Social media has become pervasive, impacting the social fabric and culture of our society. This study investigates differences and similarities between students' and faculty's perceptions of social media impact on social behavior of students. Data were collected using a specially designed survey. The sample size was 2605 students and 507 faculty of different genders and ages. Research outcome indicates that students and faculty are familiar with and are immersed in social media use. The findings support the advantages of social media use on students' social behavior and do not indicate any obvious disadvantages. The findings of the study include identification of dominant group perceptions pertaining to advantages and disadvantages of social media use on social behavior of students. Common concerns of the two groups pertaining to students include physical inactivity, social introversion, exposure to bullying and domination attitudes; and mental dullness. These findings can help discern possible issues relating to use of social media affecting social behavior.
{"title":"Perceptions of Social Media Impact on Social Behavior of Students","authors":"K. Hashim, L. Al-Sharqi, I. Kutbi","doi":"10.29333/OJCMT/2574","DOIUrl":"https://doi.org/10.29333/OJCMT/2574","url":null,"abstract":"Social media has become pervasive, impacting the social fabric and culture of our society. This study investigates differences and similarities between students' and faculty's perceptions of social media impact on social behavior of students. Data were collected using a specially designed survey. The sample size was 2605 students and 507 faculty of different genders and ages. Research outcome indicates that students and faculty are familiar with and are immersed in social media use. The findings support the advantages of social media use on students' social behavior and do not indicate any obvious disadvantages. The findings of the study include identification of dominant group perceptions pertaining to advantages and disadvantages of social media use on social behavior of students. Common concerns of the two groups pertaining to students include physical inactivity, social introversion, exposure to bullying and domination attitudes; and mental dullness. These findings can help discern possible issues relating to use of social media affecting social behavior.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121785031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-4666-8793-6.CH017
Z. Minchev
The chapter describes the problem of building cyber threats resilience for the human factor as the technological growth is constantly changing the security landscape of the new digital world. A methodological framework for meeting the problem by using the “scenario method” and experts' support is outlined. An implementation of comprehensive morphological and system analyses of cyber threats are performed, followed by agent based mixed reality validation, incorporating biometrics monitoring. The obtained results demonstrate a correlation of experts' beliefs for cyber threats identification, related to human factor biometric response, whilst using social networks and inhabiting smart environments of living. The achieved results prove “use with care” necessity for new technologies, concerning cyber threats landscape for assuring a sustainable resilience balance from the human factor perspective.
{"title":"Human Factor Role for Cyber Threats Resilience","authors":"Z. Minchev","doi":"10.4018/978-1-4666-8793-6.CH017","DOIUrl":"https://doi.org/10.4018/978-1-4666-8793-6.CH017","url":null,"abstract":"The chapter describes the problem of building cyber threats resilience for the human factor as the technological growth is constantly changing the security landscape of the new digital world. A methodological framework for meeting the problem by using the “scenario method” and experts' support is outlined. An implementation of comprehensive morphological and system analyses of cyber threats are performed, followed by agent based mixed reality validation, incorporating biometrics monitoring. The obtained results demonstrate a correlation of experts' beliefs for cyber threats identification, related to human factor biometric response, whilst using social networks and inhabiting smart environments of living. The achieved results prove “use with care” necessity for new technologies, concerning cyber threats landscape for assuring a sustainable resilience balance from the human factor perspective.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115412513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7912-0.ch008
Evon M. O. Abu-Taieh, A. Alfaries, Shaha T. Al-Otaibi, G. Aldehim
Cyberspace and the existence of the internet allows different types of crimes to appear. Hence, there is a need for new laws to be set with a collective, comprehensive, view of crime and a global understanding. This article studies 5 different countries' laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These different countries issued different laws at different times, some in 2007 others are as new as 2015. The article looks at the laws from an academic definition of different crimes, and also describes the laws from a perspective of each country.
{"title":"Cyber Security Crime and Punishment","authors":"Evon M. O. Abu-Taieh, A. Alfaries, Shaha T. Al-Otaibi, G. Aldehim","doi":"10.4018/978-1-5225-7912-0.ch008","DOIUrl":"https://doi.org/10.4018/978-1-5225-7912-0.ch008","url":null,"abstract":"Cyberspace and the existence of the internet allows different types of crimes to appear. Hence, there is a need for new laws to be set with a collective, comprehensive, view of crime and a global understanding. This article studies 5 different countries' laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These different countries issued different laws at different times, some in 2007 others are as new as 2015. The article looks at the laws from an academic definition of different crimes, and also describes the laws from a perspective of each country.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116787303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch070
Subhi Can Sarıgöllü, E. Aksakal, Mine Galip Koca, Ece Akten, Yonca Aslanbay
As the front end of the digitized commercial world, corporations, marketers, and advertisers are under the spotlight for taking advantage of some part of the big data provided by consumers via their digital presence and digital advertising. Now, collectors and users of that data have escalated the level of their asymmetric power with scope and depth of the instant and historical data on consumers. Since consumers have lost the ownership (control) over their own data, their reaction ranges from complete opposition to voluntary submission. This chapter investigates psychological and societal reasons for this variety in consumer behavior and proposes that a contractual solution could promote a beneficial end to all parties through transparency and mutual power.
{"title":"Volunteered Surveillance","authors":"Subhi Can Sarıgöllü, E. Aksakal, Mine Galip Koca, Ece Akten, Yonca Aslanbay","doi":"10.4018/978-1-5225-7909-0.ch070","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch070","url":null,"abstract":"As the front end of the digitized commercial world, corporations, marketers, and advertisers are under the spotlight for taking advantage of some part of the big data provided by consumers via their digital presence and digital advertising. Now, collectors and users of that data have escalated the level of their asymmetric power with scope and depth of the instant and historical data on consumers. Since consumers have lost the ownership (control) over their own data, their reaction ranges from complete opposition to voluntary submission. This chapter investigates psychological and societal reasons for this variety in consumer behavior and proposes that a contractual solution could promote a beneficial end to all parties through transparency and mutual power.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131684779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch052
Emily I.M. Collins, A. Cox, Ruby Wootton
Smartphones are now ubiquitous and valuable in many professions and yet have also been blamed for creating an ‘always on' culture, blurring boundaries between work and home. Research has shown that checking e-mails out-of-hours via computer makes workers feel more overloaded with work but also increases their sense of coping. A total of 94 participants completed a survey exploring whether the same pattern would emerge for accessing e-mail on smartphones, showing that those who use smartphones for work e-mail experienced lower levels of overload, but not coping, and push notifications were associated with greater use of smartphones for e-mail. However, there were no significant correlations between coping or overload and e-mail use or quantity, suggesting that lower overload is not due to the ability to processes or read more e-mails outside of work.
{"title":"Out of Work, Out of Mind?","authors":"Emily I.M. Collins, A. Cox, Ruby Wootton","doi":"10.4018/978-1-5225-7909-0.ch052","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch052","url":null,"abstract":"Smartphones are now ubiquitous and valuable in many professions and yet have also been blamed for creating an ‘always on' culture, blurring boundaries between work and home. Research has shown that checking e-mails out-of-hours via computer makes workers feel more overloaded with work but also increases their sense of coping. A total of 94 participants completed a survey exploring whether the same pattern would emerge for accessing e-mail on smartphones, showing that those who use smartphones for work e-mail experienced lower levels of overload, but not coping, and push notifications were associated with greater use of smartphones for e-mail. However, there were no significant correlations between coping or overload and e-mail use or quantity, suggesting that lower overload is not due to the ability to processes or read more e-mails outside of work.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115488645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch011
Michelle F. Wright
The present study examined coping strategies for cyber victimization among 270 (130 women) emerging adults, and how these strategies related to cyber aggression one year later (Time 2). The most frequently utilized coping strategies among emerging adults were telling one's friends and ignoring the aggressor. The coping strategies of telling no one, getting revenge against the aggressor, pretending it didn't happen, waiting for the aggressor to stop, and crying were related to cyber victimization one year later. Blocking the aggressor and getting revenge against the aggressor were associated with Time 2 cyber aggression perpetration. Tell my friends related negatively to their involvement in cyber aggression. This research has implications for interventions aimed at reducing these behaviors among emerging adults.
{"title":"Emerging Adults' Coping Strategies","authors":"Michelle F. Wright","doi":"10.4018/978-1-5225-7909-0.ch011","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch011","url":null,"abstract":"The present study examined coping strategies for cyber victimization among 270 (130 women) emerging adults, and how these strategies related to cyber aggression one year later (Time 2). The most frequently utilized coping strategies among emerging adults were telling one's friends and ignoring the aggressor. The coping strategies of telling no one, getting revenge against the aggressor, pretending it didn't happen, waiting for the aggressor to stop, and crying were related to cyber victimization one year later. Blocking the aggressor and getting revenge against the aggressor were associated with Time 2 cyber aggression perpetration. Tell my friends related negatively to their involvement in cyber aggression. This research has implications for interventions aimed at reducing these behaviors among emerging adults.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114764116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch029
M. Tan
In this article, the subject of online religion and how it can be researched is discussed. The dynamics of religious experience, authority, communication and more is subject of much discussion both in academia and religious discourses primarily because of the seemingly immaterial realm that is cyberspace. This article examines unique aspects of the nature of online religion and pays particular attention to the fluidity of online/offline relations and the subject of “authenticity” in the realm of online religion. Following from that is the discussion of how actor-network theory (ANT), first developed by Bruno Latour, can be deployed as a useful methodological approach to researching online religion, and to navigate potentially deterministic and oppositional discourses of online/offline relations.
{"title":"Authenticity in Online Religion","authors":"M. Tan","doi":"10.4018/978-1-5225-7909-0.ch029","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch029","url":null,"abstract":"In this article, the subject of online religion and how it can be researched is discussed. The dynamics of religious experience, authority, communication and more is subject of much discussion both in academia and religious discourses primarily because of the seemingly immaterial realm that is cyberspace. This article examines unique aspects of the nature of online religion and pays particular attention to the fluidity of online/offline relations and the subject of “authenticity” in the realm of online religion. Following from that is the discussion of how actor-network theory (ANT), first developed by Bruno Latour, can be deployed as a useful methodological approach to researching online religion, and to navigate potentially deterministic and oppositional discourses of online/offline relations.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129222111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch074
E. Melonashi
The present chapter aims to explore the relationship between social media and identity by reviewing theoretical frameworks as well as empirical studies on the topic. Considering the complexity of the concept of identity, a multidisciplinary theoretical approach is provided, including Psychological Theories, Sociological Theories and Communication Theories. These theories are revisited in the context of online identity formation and communication through social media. Different aspects of identity such as gender identity, professional identity, political identity etc., are discussed and illustrated through empirical studies in the field. Moreover, the role of social media as a factor that might either promote or hinder identity development is also discussed (e.g., phenomena such as cyber-bulling and internet addiction). Finally recommendations and suggestions for future research are provided, including the need for multidisciplinary theoretical frameworks to the investigation of the relationships between social media and identity.
{"title":"Social Media and Identity","authors":"E. Melonashi","doi":"10.4018/978-1-5225-7909-0.ch074","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch074","url":null,"abstract":"The present chapter aims to explore the relationship between social media and identity by reviewing theoretical frameworks as well as empirical studies on the topic. Considering the complexity of the concept of identity, a multidisciplinary theoretical approach is provided, including Psychological Theories, Sociological Theories and Communication Theories. These theories are revisited in the context of online identity formation and communication through social media. Different aspects of identity such as gender identity, professional identity, political identity etc., are discussed and illustrated through empirical studies in the field. Moreover, the role of social media as a factor that might either promote or hinder identity development is also discussed (e.g., phenomena such as cyber-bulling and internet addiction). Finally recommendations and suggestions for future research are provided, including the need for multidisciplinary theoretical frameworks to the investigation of the relationships between social media and identity.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122236111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-2960-6.CH007
Michelle F. Wright
Emerging adults are actively engaged in a digital world in which blogs, social networking sites, watching videos, and instant messaging are a typical part of their daily lives. Their immersion in the digital world has occurred for as long as many of them can remember, with many not knowing a world without our modern technological advances. Although the digital age has brought us many conveniences in our daily lives, there is a darker side to emerging adults' involvement with these technologies, such as cyber aggression involvement. This chapter draws on research from around the world, utilizing a variety of research designs, to describe the nature, extent, and consequences associated with emerging adults' involvement in cyber aggression. Concluding the chapter is a solutions and recommendation section in which various recommendations are given to help colleges and universities strive to reduce cyber aggression on their campuses among their students.
{"title":"Cyber-Aggression in Higher Education","authors":"Michelle F. Wright","doi":"10.4018/978-1-5225-2960-6.CH007","DOIUrl":"https://doi.org/10.4018/978-1-5225-2960-6.CH007","url":null,"abstract":"Emerging adults are actively engaged in a digital world in which blogs, social networking sites, watching videos, and instant messaging are a typical part of their daily lives. Their immersion in the digital world has occurred for as long as many of them can remember, with many not knowing a world without our modern technological advances. Although the digital age has brought us many conveniences in our daily lives, there is a darker side to emerging adults' involvement with these technologies, such as cyber aggression involvement. This chapter draws on research from around the world, utilizing a variety of research designs, to describe the nature, extent, and consequences associated with emerging adults' involvement in cyber aggression. Concluding the chapter is a solutions and recommendation section in which various recommendations are given to help colleges and universities strive to reduce cyber aggression on their campuses among their students.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115667746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch059
M. Crosston
This analysis sheds light on where cyber disobedience fits in to larger society positively and does not deserve to be summarily thrown in with all types of illegal cyber acts. Making these legal delineations does not solve all of the problems a state will face in the new cyber age. But they will go a long way in helping a democratic state honor its foundation of civil liberties and freedom and avoid becoming a perpetuator of virtual hyperbole and digital panic. In so doing, it guarantees the people greater freedom for themselves while also having greater confidence in the fairness of their own government. This, in place of the chaotic, ambiguous, and uninformed legal and political environment governing cyber action today, would be a dramatic improvement.
{"title":"The Fight for Cyber Thoreau","authors":"M. Crosston","doi":"10.4018/978-1-5225-7909-0.ch059","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch059","url":null,"abstract":"This analysis sheds light on where cyber disobedience fits in to larger society positively and does not deserve to be summarily thrown in with all types of illegal cyber acts. Making these legal delineations does not solve all of the problems a state will face in the new cyber age. But they will go a long way in helping a democratic state honor its foundation of civil liberties and freedom and avoid becoming a perpetuator of virtual hyperbole and digital panic. In so doing, it guarantees the people greater freedom for themselves while also having greater confidence in the fairness of their own government. This, in place of the chaotic, ambiguous, and uninformed legal and political environment governing cyber action today, would be a dramatic improvement.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130037264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}