Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch031
Jannatul Akmam, N. Huq
With the marking of the digital age, all forms of digital technologies become a part of the existence of human life, thereby, an extension of self. The ever-increasing influence of the virtual world or Internet cultures demands to read its complex relationship with human existence in a digital world. Theory of psychoanalysis, specifically object-relation theory can be called forth to analyze this multifaceted relationship. Within the light of this theory, Internet cultures are acting as “objects” like games, memes, chat rooms, social net etc. and the virtual world can be interpreted as the “object world”. The chapter is interested in reading the deep psychoanalytic experience of people (with a special focus on the youth) in reference to their relationship with the virtual arena. The experience can be associated with religion, spirituality, perception of beauty, sexuality, Identity formation and so on. Their behavior and responses to the virtual world will be framed within the psychoanalytic paradigm in the light of “object relation theory” in a digital age.
{"title":"Living Parallel-ly in Real and Virtual","authors":"Jannatul Akmam, N. Huq","doi":"10.4018/978-1-5225-7909-0.ch031","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch031","url":null,"abstract":"With the marking of the digital age, all forms of digital technologies become a part of the existence of human life, thereby, an extension of self. The ever-increasing influence of the virtual world or Internet cultures demands to read its complex relationship with human existence in a digital world. Theory of psychoanalysis, specifically object-relation theory can be called forth to analyze this multifaceted relationship. Within the light of this theory, Internet cultures are acting as “objects” like games, memes, chat rooms, social net etc. and the virtual world can be interpreted as the “object world”. The chapter is interested in reading the deep psychoanalytic experience of people (with a special focus on the youth) in reference to their relationship with the virtual arena. The experience can be associated with religion, spirituality, perception of beauty, sexuality, Identity formation and so on. Their behavior and responses to the virtual world will be framed within the psychoanalytic paradigm in the light of “object relation theory” in a digital age.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128688996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch009
Harry Brown III
The field of cybersecurity crosses multiple domains as it has risen to affect state governance. The Internet has enabled aspects of connectedness and capabilities that have the potential to effect state power. Such conditions affect the standing of nation-states within the international political system and their relation to other states. This is a matter of cyber-relations, where the behavior of states towards each other is based on the comparative cyber-capability of the state. Emerging conditions include the ability of non-state actors to wield similar cyber-power and affect state governance, and affect state operations and its contract with its constituents (contract alluding to the provisions for the public good). This research addresses the notion of non-state actors within this context, specifically, proposing and analytical framework for analyzing cyber threats from non-state actors.
{"title":"SPCTA","authors":"Harry Brown III","doi":"10.4018/978-1-5225-7909-0.ch009","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch009","url":null,"abstract":"The field of cybersecurity crosses multiple domains as it has risen to affect state governance. The Internet has enabled aspects of connectedness and capabilities that have the potential to effect state power. Such conditions affect the standing of nation-states within the international political system and their relation to other states. This is a matter of cyber-relations, where the behavior of states towards each other is based on the comparative cyber-capability of the state. Emerging conditions include the ability of non-state actors to wield similar cyber-power and affect state governance, and affect state operations and its contract with its constituents (contract alluding to the provisions for the public good). This research addresses the notion of non-state actors within this context, specifically, proposing and analytical framework for analyzing cyber threats from non-state actors.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132039454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch079
T. Lancaster
Many students appear to be continually connected to social media sites such as Facebook. Such social media sites can be pervasive in nature. The use of these sites through mobile devices often extends into the classroom, sometimes to the detriment of scheduled teaching activities. Further, many students do not seem to be aware of the negative effect that ill-considered information placed on social media sites can have towards their future employment. This chapter reviews the positives and negatives of social media as it relates to the future employability of students. Due to the changing nature of this field, the chapter is largely presented from practical experience, rather than a traditional academic research-led approach. Much of the focus is on the ways that students can present themselves online in a manner which should encourage employers to offer students jobs and placement opportunities. The chapter reviews a number of the major Websites where students should establish professional profiles. It also looks at the overall need for students to establish a professional presence online and show that they are a desirable employee. The chapter concludes by looking at the challenges involved with integrating the teaching of employability through social media into existing teaching. A number of research areas for further consideration are also presented.
{"title":"Teaching Students about Online Professionalism","authors":"T. Lancaster","doi":"10.4018/978-1-5225-7909-0.ch079","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch079","url":null,"abstract":"Many students appear to be continually connected to social media sites such as Facebook. Such social media sites can be pervasive in nature. The use of these sites through mobile devices often extends into the classroom, sometimes to the detriment of scheduled teaching activities. Further, many students do not seem to be aware of the negative effect that ill-considered information placed on social media sites can have towards their future employment. This chapter reviews the positives and negatives of social media as it relates to the future employability of students. Due to the changing nature of this field, the chapter is largely presented from practical experience, rather than a traditional academic research-led approach. Much of the focus is on the ways that students can present themselves online in a manner which should encourage employers to offer students jobs and placement opportunities. The chapter reviews a number of the major Websites where students should establish professional profiles. It also looks at the overall need for students to establish a professional presence online and show that they are a desirable employee. The chapter concludes by looking at the challenges involved with integrating the teaching of employability through social media into existing teaching. A number of research areas for further consideration are also presented.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"429 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133751782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch065
Penelope Wang
Innovation and technological advancements have seen many devices and systems being linked up on to the Internet. Such devices and systems include personal medical devices like insulin pumps and pacemakers, cars, as well as critical infrastructure like power grids and traffic light systems. However, recent research by cyber security experts has revealed that these critical devices and systems are highly vulnerable to being hacked into and manipulated. Should such an attack be carried out successfully by bad actors, like violent extremists, this could result in physical injury or even death. Hence, this chapter aims to bring awareness on the kinetic cyber threat by highlighting various forms of kinetic cyber, and the vulnerabilities that make these devices and systems susceptible. In addition, this chapter introduces the motivations and characteristics of violent extremists who might engage in kinetic cyber, and ends off by proposing some recommended directions to counter this threat.
{"title":"Death by Hacking","authors":"Penelope Wang","doi":"10.4018/978-1-5225-7909-0.ch065","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch065","url":null,"abstract":"Innovation and technological advancements have seen many devices and systems being linked up on to the Internet. Such devices and systems include personal medical devices like insulin pumps and pacemakers, cars, as well as critical infrastructure like power grids and traffic light systems. However, recent research by cyber security experts has revealed that these critical devices and systems are highly vulnerable to being hacked into and manipulated. Should such an attack be carried out successfully by bad actors, like violent extremists, this could result in physical injury or even death. Hence, this chapter aims to bring awareness on the kinetic cyber threat by highlighting various forms of kinetic cyber, and the vulnerabilities that make these devices and systems susceptible. In addition, this chapter introduces the motivations and characteristics of violent extremists who might engage in kinetic cyber, and ends off by proposing some recommended directions to counter this threat.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115689328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch018
Latifa Chaari
This chapter aims at better understanding the behavior of the Internet user. It suggests studying the role of communication on the trust of Internet users towards commercial Websites. In order to realize this research, the authors mobilized the Communicative Action Theory of Jürgen Habermas (1987). Therefore, they have brought a new perspective in understanding online trust following action theory. For Habermas, communication is an action that depends on contextual, cultural, and human factors, which cannot be reduced to deterministic mechanisms. He deals with three types of action, which an actor might pursue following his interests, which can be instrumental, strategic, or emancipatory. The instrumental and strategic are purposive-rational actions, which aim at achieving success and at developing a calculated trust based on calculation of the advantages and the costs of the relation, whereas, the communicative action is coordinated by mutual understanding that allows the development of a relational trust based on social interactions. In communicative action, mutual understanding through language allows the social integration of actors and the coordination of their plans and their different interests. In this case, trust is based on a common definition of the situation and the resolution of conflicts of interests between actors. Internet is a medium of communication that can support the three kinds of action. The instrumental and strategic actions allow the development of calculated trust, whereas the communicative action allows the development of relational trust based on social interaction and mutual comprehension.
{"title":"The Role of Communication in Online Trust","authors":"Latifa Chaari","doi":"10.4018/978-1-5225-7909-0.ch018","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch018","url":null,"abstract":"This chapter aims at better understanding the behavior of the Internet user. It suggests studying the role of communication on the trust of Internet users towards commercial Websites. In order to realize this research, the authors mobilized the Communicative Action Theory of Jürgen Habermas (1987). Therefore, they have brought a new perspective in understanding online trust following action theory. For Habermas, communication is an action that depends on contextual, cultural, and human factors, which cannot be reduced to deterministic mechanisms. He deals with three types of action, which an actor might pursue following his interests, which can be instrumental, strategic, or emancipatory. The instrumental and strategic are purposive-rational actions, which aim at achieving success and at developing a calculated trust based on calculation of the advantages and the costs of the relation, whereas, the communicative action is coordinated by mutual understanding that allows the development of a relational trust based on social interactions. In communicative action, mutual understanding through language allows the social integration of actors and the coordination of their plans and their different interests. In this case, trust is based on a common definition of the situation and the resolution of conflicts of interests between actors. Internet is a medium of communication that can support the three kinds of action. The instrumental and strategic actions allow the development of calculated trust, whereas the communicative action allows the development of relational trust based on social interaction and mutual comprehension.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131739872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7909-0.ch047
Lauren Norrie, R. Murray-Smith
Notification displays have the potential to make smartphone notifications easier to manage when a user is committed to a primary task. The authors investigate the impact of negotiating notifications with six notification displays on a typing task. The results from their lab experiment with 30 participants show that desktop pop-ups were preferred significantly most, the display choice that required the fewest actions to read notifications, and the most actions to respond. The notification bar was least preferred, which required the most actions to read a notification, and the fewest actions to respond. This work is a well-controlled pre-cursor to the application of notification displays in social scenarios. The results motivate the use of external notification displays to manage attention around a smartphone.
{"title":"Notification Display Choice for Smartphone Users","authors":"Lauren Norrie, R. Murray-Smith","doi":"10.4018/978-1-5225-7909-0.ch047","DOIUrl":"https://doi.org/10.4018/978-1-5225-7909-0.ch047","url":null,"abstract":"Notification displays have the potential to make smartphone notifications easier to manage when a user is committed to a primary task. The authors investigate the impact of negotiating notifications with six notification displays on a typing task. The results from their lab experiment with 30 participants show that desktop pop-ups were preferred significantly most, the display choice that required the fewest actions to read notifications, and the most actions to respond. The notification bar was least preferred, which required the most actions to read a notification, and the fewest actions to respond. This work is a well-controlled pre-cursor to the application of notification displays in social scenarios. The results motivate the use of external notification displays to manage attention around a smartphone.","PeriodicalId":263095,"journal":{"name":"Multigenerational Online Behavior and Media Use","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132197001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}