CINXE.COM

Cyberpsychology Research Papers - Academia.edu

<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Cyberpsychology Research Papers - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "by_tag", 'action': "show_one", 'controller_action': 'by_tag#show_one', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="pBwHau/gVDjkA24xvz6/aKcjTBX6E+v9recM3d5/P3dT+r736x+wwtTW+f60QGBtKdbzp98Or9LLc0Oxjflbgw==" /> <link href="/Documents/in/Cyberpsychology?after=50%2C17647230" rel="next" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&amp;family=Gupter:wght@400;500;700&amp;family=IBM+Plex+Mono:wght@300;400&amp;family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&amp;display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="description" content="View Cyberpsychology Research Papers on Academia.edu for free." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'by_tag'; var $action_name = "show_one"; var $rails_env = 'production'; var $app_rev = '92477ec68c09d28ae4730a4143c926f074776319'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15276,"monthly_visitors":"113 million","monthly_visitor_count":113458213,"monthly_visitor_count_in_millions":113,"user_count":277557489,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1732817285000); window.Aedu.timeDifference = new Date().getTime() - 1732817285000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-bdb9e8c097f01e611f2fc5e2f1a9dc599beede975e2ae5629983543a1726e947.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-bae13f9b51961d5f1e06008e39e31d0138cb31332e8c2e874c6d6a250ec2bb14.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-19a25d160d01bde427443d06cd6b810c4c92c6026e7cb31519e06313eb24ed90.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://www.academia.edu/Documents/in/Cyberpsychology" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-by_tag a-show_one logged_out u-bgColorWhite'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-by_tag a-show_one logged_out u-bgColorWhite'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&amp;c2=26766707&amp;cv=2.0&amp;cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to&nbsp;<a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav no-sm no-md"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more&nbsp<span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i>&nbsp;We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i>&nbsp;Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less&nbsp<span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <div class="DesignSystem" style="margin-top:-40px"><div class="PageHeader"><div class="container"><div class="row"><style type="text/css">.sor-abstract { display: -webkit-box; overflow: hidden; text-overflow: ellipsis; -webkit-line-clamp: 3; -webkit-box-orient: vertical; }</style><div class="col-xs-12 clearfix"><div class="u-floatLeft"><h1 class="PageHeader-title u-m0x u-fs30">Cyberpsychology</h1><div class="u-tcGrayDark">23,364&nbsp;Followers</div><div class="u-tcGrayDark u-mt2x">Recent papers in&nbsp;<b>Cyberpsychology</b></div></div></div></div></div></div><div class="TabbedNavigation"><div class="container"><div class="row"><div class="col-xs-12 clearfix"><ul class="nav u-m0x u-p0x list-inline u-displayFlex"><li class="active"><a href="https://www.academia.edu/Documents/in/Cyberpsychology">Top Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Cyberpsychology/MostCited">Most Cited Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Cyberpsychology/MostDownloaded">Most Downloaded Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Cyberpsychology/MostRecent">Newest Papers</a></li><li><a class="" href="https://www.academia.edu/People/Cyberpsychology">People</a></li></ul></div><style type="text/css">ul.nav{flex-direction:row}@media(max-width: 567px){ul.nav{flex-direction:column}.TabbedNavigation li{max-width:100%}.TabbedNavigation li.active{background-color:var(--background-grey, #dddde2)}.TabbedNavigation li.active:before,.TabbedNavigation li.active:after{display:none}}</style></div></div></div><div class="container"><div class="row"><div class="col-xs-12"><div class="u-displayFlex"><div class="u-flexGrow1"><div class="works"><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_71880196" data-work_id="71880196" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/71880196/Basic_Issues_in_the_Application_of_Virtual_Reality_for_the_Assessment_and_Rehabilitation_of_Cognitive_Impairments_and_Functional_Disabilities">Basic Issues in the Application of Virtual Reality for the Assessment and Rehabilitation of Cognitive Impairments and Functional Disabilities</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">... complex, dynamic stimulus presentations and the capacity to record and measure all responses precisely within the virtual environ-ment. ... presented, followed by a description of our ongoing work developing a VR mental rotation and... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_71880196" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">... complex, dynamic stimulus presentations and the capacity to record and measure all responses precisely within the virtual environ-ment. ... presented, followed by a description of our ongoing work developing a VR mental rotation and spatial skills cognitive assessment and ...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/71880196" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b459e7e2bddc7e31655cc30dd6d35426" rel="nofollow" data-download="{&quot;attachment_id&quot;:92449132,&quot;asset_id&quot;:71880196,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/92449132/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="674319" href="https://usc.academia.edu/SkipRizzo">Skip Rizzo</a><script data-card-contents-for-user="674319" type="text/json">{"id":674319,"first_name":"Skip","last_name":"Rizzo","domain_name":"usc","page_name":"SkipRizzo","display_name":"Skip Rizzo","profile_url":"https://usc.academia.edu/SkipRizzo?f_ri=1580","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_71880196 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="71880196"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 71880196, container: ".js-paper-rank-work_71880196", }); });</script></li><li class="js-percentile-work_71880196 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 71880196; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_71880196"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_71880196 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="71880196"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 71880196; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=71880196]").text(description); $(".js-view-count-work_71880196").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_71880196").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="71880196"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">9</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a><script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=71880196]'), work: {"id":71880196,"title":"Basic Issues in the Application of Virtual Reality for the Assessment and Rehabilitation of Cognitive Impairments and Functional Disabilities","created_at":"2022-02-19T14:35:34.986-08:00","url":"https://www.academia.edu/71880196/Basic_Issues_in_the_Application_of_Virtual_Reality_for_the_Assessment_and_Rehabilitation_of_Cognitive_Impairments_and_Functional_Disabilities?f_ri=1580","dom_id":"work_71880196","summary":"... complex, dynamic stimulus presentations and the capacity to record and measure all responses precisely within the virtual environ-ment. ... presented, followed by a description of our ongoing work developing a VR mental rotation and spatial skills cognitive assessment and ...","downloadable_attachments":[{"id":92449132,"asset_id":71880196,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":674319,"first_name":"Skip","last_name":"Rizzo","domain_name":"usc","page_name":"SkipRizzo","display_name":"Skip Rizzo","profile_url":"https://usc.academia.edu/SkipRizzo?f_ri=1580","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580"},{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=1580"},{"id":341121,"name":"Cognitive impairment","url":"https://www.academia.edu/Documents/in/Cognitive_impairment?f_ri=1580"},{"id":855798,"name":"Cyberpsychology \u0026 Behavior","url":"https://www.academia.edu/Documents/in/Cyberpsychology_and_Behavior?f_ri=1580"},{"id":1826000,"name":"Functional Disability","url":"https://www.academia.edu/Documents/in/Functional_Disability?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_435710" data-work_id="435710" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/435710/LE_RESSORT_DE_LANGOISSE_DANS_LES_JEUX_VID%C3%89O_UNE_%C3%89BAUCHE_DE_CYBERPSYCHOLOGIE_CLINIQUE_The_Competence_of_Anguish_In_Video_Games_A_Draft_">LE RESSORT DE L&#39;ANGOISSE DANS LES JEUX VIDÉO UNE ÉBAUCHE DE CYBERPSYCHOLOGIE CLINIQUE= The Competence of Anguish In Video Games. A Draft …</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/435710" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="8369afea7fa5393de07508eefc85a341" rel="nofollow" data-download="{&quot;attachment_id&quot;:5303591,&quot;asset_id&quot;:435710,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/5303591/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="327048" href="https://univ-paris5.academia.edu/ThomasGaon">Thomas Gaon</a><script data-card-contents-for-user="327048" type="text/json">{"id":327048,"first_name":"Thomas","last_name":"Gaon","domain_name":"univ-paris5","page_name":"ThomasGaon","display_name":"Thomas Gaon","profile_url":"https://univ-paris5.academia.edu/ThomasGaon?f_ri=1580","photo":"https://0.academia-photos.com/327048/136579/158577/s65_thomas.gaon.jpg"}</script></span></span></li><li class="js-paper-rank-work_435710 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="435710"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 435710, container: ".js-paper-rank-work_435710", }); });</script></li><li class="js-percentile-work_435710 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 435710; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_435710"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_435710 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="435710"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 435710; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=435710]").text(description); $(".js-view-count-work_435710").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_435710").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="435710"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="244" href="https://www.academia.edu/Documents/in/Psychoanalysis">Psychoanalysis</a>,&nbsp;<script data-card-contents-for-ri="244" type="text/json">{"id":244,"name":"Psychoanalysis","url":"https://www.academia.edu/Documents/in/Psychoanalysis?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5199" href="https://www.academia.edu/Documents/in/Video_Games">Video Games</a><script data-card-contents-for-ri="5199" type="text/json">{"id":5199,"name":"Video Games","url":"https://www.academia.edu/Documents/in/Video_Games?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=435710]'), work: {"id":435710,"title":"LE RESSORT DE L'ANGOISSE DANS LES JEUX VIDÉO UNE ÉBAUCHE DE CYBERPSYCHOLOGIE CLINIQUE= The Competence of Anguish In Video Games. A Draft …","created_at":"2011-02-09T02:13:30.330-08:00","url":"https://www.academia.edu/435710/LE_RESSORT_DE_LANGOISSE_DANS_LES_JEUX_VID%C3%89O_UNE_%C3%89BAUCHE_DE_CYBERPSYCHOLOGIE_CLINIQUE_The_Competence_of_Anguish_In_Video_Games_A_Draft_?f_ri=1580","dom_id":"work_435710","summary":null,"downloadable_attachments":[{"id":5303591,"asset_id":435710,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":327048,"first_name":"Thomas","last_name":"Gaon","domain_name":"univ-paris5","page_name":"ThomasGaon","display_name":"Thomas Gaon","profile_url":"https://univ-paris5.academia.edu/ThomasGaon?f_ri=1580","photo":"https://0.academia-photos.com/327048/136579/158577/s65_thomas.gaon.jpg"}],"research_interests":[{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":244,"name":"Psychoanalysis","url":"https://www.academia.edu/Documents/in/Psychoanalysis?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":5199,"name":"Video Games","url":"https://www.academia.edu/Documents/in/Video_Games?f_ri=1580","nofollow":false},{"id":10174,"name":"Mediation","url":"https://www.academia.edu/Documents/in/Mediation?f_ri=1580"},{"id":203112,"name":"Gamedesign","url":"https://www.academia.edu/Documents/in/Gamedesign?f_ri=1580"},{"id":214512,"name":"Anguish","url":"https://www.academia.edu/Documents/in/Anguish?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_5708303" data-work_id="5708303" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/5708303/The_Internet_and_Terrorist_Radicalisation_The_Psychological_Dimension">The Internet &amp; Terrorist Radicalisation: The Psychological Dimension.</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Violent extremist groups from a wide variety of backgrounds have long been recognized to be making extensive use of the internet. However, assessments of the cyber-terrorist threat have often been wastefully focused on issues and concerns... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_5708303" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Violent extremist groups from a wide variety of backgrounds have long been recognized to be making extensive use of the internet. However, assessments of the cyber-terrorist threat have often been wastefully focused on issues and concerns which do not match fully with the reality of how terrorists are currently interested in the internet or on what activities such individuals and groups are actually engaged in. Instead, the main concern has been on what terrorists might do, especially with regard to information warfare. Such a heavy focus on possibilities is misguided and overlooks the substantial manner in which the internet is already being exploited by various extremists. Rather, much more serious issues are raised by the way in which terrorist organisations are currently and demonstrably using the internet to recruit new members, generate international support, raise and launder funds, and to share information and knowledge with similar groups</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/5708303" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="87658ae9f7a005ac08bf70ed1cd01960" rel="nofollow" data-download="{&quot;attachment_id&quot;:32987571,&quot;asset_id&quot;:5708303,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/32987571/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="7413156" href="https://royalholloway.academia.edu/AndrewSilke">Andrew Silke</a><script data-card-contents-for-user="7413156" type="text/json">{"id":7413156,"first_name":"Andrew","last_name":"Silke","domain_name":"royalholloway","page_name":"AndrewSilke","display_name":"Andrew Silke","profile_url":"https://royalholloway.academia.edu/AndrewSilke?f_ri=1580","photo":"https://0.academia-photos.com/7413156/2719468/22828755/s65_andrew.silke.png"}</script></span></span></li><li class="js-paper-rank-work_5708303 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="5708303"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 5708303, container: ".js-paper-rank-work_5708303", }); });</script></li><li class="js-percentile-work_5708303 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 5708303; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_5708303"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_5708303 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="5708303"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 5708303; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=5708303]").text(description); $(".js-view-count-work_5708303").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_5708303").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="5708303"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">11</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="9450" href="https://www.academia.edu/Documents/in/Radicalization">Radicalization</a>,&nbsp;<script data-card-contents-for-ri="9450" type="text/json">{"id":9450,"name":"Radicalization","url":"https://www.academia.edu/Documents/in/Radicalization?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="11336" href="https://www.academia.edu/Documents/in/Cyber_Terrorism">Cyber Terrorism</a><script data-card-contents-for-ri="11336" type="text/json">{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=5708303]'), work: {"id":5708303,"title":"The Internet \u0026 Terrorist Radicalisation: The Psychological Dimension.","created_at":"2014-01-13T21:33:22.720-08:00","url":"https://www.academia.edu/5708303/The_Internet_and_Terrorist_Radicalisation_The_Psychological_Dimension?f_ri=1580","dom_id":"work_5708303","summary":"Violent extremist groups from a wide variety of backgrounds have long been recognized to be making extensive use of the internet. However, assessments of the cyber-terrorist threat have often been wastefully focused on issues and concerns which do not match fully with the reality of how terrorists are currently interested in the internet or on what activities such individuals and groups are actually engaged in. Instead, the main concern has been on what terrorists might do, especially with regard to information warfare. Such a heavy focus on possibilities is misguided and overlooks the substantial manner in which the internet is already being exploited by various extremists. Rather, much more serious issues are raised by the way in which terrorist organisations are currently and demonstrably using the internet to recruit new members, generate international support, raise and launder funds, and to share information and knowledge with similar groups","downloadable_attachments":[{"id":32987571,"asset_id":5708303,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":7413156,"first_name":"Andrew","last_name":"Silke","domain_name":"royalholloway","page_name":"AndrewSilke","display_name":"Andrew Silke","profile_url":"https://royalholloway.academia.edu/AndrewSilke?f_ri=1580","photo":"https://0.academia-photos.com/7413156/2719468/22828755/s65_andrew.silke.png"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1580","nofollow":false},{"id":9450,"name":"Radicalization","url":"https://www.academia.edu/Documents/in/Radicalization?f_ri=1580","nofollow":false},{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=1580","nofollow":false},{"id":22342,"name":"Terrorism and Psychology","url":"https://www.academia.edu/Documents/in/Terrorism_and_Psychology?f_ri=1580"},{"id":55397,"name":"Internet psychology","url":"https://www.academia.edu/Documents/in/Internet_psychology?f_ri=1580"},{"id":57986,"name":"Radicalisation","url":"https://www.academia.edu/Documents/in/Radicalisation?f_ri=1580"},{"id":209746,"name":"Online Violent and Non-Violent Radicalisation","url":"https://www.academia.edu/Documents/in/Online_Violent_and_Non-Violent_Radicalisation?f_ri=1580"},{"id":561713,"name":"Terrorist Radicalization","url":"https://www.academia.edu/Documents/in/Terrorist_Radicalization?f_ri=1580"},{"id":645628,"name":"Psychology of Terrorism","url":"https://www.academia.edu/Documents/in/Psychology_of_Terrorism?f_ri=1580"},{"id":965590,"name":"Mindset of a Terrorist","url":"https://www.academia.edu/Documents/in/Mindset_of_a_Terrorist?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_18578455 coauthored" data-work_id="18578455" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/18578455/Cyber_Babies_The_Impact_of_Emerging_Technology_on_the_Developing_Infant">Cyber Babies: The Impact of Emerging Technology on the Developing Infant</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Technology is now ubiquitous with almost 3.2 billion people of the world’s current population online (International Telecommunications Union, 2015). Whilst technology offers opportunities for education and entertainment, its impact on... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_18578455" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Technology is now ubiquitous with almost 3.2 billion people of the world’s current population online (International<br />Telecommunications Union, 2015). Whilst technology offers opportunities for education and entertainment, its<br />impact on vulnerable populations such as the developing infant requires specific, careful consideration. Fourteen<br />percent of infants (aged 6 to 23 months) watch at least two hours of media per day and one third of children under 3<br />have a television (TV) in their bedroom (Zimmerman, Christakis, &amp; Meltzoff, 2007a). Twenty-five percent of<br />3-year-olds go online daily (Bernstein &amp; Levine, 2011) and 28% of 3 to 4-year-olds now use tablet computers<br />(Ofcom, 2014). Children are growing up with a digital foundation, they are interacting with and immersed in<br />cyberspace where they learn, entertain themselves and play. During the first three years of life, the brain creates<br />some 700 new neural connections every second. Synapse formation for key developmental functions such as<br />hearing, language and cognition peak during this time, creating a critical foundation for higher-level functions<br />(Zero to Three, 2015). Very young children are becoming experts at using technology and are true digital natives.<br />Yet what long-term effects will this early exposure have from a developmental perspective? Researchers are now<br />questioning how interactive media may affect children both mentally and physically (American Academy of<br />Paediatrics, 2011; Radesky, Schumacher, &amp; Zuckerman, 2014). Screen time research has traditionally focused on<br />the impact of TV on children (Linebarger &amp; Walker, 2005). However, TV is a passive experience and results may<br />not be applicable compared to highly interactive screen technology such as tablets and smartphones, thus the<br />uniqueness of mobile technology needs to be considered. Experts in Canada, France, Australia, Japan, and South<br />Korea have urged limits on children’s screen time and legislation has recently been introduced in Taiwan to limit<br />children’s unhealthy use of electronic devices (Boseley, 2012; Locker, 2015; Tanimura, Okuma, &amp; Kyoshima,<br />2007). Research and recommendations are urgently required regarding the impact of technology on infants and very<br />young children, particularly as the effect of traditional and interactive screen time is potentially developmentally<br />and cyberpsychologically significant in this age group.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/18578455" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="7efcfd3094f0bcb1dfacbc95b09c24fa" rel="nofollow" data-download="{&quot;attachment_id&quot;:40138726,&quot;asset_id&quot;:18578455,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40138726/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1228908" href="https://rcsi.academia.edu/MaryAiken">Mary P Aiken</a><script data-card-contents-for-user="1228908" type="text/json">{"id":1228908,"first_name":"Mary","last_name":"Aiken","domain_name":"rcsi","page_name":"MaryAiken","display_name":"Mary P Aiken","profile_url":"https://rcsi.academia.edu/MaryAiken?f_ri=1580","photo":"/images/s65_no_pic.png"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-18578455">+1</span><div class="hidden js-additional-users-18578455"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/CiaranHaughton">Ciaran Haughton</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-18578455'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-18578455').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_18578455 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="18578455"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 18578455, container: ".js-paper-rank-work_18578455", }); });</script></li><li class="js-percentile-work_18578455 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 18578455; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_18578455"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_18578455 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="18578455"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 18578455; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=18578455]").text(description); $(".js-view-count-work_18578455").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_18578455").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="18578455"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">5</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="922" href="https://www.academia.edu/Documents/in/Education">Education</a>,&nbsp;<script data-card-contents-for-ri="922" type="text/json">{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="923" href="https://www.academia.edu/Documents/in/Technology">Technology</a>,&nbsp;<script data-card-contents-for-ri="923" type="text/json">{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="120582" href="https://www.academia.edu/Documents/in/Infant_Development">Infant Development</a><script data-card-contents-for-ri="120582" type="text/json">{"id":120582,"name":"Infant Development","url":"https://www.academia.edu/Documents/in/Infant_Development?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=18578455]'), work: {"id":18578455,"title":"Cyber Babies: The Impact of Emerging Technology on the Developing Infant","created_at":"2015-11-18T05:32:46.511-08:00","url":"https://www.academia.edu/18578455/Cyber_Babies_The_Impact_of_Emerging_Technology_on_the_Developing_Infant?f_ri=1580","dom_id":"work_18578455","summary":"Technology is now ubiquitous with almost 3.2 billion people of the world’s current population online (International\nTelecommunications Union, 2015). Whilst technology offers opportunities for education and entertainment, its\nimpact on vulnerable populations such as the developing infant requires specific, careful consideration. Fourteen\npercent of infants (aged 6 to 23 months) watch at least two hours of media per day and one third of children under 3\nhave a television (TV) in their bedroom (Zimmerman, Christakis, \u0026 Meltzoff, 2007a). Twenty-five percent of\n3-year-olds go online daily (Bernstein \u0026 Levine, 2011) and 28% of 3 to 4-year-olds now use tablet computers\n(Ofcom, 2014). Children are growing up with a digital foundation, they are interacting with and immersed in\ncyberspace where they learn, entertain themselves and play. During the first three years of life, the brain creates\nsome 700 new neural connections every second. Synapse formation for key developmental functions such as\nhearing, language and cognition peak during this time, creating a critical foundation for higher-level functions\n(Zero to Three, 2015). Very young children are becoming experts at using technology and are true digital natives.\nYet what long-term effects will this early exposure have from a developmental perspective? Researchers are now\nquestioning how interactive media may affect children both mentally and physically (American Academy of\nPaediatrics, 2011; Radesky, Schumacher, \u0026 Zuckerman, 2014). Screen time research has traditionally focused on\nthe impact of TV on children (Linebarger \u0026 Walker, 2005). However, TV is a passive experience and results may\nnot be applicable compared to highly interactive screen technology such as tablets and smartphones, thus the\nuniqueness of mobile technology needs to be considered. Experts in Canada, France, Australia, Japan, and South\nKorea have urged limits on children’s screen time and legislation has recently been introduced in Taiwan to limit\nchildren’s unhealthy use of electronic devices (Boseley, 2012; Locker, 2015; Tanimura, Okuma, \u0026 Kyoshima,\n2007). Research and recommendations are urgently required regarding the impact of technology on infants and very\nyoung children, particularly as the effect of traditional and interactive screen time is potentially developmentally\nand cyberpsychologically significant in this age group.","downloadable_attachments":[{"id":40138726,"asset_id":18578455,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1228908,"first_name":"Mary","last_name":"Aiken","domain_name":"rcsi","page_name":"MaryAiken","display_name":"Mary P Aiken","profile_url":"https://rcsi.academia.edu/MaryAiken?f_ri=1580","photo":"/images/s65_no_pic.png"},{"id":14423591,"first_name":"Ciaran","last_name":"Haughton","domain_name":"independent","page_name":"CiaranHaughton","display_name":"Ciaran Haughton","profile_url":"https://independent.academia.edu/CiaranHaughton?f_ri=1580","photo":"https://0.academia-photos.com/14423591/4242870/4936573/s65_ciaran.haughton.jpg"}],"research_interests":[{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=1580","nofollow":false},{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":120582,"name":"Infant Development","url":"https://www.academia.edu/Documents/in/Infant_Development?f_ri=1580","nofollow":false},{"id":2209716,"name":"Screen Time","url":"https://www.academia.edu/Documents/in/Screen_Time?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_40557308" data-work_id="40557308" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/40557308/iPredator_Dark_Side_of_Cyberspace_Concept">iPredator - Dark Side of Cyberspace Concept</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">&quot;iPredator - Dark Side of Cyberspace Concept&quot; (Edited &amp; Revised 2019) is the updated version to Dr. Nuccitelli&#39;s original 2010 concept. iPredator remains an online assailant concept and explores why some online users become targets.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/40557308" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="dca6397c94f3c623ea256e4a5b36229e" rel="nofollow" data-download="{&quot;attachment_id&quot;:68508329,&quot;asset_id&quot;:40557308,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/68508329/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="970893" href="https://independent.academia.edu/MichaelNuccitelliPsyD">Michael Nuccitelli, Psy.D.</a><script data-card-contents-for-user="970893" type="text/json">{"id":970893,"first_name":"Michael","last_name":"Nuccitelli, Psy.D.","domain_name":"independent","page_name":"MichaelNuccitelliPsyD","display_name":"Michael Nuccitelli, Psy.D.","profile_url":"https://independent.academia.edu/MichaelNuccitelliPsyD?f_ri=1580","photo":"https://0.academia-photos.com/970893/366884/15961793/s65_michael.nuccitelli_psy.d..png"}</script></span></span></li><li class="js-paper-rank-work_40557308 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="40557308"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 40557308, container: ".js-paper-rank-work_40557308", }); });</script></li><li class="js-percentile-work_40557308 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40557308; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_40557308"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_40557308 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="40557308"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40557308; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40557308]").text(description); $(".js-view-count-work_40557308").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_40557308").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="40557308"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">20</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="189" href="https://www.academia.edu/Documents/in/Criminology">Criminology</a>,&nbsp;<script data-card-contents-for-ri="189" type="text/json">{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="539" href="https://www.academia.edu/Documents/in/Forensics">Forensics</a>,&nbsp;<script data-card-contents-for-ri="539" type="text/json">{"id":539,"name":"Forensics","url":"https://www.academia.edu/Documents/in/Forensics?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a><script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=40557308]'), work: {"id":40557308,"title":"iPredator - Dark Side of Cyberspace Concept","created_at":"2019-10-08T06:08:03.816-07:00","url":"https://www.academia.edu/40557308/iPredator_Dark_Side_of_Cyberspace_Concept?f_ri=1580","dom_id":"work_40557308","summary":"\"iPredator - Dark Side of Cyberspace Concept\" (Edited \u0026 Revised 2019) is the updated version to Dr. Nuccitelli's original 2010 concept. iPredator remains an online assailant concept and explores why some online users become targets. ","downloadable_attachments":[{"id":68508329,"asset_id":40557308,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":970893,"first_name":"Michael","last_name":"Nuccitelli, Psy.D.","domain_name":"independent","page_name":"MichaelNuccitelliPsyD","display_name":"Michael Nuccitelli, Psy.D.","profile_url":"https://independent.academia.edu/MichaelNuccitelliPsyD?f_ri=1580","photo":"https://0.academia-photos.com/970893/366884/15961793/s65_michael.nuccitelli_psy.d..png"}],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":539,"name":"Forensics","url":"https://www.academia.edu/Documents/in/Forensics?f_ri=1580","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=1580","nofollow":false},{"id":1284,"name":"Computer Forensics","url":"https://www.academia.edu/Documents/in/Computer_Forensics?f_ri=1580"},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580"},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=1580"},{"id":4545,"name":"Parenting","url":"https://www.academia.edu/Documents/in/Parenting?f_ri=1580"},{"id":9135,"name":"The Internet of Things","url":"https://www.academia.edu/Documents/in/The_Internet_of_Things?f_ri=1580"},{"id":11470,"name":"Cyberculture","url":"https://www.academia.edu/Documents/in/Cyberculture?f_ri=1580"},{"id":12756,"name":"Cyberbullying","url":"https://www.academia.edu/Documents/in/Cyberbullying?f_ri=1580"},{"id":16416,"name":"Internet \u0026 Society","url":"https://www.academia.edu/Documents/in/Internet_and_Society?f_ri=1580"},{"id":50160,"name":"Digital Forensics","url":"https://www.academia.edu/Documents/in/Digital_Forensics?f_ri=1580"},{"id":59533,"name":"Internet Addiction","url":"https://www.academia.edu/Documents/in/Internet_Addiction?f_ri=1580"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1580"},{"id":247799,"name":"Internet of Things (IoT)","url":"https://www.academia.edu/Documents/in/Internet_of_Things_IoT_?f_ri=1580"},{"id":423158,"name":"Cyberstalking","url":"https://www.academia.edu/Documents/in/Cyberstalking?f_ri=1580"},{"id":440813,"name":"Infosec","url":"https://www.academia.edu/Documents/in/Infosec?f_ri=1580"},{"id":467668,"name":"Cyberterrorism","url":"https://www.academia.edu/Documents/in/Cyberterrorism?f_ri=1580"},{"id":966926,"name":"Ipredator","url":"https://www.academia.edu/Documents/in/Ipredator?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_15901469" data-work_id="15901469" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/15901469/Escapism_current_studies_and_research_prospects_in_contemporary_psychology">Escapism: current studies and research prospects in contemporary psychology</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">A review and investigation of current empirical studies and tendencies in the escapism problem is presented. It is also substantiated that the future research projects should be concentrated on designing and validating a fundamental... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_15901469" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">A review and investigation of current empirical studies and tendencies in the escapism problem is presented. It is also substantiated that the future research projects should be concentrated on designing and validating a fundamental theoretical approach of escapism. The integrative theory should be able to explain the phenomenon in a broader meaning and integrate its two opposite poles — negative and positive escapism.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/15901469" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="97b7c77f655c2b19f7aebebf6d6965df" rel="nofollow" data-download="{&quot;attachment_id&quot;:38821790,&quot;asset_id&quot;:15901469,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38821790/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="17244676" href="https://ipras.academia.edu/teslavskaia">Oksana Teslavskaia (Olkina)</a><script data-card-contents-for-user="17244676" type="text/json">{"id":17244676,"first_name":"Oksana","last_name":"Teslavskaia (Olkina)","domain_name":"ipras","page_name":"teslavskaia","display_name":"Oksana Teslavskaia (Olkina)","profile_url":"https://ipras.academia.edu/teslavskaia?f_ri=1580","photo":"https://0.academia-photos.com/17244676/4773235/29608008/s65_oksana.teslavskaia_olkina_.jpg"}</script></span></span></li><li class="js-paper-rank-work_15901469 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="15901469"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 15901469, container: ".js-paper-rank-work_15901469", }); });</script></li><li class="js-percentile-work_15901469 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 15901469; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_15901469"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_15901469 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="15901469"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 15901469; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=15901469]").text(description); $(".js-view-count-work_15901469").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_15901469").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="15901469"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="42287" href="https://www.academia.edu/Documents/in/Escapism">Escapism</a>,&nbsp;<script data-card-contents-for-ri="42287" type="text/json">{"id":42287,"name":"Escapism","url":"https://www.academia.edu/Documents/in/Escapism?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="228958" href="https://www.academia.edu/Documents/in/Role_Playing_Games">Role Playing Games</a>,&nbsp;<script data-card-contents-for-ri="228958" type="text/json">{"id":228958,"name":"Role Playing Games","url":"https://www.academia.edu/Documents/in/Role_Playing_Games?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="494561" href="https://www.academia.edu/Documents/in/Online_Addiction">Online Addiction</a><script data-card-contents-for-ri="494561" type="text/json">{"id":494561,"name":"Online Addiction","url":"https://www.academia.edu/Documents/in/Online_Addiction?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=15901469]'), work: {"id":15901469,"title":"Escapism: current studies and research prospects in contemporary psychology","created_at":"2015-09-19T08:00:33.666-07:00","url":"https://www.academia.edu/15901469/Escapism_current_studies_and_research_prospects_in_contemporary_psychology?f_ri=1580","dom_id":"work_15901469","summary":"A review and investigation of current empirical studies and tendencies in the escapism problem is presented. It is also substantiated that the future research projects should be concentrated on designing and validating a fundamental theoretical approach of escapism. The integrative theory should be able to explain the phenomenon in a broader meaning and integrate its two opposite poles — negative and positive escapism.","downloadable_attachments":[{"id":38821790,"asset_id":15901469,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":17244676,"first_name":"Oksana","last_name":"Teslavskaia (Olkina)","domain_name":"ipras","page_name":"teslavskaia","display_name":"Oksana Teslavskaia (Olkina)","profile_url":"https://ipras.academia.edu/teslavskaia?f_ri=1580","photo":"https://0.academia-photos.com/17244676/4773235/29608008/s65_oksana.teslavskaia_olkina_.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":42287,"name":"Escapism","url":"https://www.academia.edu/Documents/in/Escapism?f_ri=1580","nofollow":false},{"id":228958,"name":"Role Playing Games","url":"https://www.academia.edu/Documents/in/Role_Playing_Games?f_ri=1580","nofollow":false},{"id":494561,"name":"Online Addiction","url":"https://www.academia.edu/Documents/in/Online_Addiction?f_ri=1580","nofollow":false},{"id":1442512,"name":"Escapism Studies","url":"https://www.academia.edu/Documents/in/Escapism_Studies?f_ri=1580"},{"id":1973681,"name":"эскапизм","url":"https://www.academia.edu/Documents/in/%D1%8D%D1%81%D0%BA%D0%B0%D0%BF%D0%B8%D0%B7%D0%BC?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_27224787" data-work_id="27224787" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/27224787/CYBERSPACE_GOVERNANCE_The_Imperative_For_National_and_Economic_Security">CYBERSPACE GOVERNANCE: The Imperative For National &amp; Economic Security</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Proceedings of the INTERNATIONAL CONFERENCE ON <br />&quot;CYBERSPACE GOVERNANCE:The Imperative For National &amp; Economic Security&quot;</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/27224787" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4800ec84c6323c6521d572d3ea14e846" rel="nofollow" data-download="{&quot;attachment_id&quot;:47482571,&quot;asset_id&quot;:27224787,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/47482571/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="15938679" href="https://nsukonline.academia.edu/EmmanuelDandaura">Emmanuel S Dandaura</a><script data-card-contents-for-user="15938679" type="text/json">{"id":15938679,"first_name":"Emmanuel","last_name":"Dandaura","domain_name":"nsukonline","page_name":"EmmanuelDandaura","display_name":"Emmanuel S Dandaura","profile_url":"https://nsukonline.academia.edu/EmmanuelDandaura?f_ri=1580","photo":"https://0.academia-photos.com/15938679/10541078/11764188/s65_eman.dan.jpg"}</script></span></span></li><li class="js-paper-rank-work_27224787 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="27224787"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 27224787, container: ".js-paper-rank-work_27224787", }); });</script></li><li class="js-percentile-work_27224787 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 27224787; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_27224787"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_27224787 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="27224787"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 27224787; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=27224787]").text(description); $(".js-view-count-work_27224787").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_27224787").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="27224787"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">46</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="128" href="https://www.academia.edu/Documents/in/History">History</a>,&nbsp;<script data-card-contents-for-ri="128" type="text/json">{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="184" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>,&nbsp;<script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="248" href="https://www.academia.edu/Documents/in/Social_Psychology">Social Psychology</a>,&nbsp;<script data-card-contents-for-ri="248" type="text/json">{"id":248,"name":"Social Psychology","url":"https://www.academia.edu/Documents/in/Social_Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="261" href="https://www.academia.edu/Documents/in/Geography">Geography</a><script data-card-contents-for-ri="261" type="text/json">{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=27224787]'), work: {"id":27224787,"title":"CYBERSPACE GOVERNANCE: The Imperative For National \u0026 Economic Security","created_at":"2016-07-24T12:43:29.686-07:00","url":"https://www.academia.edu/27224787/CYBERSPACE_GOVERNANCE_The_Imperative_For_National_and_Economic_Security?f_ri=1580","dom_id":"work_27224787","summary":"Proceedings of the INTERNATIONAL CONFERENCE ON \n\"CYBERSPACE GOVERNANCE:The Imperative For National \u0026 Economic Security\"","downloadable_attachments":[{"id":47482571,"asset_id":27224787,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":15938679,"first_name":"Emmanuel","last_name":"Dandaura","domain_name":"nsukonline","page_name":"EmmanuelDandaura","display_name":"Emmanuel S Dandaura","profile_url":"https://nsukonline.academia.edu/EmmanuelDandaura?f_ri=1580","photo":"https://0.academia-photos.com/15938679/10541078/11764188/s65_eman.dan.jpg"}],"research_interests":[{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=1580","nofollow":false},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=1580","nofollow":false},{"id":248,"name":"Social Psychology","url":"https://www.academia.edu/Documents/in/Social_Psychology?f_ri=1580","nofollow":false},{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography?f_ri=1580","nofollow":false},{"id":300,"name":"Mathematics","url":"https://www.academia.edu/Documents/in/Mathematics?f_ri=1580"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1580"},{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics?f_ri=1580"},{"id":808,"name":"Aesthetics","url":"https://www.academia.edu/Documents/in/Aesthetics?f_ri=1580"},{"id":947,"name":"Theatre Studies","url":"https://www.academia.edu/Documents/in/Theatre_Studies?f_ri=1580"},{"id":951,"name":"Humanities","url":"https://www.academia.edu/Documents/in/Humanities?f_ri=1580"},{"id":982,"name":"Cyberlaw","url":"https://www.academia.edu/Documents/in/Cyberlaw?f_ri=1580"},{"id":1197,"name":"Digital Humanities","url":"https://www.academia.edu/Documents/in/Digital_Humanities?f_ri=1580"},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=1580"},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=1580"},{"id":1452,"name":"Corporate Social Responsibility","url":"https://www.academia.edu/Documents/in/Corporate_Social_Responsibility?f_ri=1580"},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580"},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=1580"},{"id":2553,"name":"Social Networking","url":"https://www.academia.edu/Documents/in/Social_Networking?f_ri=1580"},{"id":2606,"name":"Innovation statistics","url":"https://www.academia.edu/Documents/in/Innovation_statistics?f_ri=1580"},{"id":2858,"name":"Popular Culture","url":"https://www.academia.edu/Documents/in/Popular_Culture?f_ri=1580"},{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=1580"},{"id":3723,"name":"History of Science","url":"https://www.academia.edu/Documents/in/History_of_Science?f_ri=1580"},{"id":4181,"name":"Cybernetics","url":"https://www.academia.edu/Documents/in/Cybernetics?f_ri=1580"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=1580"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=1580"},{"id":5401,"name":"Computer-Mediated Communication","url":"https://www.academia.edu/Documents/in/Computer-Mediated_Communication?f_ri=1580"},{"id":6222,"name":"Drama","url":"https://www.academia.edu/Documents/in/Drama?f_ri=1580"},{"id":6865,"name":"Digital Culture","url":"https://www.academia.edu/Documents/in/Digital_Culture?f_ri=1580"},{"id":7057,"name":"Cyberstudies","url":"https://www.academia.edu/Documents/in/Cyberstudies?f_ri=1580"},{"id":7125,"name":"Culture","url":"https://www.academia.edu/Documents/in/Culture?f_ri=1580"},{"id":8673,"name":"Digital Media \u0026 Learning","url":"https://www.academia.edu/Documents/in/Digital_Media_and_Learning?f_ri=1580"},{"id":9038,"name":"Digital Signal Processing","url":"https://www.academia.edu/Documents/in/Digital_Signal_Processing?f_ri=1580"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1580"},{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=1580"},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=1580"},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=1580"},{"id":29128,"name":"Cybercultures","url":"https://www.academia.edu/Documents/in/Cybercultures?f_ri=1580"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=1580"},{"id":41862,"name":"Cyberwarfare","url":"https://www.academia.edu/Documents/in/Cyberwarfare?f_ri=1580"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=1580"},{"id":48200,"name":"Digital Library","url":"https://www.academia.edu/Documents/in/Digital_Library?f_ri=1580"},{"id":96546,"name":"Cyber Law","url":"https://www.academia.edu/Documents/in/Cyber_Law?f_ri=1580"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1580"},{"id":272255,"name":"Scienses","url":"https://www.academia.edu/Documents/in/Scienses?f_ri=1580"},{"id":1224548,"name":"Electrical and Computer Engineering (ECE)","url":"https://www.academia.edu/Documents/in/Electrical_and_Computer_Engineering_ECE_?f_ri=1580"},{"id":1226904,"name":"Computer Science and Engineering","url":"https://www.academia.edu/Documents/in/Computer_Science_and_Engineering-1?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_50017317" data-work_id="50017317" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/50017317/A_virtual_environment_to_create_social_situations_First_step_to_a_virtual_reality_exposure_therapy_system_for_social_phobia">A virtual environment to create social situations: First step to a virtual reality exposure therapy system for social phobia</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This paper describes a study to examine how a social situation can be simulated in a virtual environment, and how to provoke the same behavioral response as in a real life social situation. The aim is to create new Virtual Reality worlds... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_50017317" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This paper describes a study to examine how a social situation can be simulated in a virtual environment, and how to provoke the same behavioral response as in a real life social situation. The aim is to create new Virtual Reality worlds for treating social phobia. Two cases were examined in a virtual environment to assess whether it was able to recreate social behavior of people. First, we examined if participants who enter a crowded room in the virtual environment prefer to take a seat in a chair that is close to them. ...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/50017317" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6bf5a0486d6584cc9e375a3e733cbb00" rel="nofollow" data-download="{&quot;attachment_id&quot;:68159430,&quot;asset_id&quot;:50017317,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/68159430/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="38592089" href="https://marmara.academia.edu/FatmaInan">Fatma İnan düdükcü</a><script data-card-contents-for-user="38592089" type="text/json">{"id":38592089,"first_name":"Fatma","last_name":"İnan düdükcü","domain_name":"marmara","page_name":"FatmaInan","display_name":"Fatma İnan düdükcü","profile_url":"https://marmara.academia.edu/FatmaInan?f_ri=1580","photo":"https://0.academia-photos.com/38592089/11240790/48556430/s65_fatma.i_nan_d_d_kc_.jpeg"}</script></span></span></li><li class="js-paper-rank-work_50017317 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="50017317"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 50017317, container: ".js-paper-rank-work_50017317", }); });</script></li><li class="js-percentile-work_50017317 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 50017317; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_50017317"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_50017317 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="50017317"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 50017317; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=50017317]").text(description); $(".js-view-count-work_50017317").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_50017317").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="50017317"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">11</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1314" href="https://www.academia.edu/Documents/in/Anxiety_Disorders">Anxiety Disorders</a>,&nbsp;<script data-card-contents-for-ri="1314" type="text/json">{"id":1314,"name":"Anxiety Disorders","url":"https://www.academia.edu/Documents/in/Anxiety_Disorders?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3068" href="https://www.academia.edu/Documents/in/Social_Anxiety">Social Anxiety</a>,&nbsp;<script data-card-contents-for-ri="3068" type="text/json">{"id":3068,"name":"Social Anxiety","url":"https://www.academia.edu/Documents/in/Social_Anxiety?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="21842" href="https://www.academia.edu/Documents/in/Virtual_Worlds">Virtual Worlds</a><script data-card-contents-for-ri="21842" type="text/json">{"id":21842,"name":"Virtual Worlds","url":"https://www.academia.edu/Documents/in/Virtual_Worlds?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=50017317]'), work: {"id":50017317,"title":"A virtual environment to create social situations: First step to a virtual reality exposure therapy system for social phobia","created_at":"2021-07-17T08:02:59.479-07:00","url":"https://www.academia.edu/50017317/A_virtual_environment_to_create_social_situations_First_step_to_a_virtual_reality_exposure_therapy_system_for_social_phobia?f_ri=1580","dom_id":"work_50017317","summary":"This paper describes a study to examine how a social situation can be simulated in a virtual environment, and how to provoke the same behavioral response as in a real life social situation. The aim is to create new Virtual Reality worlds for treating social phobia. Two cases were examined in a virtual environment to assess whether it was able to recreate social behavior of people. First, we examined if participants who enter a crowded room in the virtual environment prefer to take a seat in a chair that is close to them. ...","downloadable_attachments":[{"id":68159430,"asset_id":50017317,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":38592089,"first_name":"Fatma","last_name":"İnan düdükcü","domain_name":"marmara","page_name":"FatmaInan","display_name":"Fatma İnan düdükcü","profile_url":"https://marmara.academia.edu/FatmaInan?f_ri=1580","photo":"https://0.academia-photos.com/38592089/11240790/48556430/s65_fatma.i_nan_d_d_kc_.jpeg"}],"research_interests":[{"id":1314,"name":"Anxiety Disorders","url":"https://www.academia.edu/Documents/in/Anxiety_Disorders?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":3068,"name":"Social Anxiety","url":"https://www.academia.edu/Documents/in/Social_Anxiety?f_ri=1580","nofollow":false},{"id":21842,"name":"Virtual Worlds","url":"https://www.academia.edu/Documents/in/Virtual_Worlds?f_ri=1580","nofollow":false},{"id":29614,"name":"Visual Presence","url":"https://www.academia.edu/Documents/in/Visual_Presence?f_ri=1580"},{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=1580"},{"id":53331,"name":"Social behavior","url":"https://www.academia.edu/Documents/in/Social_behavior?f_ri=1580"},{"id":68786,"name":"Virtual Environment","url":"https://www.academia.edu/Documents/in/Virtual_Environment?f_ri=1580"},{"id":77790,"name":"Phobias","url":"https://www.academia.edu/Documents/in/Phobias?f_ri=1580"},{"id":138466,"name":"Mental Health Computing","url":"https://www.academia.edu/Documents/in/Mental_Health_Computing?f_ri=1580"},{"id":628583,"name":"Social Behavior","url":"https://www.academia.edu/Documents/in/Social_Behavior-1?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_47216792" data-work_id="47216792" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/47216792/Feasibility_Motivation_and_Selective_Motor_Control_Virtual_Reality_Compared_to_Conventional_Home_Exercise_in_Children_with_Cerebral_Palsy">Feasibility, Motivation, and Selective Motor Control: Virtual Reality Compared to Conventional Home Exercise in Children with Cerebral Palsy</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/47216792" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="c8196b9d858d2176e76a4777c2d32272" rel="nofollow" data-download="{&quot;attachment_id&quot;:66433579,&quot;asset_id&quot;:47216792,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/66433579/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="133389632" href="https://independent.academia.edu/BrienMarie">Marie Brien</a><script data-card-contents-for-user="133389632" type="text/json">{"id":133389632,"first_name":"Marie","last_name":"Brien","domain_name":"independent","page_name":"BrienMarie","display_name":"Marie Brien","profile_url":"https://independent.academia.edu/BrienMarie?f_ri=1580","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_47216792 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="47216792"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 47216792, container: ".js-paper-rank-work_47216792", }); });</script></li><li class="js-percentile-work_47216792 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 47216792; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_47216792"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_47216792 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="47216792"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 47216792; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=47216792]").text(description); $(".js-view-count-work_47216792").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_47216792").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="47216792"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">17</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a><script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=47216792]'), work: {"id":47216792,"title":"Feasibility, Motivation, and Selective Motor Control: Virtual Reality Compared to Conventional Home Exercise in Children with Cerebral Palsy","created_at":"2021-04-21T06:44:53.010-07:00","url":"https://www.academia.edu/47216792/Feasibility_Motivation_and_Selective_Motor_Control_Virtual_Reality_Compared_to_Conventional_Home_Exercise_in_Children_with_Cerebral_Palsy?f_ri=1580","dom_id":"work_47216792","summary":null,"downloadable_attachments":[{"id":66433579,"asset_id":47216792,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":133389632,"first_name":"Marie","last_name":"Brien","domain_name":"independent","page_name":"BrienMarie","display_name":"Marie Brien","profile_url":"https://independent.academia.edu/BrienMarie?f_ri=1580","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":4228,"name":"Skeletal muscle biology","url":"https://www.academia.edu/Documents/in/Skeletal_muscle_biology?f_ri=1580"},{"id":8735,"name":"Motor Control","url":"https://www.academia.edu/Documents/in/Motor_Control?f_ri=1580"},{"id":17845,"name":"Cerebral Palsy","url":"https://www.academia.edu/Documents/in/Cerebral_Palsy?f_ri=1580"},{"id":22506,"name":"Adolescent","url":"https://www.academia.edu/Documents/in/Adolescent?f_ri=1580"},{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=1580"},{"id":64933,"name":"Child","url":"https://www.academia.edu/Documents/in/Child?f_ri=1580"},{"id":69542,"name":"Computer Simulation","url":"https://www.academia.edu/Documents/in/Computer_Simulation?f_ri=1580"},{"id":84745,"name":"Movement","url":"https://www.academia.edu/Documents/in/Movement?f_ri=1580"},{"id":135005,"name":"Patient Compliance","url":"https://www.academia.edu/Documents/in/Patient_Compliance?f_ri=1580"},{"id":255094,"name":"Computer User Interface Design","url":"https://www.academia.edu/Documents/in/Computer_User_Interface_Design?f_ri=1580"},{"id":740993,"name":"Ankle Joint","url":"https://www.academia.edu/Documents/in/Ankle_Joint?f_ri=1580"},{"id":1028191,"name":"Ankle","url":"https://www.academia.edu/Documents/in/Ankle?f_ri=1580"},{"id":1756573,"name":"Motor Skills","url":"https://www.academia.edu/Documents/in/Motor_Skills?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35654393" data-work_id="35654393" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35654393/Review_1_Pengaruh_Cyberbullying_Di_Media_Sosial_Terhadap_Perilaku_Reaktif_Sebagai_Pelaku_Maupun_Sebagai_Korban_Cyberbullying_Pada_Siswa_Kristen_SMP_Nasional_Makassar">Review 1 Pengaruh Cyberbullying Di Media Sosial Terhadap Perilaku Reaktif Sebagai Pelaku Maupun Sebagai Korban Cyberbullying Pada Siswa Kristen SMP Nasional Makassar</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Penelitian ini bertujuan untuk mengetahui pengaruh cyberbullying terhadap perilaku reaktif sebagai pelaku sekaligus sebagai korban cyberbullying pada siswa. Penelitian yang digunakan adalah penelitian kuantitatif dengan menggunakan... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_35654393" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Penelitian ini bertujuan untuk mengetahui pengaruh cyberbullying&nbsp; terhadap perilaku reaktif sebagai pelaku sekaligus sebagai korban cyberbullying pada siswa. Penelitian yang digunakan adalah penelitian kuantitatif dengan menggunakan metode survei dengan mengambil sampel sebanyak 40 orang dari SMP Nasional Kota Makassar. Siswa yang dimaksud dalam penelitian ini adalah siswa SMP kelas VII sampai kelas IX karena tanggap terhadap teknologi dan&nbsp; pada masa ini terjadi perubahan secara fisik dan psikis yang membawa siswa pada suatu fase yang disebut masa transisi, labil, mencari identitas dan mencari public figure. Hasil dari penelitian ini adalah terbuktinya hipotesis bahwa ada pengaruh antara perilaku pelaku cyberbullying dengan perilaku reaktif siswa Kristen korban cyberbullying dengan signifikansi 0,037&lt;0,05. Dengan demikian jelas bahwa bila makin tinggi perilaku reaktif pelaku maka makin tinggi pula perilaku reaktif korban. Semakin rendah perilaku reaktif pelaku maka makin rendah pula perilaku reaktif korban cyberbullying.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35654393" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a359840ff8eda98dae04aa356e07c4b2" rel="nofollow" data-download="{&quot;attachment_id&quot;:55524288,&quot;asset_id&quot;:35654393,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55524288/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="14180861" href="https://independent.academia.edu/SttJaffray">STT Jaffray</a><script data-card-contents-for-user="14180861" type="text/json">{"id":14180861,"first_name":"STT","last_name":"Jaffray","domain_name":"independent","page_name":"SttJaffray","display_name":"STT Jaffray","profile_url":"https://independent.academia.edu/SttJaffray?f_ri=1580","photo":"https://0.academia-photos.com/14180861/3894931/4554740/s65_stt.jaffray.jpg"}</script></span></span></li><li class="js-paper-rank-work_35654393 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35654393"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35654393, container: ".js-paper-rank-work_35654393", }); });</script></li><li class="js-percentile-work_35654393 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35654393; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35654393"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35654393 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35654393"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35654393; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35654393]").text(description); $(".js-view-count-work_35654393").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35654393").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35654393"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">2</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="12756" href="https://www.academia.edu/Documents/in/Cyberbullying">Cyberbullying</a><script data-card-contents-for-ri="12756" type="text/json">{"id":12756,"name":"Cyberbullying","url":"https://www.academia.edu/Documents/in/Cyberbullying?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35654393]'), work: {"id":35654393,"title":"Review 1 Pengaruh Cyberbullying Di Media Sosial Terhadap Perilaku Reaktif Sebagai Pelaku Maupun Sebagai Korban Cyberbullying Pada Siswa Kristen SMP Nasional Makassar","created_at":"2018-01-12T20:45:02.236-08:00","url":"https://www.academia.edu/35654393/Review_1_Pengaruh_Cyberbullying_Di_Media_Sosial_Terhadap_Perilaku_Reaktif_Sebagai_Pelaku_Maupun_Sebagai_Korban_Cyberbullying_Pada_Siswa_Kristen_SMP_Nasional_Makassar?f_ri=1580","dom_id":"work_35654393","summary":"Penelitian ini bertujuan untuk mengetahui pengaruh cyberbullying terhadap perilaku reaktif sebagai pelaku sekaligus sebagai korban cyberbullying pada siswa. Penelitian yang digunakan adalah penelitian kuantitatif dengan menggunakan metode survei dengan mengambil sampel sebanyak 40 orang dari SMP Nasional Kota Makassar. Siswa yang dimaksud dalam penelitian ini adalah siswa SMP kelas VII sampai kelas IX karena tanggap terhadap teknologi dan pada masa ini terjadi perubahan secara fisik dan psikis yang membawa siswa pada suatu fase yang disebut masa transisi, labil, mencari identitas dan mencari public figure. Hasil dari penelitian ini adalah terbuktinya hipotesis bahwa ada pengaruh antara perilaku pelaku cyberbullying dengan perilaku reaktif siswa Kristen korban cyberbullying dengan signifikansi 0,037\u003c0,05. Dengan demikian jelas bahwa bila makin tinggi perilaku reaktif pelaku maka makin tinggi pula perilaku reaktif korban. Semakin rendah perilaku reaktif pelaku maka makin rendah pula perilaku reaktif korban cyberbullying. \n\n ","downloadable_attachments":[{"id":55524288,"asset_id":35654393,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":14180861,"first_name":"STT","last_name":"Jaffray","domain_name":"independent","page_name":"SttJaffray","display_name":"STT Jaffray","profile_url":"https://independent.academia.edu/SttJaffray?f_ri=1580","photo":"https://0.academia-photos.com/14180861/3894931/4554740/s65_stt.jaffray.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":12756,"name":"Cyberbullying","url":"https://www.academia.edu/Documents/in/Cyberbullying?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_24999618" data-work_id="24999618" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/24999618/Psychological_Variables_and_Reality_Judgment_in_Virtual_Environments_The_Roles_of_Absorption_and_Dissociation">Psychological Variables and Reality Judgment in Virtual Environments: The Roles of Absorption and Dissociation</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/24999618" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b78e2d8975d363866e9d1f678ed1da69" rel="nofollow" data-download="{&quot;attachment_id&quot;:45325177,&quot;asset_id&quot;:24999618,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/45325177/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="25465236" href="https://uji.academia.edu/CBotella">Cristina Botella</a><script data-card-contents-for-user="25465236" type="text/json">{"id":25465236,"first_name":"Cristina","last_name":"Botella","domain_name":"uji","page_name":"CBotella","display_name":"Cristina Botella","profile_url":"https://uji.academia.edu/CBotella?f_ri=1580","photo":"https://0.academia-photos.com/25465236/7059079/7955778/s65_cristina.botella.jpg"}</script></span></span></li><li class="js-paper-rank-work_24999618 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="24999618"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 24999618, container: ".js-paper-rank-work_24999618", }); });</script></li><li class="js-percentile-work_24999618 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 24999618; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_24999618"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_24999618 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="24999618"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 24999618; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=24999618]").text(description); $(".js-view-count-work_24999618").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_24999618").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="24999618"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a><script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=24999618]'), work: {"id":24999618,"title":"Psychological Variables and Reality Judgment in Virtual Environments: The Roles of Absorption and Dissociation","created_at":"2016-05-03T14:25:50.554-07:00","url":"https://www.academia.edu/24999618/Psychological_Variables_and_Reality_Judgment_in_Virtual_Environments_The_Roles_of_Absorption_and_Dissociation?f_ri=1580","dom_id":"work_24999618","summary":null,"downloadable_attachments":[{"id":45325177,"asset_id":24999618,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":25465236,"first_name":"Cristina","last_name":"Botella","domain_name":"uji","page_name":"CBotella","display_name":"Cristina Botella","profile_url":"https://uji.academia.edu/CBotella?f_ri=1580","photo":"https://0.academia-photos.com/25465236/7059079/7955778/s65_cristina.botella.jpg"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":68786,"name":"Virtual Environment","url":"https://www.academia.edu/Documents/in/Virtual_Environment?f_ri=1580"},{"id":855798,"name":"Cyberpsychology \u0026 Behavior","url":"https://www.academia.edu/Documents/in/Cyberpsychology_and_Behavior?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_57293081" data-work_id="57293081" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/57293081/The_Effects_of_Smartphones_on_Well_Being_Theoretical_Integration_and_Research_Agenda">The Effects of Smartphones on Well-Being: Theoretical Integration and Research Agenda</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">As smartphones become ever more integrated in people’s lives, a burgeoning new area of research has emerged on their well-being effects. We propose that disparate strands of research and apparently contradictory findings can be integrated... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_57293081" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">As smartphones become ever more integrated in people’s lives, a burgeoning new area of research has emerged on their well-being effects. We propose that disparate strands of research and apparently contradictory findings can be integrated under three basic hypotheses, positing that smartphones influence well-being by (1) replacing other activities (displacement hypothesis), (2) interfering with concurrent activities (interference hypothesis), and (3) affording access to information and activities that would otherwise be unavailable (complementarity hypothesis). Using this framework, we highlight methodological issues and go beyond net effects to examine how and when phones boost versus hurt well-being. We examine both psychological and contextual mediators and moderators of the effects, thus outlining an agenda for future research.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/57293081" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="132633633" href="https://independent.academia.edu/MatthewLeitao">Matthew Leitao</a><script data-card-contents-for-user="132633633" type="text/json">{"id":132633633,"first_name":"Matthew","last_name":"Leitao","domain_name":"independent","page_name":"MatthewLeitao","display_name":"Matthew Leitao","profile_url":"https://independent.academia.edu/MatthewLeitao?f_ri=1580","photo":"https://0.academia-photos.com/132633633/34704854/30393645/s65_matthew.leitao.jpg"}</script></span></span></li><li class="js-paper-rank-work_57293081 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="57293081"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 57293081, container: ".js-paper-rank-work_57293081", }); });</script></li><li class="js-percentile-work_57293081 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 57293081; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_57293081"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_57293081 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="57293081"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 57293081; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=57293081]").text(description); $(".js-view-count-work_57293081").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_57293081").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="57293081"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">8</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="248" href="https://www.academia.edu/Documents/in/Social_Psychology">Social Psychology</a>,&nbsp;<script data-card-contents-for-ri="248" type="text/json">{"id":248,"name":"Social Psychology","url":"https://www.academia.edu/Documents/in/Social_Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2869" href="https://www.academia.edu/Documents/in/Digital_Media">Digital Media</a>,&nbsp;<script data-card-contents-for-ri="2869" type="text/json">{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="14818" href="https://www.academia.edu/Documents/in/Happiness">Happiness</a><script data-card-contents-for-ri="14818" type="text/json">{"id":14818,"name":"Happiness","url":"https://www.academia.edu/Documents/in/Happiness?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=57293081]'), work: {"id":57293081,"title":"The Effects of Smartphones on Well-Being: Theoretical Integration and Research Agenda","created_at":"2021-10-11T22:44:27.198-07:00","url":"https://www.academia.edu/57293081/The_Effects_of_Smartphones_on_Well_Being_Theoretical_Integration_and_Research_Agenda?f_ri=1580","dom_id":"work_57293081","summary":"As smartphones become ever more integrated in people’s lives, a burgeoning new area of research has emerged on their well-being effects. We propose that disparate strands of research and apparently contradictory findings can be integrated under three basic hypotheses, positing that smartphones influence well-being by (1) replacing other activities (displacement hypothesis), (2) interfering with concurrent activities (interference hypothesis), and (3) affording access to information and activities that would otherwise be unavailable (complementarity hypothesis). Using this framework, we highlight methodological issues and go beyond net effects to examine how and when phones boost versus hurt well-being. We examine both psychological and contextual mediators and moderators of the effects, thus outlining an agenda for future research.","downloadable_attachments":[],"ordered_authors":[{"id":132633633,"first_name":"Matthew","last_name":"Leitao","domain_name":"independent","page_name":"MatthewLeitao","display_name":"Matthew Leitao","profile_url":"https://independent.academia.edu/MatthewLeitao?f_ri=1580","photo":"https://0.academia-photos.com/132633633/34704854/30393645/s65_matthew.leitao.jpg"}],"research_interests":[{"id":248,"name":"Social Psychology","url":"https://www.academia.edu/Documents/in/Social_Psychology?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=1580","nofollow":false},{"id":14818,"name":"Happiness","url":"https://www.academia.edu/Documents/in/Happiness?f_ri=1580","nofollow":false},{"id":312695,"name":"Financial Technology","url":"https://www.academia.edu/Documents/in/Financial_Technology?f_ri=1580"},{"id":430018,"name":"Subjective Well Being","url":"https://www.academia.edu/Documents/in/Subjective_Well_Being?f_ri=1580"},{"id":914653,"name":"Smart Phones","url":"https://www.academia.edu/Documents/in/Smart_Phones?f_ri=1580"},{"id":2209716,"name":"Screen Time","url":"https://www.academia.edu/Documents/in/Screen_Time?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_1266298 coauthored" data-work_id="1266298" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/1266298/The_Contribution_of_Facebook_to_the_2011_Tunisian_Revolution_A_Cyberpsychological_Insight_2012_Cyberpsychology_Behavior_and_Social_Networking">The Contribution of Facebook to the 2011 Tunisian Revolution: A Cyberpsychological Insight. (2012) Cyberpsychology, Behavior, and Social Networking.</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The influence of Facebook in social life keeps constantly growing. Recently, the communication of information has been vital to the success of the Tunisian revolution, and Facebook was its main “catalyst”. This study examines the key... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_1266298" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The influence of Facebook in social life keeps constantly growing. Recently, the communication of information has been vital to the success of the Tunisian revolution, and Facebook was its main “catalyst”. This study examines the key reasons that explain Facebook’s contribution to this historical event, as perceived by Tunisian Internet users. To do so, we launched this study five days after the fall of the regime using an online questionnaire in which participants (N = 333) first rated the importance of Facebook in the Tunisian revolution and then explained the reasons for their ratings. A cluster analysis based on the Euclidean distance between the most frequent words in the participants’ text corpus (6640 words), revealed three main clusters that we interpret as follows: 1: Facebook political function, 2: Facebook informational function, and 3: Facebook media platform function. It is likely that these factors reflect the dynamic of Tunisian cyberspace and the Tunisian Internet users’ collective consciousness during the revolution.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/1266298" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="381f5efadb203a3326b8cc8e9f19951e" rel="nofollow" data-download="{&quot;attachment_id&quot;:15480536,&quot;asset_id&quot;:1266298,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/15480536/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="289984" href="https://univ-amu.academia.edu/YousriMarzouki">Yousri Marzouki</a><script data-card-contents-for-user="289984" type="text/json">{"id":289984,"first_name":"Yousri","last_name":"Marzouki","domain_name":"univ-amu","page_name":"YousriMarzouki","display_name":"Yousri Marzouki","profile_url":"https://univ-amu.academia.edu/YousriMarzouki?f_ri=1580","photo":"https://0.academia-photos.com/289984/242075/286245/s65_yousri.marzouki.jpeg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-1266298">+1</span><div class="hidden js-additional-users-1266298"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://qu.academia.edu/tarekbellaj">Tarek Bellaj</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-1266298'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-1266298').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_1266298 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="1266298"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 1266298, container: ".js-paper-rank-work_1266298", }); });</script></li><li class="js-percentile-work_1266298 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 1266298; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_1266298"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_1266298 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="1266298"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 1266298; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=1266298]").text(description); $(".js-view-count-work_1266298").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_1266298").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="1266298"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">17</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1237" href="https://www.academia.edu/Documents/in/Social_Sciences">Social Sciences</a>,&nbsp;<script data-card-contents-for-ri="1237" type="text/json">{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2553" href="https://www.academia.edu/Documents/in/Social_Networking">Social Networking</a>,&nbsp;<script data-card-contents-for-ri="2553" type="text/json">{"id":2553,"name":"Social Networking","url":"https://www.academia.edu/Documents/in/Social_Networking?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3510" href="https://www.academia.edu/Documents/in/Virtual_Communities">Virtual Communities</a><script data-card-contents-for-ri="3510" type="text/json">{"id":3510,"name":"Virtual Communities","url":"https://www.academia.edu/Documents/in/Virtual_Communities?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=1266298]'), work: {"id":1266298,"title":"The Contribution of Facebook to the 2011 Tunisian Revolution: A Cyberpsychological Insight. (2012) Cyberpsychology, Behavior, and Social Networking.","created_at":"2012-01-19T04:11:58.973-08:00","url":"https://www.academia.edu/1266298/The_Contribution_of_Facebook_to_the_2011_Tunisian_Revolution_A_Cyberpsychological_Insight_2012_Cyberpsychology_Behavior_and_Social_Networking?f_ri=1580","dom_id":"work_1266298","summary":"The influence of Facebook in social life keeps constantly growing. Recently, the communication of information has been vital to the success of the Tunisian revolution, and Facebook was its main “catalyst”. This study examines the key reasons that explain Facebook’s contribution to this historical event, as perceived by Tunisian Internet users. To do so, we launched this study five days after the fall of the regime using an online questionnaire in which participants (N = 333) first rated the importance of Facebook in the Tunisian revolution and then explained the reasons for their ratings. A cluster analysis based on the Euclidean distance between the most frequent words in the participants’ text corpus (6640 words), revealed three main clusters that we interpret as follows: 1: Facebook political function, 2: Facebook informational function, and 3: Facebook media platform function. It is likely that these factors reflect the dynamic of Tunisian cyberspace and the Tunisian Internet users’ collective consciousness during the revolution.","downloadable_attachments":[{"id":15480536,"asset_id":1266298,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":289984,"first_name":"Yousri","last_name":"Marzouki","domain_name":"univ-amu","page_name":"YousriMarzouki","display_name":"Yousri Marzouki","profile_url":"https://univ-amu.academia.edu/YousriMarzouki?f_ri=1580","photo":"https://0.academia-photos.com/289984/242075/286245/s65_yousri.marzouki.jpeg"},{"id":9524115,"first_name":"Tarek","last_name":"Bellaj","domain_name":"qu","page_name":"tarekbellaj","display_name":"Tarek Bellaj","profile_url":"https://qu.academia.edu/tarekbellaj?f_ri=1580","photo":"https://0.academia-photos.com/9524115/4203812/4894094/s65_tarek.bellaj.jpg"}],"research_interests":[{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":2553,"name":"Social Networking","url":"https://www.academia.edu/Documents/in/Social_Networking?f_ri=1580","nofollow":false},{"id":3510,"name":"Virtual Communities","url":"https://www.academia.edu/Documents/in/Virtual_Communities?f_ri=1580","nofollow":false},{"id":5401,"name":"Computer-Mediated Communication","url":"https://www.academia.edu/Documents/in/Computer-Mediated_Communication?f_ri=1580"},{"id":7369,"name":"Political communication","url":"https://www.academia.edu/Documents/in/Political_communication?f_ri=1580"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1580"},{"id":52629,"name":"Political Identity","url":"https://www.academia.edu/Documents/in/Political_Identity?f_ri=1580"},{"id":62394,"name":"Online Media","url":"https://www.academia.edu/Documents/in/Online_Media?f_ri=1580"},{"id":66134,"name":"Egyptian Revolution","url":"https://www.academia.edu/Documents/in/Egyptian_Revolution?f_ri=1580"},{"id":145307,"name":"New Media, Social Network Analysis, e-research, Link analysis, Social Network Sites, Twitter, Facebook, Political Communication","url":"https://www.academia.edu/Documents/in/New_Media_Social_Network_Analysis_e-research_Link_analysis_Social_Network_Sites_Twitter_Facebo?f_ri=1580"},{"id":169938,"name":"Arab Spring (Arab Revolts)","url":"https://www.academia.edu/Documents/in/Arab_Spring_Arab_Revolts_?f_ri=1580"},{"id":221196,"name":"Tunisian Revolution-Arab Spring","url":"https://www.academia.edu/Documents/in/Tunisian_Revolution-Arab_Spring?f_ri=1580"},{"id":380415,"name":"Facebook \u0026 the Tunisian Revolution","url":"https://www.academia.edu/Documents/in/Facebook_and_the_Tunisian_Revolution?f_ri=1580"},{"id":396004,"name":"Media theory and Research","url":"https://www.academia.edu/Documents/in/Media_theory_and_Research?f_ri=1580"},{"id":407760,"name":"Word Clouds","url":"https://www.academia.edu/Documents/in/Word_Clouds?f_ri=1580"},{"id":567881,"name":"Mobile and Location-Based Media","url":"https://www.academia.edu/Documents/in/Mobile_and_Location-Based_Media?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_49441615" data-work_id="49441615" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/49441615/Artist_Talk_Museum_POMA_Republic_of_Korea">Artist Talk, Museum POMA, Republic of Korea</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This presentation shall have an essay type form, and I will talk about my painting-work and the circumstances that influenced it to look the way it does. Therefore, many of the ideas I am going to write about, came from theorists and... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_49441615" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This presentation shall have an essay type form, and I will talk about my painting-work and the circumstances that influenced it to look the way it does. Therefore, many of the ideas I am going to write about, came from theorists and artists who meant a great deal to me, who helped me understand why I do this kind of painting, but those ideas were interpreted and contextualized through my experience. Therefore, I shall not list them in footnotes and literature. First of all, I would like to thank theorists such as</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/49441615" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d3f5b3bf26f1b8b74eb00c9869ed06ff" rel="nofollow" data-download="{&quot;attachment_id&quot;:67792325,&quot;asset_id&quot;:49441615,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/67792325/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="4371705" href="https://artsinbelgrade.academia.edu/VladislavScepanovic">Vladislav Scepanovic</a><script data-card-contents-for-user="4371705" type="text/json">{"id":4371705,"first_name":"Vladislav","last_name":"Scepanovic","domain_name":"artsinbelgrade","page_name":"VladislavScepanovic","display_name":"Vladislav Scepanovic","profile_url":"https://artsinbelgrade.academia.edu/VladislavScepanovic?f_ri=1580","photo":"https://0.academia-photos.com/4371705/1765805/2109933/s65_vladislav.scepanovic.jpg"}</script></span></span></li><li class="js-paper-rank-work_49441615 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="49441615"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 49441615, container: ".js-paper-rank-work_49441615", }); });</script></li><li class="js-percentile-work_49441615 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 49441615; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_49441615"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_49441615 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="49441615"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 49441615; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=49441615]").text(description); $(".js-view-count-work_49441615").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_49441615").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="49441615"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1032" href="https://www.academia.edu/Documents/in/Cyborg_Theory">Cyborg Theory</a>,&nbsp;<script data-card-contents-for-ri="1032" type="text/json">{"id":1032,"name":"Cyborg Theory","url":"https://www.academia.edu/Documents/in/Cyborg_Theory?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3051" href="https://www.academia.edu/Documents/in/Contemporary_Art">Contemporary Art</a>,&nbsp;<script data-card-contents-for-ri="3051" type="text/json">{"id":3051,"name":"Contemporary Art","url":"https://www.academia.edu/Documents/in/Contemporary_Art?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5081" href="https://www.academia.edu/Documents/in/Painting">Painting</a><script data-card-contents-for-ri="5081" type="text/json">{"id":5081,"name":"Painting","url":"https://www.academia.edu/Documents/in/Painting?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=49441615]'), work: {"id":49441615,"title":"Artist Talk, Museum POMA, Republic of Korea","created_at":"2021-06-28T10:55:29.239-07:00","url":"https://www.academia.edu/49441615/Artist_Talk_Museum_POMA_Republic_of_Korea?f_ri=1580","dom_id":"work_49441615","summary":"This presentation shall have an essay type form, and I will talk about my painting-work and the circumstances that influenced it to look the way it does. Therefore, many of the ideas I am going to write about, came from theorists and artists who meant a great deal to me, who helped me understand why I do this kind of painting, but those ideas were interpreted and contextualized through my experience. Therefore, I shall not list them in footnotes and literature. First of all, I would like to thank theorists such as","downloadable_attachments":[{"id":67792325,"asset_id":49441615,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":4371705,"first_name":"Vladislav","last_name":"Scepanovic","domain_name":"artsinbelgrade","page_name":"VladislavScepanovic","display_name":"Vladislav Scepanovic","profile_url":"https://artsinbelgrade.academia.edu/VladislavScepanovic?f_ri=1580","photo":"https://0.academia-photos.com/4371705/1765805/2109933/s65_vladislav.scepanovic.jpg"}],"research_interests":[{"id":1032,"name":"Cyborg Theory","url":"https://www.academia.edu/Documents/in/Cyborg_Theory?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":3051,"name":"Contemporary Art","url":"https://www.academia.edu/Documents/in/Contemporary_Art?f_ri=1580","nofollow":false},{"id":5081,"name":"Painting","url":"https://www.academia.edu/Documents/in/Painting?f_ri=1580","nofollow":false},{"id":6917,"name":"Spectacle","url":"https://www.academia.edu/Documents/in/Spectacle?f_ri=1580"},{"id":168614,"name":"Cyborgs","url":"https://www.academia.edu/Documents/in/Cyborgs?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37321720" data-work_id="37321720" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37321720/World_Brain_Systems">World-Brain Systems</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Abstract The purpose of this paper is to clarify the role of academia in broader society. What is academia’s role beyond being a business and providing qualified professionals to other businesses? What kind of organization and ethos is... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37321720" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Abstract <br />The purpose of this paper is to clarify the role of academia in broader society. What is academia’s <br />role beyond being a business and providing qualified professionals to other businesses? What kind of organization <br />and ethos is consistent with academia’s proper role in society, considered as a higher-order cognitive system? <br />Design/methodology/approach – Society as a whole is modeled as a viable system, with subsystems <br />dedicated to self-production in the here and now (systems 1-3) and subsystems engaged in exploring the <br />outside and future of the system and in consolidating an identity and an ethos (systems 4 and 5). The role, <br />ethos and proper organization of academia are derived from this model and from cybernetic considerations on <br />the proper architecture of system 4 and system 5 cognitive systems. <br />Findings – To fulfill its role as part of society’s system 4 and system 5, academia must include areas that <br />are sometimes considered redundant or an expensive luxury, such as the humanities or basic research. The <br />humanities must strive to catalyze broad community participation as part of their contribution to system 5 <br />and must strive to produce bridge languages between communities and disciplines to increase the <br />connectivity of the World Brain. The publish-or-perish ethos of academia must be replaced by an erotic <br />spirituality, understood as desire for otherness. <br />Originality/value – This paper integrates broad philosophical considerations on the role of academia with <br />the use of cybernetic models of viable systems and of distributed cognition, yielding practical guidelines for <br />the organization of academia. <br />Keywords Cognition, Education, Philosophy, Citizenship, Cybernetics, Autopoiesis <br />Paper type Conceptual paper</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37321720" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4ff514e22e6d9440348c675bd141aa4c" rel="nofollow" data-download="{&quot;attachment_id&quot;:57278912,&quot;asset_id&quot;:37321720,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57278912/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="31425279" href="https://unisalle.academia.edu/Sebasti%C3%A1nAlejandroGonz%C3%A1lezMontero">Sebastián Alejandro González Montero</a><script data-card-contents-for-user="31425279" type="text/json">{"id":31425279,"first_name":"Sebastián Alejandro","last_name":"González Montero","domain_name":"unisalle","page_name":"SebastiánAlejandroGonzálezMontero","display_name":"Sebastián Alejandro González Montero","profile_url":"https://unisalle.academia.edu/Sebasti%C3%A1nAlejandroGonz%C3%A1lezMontero?f_ri=1580","photo":"https://0.academia-photos.com/31425279/9272130/29856608/s65_sebasti_n_alejandro.gonz_lez_montero.jpg"}</script></span></span></li><li class="js-paper-rank-work_37321720 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37321720"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37321720, container: ".js-paper-rank-work_37321720", }); });</script></li><li class="js-percentile-work_37321720 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37321720; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37321720"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37321720 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37321720"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37321720; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37321720]").text(description); $(".js-view-count-work_37321720").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37321720").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37321720"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="248" href="https://www.academia.edu/Documents/in/Social_Psychology">Social Psychology</a>,&nbsp;<script data-card-contents-for-ri="248" type="text/json">{"id":248,"name":"Social Psychology","url":"https://www.academia.edu/Documents/in/Social_Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="33594" href="https://www.academia.edu/Documents/in/Academic_Ranking">Academic Ranking</a>,&nbsp;<script data-card-contents-for-ri="33594" type="text/json">{"id":33594,"name":"Academic Ranking","url":"https://www.academia.edu/Documents/in/Academic_Ranking?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221860" href="https://www.academia.edu/Documents/in/Higer_Education">Higer Education</a><script data-card-contents-for-ri="221860" type="text/json">{"id":221860,"name":"Higer Education","url":"https://www.academia.edu/Documents/in/Higer_Education?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37321720]'), work: {"id":37321720,"title":"World-Brain Systems","created_at":"2018-08-31T07:33:56.717-07:00","url":"https://www.academia.edu/37321720/World_Brain_Systems?f_ri=1580","dom_id":"work_37321720","summary":"Abstract\r\nThe purpose of this paper is to clarify the role of academia in broader society. What is academia’s\r\nrole beyond being a business and providing qualified professionals to other businesses? What kind of organization\r\nand ethos is consistent with academia’s proper role in society, considered as a higher-order cognitive system?\r\nDesign/methodology/approach – Society as a whole is modeled as a viable system, with subsystems\r\ndedicated to self-production in the here and now (systems 1-3) and subsystems engaged in exploring the\r\noutside and future of the system and in consolidating an identity and an ethos (systems 4 and 5). The role,\r\nethos and proper organization of academia are derived from this model and from cybernetic considerations on\r\nthe proper architecture of system 4 and system 5 cognitive systems.\r\nFindings – To fulfill its role as part of society’s system 4 and system 5, academia must include areas that\r\nare sometimes considered redundant or an expensive luxury, such as the humanities or basic research. The\r\nhumanities must strive to catalyze broad community participation as part of their contribution to system 5\r\nand must strive to produce bridge languages between communities and disciplines to increase the\r\nconnectivity of the World Brain. The publish-or-perish ethos of academia must be replaced by an erotic\r\nspirituality, understood as desire for otherness.\r\nOriginality/value – This paper integrates broad philosophical considerations on the role of academia with\r\nthe use of cybernetic models of viable systems and of distributed cognition, yielding practical guidelines for\r\nthe organization of academia.\r\nKeywords Cognition, Education, Philosophy, Citizenship, Cybernetics, Autopoiesis\r\nPaper type Conceptual paper","downloadable_attachments":[{"id":57278912,"asset_id":37321720,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":31425279,"first_name":"Sebastián Alejandro","last_name":"González Montero","domain_name":"unisalle","page_name":"SebastiánAlejandroGonzálezMontero","display_name":"Sebastián Alejandro González Montero","profile_url":"https://unisalle.academia.edu/Sebasti%C3%A1nAlejandroGonz%C3%A1lezMontero?f_ri=1580","photo":"https://0.academia-photos.com/31425279/9272130/29856608/s65_sebasti_n_alejandro.gonz_lez_montero.jpg"}],"research_interests":[{"id":248,"name":"Social Psychology","url":"https://www.academia.edu/Documents/in/Social_Psychology?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":33594,"name":"Academic Ranking","url":"https://www.academia.edu/Documents/in/Academic_Ranking?f_ri=1580","nofollow":false},{"id":221860,"name":"Higer Education","url":"https://www.academia.edu/Documents/in/Higer_Education?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_25372463" data-work_id="25372463" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/25372463/Comparing_Acceptance_and_Refusal_Rates_of_Virtual_Reality_Exposure_vs_In_Vivo_Exposure_by_Patients_with_Specific_Phobias">Comparing Acceptance and Refusal Rates of Virtual Reality Exposure vs. In Vivo Exposure by Patients with Specific Phobias</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/25372463" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="595d80c6ebc68b1d16bf324f5b8a5ccf" rel="nofollow" data-download="{&quot;attachment_id&quot;:45675896,&quot;asset_id&quot;:25372463,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/45675896/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="42345702" href="https://independent.academia.edu/CristinaBotellaArbona">Cristina Botella Arbona.</a><script data-card-contents-for-user="42345702" type="text/json">{"id":42345702,"first_name":"Cristina Botella","last_name":"Arbona.","domain_name":"independent","page_name":"CristinaBotellaArbona","display_name":"Cristina Botella Arbona.","profile_url":"https://independent.academia.edu/CristinaBotellaArbona?f_ri=1580","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_25372463 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="25372463"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 25372463, container: ".js-paper-rank-work_25372463", }); });</script></li><li class="js-percentile-work_25372463 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 25372463; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_25372463"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_25372463 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="25372463"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 25372463; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=25372463]").text(description); $(".js-view-count-work_25372463").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_25372463").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="25372463"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">12</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a><script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=25372463]'), work: {"id":25372463,"title":"Comparing Acceptance and Refusal Rates of Virtual Reality Exposure vs. In Vivo Exposure by Patients with Specific Phobias","created_at":"2016-05-16T14:29:15.304-07:00","url":"https://www.academia.edu/25372463/Comparing_Acceptance_and_Refusal_Rates_of_Virtual_Reality_Exposure_vs_In_Vivo_Exposure_by_Patients_with_Specific_Phobias?f_ri=1580","dom_id":"work_25372463","summary":null,"downloadable_attachments":[{"id":45675896,"asset_id":25372463,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":42345702,"first_name":"Cristina Botella","last_name":"Arbona.","domain_name":"independent","page_name":"CristinaBotellaArbona","display_name":"Cristina Botella Arbona.","profile_url":"https://independent.academia.edu/CristinaBotellaArbona?f_ri=1580","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":22506,"name":"Adolescent","url":"https://www.academia.edu/Documents/in/Adolescent?f_ri=1580"},{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=1580"},{"id":69542,"name":"Computer Simulation","url":"https://www.academia.edu/Documents/in/Computer_Simulation?f_ri=1580"},{"id":212118,"name":"Exposure Therapy","url":"https://www.academia.edu/Documents/in/Exposure_Therapy?f_ri=1580"},{"id":255094,"name":"Computer User Interface Design","url":"https://www.academia.edu/Documents/in/Computer_User_Interface_Design?f_ri=1580"},{"id":289271,"name":"Aged","url":"https://www.academia.edu/Documents/in/Aged?f_ri=1580"},{"id":855798,"name":"Cyberpsychology \u0026 Behavior","url":"https://www.academia.edu/Documents/in/Cyberpsychology_and_Behavior?f_ri=1580"},{"id":1253718,"name":"Treatment Refusal","url":"https://www.academia.edu/Documents/in/Treatment_Refusal?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_23931531" data-work_id="23931531" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/23931531/Experience_with_V_STORE_Considerations_on_Presence_in_Virtual_Environments_for_Effective_Neuropsychological_Rehabilitation_of_Executive_Functions">Experience with V-STORE: Considerations on Presence in Virtual Environments for Effective Neuropsychological Rehabilitation of Executive Functions</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/23931531" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f1e233cdad39adf875240033a97cf4f7" rel="nofollow" data-download="{&quot;attachment_id&quot;:44318272,&quot;asset_id&quot;:23931531,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/44318272/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="23934828" href="https://independent.academia.edu/GianlucaCastelnuovo">Gianluca Castelnuovo</a><script data-card-contents-for-user="23934828" type="text/json">{"id":23934828,"first_name":"Gianluca","last_name":"Castelnuovo","domain_name":"independent","page_name":"GianlucaCastelnuovo","display_name":"Gianluca Castelnuovo","profile_url":"https://independent.academia.edu/GianlucaCastelnuovo?f_ri=1580","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_23931531 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="23931531"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 23931531, container: ".js-paper-rank-work_23931531", }); });</script></li><li class="js-percentile-work_23931531 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 23931531; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_23931531"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_23931531 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="23931531"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 23931531; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=23931531]").text(description); $(".js-view-count-work_23931531").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_23931531").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="23931531"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">13</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a><script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=23931531]'), work: {"id":23931531,"title":"Experience with V-STORE: Considerations on Presence in Virtual Environments for Effective Neuropsychological Rehabilitation of Executive Functions","created_at":"2016-04-02T00:15:18.280-07:00","url":"https://www.academia.edu/23931531/Experience_with_V_STORE_Considerations_on_Presence_in_Virtual_Environments_for_Effective_Neuropsychological_Rehabilitation_of_Executive_Functions?f_ri=1580","dom_id":"work_23931531","summary":null,"downloadable_attachments":[{"id":44318272,"asset_id":23931531,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":23934828,"first_name":"Gianluca","last_name":"Castelnuovo","domain_name":"independent","page_name":"GianlucaCastelnuovo","display_name":"Gianluca Castelnuovo","profile_url":"https://independent.academia.edu/GianlucaCastelnuovo?f_ri=1580","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":28576,"name":"Prefrontal Cortex","url":"https://www.academia.edu/Documents/in/Prefrontal_Cortex?f_ri=1580"},{"id":33732,"name":"Executive Function","url":"https://www.academia.edu/Documents/in/Executive_Function?f_ri=1580"},{"id":68786,"name":"Virtual Environment","url":"https://www.academia.edu/Documents/in/Virtual_Environment?f_ri=1580"},{"id":93704,"name":"Galvanic Skin Response","url":"https://www.academia.edu/Documents/in/Galvanic_Skin_Response?f_ri=1580"},{"id":255094,"name":"Computer User Interface Design","url":"https://www.academia.edu/Documents/in/Computer_User_Interface_Design?f_ri=1580"},{"id":327850,"name":"Questionnaires","url":"https://www.academia.edu/Documents/in/Questionnaires?f_ri=1580"},{"id":522464,"name":"Short Term Memory","url":"https://www.academia.edu/Documents/in/Short_Term_Memory?f_ri=1580"},{"id":855798,"name":"Cyberpsychology \u0026 Behavior","url":"https://www.academia.edu/Documents/in/Cyberpsychology_and_Behavior?f_ri=1580"},{"id":1627527,"name":"Cognition disorders","url":"https://www.academia.edu/Documents/in/Cognition_disorders?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_19885159" data-work_id="19885159" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/19885159/THE_PROFESSIONAL_CAREER_OF_PSYCHOLOGISTS_IN_THE_CYBERSPACE">THE PROFESSIONAL CAREER OF PSYCHOLOGISTS IN THE CYBERSPACE</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The wide diffusion of new communication technologies, empowered by the use of the web, is changing the traditional modalities of working, of dealing with commercial exchanges, of offering services, of socializing. Structures,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_19885159" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The wide diffusion of new communication technologies, empowered by the use of the web, is changing the traditional modalities of working, of dealing with commercial exchanges, of offering services, of socializing. Structures, institutions, services and performances are undergoing the inescapable processes of deconstruction and digitizing, and are urged to the use of the cyberspace; people search for information concerning psychological care, health and wellbeing; services and professional performances are offered directly online. As a consequence, the professionals of the psychological sectors are urged to adapt and supply their psychological interventions according to this new dimension.<br />But, notwithstanding the advantages, those technologies entail some levels of criticality. Both clients and professionals feel that, added to the fear for a subversion of our traditional relationships, it is the confusion and uncertainty given by a chaotic and unregulated offer for both services and performances, and involving the efficiency and dependability of the psychological interventions.<br />All this aspects have produced two opposite effects: either an uncritical acceptance of logics, procedures, and instruments which do not belong to the psychological profession, or the total refuse of the new technologies. In the meantime, there has not been occasion to reflect and analyse the relationship among the conveniences offered by the new communication technologies and the psychological processes they involve. On the contrary, we consider it is necessary to regain the specificity of our profession, by reflecting on shape and content it could assume inside this new context.<br />The present symposium is aimed at reinforcing and integrating those researches aimed at exploring the state-of-the-art of the online psychological interventions. More in details, we will present the results of our researches in: drawing an updated map of the online psychological services offered in Italy; analysing the representations that psychologists have of the online psychological interventions; conducting an inquiry on the expectations of the “clients” on the psychological services; studying the effects of a psychological service offered to “native digit” generations.<br />Our researches start by drawing a conceptual map of the reality of the psychological interventions in the cyberspace, reporting limits and potentialities of these new forms of intervention. It would then focus on identifying general principles able to guarantee the high quality and competency of the professionals of the psychological sector; drawing guidelines, clear and coherent with the ethics of the profession, addressed to both the government decision-makers and our committee; identifying possible perspectives for the future of our profession</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/19885159" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="836d6ecdb824d9234c13256331c70716" rel="nofollow" data-download="{&quot;attachment_id&quot;:40898422,&quot;asset_id&quot;:19885159,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40898422/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="519889" href="https://independent.academia.edu/ManzoStefano">Stefano Manzo</a><script data-card-contents-for-user="519889" type="text/json">{"id":519889,"first_name":"Stefano","last_name":"Manzo","domain_name":"independent","page_name":"ManzoStefano","display_name":"Stefano Manzo","profile_url":"https://independent.academia.edu/ManzoStefano?f_ri=1580","photo":"https://0.academia-photos.com/519889/1168253/1462940/s65_stefano.manzo.jpg"}</script></span></span></li><li class="js-paper-rank-work_19885159 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="19885159"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 19885159, container: ".js-paper-rank-work_19885159", }); });</script></li><li class="js-percentile-work_19885159 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 19885159; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_19885159"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_19885159 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="19885159"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 19885159; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=19885159]").text(description); $(".js-view-count-work_19885159").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_19885159").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="19885159"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="226" href="https://www.academia.edu/Documents/in/Clinical_Psychology">Clinical Psychology</a>,&nbsp;<script data-card-contents-for-ri="226" type="text/json">{"id":226,"name":"Clinical Psychology","url":"https://www.academia.edu/Documents/in/Clinical_Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="162220" href="https://www.academia.edu/Documents/in/E-Counselling_E-Therapy_Therapy_Online">E-Counselling, E-Therapy, Therapy Online</a><script data-card-contents-for-ri="162220" type="text/json">{"id":162220,"name":"E-Counselling, E-Therapy, Therapy Online","url":"https://www.academia.edu/Documents/in/E-Counselling_E-Therapy_Therapy_Online?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=19885159]'), work: {"id":19885159,"title":"THE PROFESSIONAL CAREER OF PSYCHOLOGISTS IN THE CYBERSPACE","created_at":"2015-12-29T05:02:21.470-08:00","url":"https://www.academia.edu/19885159/THE_PROFESSIONAL_CAREER_OF_PSYCHOLOGISTS_IN_THE_CYBERSPACE?f_ri=1580","dom_id":"work_19885159","summary":"The wide diffusion of new communication technologies, empowered by the use of the web, is changing the traditional modalities of working, of dealing with commercial exchanges, of offering services, of socializing. Structures, institutions, services and performances are undergoing the inescapable processes of deconstruction and digitizing, and are urged to the use of the cyberspace; people search for information concerning psychological care, health and wellbeing; services and professional performances are offered directly online. As a consequence, the professionals of the psychological sectors are urged to adapt and supply their psychological interventions according to this new dimension.\nBut, notwithstanding the advantages, those technologies entail some levels of criticality. Both clients and professionals feel that, added to the fear for a subversion of our traditional relationships, it is the confusion and uncertainty given by a chaotic and unregulated offer for both services and performances, and involving the efficiency and dependability of the psychological interventions.\nAll this aspects have produced two opposite effects: either an uncritical acceptance of logics, procedures, and instruments which do not belong to the psychological profession, or the total refuse of the new technologies. In the meantime, there has not been occasion to reflect and analyse the relationship among the conveniences offered by the new communication technologies and the psychological processes they involve. On the contrary, we consider it is necessary to regain the specificity of our profession, by reflecting on shape and content it could assume inside this new context.\nThe present symposium is aimed at reinforcing and integrating those researches aimed at exploring the state-of-the-art of the online psychological interventions. More in details, we will present the results of our researches in: drawing an updated map of the online psychological services offered in Italy; analysing the representations that psychologists have of the online psychological interventions; conducting an inquiry on the expectations of the “clients” on the psychological services; studying the effects of a psychological service offered to “native digit” generations.\nOur researches start by drawing a conceptual map of the reality of the psychological interventions in the cyberspace, reporting limits and potentialities of these new forms of intervention. It would then focus on identifying general principles able to guarantee the high quality and competency of the professionals of the psychological sector; drawing guidelines, clear and coherent with the ethics of the profession, addressed to both the government decision-makers and our committee; identifying possible perspectives for the future of our profession","downloadable_attachments":[{"id":40898422,"asset_id":19885159,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":519889,"first_name":"Stefano","last_name":"Manzo","domain_name":"independent","page_name":"ManzoStefano","display_name":"Stefano Manzo","profile_url":"https://independent.academia.edu/ManzoStefano?f_ri=1580","photo":"https://0.academia-photos.com/519889/1168253/1462940/s65_stefano.manzo.jpg"}],"research_interests":[{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":226,"name":"Clinical Psychology","url":"https://www.academia.edu/Documents/in/Clinical_Psychology?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":162220,"name":"E-Counselling, E-Therapy, Therapy Online","url":"https://www.academia.edu/Documents/in/E-Counselling_E-Therapy_Therapy_Online?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_12517094 coauthored" data-work_id="12517094" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/12517094/Experimental_Studies_of_Virtual_Reality_Delivered_Compared_to_Conventional_Exercise_Programs_for_Rehabilitation">Experimental Studies of Virtual Reality-Delivered Compared to Conventional Exercise Programs for Rehabilitation</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/12517094" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="bc9cb002a8ad6d0df4621f6a93fbed30" rel="nofollow" data-download="{&quot;attachment_id&quot;:46120984,&quot;asset_id&quot;:12517094,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/46120984/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="36769906" href="https://independent.academia.edu/AnnaMcCormick">Anna McCormick</a><script data-card-contents-for-user="36769906" type="text/json">{"id":36769906,"first_name":"Anna","last_name":"McCormick","domain_name":"independent","page_name":"AnnaMcCormick","display_name":"Anna McCormick","profile_url":"https://independent.academia.edu/AnnaMcCormick?f_ri=1580","photo":"/images/s65_no_pic.png"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-12517094">+1</span><div class="hidden js-additional-users-12517094"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://uottawa.academia.edu/HSveistrup">H. Sveistrup</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-12517094'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-12517094').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_12517094 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="12517094"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 12517094, container: ".js-paper-rank-work_12517094", }); });</script></li><li class="js-percentile-work_12517094 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 12517094; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_12517094"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_12517094 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="12517094"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 12517094; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=12517094]").text(description); $(".js-view-count-work_12517094").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_12517094").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="12517094"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">11</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a><script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=12517094]'), work: {"id":12517094,"title":"Experimental Studies of Virtual Reality-Delivered Compared to Conventional Exercise Programs for Rehabilitation","created_at":"2015-05-21T17:06:55.419-07:00","url":"https://www.academia.edu/12517094/Experimental_Studies_of_Virtual_Reality_Delivered_Compared_to_Conventional_Exercise_Programs_for_Rehabilitation?f_ri=1580","dom_id":"work_12517094","summary":null,"downloadable_attachments":[{"id":46120984,"asset_id":12517094,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":36769906,"first_name":"Anna","last_name":"McCormick","domain_name":"independent","page_name":"AnnaMcCormick","display_name":"Anna McCormick","profile_url":"https://independent.academia.edu/AnnaMcCormick?f_ri=1580","photo":"/images/s65_no_pic.png"},{"id":31396024,"first_name":"H.","last_name":"Sveistrup","domain_name":"uottawa","page_name":"HSveistrup","display_name":"H. Sveistrup","profile_url":"https://uottawa.academia.edu/HSveistrup?f_ri=1580","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=1580"},{"id":135185,"name":"Exercise","url":"https://www.academia.edu/Documents/in/Exercise?f_ri=1580"},{"id":215075,"name":"Experimental Study","url":"https://www.academia.edu/Documents/in/Experimental_Study?f_ri=1580"},{"id":237853,"name":"SHOULDER PAIN","url":"https://www.academia.edu/Documents/in/SHOULDER_PAIN?f_ri=1580"},{"id":255094,"name":"Computer User Interface Design","url":"https://www.academia.edu/Documents/in/Computer_User_Interface_Design?f_ri=1580"},{"id":855798,"name":"Cyberpsychology \u0026 Behavior","url":"https://www.academia.edu/Documents/in/Cyberpsychology_and_Behavior?f_ri=1580"},{"id":2450733,"name":"Brain injuries","url":"https://www.academia.edu/Documents/in/Brain_injuries?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_3379196" data-work_id="3379196" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/3379196/NorthCom_and_the_Insurrection">NorthCom and the Insurrection</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/3379196" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="5c12c6db2c71f06c14db990ff2351fff" rel="nofollow" data-download="{&quot;attachment_id&quot;:31177407,&quot;asset_id&quot;:3379196,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/31177407/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1875784" href="https://berkeley.academia.edu/LisaElkins">Lisa Elkins Goodman</a><script data-card-contents-for-user="1875784" type="text/json">{"id":1875784,"first_name":"Lisa","last_name":"Elkins Goodman","domain_name":"berkeley","page_name":"LisaElkins","display_name":"Lisa Elkins Goodman","profile_url":"https://berkeley.academia.edu/LisaElkins?f_ri=1580","photo":"https://0.academia-photos.com/1875784/636060/789014/s65_lisa.elkins.jpg"}</script></span></span></li><li class="js-paper-rank-work_3379196 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="3379196"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 3379196, container: ".js-paper-rank-work_3379196", }); });</script></li><li class="js-percentile-work_3379196 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 3379196; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_3379196"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_3379196 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="3379196"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 3379196; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=3379196]").text(description); $(".js-view-count-work_3379196").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_3379196").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="3379196"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">23</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="38" href="https://www.academia.edu/Documents/in/Management">Management</a>,&nbsp;<script data-card-contents-for-ri="38" type="text/json">{"id":38,"name":"Management","url":"https://www.academia.edu/Documents/in/Management?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="133" href="https://www.academia.edu/Documents/in/Military_History">Military History</a>,&nbsp;<script data-card-contents-for-ri="133" type="text/json">{"id":133,"name":"Military History","url":"https://www.academia.edu/Documents/in/Military_History?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="559" href="https://www.academia.edu/Documents/in/Military_Science">Military Science</a>,&nbsp;<script data-card-contents-for-ri="559" type="text/json">{"id":559,"name":"Military Science","url":"https://www.academia.edu/Documents/in/Military_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="570" href="https://www.academia.edu/Documents/in/Military_Intelligence">Military Intelligence</a><script data-card-contents-for-ri="570" type="text/json">{"id":570,"name":"Military Intelligence","url":"https://www.academia.edu/Documents/in/Military_Intelligence?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=3379196]'), work: {"id":3379196,"title":"NorthCom and the Insurrection","created_at":"2013-04-24T17:08:32.402-07:00","url":"https://www.academia.edu/3379196/NorthCom_and_the_Insurrection?f_ri=1580","dom_id":"work_3379196","summary":null,"downloadable_attachments":[{"id":31177407,"asset_id":3379196,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1875784,"first_name":"Lisa","last_name":"Elkins Goodman","domain_name":"berkeley","page_name":"LisaElkins","display_name":"Lisa Elkins Goodman","profile_url":"https://berkeley.academia.edu/LisaElkins?f_ri=1580","photo":"https://0.academia-photos.com/1875784/636060/789014/s65_lisa.elkins.jpg"}],"research_interests":[{"id":38,"name":"Management","url":"https://www.academia.edu/Documents/in/Management?f_ri=1580","nofollow":false},{"id":133,"name":"Military History","url":"https://www.academia.edu/Documents/in/Military_History?f_ri=1580","nofollow":false},{"id":559,"name":"Military Science","url":"https://www.academia.edu/Documents/in/Military_Science?f_ri=1580","nofollow":false},{"id":570,"name":"Military Intelligence","url":"https://www.academia.edu/Documents/in/Military_Intelligence?f_ri=1580","nofollow":false},{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=1580"},{"id":1233,"name":"Social Networks","url":"https://www.academia.edu/Documents/in/Social_Networks?f_ri=1580"},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580"},{"id":1988,"name":"Technoculture","url":"https://www.academia.edu/Documents/in/Technoculture?f_ri=1580"},{"id":5199,"name":"Video Games","url":"https://www.academia.edu/Documents/in/Video_Games?f_ri=1580"},{"id":5380,"name":"Homeland Security","url":"https://www.academia.edu/Documents/in/Homeland_Security?f_ri=1580"},{"id":19566,"name":"Emergency Management","url":"https://www.academia.edu/Documents/in/Emergency_Management?f_ri=1580"},{"id":21593,"name":"Artificial Inteligence","url":"https://www.academia.edu/Documents/in/Artificial_Inteligence?f_ri=1580"},{"id":32347,"name":"Consumer Psychology","url":"https://www.academia.edu/Documents/in/Consumer_Psychology?f_ri=1580"},{"id":44778,"name":"Common Security and Defense Policy","url":"https://www.academia.edu/Documents/in/Common_Security_and_Defense_Policy?f_ri=1580"},{"id":46271,"name":"Strategy","url":"https://www.academia.edu/Documents/in/Strategy?f_ri=1580"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=1580"},{"id":99484,"name":"Incident Management","url":"https://www.academia.edu/Documents/in/Incident_Management?f_ri=1580"},{"id":237911,"name":"Virtual Therapy","url":"https://www.academia.edu/Documents/in/Virtual_Therapy?f_ri=1580"},{"id":342365,"name":"Insurrectionary Theory","url":"https://www.academia.edu/Documents/in/Insurrectionary_Theory?f_ri=1580"},{"id":498631,"name":"Insurrection","url":"https://www.academia.edu/Documents/in/Insurrection?f_ri=1580"},{"id":988732,"name":"Domestic Intelligence","url":"https://www.academia.edu/Documents/in/Domestic_Intelligence?f_ri=1580"},{"id":1007659,"name":"Video Games for Learning","url":"https://www.academia.edu/Documents/in/Video_Games_for_Learning?f_ri=1580"},{"id":1723635,"name":"Public Policy","url":"https://www.academia.edu/Documents/in/Public_Policy?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_1939805" data-work_id="1939805" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/1939805/Griffiths_M_D_and_Kuss_D_J_2012_Children_s_excessive_social_networking_A_brief_overview_of_the_empirical_literature_UK_Council_For_Child_Internet_Safety_Research_Highlight_No_30_London_UKCCIS">Griffiths, M.D. &amp; Kuss, D.J. (2012). Children’s excessive social networking: A brief overview of the empirical literature. UK Council For Child Internet Safety (Research Highlight No. 30). London: UKCCIS.</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">A small body of empirical research suggests that a minority of child and adolescent social network users experience symptoms traditionally associated with substance-related addictions, including mood modification, tolerance, salience... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_1939805" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">A small body of empirical research suggests that a minority of child and adolescent social network users experience symptoms traditionally associated with substance-related addictions, including mood modification, tolerance, salience (preoccupation), and negative consequences (e.g., loss of control, neglect of work/educational activities, relationship problems, etc.). A systematic literature review was carried out into excessive social networking addiction among children and adolescents.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/1939805" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="fe87d172d310a9f76c4b465a143faefb" rel="nofollow" data-download="{&quot;attachment_id&quot;:27953910,&quot;asset_id&quot;:1939805,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/27953910/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="320455" href="https://nottinghamtrent.academia.edu/MarkGriffiths">Mark D Griffiths</a><script data-card-contents-for-user="320455" type="text/json">{"id":320455,"first_name":"Mark","last_name":"Griffiths","domain_name":"nottinghamtrent","page_name":"MarkGriffiths","display_name":"Mark D Griffiths","profile_url":"https://nottinghamtrent.academia.edu/MarkGriffiths?f_ri=1580","photo":"https://0.academia-photos.com/320455/79042/86543/s65_mark.griffiths.jpg"}</script></span></span></li><li class="js-paper-rank-work_1939805 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="1939805"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 1939805, container: ".js-paper-rank-work_1939805", }); });</script></li><li class="js-percentile-work_1939805 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 1939805; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_1939805"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_1939805 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="1939805"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 1939805; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=1939805]").text(description); $(".js-view-count-work_1939805").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_1939805").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="1939805"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2483" href="https://www.academia.edu/Documents/in/Addiction">Addiction</a>,&nbsp;<script data-card-contents-for-ri="2483" type="text/json">{"id":2483,"name":"Addiction","url":"https://www.academia.edu/Documents/in/Addiction?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2553" href="https://www.academia.edu/Documents/in/Social_Networking">Social Networking</a>,&nbsp;<script data-card-contents-for-ri="2553" type="text/json">{"id":2553,"name":"Social Networking","url":"https://www.academia.edu/Documents/in/Social_Networking?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="9246" href="https://www.academia.edu/Documents/in/Social_Media">Social Media</a><script data-card-contents-for-ri="9246" type="text/json">{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=1939805]'), work: {"id":1939805,"title":"Griffiths, M.D. \u0026 Kuss, D.J. (2012). Children’s excessive social networking: A brief overview of the empirical literature. UK Council For Child Internet Safety (Research Highlight No. 30). London: UKCCIS.","created_at":"2012-09-16T01:27:19.672-07:00","url":"https://www.academia.edu/1939805/Griffiths_M_D_and_Kuss_D_J_2012_Children_s_excessive_social_networking_A_brief_overview_of_the_empirical_literature_UK_Council_For_Child_Internet_Safety_Research_Highlight_No_30_London_UKCCIS?f_ri=1580","dom_id":"work_1939805","summary":"A small body of empirical research suggests that a minority of child and adolescent social network users experience symptoms traditionally associated with substance-related addictions, including mood modification, tolerance, salience (preoccupation), and negative consequences (e.g., loss of control, neglect of work/educational activities, relationship problems, etc.). A systematic literature review was carried out into excessive social networking addiction among children and adolescents. ","downloadable_attachments":[{"id":27953910,"asset_id":1939805,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":320455,"first_name":"Mark","last_name":"Griffiths","domain_name":"nottinghamtrent","page_name":"MarkGriffiths","display_name":"Mark D Griffiths","profile_url":"https://nottinghamtrent.academia.edu/MarkGriffiths?f_ri=1580","photo":"https://0.academia-photos.com/320455/79042/86543/s65_mark.griffiths.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":2483,"name":"Addiction","url":"https://www.academia.edu/Documents/in/Addiction?f_ri=1580","nofollow":false},{"id":2553,"name":"Social Networking","url":"https://www.academia.edu/Documents/in/Social_Networking?f_ri=1580","nofollow":false},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_751663" data-work_id="751663" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/751663/Griffiths_M_D_2005_Tips_on_Handling_information_overload_British_Medical_Journal_Careers_331_169">Griffiths, M.D. (2005). Tips on…Handling information overload. British Medical Journal Careers, 331, 169.</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/751663" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d74dd9d7ec3b755db598444067c9f5db" rel="nofollow" data-download="{&quot;attachment_id&quot;:4329333,&quot;asset_id&quot;:751663,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/4329333/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="320455" href="https://nottinghamtrent.academia.edu/MarkGriffiths">Mark D Griffiths</a><script data-card-contents-for-user="320455" type="text/json">{"id":320455,"first_name":"Mark","last_name":"Griffiths","domain_name":"nottinghamtrent","page_name":"MarkGriffiths","display_name":"Mark D Griffiths","profile_url":"https://nottinghamtrent.academia.edu/MarkGriffiths?f_ri=1580","photo":"https://0.academia-photos.com/320455/79042/86543/s65_mark.griffiths.jpg"}</script></span></span></li><li class="js-paper-rank-work_751663 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="751663"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 751663, container: ".js-paper-rank-work_751663", }); });</script></li><li class="js-percentile-work_751663 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 751663; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_751663"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_751663 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="751663"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 751663; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=751663]").text(description); $(".js-view-count-work_751663").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_751663").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="751663"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="14602" href="https://www.academia.edu/Documents/in/Postgraduate_Skills_Training">Postgraduate Skills Training</a>,&nbsp;<script data-card-contents-for-ri="14602" type="text/json">{"id":14602,"name":"Postgraduate Skills Training","url":"https://www.academia.edu/Documents/in/Postgraduate_Skills_Training?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="17693" href="https://www.academia.edu/Documents/in/Phd_Writing">Phd Writing</a>,&nbsp;<script data-card-contents-for-ri="17693" type="text/json">{"id":17693,"name":"Phd Writing","url":"https://www.academia.edu/Documents/in/Phd_Writing?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="60176" href="https://www.academia.edu/Documents/in/Information_Overload">Information Overload</a><script data-card-contents-for-ri="60176" type="text/json">{"id":60176,"name":"Information Overload","url":"https://www.academia.edu/Documents/in/Information_Overload?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=751663]'), work: {"id":751663,"title":"Griffiths, M.D. (2005). Tips on…Handling information overload. British Medical Journal Careers, 331, 169.","created_at":"2011-07-16T23:21:05.127-07:00","url":"https://www.academia.edu/751663/Griffiths_M_D_2005_Tips_on_Handling_information_overload_British_Medical_Journal_Careers_331_169?f_ri=1580","dom_id":"work_751663","summary":null,"downloadable_attachments":[{"id":4329333,"asset_id":751663,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":320455,"first_name":"Mark","last_name":"Griffiths","domain_name":"nottinghamtrent","page_name":"MarkGriffiths","display_name":"Mark D Griffiths","profile_url":"https://nottinghamtrent.academia.edu/MarkGriffiths?f_ri=1580","photo":"https://0.academia-photos.com/320455/79042/86543/s65_mark.griffiths.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":14602,"name":"Postgraduate Skills Training","url":"https://www.academia.edu/Documents/in/Postgraduate_Skills_Training?f_ri=1580","nofollow":false},{"id":17693,"name":"Phd Writing","url":"https://www.academia.edu/Documents/in/Phd_Writing?f_ri=1580","nofollow":false},{"id":60176,"name":"Information Overload","url":"https://www.academia.edu/Documents/in/Information_Overload?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_49677506" data-work_id="49677506" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/49677506/Sensitivity_to_financial_rewards_and_impression_management_links_to_smartphone_use_and_dependence">Sensitivity to financial rewards and impression management links to smartphone use and dependence</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Computational modeling and brain imaging studies suggest that sensitivity to rewards and behaviorist learning principles partly explain smartphone engagement patterns and potentially smartphone dependence. Responses to a questionnaire,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_49677506" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Computational modeling and brain imaging studies suggest that sensitivity to rewards and behaviorist learning principles partly explain smartphone engagement patterns and potentially smartphone dependence. Responses to a questionnaire, and observational measures of smartphone use were recorded for 121 university students. Each participant was also tested with a laboratory task of reward sensitivity and a test of verbal operant conditioning. Twenty-three percent of the sample had probable smartphone addiction. Using multivariate regression, smartphone use, particularly the number of instant messenger services employed, was shown to be significantly and independently predicted by reward sensitivity (a positive relationship), and by instrumental conditioning (a negative relationship). However, the latter association was driven by a subset of participants who developed declarative knowledge of the response-reinforcer contingency. This suggests a process of impression management driven by experimental demand characteristics, producing goal-directed instrumental behavior not habit-based learning. No other measures of smartphone use, including the self-report scale, were significantly associated with the experimental tasks. We conclude that stronger engagement with smartphones, in particular instant messenger services, may be linked to people being more sensitive to rewarding stimuli, suggestive of a motivational or learning mechanism. We propose that this mechanism could underly problem smartphone use and dependence. It also potentially explains why some aspects of smartphone use, such as habitual actions, appear to be poorly measured by technology-use questionnaires. A serendipitous secondary finding confirmed that smartphone use reflected active self-presentation. Our ‘conditioning’ task-induced this behavior in the laboratory and could be used in social-cognition experimental studies.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/49677506" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="25d63f27524725249dec1ea6679b057c" rel="nofollow" data-download="{&quot;attachment_id&quot;:67962175,&quot;asset_id&quot;:49677506,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/67962175/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1532950" href="https://chula.academia.edu/GrahamPluck">Graham Pluck</a><script data-card-contents-for-user="1532950" type="text/json">{"id":1532950,"first_name":"Graham","last_name":"Pluck","domain_name":"chula","page_name":"GrahamPluck","display_name":"Graham Pluck","profile_url":"https://chula.academia.edu/GrahamPluck?f_ri=1580","photo":"https://0.academia-photos.com/1532950/542424/150677826/s65_graham.pluck.jpg"}</script></span></span></li><li class="js-paper-rank-work_49677506 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="49677506"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 49677506, container: ".js-paper-rank-work_49677506", }); });</script></li><li class="js-percentile-work_49677506 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 49677506; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_49677506"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_49677506 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="49677506"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 49677506; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=49677506]").text(description); $(".js-view-count-work_49677506").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_49677506").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="49677506"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">12</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1688" href="https://www.academia.edu/Documents/in/Reinforcement_Learning">Reinforcement Learning</a>,&nbsp;<script data-card-contents-for-ri="1688" type="text/json">{"id":1688,"name":"Reinforcement Learning","url":"https://www.academia.edu/Documents/in/Reinforcement_Learning?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="31969" href="https://www.academia.edu/Documents/in/Impression_Management">Impression Management</a>,&nbsp;<script data-card-contents-for-ri="31969" type="text/json">{"id":31969,"name":"Impression Management","url":"https://www.academia.edu/Documents/in/Impression_Management?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="34712" href="https://www.academia.edu/Documents/in/Addiction_Psychology_">Addiction (Psychology)</a><script data-card-contents-for-ri="34712" type="text/json">{"id":34712,"name":"Addiction (Psychology)","url":"https://www.academia.edu/Documents/in/Addiction_Psychology_?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=49677506]'), work: {"id":49677506,"title":"Sensitivity to financial rewards and impression management links to smartphone use and dependence","created_at":"2021-07-09T21:55:54.443-07:00","url":"https://www.academia.edu/49677506/Sensitivity_to_financial_rewards_and_impression_management_links_to_smartphone_use_and_dependence?f_ri=1580","dom_id":"work_49677506","summary":"Computational modeling and brain imaging studies suggest that sensitivity to rewards and behaviorist learning principles partly explain smartphone engagement patterns and potentially smartphone dependence. Responses to a questionnaire, and observational measures of smartphone use were recorded for 121 university students. Each participant was also tested with a laboratory task of reward sensitivity and a test of verbal operant conditioning. Twenty-three percent of the sample had probable smartphone addiction. Using multivariate regression, smartphone use, particularly the number of instant messenger services employed, was shown to be significantly and independently predicted by reward sensitivity (a positive relationship), and by instrumental conditioning (a negative relationship). However, the latter association was driven by a subset of participants who developed declarative knowledge of the response-reinforcer contingency. This suggests a process of impression management driven by experimental demand characteristics, producing goal-directed instrumental behavior not habit-based learning. No other measures of smartphone use, including the self-report scale, were significantly associated with the experimental tasks. We conclude that stronger engagement with smartphones, in particular instant messenger services, may be linked to people being more sensitive to rewarding stimuli, suggestive of a motivational or learning mechanism. We propose that this mechanism could underly problem smartphone use and dependence. It also potentially explains why some aspects of smartphone use, such as habitual actions, appear to be poorly measured by technology-use questionnaires. A serendipitous secondary finding confirmed that smartphone use reflected active self-presentation. Our ‘conditioning’ task-induced this behavior in the laboratory and could be used in social-cognition experimental studies.","downloadable_attachments":[{"id":67962175,"asset_id":49677506,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1532950,"first_name":"Graham","last_name":"Pluck","domain_name":"chula","page_name":"GrahamPluck","display_name":"Graham Pluck","profile_url":"https://chula.academia.edu/GrahamPluck?f_ri=1580","photo":"https://0.academia-photos.com/1532950/542424/150677826/s65_graham.pluck.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":1688,"name":"Reinforcement Learning","url":"https://www.academia.edu/Documents/in/Reinforcement_Learning?f_ri=1580","nofollow":false},{"id":31969,"name":"Impression Management","url":"https://www.academia.edu/Documents/in/Impression_Management?f_ri=1580","nofollow":false},{"id":34712,"name":"Addiction (Psychology)","url":"https://www.academia.edu/Documents/in/Addiction_Psychology_?f_ri=1580","nofollow":false},{"id":40541,"name":"Instant Messaging","url":"https://www.academia.edu/Documents/in/Instant_Messaging?f_ri=1580"},{"id":81221,"name":"Smartphones","url":"https://www.academia.edu/Documents/in/Smartphones?f_ri=1580"},{"id":104127,"name":"Reward based learning","url":"https://www.academia.edu/Documents/in/Reward_based_learning?f_ri=1580"},{"id":128286,"name":"CONDUCTISMO","url":"https://www.academia.edu/Documents/in/CONDUCTISMO?f_ri=1580"},{"id":152144,"name":"Behaviorism","url":"https://www.academia.edu/Documents/in/Behaviorism?f_ri=1580"},{"id":256465,"name":"Social Networking \u0026 Social Media","url":"https://www.academia.edu/Documents/in/Social_Networking_and_Social_Media?f_ri=1580"},{"id":357676,"name":"Social Media Addiction","url":"https://www.academia.edu/Documents/in/Social_Media_Addiction?f_ri=1580"},{"id":477865,"name":"Operant Conditioning","url":"https://www.academia.edu/Documents/in/Operant_Conditioning?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_25372453" data-work_id="25372453" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/25372453/Redefining_Therapeutic_Success_with_Virtual_Reality_Exposure_Therapy">Redefining Therapeutic Success with Virtual Reality Exposure Therapy</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/25372453" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="29ad3a18c85d2982ee8339adaeaa7a54" rel="nofollow" data-download="{&quot;attachment_id&quot;:45675891,&quot;asset_id&quot;:25372453,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/45675891/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="42345702" href="https://independent.academia.edu/CristinaBotellaArbona">Cristina Botella Arbona.</a><script data-card-contents-for-user="42345702" type="text/json">{"id":42345702,"first_name":"Cristina Botella","last_name":"Arbona.","domain_name":"independent","page_name":"CristinaBotellaArbona","display_name":"Cristina Botella Arbona.","profile_url":"https://independent.academia.edu/CristinaBotellaArbona?f_ri=1580","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_25372453 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="25372453"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 25372453, container: ".js-paper-rank-work_25372453", }); });</script></li><li class="js-percentile-work_25372453 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 25372453; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_25372453"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_25372453 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="25372453"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 25372453; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=25372453]").text(description); $(".js-view-count-work_25372453").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_25372453").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="25372453"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">9</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a><script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=25372453]'), work: {"id":25372453,"title":"Redefining Therapeutic Success with Virtual Reality Exposure Therapy","created_at":"2016-05-16T14:29:13.533-07:00","url":"https://www.academia.edu/25372453/Redefining_Therapeutic_Success_with_Virtual_Reality_Exposure_Therapy?f_ri=1580","dom_id":"work_25372453","summary":null,"downloadable_attachments":[{"id":45675891,"asset_id":25372453,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":42345702,"first_name":"Cristina Botella","last_name":"Arbona.","domain_name":"independent","page_name":"CristinaBotellaArbona","display_name":"Cristina Botella Arbona.","profile_url":"https://independent.academia.edu/CristinaBotellaArbona?f_ri=1580","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":2240,"name":"Psychotherapy","url":"https://www.academia.edu/Documents/in/Psychotherapy?f_ri=1580"},{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=1580"},{"id":212118,"name":"Exposure Therapy","url":"https://www.academia.edu/Documents/in/Exposure_Therapy?f_ri=1580"},{"id":255094,"name":"Computer User Interface Design","url":"https://www.academia.edu/Documents/in/Computer_User_Interface_Design?f_ri=1580"},{"id":855798,"name":"Cyberpsychology \u0026 Behavior","url":"https://www.academia.edu/Documents/in/Cyberpsychology_and_Behavior?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43986735" data-work_id="43986735" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43986735/_Pro_ana_jako_spo%C5%82eczno_kulturowy_aspekt_zdrowia">„Pro-ana” jako społeczno-kulturowy aspekt zdrowia</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Pro-ana jest manifestem postmodernistycznej młodzieży, która pragnie negocjować znaczenia – uznanych za monolityczne – pojęć, takich jak zdrowie. Pro-ana zarysowuje zatem nową przestrzeń dla rozważań o zdrowiu. Zdrowie, dla... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_43986735" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Pro-ana jest manifestem postmodernistycznej młodzieży, która pragnie negocjować znaczenia – uznanych za monolityczne – pojęć, takich jak zdrowie. Pro-ana zarysowuje zatem nową przestrzeń dla rozważań o zdrowiu. Zdrowie, dla przedstawicielek tego ruchu, staje się kategorią relatywną – to co tradycyjnie jawiło się jako bezwzględnie niezdrowe (stąd niepożądane), w warunkach pro-any staje się oznaką dobrostanu. Celem tekstu jest ukazanie, jak zwolenniczki pro-any negocjują znaczenia zdrowia i rozpatrzenie tego zagadnienia w kontekście teorii postmodernistycznej.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43986735" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b41a099e286cab29bfae184c5f6116f0" rel="nofollow" data-download="{&quot;attachment_id&quot;:64317310,&quot;asset_id&quot;:43986735,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/64317310/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="8115401" href="https://amu.academia.edu/MichalKlichowski">Michal Klichowski</a><script data-card-contents-for-user="8115401" type="text/json">{"id":8115401,"first_name":"Michal","last_name":"Klichowski","domain_name":"amu","page_name":"MichalKlichowski","display_name":"Michal Klichowski","profile_url":"https://amu.academia.edu/MichalKlichowski?f_ri=1580","photo":"https://0.academia-photos.com/8115401/2810495/39509228/s65_michal.klichowski.jpg"}</script></span></span></li><li class="js-paper-rank-work_43986735 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43986735"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43986735, container: ".js-paper-rank-work_43986735", }); });</script></li><li class="js-percentile-work_43986735 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43986735; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43986735"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43986735 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43986735"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43986735; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43986735]").text(description); $(".js-view-count-work_43986735").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43986735").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43986735"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">18</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="260" href="https://www.academia.edu/Documents/in/Health_Psychology">Health Psychology</a>,&nbsp;<script data-card-contents-for-ri="260" type="text/json">{"id":260,"name":"Health Psychology","url":"https://www.academia.edu/Documents/in/Health_Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3128" href="https://www.academia.edu/Documents/in/Sociology_of_Food_and_Eating">Sociology of Food and Eating</a>,&nbsp;<script data-card-contents-for-ri="3128" type="text/json">{"id":3128,"name":"Sociology of Food and Eating","url":"https://www.academia.edu/Documents/in/Sociology_of_Food_and_Eating?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4160" href="https://www.academia.edu/Documents/in/Eating_Disorders">Eating Disorders</a><script data-card-contents-for-ri="4160" type="text/json">{"id":4160,"name":"Eating Disorders","url":"https://www.academia.edu/Documents/in/Eating_Disorders?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43986735]'), work: {"id":43986735,"title":"„Pro-ana” jako społeczno-kulturowy aspekt zdrowia","created_at":"2020-08-31T04:29:03.298-07:00","url":"https://www.academia.edu/43986735/_Pro_ana_jako_spo%C5%82eczno_kulturowy_aspekt_zdrowia?f_ri=1580","dom_id":"work_43986735","summary":"Pro-ana jest manifestem postmodernistycznej młodzieży, która pragnie negocjować znaczenia – uznanych za monolityczne – pojęć, takich jak zdrowie. Pro-ana zarysowuje zatem nową przestrzeń dla rozważań o zdrowiu. Zdrowie, dla przedstawicielek tego ruchu, staje się kategorią relatywną – to co tradycyjnie jawiło się jako bezwzględnie niezdrowe (stąd niepożądane), w warunkach pro-any staje się oznaką dobrostanu. Celem tekstu jest ukazanie, jak zwolenniczki pro-any negocjują znaczenia zdrowia i rozpatrzenie tego zagadnienia w kontekście teorii postmodernistycznej.","downloadable_attachments":[{"id":64317310,"asset_id":43986735,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":8115401,"first_name":"Michal","last_name":"Klichowski","domain_name":"amu","page_name":"MichalKlichowski","display_name":"Michal Klichowski","profile_url":"https://amu.academia.edu/MichalKlichowski?f_ri=1580","photo":"https://0.academia-photos.com/8115401/2810495/39509228/s65_michal.klichowski.jpg"}],"research_interests":[{"id":260,"name":"Health Psychology","url":"https://www.academia.edu/Documents/in/Health_Psychology?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":3128,"name":"Sociology of Food and Eating","url":"https://www.academia.edu/Documents/in/Sociology_of_Food_and_Eating?f_ri=1580","nofollow":false},{"id":4160,"name":"Eating Disorders","url":"https://www.academia.edu/Documents/in/Eating_Disorders?f_ri=1580","nofollow":false},{"id":5438,"name":"Health Behaviour Change","url":"https://www.academia.edu/Documents/in/Health_Behaviour_Change?f_ri=1580"},{"id":10444,"name":"Postmodernism","url":"https://www.academia.edu/Documents/in/Postmodernism?f_ri=1580"},{"id":12763,"name":"Human Eating Behaviours","url":"https://www.academia.edu/Documents/in/Human_Eating_Behaviours?f_ri=1580"},{"id":15827,"name":"Eating Disorders and Body Image","url":"https://www.academia.edu/Documents/in/Eating_Disorders_and_Body_Image?f_ri=1580"},{"id":33242,"name":"Anorexia Nervosa","url":"https://www.academia.edu/Documents/in/Anorexia_Nervosa?f_ri=1580"},{"id":33243,"name":"Bulimia Nervosa","url":"https://www.academia.edu/Documents/in/Bulimia_Nervosa?f_ri=1580"},{"id":41939,"name":"Eating Disorders and Obesity","url":"https://www.academia.edu/Documents/in/Eating_Disorders_and_Obesity?f_ri=1580"},{"id":51610,"name":"Postmodernity","url":"https://www.academia.edu/Documents/in/Postmodernity?f_ri=1580"},{"id":52499,"name":"Social Psychology of Health and Health Behavior","url":"https://www.academia.edu/Documents/in/Social_Psychology_of_Health_and_Health_Behavior?f_ri=1580"},{"id":146128,"name":"Pro-Anorexia","url":"https://www.academia.edu/Documents/in/Pro-Anorexia?f_ri=1580"},{"id":313427,"name":"Bulimia and Anorexia","url":"https://www.academia.edu/Documents/in/Bulimia_and_Anorexia?f_ri=1580"},{"id":554269,"name":"Anorexia","url":"https://www.academia.edu/Documents/in/Anorexia?f_ri=1580"},{"id":939482,"name":"Women and Food/eating","url":"https://www.academia.edu/Documents/in/Women_and_Food_eating?f_ri=1580"},{"id":1033078,"name":"Pro Anorexia","url":"https://www.academia.edu/Documents/in/Pro_Anorexia?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_70757789" data-work_id="70757789" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/70757789/Developing_Next_Generation_Countermeasures_for_Homeland_Security_Threat_Prevention">Developing Next-Generation Countermeasures for Homeland Security Threat Prevention</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The password is the most widely used identity verification method in computer security domain. However, due to its simplicity, it is vulnerable to imposters. A way to strengthen the password is to combine Biometric technology with... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_70757789" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The password is the most widely used identity verification method in computer security domain. However, due to its simplicity, it is vulnerable to imposters. A way to strengthen the password is to combine Biometric technology with password. Keystroke dynamics is one of the behavioural biometric approaches which is cheaper and does not require any sophisticated hardware other than the keyboard. The chapter uses a new feature called Virtual Key Force along with the commonly extracted timing features. Features are normalized using Z-Score method. For feature subset selection, Particle Swarm Optimization wrapped with Extreme Learning Machine is proposed. Classification is done with wrapper based PSO-ELM approach. The proposed methodology is tested with publically available benchmark dataset and real time dataset. The proposed method yields the average accuracy of 97.92% and takes less training and testing time when compared with the traditional Back Propagation Neural Network.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/70757789" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="fa835b661e6ca7a58625b3e20a708c10" rel="nofollow" data-download="{&quot;attachment_id&quot;:80372106,&quot;asset_id&quot;:70757789,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/80372106/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="82613518" href="https://iit.academia.edu/MauriceDawson">Maurice Dawson</a><script data-card-contents-for-user="82613518" type="text/json">{"id":82613518,"first_name":"Maurice","last_name":"Dawson","domain_name":"iit","page_name":"MauriceDawson","display_name":"Maurice Dawson","profile_url":"https://iit.academia.edu/MauriceDawson?f_ri=1580","photo":"https://gravatar.com/avatar/a6dd47fc155390a925162801ad79dd11?s=65"}</script></span></span></li><li class="js-paper-rank-work_70757789 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="70757789"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 70757789, container: ".js-paper-rank-work_70757789", }); });</script></li><li class="js-percentile-work_70757789 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 70757789; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_70757789"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_70757789 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="70757789"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 70757789; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=70757789]").text(description); $(".js-view-count-work_70757789").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_70757789").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="70757789"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">20</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="26" href="https://www.academia.edu/Documents/in/Business">Business</a>,&nbsp;<script data-card-contents-for-ri="26" type="text/json">{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="379" href="https://www.academia.edu/Documents/in/African_Studies">African Studies</a>,&nbsp;<script data-card-contents-for-ri="379" type="text/json">{"id":379,"name":"African Studies","url":"https://www.academia.edu/Documents/in/African_Studies?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>,&nbsp;<script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="799" href="https://www.academia.edu/Documents/in/Public_Administration">Public Administration</a><script data-card-contents-for-ri="799" type="text/json">{"id":799,"name":"Public Administration","url":"https://www.academia.edu/Documents/in/Public_Administration?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=70757789]'), work: {"id":70757789,"title":"Developing Next-Generation Countermeasures for Homeland Security Threat Prevention","created_at":"2022-02-06T15:17:40.933-08:00","url":"https://www.academia.edu/70757789/Developing_Next_Generation_Countermeasures_for_Homeland_Security_Threat_Prevention?f_ri=1580","dom_id":"work_70757789","summary":"The password is the most widely used identity verification method in computer security domain. However, due to its simplicity, it is vulnerable to imposters. A way to strengthen the password is to combine Biometric technology with password. Keystroke dynamics is one of the behavioural biometric approaches which is cheaper and does not require any sophisticated hardware other than the keyboard. The chapter uses a new feature called Virtual Key Force along with the commonly extracted timing features. Features are normalized using Z-Score method. For feature subset selection, Particle Swarm Optimization wrapped with Extreme Learning Machine is proposed. Classification is done with wrapper based PSO-ELM approach. The proposed methodology is tested with publically available benchmark dataset and real time dataset. The proposed method yields the average accuracy of 97.92% and takes less training and testing time when compared with the traditional Back Propagation Neural Network.","downloadable_attachments":[{"id":80372106,"asset_id":70757789,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":82613518,"first_name":"Maurice","last_name":"Dawson","domain_name":"iit","page_name":"MauriceDawson","display_name":"Maurice Dawson","profile_url":"https://iit.academia.edu/MauriceDawson?f_ri=1580","photo":"https://gravatar.com/avatar/a6dd47fc155390a925162801ad79dd11?s=65"}],"research_interests":[{"id":26,"name":"Business","url":"https://www.academia.edu/Documents/in/Business?f_ri=1580","nofollow":false},{"id":379,"name":"African Studies","url":"https://www.academia.edu/Documents/in/African_Studies?f_ri=1580","nofollow":false},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1580","nofollow":false},{"id":799,"name":"Public Administration","url":"https://www.academia.edu/Documents/in/Public_Administration?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580"},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=1580"},{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=1580"},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=1580"},{"id":3896,"name":"African History","url":"https://www.academia.edu/Documents/in/African_History?f_ri=1580"},{"id":4527,"name":"Africa","url":"https://www.academia.edu/Documents/in/Africa?f_ri=1580"},{"id":5380,"name":"Homeland Security","url":"https://www.academia.edu/Documents/in/Homeland_Security?f_ri=1580"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=1580"},{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=1580"},{"id":26669,"name":"Counter terrorism","url":"https://www.academia.edu/Documents/in/Counter_terrorism?f_ri=1580"},{"id":33361,"name":"Authentication","url":"https://www.academia.edu/Documents/in/Authentication?f_ri=1580"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=1580"},{"id":95389,"name":"Homeland Security Policy","url":"https://www.academia.edu/Documents/in/Homeland_Security_Policy?f_ri=1580"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1580"},{"id":755041,"name":"Homeland Security and Emergency Management","url":"https://www.academia.edu/Documents/in/Homeland_Security_and_Emergency_Management?f_ri=1580"},{"id":1723635,"name":"Public Policy","url":"https://www.academia.edu/Documents/in/Public_Policy?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_2911614" data-work_id="2911614" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/2911614/The_Virtual_Classroom_A_Virtual_Reality_Environment_for_the_Assessment_and_Rehabilitation_of_Attention_Deficits">The Virtual Classroom: A Virtual Reality Environment for the Assessment and Rehabilitation of Attention Deficits</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/2911614" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="99f73e527d3a4ca2500a48fe4e92ca3a" rel="nofollow" data-download="{&quot;attachment_id&quot;:50538661,&quot;asset_id&quot;:2911614,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/50538661/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3424697" href="https://independent.academia.edu/hebaezz">heba ezz</a><script data-card-contents-for-user="3424697" type="text/json">{"id":3424697,"first_name":"heba","last_name":"ezz","domain_name":"independent","page_name":"hebaezz","display_name":"heba ezz","profile_url":"https://independent.academia.edu/hebaezz?f_ri=1580","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_2911614 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="2911614"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 2911614, container: ".js-paper-rank-work_2911614", }); });</script></li><li class="js-percentile-work_2911614 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 2911614; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_2911614"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_2911614 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="2911614"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 2911614; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=2911614]").text(description); $(".js-view-count-work_2911614").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_2911614").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="2911614"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">17</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a><script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=2911614]'), work: {"id":2911614,"title":"The Virtual Classroom: A Virtual Reality Environment for the Assessment and Rehabilitation of Attention Deficits","created_at":"2013-03-05T12:30:57.122-08:00","url":"https://www.academia.edu/2911614/The_Virtual_Classroom_A_Virtual_Reality_Environment_for_the_Assessment_and_Rehabilitation_of_Attention_Deficits?f_ri=1580","dom_id":"work_2911614","summary":null,"downloadable_attachments":[{"id":50538661,"asset_id":2911614,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3424697,"first_name":"heba","last_name":"ezz","domain_name":"independent","page_name":"hebaezz","display_name":"heba ezz","profile_url":"https://independent.academia.edu/hebaezz?f_ri=1580","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":2350,"name":"Attention-Deficit/Hyperactivity Disorder","url":"https://www.academia.edu/Documents/in/Attention-Deficit_Hyperactivity_Disorder?f_ri=1580"},{"id":3720,"name":"Traumatic Brain Injury","url":"https://www.academia.edu/Documents/in/Traumatic_Brain_Injury?f_ri=1580"},{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=1580"},{"id":68786,"name":"Virtual Environment","url":"https://www.academia.edu/Documents/in/Virtual_Environment?f_ri=1580"},{"id":97766,"name":"Vascular dementia","url":"https://www.academia.edu/Documents/in/Vascular_dementia?f_ri=1580"},{"id":154636,"name":"Cognitive Process","url":"https://www.academia.edu/Documents/in/Cognitive_Process?f_ri=1580"},{"id":231665,"name":"Ecological Validity","url":"https://www.academia.edu/Documents/in/Ecological_Validity?f_ri=1580"},{"id":358624,"name":"Virtual Classroom","url":"https://www.academia.edu/Documents/in/Virtual_Classroom?f_ri=1580"},{"id":441653,"name":"Cognitive Function","url":"https://www.academia.edu/Documents/in/Cognitive_Function?f_ri=1580"},{"id":663792,"name":"Southern California","url":"https://www.academia.edu/Documents/in/Southern_California?f_ri=1580"},{"id":851846,"name":"Attention Deficit","url":"https://www.academia.edu/Documents/in/Attention_Deficit?f_ri=1580"},{"id":855798,"name":"Cyberpsychology \u0026 Behavior","url":"https://www.academia.edu/Documents/in/Cyberpsychology_and_Behavior?f_ri=1580"},{"id":1407712,"name":"Head Mounted Display","url":"https://www.academia.edu/Documents/in/Head_Mounted_Display?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_17524496" data-work_id="17524496" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/17524496/Notes_on_How_We_Became_Posthuman_Virtual_Bodies_in_Cybernetics_Literature_and_Informatics_by_Katherine_N_Hayles">Notes on: How We Became Posthuman -Virtual Bodies in Cybernetics, Literature, and Informatics by Katherine N Hayles</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Hayle’s extensive six-year research included extensive reading of the history of cybernetics, interviews with scientists in computational biology, reading cultural and literary texts engaged in research on virtual reality, cybernetics,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_17524496" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Hayle’s extensive six-year research included extensive reading of the history of cybernetics, interviews with scientists in computational biology, reading cultural and literary texts engaged in research on virtual reality, cybernetics, information theory, autopsies, computer simulation and cognitive science. This tedious research all generated from a particular passage in Hans Moravec’s Mind Children: The Future of Robot and Human Intelligence. She describes it as a nightmare...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/17524496" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6088e11f5aae7ebe3a589c281d172ab3" rel="nofollow" data-download="{&quot;attachment_id&quot;:39557972,&quot;asset_id&quot;:17524496,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/39557972/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="32403416" href="https://artcenter.academia.edu/BrittanyLombari">Brittany Lombari</a><script data-card-contents-for-user="32403416" type="text/json">{"id":32403416,"first_name":"Brittany","last_name":"Lombari","domain_name":"artcenter","page_name":"BrittanyLombari","display_name":"Brittany Lombari","profile_url":"https://artcenter.academia.edu/BrittanyLombari?f_ri=1580","photo":"https://0.academia-photos.com/32403416/10574003/11801796/s65_brittany.lombari.png"}</script></span></span></li><li class="js-paper-rank-work_17524496 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="17524496"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 17524496, container: ".js-paper-rank-work_17524496", }); });</script></li><li class="js-percentile-work_17524496 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 17524496; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_17524496"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_17524496 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="17524496"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 17524496; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=17524496]").text(description); $(".js-view-count-work_17524496").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_17524496").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="17524496"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">9</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="814" href="https://www.academia.edu/Documents/in/Ethics">Ethics</a>,&nbsp;<script data-card-contents-for-ri="814" type="text/json">{"id":814,"name":"Ethics","url":"https://www.academia.edu/Documents/in/Ethics?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="923" href="https://www.academia.edu/Documents/in/Technology">Technology</a>,&nbsp;<script data-card-contents-for-ri="923" type="text/json">{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2674" href="https://www.academia.edu/Documents/in/Intelligence">Intelligence</a><script data-card-contents-for-ri="2674" type="text/json">{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=17524496]'), work: {"id":17524496,"title":"Notes on: How We Became Posthuman -Virtual Bodies in Cybernetics, Literature, and Informatics by Katherine N Hayles","created_at":"2015-10-30T10:16:39.683-07:00","url":"https://www.academia.edu/17524496/Notes_on_How_We_Became_Posthuman_Virtual_Bodies_in_Cybernetics_Literature_and_Informatics_by_Katherine_N_Hayles?f_ri=1580","dom_id":"work_17524496","summary":"Hayle’s extensive six-year research included extensive reading of the history of cybernetics, interviews with scientists in computational biology, reading cultural and literary texts engaged in research on virtual reality, cybernetics, information theory, autopsies, computer simulation and cognitive science. This tedious research all generated from a particular passage in Hans Moravec’s Mind Children: The Future of Robot and Human Intelligence. She describes it as a nightmare...","downloadable_attachments":[{"id":39557972,"asset_id":17524496,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":32403416,"first_name":"Brittany","last_name":"Lombari","domain_name":"artcenter","page_name":"BrittanyLombari","display_name":"Brittany Lombari","profile_url":"https://artcenter.academia.edu/BrittanyLombari?f_ri=1580","photo":"https://0.academia-photos.com/32403416/10574003/11801796/s65_brittany.lombari.png"}],"research_interests":[{"id":814,"name":"Ethics","url":"https://www.academia.edu/Documents/in/Ethics?f_ri=1580","nofollow":false},{"id":923,"name":"Technology","url":"https://www.academia.edu/Documents/in/Technology?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=1580","nofollow":false},{"id":4181,"name":"Cybernetics","url":"https://www.academia.edu/Documents/in/Cybernetics?f_ri=1580"},{"id":7710,"name":"Biology","url":"https://www.academia.edu/Documents/in/Biology?f_ri=1580"},{"id":90872,"name":"N. Katherine Hayles","url":"https://www.academia.edu/Documents/in/N._Katherine_Hayles?f_ri=1580"},{"id":118579,"name":"Post-Humanism","url":"https://www.academia.edu/Documents/in/Post-Humanism?f_ri=1580"},{"id":1744493,"name":"Science and Technology Studies","url":"https://www.academia.edu/Documents/in/Science_and_Technology_Studies?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_432311" data-work_id="432311" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/432311/Griffiths_M_D_2006_Videogame_playing_in_children_and_adolescents_National_Children_s_Bureau_Highlight_No_226_ISSN_1365_9081_">Griffiths, M.D. (2006). Videogame playing in children and adolescents. National Children’s Bureau Highlight No.226. (ISSN 1365-9081).</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Despite being one of the most popular leisure activities for children and adolescents in the Western world, there has been relatively little research into the positive and negative effects of videogame playing and most of that research... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_432311" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Despite being one of the most popular leisure activities for children and adolescents in the Western world, there has been relatively little research into the positive and negative effects of videogame playing and most of that research has been carried out in America. Research in this field faces methodological problems, for example, ecological validity, small and unrepresentative sample sizes, and while it has concentrated on young people, the typical demographic is now a male in his late 20s. Videogames can be delivered via four hardware systems – handheld consoles (for example Nintendo DS), personal computers, home video consoles (for example Sony Playstation), and arcade machines. Access is increasingly via the internet as part of online worlds such as Everquest. As a consequence, they can be played online or offline, alone and/or against other people. Research over the last decade has indicated that most children play videogames at some point and that around a third of children play every day. Despite a small literature, there are a number of educational, psychosocial and therapeutic benefits, as well as potential negative effects (addiction, increased aggression and medical side effects) – some of which have given rise to governmental concern. These are briefly overviewed.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/432311" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f1b2360d4abf2b109886b6714300757a" rel="nofollow" data-download="{&quot;attachment_id&quot;:1970385,&quot;asset_id&quot;:432311,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/1970385/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="320455" href="https://nottinghamtrent.academia.edu/MarkGriffiths">Mark D Griffiths</a><script data-card-contents-for-user="320455" type="text/json">{"id":320455,"first_name":"Mark","last_name":"Griffiths","domain_name":"nottinghamtrent","page_name":"MarkGriffiths","display_name":"Mark D Griffiths","profile_url":"https://nottinghamtrent.academia.edu/MarkGriffiths?f_ri=1580","photo":"https://0.academia-photos.com/320455/79042/86543/s65_mark.griffiths.jpg"}</script></span></span></li><li class="js-paper-rank-work_432311 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="432311"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 432311, container: ".js-paper-rank-work_432311", }); });</script></li><li class="js-percentile-work_432311 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 432311; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_432311"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_432311 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="432311"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 432311; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=432311]").text(description); $(".js-view-count-work_432311").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_432311").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="432311"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">2</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5199" href="https://www.academia.edu/Documents/in/Video_Games">Video Games</a><script data-card-contents-for-ri="5199" type="text/json">{"id":5199,"name":"Video Games","url":"https://www.academia.edu/Documents/in/Video_Games?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=432311]'), work: {"id":432311,"title":"Griffiths, M.D. (2006). Videogame playing in children and adolescents. National Children’s Bureau Highlight No.226. (ISSN 1365-9081).","created_at":"2011-02-05T17:26:22.228-08:00","url":"https://www.academia.edu/432311/Griffiths_M_D_2006_Videogame_playing_in_children_and_adolescents_National_Children_s_Bureau_Highlight_No_226_ISSN_1365_9081_?f_ri=1580","dom_id":"work_432311","summary":"Despite being one of the most popular leisure activities for children and adolescents in the Western world, there has been relatively little research into the positive and negative effects of videogame playing and most of that research has been carried out in America. Research in this field faces methodological problems, for example, ecological validity, small and unrepresentative sample sizes, and while it has concentrated on young people, the typical demographic is now a male in his late 20s. Videogames can be delivered via four hardware systems – handheld consoles (for example Nintendo DS), personal computers, home video consoles (for example Sony Playstation), and arcade machines. Access is increasingly via the internet as part of online worlds such as Everquest. As a consequence, they can be played online or offline, alone and/or against other people. Research over the last decade has indicated that most children play videogames at some point and that around a third of children play every day. Despite a small literature, there are a number of educational, psychosocial and therapeutic benefits, as well as potential negative effects (addiction, increased aggression and medical side effects) – some of which have given rise to governmental concern. These are briefly overviewed.","downloadable_attachments":[{"id":1970385,"asset_id":432311,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":320455,"first_name":"Mark","last_name":"Griffiths","domain_name":"nottinghamtrent","page_name":"MarkGriffiths","display_name":"Mark D Griffiths","profile_url":"https://nottinghamtrent.academia.edu/MarkGriffiths?f_ri=1580","photo":"https://0.academia-photos.com/320455/79042/86543/s65_mark.griffiths.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":5199,"name":"Video Games","url":"https://www.academia.edu/Documents/in/Video_Games?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_57308850" data-work_id="57308850" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/57308850/Comparing_Acceptance_and_Refusal_Rates_of_Virtual_Reality_Exposure_vs_In_Vivo_Exposure_by_Patients_with_Specific_Phobias">Comparing Acceptance and Refusal Rates of Virtual Reality Exposure vs. In Vivo Exposure by Patients with Specific Phobias</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/57308850" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="583dd971797fbde458f85ffc29096460" rel="nofollow" data-download="{&quot;attachment_id&quot;:72272403,&quot;asset_id&quot;:57308850,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/72272403/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="36906344" href="https://independent.academia.edu/AGarciapalacios">A. Garcia-palacios</a><script data-card-contents-for-user="36906344" type="text/json">{"id":36906344,"first_name":"A.","last_name":"Garcia-palacios","domain_name":"independent","page_name":"AGarciapalacios","display_name":"A. Garcia-palacios","profile_url":"https://independent.academia.edu/AGarciapalacios?f_ri=1580","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_57308850 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="57308850"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 57308850, container: ".js-paper-rank-work_57308850", }); });</script></li><li class="js-percentile-work_57308850 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 57308850; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_57308850"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_57308850 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="57308850"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 57308850; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=57308850]").text(description); $(".js-view-count-work_57308850").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_57308850").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="57308850"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">13</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a><script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=57308850]'), work: {"id":57308850,"title":"Comparing Acceptance and Refusal Rates of Virtual Reality Exposure vs. In Vivo Exposure by Patients with Specific Phobias","created_at":"2021-10-12T01:25:12.207-07:00","url":"https://www.academia.edu/57308850/Comparing_Acceptance_and_Refusal_Rates_of_Virtual_Reality_Exposure_vs_In_Vivo_Exposure_by_Patients_with_Specific_Phobias?f_ri=1580","dom_id":"work_57308850","summary":null,"downloadable_attachments":[{"id":72272403,"asset_id":57308850,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":36906344,"first_name":"A.","last_name":"Garcia-palacios","domain_name":"independent","page_name":"AGarciapalacios","display_name":"A. Garcia-palacios","profile_url":"https://independent.academia.edu/AGarciapalacios?f_ri=1580","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":22506,"name":"Adolescent","url":"https://www.academia.edu/Documents/in/Adolescent?f_ri=1580"},{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=1580"},{"id":69542,"name":"Computer Simulation","url":"https://www.academia.edu/Documents/in/Computer_Simulation?f_ri=1580"},{"id":212118,"name":"Exposure Therapy","url":"https://www.academia.edu/Documents/in/Exposure_Therapy?f_ri=1580"},{"id":255094,"name":"Computer User Interface Design","url":"https://www.academia.edu/Documents/in/Computer_User_Interface_Design?f_ri=1580"},{"id":289271,"name":"Aged","url":"https://www.academia.edu/Documents/in/Aged?f_ri=1580"},{"id":855798,"name":"Cyberpsychology \u0026 Behavior","url":"https://www.academia.edu/Documents/in/Cyberpsychology_and_Behavior?f_ri=1580"},{"id":1253718,"name":"Treatment Refusal","url":"https://www.academia.edu/Documents/in/Treatment_Refusal?f_ri=1580"},{"id":3048514,"name":"Phobic disorders","url":"https://www.academia.edu/Documents/in/Phobic_disorders?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_10441062 coauthored" data-work_id="10441062" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/10441062/The_Appeal_of_Violent_Video_Games_to_Lower_Educated_Aggressive_Adolescent_Boys_from_Two_Countries">The Appeal of Violent Video Games to Lower Educated Aggressive Adolescent Boys from Two Countries</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/10441062" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="50ccc956e04595a3ac65f2e4ca7e4553" rel="nofollow" data-download="{&quot;attachment_id&quot;:47389167,&quot;asset_id&quot;:10441062,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/47389167/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="25636286" href="https://vu-nl.academia.edu/EllyKonijn">Elly A Konijn</a><script data-card-contents-for-user="25636286" type="text/json">{"id":25636286,"first_name":"Elly","last_name":"Konijn","domain_name":"vu-nl","page_name":"EllyKonijn","display_name":"Elly A Konijn","profile_url":"https://vu-nl.academia.edu/EllyKonijn?f_ri=1580","photo":"/images/s65_no_pic.png"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-10441062">+1</span><div class="hidden js-additional-users-10441062"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://umich.academia.edu/BradBushman">Brad Bushman</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-10441062'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-10441062').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_10441062 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="10441062"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 10441062, container: ".js-paper-rank-work_10441062", }); });</script></li><li class="js-percentile-work_10441062 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 10441062; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_10441062"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_10441062 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="10441062"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 10441062; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=10441062]").text(description); $(".js-view-count-work_10441062").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_10441062").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="10441062"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">17</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a><script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=10441062]'), work: {"id":10441062,"title":"The Appeal of Violent Video Games to Lower Educated Aggressive Adolescent Boys from Two Countries","created_at":"2015-02-01T17:13:23.800-08:00","url":"https://www.academia.edu/10441062/The_Appeal_of_Violent_Video_Games_to_Lower_Educated_Aggressive_Adolescent_Boys_from_Two_Countries?f_ri=1580","dom_id":"work_10441062","summary":null,"downloadable_attachments":[{"id":47389167,"asset_id":10441062,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":25636286,"first_name":"Elly","last_name":"Konijn","domain_name":"vu-nl","page_name":"EllyKonijn","display_name":"Elly A Konijn","profile_url":"https://vu-nl.academia.edu/EllyKonijn?f_ri=1580","photo":"/images/s65_no_pic.png"},{"id":3162689,"first_name":"Brad","last_name":"Bushman","domain_name":"umich","page_name":"BradBushman","display_name":"Brad Bushman","profile_url":"https://umich.academia.edu/BradBushman?f_ri=1580","photo":"https://0.academia-photos.com/3162689/1039879/1298995/s65_brad.bushman.jpg"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence?f_ri=1580"},{"id":3595,"name":"Individuality","url":"https://www.academia.edu/Documents/in/Individuality?f_ri=1580"},{"id":11306,"name":"Video Game","url":"https://www.academia.edu/Documents/in/Video_Game?f_ri=1580"},{"id":22506,"name":"Adolescent","url":"https://www.academia.edu/Documents/in/Adolescent?f_ri=1580"},{"id":40862,"name":"Belgium","url":"https://www.academia.edu/Documents/in/Belgium?f_ri=1580"},{"id":44886,"name":"Empathy","url":"https://www.academia.edu/Documents/in/Empathy?f_ri=1580"},{"id":57511,"name":"Cross-Cultural Comparison","url":"https://www.academia.edu/Documents/in/Cross-Cultural_Comparison?f_ri=1580"},{"id":64933,"name":"Child","url":"https://www.academia.edu/Documents/in/Child?f_ri=1580"},{"id":82732,"name":"Aggression","url":"https://www.academia.edu/Documents/in/Aggression?f_ri=1580"},{"id":157892,"name":"Netherlands","url":"https://www.academia.edu/Documents/in/Netherlands?f_ri=1580"},{"id":546421,"name":"Educational Status","url":"https://www.academia.edu/Documents/in/Educational_Status?f_ri=1580"},{"id":855798,"name":"Cyberpsychology \u0026 Behavior","url":"https://www.academia.edu/Documents/in/Cyberpsychology_and_Behavior?f_ri=1580"},{"id":1529835,"name":"Choice Behavior","url":"https://www.academia.edu/Documents/in/Choice_Behavior?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_19989798 coauthored" data-work_id="19989798" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/19989798/Virtual_Reality_as_a_Pediatric_Pain_Modulation_Technique_A_Case_Study">Virtual Reality as a Pediatric Pain Modulation Technique: A Case Study</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/19989798" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="afb1988d5c7d3624bcfc2eba4b346a18" rel="nofollow" data-download="{&quot;attachment_id&quot;:41167623,&quot;asset_id&quot;:19989798,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/41167623/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="40884166" href="https://independent.academia.edu/KarenGrimmer">Karen Grimmer</a><script data-card-contents-for-user="40884166" type="text/json">{"id":40884166,"first_name":"Karen","last_name":"Grimmer","domain_name":"independent","page_name":"KarenGrimmer","display_name":"Karen Grimmer","profile_url":"https://independent.academia.edu/KarenGrimmer?f_ri=1580","photo":"/images/s65_no_pic.png"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-19989798">+1</span><div class="hidden js-additional-users-19989798"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/BThomas5">B. Thomas</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-19989798'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-19989798').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_19989798 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="19989798"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 19989798, container: ".js-paper-rank-work_19989798", }); });</script></li><li class="js-percentile-work_19989798 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 19989798; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_19989798"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_19989798 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="19989798"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 19989798; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=19989798]").text(description); $(".js-view-count-work_19989798").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_19989798").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="19989798"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">21</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="445" href="https://www.academia.edu/Documents/in/Computer_Graphics">Computer Graphics</a><script data-card-contents-for-ri="445" type="text/json">{"id":445,"name":"Computer Graphics","url":"https://www.academia.edu/Documents/in/Computer_Graphics?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=19989798]'), work: {"id":19989798,"title":"Virtual Reality as a Pediatric Pain Modulation Technique: A Case Study","created_at":"2016-01-03T16:12:55.531-08:00","url":"https://www.academia.edu/19989798/Virtual_Reality_as_a_Pediatric_Pain_Modulation_Technique_A_Case_Study?f_ri=1580","dom_id":"work_19989798","summary":null,"downloadable_attachments":[{"id":41167623,"asset_id":19989798,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":40884166,"first_name":"Karen","last_name":"Grimmer","domain_name":"independent","page_name":"KarenGrimmer","display_name":"Karen Grimmer","profile_url":"https://independent.academia.edu/KarenGrimmer?f_ri=1580","photo":"/images/s65_no_pic.png"},{"id":40975352,"first_name":"B.","last_name":"Thomas","domain_name":"independent","page_name":"BThomas5","display_name":"B. Thomas","profile_url":"https://independent.academia.edu/BThomas5?f_ri=1580","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":445,"name":"Computer Graphics","url":"https://www.academia.edu/Documents/in/Computer_Graphics?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580"},{"id":2898,"name":"Pain","url":"https://www.academia.edu/Documents/in/Pain?f_ri=1580"},{"id":12426,"name":"Treatment Outcome","url":"https://www.academia.edu/Documents/in/Treatment_Outcome?f_ri=1580"},{"id":17845,"name":"Cerebral Palsy","url":"https://www.academia.edu/Documents/in/Cerebral_Palsy?f_ri=1580"},{"id":22506,"name":"Adolescent","url":"https://www.academia.edu/Documents/in/Adolescent?f_ri=1580"},{"id":40165,"name":"Pain Management","url":"https://www.academia.edu/Documents/in/Pain_Management?f_ri=1580"},{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=1580"},{"id":63886,"name":"Case Report","url":"https://www.academia.edu/Documents/in/Case_Report?f_ri=1580"},{"id":69542,"name":"Computer Simulation","url":"https://www.academia.edu/Documents/in/Computer_Simulation?f_ri=1580"},{"id":96047,"name":"Case Study","url":"https://www.academia.edu/Documents/in/Case_Study?f_ri=1580"},{"id":136811,"name":"Analgesia","url":"https://www.academia.edu/Documents/in/Analgesia?f_ri=1580"},{"id":255094,"name":"Computer User Interface Design","url":"https://www.academia.edu/Documents/in/Computer_User_Interface_Design?f_ri=1580"},{"id":855798,"name":"Cyberpsychology \u0026 Behavior","url":"https://www.academia.edu/Documents/in/Cyberpsychology_and_Behavior?f_ri=1580"},{"id":1003639,"name":"Bone Lengthening","url":"https://www.academia.edu/Documents/in/Bone_Lengthening?f_ri=1580"},{"id":1144215,"name":"Lower Extremity","url":"https://www.academia.edu/Documents/in/Lower_Extremity?f_ri=1580"},{"id":1262481,"name":"Pain Measurement","url":"https://www.academia.edu/Documents/in/Pain_Measurement?f_ri=1580"},{"id":1660928,"name":"Pain Modulation","url":"https://www.academia.edu/Documents/in/Pain_Modulation?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36236262" data-work_id="36236262" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36236262/Internet_Research_Individualism_and_internet_addiction_the_mediating_role_of_psychological_needs_Article_information">Internet Research Individualism and internet addiction: the mediating role of psychological needs Article information</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36236262" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="c592ca35aab17734bf5e0ca333f9cdde" rel="nofollow" data-download="{&quot;attachment_id&quot;:56140156,&quot;asset_id&quot;:36236262,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56140156/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="46115852" href="https://independent.academia.edu/iarpaci">Prof. Ibrahim ARPACI</a><script data-card-contents-for-user="46115852" type="text/json">{"id":46115852,"first_name":"Prof. Ibrahim","last_name":"ARPACI","domain_name":"independent","page_name":"iarpaci","display_name":"Prof. Ibrahim ARPACI","profile_url":"https://independent.academia.edu/iarpaci?f_ri=1580","photo":"https://0.academia-photos.com/46115852/19121798/52158666/s65_assoc._prof._ibrahim.arpaci.png"}</script></span></span></li><li class="js-paper-rank-work_36236262 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36236262"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36236262, container: ".js-paper-rank-work_36236262", }); });</script></li><li class="js-percentile-work_36236262 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36236262; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36236262"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36236262 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36236262"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36236262; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36236262]").text(description); $(".js-view-count-work_36236262").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36236262").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36236262"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="166" href="https://www.academia.edu/Documents/in/Phycology">Phycology</a>,&nbsp;<script data-card-contents-for-ri="166" type="text/json">{"id":166,"name":"Phycology","url":"https://www.academia.edu/Documents/in/Phycology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7125" href="https://www.academia.edu/Documents/in/Culture">Culture</a>,&nbsp;<script data-card-contents-for-ri="7125" type="text/json">{"id":7125,"name":"Culture","url":"https://www.academia.edu/Documents/in/Culture?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="23534" href="https://www.academia.edu/Documents/in/Individualism">Individualism</a><script data-card-contents-for-ri="23534" type="text/json">{"id":23534,"name":"Individualism","url":"https://www.academia.edu/Documents/in/Individualism?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36236262]'), work: {"id":36236262,"title":"Internet Research Individualism and internet addiction: the mediating role of psychological needs Article information","created_at":"2018-03-23T04:01:53.004-07:00","url":"https://www.academia.edu/36236262/Internet_Research_Individualism_and_internet_addiction_the_mediating_role_of_psychological_needs_Article_information?f_ri=1580","dom_id":"work_36236262","summary":null,"downloadable_attachments":[{"id":56140156,"asset_id":36236262,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":46115852,"first_name":"Prof. Ibrahim","last_name":"ARPACI","domain_name":"independent","page_name":"iarpaci","display_name":"Prof. Ibrahim ARPACI","profile_url":"https://independent.academia.edu/iarpaci?f_ri=1580","photo":"https://0.academia-photos.com/46115852/19121798/52158666/s65_assoc._prof._ibrahim.arpaci.png"}],"research_interests":[{"id":166,"name":"Phycology","url":"https://www.academia.edu/Documents/in/Phycology?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":7125,"name":"Culture","url":"https://www.academia.edu/Documents/in/Culture?f_ri=1580","nofollow":false},{"id":23534,"name":"Individualism","url":"https://www.academia.edu/Documents/in/Individualism?f_ri=1580","nofollow":false},{"id":59533,"name":"Internet Addiction","url":"https://www.academia.edu/Documents/in/Internet_Addiction?f_ri=1580"},{"id":826840,"name":"Human Needs","url":"https://www.academia.edu/Documents/in/Human_Needs?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_10072181" data-work_id="10072181" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/10072181/%D0%92%D0%BE%D0%B7%D0%B4%D0%B5%D0%B9%D1%81%D1%82%D0%B2%D0%B8%D0%B5_%D1%81%D0%BE%D0%B2%D1%80%D0%B5%D0%BC%D0%B5%D0%BD%D0%BD%D0%BE%D0%B9_%D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D0%BE%D0%B9_%D0%B8_%D0%BC%D0%B5%D0%B4%D0%B8%D0%B0%D1%81%D1%80%D0%B5%D0%B4%D1%8B_%D0%BD%D0%B0_%D0%BE%D0%B1%D1%80%D0%B0%D0%B7_%D0%AF_%D0%BF%D0%BE%D0%B4%D1%80%D0%BE%D1%81%D1%82%D0%BA%D0%BE%D0%B2">Воздействие современной информационной и медиасреды на «образ Я» подростков</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/10072181" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f40ff8e2dfdc34363ded38de12fe5462" rel="nofollow" data-download="{&quot;attachment_id&quot;:36198530,&quot;asset_id&quot;:10072181,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/36198530/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="4762676" href="https://herzen-spb.academia.edu/Bogdanovskaya">Irina Bogdanovskaya</a><script data-card-contents-for-user="4762676" type="text/json">{"id":4762676,"first_name":"Irina","last_name":"Bogdanovskaya","domain_name":"herzen-spb","page_name":"Bogdanovskaya","display_name":"Irina Bogdanovskaya","profile_url":"https://herzen-spb.academia.edu/Bogdanovskaya?f_ri=1580","photo":"https://0.academia-photos.com/4762676/2022255/7384004/s65_irina.bogdanovskaya.jpg"}</script></span></span></li><li class="js-paper-rank-work_10072181 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="10072181"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 10072181, container: ".js-paper-rank-work_10072181", }); });</script></li><li class="js-percentile-work_10072181 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 10072181; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_10072181"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_10072181 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="10072181"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 10072181; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=10072181]").text(description); $(".js-view-count-work_10072181").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_10072181").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="10072181"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a><script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=10072181]'), work: {"id":10072181,"title":"Воздействие современной информационной и медиасреды на «образ Я» подростков","created_at":"2015-01-08T07:49:20.406-08:00","url":"https://www.academia.edu/10072181/%D0%92%D0%BE%D0%B7%D0%B4%D0%B5%D0%B9%D1%81%D1%82%D0%B2%D0%B8%D0%B5_%D1%81%D0%BE%D0%B2%D1%80%D0%B5%D0%BC%D0%B5%D0%BD%D0%BD%D0%BE%D0%B9_%D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D0%BE%D0%B9_%D0%B8_%D0%BC%D0%B5%D0%B4%D0%B8%D0%B0%D1%81%D1%80%D0%B5%D0%B4%D1%8B_%D0%BD%D0%B0_%D0%BE%D0%B1%D1%80%D0%B0%D0%B7_%D0%AF_%D0%BF%D0%BE%D0%B4%D1%80%D0%BE%D1%81%D1%82%D0%BA%D0%BE%D0%B2?f_ri=1580","dom_id":"work_10072181","summary":null,"downloadable_attachments":[{"id":36198530,"asset_id":10072181,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":4762676,"first_name":"Irina","last_name":"Bogdanovskaya","domain_name":"herzen-spb","page_name":"Bogdanovskaya","display_name":"Irina Bogdanovskaya","profile_url":"https://herzen-spb.academia.edu/Bogdanovskaya?f_ri=1580","photo":"https://0.academia-photos.com/4762676/2022255/7384004/s65_irina.bogdanovskaya.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_9951825" data-work_id="9951825" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/9951825/Griffiths_M_D_2015_Problematic_technology_use_during_adolescence_Why_don_t_teenagers_seek_treatment_Education_and_Health_33_6_9">Griffiths, M.D. (2015). Problematic technology use during adolescence: Why don’t teenagers seek treatment? Education and Health, 33, 6-9.</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In recent issues of Education and Health, I have briefly reviewed the empirical evidence relating to problematic use of technology by adolescents including online video gaming, social networking, and mobile phone use. Most of the research... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_9951825" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In recent issues of Education and Health, I have briefly reviewed the empirical evidence relating to problematic use of technology by adolescents including online video gaming, social networking, and mobile phone use. Most of the research studies that have examined ‘technological addictions’ during adolescence have indicated that a small but significant minority experience severe problems resulting in detriments to education, physical fitness, psychological wellbeing, and family and personal relationships. Given these findings, why is it that so few teenagers seek treatment? This article briefly outlines a number of reasons why this might be the case by examining other literature on adolescent drug use and adolescent gambling. Three different types of explanation are discussed: (i) treatment-specific explanations, (ii) research-related explanations, and (iii) developmental and peer group explanations.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/9951825" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="399e5846d2f932a38a7e19f133b29fab" rel="nofollow" data-download="{&quot;attachment_id&quot;:36912204,&quot;asset_id&quot;:9951825,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/36912204/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="320455" href="https://nottinghamtrent.academia.edu/MarkGriffiths">Mark D Griffiths</a><script data-card-contents-for-user="320455" type="text/json">{"id":320455,"first_name":"Mark","last_name":"Griffiths","domain_name":"nottinghamtrent","page_name":"MarkGriffiths","display_name":"Mark D Griffiths","profile_url":"https://nottinghamtrent.academia.edu/MarkGriffiths?f_ri=1580","photo":"https://0.academia-photos.com/320455/79042/86543/s65_mark.griffiths.jpg"}</script></span></span></li><li class="js-paper-rank-work_9951825 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="9951825"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 9951825, container: ".js-paper-rank-work_9951825", }); });</script></li><li class="js-percentile-work_9951825 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 9951825; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_9951825"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_9951825 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="9951825"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 9951825; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=9951825]").text(description); $(".js-view-count-work_9951825").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_9951825").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="9951825"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">5</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2483" href="https://www.academia.edu/Documents/in/Addiction">Addiction</a>,&nbsp;<script data-card-contents-for-ri="2483" type="text/json">{"id":2483,"name":"Addiction","url":"https://www.academia.edu/Documents/in/Addiction?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5199" href="https://www.academia.edu/Documents/in/Video_Games">Video Games</a>,&nbsp;<script data-card-contents-for-ri="5199" type="text/json">{"id":5199,"name":"Video Games","url":"https://www.academia.edu/Documents/in/Video_Games?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="18390" href="https://www.academia.edu/Documents/in/Mobile_Phones">Mobile Phones</a><script data-card-contents-for-ri="18390" type="text/json">{"id":18390,"name":"Mobile Phones","url":"https://www.academia.edu/Documents/in/Mobile_Phones?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=9951825]'), work: {"id":9951825,"title":"Griffiths, M.D. (2015). Problematic technology use during adolescence: Why don’t teenagers seek treatment? Education and Health, 33, 6-9.","created_at":"2014-12-30T04:35:21.709-08:00","url":"https://www.academia.edu/9951825/Griffiths_M_D_2015_Problematic_technology_use_during_adolescence_Why_don_t_teenagers_seek_treatment_Education_and_Health_33_6_9?f_ri=1580","dom_id":"work_9951825","summary":"In recent issues of Education and Health, I have briefly reviewed the empirical evidence relating to problematic use of technology by adolescents including online video gaming, social networking, and mobile phone use. Most of the research studies that have examined ‘technological addictions’ during adolescence have indicated that a small but significant minority experience severe problems resulting in detriments to education, physical fitness, psychological wellbeing, and family and personal relationships. Given these findings, why is it that so few teenagers seek treatment? This article briefly outlines a number of reasons why this might be the case by examining other literature on adolescent drug use and adolescent gambling. Three different types of explanation are discussed: (i) treatment-specific explanations, (ii) research-related explanations, and (iii) developmental and peer group explanations.","downloadable_attachments":[{"id":36912204,"asset_id":9951825,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":320455,"first_name":"Mark","last_name":"Griffiths","domain_name":"nottinghamtrent","page_name":"MarkGriffiths","display_name":"Mark D Griffiths","profile_url":"https://nottinghamtrent.academia.edu/MarkGriffiths?f_ri=1580","photo":"https://0.academia-photos.com/320455/79042/86543/s65_mark.griffiths.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":2483,"name":"Addiction","url":"https://www.academia.edu/Documents/in/Addiction?f_ri=1580","nofollow":false},{"id":5199,"name":"Video Games","url":"https://www.academia.edu/Documents/in/Video_Games?f_ri=1580","nofollow":false},{"id":18390,"name":"Mobile Phones","url":"https://www.academia.edu/Documents/in/Mobile_Phones?f_ri=1580","nofollow":false},{"id":59533,"name":"Internet Addiction","url":"https://www.academia.edu/Documents/in/Internet_Addiction?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_886919" data-work_id="886919" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/886919/Griffiths_M_D_2010_Foreword_In_R_Van_Cleave_Unplugged_My_Journey_into_the_Dark_World_of_Video_Game_Addiction_pp_v_x_Florida_HCI_Books">Griffiths, M.D. (2010). Foreword. In R. Van Cleave, Unplugged: My Journey into the Dark World of Video Game Addiction. pp. v-x. Florida: HCI Books.</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/886919" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="fa4ebdd4613983bc4cb963ea65cbb5fb" rel="nofollow" data-download="{&quot;attachment_id&quot;:5354581,&quot;asset_id&quot;:886919,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/5354581/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="320455" href="https://nottinghamtrent.academia.edu/MarkGriffiths">Mark D Griffiths</a><script data-card-contents-for-user="320455" type="text/json">{"id":320455,"first_name":"Mark","last_name":"Griffiths","domain_name":"nottinghamtrent","page_name":"MarkGriffiths","display_name":"Mark D Griffiths","profile_url":"https://nottinghamtrent.academia.edu/MarkGriffiths?f_ri=1580","photo":"https://0.academia-photos.com/320455/79042/86543/s65_mark.griffiths.jpg"}</script></span></span></li><li class="js-paper-rank-work_886919 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="886919"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 886919, container: ".js-paper-rank-work_886919", }); });</script></li><li class="js-percentile-work_886919 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 886919; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_886919"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_886919 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="886919"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 886919; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=886919]").text(description); $(".js-view-count-work_886919").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_886919").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="886919"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2483" href="https://www.academia.edu/Documents/in/Addiction">Addiction</a>,&nbsp;<script data-card-contents-for-ri="2483" type="text/json">{"id":2483,"name":"Addiction","url":"https://www.academia.edu/Documents/in/Addiction?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5199" href="https://www.academia.edu/Documents/in/Video_Games">Video Games</a><script data-card-contents-for-ri="5199" type="text/json">{"id":5199,"name":"Video Games","url":"https://www.academia.edu/Documents/in/Video_Games?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=886919]'), work: {"id":886919,"title":"Griffiths, M.D. (2010). Foreword. In R. Van Cleave, Unplugged: My Journey into the Dark World of Video Game Addiction. pp. v-x. Florida: HCI Books.","created_at":"2011-09-05T00:18:23.277-07:00","url":"https://www.academia.edu/886919/Griffiths_M_D_2010_Foreword_In_R_Van_Cleave_Unplugged_My_Journey_into_the_Dark_World_of_Video_Game_Addiction_pp_v_x_Florida_HCI_Books?f_ri=1580","dom_id":"work_886919","summary":null,"downloadable_attachments":[{"id":5354581,"asset_id":886919,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":320455,"first_name":"Mark","last_name":"Griffiths","domain_name":"nottinghamtrent","page_name":"MarkGriffiths","display_name":"Mark D Griffiths","profile_url":"https://nottinghamtrent.academia.edu/MarkGriffiths?f_ri=1580","photo":"https://0.academia-photos.com/320455/79042/86543/s65_mark.griffiths.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":2483,"name":"Addiction","url":"https://www.academia.edu/Documents/in/Addiction?f_ri=1580","nofollow":false},{"id":5199,"name":"Video Games","url":"https://www.academia.edu/Documents/in/Video_Games?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_70389133" data-work_id="70389133" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/70389133/An_exploratory_study_on_new_technology_and_associated_psychosocial_risks_in_adolescents_can_digital_media_literacy_programmes_make_a_difference">An exploratory study on new technology and associated psychosocial risks in adolescents : can digital media literacy programmes make a difference</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/70389133" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="7353610dc5b411a418ca2934fbdab84a" rel="nofollow" data-download="{&quot;attachment_id&quot;:80163283,&quot;asset_id&quot;:70389133,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/80163283/download_file?st=MTczMjgxNzI4NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="12951186" href="https://independent.academia.edu/PetrovanderMerwe">Petro van der Merwe</a><script data-card-contents-for-user="12951186" type="text/json">{"id":12951186,"first_name":"Petro","last_name":"van der Merwe","domain_name":"independent","page_name":"PetrovanderMerwe","display_name":"Petro van der Merwe","profile_url":"https://independent.academia.edu/PetrovanderMerwe?f_ri=1580","photo":"https://0.academia-photos.com/12951186/77055848/65588211/s65_petro.van_der_merwe.png"}</script></span></span></li><li class="js-paper-rank-work_70389133 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="70389133"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 70389133, container: ".js-paper-rank-work_70389133", }); });</script></li><li class="js-percentile-work_70389133 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 70389133; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_70389133"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_70389133 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="70389133"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 70389133; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=70389133]").text(description); $(".js-view-count-work_70389133").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_70389133").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="70389133"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>,&nbsp;<script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1191356" href="https://www.academia.edu/Documents/in/Internet">Internet</a><script data-card-contents-for-ri="1191356" type="text/json">{"id":1191356,"name":"Internet","url":"https://www.academia.edu/Documents/in/Internet?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=70389133]'), work: {"id":70389133,"title":"An exploratory study on new technology and associated psychosocial risks in adolescents : can digital media literacy programmes make a difference","created_at":"2022-02-04T01:28:19.950-08:00","url":"https://www.academia.edu/70389133/An_exploratory_study_on_new_technology_and_associated_psychosocial_risks_in_adolescents_can_digital_media_literacy_programmes_make_a_difference?f_ri=1580","dom_id":"work_70389133","summary":null,"downloadable_attachments":[{"id":80163283,"asset_id":70389133,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":12951186,"first_name":"Petro","last_name":"van der Merwe","domain_name":"independent","page_name":"PetrovanderMerwe","display_name":"Petro van der Merwe","profile_url":"https://independent.academia.edu/PetrovanderMerwe?f_ri=1580","photo":"https://0.academia-photos.com/12951186/77055848/65588211/s65_petro.van_der_merwe.png"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=1580","nofollow":false},{"id":1191356,"name":"Internet","url":"https://www.academia.edu/Documents/in/Internet?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37536271" data-work_id="37536271" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37536271/RECENZJA_Marek_G%C3%B3rka_red_Cyberbezpiecze%C5%84stwo_dzieci_i_m%C5%82odzie%C5%BCy_Realny_i_wirtualny_problem_polityki_bezpiecze%C5%84stwa_Wydawnictwo_Difin_Warszawa_2017">RECENZJA: Marek Górka (red.), Cyberbezpieczeństwo dzieci i młodzieży. Realny i wirtualny problem polityki bezpieczeństwa, Wydawnictwo Difin, Warszawa 2017</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37536271" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="8d2c491e0a8df18bea720d71cf63f068" rel="nofollow" data-download="{&quot;attachment_id&quot;:57510281,&quot;asset_id&quot;:37536271,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57510281/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="43976891" href="https://uni-wroc.academia.edu/MarcinAdamczyk">Marcin Adamczyk</a><script data-card-contents-for-user="43976891" type="text/json">{"id":43976891,"first_name":"Marcin","last_name":"Adamczyk","domain_name":"uni-wroc","page_name":"MarcinAdamczyk","display_name":"Marcin Adamczyk","profile_url":"https://uni-wroc.academia.edu/MarcinAdamczyk?f_ri=1580","photo":"https://0.academia-photos.com/43976891/11728642/148938207/s65_marcin.adamczyk.jpg"}</script></span></span></li><li class="js-paper-rank-work_37536271 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37536271"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37536271, container: ".js-paper-rank-work_37536271", }); });</script></li><li class="js-percentile-work_37536271 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37536271; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37536271"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37536271 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37536271"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37536271; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37536271]").text(description); $(".js-view-count-work_37536271").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37536271").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37536271"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">14</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2511" href="https://www.academia.edu/Documents/in/Cybercrimes">Cybercrimes</a>,&nbsp;<script data-card-contents-for-ri="2511" type="text/json">{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="9491" href="https://www.academia.edu/Documents/in/Pedagogy">Pedagogy</a>,&nbsp;<script data-card-contents-for-ri="9491" type="text/json">{"id":9491,"name":"Pedagogy","url":"https://www.academia.edu/Documents/in/Pedagogy?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="12756" href="https://www.academia.edu/Documents/in/Cyberbullying">Cyberbullying</a><script data-card-contents-for-ri="12756" type="text/json">{"id":12756,"name":"Cyberbullying","url":"https://www.academia.edu/Documents/in/Cyberbullying?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37536271]'), work: {"id":37536271,"title":"RECENZJA: Marek Górka (red.), Cyberbezpieczeństwo dzieci i młodzieży. Realny i wirtualny problem polityki bezpieczeństwa, Wydawnictwo Difin, Warszawa 2017","created_at":"2018-10-05T08:32:34.587-07:00","url":"https://www.academia.edu/37536271/RECENZJA_Marek_G%C3%B3rka_red_Cyberbezpiecze%C5%84stwo_dzieci_i_m%C5%82odzie%C5%BCy_Realny_i_wirtualny_problem_polityki_bezpiecze%C5%84stwa_Wydawnictwo_Difin_Warszawa_2017?f_ri=1580","dom_id":"work_37536271","summary":null,"downloadable_attachments":[{"id":57510281,"asset_id":37536271,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":43976891,"first_name":"Marcin","last_name":"Adamczyk","domain_name":"uni-wroc","page_name":"MarcinAdamczyk","display_name":"Marcin Adamczyk","profile_url":"https://uni-wroc.academia.edu/MarcinAdamczyk?f_ri=1580","photo":"https://0.academia-photos.com/43976891/11728642/148938207/s65_marcin.adamczyk.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=1580","nofollow":false},{"id":9491,"name":"Pedagogy","url":"https://www.academia.edu/Documents/in/Pedagogy?f_ri=1580","nofollow":false},{"id":12756,"name":"Cyberbullying","url":"https://www.academia.edu/Documents/in/Cyberbullying?f_ri=1580","nofollow":false},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=1580"},{"id":29128,"name":"Cybercultures","url":"https://www.academia.edu/Documents/in/Cybercultures?f_ri=1580"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=1580"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=1580"},{"id":48523,"name":"Book Reviews","url":"https://www.academia.edu/Documents/in/Book_Reviews?f_ri=1580"},{"id":96546,"name":"Cyber Law","url":"https://www.academia.edu/Documents/in/Cyber_Law?f_ri=1580"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=1580"},{"id":147412,"name":"Pedagogia","url":"https://www.academia.edu/Documents/in/Pedagogia?f_ri=1580"},{"id":1036283,"name":"School Bullying and Cyberbullying Among Adolescents","url":"https://www.academia.edu/Documents/in/School_Bullying_and_Cyberbullying_Among_Adolescents?f_ri=1580"},{"id":2420447,"name":"Cyberbezpieczeństwo","url":"https://www.academia.edu/Documents/in/Cyberbezpiecze%C5%84stwo?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_3658373" data-work_id="3658373" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/3658373/Myths_and_Realities_of_Online_Clinical_Work">Myths and Realities of Online Clinical Work</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/3658373" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="7b17e4966ecdd16c7074648bec8c841c" rel="nofollow" data-download="{&quot;attachment_id&quot;:31350567,&quot;asset_id&quot;:3658373,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/31350567/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="4443509" href="https://rider.academia.edu/johnsulercom">John Suler</a><script data-card-contents-for-user="4443509" type="text/json">{"id":4443509,"first_name":"John","last_name":"Suler","domain_name":"rider","page_name":"johnsulercom","display_name":"John Suler","profile_url":"https://rider.academia.edu/johnsulercom?f_ri=1580","photo":"https://0.academia-photos.com/4443509/1814504/2161613/s65_john.suler.jpg"}</script></span></span></li><li class="js-paper-rank-work_3658373 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="3658373"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 3658373, container: ".js-paper-rank-work_3658373", }); });</script></li><li class="js-percentile-work_3658373 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 3658373; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_3658373"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_3658373 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="3658373"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 3658373; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=3658373]").text(description); $(".js-view-count-work_3658373").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_3658373").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="3658373"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">20</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="635" href="https://www.academia.edu/Documents/in/Psychiatry">Psychiatry</a><script data-card-contents-for-ri="635" type="text/json">{"id":635,"name":"Psychiatry","url":"https://www.academia.edu/Documents/in/Psychiatry?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=3658373]'), work: {"id":3658373,"title":"Myths and Realities of Online Clinical Work","created_at":"2013-06-05T04:09:54.210-07:00","url":"https://www.academia.edu/3658373/Myths_and_Realities_of_Online_Clinical_Work?f_ri=1580","dom_id":"work_3658373","summary":null,"downloadable_attachments":[{"id":31350567,"asset_id":3658373,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":4443509,"first_name":"John","last_name":"Suler","domain_name":"rider","page_name":"johnsulercom","display_name":"John Suler","profile_url":"https://rider.academia.edu/johnsulercom?f_ri=1580","photo":"https://0.academia-photos.com/4443509/1814504/2161613/s65_john.suler.jpg"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":635,"name":"Psychiatry","url":"https://www.academia.edu/Documents/in/Psychiatry?f_ri=1580","nofollow":false},{"id":814,"name":"Ethics","url":"https://www.academia.edu/Documents/in/Ethics?f_ri=1580"},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580"},{"id":2827,"name":"Mental Health","url":"https://www.academia.edu/Documents/in/Mental_Health?f_ri=1580"},{"id":7125,"name":"Culture","url":"https://www.academia.edu/Documents/in/Culture?f_ri=1580"},{"id":37753,"name":"Teaching","url":"https://www.academia.edu/Documents/in/Teaching?f_ri=1580"},{"id":37905,"name":"Counseling","url":"https://www.academia.edu/Documents/in/Counseling?f_ri=1580"},{"id":52836,"name":"Clinical Practice","url":"https://www.academia.edu/Documents/in/Clinical_Practice?f_ri=1580"},{"id":96047,"name":"Case Study","url":"https://www.academia.edu/Documents/in/Case_Study?f_ri=1580"},{"id":255094,"name":"Computer User Interface Design","url":"https://www.academia.edu/Documents/in/Computer_User_Interface_Design?f_ri=1580"},{"id":411275,"name":"Ethical Issues","url":"https://www.academia.edu/Documents/in/Ethical_Issues?f_ri=1580"},{"id":477960,"name":"Psychology on the inernet","url":"https://www.academia.edu/Documents/in/Psychology_on_the_inernet?f_ri=1580"},{"id":477961,"name":"Psychology on the Internet","url":"https://www.academia.edu/Documents/in/Psychology_on_the_Internet?f_ri=1580"},{"id":477962,"name":"Online Psychotherapy","url":"https://www.academia.edu/Documents/in/Online_Psychotherapy?f_ri=1580"},{"id":477963,"name":"Therapy on the Web","url":"https://www.academia.edu/Documents/in/Therapy_on_the_Web?f_ri=1580"},{"id":855798,"name":"Cyberpsychology \u0026 Behavior","url":"https://www.academia.edu/Documents/in/Cyberpsychology_and_Behavior?f_ri=1580"},{"id":1191356,"name":"Internet","url":"https://www.academia.edu/Documents/in/Internet?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_1209526" data-work_id="1209526" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/1209526/Civil_discourse_in_the_age_of_social_media">Civil discourse in the age of social media</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">For centuries, issues of civil discourse only arose concerning written and oral communication. but now, new technologies for communication and social interaction, particularly social media, have dramatically expanded the potential for... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_1209526" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">For centuries, issues of civil discourse only arose concerning written and oral communication. but now, new technologies for communication and social interaction, particularly social media, have dramatically expanded the potential for human interaction. they generate significant challenges for institutional policies and practices to encourage and sustain civil discourse for the critical social and personal issues we and our students face. to address this challenge, we review emerging trends in social media, discuss problems that arise with their use, and provide recommendations for helping students use social media in civil and productive ways.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/1209526" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="cf576894576652c3ccb1daa6b855f31b" rel="nofollow" data-download="{&quot;attachment_id&quot;:7522070,&quot;asset_id&quot;:1209526,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/7522070/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="341109" href="https://harvard.academia.edu/ReynolJunco">Reynol Junco</a><script data-card-contents-for-user="341109" type="text/json">{"id":341109,"first_name":"Reynol","last_name":"Junco","domain_name":"harvard","page_name":"ReynolJunco","display_name":"Reynol Junco","profile_url":"https://harvard.academia.edu/ReynolJunco?f_ri=1580","photo":"https://0.academia-photos.com/341109/386621/19834762/s65_reynol.junco.jpg"}</script></span></span></li><li class="js-paper-rank-work_1209526 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="1209526"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 1209526, container: ".js-paper-rank-work_1209526", }); });</script></li><li class="js-percentile-work_1209526 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 1209526; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_1209526"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_1209526 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="1209526"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 1209526; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=1209526]").text(description); $(".js-view-count-work_1209526").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_1209526").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="1209526"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">8</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1003" href="https://www.academia.edu/Documents/in/Educational_Technology">Educational Technology</a>,&nbsp;<script data-card-contents-for-ri="1003" type="text/json">{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="9200" href="https://www.academia.edu/Documents/in/Science_Technology_and_Society">Science, Technology and Society</a>,&nbsp;<script data-card-contents-for-ri="9200" type="text/json">{"id":9200,"name":"Science, Technology and Society","url":"https://www.academia.edu/Documents/in/Science_Technology_and_Society?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="9246" href="https://www.academia.edu/Documents/in/Social_Media">Social Media</a><script data-card-contents-for-ri="9246" type="text/json">{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=1209526]'), work: {"id":1209526,"title":"Civil discourse in the age of social media","created_at":"2012-01-09T03:40:05.415-08:00","url":"https://www.academia.edu/1209526/Civil_discourse_in_the_age_of_social_media?f_ri=1580","dom_id":"work_1209526","summary":"For centuries, issues of civil discourse only arose concerning written and oral communication. but now, new technologies for communication and social interaction, particularly social media, have dramatically expanded the potential for human interaction. they generate significant challenges for institutional policies and practices to encourage and sustain civil discourse for the critical social and personal issues we and our students face. to address this challenge, we review emerging trends in social media, discuss problems that arise with their use, and provide recommendations for helping students use social media in civil and productive ways.","downloadable_attachments":[{"id":7522070,"asset_id":1209526,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":341109,"first_name":"Reynol","last_name":"Junco","domain_name":"harvard","page_name":"ReynolJunco","display_name":"Reynol Junco","profile_url":"https://harvard.academia.edu/ReynolJunco?f_ri=1580","photo":"https://0.academia-photos.com/341109/386621/19834762/s65_reynol.junco.jpg"}],"research_interests":[{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":9200,"name":"Science, Technology and Society","url":"https://www.academia.edu/Documents/in/Science_Technology_and_Society?f_ri=1580","nofollow":false},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=1580","nofollow":false},{"id":10666,"name":"Bullying","url":"https://www.academia.edu/Documents/in/Bullying?f_ri=1580"},{"id":12756,"name":"Cyberbullying","url":"https://www.academia.edu/Documents/in/Cyberbullying?f_ri=1580"},{"id":13872,"name":"Facebook","url":"https://www.academia.edu/Documents/in/Facebook?f_ri=1580"},{"id":355676,"name":"Civil Discourse","url":"https://www.academia.edu/Documents/in/Civil_Discourse?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_67748318 coauthored" data-work_id="67748318" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/67748318/Collaborative_Immersive_Virtual_Environments_for_Education_in_Geography">Collaborative Immersive Virtual Environments for Education in Geography</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Immersive virtual reality (iVR) devices are rapidly becoming an important part of our lives and forming a new way for people to interact with computers and each other. The impact and consequences of this innovative technology have not yet... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_67748318" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Immersive virtual reality (iVR) devices are rapidly becoming an important part of our lives and forming a new way for people to interact with computers and each other. The impact and consequences of this innovative technology have not yet been satisfactory explored. This empirical study investigated the cognitive and social aspects of collaboration in a shared, immersive virtual reality. A unique application for implementing a collaborative immersive virtual environment (CIVE) was developed by our interdisciplinary team as a software solution for educational purposes, with two scenarios for learning about hypsography, i.e., explanations of contour line principles. Both scenarios allow switching between a usual 2D contour map and a 3D model of the corresponding terrain to increase the intelligibility and clarity of the educational content. Gamification principles were also applied to both scenarios to augment user engagement during the completion of tasks. A qualitative research appr...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/67748318" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="91d2d12c20db20271b557f1c8b708caa" rel="nofollow" data-download="{&quot;attachment_id&quot;:78461781,&quot;asset_id&quot;:67748318,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/78461781/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="42731918" href="https://muni.academia.edu/LHerman">L. Herman</a><script data-card-contents-for-user="42731918" type="text/json">{"id":42731918,"first_name":"L.","last_name":"Herman","domain_name":"muni","page_name":"LHerman","display_name":"L. Herman","profile_url":"https://muni.academia.edu/LHerman?f_ri=1580","photo":"/images/s65_no_pic.png"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-67748318">+1</span><div class="hidden js-additional-users-67748318"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://nudz.academia.edu/MichalSedl%C3%A1k">Michal Sedlák</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-67748318'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-67748318').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_67748318 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="67748318"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 67748318, container: ".js-paper-rank-work_67748318", }); });</script></li><li class="js-percentile-work_67748318 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 67748318; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_67748318"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_67748318 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="67748318"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 67748318; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=67748318]").text(description); $(".js-view-count-work_67748318").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_67748318").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="67748318"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">13</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a>,&nbsp;<script data-card-contents-for-ri="422" type="text/json">{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="472" href="https://www.academia.edu/Documents/in/Human_Computer_Interaction">Human Computer Interaction</a>,&nbsp;<script data-card-contents-for-ri="472" type="text/json">{"id":472,"name":"Human Computer Interaction","url":"https://www.academia.edu/Documents/in/Human_Computer_Interaction?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="16972" href="https://www.academia.edu/Documents/in/Telepresence">Telepresence</a><script data-card-contents-for-ri="16972" type="text/json">{"id":16972,"name":"Telepresence","url":"https://www.academia.edu/Documents/in/Telepresence?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=67748318]'), work: {"id":67748318,"title":"Collaborative Immersive Virtual Environments for Education in Geography","created_at":"2022-01-10T06:07:32.292-08:00","url":"https://www.academia.edu/67748318/Collaborative_Immersive_Virtual_Environments_for_Education_in_Geography?f_ri=1580","dom_id":"work_67748318","summary":"Immersive virtual reality (iVR) devices are rapidly becoming an important part of our lives and forming a new way for people to interact with computers and each other. The impact and consequences of this innovative technology have not yet been satisfactory explored. This empirical study investigated the cognitive and social aspects of collaboration in a shared, immersive virtual reality. A unique application for implementing a collaborative immersive virtual environment (CIVE) was developed by our interdisciplinary team as a software solution for educational purposes, with two scenarios for learning about hypsography, i.e., explanations of contour line principles. Both scenarios allow switching between a usual 2D contour map and a 3D model of the corresponding terrain to increase the intelligibility and clarity of the educational content. Gamification principles were also applied to both scenarios to augment user engagement during the completion of tasks. A qualitative research appr...","downloadable_attachments":[{"id":78461781,"asset_id":67748318,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":42731918,"first_name":"L.","last_name":"Herman","domain_name":"muni","page_name":"LHerman","display_name":"L. Herman","profile_url":"https://muni.academia.edu/LHerman?f_ri=1580","photo":"/images/s65_no_pic.png"},{"id":43332598,"first_name":"Michal","last_name":"Sedlák","domain_name":"nudz","page_name":"MichalSedlák","display_name":"Michal Sedlák","profile_url":"https://nudz.academia.edu/MichalSedl%C3%A1k?f_ri=1580","photo":"https://0.academia-photos.com/43332598/12147161/117396378/s65_michal.sedl_k.jpg"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=1580","nofollow":false},{"id":472,"name":"Human Computer Interaction","url":"https://www.academia.edu/Documents/in/Human_Computer_Interaction?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":16972,"name":"Telepresence","url":"https://www.academia.edu/Documents/in/Telepresence?f_ri=1580","nofollow":false},{"id":35254,"name":"Collaborative Learning","url":"https://www.academia.edu/Documents/in/Collaborative_Learning?f_ri=1580"},{"id":51200,"name":"Immersion","url":"https://www.academia.edu/Documents/in/Immersion?f_ri=1580"},{"id":114642,"name":"Sense of Presence","url":"https://www.academia.edu/Documents/in/Sense_of_Presence?f_ri=1580"},{"id":535428,"name":"Immersive Virtual Reality","url":"https://www.academia.edu/Documents/in/Immersive_Virtual_Reality?f_ri=1580"},{"id":1407712,"name":"Head Mounted Display","url":"https://www.academia.edu/Documents/in/Head_Mounted_Display?f_ri=1580"},{"id":1464613,"name":"Map Literacy","url":"https://www.academia.edu/Documents/in/Map_Literacy?f_ri=1580"},{"id":3093334,"name":"collaborative immersive virtual environment","url":"https://www.academia.edu/Documents/in/collaborative_immersive_virtual_environment?f_ri=1580"},{"id":3093335,"name":"hypsography","url":"https://www.academia.edu/Documents/in/hypsography?f_ri=1580"},{"id":3093336,"name":" contour lines","url":"https://www.academia.edu/Documents/in/contour_lines?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_44763779" data-work_id="44763779" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/44763779/Psychology_of_Artificial_Intelligence_and_Virtual_Reality_Applications">Psychology of Artificial Intelligence and Virtual Reality Applications</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Studies on how people perceive themselves and those around them, how they can solve and control this complex structure are as old as human history. Especially since the last century, digital technologies have gained momentum to a great... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_44763779" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Studies on how people perceive themselves and those around them, how they can solve and control this complex structure are as old as human history. Especially since the last century, digital technologies have gained momentum to a great extent and are one of the most important factors in understanding this process more clearly. Among these factors, artificial intelligence technology and artificial intelligence psychology, which has started to be given importance as a result of a serious methodological transformation in the last quarter century, are studied. In studies conducted with the psychology and psychiatry disciplines related to the psychology of artificial intelligence, it is seen that virtual reality applications are widely used. Clinical psychology makes use of virtual reality applications significantly during psychotherapy sessions. It has been reported that psychiatric symptoms decreased from 15% to 67% after six months in psychotherapies where virtual reality applications are used regularly and effectively. Besides the contribution of virtual reality applications to psychotherapy , there are various side effects. These side effects include; headache, nausea and decrease in motor skills are the most common side effects. Virtual reality applications in psychotherapies to be used more widely and healthier side effects of minimum and controllable level is very important. Although artificial intelligence and virtual reality applications are not widely used methods and tools in our country, they contain elements that may cause various problems for countries with high socioeconomic level and high technology ready to move to Industry 4.0. With Industry 4.0, machines that have artificial intelligence technology will start to do jobs requiring physical labor, especially based on manpower. The availability of measures and interventions to address the problem of unemployment and employment as a result of this is a critical issue in preventing possible grievances. Artificial intelligence technology is a field that is growing and started to be used in many different fields with the contribution of other disciplines. Especially with the interdisciplinary research and applications to be carried out with the science of psychology, highly flexible and variable qualities such as emotion, culture and group dynamics which are among the important determinants of human psychology will be transferred to humanoid robots targeted by artificial intelligence. Keywords: Artificial intelligence; cyberpsychology; psychology of artificial intelligence; virtual reality</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/44763779" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="220091ba527f3ab3ba9601938a33767e" rel="nofollow" data-download="{&quot;attachment_id&quot;:65254809,&quot;asset_id&quot;:44763779,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/65254809/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="172927589" href="https://istanbul.academia.edu/gorkemderin">Görkem Derin</a><script data-card-contents-for-user="172927589" type="text/json">{"id":172927589,"first_name":"Görkem","last_name":"Derin","domain_name":"istanbul","page_name":"gorkemderin","display_name":"Görkem Derin","profile_url":"https://istanbul.academia.edu/gorkemderin?f_ri=1580","photo":"https://0.academia-photos.com/172927589/50374148/38390337/s65_g_rkem.deri_n.jpg"}</script></span></span></li><li class="js-paper-rank-work_44763779 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="44763779"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 44763779, container: ".js-paper-rank-work_44763779", }); });</script></li><li class="js-percentile-work_44763779 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44763779; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_44763779"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_44763779 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="44763779"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44763779; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44763779]").text(description); $(".js-view-count-work_44763779").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_44763779").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="44763779"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="465" href="https://www.academia.edu/Documents/in/Artificial_Intelligence">Artificial Intelligence</a>,&nbsp;<script data-card-contents-for-ri="465" type="text/json">{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="35686" href="https://www.academia.edu/Documents/in/Trauma">Trauma</a>,&nbsp;<script data-card-contents-for-ri="35686" type="text/json">{"id":35686,"name":"Trauma","url":"https://www.academia.edu/Documents/in/Trauma?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="50642" href="https://www.academia.edu/Documents/in/Virtual_Reality">Virtual Reality</a><script data-card-contents-for-ri="50642" type="text/json">{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=44763779]'), work: {"id":44763779,"title":"Psychology of Artificial Intelligence and Virtual Reality Applications","created_at":"2020-12-23T14:29:51.953-08:00","url":"https://www.academia.edu/44763779/Psychology_of_Artificial_Intelligence_and_Virtual_Reality_Applications?f_ri=1580","dom_id":"work_44763779","summary":"Studies on how people perceive themselves and those around them, how they can solve and control this complex structure are as old as human history. Especially since the last century, digital technologies have gained momentum to a great extent and are one of the most important factors in understanding this process more clearly. Among these factors, artificial intelligence technology and artificial intelligence psychology, which has started to be given importance as a result of a serious methodological transformation in the last quarter century, are studied. In studies conducted with the psychology and psychiatry disciplines related to the psychology of artificial intelligence, it is seen that virtual reality applications are widely used. Clinical psychology makes use of virtual reality applications significantly during psychotherapy sessions. It has been reported that psychiatric symptoms decreased from 15% to 67% after six months in psychotherapies where virtual reality applications are used regularly and effectively. Besides the contribution of virtual reality applications to psychotherapy , there are various side effects. These side effects include; headache, nausea and decrease in motor skills are the most common side effects. Virtual reality applications in psychotherapies to be used more widely and healthier side effects of minimum and controllable level is very important. Although artificial intelligence and virtual reality applications are not widely used methods and tools in our country, they contain elements that may cause various problems for countries with high socioeconomic level and high technology ready to move to Industry 4.0. With Industry 4.0, machines that have artificial intelligence technology will start to do jobs requiring physical labor, especially based on manpower. The availability of measures and interventions to address the problem of unemployment and employment as a result of this is a critical issue in preventing possible grievances. Artificial intelligence technology is a field that is growing and started to be used in many different fields with the contribution of other disciplines. Especially with the interdisciplinary research and applications to be carried out with the science of psychology, highly flexible and variable qualities such as emotion, culture and group dynamics which are among the important determinants of human psychology will be transferred to humanoid robots targeted by artificial intelligence. Keywords: Artificial intelligence; cyberpsychology; psychology of artificial intelligence; virtual reality","downloadable_attachments":[{"id":65254809,"asset_id":44763779,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":172927589,"first_name":"Görkem","last_name":"Derin","domain_name":"istanbul","page_name":"gorkemderin","display_name":"Görkem Derin","profile_url":"https://istanbul.academia.edu/gorkemderin?f_ri=1580","photo":"https://0.academia-photos.com/172927589/50374148/38390337/s65_g_rkem.deri_n.jpg"}],"research_interests":[{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":35686,"name":"Trauma","url":"https://www.academia.edu/Documents/in/Trauma?f_ri=1580","nofollow":false},{"id":50642,"name":"Virtual Reality","url":"https://www.academia.edu/Documents/in/Virtual_Reality?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_780693" data-work_id="780693" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/780693/Griffiths_M_D_2005_Remote_gambling_Psychosocial_aspects_In_Remote_Gambling_Westminster_eForum_Seminar_Series_pp_11_20_London_Westminster_Forum_Projects_Ltd">Griffiths, M.D. (2005). Remote gambling: Psychosocial aspects. In Remote Gambling (Westminster eForum Seminar Series), pp.11-20. London: Westminster Forum Projects Ltd.</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/780693" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="c53a2cd44b9104cca5f33bfbf5277fed" rel="nofollow" data-download="{&quot;attachment_id&quot;:4627212,&quot;asset_id&quot;:780693,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/4627212/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="320455" href="https://nottinghamtrent.academia.edu/MarkGriffiths">Mark D Griffiths</a><script data-card-contents-for-user="320455" type="text/json">{"id":320455,"first_name":"Mark","last_name":"Griffiths","domain_name":"nottinghamtrent","page_name":"MarkGriffiths","display_name":"Mark D Griffiths","profile_url":"https://nottinghamtrent.academia.edu/MarkGriffiths?f_ri=1580","photo":"https://0.academia-photos.com/320455/79042/86543/s65_mark.griffiths.jpg"}</script></span></span></li><li class="js-paper-rank-work_780693 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="780693"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 780693, container: ".js-paper-rank-work_780693", }); });</script></li><li class="js-percentile-work_780693 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 780693; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_780693"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_780693 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="780693"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 780693; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=780693]").text(description); $(".js-view-count-work_780693").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_780693").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="780693"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1759" href="https://www.academia.edu/Documents/in/Internet_Studies">Internet Studies</a>,&nbsp;<script data-card-contents-for-ri="1759" type="text/json">{"id":1759,"name":"Internet Studies","url":"https://www.academia.edu/Documents/in/Internet_Studies?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5223" href="https://www.academia.edu/Documents/in/Gambling_Studies">Gambling Studies</a><script data-card-contents-for-ri="5223" type="text/json">{"id":5223,"name":"Gambling Studies","url":"https://www.academia.edu/Documents/in/Gambling_Studies?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=780693]'), work: {"id":780693,"title":"Griffiths, M.D. (2005). Remote gambling: Psychosocial aspects. In Remote Gambling (Westminster eForum Seminar Series), pp.11-20. London: Westminster Forum Projects Ltd.","created_at":"2011-07-27T03:26:32.304-07:00","url":"https://www.academia.edu/780693/Griffiths_M_D_2005_Remote_gambling_Psychosocial_aspects_In_Remote_Gambling_Westminster_eForum_Seminar_Series_pp_11_20_London_Westminster_Forum_Projects_Ltd?f_ri=1580","dom_id":"work_780693","summary":null,"downloadable_attachments":[{"id":4627212,"asset_id":780693,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":320455,"first_name":"Mark","last_name":"Griffiths","domain_name":"nottinghamtrent","page_name":"MarkGriffiths","display_name":"Mark D Griffiths","profile_url":"https://nottinghamtrent.academia.edu/MarkGriffiths?f_ri=1580","photo":"https://0.academia-photos.com/320455/79042/86543/s65_mark.griffiths.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":1759,"name":"Internet Studies","url":"https://www.academia.edu/Documents/in/Internet_Studies?f_ri=1580","nofollow":false},{"id":5223,"name":"Gambling Studies","url":"https://www.academia.edu/Documents/in/Gambling_Studies?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_650890" data-work_id="650890" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/650890/Evolutionary_cyber_psychology_Applying_an_evolutionary_framework_to_Internet_behavior">Evolutionary cyber-psychology: Applying an evolutionary framework to Internet behavior</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">An evolutionary psychological perspective has much to offer the study of Internet behavior. However, cyber-psychologists have hitherto neglected this rich theoretical tradition and evolutionary psychologists have been slow to apply their... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_650890" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">An evolutionary psychological perspective has much to offer the study of Internet behavior. However, cyber-psychologists have hitherto neglected this rich theoretical tradition and evolutionary psychologists have been slow to apply their perspective to computer-mediated behavior. This paper applies an evolutionary perspective to the study of Internet behavior in four relevant domains: (1) mating and sexual competition, (2) parenting and kinship, (3) trust and social exchange, and (4) personal information management. Both general and specific evolutionary theories are explored in relation to online behavior in each domain, with an emphasis on generating testable hypotheses for future research.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/650890" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a9ed8633803c8ca04de0575c35fe922b" rel="nofollow" data-download="{&quot;attachment_id&quot;:51311693,&quot;asset_id&quot;:650890,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/51311693/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="175341" href="https://upenn.academia.edu/JaredPiazza">Jared Piazza</a><script data-card-contents-for-user="175341" type="text/json">{"id":175341,"first_name":"Jared","last_name":"Piazza","domain_name":"upenn","page_name":"JaredPiazza","display_name":"Jared Piazza","profile_url":"https://upenn.academia.edu/JaredPiazza?f_ri=1580","photo":"https://0.academia-photos.com/175341/161368/279892/s65_jared.piazza.jpg"}</script></span></span></li><li class="js-paper-rank-work_650890 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="650890"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 650890, container: ".js-paper-rank-work_650890", }); });</script></li><li class="js-percentile-work_650890 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 650890; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_650890"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_650890 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="650890"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 650890; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=650890]").text(description); $(".js-view-count-work_650890").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_650890").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="650890"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">2</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="255" href="https://www.academia.edu/Documents/in/Evolutionary_Psychology">Evolutionary Psychology</a>,&nbsp;<script data-card-contents-for-ri="255" type="text/json">{"id":255,"name":"Evolutionary Psychology","url":"https://www.academia.edu/Documents/in/Evolutionary_Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a><script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=650890]'), work: {"id":650890,"title":"Evolutionary cyber-psychology: Applying an evolutionary framework to Internet behavior","created_at":"2011-06-07T20:12:57.513-07:00","url":"https://www.academia.edu/650890/Evolutionary_cyber_psychology_Applying_an_evolutionary_framework_to_Internet_behavior?f_ri=1580","dom_id":"work_650890","summary":"An evolutionary psychological perspective has much to offer the study of Internet behavior. However, cyber-psychologists have hitherto neglected this rich theoretical tradition and evolutionary psychologists have been slow to apply their perspective to computer-mediated behavior. This paper applies an evolutionary perspective to the study of Internet behavior in four relevant domains: (1) mating and sexual competition, (2) parenting and kinship, (3) trust and social exchange, and (4) personal information management. Both general and specific evolutionary theories are explored in relation to online behavior in each domain, with an emphasis on generating testable hypotheses for future research.","downloadable_attachments":[{"id":51311693,"asset_id":650890,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":175341,"first_name":"Jared","last_name":"Piazza","domain_name":"upenn","page_name":"JaredPiazza","display_name":"Jared Piazza","profile_url":"https://upenn.academia.edu/JaredPiazza?f_ri=1580","photo":"https://0.academia-photos.com/175341/161368/279892/s65_jared.piazza.jpg"}],"research_interests":[{"id":255,"name":"Evolutionary Psychology","url":"https://www.academia.edu/Documents/in/Evolutionary_Psychology?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_11377205" data-work_id="11377205" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/11377205/Developing_a_model_of_adolescent_friendship_formation_on_the_Internet">Developing a model of adolescent friendship formation on the Internet</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/11377205" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="cfc3b02720027cc85bd2a404be39d502" rel="nofollow" data-download="{&quot;attachment_id&quot;:46743842,&quot;asset_id&quot;:11377205,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/46743842/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="27441793" href="https://uva.academia.edu/PattiValkenburg">Patti Valkenburg</a><script data-card-contents-for-user="27441793" type="text/json">{"id":27441793,"first_name":"Patti","last_name":"Valkenburg","domain_name":"uva","page_name":"PattiValkenburg","display_name":"Patti Valkenburg","profile_url":"https://uva.academia.edu/PattiValkenburg?f_ri=1580","photo":"https://0.academia-photos.com/27441793/7810337/16363992/s65_patti.valkenburg.jpg"}</script></span></span></li><li class="js-paper-rank-work_11377205 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="11377205"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 11377205, container: ".js-paper-rank-work_11377205", }); });</script></li><li class="js-percentile-work_11377205 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 11377205; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_11377205"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_11377205 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="11377205"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 11377205; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=11377205]").text(description); $(".js-view-count-work_11377205").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_11377205").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="11377205"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">17</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="237" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a><script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=11377205]'), work: {"id":11377205,"title":"Developing a model of adolescent friendship formation on the Internet","created_at":"2015-03-11T11:51:16.121-07:00","url":"https://www.academia.edu/11377205/Developing_a_model_of_adolescent_friendship_formation_on_the_Internet?f_ri=1580","dom_id":"work_11377205","summary":null,"downloadable_attachments":[{"id":46743842,"asset_id":11377205,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":27441793,"first_name":"Patti","last_name":"Valkenburg","domain_name":"uva","page_name":"PattiValkenburg","display_name":"Patti Valkenburg","profile_url":"https://uva.academia.edu/PattiValkenburg?f_ri=1580","photo":"https://0.academia-photos.com/27441793/7810337/16363992/s65_patti.valkenburg.jpg"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=1580","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=1580","nofollow":false},{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":11832,"name":"Nonverbal Communication","url":"https://www.academia.edu/Documents/in/Nonverbal_Communication?f_ri=1580"},{"id":22506,"name":"Adolescent","url":"https://www.academia.edu/Documents/in/Adolescent?f_ri=1580"},{"id":46406,"name":"Motivation","url":"https://www.academia.edu/Documents/in/Motivation?f_ri=1580"},{"id":53331,"name":"Social behavior","url":"https://www.academia.edu/Documents/in/Social_behavior?f_ri=1580"},{"id":64933,"name":"Child","url":"https://www.academia.edu/Documents/in/Child?f_ri=1580"},{"id":73785,"name":"Personality Assessment Inventory","url":"https://www.academia.edu/Documents/in/Personality_Assessment_Inventory?f_ri=1580"},{"id":118928,"name":"Child and Adolescent Psychology","url":"https://www.academia.edu/Documents/in/Child_and_Adolescent_Psychology?f_ri=1580"},{"id":127182,"name":"Self Disclosure","url":"https://www.academia.edu/Documents/in/Self_Disclosure?f_ri=1580"},{"id":628583,"name":"Social Behavior","url":"https://www.academia.edu/Documents/in/Social_Behavior-1?f_ri=1580"},{"id":816819,"name":"Psychological Models","url":"https://www.academia.edu/Documents/in/Psychological_Models?f_ri=1580"},{"id":855798,"name":"Cyberpsychology \u0026 Behavior","url":"https://www.academia.edu/Documents/in/Cyberpsychology_and_Behavior?f_ri=1580"},{"id":1120028,"name":"Friends","url":"https://www.academia.edu/Documents/in/Friends?f_ri=1580"},{"id":1191356,"name":"Internet","url":"https://www.academia.edu/Documents/in/Internet?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_17932329" data-work_id="17932329" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/17932329/Mechanizing_Humans_Humanizing_Machines_The_Transition_from_Homo_sapiens_to_Hybrid_sapiens">Mechanizing Humans, Humanizing Machines: The Transition from Homo sapiens to Hybrid sapiens</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Taken together, the mechanization of the human body and the integration of intelligent machines into the center of society, will produce an organism whose features are so far removed from the physical and behavioral characteristics that... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_17932329" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Taken together, the mechanization of the human body and the integration of intelligent machines into the center of society, will produce an organism whose features are so far removed from the physical and behavioral characteristics that originally defined homo sapiens as to soon render this evolutionary categorization inaccurate and obsolete. Sometime in the 21st century it may well become necessary to revise the name of our genus and species from Homo sapiens (thinking or intelligent humans) to Hybrid sapiens (thinking or intelligent hybrids) and end the hominid era of evolution.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/17932329" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="eb3d3f30575fb7e89c01583716011096" rel="nofollow" data-download="{&quot;attachment_id&quot;:39785547,&quot;asset_id&quot;:17932329,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/39785547/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="37843016" href="https://lmu.academia.edu/RGilbert">Richard L Gilbert</a><script data-card-contents-for-user="37843016" type="text/json">{"id":37843016,"first_name":"Richard","last_name":"Gilbert","domain_name":"lmu","page_name":"RGilbert","display_name":"Richard L Gilbert","profile_url":"https://lmu.academia.edu/RGilbert?f_ri=1580","photo":"https://0.academia-photos.com/37843016/13633100/14780451/s65_richard.gilbert.jpg"}</script></span></span></li><li class="js-paper-rank-work_17932329 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="17932329"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 17932329, container: ".js-paper-rank-work_17932329", }); });</script></li><li class="js-percentile-work_17932329 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 17932329; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_17932329"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_17932329 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="17932329"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 17932329; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=17932329]").text(description); $(".js-view-count-work_17932329").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_17932329").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="17932329"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">2</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2206311" href="https://www.academia.edu/Documents/in/Psychology_and_New_Digital_Technology">Psychology and New Digital Technology</a><script data-card-contents-for-ri="2206311" type="text/json">{"id":2206311,"name":"Psychology and New Digital Technology","url":"https://www.academia.edu/Documents/in/Psychology_and_New_Digital_Technology?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=17932329]'), work: {"id":17932329,"title":"Mechanizing Humans, Humanizing Machines: The Transition from Homo sapiens to Hybrid sapiens","created_at":"2015-11-07T15:34:23.629-08:00","url":"https://www.academia.edu/17932329/Mechanizing_Humans_Humanizing_Machines_The_Transition_from_Homo_sapiens_to_Hybrid_sapiens?f_ri=1580","dom_id":"work_17932329","summary":"Taken together, the mechanization of the human body and the integration of intelligent machines into the center of society, will produce an organism whose features are so far removed from the physical and behavioral characteristics that originally defined homo sapiens as to soon render this evolutionary categorization inaccurate and obsolete. Sometime in the 21st century it may well become necessary to revise the name of our genus and species from Homo sapiens (thinking or intelligent humans) to Hybrid sapiens (thinking or intelligent hybrids) and end the hominid era of evolution. ","downloadable_attachments":[{"id":39785547,"asset_id":17932329,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":37843016,"first_name":"Richard","last_name":"Gilbert","domain_name":"lmu","page_name":"RGilbert","display_name":"Richard L Gilbert","profile_url":"https://lmu.academia.edu/RGilbert?f_ri=1580","photo":"https://0.academia-photos.com/37843016/13633100/14780451/s65_richard.gilbert.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":2206311,"name":"Psychology and New Digital Technology","url":"https://www.academia.edu/Documents/in/Psychology_and_New_Digital_Technology?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43859879" data-work_id="43859879" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43859879/The_Subjectivity_of_Body_Perception_and_Gender_Identity_in_the_field_of_Artificial_Intelligence_Research">The Subjectivity of Body Perception and Gender Identity in the field of Artificial Intelligence Research.</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The phenomena defined by scientist as AI is a broad and multifaceted subject of academic study in the humanistic and technology thought. It occurs in many disciplines, particularly in philosophy, anthropology, etnography, sociology,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_43859879" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The phenomena defined by scientist as AI is a broad and multifaceted subject of academic study in the humanistic and technology thought. It occurs in many disciplines, particularly in philosophy, anthropology, etnography, sociology, psychology, but also in cognitive science and biology. The aim of the following paper is to make a comparative cognitive and anthropological analysis of human subjectivity which has body and gender as a connection elemenths with human cognition. Iterdisciplinar study about this aspect of life and comparison should give a better (and first!) answer on the questions: 1. How can we have empirical knowledge? 2. How this empirical knowledge influences the body and mind and vice versa? Corradi-Dell&#39;Acqua and Tessari (2010) did first step to describe that connection. Research in this area seems to be not continued. Project Athena attempts to do the second step on this field of research by creating new questions and explore modern answers: 3. How body experience and embodied thought experience influence gender identity and vice versa? 4. How gender identity influences body perception and sensory perception, and vice versa? 5. How much human beings are shaped trough body and social experience of their bodies (gender, appearance, use of body as women, men and other sex/genders, use of distorted body etc.)? The aim is to better understand the role of body and gender in cognition, motor skills; how natural and social environments influence gendered and &quot;ungendered&quot; (e.g. intersex case) body and mind, parts of human perception and how sensory perception can contribute to better understanding of the AI. Gathering such knowledge is a first step to create a body-and gender-recognition and education system for AI in the future. The most important objectives of this research are to teach AI 1) to recognize its own body, 2) to recognize its gender and gender-specific behavior, 3) to express itself using its body and gender-specific behavior. Furthermore the project attempts to reveal that intersex cognition and &quot;ungendered&quot; knowledge in research possesses a new cognitive dimension. As proved in my lastest project: Third Gender Phenomena. An Anthropological Analysis of Gender Transgression in a Comparative Perspective Based on the Two-Spirit (USA and Canada), the Trans (Poland) and the Kinnar (India), there are societies which have fewer tensions between masculinity and femininity, social classes, the upper and the lower, purity and impurity, the ones which, both in the symbollic and literal sense, perceive a non-dichotomously formed body better, treat symptoms of any kind of sex/gender and body less negatively as well as less oppresively treat representatives of third sex/gender. The embodied cognitive value in these societies was understood better by scientist and other people who had experienced different shape of body. They used multiple domains to explaine experience of body and sex/gender. It is assumed that body, gender and experience of subjectivity are variable categories depending on time, place and culture, as well as on the relation of power between men and women. These experience exists naturally as the so-called human identity, but also it constitutes a cultural by-product and is a conventional phenomenon within society&#39;s sphere, a temporary state, e.g. when a person already living in one gender role or some of the body role, by performing transgression, ...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43859879" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="e80f424b0ebda3a5476f560c6377e3f0" rel="nofollow" data-download="{&quot;attachment_id&quot;:64183283,&quot;asset_id&quot;:43859879,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/64183283/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="58475434" href="https://civitas.academia.edu/IzabelaRe%C4%87ko">Izabela Rećko</a><script data-card-contents-for-user="58475434" type="text/json">{"id":58475434,"first_name":"Izabela","last_name":"Rećko","domain_name":"civitas","page_name":"IzabelaRećko","display_name":"Izabela Rećko","profile_url":"https://civitas.academia.edu/IzabelaRe%C4%87ko?f_ri=1580","photo":"https://0.academia-photos.com/58475434/46657205/36287596/s65_izabela.re_ko.jpg"}</script></span></span></li><li class="js-paper-rank-work_43859879 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43859879"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43859879, container: ".js-paper-rank-work_43859879", }); });</script></li><li class="js-percentile-work_43859879 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43859879; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43859879"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43859879 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43859879"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43859879; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43859879]").text(description); $(".js-view-count-work_43859879").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43859879").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43859879"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">8</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="465" href="https://www.academia.edu/Documents/in/Artificial_Intelligence">Artificial Intelligence</a>,&nbsp;<script data-card-contents-for-ri="465" type="text/json">{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4420" href="https://www.academia.edu/Documents/in/Embodied_Cognition">Embodied Cognition</a>,&nbsp;<script data-card-contents-for-ri="4420" type="text/json">{"id":4420,"name":"Embodied Cognition","url":"https://www.academia.edu/Documents/in/Embodied_Cognition?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4893" href="https://www.academia.edu/Documents/in/Humanoid_Robotics">Humanoid Robotics</a><script data-card-contents-for-ri="4893" type="text/json">{"id":4893,"name":"Humanoid Robotics","url":"https://www.academia.edu/Documents/in/Humanoid_Robotics?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43859879]'), work: {"id":43859879,"title":"The Subjectivity of Body Perception and Gender Identity in the field of Artificial Intelligence Research.","created_at":"2020-08-14T14:43:03.591-07:00","url":"https://www.academia.edu/43859879/The_Subjectivity_of_Body_Perception_and_Gender_Identity_in_the_field_of_Artificial_Intelligence_Research?f_ri=1580","dom_id":"work_43859879","summary":"The phenomena defined by scientist as AI is a broad and multifaceted subject of academic study in the humanistic and technology thought. It occurs in many disciplines, particularly in philosophy, anthropology, etnography, sociology, psychology, but also in cognitive science and biology. The aim of the following paper is to make a comparative cognitive and anthropological analysis of human subjectivity which has body and gender as a connection elemenths with human cognition. Iterdisciplinar study about this aspect of life and comparison should give a better (and first!) answer on the questions: 1. How can we have empirical knowledge? 2. How this empirical knowledge influences the body and mind and vice versa? Corradi-Dell'Acqua and Tessari (2010) did first step to describe that connection. Research in this area seems to be not continued. Project Athena attempts to do the second step on this field of research by creating new questions and explore modern answers: 3. How body experience and embodied thought experience influence gender identity and vice versa? 4. How gender identity influences body perception and sensory perception, and vice versa? 5. How much human beings are shaped trough body and social experience of their bodies (gender, appearance, use of body as women, men and other sex/genders, use of distorted body etc.)? The aim is to better understand the role of body and gender in cognition, motor skills; how natural and social environments influence gendered and \"ungendered\" (e.g. intersex case) body and mind, parts of human perception and how sensory perception can contribute to better understanding of the AI. Gathering such knowledge is a first step to create a body-and gender-recognition and education system for AI in the future. The most important objectives of this research are to teach AI 1) to recognize its own body, 2) to recognize its gender and gender-specific behavior, 3) to express itself using its body and gender-specific behavior. Furthermore the project attempts to reveal that intersex cognition and \"ungendered\" knowledge in research possesses a new cognitive dimension. As proved in my lastest project: Third Gender Phenomena. An Anthropological Analysis of Gender Transgression in a Comparative Perspective Based on the Two-Spirit (USA and Canada), the Trans (Poland) and the Kinnar (India), there are societies which have fewer tensions between masculinity and femininity, social classes, the upper and the lower, purity and impurity, the ones which, both in the symbollic and literal sense, perceive a non-dichotomously formed body better, treat symptoms of any kind of sex/gender and body less negatively as well as less oppresively treat representatives of third sex/gender. The embodied cognitive value in these societies was understood better by scientist and other people who had experienced different shape of body. They used multiple domains to explaine experience of body and sex/gender. It is assumed that body, gender and experience of subjectivity are variable categories depending on time, place and culture, as well as on the relation of power between men and women. These experience exists naturally as the so-called human identity, but also it constitutes a cultural by-product and is a conventional phenomenon within society's sphere, a temporary state, e.g. when a person already living in one gender role or some of the body role, by performing transgression, ... ","downloadable_attachments":[{"id":64183283,"asset_id":43859879,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":58475434,"first_name":"Izabela","last_name":"Rećko","domain_name":"civitas","page_name":"IzabelaRećko","display_name":"Izabela Rećko","profile_url":"https://civitas.academia.edu/IzabelaRe%C4%87ko?f_ri=1580","photo":"https://0.academia-photos.com/58475434/46657205/36287596/s65_izabela.re_ko.jpg"}],"research_interests":[{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=1580","nofollow":false},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":4420,"name":"Embodied Cognition","url":"https://www.academia.edu/Documents/in/Embodied_Cognition?f_ri=1580","nofollow":false},{"id":4893,"name":"Humanoid Robotics","url":"https://www.academia.edu/Documents/in/Humanoid_Robotics?f_ri=1580","nofollow":false},{"id":74262,"name":"Philosophy of Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Philosophy_of_Artificial_Intelligence?f_ri=1580"},{"id":530425,"name":"Body and Mind","url":"https://www.academia.edu/Documents/in/Body_and_Mind?f_ri=1580"},{"id":956456,"name":"Thinking Machines","url":"https://www.academia.edu/Documents/in/Thinking_Machines?f_ri=1580"},{"id":1119826,"name":"Bodily Self-consciousness","url":"https://www.academia.edu/Documents/in/Bodily_Self-consciousness?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_38119752 coauthored" data-work_id="38119752" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/38119752/Psychometric_Properties_of_the_CYBVICS_Cyber_Victimization_Scale_and_Its_Relationship_with_Psychosocial_Variables">Psychometric Properties of the CYBVICS Cyber-Victimization Scale and Its Relationship with Psychosocial Variables</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The main goal of the present study was to analyze the psychometric properties of the revised version of the Adolescent Cyber-Victimization Scale (CYBVICS). This scale is composed of 18 items that assess direct and indirect... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_38119752" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The main goal of the present study was to analyze the psychometric properties of the revised version of the Adolescent Cyber-Victimization Scale (CYBVICS). This scale is composed of 18 items that assess direct and indirect cyber-victimization. Two subsamples participated in the present study. Sample 1 included 1318 adolescents (47.4% boys) from 12 to 16 years old (M = 13.89, SD = 1.32). Sample 2 was composed of 1188 adolescents (51.5% girls) from 12 to 16 years old (M = 14.19, SD = 1.80). First, an exploratory factor analysis was conducted on sample 1. Results yielded a bifactor structure: direct cyber-victimization and indirect cyber-victimization. To confirm the structure of the CYBVICS, we selected sample 2 to perform confirmatory factor analysis and test its convergent validity with theoretically related measures. The results supported the reliability and validity of the two-factor model. In addition, measurement invariance was established. Related to convergent validity, positive correlations between cyber-victimization and peer victimization, depressive symptoms, and offensive communication with the mother and the father were found. Moreover, negative correlations were found between cyber-victimization and open communication with the mother and the father and family self-esteem.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/38119752" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="2397b057340a95f7ea3646102f80c97f" rel="nofollow" data-download="{&quot;attachment_id&quot;:58149242,&quot;asset_id&quot;:38119752,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58149242/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="24693759" href="https://upo.academia.edu/Bel%C3%A9nMartinezFerrer">Belén Martinez-Ferrer</a><script data-card-contents-for-user="24693759" type="text/json">{"id":24693759,"first_name":"Belén","last_name":"Martinez-Ferrer","domain_name":"upo","page_name":"BelénMartinezFerrer","display_name":"Belén Martinez-Ferrer","profile_url":"https://upo.academia.edu/Bel%C3%A9nMartinezFerrer?f_ri=1580","photo":"https://0.academia-photos.com/24693759/6679077/7546207/s65_bel_n.martinez-ferrer.jpg_oh_6f4ac2fd4c877f38f609f34bc15e6a2b_oe_5531e7e7___gda___1428518581_c36aa762cb057d07dc923cfb72061252"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-38119752">+1</span><div class="hidden js-additional-users-38119752"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/MariaJesusCavaCaballero">Maria-Jesus Cava</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-38119752'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-38119752').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_38119752 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="38119752"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 38119752, container: ".js-paper-rank-work_38119752", }); });</script></li><li class="js-percentile-work_38119752 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38119752; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_38119752"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_38119752 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="38119752"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38119752; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38119752]").text(description); $(".js-view-count-work_38119752").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_38119752").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="38119752"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="24443" href="https://www.academia.edu/Documents/in/Adolescence_Psychology_">Adolescence (Psychology)</a>,&nbsp;<script data-card-contents-for-ri="24443" type="text/json">{"id":24443,"name":"Adolescence (Psychology)","url":"https://www.academia.edu/Documents/in/Adolescence_Psychology_?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="286025" href="https://www.academia.edu/Documents/in/Psychometrics_and_Test_Development">Psychometrics and Test Development</a>,&nbsp;<script data-card-contents-for-ri="286025" type="text/json">{"id":286025,"name":"Psychometrics and Test Development","url":"https://www.academia.edu/Documents/in/Psychometrics_and_Test_Development?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="756592" href="https://www.academia.edu/Documents/in/Cybervictimization">Cybervictimization</a><script data-card-contents-for-ri="756592" type="text/json">{"id":756592,"name":"Cybervictimization","url":"https://www.academia.edu/Documents/in/Cybervictimization?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=38119752]'), work: {"id":38119752,"title":"Psychometric Properties of the CYBVICS Cyber-Victimization Scale and Its Relationship with Psychosocial Variables","created_at":"2019-01-09T08:35:44.027-08:00","url":"https://www.academia.edu/38119752/Psychometric_Properties_of_the_CYBVICS_Cyber_Victimization_Scale_and_Its_Relationship_with_Psychosocial_Variables?f_ri=1580","dom_id":"work_38119752","summary":"The main goal of the present study was to analyze the psychometric properties of the revised version of the Adolescent Cyber-Victimization Scale (CYBVICS). This scale is composed of 18 items that assess direct and indirect cyber-victimization. Two subsamples participated in the present study. Sample 1 included 1318 adolescents (47.4% boys) from 12 to 16 years old (M = 13.89, SD = 1.32). Sample 2 was composed of 1188 adolescents (51.5% girls) from 12 to 16 years old (M = 14.19, SD = 1.80). First, an exploratory factor analysis was conducted on sample 1. Results yielded a bifactor structure: direct cyber-victimization and indirect cyber-victimization. To confirm the structure of the CYBVICS, we selected sample 2 to perform confirmatory factor analysis and test its convergent validity with theoretically related measures. The results supported the reliability and validity of the two-factor model. In addition, measurement invariance was established. Related to convergent validity, positive correlations between cyber-victimization and peer victimization, depressive symptoms, and offensive communication with the mother and the father were found. Moreover, negative correlations were found between cyber-victimization and open communication with the mother and the father and family self-esteem.","downloadable_attachments":[{"id":58149242,"asset_id":38119752,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":24693759,"first_name":"Belén","last_name":"Martinez-Ferrer","domain_name":"upo","page_name":"BelénMartinezFerrer","display_name":"Belén Martinez-Ferrer","profile_url":"https://upo.academia.edu/Bel%C3%A9nMartinezFerrer?f_ri=1580","photo":"https://0.academia-photos.com/24693759/6679077/7546207/s65_bel_n.martinez-ferrer.jpg_oh_6f4ac2fd4c877f38f609f34bc15e6a2b_oe_5531e7e7___gda___1428518581_c36aa762cb057d07dc923cfb72061252"},{"id":37117488,"first_name":"Maria-Jesus","last_name":"Cava","domain_name":"independent","page_name":"MariaJesusCavaCaballero","display_name":"Maria-Jesus Cava","profile_url":"https://independent.academia.edu/MariaJesusCavaCaballero?f_ri=1580","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":24443,"name":"Adolescence (Psychology)","url":"https://www.academia.edu/Documents/in/Adolescence_Psychology_?f_ri=1580","nofollow":false},{"id":286025,"name":"Psychometrics and Test Development","url":"https://www.academia.edu/Documents/in/Psychometrics_and_Test_Development?f_ri=1580","nofollow":false},{"id":756592,"name":"Cybervictimization","url":"https://www.academia.edu/Documents/in/Cybervictimization?f_ri=1580","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35239256" data-work_id="35239256" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35239256/The_Triangular_Theory_of_Crimes">The Triangular Theory of Crimes</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">The triangular theory of crimes explains how cyber-criminals and identity thieves operate, and the effects of staff dishonesty in criminal investigations.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35239256" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ab7c08c41fb0d760f99e13f6be98b05d" rel="nofollow" data-download="{&quot;attachment_id&quot;:55098598,&quot;asset_id&quot;:35239256,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55098598/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="49474585" href="https://independent.academia.edu/SaronMessembeObia">Saron Messembe Obia</a><script data-card-contents-for-user="49474585" type="text/json">{"id":49474585,"first_name":"Saron Messembe","last_name":"Obia","domain_name":"independent","page_name":"SaronMessembeObia","display_name":"Saron Messembe Obia","profile_url":"https://independent.academia.edu/SaronMessembeObia?f_ri=1580","photo":"https://0.academia-photos.com/49474585/18401441/28175727/s65_saron_messembe.obia.jpeg"}</script></span></span></li><li class="js-paper-rank-work_35239256 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35239256"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35239256, container: ".js-paper-rank-work_35239256", }); });</script></li><li class="js-percentile-work_35239256 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35239256; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35239256"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35239256 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35239256"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35239256; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35239256]").text(description); $(".js-view-count-work_35239256").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35239256").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35239256"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1720" href="https://www.academia.edu/Documents/in/International_Terrorism">International Terrorism</a>,&nbsp;<script data-card-contents-for-ri="1720" type="text/json">{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2089" href="https://www.academia.edu/Documents/in/Social_Identity">Social Identity</a>,&nbsp;<script data-card-contents-for-ri="2089" type="text/json">{"id":2089,"name":"Social Identity","url":"https://www.academia.edu/Documents/in/Social_Identity?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2511" href="https://www.academia.edu/Documents/in/Cybercrimes">Cybercrimes</a><script data-card-contents-for-ri="2511" type="text/json">{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35239256]'), work: {"id":35239256,"title":"The Triangular Theory of Crimes","created_at":"2017-11-24T01:56:46.931-08:00","url":"https://www.academia.edu/35239256/The_Triangular_Theory_of_Crimes?f_ri=1580","dom_id":"work_35239256","summary":"The triangular theory of crimes explains how cyber-criminals and identity thieves operate, and the effects of staff dishonesty in criminal investigations.","downloadable_attachments":[{"id":55098598,"asset_id":35239256,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":49474585,"first_name":"Saron Messembe","last_name":"Obia","domain_name":"independent","page_name":"SaronMessembeObia","display_name":"Saron Messembe Obia","profile_url":"https://independent.academia.edu/SaronMessembeObia?f_ri=1580","photo":"https://0.academia-photos.com/49474585/18401441/28175727/s65_saron_messembe.obia.jpeg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":1720,"name":"International Terrorism","url":"https://www.academia.edu/Documents/in/International_Terrorism?f_ri=1580","nofollow":false},{"id":2089,"name":"Social Identity","url":"https://www.academia.edu/Documents/in/Social_Identity?f_ri=1580","nofollow":false},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=1580","nofollow":false},{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=1580"},{"id":29128,"name":"Cybercultures","url":"https://www.academia.edu/Documents/in/Cybercultures?f_ri=1580"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_17647230" data-work_id="17647230" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/17647230/Cyber_Hate_Speech_on_Twitter_An_Application_of_Machine_Classification_and_Statistical_Modeling_for_Policy_and_Decision_Making">Cyber Hate Speech on Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The use of “Big Data” in policy and decision making is a current topic of debate. The 2013 murder of Drummer Lee Rigby in Woolwich, London, UK led to an extensive public reaction on social media, providing the opportunity to study the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_17647230" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The use of “Big Data” in policy and decision making is a current topic of debate. The 2013 murder<br />of Drummer Lee Rigby in Woolwich, London, UK led to an extensive public reaction on social<br />media, providing the opportunity to study the spread of online hate speech (cyber hate) on Twitter.<br />Human annotated Twitter data was collected in the immediate aftermath of Rigby’s murder to train<br />and test a supervised machine learning text classifier that distinguishes between hateful and/or<br />antagonistic responses with a focus on race, ethnicity, or religion; and more general responses.<br />Classification features were derived from the content of each tweet, including grammatical<br />dependencies&nbsp; between&nbsp; words&nbsp; to&nbsp; recognize&nbsp; “othering”&nbsp; phrases,&nbsp; incitement&nbsp; to&nbsp; respond&nbsp; with<br />antagonistic action, and claims of well-founded or justified discrimination against social groups.<br />The results of the classifier were optimal using a combination of probabilistic, rule-based, and<br />spatial-based classifiers with a voted ensemble meta-classifier. We demonstrate how the results of the<br />classifier can be robustly utilized in a statistical model used to forecast the likely spread of cyber<br />hate in a sample of Twitter data. The applications to policy and decision making are discussed</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/17647230" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="860e6abc58495903c43f09b18e00f02b" rel="nofollow" data-download="{&quot;attachment_id&quot;:39634288,&quot;asset_id&quot;:17647230,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/39634288/download_file?st=MTczMjgxNzI4NSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="4425512" href="https://cardiff.academia.edu/PeteBurnap">Pete Burnap</a><script data-card-contents-for-user="4425512" type="text/json">{"id":4425512,"first_name":"Pete","last_name":"Burnap","domain_name":"cardiff","page_name":"PeteBurnap","display_name":"Pete Burnap","profile_url":"https://cardiff.academia.edu/PeteBurnap?f_ri=1580","photo":"https://0.academia-photos.com/4425512/10598018/11829318/s65_pete.burnap.jpg"}</script></span></span></li><li class="js-paper-rank-work_17647230 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="17647230"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 17647230, container: ".js-paper-rank-work_17647230", }); });</script></li><li class="js-percentile-work_17647230 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 17647230; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_17647230"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_17647230 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="17647230"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 17647230; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=17647230]").text(description); $(".js-view-count-work_17647230").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_17647230").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="17647230"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1580" href="https://www.academia.edu/Documents/in/Cyberpsychology">Cyberpsychology</a>,&nbsp;<script data-card-contents-for-ri="1580" type="text/json">{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2008" href="https://www.academia.edu/Documents/in/Machine_Learning">Machine Learning</a>,&nbsp;<script data-card-contents-for-ri="2008" type="text/json">{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2511" href="https://www.academia.edu/Documents/in/Cybercrimes">Cybercrimes</a>,&nbsp;<script data-card-contents-for-ri="2511" type="text/json">{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=1580","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4060" href="https://www.academia.edu/Documents/in/Applied_Statistics">Applied Statistics</a><script data-card-contents-for-ri="4060" type="text/json">{"id":4060,"name":"Applied Statistics","url":"https://www.academia.edu/Documents/in/Applied_Statistics?f_ri=1580","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=17647230]'), work: {"id":17647230,"title":"Cyber Hate Speech on Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making","created_at":"2015-11-03T03:39:32.422-08:00","url":"https://www.academia.edu/17647230/Cyber_Hate_Speech_on_Twitter_An_Application_of_Machine_Classification_and_Statistical_Modeling_for_Policy_and_Decision_Making?f_ri=1580","dom_id":"work_17647230","summary":"The use of “Big Data” in policy and decision making is a current topic of debate. The 2013 murder\nof Drummer Lee Rigby in Woolwich, London, UK led to an extensive public reaction on social\nmedia, providing the opportunity to study the spread of online hate speech (cyber hate) on Twitter.\nHuman annotated Twitter data was collected in the immediate aftermath of Rigby’s murder to train\nand test a supervised machine learning text classifier that distinguishes between hateful and/or\nantagonistic responses with a focus on race, ethnicity, or religion; and more general responses.\nClassification features were derived from the content of each tweet, including grammatical\ndependencies between words to recognize “othering” phrases, incitement to respond with\nantagonistic action, and claims of well-founded or justified discrimination against social groups.\nThe results of the classifier were optimal using a combination of probabilistic, rule-based, and\nspatial-based classifiers with a voted ensemble meta-classifier. We demonstrate how the results of the\nclassifier can be robustly utilized in a statistical model used to forecast the likely spread of cyber\nhate in a sample of Twitter data. The applications to policy and decision making are discussed","downloadable_attachments":[{"id":39634288,"asset_id":17647230,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":4425512,"first_name":"Pete","last_name":"Burnap","domain_name":"cardiff","page_name":"PeteBurnap","display_name":"Pete Burnap","profile_url":"https://cardiff.academia.edu/PeteBurnap?f_ri=1580","photo":"https://0.academia-photos.com/4425512/10598018/11829318/s65_pete.burnap.jpg"}],"research_interests":[{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=1580","nofollow":false},{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=1580","nofollow":false},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=1580","nofollow":false},{"id":4060,"name":"Applied Statistics","url":"https://www.academia.edu/Documents/in/Applied_Statistics?f_ri=1580","nofollow":false},{"id":14585,"name":"Statistical Modeling","url":"https://www.academia.edu/Documents/in/Statistical_Modeling?f_ri=1580"},{"id":54462,"name":"Computational Social Science","url":"https://www.academia.edu/Documents/in/Computational_Social_Science?f_ri=1580"}]}, }) } })();</script></ul></li></ul></div></div></div><div class="u-taCenter Pagination"><ul class="pagination"><li class="next_page"><a href="/Documents/in/Cyberpsychology?after=50%2C17647230" rel="next">Next</a></li><li class="last next"><a href="/Documents/in/Cyberpsychology?page=last">Last &raquo;</a></li></ul></div></div><div class="hidden-xs hidden-sm"><div class="u-pl6x"><div style="width: 300px;"><div class="panel panel-flat u-mt7x"><div class="panel-heading u-p5x"><div class="u-tcGrayDark u-taCenter u-fw700 u-textUppercase">Related Topics</div></div><ul class="list-group"><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Internet_Addiction">Internet Addiction</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="59533">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="59533">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Internet_Studies">Internet Studies</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="1759">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="1759">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="221">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="221">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Addiction">Addiction</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="2483">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="2483">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Video_game_addiction">Video game addiction</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="76351">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="76351">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cyberpsychology_Digital_Media_">Cyberpsychology (Digital Media)</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="28568">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="28568">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Online_Research_Methods">Online Research Methods</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="52216">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="52216">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Social_Psychology">Social Psychology</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="248">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="248">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Cyberbullying">Cyberbullying</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="12756">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="12756">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Social_Media">Social Media</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="9246">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="9246">Following</a></div></li></ul></div></div></div></div></div></div><script>// MIT License // Copyright © 2011 Sebastian Tschan, https://blueimp.net // Permission is hereby granted, free of charge, to any person obtaining a copy of // this software and associated documentation files (the "Software"), to deal in // the Software without restriction, including without limitation the rights to // use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of // the Software, and to permit persons to whom the Software is furnished to do so, // subject to the following conditions: // The above copyright notice and this permission notice shall be included in all // copies or substantial portions of the Software. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS // FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR // COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER // IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN // CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. !function(n){"use strict";function d(n,t){var r=(65535&n)+(65535&t);return(n>>16)+(t>>16)+(r>>16)<<16|65535&r}function f(n,t,r,e,o,u){return d((c=d(d(t,n),d(e,u)))<<(f=o)|c>>>32-f,r);var c,f}function l(n,t,r,e,o,u,c){return f(t&r|~t&e,n,t,o,u,c)}function v(n,t,r,e,o,u,c){return f(t&e|r&~e,n,t,o,u,c)}function g(n,t,r,e,o,u,c){return f(t^r^e,n,t,o,u,c)}function m(n,t,r,e,o,u,c){return f(r^(t|~e),n,t,o,u,c)}function i(n,t){var r,e,o,u;n[t>>5]|=128<<t%32,n[14+(t+64>>>9<<4)]=t;for(var c=1732584193,f=-271733879,i=-1732584194,a=271733878,h=0;h<n.length;h+=16)c=l(r=c,e=f,o=i,u=a,n[h],7,-680876936),a=l(a,c,f,i,n[h+1],12,-389564586),i=l(i,a,c,f,n[h+2],17,606105819),f=l(f,i,a,c,n[h+3],22,-1044525330),c=l(c,f,i,a,n[h+4],7,-176418897),a=l(a,c,f,i,n[h+5],12,1200080426),i=l(i,a,c,f,n[h+6],17,-1473231341),f=l(f,i,a,c,n[h+7],22,-45705983),c=l(c,f,i,a,n[h+8],7,1770035416),a=l(a,c,f,i,n[h+9],12,-1958414417),i=l(i,a,c,f,n[h+10],17,-42063),f=l(f,i,a,c,n[h+11],22,-1990404162),c=l(c,f,i,a,n[h+12],7,1804603682),a=l(a,c,f,i,n[h+13],12,-40341101),i=l(i,a,c,f,n[h+14],17,-1502002290),c=v(c,f=l(f,i,a,c,n[h+15],22,1236535329),i,a,n[h+1],5,-165796510),a=v(a,c,f,i,n[h+6],9,-1069501632),i=v(i,a,c,f,n[h+11],14,643717713),f=v(f,i,a,c,n[h],20,-373897302),c=v(c,f,i,a,n[h+5],5,-701558691),a=v(a,c,f,i,n[h+10],9,38016083),i=v(i,a,c,f,n[h+15],14,-660478335),f=v(f,i,a,c,n[h+4],20,-405537848),c=v(c,f,i,a,n[h+9],5,568446438),a=v(a,c,f,i,n[h+14],9,-1019803690),i=v(i,a,c,f,n[h+3],14,-187363961),f=v(f,i,a,c,n[h+8],20,1163531501),c=v(c,f,i,a,n[h+13],5,-1444681467),a=v(a,c,f,i,n[h+2],9,-51403784),i=v(i,a,c,f,n[h+7],14,1735328473),c=g(c,f=v(f,i,a,c,n[h+12],20,-1926607734),i,a,n[h+5],4,-378558),a=g(a,c,f,i,n[h+8],11,-2022574463),i=g(i,a,c,f,n[h+11],16,1839030562),f=g(f,i,a,c,n[h+14],23,-35309556),c=g(c,f,i,a,n[h+1],4,-1530992060),a=g(a,c,f,i,n[h+4],11,1272893353),i=g(i,a,c,f,n[h+7],16,-155497632),f=g(f,i,a,c,n[h+10],23,-1094730640),c=g(c,f,i,a,n[h+13],4,681279174),a=g(a,c,f,i,n[h],11,-358537222),i=g(i,a,c,f,n[h+3],16,-722521979),f=g(f,i,a,c,n[h+6],23,76029189),c=g(c,f,i,a,n[h+9],4,-640364487),a=g(a,c,f,i,n[h+12],11,-421815835),i=g(i,a,c,f,n[h+15],16,530742520),c=m(c,f=g(f,i,a,c,n[h+2],23,-995338651),i,a,n[h],6,-198630844),a=m(a,c,f,i,n[h+7],10,1126891415),i=m(i,a,c,f,n[h+14],15,-1416354905),f=m(f,i,a,c,n[h+5],21,-57434055),c=m(c,f,i,a,n[h+12],6,1700485571),a=m(a,c,f,i,n[h+3],10,-1894986606),i=m(i,a,c,f,n[h+10],15,-1051523),f=m(f,i,a,c,n[h+1],21,-2054922799),c=m(c,f,i,a,n[h+8],6,1873313359),a=m(a,c,f,i,n[h+15],10,-30611744),i=m(i,a,c,f,n[h+6],15,-1560198380),f=m(f,i,a,c,n[h+13],21,1309151649),c=m(c,f,i,a,n[h+4],6,-145523070),a=m(a,c,f,i,n[h+11],10,-1120210379),i=m(i,a,c,f,n[h+2],15,718787259),f=m(f,i,a,c,n[h+9],21,-343485551),c=d(c,r),f=d(f,e),i=d(i,o),a=d(a,u);return[c,f,i,a]}function a(n){for(var t="",r=32*n.length,e=0;e<r;e+=8)t+=String.fromCharCode(n[e>>5]>>>e%32&255);return t}function h(n){var t=[];for(t[(n.length>>2)-1]=void 0,e=0;e<t.length;e+=1)t[e]=0;for(var r=8*n.length,e=0;e<r;e+=8)t[e>>5]|=(255&n.charCodeAt(e/8))<<e%32;return t}function e(n){for(var t,r="0123456789abcdef",e="",o=0;o<n.length;o+=1)t=n.charCodeAt(o),e+=r.charAt(t>>>4&15)+r.charAt(15&t);return e}function r(n){return unescape(encodeURIComponent(n))}function o(n){return a(i(h(t=r(n)),8*t.length));var t}function u(n,t){return function(n,t){var r,e,o=h(n),u=[],c=[];for(u[15]=c[15]=void 0,16<o.length&&(o=i(o,8*n.length)),r=0;r<16;r+=1)u[r]=909522486^o[r],c[r]=1549556828^o[r];return e=i(u.concat(h(t)),512+8*t.length),a(i(c.concat(e),640))}(r(n),r(t))}function t(n,t,r){return t?r?u(t,n):e(u(t,n)):r?o(n):e(o(n))}"function"==typeof define&&define.amd?define(function(){return t}):"object"==typeof module&&module.exports?module.exports=t:n.md5=t}(this);</script><script>window.AbTest = (function() { return { 'ab_test': (uniqueId, test_name, buckets) => { let override = new URLSearchParams(window.location.search).get(`ab_test[${test_name}]`); if ( override ) { return override; } const bucketNames = buckets.map((bucket) => { return typeof bucket === 'string' ? bucket : Object.keys(bucket)[0]; }); const weights = buckets.map((bucket) => { return typeof bucket === 'string' ? 1 : Object.values(bucket)[0]; }); const total = weights.reduce((sum, weight) => sum + weight); const hash = md5(`${uniqueId}${test_name}`); const hashNum = parseInt(hash.slice(-12), 16); let bucketPoint = total * (hashNum % 100000) / 100000; const bucket = bucketNames.find((_, i) => { if (weights[i] > bucketPoint) { return true; } bucketPoint -= weights[i]; return false; }); return bucket; } }; })();</script><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-landing_url="https://www.academia.edu/Documents/in/Cyberpsychology" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><script>function onGoogleOneTapEvent(event) { var momentType = event.getMomentType(); var momentReason = null; if (event.isNotDisplayed()) { momentReason = event.getNotDisplayedReason(); } else if (event.isSkippedMoment()) { momentReason = event.getSkippedReason(); } else if (event.isDismissedMoment()) { momentReason = event.getDismissedReason(); } Aedu.arbitraryEvents.write('GoogleOneTapEvent', { moment_type: momentType, moment_reason: momentReason, }); }</script><script>(function() { var auvid = unescape( document.cookie .split(/; ?/) .find((s) => s.startsWith('auvid')) .substring(6)); var bucket = AbTest.ab_test(auvid, 'lo_ri_one_tap_google_sign_on', ['control', 'one_tap_google_sign_on']); if (bucket === 'control') return; var oneTapTag = document.createElement('script') oneTapTag.async = true oneTapTag.defer = true oneTapTag.src = 'https://accounts.google.com/gsi/client' document.body.appendChild(oneTapTag) })();</script></div></div></div> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">&times;</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span &nbsp;&nbsp;="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "ffd9b66af440f9c32900eede33de0cff1bed525eae492cce302271fbe93671c7", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="3KJ+6W45LbAum+oNV/RhchyVy/ZMJ9cbzNkBuchFbAUrRMd0asbJSh5OfcJcir53kmB0RGk6kzSqTU7Vm8MI8Q==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/Documents/in/Cyberpsychology" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="9mxY1WKrTsAnSER2xk7hY5vBOjeG+dMHjBrxprZRbYABiuFIZlSqOhed07nNMD5mFTSFhaPklyjqjr7K5dcJdA==" autocomplete="off" /><p>Enter the email address you signed up with and we&#39;ll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account?&nbsp;<a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>&nbsp;<strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>&nbsp;<strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia &copy;2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10