Full Paper View Go Back

A Review on Harmonizing Psychological Factors into Cyber Space

Kritika 1

Section:Review Paper, Product Type: Journal
Vol.12 , Issue.2 , pp.11-18, Apr-2024

Online published on Apr 30, 2024


Copyright © Kritika . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kritika, “A Review on Harmonizing Psychological Factors into Cyber Space,” International Journal of Scientific Research in Network Security and Communication, Vol.12, Issue.2, pp.11-18, 2024.

MLA Style Citation: Kritika "A Review on Harmonizing Psychological Factors into Cyber Space." International Journal of Scientific Research in Network Security and Communication 12.2 (2024): 11-18.

APA Style Citation: Kritika, (2024). A Review on Harmonizing Psychological Factors into Cyber Space. International Journal of Scientific Research in Network Security and Communication, 12(2), 11-18.

BibTex Style Citation:
@article{_2024,
author = {Kritika},
title = {A Review on Harmonizing Psychological Factors into Cyber Space},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2024},
volume = {12},
Issue = {2},
month = {4},
year = {2024},
issn = {2347-2693},
pages = {11-18},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=443},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=443
TI - A Review on Harmonizing Psychological Factors into Cyber Space
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Kritika
PY - 2024
DA - 2024/04/30
PB - IJCSE, Indore, INDIA
SP - 11-18
IS - 2
VL - 12
SN - 2347-2693
ER -

24 Views    28 Downloads    6 Downloads
  
  

Abstract :
The rapidly evolving digital environment has changed how people think, communicate, and behave, calling for an interdisciplinary understanding of how people interact with machines. This manuscript investigates the newly-emerging discipline of cyberpsychology, which combines sociology, technology, and psychology to study how individuals interact with the digital environment. The review follows the evolution of cyberpsychology through time, starting in the early days of the internet and ending in the present day with digital mental health interventions and widespread connectedness. The "digital modulation hypothesis," which contends that fundamental human abilities like emotional acuity, empathy, and impulse control continue to exist online but are expressed adaptively within the constraints and affordances of virtual environments, is the main thesis. The literature on subjects like moral reasoning, self-regulation in digital environments, and cyber-disinhibition is critically analysed in this work. It also emphasises how they interact. It also discusses issues like risk perception, emotional resilience, and algorithmic bias, highlighting the interaction between psychology and cybersecurity. The analysis concludes by outlining potential future paths for cyberpsychology, including the influence of new technologies, the development of digital health, and the moral use of behavioural data in cybersecurity.

Key-Words / Index Term :
Cyberpsychology, digital modulation hypothesis, cyber security, emotional resilience, human-computer interaction, digital well-being

References :
[1] V. Ahuja, S. Alavib, β€œCyber psychology and cyber behaviour of adolescents-the need of the contemporary era," Information Technology and Quantitative Management (ITQM 2017), vol. 122, pp. 671-676, 2018.
[2] J. R. Ancis, "The age of cyberpsychology: An overview," 2020.
[3] B. Buchanan, "The cybersecurity dilemma: Hacking, trust, and fear between nations," Oxford University Press, United Kingdom, 2016.
[4] M. Burke and R. E. Kraut, "The relationship between Facebook use and well?being depends on communication type and tie strength," J. Comput.-Mediated Commun., vol. 21, no. 4, pp. 265–281, 2016.
[5] P. Chattopadhyay, L. Wang, and Y. Tan, "Scenario-Based Insider Threat Detection From Cyber Activities," IEEE Trans. Comput. Soc. Syst., vol. 5, pp. 660–675, 2018.
[6] M. Cheong, V. C. Lee, "A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter," Inf. Syst. Front., vol. 13, pp. 45–59, 2011.
[7] C. M. Cheung, G. Pires, P. J. Rosenberger, and E. De Oliverira, "Distrust and deception in the diffusion of Facebook hoaxes," in Hawaii International Conference on System Sciences, Hawaii, pp. 1625–1634, 2015.
[8] T. Correa, A. W. Hinsley, and H. Gil de ZΓΊΓ±iga, "Personality and social media use," in The Routledge handbook of media use and well-being: International perspectives on theory and research on positive media effects, pp. 53–62, 2015.
[9] S. M. Debb, "Keeping the human in the loop: Awareness and recognition of cybersecurity within cyberpsychology," Cyberpsychology, Behav. Soc. Netw., vol. 24, no. 9, pp. 581–583, 2021.
[10] A. Dhamdhere, H. Cherukuru, C. Dovrolis, and K. C. Claffy, "Measuring the Evolution of Internet Peering Agreements," in Networking, pp. 1–9, 2012.
[11] J. D. Elhai and D. Rozgonjuk, "Editorial overview: Cyberpsychology: reviews of research on the intersection between computer technology use and human behavior," Curr. Opin. Psychol., vol. 36, pp. iv–vii, 2020.
[12] S. S. A. Guan and K. Subrahmanyam, "Youth Internet use: Risks and opportunities," Curr. Opin. Psychiatry, vol. 22, no. 4, pp. 351–356, 2009.
[13] E. Hanc?, P. A. Ruijten, J. Lacroix, and W. A. IJsselsteijn, "The impact of mindset on self-tracking experience," Front. Digit. Heal., vol. 3, p. 676-742, 2021.
[14] A. Henning and T. Striano, "Infant and maternal sensitivity to interpersonal timing," Child Dev., vol. 82, no. 3, pp. 916–931, 2011.
[15] M. N. Hossain, M. M. Hassan, R. J. Monir, M. S. Sayeed, S. Wajiha, and S. M. Ullah, "Cyber Security and People: Human Nature, Psychology, and Training Affect User Awareness, Social Engineering, and Security Professional Education and Preparedness," in 2023 14th International Conference on Computer Communication and Network Technology, India, pp. 1–5, 2023.
[16] M. L. Khan and I. K. Idris, "Recognise misinformation and verify before sharing: a reasoned action and information literacy perspective," Behav. Inf. Technol., vol. 38, no. 12, pp. 1194–1212, 2019.
[17] N. C. KrΓ€mer, S. Winter, B. Benninghoff, and C. Gallus, "How technology shapes morality: implications for moral construal, outrage, and polarization in response to moral violations online," J. Media Psychol., 2020.
[18] R. J. Lee-Won, M. Shim, Y. K. Joo, and S. G. Park, "Who puts the best "face" forward on Facebook? Positive self-presentation in online social networking and the role of self-consciousness, actual-to-total Friends ratio, and culture," Comput. Human Behav., vol. 39, pp. 413–423, 2014.
[19] R. Lin and S. Utz, "The emotional responses of browsing Facebook: Happiness, envy, and the role of tie strength," Comput. Human Behav., vol. 52, pp. 29–38, 2015.
[20] T. Machin, C. Brownlow, S. Abel, and J. Gilmour, "Introduction: Cyberpsychology Across the Lifespan," in Social Media and Technology Across the Lifespan, Springer International Publishing, pp. 1–8, 2022.
[21] A. Maftei, A. C. Holman, and I. Merlici, "Using fake news as means of cyber-bullying: The link with compulsive internet use and online moral disengagement," Comput. Human Behav., vol. 127, p. 107-132, 2022.
[22] T. Malti, M. Gummerum, M. Keller, and M. Buchmann, "Children`s moral motivation, sympathy, and prosocial behavior," Child Dev., vol. 80, no. 2, pp. 442–460, 2009.
[23] K. Y. McKenna and J. A. Bargh, "Plan 9 from cyberspace: The implications of the Internet for personality and social psychology," in Personality and social psychology at the interface, Psychology Press, pp. 57–75, 2014.
[24] G. J. Meerkerk, R. J. Van D. Eijnden, and H. F. Garretsen, "Predicting compulsive Internet use: it`s all about sex!," Cyberpsychology Behav., vol. 9, no. 1, pp. 95–103, 2006.
[25] T. D. Parsons, "Ethical challenges in digital psychology and cyberpsychology," Cambridge University Press, 2019.
[26] S. A. Rains, S. R. Brunner, C. Akers, C. A. Pavlich, and J. Merten, "Evaluating measures associated with features of contemporary romantic relationships: Application of time-related and alignment-based approaches for empirical analysis," J. Soc. Pers. Relationships, vol.34, no.1, pp.63–90, 2017.
[27] K. C. Runions and M. Bak, "Online moral disengagement, cyberbullying, and cyber-aggression," Cyberpsychology, Behav. Soc. Netw., vol. 18, no. 7, pp. 400–405, 2015.
[28] A. D. Santana, "Virtuous or vitriolic: The effect of anonymity on civility in online newspaper reader comment boards," Journal. Pract., vol. 8, no. 1, pp. 18–33, 2014.
[29] L. R. Saslow, B. J. Willoughby, and T. Willoughby, "The social impacts of electronic gambling machines: A systematic review," J. Gambl. Stud., vol. 29, no. 3, pp. 495–515, 2013.
[30] M. Savci and M. D. Griffiths, "The development of the Problematic Cybersex Behavior Scale," Addict. Behav. Reports, vol. 9, p. 100-175, 2019.
[31] A. Sevcikova and D. Smahel, "Online harassment and cyberbullying in the Czech Republic: Comparison across age groups," Zeitschrift fΓΌr Psychol. J. Psychol., vol.217, no.4, pp.227–229, 2009.
[32] V. Sleglova and A. Cerna, "Cyberbullying in adolescent victims: Perception and coping," Cyberpsychology, vol.5, no.2, pp.4, 2011.
[33] P. Sorokowski, A. Sorokowska, A. Oleszkiewicz, T. Frackowiak, A. Huk, and K. Pisanski, "Sex differences in online picture sharing among adolescents," Evol. Hum. Behav., vol. 33, no. 4, pp. 396–404, 2015.
[34] S. Steinert and M. J. Dennis, "Emotions and digital well-being: On social media`s emotional affordances," Philos. Technol., vol. 35, no. 2, pp. 1–36, 2022.
[35] J. Suler, "The online disinhibition effect," Cyberpsychology Behav., vol. 7, no. 3, pp. 321–326, 2004.
[36] V. Talwar, S. Yachison, and K. Leduc, "Promoting honesty: The influence of stories on children`s lie-telling behaviours and moral understanding," Infant Child Dev., vol. 28, no. 1, p. 2116, 2019.
[37] M. Tanis and T. Postmes, "Two faces of anonymity: Paradoxical effects of cues to identity in CMC," Comput. Human Behav., vol. 23, no. 2, pp. 955–970, 2007.
[38] M. Tanis and T. Postmes, "Cues to identity in online dyads: Effects of interpersonal versus intragroup perceptions on performance," Group Dyn. Theory, Res. Pract., vol. 12, no. 2, pp. 96-105, 2008.
[39] O. Turel and H. Qahri-Saremi, "Problematic use of social networking sites: Antecedents and consequence from a dual system theory perspective," J. Manag. Inf. Syst., vol. 33, no. 4, pp. 1087–1116, 2016.
[40] R. Udris, "Cyberbullying among high school students in Japan: Development and validation of the Online Disinhibition Scale," Comput. Human Behav., vol. 41, pp. 253–261, 2014.
[41] M. M. Vanden Abeele and M. H. Nguyen, "Digital well-being in an age of mobile connectivity: An introduction to the Special Issue," Mob. Media Commun., vol. 10, pp. 174–189, 2022.
[42] S. Wachs, A. T. Vazsonyi, M. F. Wright, and C. Wolf, "Cyberbullying perpetration and victimization: The role of moral disengagement," J. Early Adolesc., vol. 39, no. 6, pp. 822–836, 2019.
[43] J. B. Walther, "Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction," Commun. Res., vol. 23, no. 1, pp. 3–43, 1996.
[44] S. C. Yang and C. Y. Y. Lin, "Factors influencing Internet addiction of adolescents in Taiwan: An empirical study," Comput. Human Behav., vol. 27, no. 6, pp. 2282–2291, 2011.
[45] Z. Zhang, H. Ning, F. Shi, F. Farha, Y. Xu, J. Xu, and et al., "Artificial intelligence in cyber security: research advances, challenges, and opportunities," Artif. Intell. Rev., vol. 55, pp. 1029–1053, 2021.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation