Literatura científica selecionada sobre o tema "Cyberpsychology"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Cyberpsychology".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Cyberpsychology"

1

Kirwan, Gráinne. "Cyberpsychology". Irish Journal of Psychology 31, n.º 1-2 (janeiro de 2010): 69–84. http://dx.doi.org/10.1080/03033910.2010.10446324.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Suler, John. "Psychoanalytic Cyberpsychology". International Journal of Applied Psychoanalytic Studies 14, n.º 1 (18 de março de 2016): 97–102. http://dx.doi.org/10.1002/aps.1487.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Wiederhold, Mark D. "Progress in CyberPsychology". CyberPsychology & Behavior 1, n.º 2 (janeiro de 1998): 93. http://dx.doi.org/10.1089/cpb.1998.1.93.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Orben, Amy. "Cyberpsychology: A field lacking theoretical foundations". PsyPag Quarterly 1, n.º 107 (junho de 2018): 12–14. http://dx.doi.org/10.53841/bpspag.2018.1.107.12.

Texto completo da fonte
Resumo:
In an academic environment predominantly focused on empirical results, theory is a vital – but ojien overlooked – component of successful research. The novel psychological research field of cyberpsychology is missing the theoretical foundations normally available to traditional research areas. To ensure that cyberpsychology becomes a successful and fully functioning research field this needs to be resolved. Cyberpsychology researchers require common theoretical frameworks to answer profound and pressing research questions. To build this framework, they will need to either create new theories or reappropriate traditional theories previously proposed to explain offline behaviour.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Kaye, Linda K. "An Introduction to Cyberpsychology". Cyberpsychology, Behavior, and Social Networking 19, n.º 4 (abril de 2016): 294. http://dx.doi.org/10.1089/cyber.2016.29033.lkk.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Taylor, Jacqui, John McAlaney, Sarah Muir e Terri Cole. "Teaching sensitive issues in cyberpsychology". Psychology Teaching Review 23, n.º 1 (2017): 56–62. http://dx.doi.org/10.53841/bpsptr.2017.23.1.56.

Texto completo da fonte
Resumo:
In contrast to the helpful sources of guidance and regulations for researchers designing and conducting experiments in cyberpsychology, there is very little guidance available for academics and teachers teaching sensitive issues related to behavior in the online world. There are many potential dangers for psychology students when learning about cyberpsychology, ranging from being exposed to upsetting or illegal behaviour viewed in videos or images, to questioning their own sense of morality and understanding of self, to experiencing harassment or hacking. This paper will highlight our own experiences of teaching cyberpsychology to first and third year psychology students, highlighting some of the potential dangers. We suggest recommendations for academics to ensure that students are protected as faras is possible.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Tolstykh, N. N. "Foreword by the Editor". Social Psychology and Society 11, n.º 1 (2020): 5–7. http://dx.doi.org/10.17759/sps.2020110101.

Texto completo da fonte
Resumo:
We continue our discussion of cyberpsychology, which we started in our previous issue, the fourth issue of 2019. We received so many articles on cyberpsychology that even with our rigorous selection process, we could not fit all the articles into one issue. Hence we made a decision to devote another issue to this topic.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Ogonowska, Agnieszka. "Cyberpsychologia. Nowe perspektywy badania mediów i ich użytkowników". Annales Universitatis Paedagogicae Cracoviensis. Studia de Cultura 4, n.º 10 (2018): 5–18. http://dx.doi.org/10.24917/20837275.10.4.1.

Texto completo da fonte
Resumo:
Cyberpsychology. New perspectives in researching media and their users Abstract The aim of the article is a synthetic presentation of the origins and directions of development of cyberpsychology and its relationships with other disciplines of science, as well as the indication of the possibility of using cyberpsychological research in media studies and analyzes dedicated to new media and their users.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Guitton, Matthieu J. "Cyberpsychology research and COVID-19". Computers in Human Behavior 111 (outubro de 2020): 106357. http://dx.doi.org/10.1016/j.chb.2020.106357.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Lu, Junshi, e Yujia Peng. "Brain-Computer Interface for Cyberpsychology". International Journal of Cyber Behavior, Psychology and Learning 4, n.º 1 (janeiro de 2014): 1–14. http://dx.doi.org/10.4018/ijcbpl.2014010101.

Texto completo da fonte
Resumo:
As a new way of implementing human-computer interface, brain-computer interfaces (BCI) dramatically change the user experiences and have broad applications in cyber behavior research. This methodological review attempts to provide an overall picture of the BCI science and its role in cyberpsychology. After an introduction of BCI and the literature search methods used in this review, we offer an overview of terms, history, components, methods and signals used in BCI. Different applications of BCI on both the clinical population and the healthy population are summarized in detail, with a conclusion of the future directions of BCI.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Cyberpsychology"

1

Turner, Carolynn Ann. "Cyberpsychology and schools : a feasibility study using virtual reality with school children". Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/45373.

Texto completo da fonte
Resumo:
This study evaluates the feasibility and treatment acceptability of Virtual Reality (VR) technology applied universally in a school setting. A total of 105 children, mean age of 14.45, in five classrooms completed a paper and pencil measure of trait anxiety during Session 1. In Session 2, participants were randomly selected to participate in either a neutral environment or an anxiety-provoking environment and completed a measure of state anxiety immediately prior to and following their first VR exposure. Following the exposure participants also completed a Likert-Scaled questionnaire regarding treatment acceptability. In Session 3, participants completed Session 2 procedure in the alternate environment. There was a main effect of condition and time on state anxiety scores, controlling for trait anxiety. Participants in the anxiety provoking condition had lower mean state anxiety scores than being in the neutral condition; participants had lower state anxiety levels following the anxiety condition than they did following the neutral condition. All participants’ mean state anxiety levels were lower post exposure than pre exposure. There was also a borderline significant main effect of condition on treatment acceptability levels, controlling for trait anxiety. Participants in the neutral condition had a higher level of acceptability than when in the anxiety provoking condition. Results reveal that the implementation of VR technology exposure warrants further research.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Skelly, Niamh. "An exploration of the relationship between health anxiety and health-related Internet use". Thesis, University of Manchester, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.694323.

Texto completo da fonte
Resumo:
High health anxiety has negative repercussions at the individual, interpersonal, and societal levels. According to cognitive behavioural theory, health anxiety is maintained, in part, by behavioural factors, termed safety behaviours. Health-related Internet use (HRIU) may be an important safety behaviour for some health anxious individuals. The Internet offers an abundance of health information, and opportunities to engage in health-related behaviours. Paper 1 aims to establish what is known about the relationship between health anxiety and HRIU. A systematic search was undertaken to identify studies that fell into five broad categories. The identified studies (N = 30) were then narratively reviewed, with an emphasis on methodological quality, and consideration also given to clinical implications and directions for future research. The review indicated that research to date has focused almost entirely on the relationship between health anxiety and using the Internet to obtain health information, termed online health research (OHR). Health anxiety appears associated with amount of, and emotional response to, OHR. The majority of existing studies are cross-sectional. Many use unvalidated measures of HRIU, and/or convenience samples recruited from universities or via commercial services. The Cyberchondria Severity Scale has potential clinical utility as a measure of a specific health anxiety maintenance cycle. However, there is a need for a more general instrument that can be used to assess various dimensions of HRIU in a validated manner. Paper 2 is a cross-sectional, correlational study of relationships between HRIU, health anxiety, and health service utilisation in a clinical, help-seeking sample. Participants were recruited from primary care practices, and completed questionnaire measures. Extent and nature of HRIU, and emotional and behavioural responses to HRIU, were measured using the Online Health Beliefs and Behaviour Inventory (OHBBI). The OHBBI is a recently developed measure that has undergone preliminary psychometric validation. OHBBI subscales explained 30% of variance in health anxiety, but did not improve prediction of self-reported service utilisation. A moderated regression indicated that the relationship between the Illness-Focused Searching subscale and health service utilisation varied as a function of health anxiety, with a negative relationship at low levels of health anxiety, and a positive relationship at high levels. This study provides further evidence of a role for HRIU in the maintenance of health anxiety, and advances the literature by using a validated measure of HRIU, a clinical sample, and well-controlled models. Paper 3 is a critical, reflective appraisal of the thesis as a whole. Methodological decisions, and their ramifications, are discussed in detail. The importance of the thesis is summarised, and implications for clinical practice and future research are revisited. The OHBBI requires further psychometric refinement. Longitudinal studies, and studies that use objective measures of service utilisation, are needed. Safety behaviours, including various forms of HRIU, may interact with each other to perpetuate health anxiety; such complex maintenance cycles merit empirical investigation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Aiken, Mary. "Forensic cyberpsychology : a content analysis approach to investigating and comprehending the self-production of indecent images by minors". Thesis, Middlesex University, 2015. http://eprints.mdx.ac.uk/18563/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Howard, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents". Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.

Texto completo da fonte
Resumo:
As organizations have become more reliant on computers and technology to operate in a globalized world, they have also become more vulnerable to cyberattacks on their networks. The expense to organizations from cyberattacks now exceeds $400 billion USD annually. These costs highlight the need for behavioral research in the cyber domain. The first phase of this research developed an instrument to measure workers’ cybersecurity attitudes. An iterative process resulted in a scale with good psychometric properties - The Cybersecurity Attitudes Scale. The scale measures two factors: cyber policy adherence attitudes and perceived vulnerability to a cyberattack. The second phase of this research used the theory of planned behavior as a theoretical framework to model the relationship between personality facets, policy adherence attitudes, perceived vulnerability, locus of control, cybersecurity climate, and cybersecurity behaviors. While the hypothesized model had poor fit for the data, there was a strong relationship between cybersecurity attitudes (i.e. policy adherence attitudes and perceived vulnerability) and dutifulness, altruism, compliance, cybersecurity climate, and cybersecurity behavior. This research provides practical value to academic researchers and organizations by providing a scale to measure cybersecurity attitudes and to help organizations better understand the nature of the antecedents that lead to cybersecurity attitudes and behavior.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Martin, Jaclyn. "Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace". Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6728.

Texto completo da fonte
Resumo:
Cyber-security is an ever-increasing problem in the 21st century. Though the majority of cyber-security breaches are a direct result of human error (Hu, Dinev, Hart, & Cooke, 2012), there is a dearth of research in psychology on the application of human decision-making for cyber-security compliance. Through an online inbox simulation, the present research examined the utility of a robust psychological model for decision-making, signal detection theory (SDT) for modeling decision-making in the context of receiving and responding to phishing and spear-phishing email scams. The influence of individual differences, specifically conscientiousness, on phishing email detection was also examined. The results indicate that SDT is useful for modeling and measuring cyber-compliance behavior in terms of responding to phishing emails. This finding supports the feasibility of using SDT to monitor training effectiveness for individuals’ resistance to social engineering in phishing email detection. There were no significant relationships between participants’ scores on conscientiousness and their phishing and spear-phishing email detection ability. Future research should explore predictors of cyber-compliance with regards to individuals’ phishing and spear-phishing susceptibility.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Dreibelbis, Rachel Christine. "It’s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber-Security Behaviors". Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6083.

Texto completo da fonte
Resumo:
Organizations have become increasingly concerned with developing and protecting their information security systems. Despite attempts to secure the information infrastructure, employees inside of organizations remain the largest source of threat to information cyber-security. While previous research has focused on behavioral and situational factors that influence cyber-security behaviors, the measurement of cyber behaviors and their relationship to other performance variables is poorly understood. The purpose of the present study is to 1) determine the underlying factor structure of a cyber-security behavior scale, 2) assess if individual personality traits predict four types of cyber-security behaviors: security assurance, security compliance, security risk, and security damaging behaviors, and 3) explore the relationship between citizenship and counterproductive work behaviors and cyber-security behaviors. Results indicate that cyber-security behavior can be separated into four distinct dimensions and that personality traits such as conscientiousness, agreeableness, and openness to experience are predictive of these behaviors. Additionally, positive cyber behaviors are related organizational citizenship behaviors, and potentially harmful cyber behaviors related to counterproductive work behaviors. This research has implications for using personality to predict cyber-security behaviors and reduce insider threat in the workplace.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Monjezizadeh, Ladbon, e Alex Untoro. "How the Online Disinhibition Effect Affects the Online Video Game Industry". Thesis, Uppsala universitet, Institutionen för speldesign, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-297939.

Texto completo da fonte
Resumo:
Extensive computer use is creating a society where its citizens are communicating outside the norm of real life. These diversions from real life communication behavior have been named the Online Disinhibition Effect (ODE). The effect is a psychological model that is structured with different types of elements which can be triggered by different communication mediums. There are two sides of the effect; a benign, where compassion and a reveal of emotions are more likely, and a toxic, where anger, frustration and threats are in focus. In the online video game industry, ODE is active, but as the medium is different than regular internet use the effects are different as well. This paper looks at how online video games are affected by ODE. By using the most current disinhibition model made by Suler and looking at modern cyberpsychology in online games, this paper found eight features that have the possibility to decrease disinhibition amongst users. This paper concludes with a warning that games are becoming more immersive and without the proper authority features, games will increase their disinhibition effect amongst its users.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Ventéjoux, Aude. "Une lecture de la cyberviolence : la rencontre du sujet et du cyberespace dans les infractions à caractère sexuel envers mineurs réalisées sur Internet". Thesis, Rennes 2, 2019. http://www.theses.fr/2019REN20004/document.

Texto completo da fonte
Resumo:
Le développement des technologies de l’information et de la communication s’est accompagné de l’apparition de phénomènes violents et/ou infractionnels, qui se tiennent sur, ou grâce à, Internet. Existe-t-il une spécificité de ces conduites de cyberviolence, qui s’inscrivent dans ce que l’on nomme cyberespace ? La psycho-criminologie et la cyberpsychologie seront convoquées afin de proposer une réponse à cette question. Le présent travail étudiera, dans une approche clinique et qualitative, des situations d’infractions à caractère sexuel envers mineurs réalisées sur Internet. Ce travail proposera, à partir des données recueillies, une grille de lecture de la cyberviolence, qui s’intéressera au rapport du sujet auteur d’infractions avec la conduite infractionnelle, la victime, et le cyberespace. La cyberviolence naît d’une rencontre, celle d’un sujet vulnérable avec un cyberespace porteur d’opportunités. Il s’agira alors d’interroger cette rencontre, afin de saisir les processus et les dynamiques qui l’animent
The development of information and communication technologies was followed by the emergence of violent and/or offensive phenomena that exist on or thanks to the Internet. Is there a specificity to these behaviors of cyberviolence, which are rooted in what one calls cyberspace? This question will be answered partly thanks to psycho-criminological and cyberpsychological theories. This work takes a close look at sex offences against minors on the Internet. Thanks to the collected data, this work will offer a perspective on cyberviolence, with an interest in the relationship between the offender and the offence, the victim, and cyberspace. Cyberviolence arises from an encounter between a vulnerable subject and a cyberspace bearing opportunities. This encounter will thus be questioned, in order to understand the process and dynamics it stems from
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

AlShammari, Norah. "Social Soul". VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5404.

Texto completo da fonte
Resumo:
Twitter has over 313 million users, with 500 million tweets produced each day. Society’s growing dependence on the internet for self-expression shows no sign of abating. However, recent research warns that social media perpetuates loneliness, caused by reduced face-to-face interaction. My thesis analyzes and demonstrates the important role facial expressions play in a conversation’s progress, impacting how people process and relate to what is being said. My work critically assesses communication problems associated with Twitter. By isolating and documenting expressive facial reactions to a curated selection of tweets, the exhibition creates a commentary on our contemporary digital existence, specifically articulating how use of social media limits basic social interaction.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Hordiienko, Kateryna, e Катерина Олександрівна Гордієнко. "The problem of digitalization in psychological and education spheres". Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51068.

Texto completo da fonte
Resumo:
1. Bochelyuk, V.: Didzhy`talizaciya yak faktor formuvannya kognity`vnoyi sfery` [Digitalization as a factor in the formation of the cognitive sphere]. Bulletin of KhNPU named after G. S. Skovoroda “Psychology”, (62), 87-107, Kharkiv (2020). 2. Voiskunsky, A.: Kiberpsikhologiya kak razdel psikhologicheskoj nauki i praktiki [Cyberpsychology as a section of psychological science and practice]. Universum: Bulletin of Herzen University, (4), 88 (2013). 3. Zhernovnikova, O.: Didzhy`talizaciya v osviti [Digitalization in education]. Proceedings of the III International Scientific and Practical Conference “Psychological and pedagogical problems of higher and secondary education in the conditions of modern challenges: theory and practice”, 88-90, Kharkiv (2018). 4. Lubenets, I.: Kibernasy`l`stvo (kiberbuling) sered uchniv zagal`noosvitnix navchal`ny`x zakladiv [Cyberbullying among students of secondary schools]. National Legal Journal: Theory and Practice, 3, 178-182 (2016). 5. Tikhomirov О.: Informaczionny`j vek i teoriya L.S. Vygotskogo [Information age and theory of L.S. Vygotsky]. Psychological journal, 14 (1), 114-119 (1993).
Determining the essence of the digitalization problem in psychological science and education is carried out in the process of studying modern technologies to meet human needs as a subject of the information society, social, cultural and economic trends in the world. Based on the above, digitalization in a broad sense is considered as a process and result of technologization collection, cultivation and dissemination of information using computer technology to meet human needs. At psychology, the problem of digitalization is studied by cyberpsychology which is a branch of psychology that observes mental processes, states, properties and manifestations of their activity (function, communication, behavior) in cyberspace.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Cyberpsychology"

1

Gordo-López, Ángel J., e Ian Parker, eds. Cyberpsychology. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

1956-, Parker Ian, e Gordo-López Ángel J, eds. Cyberpsychology. Basingstoke: Macmillan, 1999.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Attrill, Alison, e Chris Fullwood, eds. Applied Cyberpsychology. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/9781137517036.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Connolly, Irene. An Introduction to Cyberpsychology. 1 Edition. | New York : Routledge, 2016.: Routledge, 2016. http://dx.doi.org/10.4324/9781315741895.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

An introduction to cyberpsychology. New York: Routledge, 2016.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Harley, Dave, Julie Morgan e Hannah Frith. Cyberpsychology as Everyday Digital Experience across the Lifespan. London: Palgrave Macmillan UK, 2018. http://dx.doi.org/10.1057/978-1-137-59200-2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Applied cyberpsychology: Practical applications of cyberpsychological theory and research. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2016.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Cyberpsychology: An Introduction to the Psychology of Human–Computer Interaction. Cambridge: Cambridge University Press, 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Virole, Benoît. Cyberpsychologie: En 200 mots : apprentissage et remédiations, pratiques thérapeutiques, analyse des comportements. Paris: Dunod, 2010.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Cyberpsychology. Oxford University Press, 2015.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Cyberpsychology"

1

Gordo-López, Ángel J., e Ian Parker. "Cyberpsychology: Postdisciplinary Contexts and Projects". In Cyberpsychology, 1–21. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Burman, Erica. "The Child and the Cyborg". In Cyberpsychology, 169–83. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_10.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Heggs, Dan. "Cyberpsychology and Cyborgs". In Cyberpsychology, 184–201. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_11.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Tirado, Francisco Javier. "Against Social Constructionist Cyborgian Territorializations". In Cyberpsychology, 202–17. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_12.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Jones, Steve. "The Cyber and the Subjective". In Cyberpsychology, 221–25. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_13.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Nightingale, Virginia. "Are Media Cyborgs?" In Cyberpsychology, 226–35. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_14.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Sey, James. "The Labouring Body and the Posthuman". In Cyberpsychology, 25–41. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Pérez, Carlos Soldevilla. "Vertiginous Technology: Towards a Psychoanalytic Genealogy of Technique". In Cyberpsychology, 42–58. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Marsden, Jill. "Cyberpsychosis: The Feminization of the Postbiological Body". In Cyberpsychology, 59–76. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

De Jesús, Nydza Correa. "Genealogies of the Self in Virtual-Geographical Reality". In Cyberpsychology, 77–91. London: Macmillan Education UK, 1999. http://dx.doi.org/10.1007/978-1-349-27667-7_5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Cyberpsychology"

1

Fugate, Sunny, Matt Bishop, Cliff Wang e Kimberly Ferguson-Walter. "Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense". In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2022. http://dx.doi.org/10.24251/hicss.2022.274.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Drange, Tom, e Joakim Kargaard. "Cyberpsychology: Psychological Processes That May Affect Dropout Rates among Online IT Security Students". In 10th International Conference on Computer Supported Education. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0006776502520257.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Boss-Victoria, Rena, Tina Jordan, Agnes Richardson, Hal Aubrey, Maurice Johnson, Elijah Cameron e Henry Swanson. "CYBERPSYCHOLOGY REVISITED: CRITICAL ISSUES THAT IMPACT MENTAL HEALTH AND EDUCATIONAL ATTAINMENT IN COMMUNITIES OF COLOR". In 11th International Conference on Education and New Learning Technologies. IATED, 2019. http://dx.doi.org/10.21125/edulearn.2019.1846.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Mercuri, Ilenia. "Social Engineering and Human-Robot Interactions' Risks". In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002199.

Texto completo da fonte
Resumo:
Modern robotics seems to have taken root from the theories of Isaac Asimov, in 1941. One area of research that has become increasingly popular in recent decades is the study of artificial intelligence or A.I., which aims to use machines to solve problems that, according to current opinion, require intelligence. This is related to the study on “Social Robots”. Social Robots are created in order to interact with human beings; they have been designed and programmed to engage with people by leveraging a "human" aspect and various interaction channels, such as speech or non-verbal communication. They therefore readily solicit social responsiveness in people who often attribute human qualities to the robot. Social robots exploit the human propensity for anthropomorphism, and humans tend to trust them more and more. Several issues could arise due to this kind of trust and to the ability of “superintelligence” to "self-evolve", which could lead to the violation of the purposes for which it was designed by humans, becoming a risk to human security and privacy. This kind of threat concerns social engineering, a set of techniques used to convince users to perform a series of actions that allow cybercriminals to gain access to the victims' resources. The Human Factor is the weakest ring of the security chain, and the social engineers exploit Human-Robots Interaction to persuade an individual to provide private information.An important research area that has shown interesting results for the knowledge of the possibility of human interaction with robots is "cyberpsychology". This paper aims to provide insights into how the interaction with social robots could be exploited by humans not only in a positive way but also by using the same techniques of social engineering borrowed from "bad actors" or hackers, to achieve malevolent and harmful purposes for man himself. A series of experiments and interesting research results will be shown as examples. In particular, about the ability of robots to gather personal information and display emotions during the interaction with human beings. Is it possible for social robots to feel and show emotions, and human beings could empathize with them? A broad area of research, which goes by the name of "affective computing", aims to design machines that are able to recognize human emotions and consistently respond to them. The aim is to apply human-human interaction models to human-machine interaction. There is a fine line that separates the opinions of those who argue that, in the future, machines with artificial intelligence could be a valuable aid to humans and those who believe that they represent a huge risk that could endanger human protection systems and safety. It is necessary to examine in depth this new field of cybersecurity to analyze the best path to protect our future. Are social robots a real danger? Keywords: Human Factor, Cybersecurity, Cyberpsychology, Social Engineering Attacks, Human-Robot Interaction, Robotics, Malicious Artificial Intelligence, Affective Computing, Cyber Threats
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia