Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Bridgewater State University

Journal

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 133

Full-Text Articles in Entire DC Network

Understanding The Use Of Artificial Intelligence In Cybercrime, Sinyong Choi, Thomas Dearden, Katalin Parti Sep 2024

Understanding The Use Of Artificial Intelligence In Cybercrime, Sinyong Choi, Thomas Dearden, Katalin Parti

International Journal of Cybersecurity Intelligence & Cybercrime

Artificial intelligence is one of the newest innovations that offenders also exploit to satisfy their criminal desires. Although understanding cybercrimes associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, ranging from deepfake in the metaverse to social engineering attacks. This issue includes articles that were presented by the winners of the student paper competition at the 2024 International White Hat Conference.


Cyber Victimization In The Healthcare Industry: Analyzing Offender Motivations And Target Characteristics Through Routine Activities Theory (Rat) And Cyber-Routine Activities Theory (Cyber-Rat), Yashna Praveen, Mijin Kim, Kyung-Shick Choi Sep 2024

Cyber Victimization In The Healthcare Industry: Analyzing Offender Motivations And Target Characteristics Through Routine Activities Theory (Rat) And Cyber-Routine Activities Theory (Cyber-Rat), Yashna Praveen, Mijin Kim, Kyung-Shick Choi

International Journal of Cybersecurity Intelligence & Cybercrime

The integration of computer technology in healthcare has revolutionized patient care but has also introduced significant cyber risks. Despite the healthcare sector being a primary target for cyber-attacks, research on the dynamics of these threats and practical solutions remains limited. Understanding the complexities of cyberattacks in this sector is critical, as the impact extends beyond financial losses to directly affect patient care and the protection of sensitive information. This paper applies Routine Activities Theory (RAT) and Cyber Routine Activities Theory (C-RAT) to analyze high-tech cyber victimization case studies in healthcare. The analysis explores the motivations behind these attacks and identifies …


Investigating The Intersection Of Ai And Cybercrime: Risks, Trends, And Countermeasures, Sanaika Shetty, Kyung-Shick Choi, Insun Park Sep 2024

Investigating The Intersection Of Ai And Cybercrime: Risks, Trends, And Countermeasures, Sanaika Shetty, Kyung-Shick Choi, Insun Park

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Integrated Model Of Cybercrime Dynamics: A Comprehensive Framework For Understanding Offending And Victimization In The Digital Realm, Troy Smith Phd Sep 2024

Integrated Model Of Cybercrime Dynamics: A Comprehensive Framework For Understanding Offending And Victimization In The Digital Realm, Troy Smith Phd

International Journal of Cybersecurity Intelligence & Cybercrime

This article introduces the Integrated Model of Cybercrime Dynamics (IMCD), a novel theoretical framework for examining the complex interplay between individual characteristics, online behavior, environmental factors, and outcomes related to cybercrime offending and victimization. The model incorporates key concepts from existing theories, empirical evidence, and interdisciplinary perspectives to provide a comprehensive framework. In contrast to traditional criminological theories, the proposed model integrates concepts from multiple disciplines to offer a holistic framework that captures the complexity of cybercrime and specifically caters for the uniqueness of cyberspace. The article will provide a detailed overview of the conceptual model, its theoretical underpinnings drawing …


Career Women’S Experiences Of Marital Discord And Domestic Violence During The Covid-19 Pandemic In Indonesia, Siti Mas’Udah, Lutfi Apreliana Megasari, Evan Doran, Rustinsyah, Muhammad Saud, Bagong Suyanto, Erna Setijaningrum Jul 2024

Career Women’S Experiences Of Marital Discord And Domestic Violence During The Covid-19 Pandemic In Indonesia, Siti Mas’Udah, Lutfi Apreliana Megasari, Evan Doran, Rustinsyah, Muhammad Saud, Bagong Suyanto, Erna Setijaningrum

Journal of International Women's Studies

Domestic violence is a serious social problem, and the number of domestic violence cases are increasing each year in Indonesia. This study aims to explore marital discord and types and triggers of domestic violence experienced by career women who worked from home during the COVID-19 pandemic (2020-2021). In this qualitative research, the researchers interviewed professional working women who experienced domestic violence perpetrated by their husbands in East Java. This study shows that marital discord escalated into domestic violence due to complications experienced when they were staying at home because of the lockdown. Daily engagement between husbands and wives had an …


Gender-Based Cyber Violence: Forms, Impacts, And Strategies To Protect Women Victims, Siti Mas’Udah, Asbah Razali, Sughmita Maslacha Amala Sholicha, Priyono Tri Febrianto, Emy Susanti, Sutinah, Tuti Budirahayu Jul 2024

Gender-Based Cyber Violence: Forms, Impacts, And Strategies To Protect Women Victims, Siti Mas’Udah, Asbah Razali, Sughmita Maslacha Amala Sholicha, Priyono Tri Febrianto, Emy Susanti, Sutinah, Tuti Budirahayu

Journal of International Women's Studies

The rapid advancement of information and communication technology affects many aspects of women’s lives. One aspect is social media which provides freedom of expression. However, women are vulnerable to becoming victims of online crime. This study sought to reveal the forms of gender-based cyber violence experienced by Indonesian women, its impact on victims, and strategies for protecting victims of gender-based cyber violence (GBCV). This study employed qualitative research methods. Informants in this study were 98 women students who experienced gender-based cyber violence. This study found various forms of GBCV experienced by victims, including being sent pornographic videos or links, invited …


Editors' Introduction: Indonesian Social And Economic Change: 8th International Conference On Contemporary Social And Political Affairs On Society In Transition, Muhammad Saud, Irfan Wahyudi, Panizza Allmark, Siti Mas’Udah Jul 2024

Editors' Introduction: Indonesian Social And Economic Change: 8th International Conference On Contemporary Social And Political Affairs On Society In Transition, Muhammad Saud, Irfan Wahyudi, Panizza Allmark, Siti Mas’Udah

Journal of International Women's Studies

No abstract provided.


Hashtag Counterpublics: #Lifeinleggings As Feminist Disruption To Mainstream Public Media Discourses, Alicia Haynes May 2024

Hashtag Counterpublics: #Lifeinleggings As Feminist Disruption To Mainstream Public Media Discourses, Alicia Haynes

Journal of International Women's Studies

This essay explores the disruptive impact that the hashtag #LifeinLeggings, founded by the Caribbean Alliance against Gender-Based Violence, had upon mainstream media, highlighting its role in reshaping public discourse from feminist counterpublics. It examines how women, through the sharing and documentation of their stories, unsettle mass media spaces to initiate crucial conversations about their mundane experiences with sexism and misogyny. Through a critical technocultural discourse analysis, I interrogate the disparities in discourse and representation of the movement in online newspapers at the start of the movement. The article contrasts the silence of local media in Barbados, with more detailed reporting …


Cyberbullying During Covid-19 Pandemic: Relation To Perceived Social Isolation Among College And University Students, Nadya Stefani Neuhaeusler Feb 2024

Cyberbullying During Covid-19 Pandemic: Relation To Perceived Social Isolation Among College And University Students, Nadya Stefani Neuhaeusler

International Journal of Cybersecurity Intelligence & Cybercrime

One tell-tale sign of the impact of the COVID-19 pandemic is the heavy reliance on electronic devices. Young adults in particular have indicated a greater presence on social media and high levels of loneliness during the pandemic. This trend has raised concerns about increased feelings of social isolation and reliance on technology, which could lead to more internet or computer crimes—including cyberbullying. Despite a growing body of literature, little is known about the association between cyberbullying victimization and social isolation among young adults— with even less known about this phenomenon in the context of the ongoing pandemic. Drawing on survey …


The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz Feb 2024

The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz

International Journal of Cybersecurity Intelligence & Cybercrime

According to security experts, cybersecurity education and awareness at the user level are key in combating cybercrime. Hence, in the U.S., cybersecurity and Internet safety workshops, classes, and resources targeting children, adolescents, adults, and senior citizens abound. However, most cybercrime prevention programs are only available in English, thus, ignoring a substantial proportion of Internet users and potential cybercrime victims—Internet users with limited English proficiency (LEP). Yet, successfully combating cybercrime requires that all computer and Internet users, regardless of their language abilities and skills, have access to pertinent cybersecurity information and resources to protect themselves online. This paper presents the results …


Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee Feb 2024

Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Papers from this issue advocate for empowering young adults with knowledge and tools to navigate cyberspace safely, emphasizing the necessity of heightened cybersecurity measures and proactive education. As we advance into the digital abyss, this call becomes imperative, ensuring that the young adults' experience remains a journey of growth and enlightenment, unaffected by the shadows of unseen online threats.


Work-Family Conflict And Stress: A Triangulated Analysis Of The Plight Of Working Mothers In Nigerian Universities, Ngozi Christiana Nwadike, John T. Okpa, Nnana Okoi Ofem, Godfrey Ekene Odinka, Frank Mbeh Attah, Pius Otu Abang, Antigha Umo Bassey Jan 2024

Work-Family Conflict And Stress: A Triangulated Analysis Of The Plight Of Working Mothers In Nigerian Universities, Ngozi Christiana Nwadike, John T. Okpa, Nnana Okoi Ofem, Godfrey Ekene Odinka, Frank Mbeh Attah, Pius Otu Abang, Antigha Umo Bassey

Journal of International Women's Studies

This study investigated the plight of working mothers of children under the age of 18 at the University of Nigeria within the context of work-family conflict, using data from a cross-sectional sample of 485 academic and non-academic staff selected through a multi-staged sampling technique. Data were obtained using questionnaires and seven IDI (in-depth interview) respondents. Data were analyzed using descriptive statistics such as percentages and frequency tables, while the Chi-square was used to examine the study variables. The results indicated that there is a statistically significant relationship between couples living together and the stress experience of working mothers with under-age …


Bridgewater Magazine, Volume 34, Number 1, Spring 2024, Bridgewater State University Jan 2024

Bridgewater Magazine, Volume 34, Number 1, Spring 2024, Bridgewater State University

Bridgewater Magazine

Lighting the Way: the nation's last lighthouse keeper and first woman in that role, Sally Snowman, '76. Also in this issue: The multiple sides of climate change; A program that helps students with an autism spectrum disorder or related social profile gain real-world experience; an article on Peter Weyand, G'88; Two decades of The Bridge; and eclipsing expectations: on-campus viewing event draws hundreds to BSU, observatory.


Are We Safe? An Investigation Of Eve-Teasing (Public Sexual Harassment) In India, Usha Rana Oct 2023

Are We Safe? An Investigation Of Eve-Teasing (Public Sexual Harassment) In India, Usha Rana

Journal of International Women's Studies

In recent years, many countries have tightened the rules against harassment in the workplace and violence in the home. On the other hand, incidences of sexual harassment against women in public places have not been paid sufficient attention. Developing countries like India have recorded an increase in sexual harassment cases in public places due to the increase in participation of women in activities outside the home such as education and employment. In India, the term “Eve-teasing” is a euphemism for sexual harassment in public places. Eve-teasing is identified as a significant problem in the patriarchal society of India that carries …


Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi Aug 2023

Understanding The Use Of Artificial Intelligence In Cybercrime, Katalin Parti, Thomas Dearden, Sinyong Choi

International Journal of Cybersecurity Intelligence & Cybercrime

Artificial intelligence is one of the newest innovations which offenders exploit to satisfy their criminal desires. Although understanding cybercrime that is associated with this relatively new technology is essential in developing proper preventive measures, little has been done to examine this area. Therefore, this paper provides an overview of the two articles featured in the special issue of the International Journal of Cybersecurity Intelligence and Cybercrime, one about deepfakes in the metaverse and the other about social engineering attacks. The articles were written by the winners of the student paper competition at the 2023 International White Hat Conference.


Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi Aug 2023

Victimization By Deepfake In The Metaverse: Building A Practical Management Framework, Julia Stavola, Kyung-Shick Choi

International Journal of Cybersecurity Intelligence & Cybercrime

Deepfake is digitally altered media aimed to deceive online users for political favor, monetary gain, extortion, and more. Deepfakes are the prevalent issues of impersonation, privacy, and fake news that cause substantial damage to individuals, groups, and organizations. The metaverse is an emerging 3-dimensional virtual platform led by AI and blockchain technology where users freely interact with each other. The purpose of this study is to identify the use of illicit deep fakes which can potentially contribute to cybercrime victimization in the metaverse. The data will be derived from expert interviews (n=8) and online open sources to design a framework …


Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo Aug 2023

Harnessing Large Language Models To Simulate Realistic Human Responses To Social Engineering Attacks: A Case Study, Mohammad Asfour, Juan Carlos Murillo

International Journal of Cybersecurity Intelligence & Cybercrime

The research publication, “Generative Agents: Interactive Simulacra of Human Behavior,” by Stanford and Google in 2023 established that large language models (LLMs) such as GPT-4 can generate interactive agents with credible and emergent human-like behaviors. However, their application in simulating human responses in cybersecurity scenarios, particularly in social engineering attacks, remains unexplored. In addressing that gap, this study explores the potential of LLMs, specifically the Open AI GPT-4 model, to simulate a broad spectrum of human responses to social engineering attacks that exploit human social behaviors, framing our primary research question: How does the simulated behavior of human targets, based …


The Russia-Ukraine War: Geopolitical And Gendered Impact On The Greater Middle East, Muhamad S. Olimat Aug 2023

The Russia-Ukraine War: Geopolitical And Gendered Impact On The Greater Middle East, Muhamad S. Olimat

Journal of International Women's Studies

The Greater Middle Eastern Region is composed of the Levant, the Arab Gulf Region, North Africa, and Central Asia. It represents a geopolitical region and cultural civilization that is at the heart of global affairs. Its geostrategic location made it vulnerable throughout history to political, security, economic, and cultural developments. The region is heavily influenced by the current war in Ukraine, and the aim of this article is to explore its consequences in terms of political implications, security, economic and energy considerations, and socio-cultural impact, with a special attention to the gendered impacts of the war on the region.


Child Sexual Abuse And Exploitation Through Livestreaming In Indonesia: Unequal Power Relations At The Root Of Child Victimization, Ni Luh Tasya Prathisthita Tanaya, Ni Made Martini Puteri Apr 2023

Child Sexual Abuse And Exploitation Through Livestreaming In Indonesia: Unequal Power Relations At The Root Of Child Victimization, Ni Luh Tasya Prathisthita Tanaya, Ni Made Martini Puteri

Journal of International Women's Studies

Child sexual abuse and exploitation through livestreaming is a rising phenomenon of online child sexual abuse and exploitation in Indonesia. This phenomenon takes place in both offline and online spaces. Moreover, due to the active involvement of the viewers, these content viewers can also be considered as offenders. Thus, it is necessary to recognize this phenomenon as a crime against children, instead of merely a sexual act. By using a criminology perspective, this research explores the roots of this phenomenon, the impact on survivors, and the child protection system’s actions against it. This qualitative study used secondary data analysis, derived …


Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins Mar 2023

Prevalence And Trends Of Depression Among Cyberbullied Adolescents - Youth Risk Behavior Survey, United States, 2011 – 2019, Jason Nicholson, Catherine Marcum, George E. Higgins

International Journal of Cybersecurity Intelligence & Cybercrime

The difference in depression between non-cyberbullied and cyberbullied youth is not well understood. To describe the prevalence and trends in depression among cyberbullied adolescents. Using cross-sectional, nationally-representative data from the YRBS 2011 - 2019, we estimated the prevalence and trends of depression across the total years and within cyberbullied groups that include biological sex and race and ethnicity among adolescents. The results indicated the prevalence of depression was higher among those that were cyberbullied. Within the cyberbullied groups the total trend was higher than the non-cyberbullied, females had a higher prevalence of depression than males, and Hispanics had a higher …


Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler Mar 2023

Threat Construction And Framing Of Cyberterrorism In The U.S. News Media, Mehmet F. Bastug, Ismail Onat, Ahmet Guler

International Journal of Cybersecurity Intelligence & Cybercrime

This research aims to explore the influence of news media on the fear of cyberterrorism and how cyberterrorism is framed in the media. Using a mixed-method approach as a research strategy, this paper reports on two studies that explore the influence of news reading on the fear of cyberterrorism. The first study analyzed survey responses from 1,190 participants and found that increased exposure to reading news media was associated with increased fear of cyberterrorism. The second study, built on the first, sought to investigate how cyberterrorism is framed and constructed as a threat by the US local and national newspapers. …


New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens Mar 2023

New Knowledge, Better Decisions: Promoting Effective Policymaking Through Cybercrime Analysis, Austen D. Givens

International Journal of Cybersecurity Intelligence & Cybercrime

This editorial introduction will present an overview of the four articles contained in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime. The articles examine the profiling of hackers, the role of the media in shaping public perceptions of cyberterrorism, research trends in cybersecurity and cybercrime, as well as the impacts of cyberbullying.


Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke Mar 2023

Research Trends In Cybercrime And Cybersecurity: A Review Based On Web Of Science Core Collection Database, Ling Wu, Qiong Peng, Michael Lembke

International Journal of Cybersecurity Intelligence & Cybercrime

Studies on cybercrime and cybersecurity have expanded in both scope and breadth in recent years. This study offers a bibliometric review of research trends in cybercrime and cybersecurity over the past 26 years (1995-2021) based on Web of Science core collection database. Specifically, we examine the growth of scholarship and the expanded scope of subject categories and relevant journals. We also analyze the research collaboration network based on authors’ affiliated institutions and countries. Finally, we identify major topics within the fields, how each topic relates to – and diverges from – one another, and their evolution over time. Overall, we …


Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld Mar 2023

Understanding The Connection Between Hackers And Their Hacks: Analyzing Usdoj Reports For Hacker Profiles, Joshua Gerstenfeld

International Journal of Cybersecurity Intelligence & Cybercrime

Recently, it seems as if hacking-related stories can be found in the news every day. To study, and hopefully prevent, this new type of crime, the field of cyber criminology has emerged. This study adds to the existing cybercrime literature by examining hacking behavior specifically. It determines if there is a relationship between the age, gender, and nationality of hackers and characteristics of the cyberattacks that they perpetrate. To do this, this study analyzes 122 United States Department of Justice (USDOJ) press reports from January 2019 to December 2021. Some key results include the finding that older hackers and international …


Artificial Intelligence-Altered Videos (Deepfakes), Image-Based Sexual Abuse, And Data Privacy Concerns, Chidera Okolie Mar 2023

Artificial Intelligence-Altered Videos (Deepfakes), Image-Based Sexual Abuse, And Data Privacy Concerns, Chidera Okolie

Journal of International Women's Studies

Artificial Intelligence (AI) is a phenomenon that has become embedded in human life, and this symbiotic relationship between technology and humanity is here to stay. One such use of AI is deepfakes. The use of AI for deepfakes is arguably one of the most controversial topics because it raises ethical issues. Deepfakes are images or recordings that have been convincingly altered and manipulated to misrepresent someone as doing or saying something that they did not actually do or say. These manipulations thrive in the political arena and recently in the pornography industry, in which women’s faces are masked onto other …


Women In Cybersecurity: A Study Of The Digital Banking Sector In Bahrain, Adel Ismail Al-Alawi, Noora Ahmed Al-Khaja, Arpita Anshu Mehrotra Feb 2023

Women In Cybersecurity: A Study Of The Digital Banking Sector In Bahrain, Adel Ismail Al-Alawi, Noora Ahmed Al-Khaja, Arpita Anshu Mehrotra

Journal of International Women's Studies

Cybersecurity is of utmost importance due to the sophisticated cyber-attacks occurring, mainly in the banking sector. Cybersecurity is considered a vital industry to protect and secure both the consumer and the owner. This study aims to examine and investigate women in the field of cybersecurity in the digitized banking sector. This study covers several factors that affect women's contributions in this field, including challenges and limitations, women in Fintech and ecosystem, women involved in digital transformation, women in applying cybersecurity management strategy, social and economic impacts, and skills and qualifications in the field of cybersecurity for banking. Most of the …


Paradoxes Faced By Women Teachers In Practicing Professional Ethics In Undergraduate Colleges In Nepal, Mamta Sitaula Feb 2023

Paradoxes Faced By Women Teachers In Practicing Professional Ethics In Undergraduate Colleges In Nepal, Mamta Sitaula

Journal of International Women's Studies

Women instructors teaching in undergraduate colleges face much unethical behavior during the tenure of their professional lives. The feeling of clashing their professional ethical concerns with institutional misconduct is wisely explained as “experience of professional ethical considerations.” This study adopted a qualitative research design with a humanist research paradigm. I adopted auto/ethnography to study the phenomenon where I myself was a participant in order to relate the feelings of “self” with the other participants. Data saturation was maintained by interviewing five women teachers from different private colleges of Kathmandu Valley, Nepal. The findings were compared and contrasted with various ethical …


Bridgewater Magazine, Volume 33, Number 1, Spring 2023, Bridgewater State University Jan 2023

Bridgewater Magazine, Volume 33, Number 1, Spring 2023, Bridgewater State University

Bridgewater Magazine

A Greater Good: BSU Alumni, like Tamara Dzialo, ’02, founder of Project PACK Post-Assault Comfort Kits, make helping others the focus of their careers. Also in this issue: Biology students discover rare species, leading the way in cybersecurity, and increasing diversity and equity in undergraduate research.


The Spotlight Effect On Social Media, Lauren Crowley Jan 2023

The Spotlight Effect On Social Media, Lauren Crowley

Undergraduate Review

Social media is used by the vast majority of emerging adults. This age group is apt to experience anxiety related to their social media usage. One possible stressor for Instagram users is not knowing what exactly other people think about their posts. This uncertainty about if one’s online audience is judging them is similar to the spotlight effect – a phenomenon where individuals think more people notice them than they do. Our research set out to investigate if people believe that their posts on Instagram get more attention than the viewers give. To test this out, two groups of participants …


Jogo Tonggo And Pager Mangkok: Synergy Of Government And Public Participation In The Face Of Covid-19, Setyasih Harini, Caroline Paskarina, Junita Budi Rachman, Ida Widianingsih Dec 2022

Jogo Tonggo And Pager Mangkok: Synergy Of Government And Public Participation In The Face Of Covid-19, Setyasih Harini, Caroline Paskarina, Junita Budi Rachman, Ida Widianingsih

Journal of International Women's Studies

The purpose of this study is to describe the Regent's mitigation program of increasing Sragen community participation through the excavation of local wisdom and communal values. This is known as “social solidarity,” and this article locates social solidarity in pager mangkok, a mitigation program for facing the COVID-19 pandemic, and the jogo tonggo program, a product of the Central Java Provincial government. Approaches to women's political leadership, public policy, and implementation are all parts of the theory used to support the concept of social solidarity. Data was collected through observation methods, documentation, and library research. The results show that the …