192 research outputs found

    Groups Online: Hacktivism and Social Protest

    Get PDF
    Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online ..

    The social psychology of cybersecurity

    Get PDF
    Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the organisations they target are people, with their own goals, influences and beliefs. There is a danger of relying on lazy stereotypes of those involved in cybersecurity, or taking the Hollywood portrayals of hackers and cybersecurity experts as fact. Our research aims to explore the social psychological factors of this increasingly important societal issue, as well as inputting into the discussion about where psychologists should place themselves in what can be a controversial and morally complex topic

    Introducing Psychological Concepts and Methods to Cybersecurity Students

    Get PDF
    This chapter will begin with a brief review of the literature that highlights what psychology research and practice can offer to cybersecurity education. The authors draw on their wide-ranging inter-disciplinary teaching experience and in this chapter they discuss their observations gained from teaching psychological principles and methods to undergraduate and postgraduate cybersecurity students. The authors pay special attention to the consideration of the characteristics of cybersecurity students, so that psychology is taught in a way that is accessible and engaging. Finally, the authors offer some practical suggestions for academics to help them incorporate psychology into the cybersecurity curriculum

    A cultural exploration of social media manipulators

    Get PDF
    Internet social media sites enable the rapid and widespread production and dissemi- nation of propaganda. Although propaganda has a long history in warfare, the spreading of propaganda via social media is markedly different from past distribution methods. The authors investigated the relationships between state-affiliated actors who use social media to produce and distribute propaganda and their national cultural values. The results showed that countries that deployed fake news via social media tended to have more masculine cultural values. These findings suggest that specific cultural values are associated with fake news distribution, which may indicate that culturally aware responses may be more effective in responding to propaganda

    A cultural exploration of the social media manipulators

    Get PDF
    The widespread use of Internet social media sites for the production and dissemination of propaganda continues to grow and gather attention. Social media sites spread information faster and wider than those institutions and methods historically limited to state-affiliated organizations. There are several characteristics that are unique to virtual space and make the production and dissemination of propaganda different; they include the Internet’s global reach, the recipient’s apparent trust placed in information source as well as the information sources, and the low cost of participation. Thus, the use of social media as a method to spread misleading information exploits trust relationships between the reader and the source. Although propaganda is a weapon with a long history in war, in the 21st century, the delivery and distribution of propaganda through the trusted channel of social media is markedly different than what was historically observed. We investigated the relationships among state-affiliated actors who use social media to produce and distribute propaganda along with their national cultural values. Prior research inferred a link between culture and social media usage (Hofstede et al., 2010; Sample & Karamanian 2014). Specifically, Hofstede et al. (2010) contended that cultures that are more masculine use the Internet for information seeking, whereas more feminine-oriented cultures use social media sites for sharing information, seeking to build better “trusting” relationships. We sought to explore whether masculine countries would leverage the trust relationships that are present with social media users to further the reach of state-affiliated propaganda. We built upon Bradshaw & Howard’s (2017) study on propaganda purveyors, which examined preferred social media deployment techniques across 29 different countries. Using previously published methods, we examined associations with culture using Hofestede’s scale. Since masculine countries have previously been associated with information-seeking behaviors, we sought to explore the potential that more masculine cultural values are associated with greater information-shaping and -distributing behaviors compared with more feminine cultural values. The results showed a strong difference in distributions, countries that deployed fake news via social media tended to have more masculine cultural values. Moderate differences were observed in other cultural values, purveyors of social media propaganda exhibited more authoritarianism and uncertainty avoidance. These findings suggest that specific cultural values associate with the distrubtion of fake news, indicating that culturally aware responses may be more effective when responding to these events

    Social Psychology: An under-used tool in Cybersecurity

    Get PDF
    In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches. This paper proposes that the fusion of cybersecurity and social psychology can inform and advance attempts to educate those on both sides of the law. Awareness and education will lead to more effective communication between parties and greater understanding of the risks and consequences for cyber attackers and defenders alike

    Surveying the Hackers: The Challenges of Data Collection from a Secluded Community

    Get PDF
    There are various challenges with online data collection, from participant recruitment to ensuring the integrity and representativeness of the results; and when the data is being collected from hacking communities who value privacy the challenges become far more interesting. This study was carried out as part of an ongoing PhD project into online communities involved with hacking. This paper will discuss the resources used in designing and implementing internet-based data collection, especially with hard-to-engage participants. Data discussed has been collected via quantitative online surveys. Risks include becoming the target of a cyber-attack. Previous studies have found that research of this type is not universally welcomed in such private communities with reactions ranging from wary to hostile. The findings of this paper offer examples and areas of improvement for online research methodologies as well as reinforcing the importance of social psychological research and human factors within cyber security. The results are beneficial to those wanting to conduct their own online research in challenging areas, as well as those interested in online behaviour and hacking related topics

    Fifty shades of grey hat: A socio-psychological analysis of conversations on hacking forums

    Get PDF
    There remains a lack of understanding as to what determines the path which a young person takes when they first engage with computers and hacking. This research sought to address that gap by exploring the conversations that take place on hacking forums and subreddits. Text in hacking related threads was collected from these sites over the summer period of 2018. Linguistic Inquiry and Word Count (LIWC) software was used to determine the linguistic characteristics of each forum/ subreddit. Thematic analysis was then conducted on a sub-set of text from each source. The results of the LIWC analysis indicated that there are variations in several psychologically relevant factors between these forums and subreddits, including the degree to which users used language that indicated they were being honest, confident, analytical and emotional. There were several results that were inconsistent with stereotypes of hackers, such as a relative absence of language indicating anger. The thematic analysis identified several themes relating to knowledge, skills acquisition, honesty legality and risk. Overall this research demonstrates that there exists an established online community of hackers, which are likely to be encountered by any young person who becomes interested in cybersecurity and hacking. These communities may potentially act as an important source of social support and social identity for their members. Understanding the dynamics of these communities may better help us steer people towards legitimate cybersecurity careers, where their passion and skills can be used for societal good

    Teaching Psychological Principles to Cybersecurity Students

    Get PDF
    This paper will discuss our observations gained from teaching psychological principles and methods to undergraduate and postgraduate cybersecurity students. We will draw on and extend our previous work encouraging the teaching of psychology in computing and cybersecurity education. We pay special attention to the consideration of characteristics of cybersecurity students in terms of teaching psychology in a way that will be accessible and engaging. We then discuss the development and use of an online training tool which draws on psychology to help educators and companies to raise awareness of cybersecurity risks in students and employees. Finally, we offer some practical suggestions to incorporate psychology into the cybersecurity curriculum

    Interindividual responses of appetite to acute exercise: a replicated crossover study

    Get PDF
    This is an Open Access Article. It is published by Lippincott, Williams & Wilkins under the Creative Commons Attribution-NonCommercial 3.0 Unported Licence (CC BY-NC). Full details of this licence are available at: http://creativecommons.org/licenses/by-nc/4.0/Purpose: Acute exercise transiently suppresses appetite, which coincides with alterations in appetite-regulatory hormone concentrations. Individual variability in these responses is suspected, but replicated trials are needed to quantify them robustly. We examined the reproducibility of appetite and appetite-regulatory hormone responses to acute exercise and quantified the individual differences in responses. Methods: Fifteen healthy, recreationally-active men completed two control (60-min resting) and two exercise (60-min fasted treadmill running at 70% peak oxygen uptake) conditions in randomised sequences. Perceived appetite and circulating concentrations of acylated ghrelin and total peptide YY (PYY) were measured immediately before and after the interventions. Inter-individual differences were explored by correlating the two sets of response differences between exercise and control conditions. Within-participant covariate-adjusted linear mixed models were used to quantify participant-by-condition interactions. Results: Compared with control, exercise suppressed mean acylated ghrelin concentrations and appetite perceptions (all ES = 0.62 to 1.47, P < 0.001), and elevated total PYY concentrations (ES = 1.49, P < 0.001). For all variables, the SD of the change scores was substantially greater in the exercise versus control conditions. Moderate-to-large positive correlations were observed between the two sets of control-adjusted exercise responses for all variables (r = 0.54 to 0.82, P ≤ 0.036). After adjusting for baseline measurements, participant-by-condition interactions were present for all variables (P ≤ 0.053). Conclusion: Our replicated cross-over study allowed, for the first time, the interaction between participant and acute exercise response in appetite parameters to be quantified. Even after adjustment for individual baseline measurements, participants demonstrated individual differences in perceived appetite and hormone responses to acute exercise bouts beyond any random within-subject variability over time
    • …
    corecore