1,187 research outputs found
Seeking alcohol information on the Internet
It has been argued that people may be more willing to seek potentially threatening information on the Internet than they would in ‘real life’ (Joinson and Banyard, 2002). For alcohol drinkers, potentially threatening information includes diagnostic information on the amount they drink, and information about the negative effects of alcohol consumption. In the present study, participants with varying levels of alcohol intake and plans for change chose four alcohol-related articles to read (from twelve) using either the world-wide web (WWW) or pen and paper. Results showed that drinkers not currently reducing their drinking were more likely to seek diagnostic, potentially threatening anti-drinking information via the WWW compared to when seeking paper-based information. Drinkers either contemplating or engaging in efforts to reduce their drinking sought pro-drinking information on the WWW, and anti-drinking information when using pen and paper. The potential role of the Internet, and perceived anonymity, in health promotion is discussed
Psychological aspects of information seeking on the Internet
Two studies are presented that investigate information seeking behaviour on the Internet. In Study One, soccer fans’ information seeking on the World Wide Web (WWW) is investigated. In Study Two, access rates to a cancer information website are analysed. It is tentatively argued that there is a tendency for people to access information more commonly avoided in ‘real life’, although in the case of football fans, the tendency to ‘bask in reflected glory’ remains when online, while cutting off reflected failure is minimised. Implications for understanding and researching psychological processes of web browsing behaviour are discussed
The Perception and Treatment of Insanity in Southern Appalachia
In the nineteenth century, the perceived ability of alienists (the early term for mental health specialists) to cure insanity eventually led to lavishly-constructed insane asylums supported by taxpayers. Simultaneously, the hope of a cure and a changing attitude toward insanity helped destigmatize mental illness and made institutionalization of the insane more acceptable. This regional study investigates insane asylums within Appalachia between 1850 and 1900. Primary sources include period articles from professional publications, census data, asylum records, period newspaper articles, and patient records. The study provides background on the medical environment of nineteenth-century Appalachia and investigates the creation and function of five Appalachian asylums. The institutions under examination appear to be as modern and enlightened as those in any other region. Contrary to most published theory, women were not committed to Appalachian asylums more often than men, nor does patient abuse appear to be prevalent
Recommended from our members
Smart labs and social practice: social tools for pervasive laboratory workspaces: a position paper
The emergence of pervasive and ubiquitous computing stimulates a view of future work environments where sharing of information, data and knowledge is easy and commonplace, particularly in highly interactive settings. Much of the work in this area focuses on tool development to support activities such as data collection, data recording and sharing, and so on. We are interested in this kind of technical development, which is both challenging and essential for science communities. But we are also interested in a broader interpretation of knowledge sharing and the human/social side of tools we develop to support this. We are keen to know more about how groups of different kinds of scientists can make their work understandable and shareable with each other in a multidisciplinary setting. This is a complex task because boundaries and barriers can emerge between disciplines engendered by differences in discourses and practices, which may not easily translate into other discipline areas. In the worst case, there may be some hostility between disciplines, or at least doubt and scepticism. Nevertheless, sharing approaches to research, research expertise, data and methods across disciplines can be a very fruitful exercise, and encouragement to engage in this activity is particularly pertinent in the digital era. Issues of privacy and security are also key aspects – knowing when and how to release data or information to other groups is crucial to providing a safe environment for people to work, and there are several sensitivities to be explored here.
In this paper we describe an evolving situation that captures many of these issues, which we aim to track longitudinally
Facebook surveillance of former romantic partners: Associations with post-breakup recovery and personal growth
Copyright @ 2012 Mary Ann Liebert, Inc.This article has been made available through the Brunel Open Access Publishing Fund.Previous research has found that continuing offline contact with an ex-romantic partner following a breakup may disrupt emotional recovery. The present study examined whether continuing online contact with an ex-partner through remaining Facebook friends and/or engaging in surveillance of the ex-partner's Facebook page inhibited postbreakup adjustment and growth above and beyond offline contact. Analysis of the data provided by 464 participants revealed that Facebook surveillance was associated with greater current distress over the breakup, more negative feelings, sexual desire, and longing for the ex-partner, and lower personal growth. Participants who remained Facebook friends with the ex-partner, relative to those who did not remain Facebook friends, reported less negative feelings, sexual desire, and longing for the former partner, but lower personal growth. All of these results emerged after controlling for offline contact, personality traits, and characteristics of the former relationship and breakup that tend to predict postbreakup adjustment. Overall, these findings suggest that exposure to an ex-partner through Facebook may obstruct the process of healing and moving on from a past relationship
Developing a Measure of Information Seeking about Phishing
Phishing e-mails are fraudulent e-mails used to gain access to sensitive information or secure computer systems. They persuade users to click on malicious links, download attachments or provide sensitive information, such as usernames or passwords. One approach that aims to reduce people’s susceptibility to phishing is the provision of information to users regarding the phishing threat and the techniques used within phishing e-mails. In line with this, awareness campaigns are often used within organizations and wider society to raise awareness of phishing and encourage people to engage with protective information. However, the potential effectiveness of such approaches in reducing susceptibility remains uncertain. In particular, there is a lack of research investigating (i) whether the propensity to access such information may in itself influence susceptibility to phishing and (ii) the different factors that motivate people to engage with information in the first place. In order to understand how current and future interventions regarding phishing may be consumed by users, as well as their potential impact on phishing susceptibility, it is important to conduct theoretically based research that provides a foundation to investigate these issues. This study provides a first step in addressing this by developing and validating a theoretically based survey measure across two studies centred upon the constructs of protection motivation theory (perceived vulnerability, severity, self-efficacy and response efficacy) to assess the factors that influence whether people choose to keep up to date with protective information about phishing. This survey measure is then used within Study 2 to provide an initial investigation of the role of these constructs in (i) self-reported user intentions to keep up to date with phishing techniques in the future and (ii) phishing discrimination ability, assessed using a phishing quiz. Overall, higher perceived threat severity, self-efficacy and response efficacy were associated with greater intentions, while greater perceived vulnerability was associated with lower intentions. No relationship was found with phishing discrimination ability. By understanding the factors that influence user intention to maintain knowledge and seek information about phishing threats, it will be possible to ensure that, as effective interventions are developed, their potential impact can be maximized
Recommended from our members
A multi-pronged empirical approach to mobile privacy investigation
We describe the design of three empirical studies planned as part of an investigation into privacy when mobile. The studies exemplify complementary investigation strands, whose aim is to uncover the multi-faceted nature of privacy for mobile computing applications
Recommended from our members
The role of shame, guilt and embarrassment in online social dilemmas
The self-conscious emotions of shame, guilt and embarrassment are known for regulating human societies by (1) encouraging the wrongdoer to further comply and (2) extending reparation to the one damaged. Self-awareness is a requisite for the experience of self-conscious emotions. In this paper, we hypothesise that low self-awareness online deprives an offender of the emotional consequences that usually follow a norm violation. Therefore, the aforementioned pro-social benefits of self-conscious emotions are not made possible. We test this hypothesis in a study during which online offenders were assigned to either high or low self-awareness conditions. The results show that high self-aware participants, in contrast to low self-aware participants, experience more self-conscious emotions, collaborate more when given a second opportunity and apologise more frequently
- …