• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 1
  • 1
  • 1
  • Tagged with
  • 14
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

An exploration of the relationship between health anxiety and health-related Internet use

Skelly, Niamh January 2016 (has links)
High health anxiety has negative repercussions at the individual, interpersonal, and societal levels. According to cognitive behavioural theory, health anxiety is maintained, in part, by behavioural factors, termed safety behaviours. Health-related Internet use (HRIU) may be an important safety behaviour for some health anxious individuals. The Internet offers an abundance of health information, and opportunities to engage in health-related behaviours. Paper 1 aims to establish what is known about the relationship between health anxiety and HRIU. A systematic search was undertaken to identify studies that fell into five broad categories. The identified studies (N = 30) were then narratively reviewed, with an emphasis on methodological quality, and consideration also given to clinical implications and directions for future research. The review indicated that research to date has focused almost entirely on the relationship between health anxiety and using the Internet to obtain health information, termed online health research (OHR). Health anxiety appears associated with amount of, and emotional response to, OHR. The majority of existing studies are cross-sectional. Many use unvalidated measures of HRIU, and/or convenience samples recruited from universities or via commercial services. The Cyberchondria Severity Scale has potential clinical utility as a measure of a specific health anxiety maintenance cycle. However, there is a need for a more general instrument that can be used to assess various dimensions of HRIU in a validated manner. Paper 2 is a cross-sectional, correlational study of relationships between HRIU, health anxiety, and health service utilisation in a clinical, help-seeking sample. Participants were recruited from primary care practices, and completed questionnaire measures. Extent and nature of HRIU, and emotional and behavioural responses to HRIU, were measured using the Online Health Beliefs and Behaviour Inventory (OHBBI). The OHBBI is a recently developed measure that has undergone preliminary psychometric validation. OHBBI subscales explained 30% of variance in health anxiety, but did not improve prediction of self-reported service utilisation. A moderated regression indicated that the relationship between the Illness-Focused Searching subscale and health service utilisation varied as a function of health anxiety, with a negative relationship at low levels of health anxiety, and a positive relationship at high levels. This study provides further evidence of a role for HRIU in the maintenance of health anxiety, and advances the literature by using a validated measure of HRIU, a clinical sample, and well-controlled models. Paper 3 is a critical, reflective appraisal of the thesis as a whole. Methodological decisions, and their ramifications, are discussed in detail. The importance of the thesis is summarised, and implications for clinical practice and future research are revisited. The OHBBI requires further psychometric refinement. Longitudinal studies, and studies that use objective measures of service utilisation, are needed. Safety behaviours, including various forms of HRIU, may interact with each other to perpetuate health anxiety; such complex maintenance cycles merit empirical investigation.
2

Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents

Howard, David J. 28 June 2018 (has links)
As organizations have become more reliant on computers and technology to operate in a globalized world, they have also become more vulnerable to cyberattacks on their networks. The expense to organizations from cyberattacks now exceeds $400 billion USD annually. These costs highlight the need for behavioral research in the cyber domain. The first phase of this research developed an instrument to measure workers’ cybersecurity attitudes. An iterative process resulted in a scale with good psychometric properties - The Cybersecurity Attitudes Scale. The scale measures two factors: cyber policy adherence attitudes and perceived vulnerability to a cyberattack. The second phase of this research used the theory of planned behavior as a theoretical framework to model the relationship between personality facets, policy adherence attitudes, perceived vulnerability, locus of control, cybersecurity climate, and cybersecurity behaviors. While the hypothesized model had poor fit for the data, there was a strong relationship between cybersecurity attitudes (i.e. policy adherence attitudes and perceived vulnerability) and dutifulness, altruism, compliance, cybersecurity climate, and cybersecurity behavior. This research provides practical value to academic researchers and organizations by providing a scale to measure cybersecurity attitudes and to help organizations better understand the nature of the antecedents that lead to cybersecurity attitudes and behavior.
3

Something Looks Phishy Here: Applications of Signal Detection Theory to Cyber-Security Behaviors in the Workplace

Martin, Jaclyn 15 March 2017 (has links)
Cyber-security is an ever-increasing problem in the 21st century. Though the majority of cyber-security breaches are a direct result of human error (Hu, Dinev, Hart, & Cooke, 2012), there is a dearth of research in psychology on the application of human decision-making for cyber-security compliance. Through an online inbox simulation, the present research examined the utility of a robust psychological model for decision-making, signal detection theory (SDT) for modeling decision-making in the context of receiving and responding to phishing and spear-phishing email scams. The influence of individual differences, specifically conscientiousness, on phishing email detection was also examined. The results indicate that SDT is useful for modeling and measuring cyber-compliance behavior in terms of responding to phishing emails. This finding supports the feasibility of using SDT to monitor training effectiveness for individuals’ resistance to social engineering in phishing email detection. There were no significant relationships between participants’ scores on conscientiousness and their phishing and spear-phishing email detection ability. Future research should explore predictors of cyber-compliance with regards to individuals’ phishing and spear-phishing susceptibility.
4

How the Online Disinhibition Effect Affects the Online Video Game Industry

Monjezizadeh, Ladbon, Untoro, Alex January 2016 (has links)
Extensive computer use is creating a society where its citizens are communicating outside the norm of real life. These diversions from real life communication behavior have been named the Online Disinhibition Effect (ODE). The effect is a psychological model that is structured with different types of elements which can be triggered by different communication mediums. There are two sides of the effect; a benign, where compassion and a reveal of emotions are more likely, and a toxic, where anger, frustration and threats are in focus. In the online video game industry, ODE is active, but as the medium is different than regular internet use the effects are different as well. This paper looks at how online video games are affected by ODE. By using the most current disinhibition model made by Suler and looking at modern cyberpsychology in online games, this paper found eight features that have the possibility to decrease disinhibition amongst users. This paper concludes with a warning that games are becoming more immersive and without the proper authority features, games will increase their disinhibition effect amongst its users.
5

Social Soul

AlShammari, Norah 01 January 2018 (has links)
Twitter has over 313 million users, with 500 million tweets produced each day. Society’s growing dependence on the internet for self-expression shows no sign of abating. However, recent research warns that social media perpetuates loneliness, caused by reduced face-to-face interaction. My thesis analyzes and demonstrates the important role facial expressions play in a conversation’s progress, impacting how people process and relate to what is being said. My work critically assesses communication problems associated with Twitter. By isolating and documenting expressive facial reactions to a curated selection of tweets, the exhibition creates a commentary on our contemporary digital existence, specifically articulating how use of social media limits basic social interaction.
6

What it means to be online for people with disabilities : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Psychology at Massey University, Palmerston North, New Zealand

Bowker, Natilene Irain Unknown Date (has links)
People with disabilities have traditionally occupied stigmatised identities due to less conventional ways of operating in daily life. The online medium with its absence of visible identity markers, which have typically determined how a person is read offline, combined with the constructive potential embedded within a largely textual medium, potentially, bring together greater control and flexibility in identity construction. The online medium, therefore, may offer social benefits to people with disabilities that are not available in other contexts. This research discursively explores what kinds of experiences are available for people with disabilities online. It argues that the online medium offers alternative subjectivities for positioning people with disabilities in the social world. Discursive findings, however, also show that operating online within a disabled identity creates marginalised experiences.Discourse analysis, underpinned by a social constructionist philosophy, which emphasises the constructive nature of language in creating experience, is utilised as a methodology for gathering and analysing data. I have adopted Gilbert and Mulkay's (1984) concept of an 'interpretative repertoire' to manage the construction of discursive patterns identified in the data. Semi-structured interviews with 21 people with physical and sensory disabilities, who used the online medium daily, or several times per week, were carried out. Participants were recruited from various disability organisations in New Zealand and were invited to take part in an online interview via email, or another online communication program of their choice. Participants were met in person prior to the interviews to confirm the researcher's credibility and to build rapport.Seven key repertoires were identified in the data, with each one organised around several discursive resources. A choice to disclose repertoire allows disability to become a flexible feature of identity to be revealed and/or concealed in a contextualised and occasioned fashion. The accessing a socially valued subjectivity repertoire enables people with disabilities to position themselves as valued members of the social world, free of the physical and psychological barriers constructed by others that surround disabled identities. A transcendence repertoire functions in the talk of people with disabilities by surpassing the physical, social, and psychological limitations arising from having to operate within a disabled body, allowing far greater capacity for participation. A participating in the world repertoire affords people with disabilities the opportunity to be part of a wider community of relationships, people, interests, activities, and information, creating a sense of global belonging and connection. The keeping safe and qualified deception repertoires, together, enable people with disabilities to successfully manage the dilemma of participating in a medium where there is potential for substantial self-gain as well as harm. In contrast to the repertoires available for experiencing alternative subjectivities, which operate outside the oppression of disabled identities, a disabling differentials repertoire demonstrates the social disadvantages surrounding disabled identities online. Discursive findings are discussed in relation to disembodiment, as the online medium enables abilities to extend beyond the body, lifting the ceiling on standard ways of operating. This opens up psychological benefits as people with disabilities are afforded opportunities to access and participate within many dimensions of social life. At a collective level, political implications associated with the absence online of disabled identities are raised. Issues of technopower are also mentioned, along with future research directions. Overall, participants' constructions demonstrate how the online medium makes available a social space where people with disabilities can temporarily step outside the physical, social, and psychological constraints of operating within disabled subjectivities. This was cherished and celebrated.
7

A phenomenological inquiry into the experiential world of ‘Second Life’ for individuals aged 60 years and older

Law, Eloise 30 October 2012 (has links)
This study qualitatively investigated older adults’ experience of Second Life from a descriptive phenomenological perspective. Second Life is a virtual world found on the Internet and is considered to be a cyber reality that simulates aspects of everyday real life. The participant group comprised of five individuals, between the ages of 60 and 79 years of age, who have been participating in Second Life for longer than six months. All of the participants reside in the United States and all of the participants have a tertiary education. The research revealed three essential themes to older individuals’ experience of Second Life that deals with: (1) Familiarisation with Second Life; (2) Connecting in Second Life; and (3) Second Life as a Place of Recreation. The research indicated that older adults seem to find value in their Second Life participation and tend to be actively involved and contributing members in this virtual world. These findings have implications for developmental theories in psychology that address later stages in life, and the researcher especially considers Erik Erikson’s psychosocial theory of development. Additional implications for adults in the later stages of life and the discipline of psychology are also considered. Copyright / Dissertation (MA)--University of Pretoria, 2012. / Psychology / unrestricted
8

It’s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber-Security Behaviors

Dreibelbis, Rachel Christine 19 January 2016 (has links)
Organizations have become increasingly concerned with developing and protecting their information security systems. Despite attempts to secure the information infrastructure, employees inside of organizations remain the largest source of threat to information cyber-security. While previous research has focused on behavioral and situational factors that influence cyber-security behaviors, the measurement of cyber behaviors and their relationship to other performance variables is poorly understood. The purpose of the present study is to 1) determine the underlying factor structure of a cyber-security behavior scale, 2) assess if individual personality traits predict four types of cyber-security behaviors: security assurance, security compliance, security risk, and security damaging behaviors, and 3) explore the relationship between citizenship and counterproductive work behaviors and cyber-security behaviors. Results indicate that cyber-security behavior can be separated into four distinct dimensions and that personality traits such as conscientiousness, agreeableness, and openness to experience are predictive of these behaviors. Additionally, positive cyber behaviors are related organizational citizenship behaviors, and potentially harmful cyber behaviors related to counterproductive work behaviors. This research has implications for using personality to predict cyber-security behaviors and reduce insider threat in the workplace.
9

Une lecture de la cyberviolence : la rencontre du sujet et du cyberespace dans les infractions à caractère sexuel envers mineurs réalisées sur Internet / A take on cyberviolence : the encounter of the subject and cyberspace in online sex offences against minors

Ventéjoux, Aude 30 January 2019 (has links)
Le développement des technologies de l’information et de la communication s’est accompagné de l’apparition de phénomènes violents et/ou infractionnels, qui se tiennent sur, ou grâce à, Internet. Existe-t-il une spécificité de ces conduites de cyberviolence, qui s’inscrivent dans ce que l’on nomme cyberespace ? La psycho-criminologie et la cyberpsychologie seront convoquées afin de proposer une réponse à cette question. Le présent travail étudiera, dans une approche clinique et qualitative, des situations d’infractions à caractère sexuel envers mineurs réalisées sur Internet. Ce travail proposera, à partir des données recueillies, une grille de lecture de la cyberviolence, qui s’intéressera au rapport du sujet auteur d’infractions avec la conduite infractionnelle, la victime, et le cyberespace. La cyberviolence naît d’une rencontre, celle d’un sujet vulnérable avec un cyberespace porteur d’opportunités. Il s’agira alors d’interroger cette rencontre, afin de saisir les processus et les dynamiques qui l’animent. / The development of information and communication technologies was followed by the emergence of violent and/or offensive phenomena that exist on or thanks to the Internet. Is there a specificity to these behaviors of cyberviolence, which are rooted in what one calls cyberspace? This question will be answered partly thanks to psycho-criminological and cyberpsychological theories. This work takes a close look at sex offences against minors on the Internet. Thanks to the collected data, this work will offer a perspective on cyberviolence, with an interest in the relationship between the offender and the offence, the victim, and cyberspace. Cyberviolence arises from an encounter between a vulnerable subject and a cyberspace bearing opportunities. This encounter will thus be questioned, in order to understand the process and dynamics it stems from.
10

Možnosti využití e-health metody zaměřující se na stres management u vysokoškolských studentů. / Potentiality of a e-health application as a stress management method among university students.

Kretíková, Andrea January 2021 (has links)
The project of the mobile application Nestresuju aims to create a digital tool in czech language, which effectiveness in the development of stress management skills will be tested and at the same time will be user-friendly and an appealing platform. Specifically, the mobile application Nestresuju target into the help with development of stress management skills through digital transformation of the psychological theory of coping strategies of R. Lazarus and S. Folkman. So far, the project has included several phases, including 1.5-year theoretical research, preparation, and programming phases, which was followed by a pilot survey involving 20 students from Prague universities. The results of quantitative, and especially qualitative data from the final interviews and user data showed that Nestresuju is perceived as useful and shows a trend of possible reduction of perceived stress. All sections of the application were mentioned as useful without significant differentiations. Overall, the tool was rated as professional and trustworthy, even though it is a student project. The results of the pilot survey serve as recommendations for updates in Nestresuju. Followed by main study conducted on a broader sample to verify the effectiveness of the digital tool. The importance of the eHealth application...

Page generated in 0.0657 seconds