Email Fraud And User Protection Strategies Essay Example

Introduction

The invention of the Internet has triggered numerous changes in human communication and interaction. Electric mail (email) has become an important method of communication by allowing the passage of information from one person to another. Communication through is becoming a necessity in the modern world, and moving into the future, almost every person will be required to have an email.

The sphere of email usage is broad, and while personal communication is shifting to other platforms such as social media (WhatsApp, Facebook, and Twitter, among others), email remains one of the central channels of official communication in different organizations and institutions. For example, students are required to have email addresses as part of login credentials when accessing college resources and information. Similarly, employees use email addresses every day to communicate back and forth with workmates, bosses, and other stakeholders. Inter- and intra-organizational communication entirely relies on email for communication.

Without emails as a channel of commutation, most organizational operations would be crippled. Managing companies and institutions would become a nightmare, especially in the modern era of globalization and remote working. Unfortunately, every revolutionary idea usually attracts specific drawbacks. Emails have become a soft target for fraudsters who capitalize on Internet security loopholes to manipulate the system and defraud unsuspecting users.

Therefore, it is important to understand the architecture of email phishing and the underlying risk factors that predispose individuals to con artists. This aspect will form the basis of knowing how to avoid email fraud and the future anticipated challenges that might emerge in the future. This proposal gives a short analysis of a research study aimed at understanding email fraud, current gaps, and the best strategies to protect computer users.

Topic Analysis and Importance

The selected topic for the final paper is that of email fraud. Personally, I am interested in it because I have been a victim of email phishing in the past. It was a painful experience after fraudsters pried on my gullibility to steal personal information and use it for blackmail. All my social media accounts are linked to my email, and thus by accessing my details, the scammers took control of all the platforms, and they started soliciting money from friends and family members on my behalf. The issue was ultimately resolved, but I had to pay some ransom fee to regain control of my email and social media accounts.

Before this incident, I could not understand how people fall for the fraudsters’ tricks, and thus I assumed I was infallible and my digital footprints were adequately protected. However, after I was scammed, I started looking into the issue of phishing only to realize that it involves some psychological aspects that victims of this cybercrime problem are not aware of from a general point of view. Therefore, I believe that people should be informed about the dynamics of email fraud to understand it from a technical and psychological perspective and come up with functional ways of avoiding such scams and protect their privacy.

In addition, emails are the fundamental communication channels in the business world, and any security breaches associated with the same could have serious ramifications. Email phishing could be used to infiltrate finance departments in companies and siphon millions of dollars, leading to huge losses and business stagnation. Additionally, in contemporary times when companies are increasingly storing customer data, breaches could lead to the loss of such sensitive information, which could result in costly legal cases and ruined reputation.

For instance, telehealth is revolutionizing the way patients receive care services, and thus providers have to store sensitive personal data, and its breach could have far-reaching consequences. Consequently, organizations should endeavor to understand the architecture of email phishing to come up with effective countermeasures and avoid unnecessary losses.

Another reason why people should care about email fraud is to understand the underlying psychological aspects that could be risk factors to defrauding. Email frauds are socially engineered attacks targeting people as opposed to systems. However, most people think that such incidences are geared towards compromising computer systems. Such an assumption is wrong, and it partly explains why people continue to fall for email phishing tricks because the human nature part of it is normally overlooked. Therefore, understanding the psychology of email fraud will prepare users to be in a position to avoid being scammed.

In summary, completing a detailed study on this topic will avail knowledge of Internet-based crime and its consequences on different users. The same information will be shared with readers to implement evidence-based protective measures. The proposed work is significant since it seeks to address an issue that many people and computer users continue to ignore. Email fraudsters are usually experienced and cunning, thereby making it impossible for users to suspect. Targeted clients are usually tricked into reading specific emails and sharing their personal data or enrolling in different programs (Nizamani, Memon, Glasdam, & Nguyen, 2014).

The outcome is that many people are conned, thereby losing personal resources, among other devastating occurrences. Therefore, people should care about email fraud since this malpractice has serious consequences. A detailed analysis is a worthy enterprise since it will present additional information to empower more Internet users to take charge of their privacy and security when using emails for communication.

Background Information

Most of the studies completed in the recent past have outlined various issues surrounding hacking and Internet-based fraud. The email has remained a major target for phishers since it gives people an opportunity to communicate and keep messages. The consulted articles and publications have presented meaningful information about this topic. For instance, Al-Mashhadi and Alabiech (2017) indicate that many scammers use phishing techniques and old-fashioned operations to attack clients.

A good example of such tricks is bait-and-switch (Nizamani et al., 2014). However, users have become aware of the widespread practice of email fraud, thus they are taking protective measures to avoid being scammed. Nevertheless, fraudsters are ever-changing their tricks to keep abreast with the evolving Internet security environment. Consequently, they are adopting sophisticated ways of perpetrating their criminal activities.

One such emerging strategy is known as pharming, which is a system designed to use cache to change the domain name system of a website and direct users to a malicious site before getting all log-in credentials (Nagunwa, 2014). In most cases, phishers target the email addresses of top-level employees in companies.

Another technique is known as ‘smishing,’ whereby scammers send malicious messages to users’ phones, and once the provided links are clicked, the entire system is compromised (Isacenkova, Thonnard, Costin, Francillon, and Balzarotti, 2014). In the business world, the commonly used form of phishing is ‘the CEO fraud’ whereby scammers take control of the email addresses of executive employees in an organization. Once they take over, fraudsters will send emails to workers directing them to execute certain duties, such as authorizing payments, which are then directed to third-party bank accounts.

The affected employees do not realize any mischief because the emails used are authentic. Scammers can also use the survey scam whereby malicious emails are sent to unsuspecting users, and once they open their emails, credentials are stolen, and the phishers can do anything with the email address. Phony WebPages are also shared to lure users into offering personal information or data. Therefore, users should engage in continuous learning to understand email fraud and the most appropriate preventative initiatives.

According to Hadnagy and Fincher (2015), email phishing is an ever-increasing and evolving scourge that leaves extensive damage to the affected individuals and organizations. The conventional way of dealing with email frauds, including the use of legislation, providing extensive user guides, creating public awareness, and other related technical aspects, has failed to counter this problem. However, this approach towards phishing overlooks the way humans respond to certain scenarios, which underscores the psychological side of this problem that phishers continue to exploit (Hadnagy & Fincher, 2015; Jones, Towse, & Race, 2015; Norris, Brookes, & Dowell, 2019).

In a bid to psychologically manipulate email users, fraudsters use several techniques, including “spear-phishing,” whereby emails seem to originate from a trusted or known sender, thus convincing the targeted individuals to reveal personal details (Norris et al., 2019).

Time-limited messages are also used as they create a form of urgency, and users feel compelled to open such emails to avoid missing the indicated timelines. The insidious urgency created in these emails acts as visceral triggers, thus reducing the cognitive alertness deployed when assessing the authenticity of the sender. Additionally, the use of smartphones reduces a person’s ability to detect phony emails due to habituation caused by constant engagement with small screens while on the move (Jones et al., 2015).

Other risk factors, according to Norris et al. (2015), including high motivation, which “triggers the size of the reward, trust by focusing on interaction rather than message content, often generated by using ‘official logos, social influence, including liking and reciprocation, and the scarcity or urgency of the opportunity” (p. 236). Unfortunately, most users do not understand these psychological cues when engaging in email communication, thus they become easy targets for phishing.

However, despite the aggressive nature of email fraud and the sophisticated methods that swindlers use to commit this form of cybercrime, several measures can be taken to prevent users from becoming victims of the same. Some researchers have outlined several practices to overcome the dangers of email fraud. The leading ones include ignoring unexpected links, identifying and rejecting unsolicited emails, filtering spam, installing antivirus software, and configuring firewalls (Filkins et al., 2016; Abdullah, George, & Mohammed, 2016). Those who ignore these suggestions are at risk of becoming victims. However, based on the knowledge gained from the psychology of email spoofing, individuals may open unverified emails without even knowing.

Therefore, the first step should involve taking deliberate actions and being keen when opening emails (Rader & Wash, 20150. The source of the email should be investigated, and if phony information is detected, the involved person should delete such mail immediately. In business, organizations should configure their systems in a way that uses high standards of authentication. Some of the available systems that could be used to prevent email spoofing in the corporate world include SPF, Sender ID, DKIM, and DMARC, among other similar programs (Gupta, Tewari, Jain, & Agrawal, 2017).

However, despite the level of sophistication used to prevent email fraud, it is important to note that such practices target people, not systems. Therefore, employees should be trained adequately on cyber-security practices to ensure that phishers do not gain access to emails through human errors.

The paper will be structured in a professional manner in order to be more convincing and informative. These sections will be included: Introduction, Problem Statement, Literature Review, Research Process, Findings, Discussions, Conclusions, and Recommendations. A qualitative study targeting different publications on email fraud will be completed. To gather the necessary information, online searches will be conducted using specified keywords to generate relevant results. Some of the keywords that will be used include email, fraud, phishing, anti-phishing, psychology, cyber-security, and privacy.

A mixed approach will be employed when conducting the search. For example, keywords will be entered as single words, such as “phishing” or in combination, such as “email fraud” “anti-phishing strategies). Reputable databases, including EBSCOhost, ProQuest, Google Scholar, and IEEE will be used. In the Background section, I will use existing knowledge on the subject matter, identifiable gaps, and opportunities for future improvement.

Definition of Terms

  • Email fraud: Intentional deception aimed at pursuing personal gains or damaging users.
  • Hacking: The process of breaching computer-based defenses for personal or criminal gains.
  • Phishing: Social engineering malpractice used to steal personal information, login credentials, or credit card digits.
  • Computer firewalls: Computer-based systems for protecting networks from unauthorized users.
  • Smishing: Practice whereby scammers send malicious messages to users’ phones to steal personal credentials.
  • Pharming – a system designed to use cache to change the domain name system of a website and direct users to malicious sites.

Sources used for this proposal were found online using different databases, such as ProQuest, EBSCOhost, and IEEE Computer Society Digital Library. Google Scholar also gave valuable information on this topic. The keywords used were email, fraud, phishing, scamming, malware, and spyware. The Boolean search was the main strategy used to find relevant articles whereby a combination of keywords (separating with phrases like “and” and “our”) is entered on the search engine. The articles presented below are relevant and promising since they discuss useful information on email fraud and how it could be prevented.

References

Abdullah, A. A., George, L., & Mohammed, I. J. (2016). Email phishing detection. Riga, Latvia: Lap-Lambert Academic Publishing.

Al-Mashhadi, H. M., & Alabiech, M. H. (2017). A survey of email service; Attacks, security methods and protocols. International Journal of Computer Applications, 162(11), 31-40.

Filkins, B. L., Kim, J. Y., Roberts, B., Armstrong, W., Miller, M. A., Hultner, M. L., … Steinhubl, S. R. (2016). Privacy and security in the era of digital health: What should translational researchers know and do about it? American Journal of Translational Research, 8(3), 1560-1580.

Green, J. S. (2015). Cyber security: An introduction for non-technical managers. New York, NY: Gower Publishing Limited.

Gupta, B. B., Tewari, A., Jain, K. A., & Agrawal, D. P. (2017). Fighting against phishing attacks: State of the art and future challenges. Neural Computing and Applications, 28(12), 3629-3654.

Hadnagy, C., & Fincher, M. (2015). Phishing dark waters: The offensive and defensive sides of malicious e‐mails. New York, NY: Wiley.

Isacenkova, J., Thonnard, O., Costin, A., Francillon, A., & Balzarotti, D. (2014). Inside the scam jungle: A closer look at 419 scam email operations. EURASIP Journal on Information Security, 2014(1), 1-18.

Jones, H. S., Towse, J. N., & Race, N. (2015). Susceptibility to email fraud: A review of psychological perspectives, data collection methods, and ethical considerations. International Journal of Cyber Behavior, Psychology, and Learning, 5(3), 13-29.

Nagunwa, T. (2014). Behind Identity theft and fraud in cyberspace: The current landscape of phishing. International Journal of Cyber-Security and Digital Forensics, 3(1), 72-83.

Nizamani, S., Memon, N., Glasdam, M., & Nguyen, D. D. (2014). Detection of fraudulent emails by employing advanced feature abundance. Egyptian Informatics Journal, 15(3), 169-174.

Norris, G., Brookes, A., & Dowell, D. (2019). The Psychology of Internet fraud victimization: A systematic review. Journal of Police and Criminal Psychology, 34(3), 231-245.

Rader, E., & Wash, R. (2015). Identifying patterns in informal sources of security information. Journal of Cybersecurity, 1(1), 121-144.

Annotated Bibliography

Abdullah, A. A., George, L., & Mohammed, I. J. (2016). Email phishing detection. Riga, Latvia: Lap-Lambert Academic Publishing.

Abdullah et al. (2016) discuss several ways that fraudulent emails could be detected. With the increasing cases of phishing, the authors of this easily readable book argue that users should be prepared for the different ways of spotting fraud. The book is important to the final paper as it gives a practical guide on how to detect and avoid phishing.

Al-Mashhadi, H. M., & Alabiech, M. H. (2017). A survey of email service; Attacks, security methods and protocols. International Journal of Computer Applications, 162(11), 31-40.

This article begins by identifying email security as a major source of concern among Internet users. As a tool for sharing information, emails have become potential targets for hackers and phishers. The article supports the model of keeping the exchange of information and data very low and confident (Al-Mashhadi & Alabiech, 2017). Sender authentication is an evidence-based practice for minimizing fraud. The adoption of this information will support the development of a reliable and informative report.

Filkins, B. L., Kim, J. Y., Roberts, B., Armstrong, W., Miller, M. A., Hultner, M. L., … Steinhubl, S. R. (2016). Privacy and security in the era of digital health: What should translational researchers know and do about it? American Journal of Translational Research, 8(3), 1560-1580.

In this article, the authors discuss how the emergence of digital technologies has presented both opportunities and challenges. Cybercriminals capitalize on security lapses to attack emails in an attempt to acquire confidential information and financial data (Filkins et al., 2016). All stakeholders should consider the importance of proactive strategies that will enhance data privacy. The details of this paper will be incorporated in the final paper to increase knowledge on email fraud.

Green, J. S. (2015). Cyber security: An introduction for non-technical managers. New York, NY: Gower Publishing Limited.

This book begins by describing the Internet as a powerful tool for many individuals and business organizations. The author supports the introduction of updated antivirus software and firewalls to protect data (Green, 2015). The presented information is essential since it offers evidence-based practices and procedures that computer users can implement to protect themselves against any form of fraud.

Gupta, B. B., Tewari, A., Jain, K. A., & Agrawal, D. P. (2017). Fighting against phishing attacks: State of the art and future challenges. Neural Computing and Applications, 28(12), 3629-3654.

The authors of this article give a detailed account of phishing, its history, and what motivates its perpetrators. They also provide the taxonomy of different types of these attacks and highlight various ways that individuals could use to avoid becoming victims and future challenges that could affect Internet users (Gupta et al., 2017). This article is relevant to the current research as it gives an overview of all aspects involved in email fraud.

Hadnagy, C., & Fincher, M. (2015). Phishing dark waters: The offensive and defensive sides of malicious e‐mails. New York, NY: Wiley.

This book addresses the ever-growing cases of phishing emails and offers a detailed list of defensive techniques that users can apply to avoid this scourge. Hadnagy and Fincher (2015) address the issue of phishing from the perspective of human decision-making. The information in this book will add to the final paper by highlighting ways to avoid email fraud.

Isacenkova, J., Thonnard, O., Costin, A., Francillon, A., & Balzarotti, D. (2014). Inside the scam jungle: A closer look at 419 scam email operations. EURASIP Journal on Information Security, 2014(1), 1-18.

This article investigates the infamous Nigerian scam, also known as “419 scam”, to understand how email fraud is organized to lure victims to pay money to strangers. Isacenkova et al. (2014) argue that email fraudsters are organized and smart individuals, and thus this article is important in understanding the mindsets of email scammers.

Jones, H. S., Towse, J. N., & Race, N. (2015). Susceptibility to email fraud: A review of psychological perspectives, data collection methods, and ethical considerations. International Journal of Cyber Behavior, Psychology, and Learning, 5(3), 13-29.

Jones et al. (2015) take a psychological approach toward understanding email fraud. They argue that phishing involves psychological maneuvers to convince targeted individuals to divulge information. The article is relevant to the study because it adds a different thread in understanding the problem of phishing.

Nagunwa, T. (2014). Behind Identity theft and fraud in cyberspace: The current landscape of phishing. International Journal of Cyber-Security and Digital Forensics, 3(1), 72-83.

Nagunwa (2014) investigates the evolving environment of cybercrime to highlight how fraudsters keep abreast with changing technology to remain relevant and perpetuate their criminal activities. Specifically, the article focuses on polymorphic phishing vectors that are commonly used in cybercrime. This article is important to the current study because it helps to understand the complex world of email fraud and perhaps why the practice is deeply entrenched even with concerted efforts to thwart it.

Nizamani, S., Memon, N., Glasdam, M., & Nguyen, D. D. (2014). Detection of fraudulent emails by employing advanced feature abundance. Egyptian Informatics Journal, 15(3), 169-174.

This article offers different features and strategies for detecting fraudulent emails. The article employs the use of advanced algorithms in an attempt to have a better feature set (Nizamani et al., 2014). The information presented in this article will be used to develop the most appropriate strategies for detecting fraudulent emails and empowering more people to achieve their objectives.

Norris, G., Brookes, A., & Dowell, D. (2019). The Psychology of Internet fraud victimization: A systematic review. Journal of Police and Criminal Psychology, 34(3), 231-245.

The authors of this article investigate some of the psychological risk factors that predispose certain populations or individuals to email phishing. Norris et al. (2019) used a systematic literature review to highlight how different human factors contribute to email fraud. The article will be used to understand email fraud from a psychological standpoint.

Rader, E., & Wash, R. (2015). Identifying patterns in informal sources of security information. Journal of Cybersecurity, 1(1), 121-144.

Rader and Wash (2015) encourage users to read numerous articles on the same issue and analyze their friends’ experiences. This kind of practice will make it possible for them to understand how email attacks take place, the major areas many hackers target, and the subsequent consequences. This knowledge will guide the final report and empower more people to improve their risk mitigation strategies.

Women And Gender Roles In “Antigone” By Sophocles

The discussion of gender issues and female social roles in the literature has been associated primarily with the works of 19th-century feminist writers. However, there are examples of much older literary pieces that explored the same themes, and one of them is Antigone, written by an ancient Greek tragedian, Sophocles. The play tells a story of a woman, Antigone, who disobeys the order of the ruler of Thebes, Kreon, who decided to leave the body of her brother unburied on the battlefield.

By doing so, the female protagonist showed that acting in accordance with own moral values and love for family is more important for her than obedience with authority. Such behavior was unconventional in ancient Athenian society in which women had limited rights and were submissive to and highly dependent on males that played superior roles in both the household and society. The defiance with social norms endows Sophocles’ character with feminist features. It is possible to say that the courage of Antigone in her struggle to assert her beliefs resembles the bravery with which modern women strive to protect their interests and promote gender equality.

Before explaining how the theme of gender in Sophocles’ play is linked to the situation in modern society and before analyzing specific examples from the text, it is appropriate to discuss the role of females in ancient Athens. According to Rayor, women in Athenian society were “lifelong legal minors” without any political and financial rights (xx). Male relatives served as their guardians and usually made all legal and financial decisions for them (Rayor xxi).

It means that since Antigone’s closest male relatives were dead and since she did not have a husband, Kreon became her guardian. Thus, she was expected to comply with his orders not merely because he was a king but also because he had a superior position in the family and society as any other man.

The idea about the inferior position of a woman in Athenian society can be traced in the way Kreon talks about women, in general, and Antigone, in particular. For instance, he says to Haemon that “one must defend order, and in no way be less than a woman.

Better felled by a man, if need be, than called weaker than women” (Sophocle 33). The statement shows that it is considered disgraceful for a man to be called weaker than a woman, and it implies that males by their very nature are stronger than females, both physically and mentally. It suggests that females are viewed as qualitatively worse than males and, therefore, are less important. In fact, Kreon says that it is better for a man to die than be compared to a woman. This part of the statement points to an extremely negative perception of female qualities and roles by Athenian men.

It is also possible to find textual examples demonstrating that the Athenian society was strictly hierarchical and women had less power in it. For instance, in the dialogue with Antigone, Kreon says: “While I live, no woman shall rule me” (Sophocles 25). This statement is in line with an old-fashioned patriarchal perspective on gender, which suggests that the social roles of men and women are determined by their inherent biological and psychological characteristics. It implies that women, by their very nature, are unfit for leading people and especially men who are viewed as more rational and intellectually capable of taking leadership positions and making the right political decisions.

It is worth noting that Kreon reacts to Antigone’s disobedience with his order to leave her brother unburied with an intention to kill her, which is the most severe form of punishment that one can implement. The king of Thebes says:

I caught her in open defiance,

she alone of all the citizens.

I won’t make myself a liar before the city.

I will kill her … If I nurture disorder

in my own family, how much more so in others? (Sophocles 32)

While Kreon’s reaction to Antigone’s deed can be explained through the lens of individual noncompliance with political authority, it is interrelated with the issue of gender inequality to a substantial extent. In the traditional patriarchal society, such as the one where the plot of Sophocles’ play is set, women are expected to be submissive and compliant with the will of not only their guardians but all males in general. Besides, women are expected to demonstrate the utmost respect to men even when the actions and decisions of the latter contradict their interests. Therefore, Antigone’s open disobedience is unacceptable for Kreon and others in the privileged social position.

Not only her act goes against the established social rules, but it also undermines the king’s image as powerful and strong. By applying this observation to a broader context, it can be concluded that females’ disobedience threatens males’ interests that they are usually able to protect by maintaining order and encouraging compliance.

Clearly, modern US women live in a totally different situation than Antigone in ancient Athens. They enjoy equal political and financial rights as men, can obtain a high-quality education, and engage in a great variety of professions and activities. Moreover, people do not consider it outrageous when a woman says something that contradicts a man’s decisions, words, and wishes. Overall, the presence of old-fashioned patriarchal social values is not so apparent in the present-day society as it was in the Athenian one, yet it is valid to say that they still affect the contemporary view on women.

In the United States, the effects of a stereotypical perception of females as less capable of doing socially and politically meaningful work can be observed in the phenomenon of the gender-based leadership gap. According to 2018 statistics, there is a disparity in the representation of males and females in leadership positions across different professional fields. For instance, only 16% of women perform the responsibilities of medical school deans, 30% of college presidents, and 12.5% of chief financial officers (Warner et al.).

Besides, women are significantly underrepresented in the sphere of political leadership, with merely 24% of them being members of Congress and 18% – governors across different states (Warner et al.). One of the possible reasons for the existence of this leadership gap is a biased perspective on females’ capabilities and a wrongful belief that, due to their innate qualities, women are less suitable for leading organizations and people.

The gender pay gap also verifies that men’s work is often regarded as more important than the work completed by women. According to Graf et al., although the gender pay gap has decreased significantly within a period of a few decades, it still persists. Statistics show that in 2017, women received merely 80% of what men in the same professional contexts and positions earned (Graf et al.). To a substantial degree, the lack of payment parity is due to gender-based discrimination at work (Graf et al.). It means that the social and legal system in the United States does not discriminate against females openly anymore. Nevertheless, similarly to Kreon, many contemporary males hold beliefs about their inherent superiority, do not regard women as equals, and cannot accept the idea that the latter can perform well and sometimes even better than men.

Regardless of biased attitudes and prejudice, more and more modern women both in the United States and abroad take the stance of proactive disobedience. However, just like Antigone, they do it not in a violent way but by living in accordance with their interests, values, and beliefs. A greater number of present-day women follow their passions and become courageous enough to make unconventional choices in life that would be inconceivable just a century ago.

They become scientists, researchers, explorers and pursue other careers that traditionally were dominated by males. Unfortunately, in Sophocles’ play, the protagonists could not withstand the social pressure since she was to go against the authority and the established tradition all by herself. Nevertheless, modern women have greater opportunities for success as more people of different genders become aware of gender-based disparities. It is valid to say that such literary pieces as Antigone contribute to the promotion of gender equality in the modern world. They allow readers to learn about the detrimental nature of gender pride and understand how gender inequality may adversely impact individuals’ lives, as well as society.

Works Cited

Graf, Nikki, et al. “The Narrowing, but Persistent, Gender Gap in Pay.” Pew Research Center. 2019. Web.

Rayor, Diane J. “Introduction.” Sophocles’ Antigone: A New Translation, edited by Diane J. Rayor, Cambridge University Press, 2011, pp. xi-xxiv.

Sophocles. “Antigone.” Sophocles’ Antigone: A New Translation, edited by Diane J. Rayor, Cambridge University Press, 2011, pp. 1-64.

Warner, Judith, et al. “The Women’s Leadership Gap.Center for American Progress. 2018.

Divorce Effects On Children’s Behavior

Introduction

A divorce is always an unpleasant event, even if two adults have no complaints against each other and want to stay in a friendly relationship. However, for children, the experience of parents’ separation is especially painful as it leads to the destruction of connections within the family, traditions, and habits of the child. Children perceive information about divorce with difficulties because, for them, parents are an inseparable whole, and their love is unconditional.

Such an event often changes the behavior of kids, their performance in school and can also affect the formation of their personality and interpersonal relationships in the future. Therefore, adults need to study and understand the impact of divorce to help children cope with stress, regulate their behavior, and avoid potential negative consequences.

Study Questions

The topic of divorce’s influence on children is quite well studied in the scientific world since there are many aspects that the separation of parents affects. In addition, children of different age groups react differently to this event due to their physical and emotional maturity. For example, Weldon studies the timing of parental divorce and its influence on a person’s romantic relationships in the future (3). Scientist finds that children at the infancy, early childhood, late childhood, and adolescence stage are more vulnerable than during the period of middle childhood and young adulthood (Weldon 2).

Another issue that many scholars study is the effect of the parents’ separation on the behavior of children in school. However, in this case, studies show that changes in academic performance can be mixed. Cox and Desforges note that an increase in academic success is a common manifestation of stress in children, especially in the first years after divorce (6). Nevertheless, another study proves that children’s performance does not change in any way if the separation of parents was predictable and obvious to them (Brand et al. 7269). Consequently, this topic needs to be clarified and examined further.

However, the main issue addressed by all researchers is a study of the mental health of children who have survived divorced parents since all the previously discussed problems are the result of changes in their behavior. For example, Auersperg studied the long-term effects of parental divorce on children’s mental health and the potential for serious problems such as depression, suicide attempts, distress, alcohol, drugs, and smoking (112).

All of these problems can be the negative results of the uncontrolled influence of this event on the child. However, Weaver and Schofield argue that the impact of divorce can be either significant or almost imperceptible to children, depending on the general condition and situation at home (47). These conditions can be a level of financial income, the depressed or typical behavior of the parent with whom they live, and other significant changes in the usual lifestyle of the kids. Thus, the topic of the negative impact of divorce on children is well explored, but there is a need to summarize and generalize disparate information.

Nevertheless, as can be noted from the above examples, the positive influence of divorce on children is practically unstudied since researchers mainly pay attention to the negative impact or its absence. For this reason, it is necessary to determine whether there are positive consequences of divorce for kids and the possibility of their use to neutralize the negative impact. Thus, this study covers the broadest range of possible effects of divorce on children, which allows parents, sociologists, and psychologists to help them cope with the difficulties of this process without adverse outcomes.

Methods and Tools of Research

This study is aimed at practical research of parental divorce’s effects on children, so it requires an extensive coverage of the information. This topic has many variables on which the accuracy of the results may depend; however, within the framework of one study, it is impossible to pay attention to all the details related to child psychology. The sample also should be full enough and include children who have experienced parental divorce at all stages of childhood, from infancy to adolescence.

First of all, necessary data has to contain the changes that parents noticed in the behavior of their children in the first months, in a year, and a few years after the divorce. Information about the gender and age of the children, the general situation of the divorce process, and the current relationship between parents are also needed. This data makes it possible to compare and understand the differences in the reactions of children.

Kind of Research

It is necessary to use a retrospective research method to understand the causes of behavioral changes and mistakes in the action of parents. Comparison is also an essential part of the analysis since a different background makes it possible to note the peculiarities of parental behavior that affect the emotional state of children. Questions about the reasons for the divorce are not appropriate as this topic may be too personal and painful for some people. However, it is possible to note the mood of the situation in general because the whole process could take place by mutual agreement or vice versa with quarrels and disputes. Besides, it is vital to clarify at least the general state of relations between parents after a divorce, but without delving into details to avoid personal aspects of life.

Methods of Data Collection and Analysis

The most appropriate data collection method, in this case, would be a survey that covers different aspects of a child’s behavior. Questions will be divided into several categories, such as general demographic data, positive and negative changes in the child’s behavior at home, discipline and grades at school, and relationships with other children. Questions also will be repeated for three different periods, such as the first months after the divorce, one year, and five years later. This approach will help to collect data covering the main categories of children’s behavior that are affected by divorce accurately and quickly, as well as the background on which the development of children takes place. Timing issues will help determine the progress and long-term effect of a divorce.

The data will need to be systematized into such groups as the positive and negative impact on children’s relationship with parents, school performance, and interaction with other people. Besides, the same information should be divided into two groups depending on the normal and stressful conditions in which the divorce took place and current communication happens between parents. This division is necessary because these conditions are also crucial for understanding changes in children’s behavior. Systematized data will make it possible to detect both the positive and negative impact of divorce on children and its dependence on the situation within the family and relations between parents.

Practical Application of Results

The results of this study will primarily be useful to parents who have survived a divorce and want to mitigate this process for their children. Adults will be able to predict and understand changes in their kids’ behavior and provide moral support and help for them. The findings can also be useful for child and family psychologists, who can develop methods for solving problems such as conflicts between children and parents, prevention and treatment of depression, development of social skills, and assistance in improving school performance. Social workers can also find this study helpful for assisting families that experience difficulties after divorcing.

Teachers and principals can also use this study to work with children who demonstrate behavior that is atypical for them because of parental divorce since they can notice the first signs of depression and distress that parents miss. Scientists also can conduct more detailed research on the positive effects of divorces on children based on this work or delve into the studied questions by considering the interdependence of separation effects and age stages.

Conclusion

Therefore, this study is aimed at identifying the positive and negative influence of parental divorce on children and the formation of their personalities. The most convenient method of collecting data for this research is to conduct a survey of parents about changes in the behavior of their children as received data can be systematized and analyzed quickly. Parents, teachers, and psychologists can use the results of the work to provide mental support and help children who experience difficulties because of their parents’ divorce to avoid its negative consequences.

References

Auersperg, Felicitas, et al. “Long-Term Effects of Parental Divorce on Mental Health – A Meta-Analysis.” Journal of Psychiatric Research, vol. 119, 2019, pp. 107-115.

Brand, Jennie E., et al. “Parental Divorce Is Not Uniformly Disruptive to Children’s Educational Attainment.” Proceedings of the National Academy of Sciences, vol. 116, no. 15, 2019, pp. 7266-7271.

Cox, Kathleen M., and Martin Desforges. Divorce and the School. Vol. 15, Routledge, 2017.

Weaver, Jennifer M., and Thomas J. Schofield. “Mediation and Moderation of Divorce Effects on Children’s Behavior Problems.” Journal of Family Psychology, vol. 29, no. 1, 2015, pp. 39-48.

Weldon, Adrian, “Effects of Timing of Parental Divorce on Children’s Romantic Relationships in Adulthood: A Review.” Lewis Honors College Capstone Collection, 2016. Web.

error: Content is protected !!