Academic Skills Research Report: Cyberbullying and Phishing

Verified

Added on  2025/05/02

|8
|1447
|134
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
ACADEMIC SKILLS
Name of the student:
Name of the university:
Author’s note:
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ACADEMIC SKILLS
Table of Contents
Overall Introduction.........................................................................................................................3
Part c................................................................................................................................................3
Introduction..................................................................................................................................3
Discussion on the context............................................................................................................3
Critical analysis of the alternatives..............................................................................................5
Conclusion...................................................................................................................................5
Recommendation.........................................................................................................................6
Overall conclusion...........................................................................................................................6
Reference.........................................................................................................................................8
2
Document Page
ACADEMIC SKILLS
Overall Introduction
It can be observed that it is very much essential for the students to develop the much needed
academic skills which will allow them to build their career in the most effective way. This
research shall highlight the use and the importance of academic skills in the life of the students
(Mishna et al., 2017). These academic skills help in improving the required skills that a student
needs to develop and learning skills for improving the knowledge in the academic field. Based
on this, the research is divided into three parts which will highlight the importance of the
academic skills in a student's life.
Part c
Introduction
This part of the research shall focus on the aspects of cyber bullying which is taken as the case
study (Olweus, 2016). Here, I will be further researching on the group discussion that my other
members and Ican add more knowledge on the aspects of cyber bullying. Further, this will be
accompanied by a good discussion on the context of the cyber bullying and an alternative, i.e.
Phishing. Further, a recommendation will be provided to for overcoming the problems in an
effective manner.
Discussion on the context
According to Gardner et al., (2016) cyber bullying is described as the process which takes place
on various digital platforms like cell phones, computers, and tablets. This can occur through the
help of SMS, text, apps or even on various social media platforms. It tends to include sending
and posting of harmful and false content about others which tends to degrade the personal image
3
Document Page
ACADEMIC SKILLS
of that person very badly. Further, it can also be see that cyber bullying may cross the line and
may be termed as the criminal activity which disregards the laws. Generally, it tends to cause
greater embarrassment and humiliation for the victim which ruptures the public image very
badly. Therefore, my group members have undertaken cyber bullying as the topic of discussion,
and their opinions were taken for further discussion (Pabian and Vandebosch, 2016). My
colleagues have provided me with a clear idea about the topic and have successfully discussed
how it can cause several problems in the life of the victims. They opined that cyber bullying
could easily hamper both the physical and the psychology of the individual who is being attacked
over the various digital platforms which are being used trough the help of internet. Others also
opined that cyber bullying a person may be a huge problem and several issues might be created
which if not treated on timely purpose may cause several problems (Mishna et al., 2017). Hence,
the victim must inform his/her friends or family or even to the police so that necessary actions
can be taken. The major problems that cyber bullying might cause are illness, feeling worthless,
depressed and various other things which destroys the victim both mentally and physically.
However, I suggested my friends that proper use of SMART tools may help in reducing the rate
of cyber bullying and gathering information about the attacker will reduce it further. However,
one of the members disagreed on the fact of not keeping certain private information’s on the
social media platforms (Mishna et al., 2017). This is mainly because of the fact that it helps the
recruiters to know more knowledge about the job seekers and also helps in finding the necessary
information that the recruiter needs when the applicant might be recruited in the organization.
This acts as a background check for the applicant (Pabian and Vandebosch, 2016). Thus, the
member is saying to provide information on the social platform by taking various security
measures so that cyber bullying or any other threats can be eradicated easily. Thus, the group
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ACADEMIC SKILLS
discussion has provided me with the much needed knowledge and information on the various
aspects of cyber bullying.
Critical analysis of the alternatives
According to Arachchilage, Love and Beznosov, (2016) phishing is described as a fraudulent
activity through which phishers may obtain various sensitive information where electronic
communication takes place. Thus, apart from cyber bullying this can be an alternative topic
which could be undertaken by my team members and me for further discussion. We could focus
on certain aspects of phishing as it is related to social engineering and it uses various deceived
techniques which are being only related to social media only (Pabian and Vandebosch, 2016).
The communication process is being lured by the communicator through using the digital
platforms in order to take up all the necessary information which is very much confidential in
nature (Klein and Boodaei, Trusteer Ltd, 2015). Our members could discuss about the various
attempts that phishing incidents might include where the need of having proper legislation or
techniques are felt. Further, we could also talk about the required training that are needed or
other security measures that could be taken for stopping the phishing process (Olweus, 2016). On
the other hand, phishing incidents may destroy the emotional well being of the victim as his/her
personal information may be stolen in real quick time which would destroy the future well being
of the victim. Thus, phishing is a big threat for the web security which would destroy the proper
use of web platforms which are now being used as the means to transferring money or any other
means (Pabian and Vandebosch, 2016).
Conclusion
The research concludes on the fact about the group discussion that I had. I have also learned
about an alternative problem, i.e. phishing which is a major threat for the web security. I have
5
Document Page
ACADEMIC SKILLS
also provided various recommendations through which the problems of phishing could be
avoided.
Recommendation
The ways through which phishing can be overcome are described below:
- Keeping a piece of proper information on the techniques of phishing and undergoing
various awareness programs for tightening up the security
- Installing various anti-phishing toolbar which helps in having a quick run so that specific
checklist can be prepared
- Verifying various sites with proper security checks so that phishing problems can be
easily avoided
- Checking the online accounts on a regular basis and keeping the browser updated on a
regular basis. These updates help in overcoming the security loopholes that phishes tend
to use for exploiting the personal information. Hence, whenever the message of the
update is provided, it is very much essential to update the browser and keep updating the
security concerns of the online accounts
- Lastly, firewalls can be used as the security measures through which intruders could be
stopped from entering the system.
Overall conclusion
This research focus on the overall academic qualities that a student might possess in order to
succeed in life in the field of academics. This is mainly because of the fact that academic skills
play a vital role in a student’s life. Throughout the three parts of this specific research, I have
understood various aspects that academic skills could provide and the need for having a proper
6
Document Page
ACADEMIC SKILLS
group discussion. Further, I have also understood the use of smart goals in academic filed and
other aspects of life which could successfully eradicate all the problems. Thus, the research
concludes on the fact that it is essential to develop academic knowledge for the betterment of
life.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ACADEMIC SKILLS
Reference
Arachchilage, N.A.G., Love, S. and Beznosov, K., 2016. Phishing threat avoidance behaviour:
An empirical investigation. Computers in Human Behavior, 60, pp.185-197.
Corcoran, L., Guckin, C. and Prentice, G., 2015. Cyberbullying or cyber aggression?: A review
of existing definitions of cyber-based peer-to-peer aggression. Societies, 5(2), pp.245-255.
Gardner, D., O’Driscoll, M., Cooper-Thomas, H., Roche, M., Bentley, T., Catley, B., Teo, S. and
Trenberth, L., 2016. Predictors of workplace bullying and cyber-bullying in New
Zealand. International journal of environmental research and public health, 13(5), p.448.
Klein, A. and Boodaei, M., Trusteer Ltd, 2015. Detection of phishing attempts. U.S. Patent
9,111,090.
Mishna, F., McInroy, L.B., Daciuk, J. and Lacombe-Duncan, A., 2017. Adapting to attrition
challenges in multi-year studies: Examples from a school-based bullying and cyber bullying
study. Children and Youth Services Review, 81, pp.268-271.
Olweus, D., 2016. Cyber Bullying. Aggression and violence: A social psychological perspective,
p.225.
Pabian, S. and Vandebosch, H., 2016. An investigation of short-term longitudinal associations
between social anxiety and victimization and perpetration of traditional bullying and
cyberbullying. Journal of youth and adolescence, 45(2), pp.328-339.
8
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]