Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7128-5.CH002
J. Chapin
The purpose of this chapter is to document the extent of Facebook use and cyberbullying among adolescents. It is based on a study theoretically grounded in third-person perception (TPP), the belief that media messages affect other people more than oneself. As Facebook establishes itself as the dominant social network, users expose themselves to a level of bullying not possible in the analog world. The study found that 84% of adolescents (middle school through college undergraduates) use Facebook, and that most users log on daily. While 30% of the sample reported being cyberbullied, only 12.5% quit using the site and only 18% told a parent or school official. Despite heavy use and exposure, adolescents exhibit TPP, believing others are more likely to be negatively affected by Facebook use. A range of self-protective behaviors from precautionary (deleting or blocking abusive users) to reactionary (quitting Facebook) were related to decreased degrees of TPP. Implications for prevention education are discussed.
{"title":"Adolescents, Third-Person Perception, and Facebook","authors":"J. Chapin","doi":"10.4018/978-1-5225-7128-5.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-7128-5.CH002","url":null,"abstract":"The purpose of this chapter is to document the extent of Facebook use and cyberbullying among adolescents. It is based on a study theoretically grounded in third-person perception (TPP), the belief that media messages affect other people more than oneself. As Facebook establishes itself as the dominant social network, users expose themselves to a level of bullying not possible in the analog world. The study found that 84% of adolescents (middle school through college undergraduates) use Facebook, and that most users log on daily. While 30% of the sample reported being cyberbullied, only 12.5% quit using the site and only 18% told a parent or school official. Despite heavy use and exposure, adolescents exhibit TPP, believing others are more likely to be negatively affected by Facebook use. A range of self-protective behaviors from precautionary (deleting or blocking abusive users) to reactionary (quitting Facebook) were related to decreased degrees of TPP. Implications for prevention education are discussed.","PeriodicalId":340894,"journal":{"name":"Analyzing Human Behavior in Cyberspace","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7128-5.CH003
S. Ezoe, M. Toda
Smartphone use has rapidly developed in recent years and become an established part of daily life in many countries. As various applications have been developed as communication tools for use with smartphones, allowing the internet to become more accessible, patterns of dependence have been routinely reported particularly among adolescents. In this chapter, the authors reviewed the previous studies about the relationships of smartphone dependence to chronotype and gender among adolescents. Chronotype refers to preference for sleep-wake timing: for example, morning types go to bed, get up, and experience peak alertness and performance earlier in the day than do evening types. It was found that the light emitted from media screen in the evening before bedtime may delay the circadian rhythm. In addition, excessive smartphone use may lead to sleep disturbances. Recent studies suggested that evening types and females may be more prone to become smartphone dependent.
{"title":"Relationships of Smartphone Dependence With Chronotype and Gender in Adolescence","authors":"S. Ezoe, M. Toda","doi":"10.4018/978-1-5225-7128-5.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-7128-5.CH003","url":null,"abstract":"Smartphone use has rapidly developed in recent years and become an established part of daily life in many countries. As various applications have been developed as communication tools for use with smartphones, allowing the internet to become more accessible, patterns of dependence have been routinely reported particularly among adolescents. In this chapter, the authors reviewed the previous studies about the relationships of smartphone dependence to chronotype and gender among adolescents. Chronotype refers to preference for sleep-wake timing: for example, morning types go to bed, get up, and experience peak alertness and performance earlier in the day than do evening types. It was found that the light emitted from media screen in the evening before bedtime may delay the circadian rhythm. In addition, excessive smartphone use may lead to sleep disturbances. Recent studies suggested that evening types and females may be more prone to become smartphone dependent.","PeriodicalId":340894,"journal":{"name":"Analyzing Human Behavior in Cyberspace","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7128-5.CH004
Xiaoqian Liu, T. Zhu
In this chapter, a kind of emotion recognition method based on gait using a customized smart bracelet with a built-in acceleration sensor was introduced in detail. The results showed that the classification accuracies of angry-neutral, happy-neutral, angry-happy, and angry-happy-neutral using the acceleration data of wrist are 91.3%, 88.5%, 88.5%, and 81.2%, respectively. Besides, the wearable devices and motion-sensing technology application in psychology research have been further discussed, and non-contact emotion identification and mental health monitoring based on offline behaviors were reviewed summarily.
{"title":"Automatical Emotion Recognition Based on Daily Gait","authors":"Xiaoqian Liu, T. Zhu","doi":"10.4018/978-1-5225-7128-5.CH004","DOIUrl":"https://doi.org/10.4018/978-1-5225-7128-5.CH004","url":null,"abstract":"In this chapter, a kind of emotion recognition method based on gait using a customized smart bracelet with a built-in acceleration sensor was introduced in detail. The results showed that the classification accuracies of angry-neutral, happy-neutral, angry-happy, and angry-happy-neutral using the acceleration data of wrist are 91.3%, 88.5%, 88.5%, and 81.2%, respectively. Besides, the wearable devices and motion-sensing technology application in psychology research have been further discussed, and non-contact emotion identification and mental health monitoring based on offline behaviors were reviewed summarily.","PeriodicalId":340894,"journal":{"name":"Analyzing Human Behavior in Cyberspace","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115496822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7128-5.CH009
C. Patro
The emergence and rapid escalation of e-retailing has triggered many changes in daily life of the shoppers as well as the marketers. E-retailing is playing a major role in the Indian economy and is expected to change the current scenario of shopping from physical stores to e-stores. Similarly, changes in consumers' attitudes along with the availability of cheaper and reliable technology have led to a significant growth in online sales around the world. The chapter aims to examine the shoppers' attitudes towards e-shopping and also to find the critical reasons for not shopping through online. The results reveal that the shoppers are still hesitating to purchase online. The most important reasons for not shopping online are preferring to buy by touching and feeling, online security and privacy, and customer service quality. The factors influencing to buy online are being able to get detailed product information, product delivery, convenience, product quality, and competitive prices. These results also have some practical implications for managers and strategists of e-stores.
{"title":"Predicting Shoppers' Acceptance of E-Shopping on the Internet","authors":"C. Patro","doi":"10.4018/978-1-5225-7128-5.CH009","DOIUrl":"https://doi.org/10.4018/978-1-5225-7128-5.CH009","url":null,"abstract":"The emergence and rapid escalation of e-retailing has triggered many changes in daily life of the shoppers as well as the marketers. E-retailing is playing a major role in the Indian economy and is expected to change the current scenario of shopping from physical stores to e-stores. Similarly, changes in consumers' attitudes along with the availability of cheaper and reliable technology have led to a significant growth in online sales around the world. The chapter aims to examine the shoppers' attitudes towards e-shopping and also to find the critical reasons for not shopping through online. The results reveal that the shoppers are still hesitating to purchase online. The most important reasons for not shopping online are preferring to buy by touching and feeling, online security and privacy, and customer service quality. The factors influencing to buy online are being able to get detailed product information, product delivery, convenience, product quality, and competitive prices. These results also have some practical implications for managers and strategists of e-stores.","PeriodicalId":340894,"journal":{"name":"Analyzing Human Behavior in Cyberspace","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133571531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7128-5.CH005
Nan Zhao, T. Zhu
As today's online social network (OSN) has become a part of our daily life, the huge amount of OSN behavior data could be a new data source to detect and understand individual differences, especially on mental aspects. Based on the findings revealing the relationships between personality and online behavior records, the authors tried to extract relevant features from both OSN usage behaviors and OSN textual posts, and trained models by machine learning methods to predict the OSN user's personality. The results showed fairly good predictive accuracy in Chinese OSN. The authors also reviewed the same kind of studies in more pervasive OSNs, focusing on what behavior data are used in predicting psychological profiles and how to use them effectively. It is foreseeable that more types of OSN data could be utilized in recognizing more psychological indices, and the predictive accuracy would be further improved. Meanwhile, the model-predicted psychological profiles are becoming an option of measurements in psychological studies, when the classical methods are not applicable.
随着网络社交网络OSN (online social network)已经成为我们日常生活的一部分,海量的OSN行为数据可以成为检测和理解个体差异,尤其是心理差异的新数据源。基于性格与网络行为记录之间的关系,作者尝试从OSN使用行为和OSN文本帖子中提取相关特征,并通过机器学习方法训练模型来预测OSN用户的性格。结果表明,汉语OSN的预测准确率较高。作者还回顾了在更普遍的生理特征网络系统中进行的同类研究,重点关注哪些行为数据被用于预测心理特征,以及如何有效地使用它们。可以预见,可以利用更多类型的OSN数据来识别更多的心理指标,预测准确率将进一步提高。与此同时,模型预测的心理轮廓正在成为经典测量方法不适用的心理学研究的一种选择。
{"title":"Psychological Profiles Prediction Using Online Social Network Behavior Data","authors":"Nan Zhao, T. Zhu","doi":"10.4018/978-1-5225-7128-5.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-7128-5.CH005","url":null,"abstract":"As today's online social network (OSN) has become a part of our daily life, the huge amount of OSN behavior data could be a new data source to detect and understand individual differences, especially on mental aspects. Based on the findings revealing the relationships between personality and online behavior records, the authors tried to extract relevant features from both OSN usage behaviors and OSN textual posts, and trained models by machine learning methods to predict the OSN user's personality. The results showed fairly good predictive accuracy in Chinese OSN. The authors also reviewed the same kind of studies in more pervasive OSNs, focusing on what behavior data are used in predicting psychological profiles and how to use them effectively. It is foreseeable that more types of OSN data could be utilized in recognizing more psychological indices, and the predictive accuracy would be further improved. Meanwhile, the model-predicted psychological profiles are becoming an option of measurements in psychological studies, when the classical methods are not applicable.","PeriodicalId":340894,"journal":{"name":"Analyzing Human Behavior in Cyberspace","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127509794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7128-5.CH008
David Messer, Caroline E. Shanholtz, Abhik Chowdhury
The internet holds considerable potential to improve the world's health. Noncommunicable, or so-called lifestyle, diseases are responsible for more than three-fifths of all deaths worldwide. With over half of the world's population now online, public health officials and entrepreneurs have developed a growing array of digitally mediated interventions to encourage healthy lifestyle choices. In this chapter, the authors discuss online and digitally mediated interventions, provide examples of their use, and summarize recommendations for future research and development. Particular attention is paid to online education, social media support groups, adaptive and gamified interventions, and emerging technologies such as ambient and wearable sensors and artificial intelligence.
{"title":"Digital Behavior Change Interventions","authors":"David Messer, Caroline E. Shanholtz, Abhik Chowdhury","doi":"10.4018/978-1-5225-7128-5.CH008","DOIUrl":"https://doi.org/10.4018/978-1-5225-7128-5.CH008","url":null,"abstract":"The internet holds considerable potential to improve the world's health. Noncommunicable, or so-called lifestyle, diseases are responsible for more than three-fifths of all deaths worldwide. With over half of the world's population now online, public health officials and entrepreneurs have developed a growing array of digitally mediated interventions to encourage healthy lifestyle choices. In this chapter, the authors discuss online and digitally mediated interventions, provide examples of their use, and summarize recommendations for future research and development. Particular attention is paid to online education, social media support groups, adaptive and gamified interventions, and emerging technologies such as ambient and wearable sensors and artificial intelligence.","PeriodicalId":340894,"journal":{"name":"Analyzing Human Behavior in Cyberspace","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130658279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7128-5.CH012
Kathryn C. Seigfried-Spellar
The impact of both intentional and unintentional exposure to internet pornography on adolescents has been debated in the literature for decades. However, the differences in the operational definitions of pornography and exposure, not to mention the differences in methodology and sampling, make it difficult to synthesize findings and identify patterns across studies. In addition, the majority of the research has employed a rather broad measure of “exposure to general pornography” by adolescents in order to understand the impact of early exposure to pornography; however, internet pornography includes a wide range of sexually explicit materials, not just adult pornography. Thus, the goal of this chapter is to explore the relationship between nondeviant pornography use and deviant pornography use (e.g., child pornography) by discussing the Seigfried-Spellar study which examined the role of individual differences and age of onset in deviant pornography use.
{"title":"Deviant Pornography Use","authors":"Kathryn C. Seigfried-Spellar","doi":"10.4018/978-1-5225-7128-5.CH012","DOIUrl":"https://doi.org/10.4018/978-1-5225-7128-5.CH012","url":null,"abstract":"The impact of both intentional and unintentional exposure to internet pornography on adolescents has been debated in the literature for decades. However, the differences in the operational definitions of pornography and exposure, not to mention the differences in methodology and sampling, make it difficult to synthesize findings and identify patterns across studies. In addition, the majority of the research has employed a rather broad measure of “exposure to general pornography” by adolescents in order to understand the impact of early exposure to pornography; however, internet pornography includes a wide range of sexually explicit materials, not just adult pornography. Thus, the goal of this chapter is to explore the relationship between nondeviant pornography use and deviant pornography use (e.g., child pornography) by discussing the Seigfried-Spellar study which examined the role of individual differences and age of onset in deviant pornography use.","PeriodicalId":340894,"journal":{"name":"Analyzing Human Behavior in Cyberspace","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127808697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7128-5.CH006
A. Arslan
Based on the results of the evaluation of an embedded engineering learning on social cloud model, the author suggests whether an “Imagineering” approach to learning is and complies with design principles leading to creative products. It can also provide an evidence for whether the SC supports co-learning environments which contributes to the efficiency of the process. Not only training institutions, but also knowledge enterprises should have a ready infrastructure for network systems to access the cloud technology. This chapter discusses the options of a design model on social cloud.
{"title":"A Design Model of Embedded Engineering Learning on Social Cloud","authors":"A. Arslan","doi":"10.4018/978-1-5225-7128-5.CH006","DOIUrl":"https://doi.org/10.4018/978-1-5225-7128-5.CH006","url":null,"abstract":"Based on the results of the evaluation of an embedded engineering learning on social cloud model, the author suggests whether an “Imagineering” approach to learning is and complies with design principles leading to creative products. It can also provide an evidence for whether the SC supports co-learning environments which contributes to the efficiency of the process. Not only training institutions, but also knowledge enterprises should have a ready infrastructure for network systems to access the cloud technology. This chapter discusses the options of a design model on social cloud.","PeriodicalId":340894,"journal":{"name":"Analyzing Human Behavior in Cyberspace","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115444551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7128-5.CH011
X. Liu
The major purpose of this chapter is to understand average user's decision-making process in cybersecurity by reviewing and integrating several major theoretical frameworks discussed and applied in decision making processes in cybersecurity. The average users are the ones who do not realize or understand when or how to perform security-critical decisions, the ones who are unmotivated to comply with company and school cybersecurity policies and procedures due to inconvenience, and the ones who do not have sufficient knowledge in cybersecurity to make sound security decisions. It is important to discuss and understand the role of such users and their behaviors based on systematic analysis so that we can identify potential factors causing “poor” security decisions and find ways to reduce the likelihood of being victims of cyber-attacks. The ultimate goal is to provide insights and make recommendations on how to foster individual's cyber acumen and cultivate a more effective decision-making process.
{"title":"The Cyber Acumen","authors":"X. Liu","doi":"10.4018/978-1-5225-7128-5.CH011","DOIUrl":"https://doi.org/10.4018/978-1-5225-7128-5.CH011","url":null,"abstract":"The major purpose of this chapter is to understand average user's decision-making process in cybersecurity by reviewing and integrating several major theoretical frameworks discussed and applied in decision making processes in cybersecurity. The average users are the ones who do not realize or understand when or how to perform security-critical decisions, the ones who are unmotivated to comply with company and school cybersecurity policies and procedures due to inconvenience, and the ones who do not have sufficient knowledge in cybersecurity to make sound security decisions. It is important to discuss and understand the role of such users and their behaviors based on systematic analysis so that we can identify potential factors causing “poor” security decisions and find ways to reduce the likelihood of being victims of cyber-attacks. The ultimate goal is to provide insights and make recommendations on how to foster individual's cyber acumen and cultivate a more effective decision-making process.","PeriodicalId":340894,"journal":{"name":"Analyzing Human Behavior in Cyberspace","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7128-5.CH007
Yujia Peng
As a new way of implementing human-computer interface, brain-computer interfaces (BCI) dramatically changed the user experiences and have broad applications in cyber behavior research. This chapter aims to provide an overall picture of the BCI science and its role in cyberpsychology. The chapter starts with an introduction of the concept, components, and the history and development of BCI. It is then followed by an overview of neuroimaging technologies and signals commonly used in BCI. Then, different applications of BCI on both the clinical population and the general population are summarized in connection with cyberpsychology. Specifically, applications include communication, rehabilitation, entertainments, learning, marketing, and authentication. The chapter concludes with the future directions of BCI.
{"title":"Brain-Computer Interface for Cyberpsychology","authors":"Yujia Peng","doi":"10.4018/978-1-5225-7128-5.CH007","DOIUrl":"https://doi.org/10.4018/978-1-5225-7128-5.CH007","url":null,"abstract":"As a new way of implementing human-computer interface, brain-computer interfaces (BCI) dramatically changed the user experiences and have broad applications in cyber behavior research. This chapter aims to provide an overall picture of the BCI science and its role in cyberpsychology. The chapter starts with an introduction of the concept, components, and the history and development of BCI. It is then followed by an overview of neuroimaging technologies and signals commonly used in BCI. Then, different applications of BCI on both the clinical population and the general population are summarized in connection with cyberpsychology. Specifically, applications include communication, rehabilitation, entertainments, learning, marketing, and authentication. The chapter concludes with the future directions of BCI.","PeriodicalId":340894,"journal":{"name":"Analyzing Human Behavior in Cyberspace","volume":"79 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120893948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}