Analyzing Human Behavior in Cyberspace


Book Description

The rapid evolution of technology continuously changes the way people interact, work, and learn. By examining these advances from a sociological perspective, researchers can further understand the impact of cyberspace on human behavior, interaction, and cognition. Analyzing Human Behavior in Cyberspace provides emerging research exploring the four types of cyber behavior, expanding the scientific knowledge about the subject matter and revealing its extreme complexity. Featuring coverage on a broad range of topics such as cyber effects, emotion recognition, and cyber victimization, this book is ideally designed for sociologists, psychologists, academicians, researchers, and graduate-level students seeking current research on how people behave online.




Cyber Behavior: Concepts, Methodologies, Tools, and Applications


Book Description

Following the migration of workflows, data, and communication to the Cloud and other Internet-based frameworks, interaction over the Web has become ever more commonplace. As with any social situation, there are rules and consequences to actions within a virtual environment. Cyber Behavior: Concepts, Methodologies, Tools, and Applications explores the role of cyberspace in modern communication and interaction, including considerations of ethics, crime, security, and education. With chapters on a variety of topics and concerns inherent to a contemporary networked society, this multi-volume work will be of particular interest to students and academicians, as well as software developers, computer scientists, and specialists in the field of Information Technologies.




Role of Emerging Technologies in Social Science


Book Description

In today’s world, technology has seamlessly woven itself into the fabric of our social existence, leaving an indelible mark. This book aims to illuminate the far-reaching impact of technology across various aspects of our lives, including business, commerce, lifestyle, sentiment analysis, and transportation. It delves into both the advantages and drawbacks of technology, emphasizing the need for a delicate balance between our social interactions and its pervasive influence. In today’s interconnected world, technology profoundly influences our social fabric. This book explores its impact across diverse domains—business, commerce, lifestyle, sentiment analysis, and transportation. It delves into both advantages and drawbacks, emphasizing the delicate balance between social interactions and technology, and guides aspiring researchers through cutting-edge topics like blockchain, the Internet of Things, AI, and machine learning. Key takeaways include understanding tech’s role, evaluating pros and cons, and exploring future research. The book caters to universities, graduate colleges, and research centers.




Diversity, Divergence, Dialogue


Book Description

This two-volume set LNCS 12645-12646 constitutes the refereed proceedings of the 16th International Conference on Diversity, Divergence, Dialogue, iConference 2021, held in Beijing, China, in March 2021. The 32 full papers and the 59 short papers presented in this two-volume set were carefully reviewed and selected from 225 submissions. They cover topics such as: AI and machine learning; data science; human-computer interaction; social media; digital humanities; education and information literacy; information behavior; information governance and ethics; archives and records; research methods; and institutional management.




Computerized Monitoring and Online Privacy


Book Description

Increasingly, computers are a part of even the most ordinary and simple aspects of human existence. Computers have changed forever how we work, learn, shop and seek information. They have also, since the 1960s, been programmed to monitor and analyze in various ways the interaction between humans and themselves. The rapid development of the World Wide Web in the 1990s has given new life, direction and urgency to this enterprise. This work describes the myriad ways, benign or malign, in which computers are used to monitor people's use of computers. Four distinct contexts for monitoring are examined: formal learning environments (e.g., educational software); information seeking environments (e.g., online library catalogs); the workplace; and the Internet (e.g., online shopping). Computerized monitoring often is called an invasion of privacy, and the conceptual and ethical dimensions of confidentiality and privacy in virtual environments are explored at length. In addition to providing information about the various computerized monitoring tools and techniques, this work focuses on the broader social, conceptual, ethical and legal implications.




Social Internet of Things


Book Description

The aim of this book is to stimulate research on the topic of the Social Internet of Things, and explore how Internet of Things architectures, tools, and services can be conceptualized and developed so as to reveal, amplify and inspire the capacities of people, including the socialization or collaborations that happen through or around smart objects and smart environments. From new ways of negotiating privacy, to the consequences of increased automation, the Internet of Things poses new challenges and opens up new questions that often go beyond the technology itself, and rather focus on how the technology will become embedded in our future communities, families, practices, and environment, and how these will change in turn.




Emerging Cyber Threats and Cognitive Vulnerabilities


Book Description

Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity. - Explains psychological factors inherent in machine learning and artificial intelligence - Discusses the social psychology of online radicalism and terrorist recruitment - Examines the motivation and decision-making of hackers and "hacktivists" - Investigates the use of personality psychology to extract secure information from individuals




Combating the Exploitation of Children in Cyberspace: Emerging Research and Opportunities


Book Description

The internet has greatly enhanced access to, dissemination, and sale of child pornography, which is a profitable industry estimated to generate billions of dollars worldwide. While efforts to address the issue of sexual exploitation of children may be slow, the capabilities of offenders to organize, communicate over the internet, and harness technology are unequivocally fast. Protection of children against cyber exploitation has become imperative, and measures should be taken that are specific and targeted to provide specialized victim identification capabilities; adequate protection for children using the internet; genuine participation of children; a full and responsible private sector; and finally, coordinated, effective, and structured international cooperation to protect all children. Combating the Exploitation of Children in Cyberspace: Emerging Research and Opportunities provides innovative research for understanding all elements of combating cyber exploitation of children including the roles of law enforcement, international organizations, and the judicial system and educating children and their families to the dangers of the independent internet usage through cyberspace awareness programs. The content within this publication examines child grooming, cyberbullying, and cybercrime. It is designed for law enforcement, lawmakers, teachers, government officials, policymakers, IT specialists, cybercriminal researchers, psychologists, victim advocates, professionals, academicians, researchers, and students.







Research Anthology on Combating Cyber-Aggression and Online Negativity


Book Description

The advent of the internet and social media were landmarks in furthering communication technologies. Through social media websites, families, friends, and communities could connect in a way never seen. Though these websites are helpful tools in facilitating positive interaction, they have also allowed users to verbally attack and bully each other with no fear of repercussion. Moreover, online predators will often use these tools to harass, stalk, and in some cases even lure their victims. Particularly rampant among adolescents, these harmful actions must be mitigated in order to safeguard the mental health and physical safety of users. The Research Anthology on Combating Cyber-Aggression and Online Negativity discusses the research behind cyber-aggression and cyber bullying, as well as methods to predict and prevent online negativity. It presents policy, technological, and human intervention practices against cyber-aggression. Covering topics such as media literacy, demographic variables, and workplace cyberbullying, this major reference work is a critical resource for students and educators of higher education, libraries, social media administrators, government organizations, K-12 teachers, computer scientists, sociologists, psychologists, human resource managers, researchers, and academicians.