Pub Date : 2024-04-25DOI: 10.1016/j.chb.2024.108274
Ethan Morrow
Universities are frequent targets of cyberattacks. This investigation seeks to explore common phishing techniques targeting institutions of higher education. This study analyzes the content and message features of a sample of 2300 emails from 2010 to 2023 collected from Cornell's Phish Bowl, including topics, persuasive appeals, emotional appeals, and spelling errors. Using analyses of association and text mining, the work maps out changes in phishing trends over time. One major finding is that security-focused phish have been replaced by those attempting to reflect routine university life, such as job offer scams. Additionally, this study identifies authority and scarcity as common persuasive appeals in phishing attempts and demonstrates a decrease in spelling errors over time. These findings have practical implications for cybersecurity training and awareness. They may also guide future work seeking to determine user susceptibility to phishing by providing insight into frequent attacks.
{"title":"Scamming higher ed: An analysis of phishing content and trends","authors":"Ethan Morrow","doi":"10.1016/j.chb.2024.108274","DOIUrl":"10.1016/j.chb.2024.108274","url":null,"abstract":"<div><p>Universities are frequent targets of cyberattacks. This investigation seeks to explore common phishing techniques targeting institutions of higher education. This study analyzes the content and message features of a sample of 2300 emails from 2010 to 2023 collected from Cornell's Phish Bowl, including topics, persuasive appeals, emotional appeals, and spelling errors. Using analyses of association and text mining, the work maps out changes in phishing trends over time. One major finding is that security-focused phish have been replaced by those attempting to reflect routine university life, such as job offer scams. Additionally, this study identifies authority and scarcity as common persuasive appeals in phishing attempts and demonstrates a decrease in spelling errors over time. These findings have practical implications for cybersecurity training and awareness. They may also guide future work seeking to determine user susceptibility to phishing by providing insight into frequent attacks.</p></div>","PeriodicalId":48471,"journal":{"name":"Computers in Human Behavior","volume":null,"pages":null},"PeriodicalIF":9.9,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747563224001420/pdfft?md5=90f5c7925ab0106eb164c224727f9a4c&pid=1-s2.0-S0747563224001420-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140787334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-25DOI: 10.1016/j.chb.2024.108247
Mary Macharia , Christina Serrano , Rajiv Sabherwal
With the rising use of digital media, people, groups, and organizations are increasingly experiencing and responding to identity threats. We conducted an inductive, multiple-methods study to examine 50 viral stories on identity threat and response processes involving digital media (ITARP-DM). We uncovered three distinct ITARP-DM processes, which suggests that unique approaches are needed to deal with them. Although physical threats are more visible, threats to identity that are only words can still manifest in physiological consequences. When an ITARP-DM social justice cause affects a large group, it is more likely to spill over to offline protests and riots.
{"title":"Uncovering identity threat and response processes involving digital media (ITARP-DM)","authors":"Mary Macharia , Christina Serrano , Rajiv Sabherwal","doi":"10.1016/j.chb.2024.108247","DOIUrl":"10.1016/j.chb.2024.108247","url":null,"abstract":"<div><p>With the rising use of digital media, people, groups, and organizations are increasingly experiencing and responding to identity threats. We conducted an inductive, multiple-methods study to examine 50 viral stories on identity threat and response processes involving digital media (ITARP-DM). We uncovered three distinct ITARP-DM processes, which suggests that unique approaches are needed to deal with them. Although physical threats are more visible, threats to identity that are only words can still manifest in physiological consequences. When an ITARP-DM social justice cause affects a large group, it is more likely to spill over to offline protests and riots.</p></div>","PeriodicalId":48471,"journal":{"name":"Computers in Human Behavior","volume":null,"pages":null},"PeriodicalIF":9.9,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140755696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-25DOI: 10.1016/j.chb.2024.108269
Zhangbo , Mohammad Kamrul Hasan , Elankovan Sundararajan , Shayla Islam , Fatima Rayan Awad Ahmed , Nissrein Babiker Mohammed Babiker , Ahmed Ibrahim Alzahrani , Nasser Alalwan , Muhammad Attique Khan
In fog computing, batch scheduling is an important and challenging task aiming at reducing the response latency. Response time includes the scheduling time, execution time and other factors such as network latency. However, the majority of the existing batch scheduling algorithms primarily focus on minimizing the execution time of tasks for IoT devices, ignoring the algorithms' scheduling time. This contributes to suboptimal overall response time, which is a critical quality-of-service (QoS) indicator and significantly impacts performance. Optimizing both execution and scheduling time is therefore crucial for achieving minimum response time, improving QoS, and alleviating load-balancing issues. This work introduces a novel approach for the load-balancing difference variable and uses dimensionality reduction techniques for dynamic task organization. The main contribution comprises two distinctive algorithms: the Pre-allocation Minimum Completion Time (PMT) algorithm and the Segmented Random Search Fog Computing Batch Scheduling Algorithm (SRS). These algorithms are designed to address the inherent characteristics of the problem. To evaluate the performance and applicability of batch scheduling algorithms, we establish a model incorporating compliance and application performance indicators. We introduce the Logical Recursive Indirect Comparison Analysis method to assess and evaluate batch scheduling algorithms. Simulation results demonstrate the exceptional effectiveness of the SRS algorithm. It exhibits a remarkable improvement in comprehensive performance indices, ranging from 139.10% to 261.18%, and optimization quality enhancement rates of 64.25%–154.13% compared to classical standard optimization algorithms. Compared with advanced algorithms, the SRS algorithm also outperforms, with optimization quality improvement rates of 22.74% and 71.11% compared to AEOSSA and CHMPAD.
{"title":"A novel segmented random search based batch scheduling algorithm in fog computing","authors":"Zhangbo , Mohammad Kamrul Hasan , Elankovan Sundararajan , Shayla Islam , Fatima Rayan Awad Ahmed , Nissrein Babiker Mohammed Babiker , Ahmed Ibrahim Alzahrani , Nasser Alalwan , Muhammad Attique Khan","doi":"10.1016/j.chb.2024.108269","DOIUrl":"10.1016/j.chb.2024.108269","url":null,"abstract":"<div><p>In fog computing, batch scheduling is an important and challenging task aiming at reducing the response latency. Response time includes the scheduling time, execution time and other factors such as network latency. However, the majority of the existing batch scheduling algorithms primarily focus on minimizing the execution time of tasks for IoT devices, ignoring the algorithms' scheduling time. This contributes to suboptimal overall response time, which is a critical quality-of-service (QoS) indicator and significantly impacts performance. Optimizing both execution and scheduling time is therefore crucial for achieving minimum response time, improving QoS, and alleviating load-balancing issues. This work introduces a novel approach for the load-balancing difference variable and uses dimensionality reduction techniques for dynamic task organization. The main contribution comprises two distinctive algorithms: the Pre-allocation Minimum Completion Time (PMT) algorithm and the Segmented Random Search Fog Computing Batch Scheduling Algorithm (SRS). These algorithms are designed to address the inherent characteristics of the problem. To evaluate the performance and applicability of batch scheduling algorithms, we establish a model incorporating compliance and application performance indicators. We introduce the Logical Recursive Indirect Comparison Analysis method to assess and evaluate batch scheduling algorithms. Simulation results demonstrate the exceptional effectiveness of the SRS algorithm. It exhibits a remarkable improvement in comprehensive performance indices, ranging from 139.10% to 261.18%, and optimization quality enhancement rates of 64.25%–154.13% compared to classical standard optimization algorithms. Compared with advanced algorithms, the SRS algorithm also outperforms, with optimization quality improvement rates of 22.74% and 71.11% compared to AEOSSA and CHMPAD.</p></div>","PeriodicalId":48471,"journal":{"name":"Computers in Human Behavior","volume":null,"pages":null},"PeriodicalIF":9.9,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140788489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-25DOI: 10.1016/j.chb.2024.108272
Wenbang Niu , Yi Feng , Shicun Xu , Amanda Wilson , Yu Jin , Zhihao Ma , Yuanyuan Wang
Predicting suicide risk based on risk and protective factors is a critical and complex endeavor. In this study, we combined insights from comprehensive aetiological theories on suicide with the methodological strengths of machine learning techniques. Our primary objectives were twofold: a) to identify hazardous feature combinations that characterize a high risk of suicide, and b) to enhance our understanding of the potential interactions between risk and protective factors related to suicide. We established an interpretable decision tree model to classify young adults at high risk of suicide, utilizing fifty-five variables covering distal, developmental, proximal, and social context factors from a large-scale cross-sectional survey (N = 88,214). The results highlighted the significance of variables such as self-compassion and non-suicidal self-injury (NSSI), and the accumulation of depressive symptoms, medium-to-low self-compassion, and a history of NSSI as substantial indicators of heightened suicide risk. This study serves as a valuable reference for the clinical identification of individuals at risk of suicide.
{"title":"Revealing suicide risk of young adults based on comprehensive measurements using decision tree classification","authors":"Wenbang Niu , Yi Feng , Shicun Xu , Amanda Wilson , Yu Jin , Zhihao Ma , Yuanyuan Wang","doi":"10.1016/j.chb.2024.108272","DOIUrl":"10.1016/j.chb.2024.108272","url":null,"abstract":"<div><p>Predicting suicide risk based on risk and protective factors is a critical and complex endeavor. In this study, we combined insights from comprehensive aetiological theories on suicide with the methodological strengths of machine learning techniques. Our primary objectives were twofold: a) to identify hazardous feature combinations that characterize a high risk of suicide, and b) to enhance our understanding of the potential interactions between risk and protective factors related to suicide. We established an interpretable decision tree model to classify young adults at high risk of suicide, utilizing fifty-five variables covering distal, developmental, proximal, and social context factors from a large-scale cross-sectional survey (N = 88,214). The results highlighted the significance of variables such as self-compassion and non-suicidal self-injury (NSSI), and the accumulation of depressive symptoms, medium-to-low self-compassion, and a history of NSSI as substantial indicators of heightened suicide risk. This study serves as a valuable reference for the clinical identification of individuals at risk of suicide.</p></div>","PeriodicalId":48471,"journal":{"name":"Computers in Human Behavior","volume":null,"pages":null},"PeriodicalIF":9.9,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140756583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-25DOI: 10.1016/j.chb.2024.108273
Zhijuan Deng , Xiaomin Gong , Dongmei Han
Innovatively departing from conventional methodologies such as questionnaires, interviews, or text analysis, this study introduces a single-gender speech personality measurement approach to identify extraversion traits in executives from a speech perspective. Central to the research is how executive extraversion influences firm innovation performance. The research samples are derived from the audio recordings of performance conference communication calls held by Chinese listed companies on the Wind 3C conference platform. Through hierarchical regression analysis, empirical results demonstrate an inverted U-shaped relationship between executive extraversion and firm innovation performance (measured by R&D personnel input, R&D expenditure, and patent applications). The study also reveals that situational factors, including the proportion of shareholding by pressure-resistant institutional investors, incentive compensation, and equity concentration, significantly moderate the inverted U-shaped relationship. This research provides compelling evidence of the importance of executive extraversion in firm innovation performance and offers a new perspective on the mechanisms through which executive extraversion influences firm innovation performance. The single-gender speech personality recognition method allows researchers to effectively utilize executives’ speech information in the big data era. The research viewpoint and findings contribute beneficially to the Upper Echelons Theory and offer actionable insights for leveraging executive traits to bolster innovation.
{"title":"The secret of speech: Executive extraversion and firm innovation performance based on telephone communication","authors":"Zhijuan Deng , Xiaomin Gong , Dongmei Han","doi":"10.1016/j.chb.2024.108273","DOIUrl":"10.1016/j.chb.2024.108273","url":null,"abstract":"<div><p>Innovatively departing from conventional methodologies such as questionnaires, interviews, or text analysis, this study introduces a single-gender speech personality measurement approach to identify extraversion traits in executives from a speech perspective. Central to the research is how executive extraversion influences firm innovation performance. The research samples are derived from the audio recordings of performance conference communication calls held by Chinese listed companies on the Wind 3C conference platform. Through hierarchical regression analysis, empirical results demonstrate an inverted U-shaped relationship between executive extraversion and firm innovation performance (measured by R&D personnel input, R&D expenditure, and patent applications). The study also reveals that situational factors, including the proportion of shareholding by pressure-resistant institutional investors, incentive compensation, and equity concentration, significantly moderate the inverted U-shaped relationship. This research provides compelling evidence of the importance of executive extraversion in firm innovation performance and offers a new perspective on the mechanisms through which executive extraversion influences firm innovation performance. The single-gender speech personality recognition method allows researchers to effectively utilize executives’ speech information in the big data era. The research viewpoint and findings contribute beneficially to the Upper Echelons Theory and offer actionable insights for leveraging executive traits to bolster innovation.</p></div>","PeriodicalId":48471,"journal":{"name":"Computers in Human Behavior","volume":null,"pages":null},"PeriodicalIF":9.9,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140797070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-24DOI: 10.1016/j.chb.2024.108255
Qin Gao, Yusen Dai, Zao Fan, Ruogu Kang
{"title":"Corrigendum to “Understanding factors affecting perceived sociability of social software” [Comput. Hum. Behav. 26/6 (2010) 1406] 1846–1861","authors":"Qin Gao, Yusen Dai, Zao Fan, Ruogu Kang","doi":"10.1016/j.chb.2024.108255","DOIUrl":"10.1016/j.chb.2024.108255","url":null,"abstract":"","PeriodicalId":48471,"journal":{"name":"Computers in Human Behavior","volume":null,"pages":null},"PeriodicalIF":9.9,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747563224001237/pdfft?md5=b91c70fec8595adc316a721e52196035&pid=1-s2.0-S0747563224001237-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140784705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-21DOI: 10.1016/j.chb.2024.108257
Zhengya Gong , Milene Gonçalves , Vijayakumar Nanjappan , Georgi V. Georgiev
Previous studies have clearly established the impact of culture on design creativity. For example, the presence of cultural values with low uncertainty avoidance (UA, the degree of anxiety and risk aversion that people feel during ambiguous situations) is linked to low workability of creative ideas. Currently, there is limited research on potential remedies to alleviate the impact of culture, specifically with respect to UA. Therefore, this study investigates the use of technology to prime UA cultural values and mitigate their potential negative impacts on design creativity. This was achieved using stimuli that had been generated by virtual reality (VR) technology and presented in an immersive environment. Participants in an experimental study were exposed to VR stimuli designed to either decrease or increase their UA. The results showed that the VR stimuli had successfully increased and decreased low and high UA values, respectively, which mitigated the influence of UA on design creativity. Furthermore, the VR stimuli influenced the emphasis of the participants on ideation, with lowered and enhanced UA values leading to them prioritizing novelty and usefulness, respectively. Overall, the findings provided evidence that VR could be leveraged from a psychological standpoint to reduce cultural influences on creativity through targeted priming. These findings indicated the essential implications of the study in terms of understanding the effect of immersive technologies in shaping human behaviors and mindsets.
以往的研究已经清楚地证明了文化对设计创造力的影响。例如,低不确定性规避(UA,人们在模棱两可的情况下感到的焦虑和风险规避程度)文化价值观的存在与创意想法的低可操作性有关。目前,有关减轻文化影响的潜在补救措施的研究还很有限,特别是在不确定性规避方面。因此,本研究调查了如何利用技术来强化 UA 文化价值观,并减轻其对设计创造力的潜在负面影响。这项研究使用虚拟现实(VR)技术生成的刺激,并在沉浸式环境中呈现。在一项实验研究中,参与者受到了旨在减少或增加其 UA 的 VR 刺激。结果显示,虚拟现实刺激分别成功地提高和降低了低UA值和高UA值,从而减轻了UA对设计创造力的影响。此外,虚拟现实刺激还影响了参与者对构思的重视程度,UA 值的降低和提高分别导致他们优先考虑新颖性和实用性。总之,研究结果证明,可以从心理学角度利用虚拟现实技术,通过有针对性的引物来减少文化对创造力的影响。这些发现表明,这项研究对于理解沉浸式技术在塑造人类行为和心态方面的影响具有重要意义。
{"title":"Priming uncertainty avoidance values: Influence of virtual reality stimuli on design creativity in ideation","authors":"Zhengya Gong , Milene Gonçalves , Vijayakumar Nanjappan , Georgi V. Georgiev","doi":"10.1016/j.chb.2024.108257","DOIUrl":"10.1016/j.chb.2024.108257","url":null,"abstract":"<div><p>Previous studies have clearly established the impact of culture on design creativity. For example, the presence of cultural values with low uncertainty avoidance (UA, the degree of anxiety and risk aversion that people feel during ambiguous situations) is linked to low workability of creative ideas. Currently, there is limited research on potential remedies to alleviate the impact of culture, specifically with respect to UA. Therefore, this study investigates the use of technology to prime UA cultural values and mitigate their potential negative impacts on design creativity. This was achieved using stimuli that had been generated by virtual reality (VR) technology and presented in an immersive environment. Participants in an experimental study were exposed to VR stimuli designed to either decrease or increase their UA. The results showed that the VR stimuli had successfully increased and decreased low and high UA values, respectively, which mitigated the influence of UA on design creativity. Furthermore, the VR stimuli influenced the emphasis of the participants on ideation, with lowered and enhanced UA values leading to them prioritizing novelty and usefulness, respectively. Overall, the findings provided evidence that VR could be leveraged from a psychological standpoint to reduce cultural influences on creativity through targeted priming. These findings indicated the essential implications of the study in terms of understanding the effect of immersive technologies in shaping human behaviors and mindsets.</p></div>","PeriodicalId":48471,"journal":{"name":"Computers in Human Behavior","volume":null,"pages":null},"PeriodicalIF":9.9,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747563224001250/pdfft?md5=16c13d0da6820352cbf758daa63425e4&pid=1-s2.0-S0747563224001250-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140773124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-20DOI: 10.1016/j.chb.2024.108253
Matthew Price , Johanna E. Hidalgo , Julia N. Kim , Alison C. Legrand , Zoe M.F. Brier , Katherine van Stolk-Cooke , Amy Hughes Lansing , Ateka A. Contractor
Crowdsourcing is an essential data collection method for psychological research. Concerns about the validity and quality of crowdsourced data persist, however. A recent documented increase in the number of invalid responses within crowdsourced data has highlighted the need for quality control measures. Although a number of approaches are recommended, few have been empirically evaluated. The present study evaluated a Cyborg Method that used automated evaluation of participant meta-data and a review of short answer responses. Two samples were recruited – in the first, the Cyborg Method was applied after data collection to gauge the extent to which invalid responses were collected when a priori quality controls were absent. In the second, the Cyborg Method was applied during data collection to determine if the method would proactively screen invalid responses. Results suggested that Cyborg Method identified a substantial portion of invalid responses and both automated and human evaluation components w necessary. Furthermore, the Cyborg Method could be applied proactively to screen invalid responses and substantially reduced the per participant cost of data collection. These results suggest that the Cyborg Method is a promising means by which to collect high quality crowdsourced data.
{"title":"The cyborg method: A method to identify fraudulent responses from crowdsourced data","authors":"Matthew Price , Johanna E. Hidalgo , Julia N. Kim , Alison C. Legrand , Zoe M.F. Brier , Katherine van Stolk-Cooke , Amy Hughes Lansing , Ateka A. Contractor","doi":"10.1016/j.chb.2024.108253","DOIUrl":"https://doi.org/10.1016/j.chb.2024.108253","url":null,"abstract":"<div><p>Crowdsourcing is an essential data collection method for psychological research. Concerns about the validity and quality of crowdsourced data persist, however. A recent documented increase in the number of invalid responses within crowdsourced data has highlighted the need for quality control measures. Although a number of approaches are recommended, few have been empirically evaluated. The present study evaluated a Cyborg Method that used automated evaluation of participant meta-data and a review of short answer responses. Two samples were recruited – in the first, the Cyborg Method was applied after data collection to gauge the extent to which invalid responses were collected when <em>a priori</em> quality controls were absent. In the second, the Cyborg Method was applied during data collection to determine if the method would proactively screen invalid responses. Results suggested that Cyborg Method identified a substantial portion of invalid responses and both automated and human evaluation components w necessary. Furthermore, the Cyborg Method could be applied proactively to screen invalid responses and substantially reduced the per participant cost of data collection. These results suggest that the Cyborg Method is a promising means by which to collect high quality crowdsourced data.</p></div>","PeriodicalId":48471,"journal":{"name":"Computers in Human Behavior","volume":null,"pages":null},"PeriodicalIF":9.9,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140647661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-18DOI: 10.1016/j.chb.2024.108267
Damien Lekkas , Elad Yom-Tov , Michael V. Heinz , Joseph A. Gyorda , Theresa Nguyen , Paul J. Barr , Nicholas C. Jacobson
There is an appreciable mental health treatment gap in the United States. Efforts to bridge this gap and improve resource accessibility have led to the provision of online, clinically-validated tools for mental health self-assessment. In theory, these screens serve as an invaluable component of information-seeking, representing the preparative and action-oriented stages of this process while altering or reinforcing the search content and language of individuals as they engage with information online. Accordingly, this work investigated the association of screen completion with mental health-related search behaviors. Three-year internet search histories from N = 7572 Microsoft Bing users were paired with their respective depression, anxiety, bipolar disorder, or psychosis online screen completion and sociodemographic data available through Mental Health America. Data was transformed into network representations to model queries as discrete steps with probabilities and times-to-transition from one search type to another. Search data subsequent to screen completion was also modeled using Markov chains to simulate likelihood trajectories of different search types through time. Differences in querying dynamics relative to screen completion were observed, with searches involving treatment, diagnosis, suicidal ideation, and suicidal intent commonly emerging as the highest probability behavioral information seeking endpoints. Moreover, results pointed to the association of low risk states of psychopathology with transitions to extreme clinical outcomes (i.e., active suicidal intent). Future research is required to draw definitive conclusions regarding causal relationships between screens and search behavior.
美国在心理健康治疗方面存在明显差距。为了弥补这一差距并提高资源的可及性,我们提供了经临床验证的在线心理健康自我评估工具。从理论上讲,这些屏幕是信息搜索的宝贵组成部分,代表了这一过程的准备阶段和行动导向阶段,同时改变或加强了个人在网上获取信息时的搜索内容和语言。因此,本研究调查了屏幕完成度与心理健康相关搜索行为的关联。将 N = 7572 名微软必应用户的三年互联网搜索历史记录与他们各自的抑郁症、焦虑症、躁郁症或精神病在线屏幕完成情况和社会人口学数据配对,这些数据可通过美国心理健康协会获得。数据被转换成网络表示法,以便将查询作为离散步骤建模,并计算从一种搜索类型过渡到另一种搜索类型的概率和时间。筛查完成后的搜索数据也使用马尔可夫链进行建模,以模拟不同搜索类型随时间变化的可能性轨迹。结果发现,相对于筛查完成而言,查询动态存在差异,涉及治疗、诊断、自杀意念和自杀意图的搜索通常是概率最高的行为信息搜索终点。此外,研究结果表明,精神病理学的低风险状态与过渡到极端临床结果(即主动自杀意向)有关。要就屏幕与搜索行为之间的因果关系得出明确的结论,还需要未来的研究。
{"title":"The trajectories of online mental health information seeking: Modeling search behavior before and after completion of self-report screens","authors":"Damien Lekkas , Elad Yom-Tov , Michael V. Heinz , Joseph A. Gyorda , Theresa Nguyen , Paul J. Barr , Nicholas C. Jacobson","doi":"10.1016/j.chb.2024.108267","DOIUrl":"https://doi.org/10.1016/j.chb.2024.108267","url":null,"abstract":"<div><p>There is an appreciable mental health treatment gap in the United States. Efforts to bridge this gap and improve resource accessibility have led to the provision of online, clinically-validated tools for mental health self-assessment. In theory, these screens serve as an invaluable component of information-seeking, representing the preparative and action-oriented stages of this process while altering or reinforcing the search content and language of individuals as they engage with information online. Accordingly, this work investigated the association of screen completion with mental health-related search behaviors. Three-year internet search histories from <em>N</em> = 7572 Microsoft Bing users were paired with their respective depression, anxiety, bipolar disorder, or psychosis online screen completion and sociodemographic data available through Mental Health America. Data was transformed into network representations to model queries as discrete steps with probabilities and times-to-transition from one search type to another. Search data subsequent to screen completion was also modeled using Markov chains to simulate likelihood trajectories of different search types through time. Differences in querying dynamics relative to screen completion were observed, with searches involving treatment, diagnosis, suicidal ideation, and suicidal intent commonly emerging as the highest probability behavioral information seeking endpoints. Moreover, results pointed to the association of low risk states of psychopathology with transitions to extreme clinical outcomes (i.e., active suicidal intent). Future research is required to draw definitive conclusions regarding causal relationships between screens and search behavior.</p></div>","PeriodicalId":48471,"journal":{"name":"Computers in Human Behavior","volume":null,"pages":null},"PeriodicalIF":9.9,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140622607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-18DOI: 10.1016/j.chb.2024.108268
Audrey Marcoux , Marie-Hélène Tessier , Philip L. Jackson
Perceiving empathy from healthcare professionals contributes to clinical benefits. Yet, for methodological and ethical reasons, the factors affecting perceived empathy, such as how the nonverbal behaviors of professionals interact, are less understood than those influencing the actual act of empathizing. Two online studies examined how the perception of empathy in a medical context of pain was influenced by factors related to digital healthcare professionals (DHPs) and participants acting as suffering patients. In Study 1 (n = 123), participants watched videos of DHPs showing variations in gaze direction, posture, and facial expression to rate perceived empathy from a visual patient perspective. They perceived more empathy from the face expressing pain, regardless of gaze, posture, and gender of the DHPs. The sex of participants also modulated perceived empathy. Study 2 (n = 116) expanded Study 1 by adding faces expressing pain and sadness of varying intensities, along with perspective-taking instructions, to determine whether higher perceived empathy for the face expressing pain stems from its congruence with the medical pain context. Participants perceived more empathy in faces expressing sadness than pain. Sadness and pain interacted differently with the effects of intensity, posture, and gaze direction. This work challenges the idea that exact congruence with the patient's affective state is necessary and further contributes to investigating nonverbal behaviors of empathy.
{"title":"Nonverbal behaviors perceived as most empathic in a simulated medical context","authors":"Audrey Marcoux , Marie-Hélène Tessier , Philip L. Jackson","doi":"10.1016/j.chb.2024.108268","DOIUrl":"https://doi.org/10.1016/j.chb.2024.108268","url":null,"abstract":"<div><p>Perceiving empathy from healthcare professionals contributes to clinical benefits. Yet, for methodological and ethical reasons, the factors affecting perceived empathy, such as how the nonverbal behaviors of professionals interact, are less understood than those influencing the actual act of empathizing. Two online studies examined how the perception of empathy in a medical context of pain was influenced by factors related to digital healthcare professionals (DHPs) and participants acting as suffering patients. In Study 1 (<em>n</em> = 123), participants watched videos of DHPs showing variations in gaze direction, posture, and facial expression to rate perceived empathy from a visual patient perspective. They perceived more empathy from the face expressing pain, regardless of gaze, posture, and gender of the DHPs. The sex of participants also modulated perceived empathy. Study 2 (<em>n</em> = 116) expanded Study 1 by adding faces expressing pain and sadness of varying intensities, along with perspective-taking instructions, to determine whether higher perceived empathy for the face expressing pain stems from its congruence with the medical pain context. Participants perceived more empathy in faces expressing sadness than pain. Sadness and pain interacted differently with the effects of intensity, posture, and gaze direction. This work challenges the idea that exact congruence with the patient's affective state is necessary and further contributes to investigating nonverbal behaviors of empathy.</p></div>","PeriodicalId":48471,"journal":{"name":"Computers in Human Behavior","volume":null,"pages":null},"PeriodicalIF":9.9,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747563224001365/pdfft?md5=ae3d18d3395f7de38f962749e2e76dbd&pid=1-s2.0-S0747563224001365-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140647748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}