Annotated Bibliography on Cyberbullying & Traditional Bullying

Paper Type:  Annotated bibliography
Pages:  5
Wordcount:  1165 Words
Date:  2023-03-29

Choi, K. S., Cho, S., & Lee, J. R. (2019). Impacts of online risky behaviors and cybersecurity management on cyberbullying and traditional bullying victimization among Korean youth: Application of cyber-routine activities theory with latent class analysis. Computers in Human Behavior, 100, 1-10.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

The article is written by Choi, Cho, and Lee in 2019 by evaluating the effect of computers in human behavior. The participants of the book are the Korean youths and their online practices. The article, however, highlights how the leisure time used on online networks has created cyberbullying victimization in society. It also reflects that leisure, lifestyle, and social networking have profoundly contributed to the cyberbullying victimization and a lot of impacts on the Korean youths. The studies conducted on writing the article emphasizes that advancement in technology and the great use of the internet has contributed to an increase in crime rates, especially cybersecurity. The report outlines that the behavior of the youths who engage in criminal activities is motivated by the lifestyle they have, social networks, and online leisure. The material analyzes the importance of educating individuals and increasing awareness in society to reduce criminal activities. The article is well addressed, making it easy to understand and explain its significance.

Eustace, K., Islam, R., Tsang, P., & Fellows, G. (2017, October). Human Factors, Self-awareness, and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks. International Conference on Security and Privacy in Communication Systems (pp. 166-181). Springer, Cham.

The authors of the book are Eustace, Islam, Tsang, and Fellows and outlines issues that involve cybersecurity on human factors, self-awareness, and intervention. Mobile devices and social networks are stated to contribute to cybersecurity threats highly. The article analyzes public and personal safety through the use of technology in the Asia Pacific region. It reflects on how cybersecurity education and the internet of things have contributed to the change in human behaviors. The concern addressed by the authors is how small devices influence crime rates in interacting with bigger networks in society. The paper analyses the importance of security measures in the use of technology through public safety and the intervention model in reducing cybercrimes. It also reflects on how human factors can contribute to reducing criminal activities and message framing. The paper analyzes the importance of lowering crimes by focusing on smaller devices like mobile applications.

Gohel, H. A., Upadhyay, H., Pons, A., & Lagos, L. E. (2017, June). Design of Virtualization Framework to Detect Cyber Threats in Linux Environment. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (pp. 316-320). IEEE.

The article is written by Gohel, Upadhyay, Pons, and Lagos in 2017 to address how cyber threats can be detected and reduced through virtualization networks in the Linux environment. The paper analyzes the struggle in reducing the increasing rate of cybercrimes through the advancement in technology and emphasizing on designing the virtualization aspect to minimize the problem. Through the efforts of the Linux Operating System Kernel, the cyber threats have been increasing, and the paper aims at implementing a new framework of solving the issues in society. The paper focuses on the virtual hypervisor machines that will help in visualization to detect cybercrimes and reducing its impacts on the economy. The article improves the methods of solving threats through enhancing the traditional host-based approaches. In lowering crime rates, the framework will detect the compromised servers and replace their versions. The paper aims to provide adequate measures under lower costs.

Tabansky, L. (2017). Cyber Security Challenges: The Israeli Water Sector Example. In Cyber-Physical Security (pp. 205-219). Springer, Cham

The article is written by Tabansky in 2017 to address the cybersecurity problems associated with the advancement in technology and uses the Israeli water sector to analyze the aspects. It emphasizes improving cybersecurity measures. It requires the cooperation of the government and improved infrastructure. Businesses, however, are expected to cooperate in reducing cybersecurity issues by implementing comprehensive approaches. It, however, states that cybersecurity and social networking have significantly increased the crime rates in the communities. Through implementing the national strategies in solving the challenges, the paper emphasizes on using non-governance techniques. The paper uses the Israel water sector in discussing the development of cybersecurity methods in outlining issues encountered through technology. The article aims to provide sufficient measures that can be used by other countries.

References

Choi, K. S., Cho, S., & Lee, J. R. (2019). Impacts of online risky behaviors and cybersecurity management on cyberbullying and traditional bullying victimization among Korean youth: Application of cyber-routine activities theory with latent class analysis. Computers in Human Behavior, 100, 1-10.

Eustace, K., Islam, R., Tsang, P., & Fellows, G. (2017, October). Human Factors, Self-awareness, and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks. International Conference on Security and Privacy in Communication Systems (pp. 166-181). Springer, Cham.

Gohel, H. A., Upadhyay, H., Pons, A., & Lagos, L. E. (2017, June). Design of Virtualization Framework to Detect Cyber Threats in Linux Environment. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (pp. 316-320). IEEE.

Tabansky, L. (2017). Cyber Security Challenges: The Israeli Water Sector Example. In Cyber-Physical Security (pp. 205-219). Springer, Cham.

Cite this page

Annotated Bibliography on Cyberbullying & Traditional Bullying. (2023, Mar 29). Retrieved from https://proessays.net/essays/annotated-bibliography-on-cyberbullying-traditional-bullying

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism