What is online risk? How can we best protect children from it? Who should be responsible for this protection? Is all protection good? Can Internet users trust the industry? These and other ...fundamental questions are discussed in this book. Beginning with the premise that the political and democratic processes in a society are affected by the way in which that society defines and perceives risks, Children in the Online World offers insights into the contemporary regulation of online risk for children (including teens), examining the questions of whether such regulation is legitimate and whether it does in fact result in the sacrifice of certain fundamental human rights. The book draws on representative studies with European children concerning their actual online risk experiences as well as an extensive review of regulatory rationales in the European Union, to contend that the institutions of the western European welfare states charged with protecting children have changed fundamentally, at the cost of the level of security that they provide. In consequence, children at once have more rights with regard to their personal decision making as digital consumers, yet fewer democratic rights to participation and protection as ’digital citizens’. A theoretically informed, yet empirically grounded study of the relationship between core democratic values and the duty to protect young people in the media-sphere, Children in the Online World will appeal to scholars and students across the social sciences with interests in new technologies, risk and the sociology of childhood and youth. Book: The Open Access version of this book, available at http://www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.
As the number of Internet users grows rapidly, the way users access the Internet and their behavior change. This study focuses on Internet user typology, which is an area that has not been recently ...examined. The research explores whether the Internet user typology specified in previous literature is still applicable in the present and, if not, what has changed. The results reveal that the previous way of categorizing users into several types based on their activities alone is no longer applicable. Consequently, the researcher proposed a new methodology to group users based on applications and the frequency of accessing them, coupled with the use of demographic data. The survey-based cluster analysis shows four Internet user types in Thailand. Only one group is similar to previous literature, which is the non-users. In addition, there are three new groups of users that have characteristics that are completely different from the typologies in the previous literature. The most interesting and unexpected finding is the new type of user that the researcher calls the self-satisficing group, the name of which could be related to the concept of satisficing theory in economics.
An important new BPS Textbook in Psychology exploring the interactions between individuals, societies, and digital technologies
Outlines key theories and empirical research within cyberpsychology and ...provides critical assessments of this rapidly changing field
Identifies areas in need of further research and ways to use digital technologies as a research tool
Covers topics such as online identity, online relationships and dating, pornography, children s use of the internet, cyberbullying, online games and gambling, and deception and online crime
Engaging and accessible for students at the undergraduate and graduate level with real life examples, activities, and discussion questions
"Google and the Culture of Search examines the role of search technologies in shaping the contemporary digital and informational landscape. Ken Hillis and Michael Petit shed light on a culture of ...search in which our increasing reliance on search engines like Google, Yahoo! and Bing influences the way we navigate Web content--and how we think about ourselves and the world around us, online and off. Even as it becomes the number one internet activity, the very ubiquity of search technology naturalizes it as utilitarian and transparent--an assumption that Hillis and Petit explode in this innovative study. Commercial search engines supply an infrastructure that impacts the way we locate, prioritize, classify, and archive information on the Web, and as these search functionalities continue to make their way into our lives through mobile, GPS-based platforms and personalized results, distinctions between the virtual and the real collapse. Google--a multibillion-dollar global corporation--holds the balance of power among search providers, and the biases and individuating tendencies of its search algorithm undeniably shape our collective experience of the internet and our assumptions about the location and value of information. Google and the Culture of Search explores what is at stake for an increasingly networked culture in which search technology is a site of knowledge and power. This comprehensive study of search technology's broader implications for knowledge production and social relations is an indispensable resource for students and scholars of Internet and new media studies, the digital humanities, and information technology. "--
•Recipients of public security messages judge senders' authority and expertise.•Formal authorities and experts use different mechanisms to attain compliance.•Formal authority figures rely on fear ...appeals to increase compliance.•Expert leaders relying on expert power (rather than coercive) engender compliance.•Messages from formal authority figures can evoke reactance and undermine compliance.
Cyber threats continue to rise because Internet users are often unwilling to adopt simple security behaviors. Public security messages sent by leaders could formally and informally influence Internet users to take action to protect themselves from threats. However, scant research has examined how leaders' power or expertise influences Internet users' willingness to comply with requested security behaviors. In this paper, we develop a research model using the bases of power theory and three related theories (social influence theory, psychological reactance theory, and attribution theory) to explain how security messages from authoritative and expert leaders, respectively, shape users' intentions to comply with the recommendations of a security message. Analysis of data gathered in a field experiment suggests that security messages from leaders can have positive and negative consequences. If sent by leaders with formal authority (i.e., those high in coercive power), security messages may backfire because they fail to stimulate security cognitions. In contrast, if sent by expert leaders (i.e., those high in expertise), security messages are more likely to work as intended. Our findings offer insights into how public security messages can be made more effective.
Display omitted
Although information and communication technology (ICT) has a radical impact on people's everyday lives, bringing new social experiences and new ways for people to interact, there is still a large ...difference in social behaviour in this area between people in different age groups. Online social networks such as Facebook, Twitter, LinkedIn etc. are becoming increasingly important social media, but people aged 50 years and over use these resources at lower rates than those in younger age groups. In this paper we aim to investigate the factors affecting the use of online social networks by active older Internet users in Slovenia. Additionally, we address how often, and to what extent, active older Internet users are engaged in using ICT. A research study is presented that was conducted among active older Internet users, on the basis of a non-standardised research questionnaire. Collected data were analysed with basic descriptive, univariate and multivariate statistical methods, followed by induction of a decision tree using the WEKA (Waikato Environment for Knowledge Analysis) 3.7 programming environment. Research findings revealed that female participants are more familiar with the term 'online social network' and are also more frequent users, compared to male participants. Additionally, the results showed that age, gender and education seem to be the most important factors having a direct or indirect impact on the use of online social networks by active older Internet users.
•We analyse attitudes of active older Internet users toward online social networking and factors affecting their use.•Findings give insight in actual knowledge of active older Internet users about the online social networks.•Age, gender and education are the most important factors affecting the use of online social networks.•Use of online social networks is positively correlated to Skype use.•Active older Internet users use online social networks to maintain social relationships and to prevent loneliness.
Phishing attacks have become the most effective means of gaining unauthorized access to confidential information in the cyberspace. Unfortunately, many Internet users cannot identify phishing ...strategies and fall victim to these attacks. This work presents a mobile game-based learning called PHISHGEM for enhancing the awareness of phishing attacks. PHISHGEM educates users on five (5) major types of phishing techniques, namely, URL Manipulation, Email Spoofing, Website Cloning, Smishing and Social Media Attacks. The users of the game will identify phishing attacks in a wide range of real-life scenarios using a mobile application. The functionalities of the game were run on JAVA programming language, XML (Extensible Markup Language) was used to create the layout and Android studio IDE Version 4.1 was used to run the program. A user study with 100 participants was conducted to determine the effectiveness of PHISHGEM. Three (3) prominent factors such as the playability, usability and users' learning outcome were used for the evaluation of the game. The study analysis revealed that PHISHGEM attained a 98% Awareness Level, a Perceived Ease of Use of 94% and a New Knowledge Acquired of 94%. Also, the Perceived Effectiveness of the game and Users' Experience were given positive responses of 90% and 89%, respectively.
Phishing has emerged as a significant cyber threat, resulting in huge financial frauds for internet users annually. This malicious activity uses social engineering and upgraded methodologies (like ...file archiver in the browser, content injection, calendar phishing, more convincing fake websites or emails, voice manipulation, or other tools designed to deceive and exploit the target’s confidence) to extract sensitive information from unsuspected victims. In order to mitigate these attacks, several methods and tools have been devised; various detection techniques and block phishing websites, and browser extensions that notify users about suspicious websites. Our work elaborates on meticulous analysis of the detection of phishing attacks by classifying them into four broader categories based on the adopted methodologies like List-Based Detection, Heuristic-Based Detection, machine learning (ML)-based, and deep learning (DL)-based. Additionally, it summarizes the popular devised schemes, highlighting their advantages and limitations, and how these are suitable for the different types of deployments.
Display omitted
•This research work elaborates on VPNs, proxy links, and advanced detection techniques, including heuristics-based and deep learning models, to comprehensively combat phishing attacks.•This paper provides comprehensive reports with detected URLs, timestamps, attack types, probability scores, and mitigation suggestions.•This study is to create a comprehensive understanding on detection of different types of Phishing techniques.
Introduction
As publications on social media have become an important regulator of group opinions, moods and psychological well-being during the spread of COVID-19, it seems necessary to study the ...contribution of various information as a source of preserving the psychological resources of the population.
Objectives
To analyze the content in communities created during the spread of the COVID-19 pandemic in order to assess the image of health professionals on social media.
Methods
Using datamining methods, we analyzed publications about medical staff in a large community ‘StopCoronavirus.RF’ which unites more than 400 thousand users.
Results
More than 700 thousand entries were ‘liked’ in the community from March 2020 to March 2021; more than 125000 thousand posts were shared, about 290 thousand comments were written, and all community publications were viewed more than 3 billion times. Publications about medical staff working in the ‘red zones’ in Russia are distinguished by the largest number of ‘likes’ (more than 5000) and comments (more than 300). In the publications and comments, the model of modern heroes saving human lives is emphasized. This type of information contributes to the reduction of anxiety and promotion of psychological safety in case of COVID-19 contraction through establishing confidence in the competence of medical staff and their involvement in the fight against the pandemic.
Conclusions
These results suggest that the image of a doctor on social media during the pandemic has acquired special value for the population. Publications on the work of medical staff in the ‘red zones’ help to cope with anxiety associated with the COVID-19 pandemic. The study was funded by RFBR, project number 20-04-60174.
Disclosure
No significant relationships.