Academic literature on the topic 'Cyberpsychology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cyberpsychology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cyberpsychology"

1

Kirwan, Gráinne. "Cyberpsychology." Irish Journal of Psychology 31, no. 1-2 (January 2010): 69–84. http://dx.doi.org/10.1080/03033910.2010.10446324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Suler, John. "Psychoanalytic Cyberpsychology." International Journal of Applied Psychoanalytic Studies 14, no. 1 (March 18, 2016): 97–102. http://dx.doi.org/10.1002/aps.1487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wiederhold, Mark D. "Progress in CyberPsychology." CyberPsychology & Behavior 1, no. 2 (January 1998): 93. http://dx.doi.org/10.1089/cpb.1998.1.93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Orben, Amy. "Cyberpsychology: A field lacking theoretical foundations." PsyPag Quarterly 1, no. 107 (June 2018): 12–14. http://dx.doi.org/10.53841/bpspag.2018.1.107.12.

Full text
Abstract:
In an academic environment predominantly focused on empirical results, theory is a vital – but ojien overlooked – component of successful research. The novel psychological research field of cyberpsychology is missing the theoretical foundations normally available to traditional research areas. To ensure that cyberpsychology becomes a successful and fully functioning research field this needs to be resolved. Cyberpsychology researchers require common theoretical frameworks to answer profound and pressing research questions. To build this framework, they will need to either create new theories or reappropriate traditional theories previously proposed to explain offline behaviour.
APA, Harvard, Vancouver, ISO, and other styles
5

Kaye, Linda K. "An Introduction to Cyberpsychology." Cyberpsychology, Behavior, and Social Networking 19, no. 4 (April 2016): 294. http://dx.doi.org/10.1089/cyber.2016.29033.lkk.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Taylor, Jacqui, John McAlaney, Sarah Muir, and Terri Cole. "Teaching sensitive issues in cyberpsychology." Psychology Teaching Review 23, no. 1 (2017): 56–62. http://dx.doi.org/10.53841/bpsptr.2017.23.1.56.

Full text
Abstract:
In contrast to the helpful sources of guidance and regulations for researchers designing and conducting experiments in cyberpsychology, there is very little guidance available for academics and teachers teaching sensitive issues related to behavior in the online world. There are many potential dangers for psychology students when learning about cyberpsychology, ranging from being exposed to upsetting or illegal behaviour viewed in videos or images, to questioning their own sense of morality and understanding of self, to experiencing harassment or hacking. This paper will highlight our own experiences of teaching cyberpsychology to first and third year psychology students, highlighting some of the potential dangers. We suggest recommendations for academics to ensure that students are protected as faras is possible.
APA, Harvard, Vancouver, ISO, and other styles
7

Tolstykh, N. N. "Foreword by the Editor." Social Psychology and Society 11, no. 1 (2020): 5–7. http://dx.doi.org/10.17759/sps.2020110101.

Full text
Abstract:
We continue our discussion of cyberpsychology, which we started in our previous issue, the fourth issue of 2019. We received so many articles on cyberpsychology that even with our rigorous selection process, we could not fit all the articles into one issue. Hence we made a decision to devote another issue to this topic.
APA, Harvard, Vancouver, ISO, and other styles
8

Ogonowska, Agnieszka. "Cyberpsychologia. Nowe perspektywy badania mediów i ich użytkowników." Annales Universitatis Paedagogicae Cracoviensis. Studia de Cultura 4, no. 10 (2018): 5–18. http://dx.doi.org/10.24917/20837275.10.4.1.

Full text
Abstract:
Cyberpsychology. New perspectives in researching media and their users Abstract The aim of the article is a synthetic presentation of the origins and directions of development of cyberpsychology and its relationships with other disciplines of science, as well as the indication of the possibility of using cyberpsychological research in media studies and analyzes dedicated to new media and their users.
APA, Harvard, Vancouver, ISO, and other styles
9

Guitton, Matthieu J. "Cyberpsychology research and COVID-19." Computers in Human Behavior 111 (October 2020): 106357. http://dx.doi.org/10.1016/j.chb.2020.106357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lu, Junshi, and Yujia Peng. "Brain-Computer Interface for Cyberpsychology." International Journal of Cyber Behavior, Psychology and Learning 4, no. 1 (January 2014): 1–14. http://dx.doi.org/10.4018/ijcbpl.2014010101.

Full text
Abstract:
As a new way of implementing human-computer interface, brain-computer interfaces (BCI) dramatically change the user experiences and have broad applications in cyber behavior research. This methodological review attempts to provide an overall picture of the BCI science and its role in cyberpsychology. After an introduction of BCI and the literature search methods used in this review, we offer an overview of terms, history, components, methods and signals used in BCI. Different applications of BCI on both the clinical population and the healthy population are summarized in detail, with a conclusion of the future directions of BCI.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Cyberpsychology"

1

Turner, Carolynn Ann. "Cyberpsychology and schools : a feasibility study using virtual reality with school children." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/45373.

Full text
Abstract:
This study evaluates the feasibility and treatment acceptability of Virtual Reality (VR) technology applied universally in a school setting. A total of 105 children, mean age of 14.45, in five classrooms completed a paper and pencil measure of trait anxiety during Session 1. In Session 2, participants were randomly selected to participate in either a neutral environment or an anxiety-provoking environment and completed a measure of state anxiety immediately prior to and following their first VR exposure. Following the exposure participants also completed a Likert-Scaled questionnaire regarding treatment acceptability. In Session 3, participants completed Session 2 procedure in the alternate environment. There was a main effect of condition and time on state anxiety scores, controlling for trait anxiety. Participants in the anxiety provoking condition had lower mean state anxiety scores than being in the neutral condition; participants had lower state anxiety levels following the anxiety condition than they did following the neutral condition. All participants’ mean state anxiety levels were lower post exposure than pre exposure. There was also a borderline significant main effect of condition on treatment acceptability levels, controlling for trait anxiety. Participants in the neutral condition had a higher level of acceptability than when in the anxiety provoking condition. Results reveal that the implementation of VR technology exposure warrants further research.
APA, Harvard, Vancouver, ISO, and other styles
2

Skelly, Niamh. "An exploration of the relationship between health anxiety and health-related Internet use." Thesis, University of Manchester, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.694323.

Full text
Abstract:
High health anxiety has negative repercussions at the individual, interpersonal, and societal levels. According to cognitive behavioural theory, health anxiety is maintained, in part, by behavioural factors, termed safety behaviours. Health-related Internet use (HRIU) may be an important safety behaviour for some health anxious individuals. The Internet offers an abundance of health information, and opportunities to engage in health-related behaviours. Paper 1 aims to establish what is known about the relationship between health anxiety and HRIU. A systematic search was undertaken to identify studies that fell into five broad categories. The identified studies (N = 30) were then narratively reviewed, with an emphasis on methodological quality, and consideration also given to clinical implications and directions for future research. The review indicated that research to date has focused almost entirely on the relationship between health anxiety and using the Internet to obtain health information, termed online health research (OHR). Health anxiety appears associated with amount of, and emotional response to, OHR. The majority of existing studies are cross-sectional. Many use unvalidated measures of HRIU, and/or convenience samples recruited from universities or via commercial services. The Cyberchondria Severity Scale has potential clinical utility as a measure of a specific health anxiety maintenance cycle. However, there is a need for a more general instrument that can be used to assess various dimensions of HRIU in a validated manner. Paper 2 is a cross-sectional, correlational study of relationships between HRIU, health anxiety, and health service utilisation in a clinical, help-seeking sample. Participants were recruited from primary care practices, and completed questionnaire measures. Extent and nature of HRIU, and emotional and behavioural responses to HRIU, were measured using the Online Health Beliefs and Behaviour Inventory (OHBBI). The OHBBI is a recently developed measure that has undergone preliminary psychometric validation. OHBBI subscales explained 30% of variance in health anxiety, but did not improve prediction of self-reported service utilisation. A moderated regression indicated that the relationship between the Illness-Focused Searching subscale and health service utilisation varied as a function of health anxiety, with a negative relationship at low levels of health anxiety, and a positive relationship at high levels. This study provides further evidence of a role for HRIU in the maintenance of health anxiety, and advances the literature by using a validated measure of HRIU, a clinical sample, and well-controlled models. Paper 3 is a critical, reflective appraisal of the thesis as a whole. Methodological decisions, and their ramifications, are discussed in detail. The importance of the thesis is summarised, and implications for clinical practice and future research are revisited. The OHBBI requires further psychometric refinement. Longitudinal studies, and studies that use objective measures of service utilisation, are needed. Safety behaviours, including various forms of HRIU, may interact with each other to perpetuate health anxiety; such complex maintenance cycles merit empirical investigation.
APA, Harvard, Vancouver, ISO, and other styles
3

Aiken, Mary. "Forensic cyberpsychology : a content analysis approach to investigating and comprehending the self-production of indecent images by minors." Thesis, Middlesex University, 2015. http://eprints.mdx.ac.uk/18563/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Howard, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.

Full text
Abstract:
As organizations have become more reliant on computers and technology to operate in a globalized world, they have also become more vulnerable to cyberattacks on their networks. The expense to organizations from cyberattacks now exceeds $400 billion USD annually. These costs highlight the need for behavioral research in the cyber domain. The first phase of this research developed an instrument to measure workers’ cybersecurity attitudes. An iterative process resulted in a scale with good psychometric properties - The Cybersecurity Attitudes Scale. The scale measures two factors: cyber policy adherence attitudes and perceived vulnerability to a cyberattack. The second phase of this research used the theory of planned behavior as a theoretical framework to model the relationship between personality facets, policy adherence attitudes, perceived vulnerability, locus of control, cybersecurity climate, and cybersecurity behaviors. While the hypothesized model had poor fit for the data, there was a strong relationship between cybersecurity attitudes (i.e. policy adherence attitudes and perceived vulnerability) and dutifulness, altruism, compliance, cybersecurity climate, and cybersecurity behavior. This research provides practical value to academic researchers and organizations by providing a scale to measure cybersecurity attitudes and to help organizations better understand the nature of the antecedents that lead to cybersecurity attitudes and behavior.
APA, Harvard, Vancouver, ISO, and other styles
5

Martin, Jaclyn. "Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6728.

Full text
Abstract:
Cyber-security is an ever-increasing problem in the 21st century. Though the majority of cyber-security breaches are a direct result of human error (Hu, Dinev, Hart, & Cooke, 2012), there is a dearth of research in psychology on the application of human decision-making for cyber-security compliance. Through an online inbox simulation, the present research examined the utility of a robust psychological model for decision-making, signal detection theory (SDT) for modeling decision-making in the context of receiving and responding to phishing and spear-phishing email scams. The influence of individual differences, specifically conscientiousness, on phishing email detection was also examined. The results indicate that SDT is useful for modeling and measuring cyber-compliance behavior in terms of responding to phishing emails. This finding supports the feasibility of using SDT to monitor training effectiveness for individuals’ resistance to social engineering in phishing email detection. There were no significant relationships between participants’ scores on conscientiousness and their phishing and spear-phishing email detection ability. Future research should explore predictors of cyber-compliance with regards to individuals’ phishing and spear-phishing susceptibility.
APA, Harvard, Vancouver, ISO, and other styles
6

Dreibelbis, Rachel Christine. "It’s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber-Security Behaviors." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6083.

Full text
Abstract:
Organizations have become increasingly concerned with developing and protecting their information security systems. Despite attempts to secure the information infrastructure, employees inside of organizations remain the largest source of threat to information cyber-security. While previous research has focused on behavioral and situational factors that influence cyber-security behaviors, the measurement of cyber behaviors and their relationship to other performance variables is poorly understood. The purpose of the present study is to 1) determine the underlying factor structure of a cyber-security behavior scale, 2) assess if individual personality traits predict four types of cyber-security behaviors: security assurance, security compliance, security risk, and security damaging behaviors, and 3) explore the relationship between citizenship and counterproductive work behaviors and cyber-security behaviors. Results indicate that cyber-security behavior can be separated into four distinct dimensions and that personality traits such as conscientiousness, agreeableness, and openness to experience are predictive of these behaviors. Additionally, positive cyber behaviors are related organizational citizenship behaviors, and potentially harmful cyber behaviors related to counterproductive work behaviors. This research has implications for using personality to predict cyber-security behaviors and reduce insider threat in the workplace.
APA, Harvard, Vancouver, ISO, and other styles
7

Monjezizadeh, Ladbon, and Alex Untoro. "How the Online Disinhibition Effect Affects the Online Video Game Industry." Thesis, Uppsala universitet, Institutionen för speldesign, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-297939.

Full text
Abstract:
Extensive computer use is creating a society where its citizens are communicating outside the norm of real life. These diversions from real life communication behavior have been named the Online Disinhibition Effect (ODE). The effect is a psychological model that is structured with different types of elements which can be triggered by different communication mediums. There are two sides of the effect; a benign, where compassion and a reveal of emotions are more likely, and a toxic, where anger, frustration and threats are in focus. In the online video game industry, ODE is active, but as the medium is different than regular internet use the effects are different as well. This paper looks at how online video games are affected by ODE. By using the most current disinhibition model made by Suler and looking at modern cyberpsychology in online games, this paper found eight features that have the possibility to decrease disinhibition amongst users. This paper concludes with a warning that games are becoming more immersive and without the proper authority features, games will increase their disinhibition effect amongst its users.
APA, Harvard, Vancouver, ISO, and other styles
8

Ventéjoux, Aude. "Une lecture de la cyberviolence : la rencontre du sujet et du cyberespace dans les infractions à caractère sexuel envers mineurs réalisées sur Internet." Thesis, Rennes 2, 2019. http://www.theses.fr/2019REN20004/document.

Full text
Abstract:
Le développement des technologies de l’information et de la communication s’est accompagné de l’apparition de phénomènes violents et/ou infractionnels, qui se tiennent sur, ou grâce à, Internet. Existe-t-il une spécificité de ces conduites de cyberviolence, qui s’inscrivent dans ce que l’on nomme cyberespace ? La psycho-criminologie et la cyberpsychologie seront convoquées afin de proposer une réponse à cette question. Le présent travail étudiera, dans une approche clinique et qualitative, des situations d’infractions à caractère sexuel envers mineurs réalisées sur Internet. Ce travail proposera, à partir des données recueillies, une grille de lecture de la cyberviolence, qui s’intéressera au rapport du sujet auteur d’infractions avec la conduite infractionnelle, la victime, et le cyberespace. La cyberviolence naît d’une rencontre, celle d’un sujet vulnérable avec un cyberespace porteur d’opportunités. Il s’agira alors d’interroger cette rencontre, afin de saisir les processus et les dynamiques qui l’animent
The development of information and communication technologies was followed by the emergence of violent and/or offensive phenomena that exist on or thanks to the Internet. Is there a specificity to these behaviors of cyberviolence, which are rooted in what one calls cyberspace? This question will be answered partly thanks to psycho-criminological and cyberpsychological theories. This work takes a close look at sex offences against minors on the Internet. Thanks to the collected data, this work will offer a perspective on cyberviolence, with an interest in the relationship between the offender and the offence, the victim, and cyberspace. Cyberviolence arises from an encounter between a vulnerable subject and a cyberspace bearing opportunities. This encounter will thus be questioned, in order to understand the process and dynamics it stems from
APA, Harvard, Vancouver, ISO, and other styles
9

AlShammari, Norah. "Social Soul." VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5404.

Full text
Abstract:
Twitter has over 313 million users, with 500 million tweets produced each day. Society’s growing dependence on the internet for self-expression shows no sign of abating. However, recent research warns that social media perpetuates loneliness, caused by reduced face-to-face interaction. My thesis analyzes and demonstrates the important role facial expressions play in a conversation’s progress, impacting how people process and relate to what is being said. My work critically assesses communication problems associated with Twitter. By isolating and documenting expressive facial reactions to a curated selection of tweets, the exhibition creates a commentary on our contemporary digital existence, specifically articulating how use of social media limits basic social interaction.
APA, Harvard, Vancouver, ISO, and other styles
10

Hordiienko, Kateryna, and Катерина Олександрівна Гордієнко. "The problem of digitalization in psychological and education spheres." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51068.

Full text
Abstract:
1. Bochelyuk, V.: Didzhy`talizaciya yak faktor formuvannya kognity`vnoyi sfery` [Digitalization as a factor in the formation of the cognitive sphere]. Bulletin of KhNPU named after G. S. Skovoroda “Psychology”, (62), 87-107, Kharkiv (2020). 2. Voiskunsky, A.: Kiberpsikhologiya kak razdel psikhologicheskoj nauki i praktiki [Cyberpsychology as a section of psychological science and practice]. Universum: Bulletin of Herzen University, (4), 88 (2013). 3. Zhernovnikova, O.: Didzhy`talizaciya v osviti [Digitalization in education]. Proceedings of the III International Scientific and Practical Conference “Psychological and pedagogical problems of higher and secondary education in the conditions of modern challenges: theory and practice”, 88-90, Kharkiv (2018). 4. Lubenets, I.: Kibernasy`l`stvo (kiberbuling) sered uchniv zagal`noosvitnix navchal`ny`x zakladiv [Cyberbullying among students of secondary schools]. National Legal Journal: Theory and Practice, 3, 178-182 (2016). 5. Tikhomirov О.: Informaczionny`j vek i teoriya L.S. Vygotskogo [Information age and theory of L.S. Vygotsky]. Psychological journal, 14 (1), 114-119 (1993).
Determining the essence of the digitalization problem in psychological science and education is carried out in the process of studying modern technologies to meet human needs as a subject of the information society, social, cultural and economic trends in the world. Based on the above, digitalization in a broad sense is considered as a process and result of technologization collection, cultivation and dissemination of information using computer technology to meet human needs. At psychology, the problem of digitalization is studied by cyberpsychology which is a branch of psychology that observes mental processes, states, properties and manifestations of their activity (function, communication, behavior) in cyberspace.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cyberpsychology"

1

Gordo-López, Ángel J., and Ian Parker, eds. Cyberpsychology. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

1956-, Parker Ian, and Gordo-López Ángel J, eds. Cyberpsychology. Basingstoke: Macmillan, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Attrill, Alison, and Chris Fullwood, eds. Applied Cyberpsychology. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/9781137517036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Connolly, Irene. An Introduction to Cyberpsychology. 1 Edition. | New York : Routledge, 2016.: Routledge, 2016. http://dx.doi.org/10.4324/9781315741895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Connolly, Irene. An introduction to cyberpsychology. New York: Routledge, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Harley, Dave, Julie Morgan, and Hannah Frith. Cyberpsychology as Everyday Digital Experience across the Lifespan. London: Palgrave Macmillan UK, 2018. http://dx.doi.org/10.1057/978-1-137-59200-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Applied cyberpsychology: Practical applications of cyberpsychological theory and research. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cyberpsychology: An Introduction to the Psychology of Human–Computer Interaction. Cambridge: Cambridge University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Virole, Benoît. Cyberpsychologie: En 200 mots : apprentissage et remédiations, pratiques thérapeutiques, analyse des comportements. Paris: Dunod, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cyberpsychology. Oxford University Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cyberpsychology"

1

Gordo-López, Ángel J., and Ian Parker. "Cyberpsychology: Postdisciplinary Contexts and Projects." In Cyberpsychology, 1–21. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Burman, Erica. "The Child and the Cyborg." In Cyberpsychology, 169–83. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Heggs, Dan. "Cyberpsychology and Cyborgs." In Cyberpsychology, 184–201. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tirado, Francisco Javier. "Against Social Constructionist Cyborgian Territorializations." In Cyberpsychology, 202–17. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, Steve. "The Cyber and the Subjective." In Cyberpsychology, 221–25. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nightingale, Virginia. "Are Media Cyborgs?" In Cyberpsychology, 226–35. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sey, James. "The Labouring Body and the Posthuman." In Cyberpsychology, 25–41. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pérez, Carlos Soldevilla. "Vertiginous Technology: Towards a Psychoanalytic Genealogy of Technique." In Cyberpsychology, 42–58. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Marsden, Jill. "Cyberpsychosis: The Feminization of the Postbiological Body." In Cyberpsychology, 59–76. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

De Jesús, Nydza Correa. "Genealogies of the Self in Virtual-Geographical Reality." In Cyberpsychology, 77–91. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cyberpsychology"

1

Fugate, Sunny, Matt Bishop, Cliff Wang, and Kimberly Ferguson-Walter. "Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2022. http://dx.doi.org/10.24251/hicss.2022.274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Drange, Tom, and Joakim Kargaard. "Cyberpsychology: Psychological Processes That May Affect Dropout Rates among Online IT Security Students." In 10th International Conference on Computer Supported Education. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006776502520257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Boss-Victoria, Rena, Tina Jordan, Agnes Richardson, Hal Aubrey, Maurice Johnson, Elijah Cameron, and Henry Swanson. "CYBERPSYCHOLOGY REVISITED: CRITICAL ISSUES THAT IMPACT MENTAL HEALTH AND EDUCATIONAL ATTAINMENT IN COMMUNITIES OF COLOR." In 11th International Conference on Education and New Learning Technologies. IATED, 2019. http://dx.doi.org/10.21125/edulearn.2019.1846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mercuri, Ilenia. "Social Engineering and Human-Robot Interactions' Risks." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002199.

Full text
Abstract:
Modern robotics seems to have taken root from the theories of Isaac Asimov, in 1941. One area of research that has become increasingly popular in recent decades is the study of artificial intelligence or A.I., which aims to use machines to solve problems that, according to current opinion, require intelligence. This is related to the study on “Social Robots”. Social Robots are created in order to interact with human beings; they have been designed and programmed to engage with people by leveraging a "human" aspect and various interaction channels, such as speech or non-verbal communication. They therefore readily solicit social responsiveness in people who often attribute human qualities to the robot. Social robots exploit the human propensity for anthropomorphism, and humans tend to trust them more and more. Several issues could arise due to this kind of trust and to the ability of “superintelligence” to "self-evolve", which could lead to the violation of the purposes for which it was designed by humans, becoming a risk to human security and privacy. This kind of threat concerns social engineering, a set of techniques used to convince users to perform a series of actions that allow cybercriminals to gain access to the victims' resources. The Human Factor is the weakest ring of the security chain, and the social engineers exploit Human-Robots Interaction to persuade an individual to provide private information.An important research area that has shown interesting results for the knowledge of the possibility of human interaction with robots is "cyberpsychology". This paper aims to provide insights into how the interaction with social robots could be exploited by humans not only in a positive way but also by using the same techniques of social engineering borrowed from "bad actors" or hackers, to achieve malevolent and harmful purposes for man himself. A series of experiments and interesting research results will be shown as examples. In particular, about the ability of robots to gather personal information and display emotions during the interaction with human beings. Is it possible for social robots to feel and show emotions, and human beings could empathize with them? A broad area of research, which goes by the name of "affective computing", aims to design machines that are able to recognize human emotions and consistently respond to them. The aim is to apply human-human interaction models to human-machine interaction. There is a fine line that separates the opinions of those who argue that, in the future, machines with artificial intelligence could be a valuable aid to humans and those who believe that they represent a huge risk that could endanger human protection systems and safety. It is necessary to examine in depth this new field of cybersecurity to analyze the best path to protect our future. Are social robots a real danger? Keywords: Human Factor, Cybersecurity, Cyberpsychology, Social Engineering Attacks, Human-Robot Interaction, Robotics, Malicious Artificial Intelligence, Affective Computing, Cyber Threats
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography