A Review on Harmonizing Psychological Factors into Cyber Space

Authors

  • Kritika Independent Researcher, New Delhi, India

Keywords:

Cyberpsychology, digital modulation hypothesis, cyber security

Abstract

The rapidly evolving digital environment has changed how people think, communicate, and behave, calling for an interdisciplinary understanding of how people interact with machines. This manuscript investigates the newly-emerging discipline of cyberpsychology, which combines sociology, technology, and psychology to study how individuals interact with the digital environment. The review follows the evolution of cyberpsychology through time, starting in the early days of the internet and ending in the present day with digital mental health interventions and widespread connectedness. The "digital modulation hypothesis," which contends that fundamental human abilities like emotional acuity, empathy, and impulse control continue to exist online but are expressed adaptively within the constraints and affordances of virtual environments, is the main thesis. The literature on subjects like moral reasoning, self-regulation in digital environments, and cyber-disinhibition is critically analysed in this work. It also emphasises how they interact. It also discusses issues like risk perception, emotional resilience, and algorithmic bias, highlighting the interaction between psychology and cybersecurity. The analysis concludes by outlining potential future paths for cyberpsychology, including the influence of new technologies, the development of digital health, and the moral use of behavioural data in cybersecurity.

 

References

V. Ahuja, S. Alavib, “Cyber psychology and cyber behaviour of adolescents-the need of the contemporary era," Information Technology and Quantitative Management (ITQM 2017), vol. 122, pp. 671-676, 2018.

J. R. Ancis, "The age of cyberpsychology: An overview," 2020.

B. Buchanan, "The cybersecurity dilemma: Hacking, trust, and fear between nations," Oxford University Press, United Kingdom, 2016.

M. Burke and R. E. Kraut, "The relationship between Facebook use and well?being depends on communication type and tie strength," J. Comput.-Mediated Commun., vol. 21, no. 4, pp. 265–281, 2016.

P. Chattopadhyay, L. Wang, and Y. Tan, "Scenario-Based Insider Threat Detection From Cyber Activities," IEEE Trans. Comput. Soc. Syst., vol. 5, pp. 660–675, 2018.

M. Cheong, V. C. Lee, "A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter," Inf. Syst. Front., vol. 13, pp. 45–59, 2011.

C. M. Cheung, G. Pires, P. J. Rosenberger, and E. De Oliverira, "Distrust and deception in the diffusion of Facebook hoaxes," in Hawaii International Conference on System Sciences, Hawaii, pp. 1625–1634, 2015.

T. Correa, A. W. Hinsley, and H. Gil de Zúñiga, "Personality and social media use," in The Routledge handbook of media use and well-being: International perspectives on theory and research on positive media effects, pp. 53–62, 2015.

S. M. Debb, "Keeping the human in the loop: Awareness and recognition of cybersecurity within cyberpsychology," Cyberpsychology, Behav. Soc. Netw., vol. 24, no. 9, pp. 581–583, 2021.

A. Dhamdhere, H. Cherukuru, C. Dovrolis, and K. C. Claffy, "Measuring the Evolution of Internet Peering Agreements," in Networking, pp. 1–9, 2012.

J. D. Elhai and D. Rozgonjuk, "Editorial overview: Cyberpsychology: reviews of research on the intersection between computer technology use and human behavior," Curr. Opin. Psychol., vol. 36, pp. iv–vii, 2020.

S. S. A. Guan and K. Subrahmanyam, "Youth Internet use: Risks and opportunities," Curr. Opin. Psychiatry, vol. 22, no. 4, pp. 351–356, 2009.

E. Hanc?, P. A. Ruijten, J. Lacroix, and W. A. IJsselsteijn, "The impact of mindset on self-tracking experience," Front. Digit. Heal., vol. 3, p. 676-742, 2021.

A. Henning and T. Striano, "Infant and maternal sensitivity to interpersonal timing," Child Dev., vol. 82, no. 3, pp. 916–931, 2011.

M. N. Hossain, M. M. Hassan, R. J. Monir, M. S. Sayeed, S. Wajiha, and S. M. Ullah, "Cyber Security and People: Human Nature, Psychology, and Training Affect User Awareness, Social Engineering, and Security Professional Education and Preparedness," in 2023 14th International Conference on Computer Communication and Network Technology, India, pp. 1–5, 2023.

M. L. Khan and I. K. Idris, "Recognise misinformation and verify before sharing: a reasoned action and information literacy perspective," Behav. Inf. Technol., vol. 38, no. 12, pp. 1194–1212, 2019.

N. C. Krämer, S. Winter, B. Benninghoff, and C. Gallus, "How technology shapes morality: implications for moral construal, outrage, and polarization in response to moral violations online," J. Media Psychol., 2020.

R. J. Lee-Won, M. Shim, Y. K. Joo, and S. G. Park, "Who puts the best "face" forward on Facebook? Positive self-presentation in online social networking and the role of self-consciousness, actual-to-total Friends ratio, and culture," Comput. Human Behav., vol. 39, pp. 413–423, 2014.

R. Lin and S. Utz, "The emotional responses of browsing Facebook: Happiness, envy, and the role of tie strength," Comput. Human Behav., vol. 52, pp. 29–38, 2015.

T. Machin, C. Brownlow, S. Abel, and J. Gilmour, "Introduction: Cyberpsychology Across the Lifespan," in Social Media and Technology Across the Lifespan, Springer International Publishing, pp. 1–8, 2022.

A. Maftei, A. C. Holman, and I. Merlici, "Using fake news as means of cyber-bullying: The link with compulsive internet use and online moral disengagement," Comput. Human Behav., vol. 127, p. 107-132, 2022.

T. Malti, M. Gummerum, M. Keller, and M. Buchmann, "Children`s moral motivation, sympathy, and prosocial behavior," Child Dev., vol. 80, no. 2, pp. 442–460, 2009.

K. Y. McKenna and J. A. Bargh, "Plan 9 from cyberspace: The implications of the Internet for personality and social psychology," in Personality and social psychology at the interface, Psychology Press, pp. 57–75, 2014.

G. J. Meerkerk, R. J. Van D. Eijnden, and H. F. Garretsen, "Predicting compulsive Internet use: it`s all about sex!," Cyberpsychology Behav., vol. 9, no. 1, pp. 95–103, 2006.

T. D. Parsons, "Ethical challenges in digital psychology and cyberpsychology," Cambridge University Press, 2019.

S. A. Rains, S. R. Brunner, C. Akers, C. A. Pavlich, and J. Merten, "Evaluating measures associated with features of contemporary romantic relationships: Application of time-related and alignment-based approaches for empirical analysis," J. Soc. Pers. Relationships, vol.34, no.1, pp.63–90, 2017.

K. C. Runions and M. Bak, "Online moral disengagement, cyberbullying, and cyber-aggression," Cyberpsychology, Behav. Soc. Netw., vol. 18, no. 7, pp. 400–405, 2015.

A. D. Santana, "Virtuous or vitriolic: The effect of anonymity on civility in online newspaper reader comment boards," Journal. Pract., vol. 8, no. 1, pp. 18–33, 2014.

L. R. Saslow, B. J. Willoughby, and T. Willoughby, "The social impacts of electronic gambling machines: A systematic review," J. Gambl. Stud., vol. 29, no. 3, pp. 495–515, 2013.

M. Savci and M. D. Griffiths, "The development of the Problematic Cybersex Behavior Scale," Addict. Behav. Reports, vol. 9, p. 100-175, 2019.

A. Sevcikova and D. Smahel, "Online harassment and cyberbullying in the Czech Republic: Comparison across age groups," Zeitschrift für Psychol. J. Psychol., vol.217, no.4, pp.227–229, 2009.

V. Sleglova and A. Cerna, "Cyberbullying in adolescent victims: Perception and coping," Cyberpsychology, vol.5, no.2, pp.4, 2011.

P. Sorokowski, A. Sorokowska, A. Oleszkiewicz, T. Frackowiak, A. Huk, and K. Pisanski, "Sex differences in online picture sharing among adolescents," Evol. Hum. Behav., vol. 33, no. 4, pp. 396–404, 2015.

S. Steinert and M. J. Dennis, "Emotions and digital well-being: On social media`s emotional affordances," Philos. Technol., vol. 35, no. 2, pp. 1–36, 2022.

J. Suler, "The online disinhibition effect," Cyberpsychology Behav., vol. 7, no. 3, pp. 321–326, 2004.

V. Talwar, S. Yachison, and K. Leduc, "Promoting honesty: The influence of stories on children`s lie-telling behaviours and moral understanding," Infant Child Dev., vol. 28, no. 1, p. 2116, 2019.

M. Tanis and T. Postmes, "Two faces of anonymity: Paradoxical effects of cues to identity in CMC," Comput. Human Behav., vol. 23, no. 2, pp. 955–970, 2007.

M. Tanis and T. Postmes, "Cues to identity in online dyads: Effects of interpersonal versus intragroup perceptions on performance," Group Dyn. Theory, Res. Pract., vol. 12, no. 2, pp. 96-105, 2008.

O. Turel and H. Qahri-Saremi, "Problematic use of social networking sites: Antecedents and consequence from a dual system theory perspective," J. Manag. Inf. Syst., vol. 33, no. 4, pp. 1087–1116, 2016.

R. Udris, "Cyberbullying among high school students in Japan: Development and validation of the Online Disinhibition Scale," Comput. Human Behav., vol. 41, pp. 253–261, 2014.

M. M. Vanden Abeele and M. H. Nguyen, "Digital well-being in an age of mobile connectivity: An introduction to the Special Issue," Mob. Media Commun., vol. 10, pp. 174–189, 2022.

S. Wachs, A. T. Vazsonyi, M. F. Wright, and C. Wolf, "Cyberbullying perpetration and victimization: The role of moral disengagement," J. Early Adolesc., vol. 39, no. 6, pp. 822–836, 2019.

J. B. Walther, "Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction," Commun. Res., vol. 23, no. 1, pp. 3–43, 1996.

S. C. Yang and C. Y. Y. Lin, "Factors influencing Internet addiction of adolescents in Taiwan: An empirical study," Comput. Human Behav., vol. 27, no. 6, pp. 2282–2291, 2011.

Z. Zhang, H. Ning, F. Shi, F. Farha, Y. Xu, J. Xu, and et al., "Artificial intelligence in cyber security: research advances, challenges, and opportunities," Artif. Intell. Rev., vol. 55, pp. 1029–1053, 2021.

Downloads

Published

2024-04-30

How to Cite

[1]
Kritika, “A Review on Harmonizing Psychological Factors into Cyber Space”, Int. J. Sci. Res. Net. Sec. Comm., vol. 12, no. 2, pp. 11–18, Apr. 2024.

Issue

Section

Review Article

Similar Articles

<< < 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.