|
Title Page |
5 |
|
|
Copyright Page |
6 |
|
|
Brief Contents |
7 |
|
|
Contents |
8 |
|
|
List of Tables, Figures and Boxes |
12 |
|
|
Chapter 1 Introduction |
13 |
|
|
Chapter 2 The ‘Self’ in Cyberspace |
21 |
|
|
2.1 DEFINING THE ‘SELF’ |
21 |
|
|
2.1.1 Trait theory and the self |
21 |
|
|
2.1.2 Identity: ‘Who am I’? |
22 |
|
|
2.1.3 Social identity |
22 |
|
|
2.1.4 Possible selves |
23 |
|
|
2.1.5 The self as actor |
24 |
|
|
2.1.6 The postmodern self |
24 |
|
|
2.2 THE SELF IN CYBERSPACE |
25 |
|
|
2.3 DISEMBODIED SELVES IN CYBERSPACE |
25 |
|
|
2.3.1 Criticisms of Turkle’s early work |
26 |
|
|
2.3.2 The saturated self |
28 |
|
|
2.4 THE CYBORG SELF |
28 |
|
|
2.5 GOFFMAN: PERFORMING SELF ONLINE |
29 |
|
|
2.6 POSSIBLE SELVES IN CYBERSPACE |
30 |
|
|
2.6.1 Real me |
30 |
|
|
2.7 SOCIAL IDENTITIES IN CYBERSPACE |
31 |
|
|
2.8 VISUALLY ANONYMOUS? |
32 |
|
|
2.9 CONCLUSIONS |
33 |
|
|
SUGGESTED READINGS |
34 |
|
|
Chapter 3 Online Relationships |
35 |
|
|
3.1 TRADITIONAL RELATIONSHIPS: OFFLINE REALM |
35 |
|
|
3.1.1 Social evolutionary theory |
36 |
|
|
3.1.2 Social penetration theory |
36 |
|
|
3.1.3 Exchange and equity theories |
36 |
|
|
3.2 APPLYING OLD THEORIES TO ONLINE RELATIONSHIPS |
37 |
|
|
3.2.1 Social evolutionary theory |
37 |
|
|
3.2.2 Social penetration theory |
38 |
|
|
3.2.3 Exchange theory and equity theory |
38 |
|
|
3.3 NEW THEORIES TO EXPLAIN ONLINE RELATING |
39 |
|
|
3.3.1 Disinhibition effect |
39 |
|
|
3.3.2 Social presence theory |
39 |
|
|
3.3.3 Social information processing theory |
40 |
|
|
3.3.4 Hyperpersonal communication |
40 |
|
|
3.3.5 Real Me |
41 |
|
|
3.4 A BRIEF HISTORY OF ONLINE RELATING |
42 |
|
|
3.4.1 Bulletin board systems: Line-by-line relationships |
42 |
|
|
3.4.2 MUDs and MOOs: A place for real relationship formation |
42 |
|
|
3.4.3 Chat rooms: Less means more |
43 |
|
|
3.4.4 Discussion groups and Usenet newsgroups: A place for the ‘Real Me’ |
44 |
|
|
3.5 CONTEMPORARY ONLINE SPACES |
45 |
|
|
3.5.1 MMORPGs: Still a very social space |
45 |
|
|
3.5.2 Social networking sites: Face-to-face and virtual friends |
46 |
|
|
3.6 INTERACTING IN VARIOUS SPACES |
48 |
|
|
3.7 FUTURE DEVELOPMENT IN THE FIELD |
49 |
|
|
3.8 CONCLUSIONS |
49 |
|
|
SUGESTED READINGS |
50 |
|
|
Chapter 4 Online Dating |
51 |
|
|
4.1 WHAT IS AN ONLINE DATING SITE? |
51 |
|
|
4.2 MOTIVATIONS FOR USING AN ONLINE DATING SITE |
52 |
|
|
4.3 PSYCHOLOGICAL CHARACTERISTICS OF ONLINE DATERS |
53 |
|
|
4.4 COMPARING ONLINE DATING SITES WITH PERSONAL ADS |
54 |
|
|
4.5 PRESENTING ONESELF ON AN ONLINE DATING SITE |
55 |
|
|
4.6 DATING DECEPTION |
56 |
|
|
4.7 A PERFECT MATCH OR A NUMBERS GAME? |
57 |
|
|
4.8 STAGES IN THE ONLINE DATING PROCESS |
58 |
|
|
4.8.1 Phase 1: The attention phase |
59 |
|
|
4.8.2 Phase 2: The recognition phase |
60 |
|
|
4.8.3 Phase 3: The interaction phase |
60 |
|
|
4.8.4 Phase 4: The face-to-face meeting |
60 |
|
|
4.8.5 Phase 5: Resolution |
61 |
|
|
4.9 CONCLUSIONS |
61 |
|
|
SUGGESTED READINGS |
62 |
|
|
Chapter 5 Online Sexual Activities |
63 |
|
|
5.1 THE BEGINNINGS OF INTERNET SEX |
63 |
|
|
5.2 THE TRIPLE A ENGINE |
64 |
|
|
5.3 CYBERSEX: DEBILITATING OR LIBERATING? |
65 |
|
|
5.4 INTERACTIVE SEX ENTERTAINMENT |
66 |
|
|
5.5 CYBERSEX ADDICTION |
66 |
|
|
5.6 THE INTERNET AS AN ENABLER OF RISKY OFFLINE SEXUAL ENCOUNTERS |
67 |
|
|
5.7 THE INTERNET AND SEXUAL HEALTH INFORMATION |
68 |
|
|
5.8 SOCIAL SUPPORT AND EXPLORING SEXUALITY |
69 |
|
|
5.9 TEENS AND RISKY SEXUAL ONLINE BEHAVIOUR |
70 |
|
|
5.10 TELEDILDONICS AND THE FUTURE OF SEX IN CYBERSPACE |
72 |
|
|
5.11 CONCLUSIONS |
72 |
|
|
SUGGESTED READINGS |
73 |
|
|
Chapter 6 Internet Infidelity |
74 |
|
|
6.1 DEFINING INTERNET INFIDELITY |
75 |
|
|
6.2 UNFAITHFUL ONLINE SEXUAL ACTIVITIES |
75 |
|
|
6.2.1 Cybersex |
76 |
|
|
6.2.2 Other online sexual activities |
76 |
|
|
6.2.3 Pornography |
76 |
|
|
6.3 VIRTUAL OR REAL? |
77 |
|
|
6.4 EMOTIONAL INFIDELITY |
77 |
|
|
6.5 GENDER DIFFERENCES: WHICH IS WORSE – SEX OR LOVE? |
78 |
|
|
6.5.1 Gender differences on the Internet |
80 |
|
|
6.6 QUALITATIVE DIFFERENCES BETWEEN ONLINE AND OFFLINE AFFAIRS |
80 |
|
|
6.6.1 Idealizing online relationships |
81 |
|
|
6.6.2 Object relations: Splitting |
81 |
|
|
6.7 VIRTUAL AFFAIRS WITH AN AVATAR |
82 |
|
|
6.8 CONCLUSIONS |
83 |
|
|
SUGGESTED READINGS |
84 |
|
|
Chapter 7 Children’s and Teens’ Use of Digital Technologies |
85 |
|
|
7.1 INTERNET USAGE |
85 |
|
|
7.2 THE DIGITAL DIVIDE |
86 |
|
|
7.3 DIGITAL TECHNOLOGIES: HARMFUL OR EMPOWERING FOR YOUNG PEOPLE? |
87 |
|
|
7.4 ILLEGAL CONTENT AND ILLEGAL ACTIVITIES |
88 |
|
|
7.5 CYBERBULLYING AND CYBERHARASSMENT |
89 |
|
|
7.6 SCAMS, CHILDREN AND TEENS |
91 |
|
|
7.7 IDENTITY DEVELOPMENT |
92 |
|
|
7.8 ACTIVISM |
93 |
|
|
7.9 RADICALIZATION |
94 |
|
|
7.10 CONCLUSIONS |
96 |
|
|
SUGGESTED READINGS |
97 |
|
|
Chapter 8 Online Education |
98 |
|
|
8.1 TECHNOLOGY AND LEARNING |
98 |
|
|
8.2 E-LEARNING |
99 |
|
|
8.3 E-LEARNING VERSUS FACE-TO-FACE LEARNING |
101 |
|
|
8.4 SYNCHRONOUS AND ASYNCHRONOUS COMMUNICATION WITHIN E-LEARNING |
102 |
|
|
8.4.1 The importance of presence |
103 |
|
|
8.4.2 Cognitive presence |
105 |
|
|
8.5 MEDIA RICHNESS THEORY |
105 |
|
|
8.6 SALMON’S STAGE MODEL OF E-LEARNING |
107 |
|
|
8.7 3-D LEARNING ENVIRONMENTS |
108 |
|
|
8.7.1 Evaluating 3-D learning environments |
109 |
|
|
8.8 CONCLUSIONS |
111 |
|
|
SUGGESTED READINGS |
112 |
|
|
Chapter 9 Leisure and Entertainment |
113 |
|
|
9.1 WHAT IS LEISURE AND WHAT MOTIVATES OUR PURSUIT OF IT? |
113 |
|
|
9.2 ONLINE FAMILY LEISURE |
115 |
|
|
9.3 OLDER ADULTS |
115 |
|
|
9.4 TECHNOFERENCE: ENCROACHING ON LEISURE TIME WITHIN RELATIONSHIPS |
116 |
|
|
9.5 TELECOMMUNICATION |
117 |
|
|
9.6 TIME AND FUNCTIONAL DISPLACEMENT EFFECTS |
118 |
|
|
9.7 TWITTER |
122 |
|
|
9.8 CONCLUSIONS |
124 |
|
|
SUGGESTED READINGS |
125 |
|
|
Chapter 10 Online Gaming and Gambling |
126 |
|
|
10.1 INTERNET ADDICTION |
126 |
|
|
10.2 INTERNET GAMBLING ADDICTION |
128 |
|
|
10.3 INTERNET GAMING ADDICTION |
129 |
|
|
10.4 AGGRESSIVE VIDEO GAMES |
130 |
|
|
10.4.1 Social learning theory |
132 |
|
|
10.4.2 Script theory |
132 |
|
|
10.4.3 Frustration–aggression hypothesis |
133 |
|
|
10.4.4 Cognitive neoassociation model |
133 |
|
|
10.4.5 General aggression model |
134 |
|
|
10.5 TRANSCENDING TABOOS: VIDEO GAMES |
135 |
|
|
10.6 GAMES FOR LEARNING |
136 |
|
|
10.7 CONCLUSIONS |
138 |
|
|
SUGGESTED READINGS |
138 |
|
|
Chapter 11 Online Deception |
140 |
|
|
11.1 DEFINING DECEPTION |
140 |
|
|
11.2 DECEPTION IN CYBERSPACE |
141 |
|
|
11.2.1 Identity-based deception |
142 |
|
|
11.2.2 Munchausen by Internet |
143 |
|
|
11.2.3 Message-based deception |
144 |
|
|
11.3 DO WE LIE MORE ONLINE? |
145 |
|
|
11.3.1 Theories to predict deception |
146 |
|
|
11.4 DETECTING DECEPTION |
149 |
|
|
11.5 CONCLUSIONS |
150 |
|
|
SUGGESTED READINGS |
151 |
|
|
Chapter 12 Online Crimes: Scams, Fraud and Illegal Downloads |
153 |
|
|
12.1 PHISHING |
154 |
|
|
12.2 VISHING |
155 |
|
|
12.2.1 Number of victims |
155 |
|
|
12.3 WHY ARE PEOPLE TRICKED BY PHISHING? |
156 |
|
|
12.4 IMPROVING DETECTION |
158 |
|
|
12.5 MASS-MARKETING FRAUD |
158 |
|
|
12.6 AWARENESS CAMPAIGNS |
161 |
|
|
12.7 COGNITIVE AND MOTIVATIONAL ERRORS |
162 |
|
|
12.8 WHAT TYPE OF PERSON TENDS TO BE SUSCEPTIBLE TO MMF? |
163 |
|
|
12.8.1 The role of the Internet |
163 |
|
|
12.9 STAGES INVOLVED IN THE ONLINE DATING ROMANCE SCAM |
164 |
|
|
12.10 ILLEGAL DOWNLOADS |
164 |
|
|
12.11 CONCLUSIONS |
166 |
|
|
SUGGESTED READINGS |
167 |
|
|
Chapter 13 Online Crimes: Cyberharassment, Hate Crimes and Cyberwarfare |
168 |
|
|
13.1 ONLINE HARASSMENT AND STALKING |
168 |
|
|
13.2 CYBERSTALKING AND THE LAW |
170 |
|
|
13.3 PSYCHOLOGICALLY PROFILING CRIMINALS AND VICTIMS |
171 |
|
|
13.4 HATE CRIMES |
172 |
|
|
13.5 CYBERWARFARE |
174 |
|
|
13.5.1 Hacktivists |
176 |
|
|
13.6 SURVEILLANCE AND MONITORING |
177 |
|
|
13.7 CONCLUSIONS |
180 |
|
|
SUGGESTED READINGS |
181 |
|
|
Chapter 14 Online Crimes: Child Pornography and Paedophilia |
182 |
|
|
14.1 THE INTERNET AND THE INCREASE IN CHILD PORNOGRAPHY |
183 |
|
|
14.2 CHILD PORNOGRAPHY AND THE LAW |
184 |
|
|
14.2.1 Objective and functional aspects of child pornography content |
184 |
|
|
14.2.2 Varying legal interpretations |
185 |
|
|
14.2.3 Child pornography and the age of consent |
186 |
|
|
14.3 PSEUDO-PHOTOGRAPHS |
186 |
|
|
14.4 TYPES OF CHILD PORNOGRAPHY OFFENDERS |
188 |
|
|
14.4.1 Paraphilic disorder not otherwise specified |
189 |
|
|
14.4.2 Collectors |
190 |
|
|
14.5 CHARACTERISTICS OF CHILD PORNOGRAPHY OFFENDERS |
191 |
|
|
14.6 THE RELATIONSHIP BETWEEN CHILD PORNOGRAPHY AND HANDS-ON OFFENDING |
192 |
|
|
14.7 THEORETICAL APPROACHES TO CHILD PORNOGRAPHY OFFENDING |
193 |
|
|
14.7.1 Courtship disorder theory |
193 |
|
|
14.7.2 Social learning theory |
194 |
|
|
14.7.3 Finkelhor’s precondition model |
195 |
|
|
14.7.4 The pathways model and the integrated theory of sexual offending |
195 |
|
|
14.8 CONCLUSIONS |
197 |
|
|
SUGGESTED READINGS |
198 |
|
|
Chapter 15 Online Support and Health Care |
199 |
|
|
15.1 THE INTERNET AND HEALTH |
199 |
|
|
15.2 CHARACTERISTICS AND MOTIVATIONS |
200 |
|
|
15.3 ONLINE HEALTH SEARCHING AND CYBERCHONDRIA |
201 |
|
|
15.4 SOCIAL MEDIA, GROUP FORUMS AND SUPPORT SITES |
203 |
|
|
15.5 E?THERAPY |
205 |
|
|
15.6 ASSESSING THE EFFECTIVENESS OF E-THERAPIES |
208 |
|
|
15.7 IMMERSIVE VIRTUAL ENVIRONMENTS AS AIDS TO TREATMENT |
209 |
|
|
15.8 CONCLUSIONS |
210 |
|
|
SUGGESTED READINGS |
211 |
|
|
Chapter 16 Concluding Thoughts |
212 |
|
|
References |
215 |
|
|
Index |
252 |
|
|
EULA |
260 |
|