Site icon Doc Sity

part 1 and 2

part 1 and 2

Description

What Are The Effects Of Social Media Use On The Mental Health Of Young Adults And What Are The Potential Interventions To Mitigate These Effects based on cyber security?

part 1;

Main References

Choi, K. S., Cho, S., & Lee, J. R. (2019). Impacts of online risky behaviors and cybersecurity management on cyberbullying and traditional bullying victimization among Korean youth: Application of cyber-routine activities theory with latent class analysis. Computers in Human Behavior, 100, 1-10.

Harris, M. A., & Martin, R. (2019). Promoting cybersecurity compliance. In Cybersecurity education for awareness and compliance (pp. 54-71). IGI Global.  https://www.igi-global.com/chapter/promoting-cybersecurity-compliance/225917

Herath, T. B., Khanna, P., & Ahmed, M. (2022). Cybersecurity practices for social media users: a systematic literature review. Journal of Cybersecurity and Privacy, 2(1), 1-18. https://doi.org/10.3390/jcp2010001

Rahman, N. A. A., Sairi, I., Zizi, N. A. M., & Khalid, F. (2020). The importance of cybersecurity education in school. International Journal of Information and Education Technology, 10(5), 378-382. https://pdfs.semanticscholar.org/f24d/d9d57c7c3c4a14cedfd4eb38073b78124d96.pdf

Additional Research Articles

Chang, L. Y., & Coppel, N. (2020). Building cyber security awareness in a developing country: lessons from Myanmar. Computers & Security, 97, https://doi.org/10.1016/j.cose.2020.101959.

Korovessis, P., Furnell, S., Papadaki, M., & Haskell-Dowland, P. (2017). A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2), 5. https://digitalcommons.kennesaw.edu/jcerp/vol2017/iss2/5

Yokotani, K., & Takano, M. (2022). Predicting cyber offenders and victims and their offense and damage time from routine chat times and online social network activities. Computers in Human Behavior, 128, 107099. https://doi.org/10.1016/j.chb.2021.107099.

Zamir, H. (2020). Cybersecurity and Social Media. In Cybersecurity for Information Professionals (pp. 153-171). Auerbach Publications. https://www.taylorfrancis.com/chapters/edit/10.1201/9781003042235-8/cybersecurity-social-media-hassan-zamir

The next step is to create a Research Spreadsheet. This is similar to an Annotated Bibliography, but I find the spreadsheet to be more useful as a pre-writing strategy because it allows you to see, at a glance, how your sources contribute to a whole conversation about a given topic. You will essentially do what you did for our “Mining a Scholarly Article” activity last week, but for ALL of your current sources. 

Below is a screenshot of Dr. Pacheco-Vega’s version of a research spreadsheet. However your spreadsheet will have different categories than his.

Read “Synthesizing Different Bodies of Work in your Literature Review” by Raul Pacheco-Vega  
Your Spreadsheet Instructions 

For your spreadsheet, use the following column categories: 

  • Topic
  • Citation
  • Dataset (what is being studied exactly)
  • Methodology (type of analysis performed on the dataset)
  • Conclusion/Thesis
  • Limitations/Future Research
  • Notes (your own perspective on the article)  

  1. Whenever you are tasked with writing a new-to-you style of writing, what is the first thing you do? Probably google examples to look at and use as models for your work. The purpose of this assignment is similar, but I am providing the examples for you. These examples were written by former students, and while they are not perfect specimins of writing, they are some of the better examples of a Literature Review that I have seen over the years. 
  2. First, READ all three of the attached examplesSecond, choose ONE to download and annotate using the software of your choice (MS Word “Track Changes” allows you to leave comments for instance)For your annotations, avoid simply critiquing the student’s writing. Instead, focus on the salient features of the Literature Review – What will you replicate in your own work? What features do you notice that are unique to this type of writing (as opposed to other kinds of research writing you’ve done)? Third, save your annotations and then REUPLOAD your annotated example to this submission link as a .docx or .pdf file.

User generated content is uploaded by users for the purposes of learning and should be used following our honor code & terms of service.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Exit mobile version