led to other articles, which research was conducted and broken down to see what some causes of cyberbullying are.<\/p>\n\n\n\n<p><strong>Types of Data Analysis used<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>The author displays flow diagrams, tables showing how much information was collected through the databases, a summary of previous studies from 2007-2022, and comparison charts. All of these are ways a reader can get a better understanding of the information that is being read. Being able to see the outcomes allows a reader to connect on a deeper level. When you see the statistics of cyberbullying continue to grow, you start thinking about ways to prevent it and make a change within the problem.<\/p>\n\n\n\n<p><strong>Connections to other Course Concepts<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>This article that I\u2019m reviewing connects to course concepts by just breaking down and explaining how different actions can lead to different outcomes. Certain things shouldn\u2019t be used online, and users must understand that not everybody on social media is your friend. Knowing basic social science and economics studies can go a long way when being on social media, because a user can know what\u2019s right and what\u2019s wrong.<\/p>\n\n\n\n<p><strong>Overall societal contributions of the Study\/Conclusion<\/strong><\/p>\n\n\n\n<p>In conclusion, the article I reviewed was about \u201cCyberbullying on Social Media\u201d. The article addressed problems that children and even some adults go through daily when it comes to being active on social media. Being on social media comes with a lot of responsibility and trust because it\u2019s so easy to get caught up in something that can lead to cyberbullying or being hacked, all kinds of things. This article can advance our understanding of cybersecurity and social science by taking the proper actions when being active on social media. Knowing who you are connecting with and trusting the right people can go a long way to ensure your safety online.<\/p>\n\n\n\n<p><a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/10\/1\/tyae026\/7928395?searchresult=1#498540881\">Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges | Journal of Cybersecurity | Oxford Academic<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article Review #2: Cyberbullying on Social Media: Definitions, Prevalence, and Impact Challenges Israel Thompson School of Cybersecurity, Old Dominion University CYSE 201S: Cybersecurity and the Social Science Professor Yalpi 11\/11\/2025 Introduction The article I\u2019m reviewing is talking about \u201cCyberbullying on&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/ithom017\/2025\/12\/05\/article-review-2\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31218,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/ithom017\/wp-json\/wp\/v2\/posts\/128"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/ithom017\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/ithom017\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ithom017\/wp-json\/wp\/v2\/users\/31218"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ithom017\/wp-json\/wp\/v2\/comments?post=128"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/ithom017\/wp-json\/wp\/v2\/posts\/128\/revisions"}],"predecessor-version":[{"id":129,"href":"https:\/\/student.wp.odu.edu\/ithom017\/wp-json\/wp\/v2\/posts\/128\/revisions\/129"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/ithom017\/wp-json\/wp\/v2\/media?parent=128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ithom017\/wp-json\/wp\/v2\/categories?post=128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ithom017\/wp-json\/wp\/v2\/tags?post=128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}