part 1 and 2

Learning Goal: I’m working on a literature writing question and need an explanation and answer to help me learn.

What Are The Effects Of Social Media Use On The Mental Health Of Young Adults And What Are The Potential Interventions To Mitigate These Effects based on cyber security?

part 1;


Main References

Choi, K. S., Cho, S., & Lee, J. R. (2019). Impacts of online risky behaviors and cybersecurity management on cyberbullying and traditional bullying victimization among Korean youth: Application of cyber-routine activities theory with latent class analysis. Computers in Human Behavior, 100, 1-10.

Harris, M. A., & Martin, R. (2019). Promoting cybersecurity compliance. In Cybersecurity education for awareness and compliance (pp. 54-71). IGI Global. https://www.igi-global.com/chapter/promoting-cybersecurity-compliance/225917.

Herath, T. B., Khanna, P., & Ahmed, M. (2022). Cybersecurity practices for social media users: a systematic literature review. Journal of Cybersecurity and Privacy, 2(1), 1-18. https://doi.org/10.3390/jcp2010001.

Rahman, N. A. A., Sairi, I., Zizi, N. A. M., & Khalid, F. (2020). The importance of cybersecurity education in school. International Journal of Information and Education Technology, 10(5), 378-382. https://pdfs.semanticscholar.org/f24d/d9d57c7c3c4a14cedfd4eb38073b78124d96.pdf.

Additional Research Articles

Chang, L. Y., & Coppel, N. (2020). Building cyber security awareness in a developing country: lessons from Myanmar. Computers & Security, 97, https://doi.org/10.1016/j.cose.2020.101959.

Korovessis, P., Furnell, S., Papadaki, M., & Haskell-Dowland, P. (2017). A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2), 5. https://digitalcommons.kennesaw.edu/jcerp/vol2017/iss2/5.

Yokotani, K., & Takano, M. (2022). Predicting cyber offenders and victims and their offense and damage time from routine chat times and online social network activities. Computers in Human Behavior, 128, 107099. https://doi.org/10.1016/j.chb.2021.107099.

Zamir, H. (2020). Cybersecurity and Social Media. In Cybersecurity for Information Professionals (pp. 153-171). Auerbach Publications. https://www.taylorfrancis.com/chapters/edit/10.1201/9781003042235-8/cybersecurity-social-media-hassan-zamir.


list of scholarly research articles that you might use for the upcoming Literature Review Assignment (feel free to look ahead to next week to read over this assignment if you want). You also know how to mine scholarly articles for essential information.

The next step is to create a Research Spreadsheet. This is similar to an Annotated Bibliography, but I find the spreadsheet to be more useful as a pre-writing strategy because it allows you to see, at a glance, how your sources contribute to a whole conversation about a given topic. You will essentially do what you did for our “Mining a Scholarly Article” activity last week, but for ALL of your current sources.

Below is a screenshot of Dr. Pacheco-Vega’s version of a research spreadsheet. However your spreadsheet will have different categories than his.

Read “Synthesizing Different Bodies of Work in your Literature Review” by Raul Pacheco-Vega
Your Spreadsheet Instructions

For your spreadsheet, use the following column categories:

  • Topic
  • Citation
  • Dataset (what is being studied exactly)
  • Methodology (type of analysis performed on the dataset)
  • Conclusion/Thesis
  • Limitations/Future Research
  • Notes (your own perspective on the article) 


part 2

  1. Whenever you are tasked with writing a new-to-you style of writing, what is the first thing you do? Probably google examples to look at and use as models for your work. The purpose of this assignment is similar, but I am providing the examples for you. These examples were written by former students, and while they are not perfect specimins of writing, they are some of the better examples of a Literature Review that I have seen over the years.
  2. First, READ all three of the attached examplesSecond, choose ONE to download and annotate using the software of your choice (MS Word “Track Changes” allows you to leave comments for instance)For your annotations, avoid simply critiquing the student’s writing. Instead, focus on the salient features of the Literature Review – What will you replicate in your own work? What features do you notice that are unique to this type of writing (as opposed to other kinds of research writing you’ve done)? Third, save your annotations and then REUPLOAD your annotated example to this submission link as a .docx or .pdf file. If after reading and annotating the example you discover that you have questions for me, specifically, leave them in the blackboard “notes” box and I will answer them when I review your work.

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.