These are the sources and citations used to research Research Methods. This bibliography was generated on Cite This For Me on

  • Journal

    Adewole, K. S., Anuar, N. B., Kamsin, A., Varathan, K. D. and Razak, S. A.

    Malicious accounts: Dark of the social networks

    2017 - Journal of Network and Computer Applications

    In-text: (Adewole et al. 41-42)

    Your Bibliography: Adewole, Kayode Sakariyah et al. "Malicious Accounts: Dark Of The Social Networks." Journal of Network and Computer Applications 79 (2017): 41-42. Web. 15 Oct. 2019.

  • Journal

    Ahmed, H., Traore, I. and Saad, S.

    Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques

    2017 - Lecture Notes in Computer Science

    In-text: (Ahmed, Traore and Saad 127-138)

    Your Bibliography: Ahmed, Hadeer, Issa Traore, and Sherif Saad. "Detection Of Online Fake News Using N-Gram Analysis And Machine Learning Techniques." Lecture Notes in Computer Science 10618 (2017): 127-138. Web. 11 Nov. 2019.

  • Journal

    Al-Janabi, M., Quincey, E. D. and Andras, P.

    Using supervised machine learning algorithms to detect suspicious URLs in online social networks

    2017 - Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 - ASONAM '17

    In-text: (Al-Janabi, Quincey and Andras 1)

    Your Bibliography: Al-Janabi, Mohammed, Ed de Quincey, and Peter Andras. "Using Supervised Machine Learning Algorithms To Detect Suspicious Urls In Online Social Networks." Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 - ASONAM '17 (2017): 1. Web. 17 Oct. 2019.

  • Book

    Andrews, R.

    Research Questions

    2003 - London - Continuum

    In-text: (Andrews)

    Your Bibliography: Andrews, Richard. Research Questions. 1st ed. Continuum: London, 2003. Print.

  • Journal

    Cluley, G.

    Sizing up the malware threat – key malware trends for 2010

    2010 - Network Security

    In-text: (Cluley 8-10)

    Your Bibliography: Cluley, Graham. "Sizing Up The Malware Threat – Key Malware Trends For 2010." Network Security 2010.4 (2010): 8-10. Web. 4 Nov. 2019.

  • Journal

    Constantine, C.

    Yahoo ads spread malware

    2014 - Network Security

    In-text: (Constantine 20)

    Your Bibliography: Constantine, Conrad. "Yahoo Ads Spread Malware." Network Security 2014.1 (2014): 20. Web. 14 Nov. 2019.

  • Website

    Data Protection Act 2018

    2018 - The Stationary Office

    In-text: ("Data Protection Act 2018")

    Your Bibliography: "Data Protection Act 2018." N.p., 2018. Web. 12 Nov. 2019.

  • Book

    Denscombe, M.

    The good research guide

    2011 - McGraw-Hill/Open University Press - Maidenhead, England

    In-text: (Denscombe)

    Your Bibliography: Denscombe, Martyn. The Good Research Guide. 4th ed. Maidenhead, England: McGraw-Hill/Open University Press, 2011. Print.

  • Report

    Ditch the Label

    The Annual Bullying Survey 2018

    2018 - Ditch the Label

    In-text: (Ditch the Label)

    Your Bibliography: Ditch the Label. The Annual Bullying Survey 2018. Ditch the Label, 2018. Web. 24 Oct. 2019.

  • Book

    Guest, G. and Namey, E. E.

    Public health research methods

    2015 - SAGE - London

    In-text: (Guest and Namey)

    Your Bibliography: Guest, Greg, and Emily E Namey. Public Health Research Methods. 1st ed. London: SAGE, 2015. Print.

  • Journal

    Hou, Y., Chang, Y., Chen, T., Laih, C. and Chen, C.

    Malicious web content detection by machine learning

    2010 - Expert Systems with Applications

    In-text: (Hou et al. 55-60)

    Your Bibliography: Hou, Yung-Tsung et al. "Malicious Web Content Detection By Machine Learning." Expert Systems with Applications 37.1 (2010): 55-60. Web. 11 Nov. 2019.

  • Report

    ID Experts


    2019 -

    In-text: (ID Experts)

    Your Bibliography: ID Experts. 2019 STUDY ON SOCIAL MEDIAPRIVACY AND SECURITY CONCERNS., 2019. Web. 9 Nov. 2019.

  • Report

    Institute for Public Relations

    Disinformation In Society Report

    2019 - Institute for Public Relations

    In-text: (Institute for Public Relations 21)

    Your Bibliography: Institute for Public Relations. Disinformation In Society Report. Institute for Public Relations, 2019. Web. 23 Oct. 2019.

  • Book

    Kumar, R.

    Research methodology

    2011 - SAGE - Los Angeles

    In-text: (Kumar)

    Your Bibliography: Kumar, Ranjit. Research Methodology. 3rd ed. Los Angeles: SAGE, 2011. Print.

  • Website

    Larkin, E.

    Are You Wasting Your Money Buying Antispyware Software?

    2019 - PCWorld

    In-text: (Larkin)

    Your Bibliography: Larkin, Erik. "Are You Wasting Your Money Buying Antispyware Software?." PCWorld. N.p., 2019. Web. 1 Dec. 2019.

  • Journal

    Lee, Y., Chang, C., Lin, Y. and Cheng, Z.

    The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress

    2014 - Computers in Human Behavior

    In-text: (Lee et al. 373-383)

    Your Bibliography: Lee, Yu-Kang et al. "The Dark Side Of Smartphone Usage: Psychological Traits, Compulsive Behavior And Technostress." Computers in Human Behavior 31 (2014): 373-383. Web. 17 Nov. 2019.

  • Journal

    Ma, J., Saul, L. K., Savage, S. and Voelker, G. M.

    Beyond blacklists

    2009 - Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '09

    In-text: (Ma et al.)

    Your Bibliography: Ma, Justin et al. "Beyond Blacklists." Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '09 (2009): n. pag. Web. 11 Nov. 2019.

  • Book

    McNeill., P.

    Research methods

    1990 - Routledge - London

    In-text: (McNeill.)

    Your Bibliography: McNeill., Patrick. Research Methods. 2nd ed. London: Routledge, 1990. Print.

  • Website

    Patchin, J.

    2016 Cyberbullying Data - Cyberbullying Research Center

    2016 - Cyberbullying Research Center

    In-text: (Patchin)

    Your Bibliography: Patchin, Justin. "2016 Cyberbullying Data - Cyberbullying Research Center." Cyberbullying Research Center. N.p., 2016. Web. 11 Nov. 2019.

  • Report

    Pew Research Center

    Online Harassment 2017

    2017 - Pew Research Center

    In-text: (Pew Research Center)

    Your Bibliography: Pew Research Center. Online Harassment 2017. Pew Research Center, 2017. Web. 28 Oct. 2019.

  • Book

    Robson, C. and McCartan, K.

    Real World Research

    2016 - John Wiley & Sons

    In-text: (Robson and McCartan)

    Your Bibliography: Robson, Colin, and Kieran McCartan. Real World Research. 4th ed. John Wiley & Sons, 2016. Print.

  • Journal

    Sabella, R. A., Patchin, J. W. and Hinduja, S.

    Cyberbullying myths and realities

    2013 - Computers in Human Behavior

    In-text: (Sabella, Patchin and Hinduja 2703-2711)

    Your Bibliography: Sabella, Russell A., Justin W. Patchin, and Sameer Hinduja. "Cyberbullying Myths And Realities." Computers in Human Behavior 29.6 (2013): 2703-2711. Web. 17 Nov. 2019.

  • Book

    Stopher, P. R.

    Collecting, managing, and assessing data using sample surveys

    2012 - Cambridge University Press - Cambridge

    In-text: (Stopher 91-103)

    Your Bibliography: Stopher, Peter R. Collecting, Managing, And Assessing Data Using Sample Surveys. 91st ed. Cambridge: Cambridge University Press, 2012. Print.

  • Journal

    Thakur, K., Hayajneh, T. and Tseng, J.

    Cyber Security in Social Media: Challenges and the Way Forward

    2019 - IT Professional

    In-text: (Thakur, Hayajneh and Tseng 41-49)

    Your Bibliography: Thakur, Kutub, Thaier Hayajneh, and Jason Tseng. "Cyber Security In Social Media: Challenges And The Way Forward." IT Professional 21.2 (2019): 41-49. Web. 14 Nov. 2019.

  • Journal

    Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A. and Venkatraman, S.

    Deep Learning Approach for Intelligent Intrusion Detection System

    2019 - IEEE Access

    In-text: (Vinayakumar et al. 41525-41550)

    Your Bibliography: Vinayakumar, R. et al. "Deep Learning Approach For Intelligent Intrusion Detection System." IEEE Access 7 (2019): 41525-41550. Web. 11 Nov. 2019.

  • Book

    Walsh, M.

    Research Made Real: A guide for students

    2001 - Nelson Thornes - UK

    In-text: (Walsh 63-66)

    Your Bibliography: Walsh, Mark. Research Made Real: A Guide For Students. UK: Nelson Thornes, 2001. Print.

  • Govt. publication

    Wright, J. and Javid, S.

    Online Harms White Paper

    2019 - HM Government

    In-text: (Wright and Javid)

    Your Bibliography: Wright, Jerremy, and Sajid Javid. Online Harms White Paper. HM Government, 2019. Print.

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies