Table of Contents
Cover
Title Page
List of Tables, Figures and Boxes
TABLES
FIGURES
BOXES
1 Introduction
2 The ‘Self’ in Cyberspace
2.1 DEFINING THE ‘SELF’
2.2 THE SELF IN CYBERSPACE
2.3 DISEMBODIED SELVES IN CYBERSPACE
2.4 THE CYBORG SELF
2.5 GOFFMAN: PERFORMING SELF ONLINE
2.6 POSSIBLE SELVES IN CYBERSPACE
2.7 SOCIAL IDENTITIES IN CYBERSPACE
2.8 VISUALLY ANONYMOUS?
2.9 CONCLUSIONS
SUGGESTED READINGS
3 Online Relationships
3.1 TRADITIONAL RELATIONSHIPS: OFFLINE REALM
3.2 APPLYING OLD THEORIES TO ONLINE RELATIONSHIPS
3.3 NEW THEORIES TO EXPLAIN ONLINE RELATING
3.4 A BRIEF HISTORY OF ONLINE RELATING
3.5 CONTEMPORARY ONLINE SPACES
3.6 INTERACTING IN VARIOUS SPACES
3.7 FUTURE DEVELOPMENT IN THE FIELD
3.8 CONCLUSIONS
SUGGESTED READINGS
4 Online Dating
4.1 WHAT IS AN ONLINE DATING SITE?
4.2 MOTIVATIONS FOR USING AN ONLINE DATING SITE
4.3 PSYCHOLOGICAL CHARACTERISTICS OF ONLINE DATERS
4.4 COMPARING ONLINE DATING SITES WITH PERSONAL ADS
4.5 PRESENTING ONESELF ON AN ONLINE DATING SITE
4.6 DATING DECEPTION
4.7 A PERFECT MATCH OR A NUMBERS GAME?
4.8 STAGES IN THE ONLINE DATING PROCESS
4.9 CONCLUSIONS
SUGGESTED READINGS
5 Online Sexual Activities
5.1 THE BEGINNINGS OF INTERNET SEX
5.2 THE TRIPLE A ENGINE
5.3 CYBERSEX: DEBILITATING OR LIBERATING?
5.4 INTERACTIVE SEX ENTERTAINMENT
5.5 CYBERSEX ADDICTION
5.6 THE INTERNET AS AN ENABLER OF RISKY OFFLINE SEXUAL ENCOUNTERS
5.7 THE INTERNET AND SEXUAL HEALTH INFORMATION
5.8 SOCIAL SUPPORT AND EXPLORING SEXUALITY
5.9 TEENS AND RISKY SEXUAL ONLINE BEHAVIOUR
5.10 TELEDILDONICS AND THE FUTURE OF SEX IN CYBERSPACE
5.11 CONCLUSIONS
SUGGESTED READINGS
6 Internet Infidelity
6.1 DEFINING INTERNET INFIDELITY
6.2 UNFAITHFUL ONLINE SEXUAL ACTIVITIES
6.3 VIRTUAL OR REAL?
6.4 EMOTIONAL INFIDELITY
6.5 GENDER DIFFERENCES: WHICH IS WORSE – SEX OR LOVE?
6.6 QUALITATIVE DIFFERENCES BETWEEN ONLINE AND OFFLINE AFFAIRS
6.7 VIRTUAL AFFAIRS WITH AN AVATAR
6.8 CONCLUSIONS
SUGGESTED READINGS
7 Children’s and Teens’ Use of Digital Technologies
7.1 INTERNET USAGE
7.2 THE DIGITAL DIVIDE
7.3 DIGITAL TECHNOLOGIES: HARMFUL OR EMPOWERING FOR YOUNG PEOPLE?
7.4 ILLEGAL CONTENT AND ILLEGAL ACTIVITIES
7.5 CYBERBULLYING AND CYBERHARASSMENT
7.6 SCAMS, CHILDREN AND TEENS
7.7 IDENTITY DEVELOPMENT
7.8 ACTIVISM
7.9 RADICALIZATION
7.10 CONCLUSIONS
SUGGESTED READINGS
8 Online Education
8.1 TECHNOLOGY AND LEARNING
8.2 E‐LEARNING
8.3 E‐LEARNING VERSUS FACE‐TO‐FACE LEARNING
8.4 SYNCHRONOUS AND ASYNCHRONOUS COMMUNICATION WITHIN E‐LEARNING
8.5 MEDIA RICHNESS THEORY
8.6 SALMON’S STAGE MODEL OF E‐LEARNING
8.7 3‐D LEARNING ENVIRONMENTS
8.8 CONCLUSIONS
SUGGESTED READINGS
9 Leisure and Entertainment
9.1 WHAT IS LEISURE AND WHAT MOTIVATES OUR PURSUIT OF IT?
9.2 ONLINE FAMILY LEISURE
9.3 OLDER ADULTS
9.4 TECHNOFERENCE: ENCROACHING ON LEISURE TIME WITHIN RELATIONSHIPS
9.5 TELECOMMUNICATION
9.6 TIME AND FUNCTIONAL DISPLACEMENT EFFECTS
9.7 TWITTER
9.8 CONCLUSIONS
SUGGESTED READINGS
10 Online Gaming and Gambling
10.1 INTERNET ADDICTION
10.2 INTERNET GAMBLING ADDICTION
10.3 INTERNET GAMING ADDICTION
10.4 AGGRESSIVE VIDEO GAMES
10.5 TRANSCENDING TABOOS: VIDEO GAMES
10.6 GAMES FOR LEARNING
10.7 CONCLUSIONS
SUGGESTED READINGS
11 Online Deception
11.1 DEFINING DECEPTION
11.2 DECEPTION IN CYBERSPACE
11.3 DO WE LIE MORE ONLINE?
11.4 DETECTING DECEPTION
11.5 CONCLUSIONS
SUGGESTED READINGS
12 Online Crimes: Scams, Fraud and Illegal Downloads
12.1 PHISHING
12.2 VISHING
12.3 WHY ARE PEOPLE TRICKED BY PHISHING?
12.4 IMPROVING DETECTION
12.5 MASS‐MARKETING FRAUD
12.6 AWARENESS CAMPAIGNS
12.7 COGNITIVE AND MOTIVATIONAL ERRORS
12.8 WHAT TYPE OF PERSON TENDS TO BE SUSCEPTIBLE TO MMF?
12.9 STAGES INVOLVED IN THE ONLINE DATING ROMANCE SCAM
12.10 ILLEGAL DOWNLOADS
12.11 CONCLUSIONS
SUGGESTED READINGS
13 Online Crimes: Cyberharassment, Hate Crimes and Cyberwarfare
13.1 ONLINE HARASSMENT AND STALKING
13.2 CYBERSTALKING AND THE LAW
13.3 PSYCHOLOGICALLY PROFILING CRIMINALS AND VICTIMS
13.4 HATE CRIMES
13.5 CYBERWARFARE
13.6 SURVEILLANCE AND MONITORING
13.7 CONCLUSIONS
SUGGESTED READINGS
14 Online Crimes: Child Pornography and Paedophilia
14.1 THE INTERNET AND THE INCREASE IN CHILD PORNOGRAPHY
14.2 CHILD PORNOGRAPHY AND THE LAW
14.3 PSEUDO‐PHOTOGRAPHS
14.4 TYPES OF CHILD PORNOGRAPHY OFFENDERS
14.5 CHARACTERISTICS OF CHILD PORNOGRAPHY OFFENDERS
14.6 THE RELATIONSHIP BETWEEN CHILD PORNOGRAPHY AND HANDS‐ON OFFENDING
14.7 THEORETICAL APPROACHES TO CHILD PORNOGRAPHY OFFENDING
14.8 CONCLUSIONS
SUGGESTED READINGS
15 Online Support and Health Care
15.1 THE INTERNET AND HEALTH
15.2 CHARACTERISTICS AND MOTIVATIONS
15.3 ONLINE HEALTH SEARCHING AND CYBERCHONDRIA
15.4 SOCIAL MEDIA, GROUP FORUMS AND SUPPORT SITES
15.5 E‐THERAPY
15.6 ASSESSING THE EFFECTIVENESS OF E‐THERAPIES
15.7 IMMERSIVE VIRTUAL ENVIRONMENTS AS AIDS TO TREATMENT
15.8 CONCLUSIONS
SUGGESTED READINGS
16 Concluding Thoughts
References
Index
End User License Agreement
List of Tables
Chapter 07
Table 7.1
Opportunities and risks relating to young people’s use of the Internet (adapted from Livingstone, 2009)
Chapter 11
Table 11.1
The feature‐based model: ranking predictions of likelihood of lying (adapted from Hancock et al., 2004)
Chapter 12
Table 12.1
Errors in decision‐making with respect to scams (identified by Lea et al. 2009a, p. 24)
List of Illustrations
Chapter 08
Figure 8.1
Measures of learning performance
Chapter 10
Figure 10.1
The general aggression model’s episodic processes
Chapter 12
Figure 12.1
Example of a phishing email
Guide
Cover
Table of Contents
Begin Reading
Pages
iii
ii
ii
x
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247