Gotowa bibliografia na temat „Cyberpsychology”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Cyberpsychology”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Cyberpsychology"

1

Kirwan, Gráinne. "Cyberpsychology". Irish Journal of Psychology 31, nr 1-2 (styczeń 2010): 69–84. http://dx.doi.org/10.1080/03033910.2010.10446324.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Suler, John. "Psychoanalytic Cyberpsychology". International Journal of Applied Psychoanalytic Studies 14, nr 1 (18.03.2016): 97–102. http://dx.doi.org/10.1002/aps.1487.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Wiederhold, Mark D. "Progress in CyberPsychology". CyberPsychology & Behavior 1, nr 2 (styczeń 1998): 93. http://dx.doi.org/10.1089/cpb.1998.1.93.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Orben, Amy. "Cyberpsychology: A field lacking theoretical foundations". PsyPag Quarterly 1, nr 107 (czerwiec 2018): 12–14. http://dx.doi.org/10.53841/bpspag.2018.1.107.12.

Pełny tekst źródła
Streszczenie:
In an academic environment predominantly focused on empirical results, theory is a vital – but ojien overlooked – component of successful research. The novel psychological research field of cyberpsychology is missing the theoretical foundations normally available to traditional research areas. To ensure that cyberpsychology becomes a successful and fully functioning research field this needs to be resolved. Cyberpsychology researchers require common theoretical frameworks to answer profound and pressing research questions. To build this framework, they will need to either create new theories or reappropriate traditional theories previously proposed to explain offline behaviour.
Style APA, Harvard, Vancouver, ISO itp.
5

Kaye, Linda K. "An Introduction to Cyberpsychology". Cyberpsychology, Behavior, and Social Networking 19, nr 4 (kwiecień 2016): 294. http://dx.doi.org/10.1089/cyber.2016.29033.lkk.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Taylor, Jacqui, John McAlaney, Sarah Muir i Terri Cole. "Teaching sensitive issues in cyberpsychology". Psychology Teaching Review 23, nr 1 (2017): 56–62. http://dx.doi.org/10.53841/bpsptr.2017.23.1.56.

Pełny tekst źródła
Streszczenie:
In contrast to the helpful sources of guidance and regulations for researchers designing and conducting experiments in cyberpsychology, there is very little guidance available for academics and teachers teaching sensitive issues related to behavior in the online world. There are many potential dangers for psychology students when learning about cyberpsychology, ranging from being exposed to upsetting or illegal behaviour viewed in videos or images, to questioning their own sense of morality and understanding of self, to experiencing harassment or hacking. This paper will highlight our own experiences of teaching cyberpsychology to first and third year psychology students, highlighting some of the potential dangers. We suggest recommendations for academics to ensure that students are protected as faras is possible.
Style APA, Harvard, Vancouver, ISO itp.
7

Tolstykh, N. N. "Foreword by the Editor". Social Psychology and Society 11, nr 1 (2020): 5–7. http://dx.doi.org/10.17759/sps.2020110101.

Pełny tekst źródła
Streszczenie:
We continue our discussion of cyberpsychology, which we started in our previous issue, the fourth issue of 2019. We received so many articles on cyberpsychology that even with our rigorous selection process, we could not fit all the articles into one issue. Hence we made a decision to devote another issue to this topic.
Style APA, Harvard, Vancouver, ISO itp.
8

Ogonowska, Agnieszka. "Cyberpsychologia. Nowe perspektywy badania mediów i ich użytkowników". Annales Universitatis Paedagogicae Cracoviensis. Studia de Cultura 4, nr 10 (2018): 5–18. http://dx.doi.org/10.24917/20837275.10.4.1.

Pełny tekst źródła
Streszczenie:
Cyberpsychology. New perspectives in researching media and their users Abstract The aim of the article is a synthetic presentation of the origins and directions of development of cyberpsychology and its relationships with other disciplines of science, as well as the indication of the possibility of using cyberpsychological research in media studies and analyzes dedicated to new media and their users.
Style APA, Harvard, Vancouver, ISO itp.
9

Guitton, Matthieu J. "Cyberpsychology research and COVID-19". Computers in Human Behavior 111 (październik 2020): 106357. http://dx.doi.org/10.1016/j.chb.2020.106357.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Lu, Junshi, i Yujia Peng. "Brain-Computer Interface for Cyberpsychology". International Journal of Cyber Behavior, Psychology and Learning 4, nr 1 (styczeń 2014): 1–14. http://dx.doi.org/10.4018/ijcbpl.2014010101.

Pełny tekst źródła
Streszczenie:
As a new way of implementing human-computer interface, brain-computer interfaces (BCI) dramatically change the user experiences and have broad applications in cyber behavior research. This methodological review attempts to provide an overall picture of the BCI science and its role in cyberpsychology. After an introduction of BCI and the literature search methods used in this review, we offer an overview of terms, history, components, methods and signals used in BCI. Different applications of BCI on both the clinical population and the healthy population are summarized in detail, with a conclusion of the future directions of BCI.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Cyberpsychology"

1

Turner, Carolynn Ann. "Cyberpsychology and schools : a feasibility study using virtual reality with school children". Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/45373.

Pełny tekst źródła
Streszczenie:
This study evaluates the feasibility and treatment acceptability of Virtual Reality (VR) technology applied universally in a school setting. A total of 105 children, mean age of 14.45, in five classrooms completed a paper and pencil measure of trait anxiety during Session 1. In Session 2, participants were randomly selected to participate in either a neutral environment or an anxiety-provoking environment and completed a measure of state anxiety immediately prior to and following their first VR exposure. Following the exposure participants also completed a Likert-Scaled questionnaire regarding treatment acceptability. In Session 3, participants completed Session 2 procedure in the alternate environment. There was a main effect of condition and time on state anxiety scores, controlling for trait anxiety. Participants in the anxiety provoking condition had lower mean state anxiety scores than being in the neutral condition; participants had lower state anxiety levels following the anxiety condition than they did following the neutral condition. All participants’ mean state anxiety levels were lower post exposure than pre exposure. There was also a borderline significant main effect of condition on treatment acceptability levels, controlling for trait anxiety. Participants in the neutral condition had a higher level of acceptability than when in the anxiety provoking condition. Results reveal that the implementation of VR technology exposure warrants further research.
Style APA, Harvard, Vancouver, ISO itp.
2

Skelly, Niamh. "An exploration of the relationship between health anxiety and health-related Internet use". Thesis, University of Manchester, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.694323.

Pełny tekst źródła
Streszczenie:
High health anxiety has negative repercussions at the individual, interpersonal, and societal levels. According to cognitive behavioural theory, health anxiety is maintained, in part, by behavioural factors, termed safety behaviours. Health-related Internet use (HRIU) may be an important safety behaviour for some health anxious individuals. The Internet offers an abundance of health information, and opportunities to engage in health-related behaviours. Paper 1 aims to establish what is known about the relationship between health anxiety and HRIU. A systematic search was undertaken to identify studies that fell into five broad categories. The identified studies (N = 30) were then narratively reviewed, with an emphasis on methodological quality, and consideration also given to clinical implications and directions for future research. The review indicated that research to date has focused almost entirely on the relationship between health anxiety and using the Internet to obtain health information, termed online health research (OHR). Health anxiety appears associated with amount of, and emotional response to, OHR. The majority of existing studies are cross-sectional. Many use unvalidated measures of HRIU, and/or convenience samples recruited from universities or via commercial services. The Cyberchondria Severity Scale has potential clinical utility as a measure of a specific health anxiety maintenance cycle. However, there is a need for a more general instrument that can be used to assess various dimensions of HRIU in a validated manner. Paper 2 is a cross-sectional, correlational study of relationships between HRIU, health anxiety, and health service utilisation in a clinical, help-seeking sample. Participants were recruited from primary care practices, and completed questionnaire measures. Extent and nature of HRIU, and emotional and behavioural responses to HRIU, were measured using the Online Health Beliefs and Behaviour Inventory (OHBBI). The OHBBI is a recently developed measure that has undergone preliminary psychometric validation. OHBBI subscales explained 30% of variance in health anxiety, but did not improve prediction of self-reported service utilisation. A moderated regression indicated that the relationship between the Illness-Focused Searching subscale and health service utilisation varied as a function of health anxiety, with a negative relationship at low levels of health anxiety, and a positive relationship at high levels. This study provides further evidence of a role for HRIU in the maintenance of health anxiety, and advances the literature by using a validated measure of HRIU, a clinical sample, and well-controlled models. Paper 3 is a critical, reflective appraisal of the thesis as a whole. Methodological decisions, and their ramifications, are discussed in detail. The importance of the thesis is summarised, and implications for clinical practice and future research are revisited. The OHBBI requires further psychometric refinement. Longitudinal studies, and studies that use objective measures of service utilisation, are needed. Safety behaviours, including various forms of HRIU, may interact with each other to perpetuate health anxiety; such complex maintenance cycles merit empirical investigation.
Style APA, Harvard, Vancouver, ISO itp.
3

Aiken, Mary. "Forensic cyberpsychology : a content analysis approach to investigating and comprehending the self-production of indecent images by minors". Thesis, Middlesex University, 2015. http://eprints.mdx.ac.uk/18563/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Howard, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents". Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.

Pełny tekst źródła
Streszczenie:
As organizations have become more reliant on computers and technology to operate in a globalized world, they have also become more vulnerable to cyberattacks on their networks. The expense to organizations from cyberattacks now exceeds $400 billion USD annually. These costs highlight the need for behavioral research in the cyber domain. The first phase of this research developed an instrument to measure workers’ cybersecurity attitudes. An iterative process resulted in a scale with good psychometric properties - The Cybersecurity Attitudes Scale. The scale measures two factors: cyber policy adherence attitudes and perceived vulnerability to a cyberattack. The second phase of this research used the theory of planned behavior as a theoretical framework to model the relationship between personality facets, policy adherence attitudes, perceived vulnerability, locus of control, cybersecurity climate, and cybersecurity behaviors. While the hypothesized model had poor fit for the data, there was a strong relationship between cybersecurity attitudes (i.e. policy adherence attitudes and perceived vulnerability) and dutifulness, altruism, compliance, cybersecurity climate, and cybersecurity behavior. This research provides practical value to academic researchers and organizations by providing a scale to measure cybersecurity attitudes and to help organizations better understand the nature of the antecedents that lead to cybersecurity attitudes and behavior.
Style APA, Harvard, Vancouver, ISO itp.
5

Martin, Jaclyn. "Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace". Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6728.

Pełny tekst źródła
Streszczenie:
Cyber-security is an ever-increasing problem in the 21st century. Though the majority of cyber-security breaches are a direct result of human error (Hu, Dinev, Hart, & Cooke, 2012), there is a dearth of research in psychology on the application of human decision-making for cyber-security compliance. Through an online inbox simulation, the present research examined the utility of a robust psychological model for decision-making, signal detection theory (SDT) for modeling decision-making in the context of receiving and responding to phishing and spear-phishing email scams. The influence of individual differences, specifically conscientiousness, on phishing email detection was also examined. The results indicate that SDT is useful for modeling and measuring cyber-compliance behavior in terms of responding to phishing emails. This finding supports the feasibility of using SDT to monitor training effectiveness for individuals’ resistance to social engineering in phishing email detection. There were no significant relationships between participants’ scores on conscientiousness and their phishing and spear-phishing email detection ability. Future research should explore predictors of cyber-compliance with regards to individuals’ phishing and spear-phishing susceptibility.
Style APA, Harvard, Vancouver, ISO itp.
6

Dreibelbis, Rachel Christine. "It’s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber-Security Behaviors". Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6083.

Pełny tekst źródła
Streszczenie:
Organizations have become increasingly concerned with developing and protecting their information security systems. Despite attempts to secure the information infrastructure, employees inside of organizations remain the largest source of threat to information cyber-security. While previous research has focused on behavioral and situational factors that influence cyber-security behaviors, the measurement of cyber behaviors and their relationship to other performance variables is poorly understood. The purpose of the present study is to 1) determine the underlying factor structure of a cyber-security behavior scale, 2) assess if individual personality traits predict four types of cyber-security behaviors: security assurance, security compliance, security risk, and security damaging behaviors, and 3) explore the relationship between citizenship and counterproductive work behaviors and cyber-security behaviors. Results indicate that cyber-security behavior can be separated into four distinct dimensions and that personality traits such as conscientiousness, agreeableness, and openness to experience are predictive of these behaviors. Additionally, positive cyber behaviors are related organizational citizenship behaviors, and potentially harmful cyber behaviors related to counterproductive work behaviors. This research has implications for using personality to predict cyber-security behaviors and reduce insider threat in the workplace.
Style APA, Harvard, Vancouver, ISO itp.
7

Monjezizadeh, Ladbon, i Alex Untoro. "How the Online Disinhibition Effect Affects the Online Video Game Industry". Thesis, Uppsala universitet, Institutionen för speldesign, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-297939.

Pełny tekst źródła
Streszczenie:
Extensive computer use is creating a society where its citizens are communicating outside the norm of real life. These diversions from real life communication behavior have been named the Online Disinhibition Effect (ODE). The effect is a psychological model that is structured with different types of elements which can be triggered by different communication mediums. There are two sides of the effect; a benign, where compassion and a reveal of emotions are more likely, and a toxic, where anger, frustration and threats are in focus. In the online video game industry, ODE is active, but as the medium is different than regular internet use the effects are different as well. This paper looks at how online video games are affected by ODE. By using the most current disinhibition model made by Suler and looking at modern cyberpsychology in online games, this paper found eight features that have the possibility to decrease disinhibition amongst users. This paper concludes with a warning that games are becoming more immersive and without the proper authority features, games will increase their disinhibition effect amongst its users.
Style APA, Harvard, Vancouver, ISO itp.
8

Ventéjoux, Aude. "Une lecture de la cyberviolence : la rencontre du sujet et du cyberespace dans les infractions à caractère sexuel envers mineurs réalisées sur Internet". Thesis, Rennes 2, 2019. http://www.theses.fr/2019REN20004/document.

Pełny tekst źródła
Streszczenie:
Le développement des technologies de l’information et de la communication s’est accompagné de l’apparition de phénomènes violents et/ou infractionnels, qui se tiennent sur, ou grâce à, Internet. Existe-t-il une spécificité de ces conduites de cyberviolence, qui s’inscrivent dans ce que l’on nomme cyberespace ? La psycho-criminologie et la cyberpsychologie seront convoquées afin de proposer une réponse à cette question. Le présent travail étudiera, dans une approche clinique et qualitative, des situations d’infractions à caractère sexuel envers mineurs réalisées sur Internet. Ce travail proposera, à partir des données recueillies, une grille de lecture de la cyberviolence, qui s’intéressera au rapport du sujet auteur d’infractions avec la conduite infractionnelle, la victime, et le cyberespace. La cyberviolence naît d’une rencontre, celle d’un sujet vulnérable avec un cyberespace porteur d’opportunités. Il s’agira alors d’interroger cette rencontre, afin de saisir les processus et les dynamiques qui l’animent
The development of information and communication technologies was followed by the emergence of violent and/or offensive phenomena that exist on or thanks to the Internet. Is there a specificity to these behaviors of cyberviolence, which are rooted in what one calls cyberspace? This question will be answered partly thanks to psycho-criminological and cyberpsychological theories. This work takes a close look at sex offences against minors on the Internet. Thanks to the collected data, this work will offer a perspective on cyberviolence, with an interest in the relationship between the offender and the offence, the victim, and cyberspace. Cyberviolence arises from an encounter between a vulnerable subject and a cyberspace bearing opportunities. This encounter will thus be questioned, in order to understand the process and dynamics it stems from
Style APA, Harvard, Vancouver, ISO itp.
9

AlShammari, Norah. "Social Soul". VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5404.

Pełny tekst źródła
Streszczenie:
Twitter has over 313 million users, with 500 million tweets produced each day. Society’s growing dependence on the internet for self-expression shows no sign of abating. However, recent research warns that social media perpetuates loneliness, caused by reduced face-to-face interaction. My thesis analyzes and demonstrates the important role facial expressions play in a conversation’s progress, impacting how people process and relate to what is being said. My work critically assesses communication problems associated with Twitter. By isolating and documenting expressive facial reactions to a curated selection of tweets, the exhibition creates a commentary on our contemporary digital existence, specifically articulating how use of social media limits basic social interaction.
Style APA, Harvard, Vancouver, ISO itp.
10

Hordiienko, Kateryna, i Катерина Олександрівна Гордієнко. "The problem of digitalization in psychological and education spheres". Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51068.

Pełny tekst źródła
Streszczenie:
1. Bochelyuk, V.: Didzhy`talizaciya yak faktor formuvannya kognity`vnoyi sfery` [Digitalization as a factor in the formation of the cognitive sphere]. Bulletin of KhNPU named after G. S. Skovoroda “Psychology”, (62), 87-107, Kharkiv (2020). 2. Voiskunsky, A.: Kiberpsikhologiya kak razdel psikhologicheskoj nauki i praktiki [Cyberpsychology as a section of psychological science and practice]. Universum: Bulletin of Herzen University, (4), 88 (2013). 3. Zhernovnikova, O.: Didzhy`talizaciya v osviti [Digitalization in education]. Proceedings of the III International Scientific and Practical Conference “Psychological and pedagogical problems of higher and secondary education in the conditions of modern challenges: theory and practice”, 88-90, Kharkiv (2018). 4. Lubenets, I.: Kibernasy`l`stvo (kiberbuling) sered uchniv zagal`noosvitnix navchal`ny`x zakladiv [Cyberbullying among students of secondary schools]. National Legal Journal: Theory and Practice, 3, 178-182 (2016). 5. Tikhomirov О.: Informaczionny`j vek i teoriya L.S. Vygotskogo [Information age and theory of L.S. Vygotsky]. Psychological journal, 14 (1), 114-119 (1993).
Determining the essence of the digitalization problem in psychological science and education is carried out in the process of studying modern technologies to meet human needs as a subject of the information society, social, cultural and economic trends in the world. Based on the above, digitalization in a broad sense is considered as a process and result of technologization collection, cultivation and dissemination of information using computer technology to meet human needs. At psychology, the problem of digitalization is studied by cyberpsychology which is a branch of psychology that observes mental processes, states, properties and manifestations of their activity (function, communication, behavior) in cyberspace.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Cyberpsychology"

1

Gordo-López, Ángel J., i Ian Parker, red. Cyberpsychology. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

1956-, Parker Ian, i Gordo-López Ángel J, red. Cyberpsychology. Basingstoke: Macmillan, 1999.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Attrill, Alison, i Chris Fullwood, red. Applied Cyberpsychology. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/9781137517036.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Connolly, Irene. An Introduction to Cyberpsychology. 1 Edition. | New York : Routledge, 2016.: Routledge, 2016. http://dx.doi.org/10.4324/9781315741895.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Connolly, Irene. An introduction to cyberpsychology. New York: Routledge, 2016.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Harley, Dave, Julie Morgan i Hannah Frith. Cyberpsychology as Everyday Digital Experience across the Lifespan. London: Palgrave Macmillan UK, 2018. http://dx.doi.org/10.1057/978-1-137-59200-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Applied cyberpsychology: Practical applications of cyberpsychological theory and research. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2016.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Cyberpsychology: An Introduction to the Psychology of Human–Computer Interaction. Cambridge: Cambridge University Press, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Virole, Benoît. Cyberpsychologie: En 200 mots : apprentissage et remédiations, pratiques thérapeutiques, analyse des comportements. Paris: Dunod, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Cyberpsychology. Oxford University Press, 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Cyberpsychology"

1

Gordo-López, Ángel J., i Ian Parker. "Cyberpsychology: Postdisciplinary Contexts and Projects". W Cyberpsychology, 1–21. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Burman, Erica. "The Child and the Cyborg". W Cyberpsychology, 169–83. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_10.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Heggs, Dan. "Cyberpsychology and Cyborgs". W Cyberpsychology, 184–201. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Tirado, Francisco Javier. "Against Social Constructionist Cyborgian Territorializations". W Cyberpsychology, 202–17. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Jones, Steve. "The Cyber and the Subjective". W Cyberpsychology, 221–25. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Nightingale, Virginia. "Are Media Cyborgs?" W Cyberpsychology, 226–35. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Sey, James. "The Labouring Body and the Posthuman". W Cyberpsychology, 25–41. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Pérez, Carlos Soldevilla. "Vertiginous Technology: Towards a Psychoanalytic Genealogy of Technique". W Cyberpsychology, 42–58. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Marsden, Jill. "Cyberpsychosis: The Feminization of the Postbiological Body". W Cyberpsychology, 59–76. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

De Jesús, Nydza Correa. "Genealogies of the Self in Virtual-Geographical Reality". W Cyberpsychology, 77–91. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Cyberpsychology"

1

Fugate, Sunny, Matt Bishop, Cliff Wang i Kimberly Ferguson-Walter. "Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense". W Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2022. http://dx.doi.org/10.24251/hicss.2022.274.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Drange, Tom, i Joakim Kargaard. "Cyberpsychology: Psychological Processes That May Affect Dropout Rates among Online IT Security Students". W 10th International Conference on Computer Supported Education. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006776502520257.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Boss-Victoria, Rena, Tina Jordan, Agnes Richardson, Hal Aubrey, Maurice Johnson, Elijah Cameron i Henry Swanson. "CYBERPSYCHOLOGY REVISITED: CRITICAL ISSUES THAT IMPACT MENTAL HEALTH AND EDUCATIONAL ATTAINMENT IN COMMUNITIES OF COLOR". W 11th International Conference on Education and New Learning Technologies. IATED, 2019. http://dx.doi.org/10.21125/edulearn.2019.1846.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Mercuri, Ilenia. "Social Engineering and Human-Robot Interactions' Risks". W 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002199.

Pełny tekst źródła
Streszczenie:
Modern robotics seems to have taken root from the theories of Isaac Asimov, in 1941. One area of research that has become increasingly popular in recent decades is the study of artificial intelligence or A.I., which aims to use machines to solve problems that, according to current opinion, require intelligence. This is related to the study on “Social Robots”. Social Robots are created in order to interact with human beings; they have been designed and programmed to engage with people by leveraging a "human" aspect and various interaction channels, such as speech or non-verbal communication. They therefore readily solicit social responsiveness in people who often attribute human qualities to the robot. Social robots exploit the human propensity for anthropomorphism, and humans tend to trust them more and more. Several issues could arise due to this kind of trust and to the ability of “superintelligence” to "self-evolve", which could lead to the violation of the purposes for which it was designed by humans, becoming a risk to human security and privacy. This kind of threat concerns social engineering, a set of techniques used to convince users to perform a series of actions that allow cybercriminals to gain access to the victims' resources. The Human Factor is the weakest ring of the security chain, and the social engineers exploit Human-Robots Interaction to persuade an individual to provide private information.An important research area that has shown interesting results for the knowledge of the possibility of human interaction with robots is "cyberpsychology". This paper aims to provide insights into how the interaction with social robots could be exploited by humans not only in a positive way but also by using the same techniques of social engineering borrowed from "bad actors" or hackers, to achieve malevolent and harmful purposes for man himself. A series of experiments and interesting research results will be shown as examples. In particular, about the ability of robots to gather personal information and display emotions during the interaction with human beings. Is it possible for social robots to feel and show emotions, and human beings could empathize with them? A broad area of research, which goes by the name of "affective computing", aims to design machines that are able to recognize human emotions and consistently respond to them. The aim is to apply human-human interaction models to human-machine interaction. There is a fine line that separates the opinions of those who argue that, in the future, machines with artificial intelligence could be a valuable aid to humans and those who believe that they represent a huge risk that could endanger human protection systems and safety. It is necessary to examine in depth this new field of cybersecurity to analyze the best path to protect our future. Are social robots a real danger? Keywords: Human Factor, Cybersecurity, Cyberpsychology, Social Engineering Attacks, Human-Robot Interaction, Robotics, Malicious Artificial Intelligence, Affective Computing, Cyber Threats
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii