•Internet addiction research is suffering from a lack of progress and clear results.•Paper suggests investigating motivations in conjunction with psychosocial problems.•Paper presents a theory of ...compensatory internet use to further theoretical development.
Internet addiction is a rapidly growing field of research, receiving attention from researchers, journalists and policy makers. Despite much empirical data being collected and analyzed clear results and conclusions are surprisingly absent. This paper argues that conceptual issues and methodological shortcomings surrounding internet addiction research have made theoretical development difficult. An alternative model termed compensatory internet use is presented in an attempt to properly theorize the frequent assumption that people go online to escape real life issues or alleviate dysphoric moods and that this sometimes leads to negative outcomes. An empirical approach to studying compensatory internet use is suggested by combining the psychological literature on internet addiction with research on motivations for internet use. The theoretical argument is that by understanding how motivations mediate the relationship between psychosocial well-being and internet addiction, we can draw conclusions about how online activities may compensate for psychosocial problems. This could help explain why some people keep spending so much time online despite experiencing negative outcomes. There is also a methodological argument suggesting that in order to accomplish this, research needs to move away from a focus on direct effects models and consider mediation and interaction effects between psychosocial well-being and motivations in the context of internet addiction. This is key to further exploring the notion of internet use as a coping strategy; a proposition often mentioned but rarely investigated.
The above article, published online on 10 March 2017 in Wiley Online Library (wileyonlinelibrary.com) as an Accepted Article, has been withdrawn by agreement between the journal Editor‐in‐Chief John ...Ioannidis and Wiley Periodicals, LLC. The withdrawal has been agreed because the authors are not responding to requests to finalize their article for publication in the journal as the Version of Record.
•This article presents a literature review on determinants of the digital divide.•Consistent digital divide terminology is missing within the literature.•The majority of determinants identified ...focuses on the second-level digital divide.•Sociodemographic and socioeconomic determinants are studied the most.•More attention should be devoted to the outcomes of Internet use.
Recently, several digital divide scholars suggested that a shift is needed from a focus on binary Internet access (first-level digital divide) and Internet skills and use (second-level digital divide) to a third-level digital divide in which the tangible outcomes of Internet use are highlighted. A plethora of studies have been conducted to identify determinants of digital divides. Unfortunately, there is a lack of consistency in the terminology used. Moreover, terms are often not theoretically grounded. Therefore, we conducted a systematic literature review of digital divide determinants. The results show that the third-level digital divide was underexposed. The primary focus is on Internet use. More importantly, the identified determinants show that digital divide research is largely limited to sociodemographic and socioeconomic determinants.
The internet trap Mukherjee, Ashesh
The internet trap,
2018, 2018, 2018-01-16, 2018-01-18
eBook
Whether we are checking emails, following friends on Facebook and Twitter, catching up on gossip from TMZ, planning holidays on TripAdvisor, arranging dates on Match.com, watching videos on Youtube, ...or simply browsing for deals on Amazon, the internet pervades our professional and personal environments. The internet has revolutionized our lives, but at what cost? In The Internet Trap, Ashesh Mukherjee uses the latest research in consumer psychology to highlight five hidden costs of living online: too many temptations, too much information, too much customization, too many comparisons, and too little privacy. The book uses everyday examples to explain these costs including how surfing the internet anonymously can encourage bad behavior, using social media can make us envious and unhappy, and doing online research can devalue the product finally chosen. The book also provides actionable solutions to minimize these costs. For example, the book reveals how deciding not to choose is as important as deciding what to choose, setting up structural barriers to temptation can reduce overspending on e-commerce websites, and comparisons with others on social media websites needs to be cold rather than hot. The Internet Trap provides a new perspective on the dark side of the internet, and gives readers the tools to become smarter users of the internet.
A digitális kor technológiai, technikai és szolgáltatásforradalma miatt a digitalizáció megállíthatatlanul áthatja a digitális társadalom egészét. A felhasználók a digitális vívmányoknak köszönhetően ...új online térrel találkoznak, amely rendkívüli lehetőséget biztosít számunkra digitális létük valamennyi interakciójára. Az IoE-, IoT-, smart megoldások, az internet jövőbeni fejlődési szintje, a VR-, AR-, MR-, XR-eszközök új alapokra helyezik a felhasználók szórakozási, munkavégzési, tanulási, kapcsolatteremtési lehetőségeit. E fejlődési irányvonal digitális mérföldkövei egyértelműen a metaverzum irányába vezetnek a digitális szupersztrádán, aminek keretében nem csatlakozni fogunk ehhez az utópisztikus térhez, hanem digitális kivetülésünk eredményeképpen integráns része leszünk annak, új értelmet adva a jövő infokommunikációs trendjeinek.
Private companies exert considerable control over the flow of information on the internet. Whether users are finding information with a search engine, communicating on a social networking site or ...accessing the internet through an ISP, access to participation can be blocked, channelled, edited or personalised. Such gatekeepers are powerful forces in facilitating or hindering freedom of expression online. This is problematic for a human rights system which has historically treated human rights as a government responsibility, and this is compounded by the largely light-touch regulatory approach to the internet in the west. Regulating Speech in Cyberspace explores how these gatekeepers operate at the intersection of three fields of study: regulation (more broadly, law), corporate social responsibility and human rights. It proposes an alternative corporate governance model for speech regulation, one that acts as a template for the increasingly common use of non-state-based models of governance for human rights.
Aims: The present theoretical paper introduces the smartphone technology as a challenge for diagnostics in the study of Internet use disorders and reflects on the term “smartphone addiction.” ...Methods: Such a reflection is carried out against the background of a literature review and the inclusion of Gaming Disorder in ICD-11. Results: We believe that it is necessary to divide research on Internet use disorder (IUD) into a mobile and non-mobile IUD branch. This is important because certain applications such as the messenger application WhatsApp have originally been developed for smartphones and enfold their power and attractiveness mainly on mobile devices. Discussion and conclusions: Going beyond the argumentation for distinguishing between mobile and non-mobile IUD, it is of high relevance for scientists to better describe and understand what persons are actually (over-)using. This is stressed by a number of examples, explicitly targeting not only the diverse contents used in the online world, but also the exact behavior on each platform. Among others, it matters if a person is more of an active producer of content or passive consumer of social media.
La ciberviolencia se caracteriza, en primer lugar, por la posibilidad de acontecer en cualquier momento y espacio, los siete días de la semana y las 24 horas, beneficiándose de la movilidad y ...conectividad de las TIC, que proveen el almacenaje y distribución a una potencial mayor audiencia; suele presentarse entre compañeros, conocidos offline y online, amigos o examigos, exparejas, y en ocasiones entre desconocidos, quienes cuentan con información "lucrativa" que esgrimirán a la hora de ciberacosar (Velázquez-Reyes, 2020a y 2020b) frecuentemente. (2010: 33) lo han equiparado con el "viejo oeste" colmado de emociones y aventuras sin igual, pero potencialmente hostil, perturbador y atestado de peligros, y a menudo de "bandidos" de ambos sexos, con pocas o nulas reglas sociales establecidas y donde pareciera que todo se vale, que cualquiera que posea un dispositivo digital conectado a internet "puede ser agente 007 con licencia para matar o sin ella" (Bauman, 2012: 178); empero, con letalidad similar a la hora provocar un daño intencional a través de una pantalla a chicos y chicas sorprendidos que cuentan con escasas posibilidades de defenderse y, por supuesto, sean víctimas o ciberaudiencia, padecerán por igual las secuelas de la imposición de la ley que rige en la jungla cibernética, "del que puede y quiere". Se puede considerar, no sin reserva, que la duración del uso de internet es directamente proporcional al riesgo de victimización y ciberagresión; la residencia online facilita involucrarse como perpetrador o en represalia (Jiameng, Aissata, Xiaoyun y Hesketh, 2019), es decir, a mayor tiempo de uso de Internet mayor riesgo de ser parte de ciberacoso (Tokunaga, 2010; Garaigordobil, 2011; Arnaiz, Cerezo, Giménez y Maquilón, 2016). Los chicos, particularmente, ciberagreden a la población LGTBTT (Donoso, Rubio y Vila, 2017), si bien se ha registrado una relación positiva entre la participación en la intimidación tradicional y la participación en la intimidación cibernética (Páez, 2018; Slonje, Smith & Frisén, 2013; Waasdorp & Bradshaw, 2015), de tal manera que los conflictos suscitados en la vida offline, persisten y se arrastran a las pantallas.