Show Summary Details

Page of

PRINTED FROM OXFORD HANDBOOKS ONLINE (www.oxfordhandbooks.com). © Oxford University Press, 2018. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a title in Oxford Handbooks Online for personal use (for details see Privacy Policy and Legal Notice).

date: 20 February 2020

(p. 716) (p. 717) Index

(p. 716) (p. 717) Index

A
Abad, N. 414–15
Abramova, O. 201
Acar, A. 181
accessibility of online networks 60–1
account hacking 679–81
Ackerman, D. 535
actual self see core self
Adams, G. 187–8
ADHD 566, 569
Adler, J. R. 674
Adonu, J. K. 187–8
Adriaenssens, E. E. 489
Advancing Knowledge of Telecare for Independence and Vitality in Later Life, (AKTIVE) project
Ae Chun, S. 444
affordance theory, and online support communities 252–3
Afghanistan conflict 442
Agarwal, N. 177
age:
and gaming context 618
and gaming for leisure 613
and image sharing on social networking sites 352–3
and online dating 202
and social media use 339
and use of textese 151
and video game content 616
aging, societal attitudes to 135
aging of populations 133, 134–5
Agosto, D. E. 444, 445
agreeableness:
and active online community participation 288
and image sharing on SNSs 355
and online impression management 49
and social support from online interaction 220
Ahn, I. 177
Ahn, J. 65
Ajzen, L. 638, 640
Al Mutairi, Naser 656
Alberici, A. L. 379
alcohol:
online marketing and young people’s use of 82–3
online social norms campaigns and young people 90–1
regular music video consumption and driving whilst intoxicated 80
social media use and young people’s use of 77–8, 81, 82
social norms theory of 78–9
‘algorithmic management’ 38
Alhabash, S. 373
Allport, G. W. 340
AlphaBay 628
ALS ice bucket challenge 371t, 381
Amazon 649, 663
Mechanical Turk 319
American Psychiatric Association (APA) 13, 453, 456, 564
Amichai-Hamburger, Y. 57, 63, 64, 67, 120, 343
Anderson, C. A. 592
Anderson, S. L. 187–8
Angry Birds 612
Angry Video Game Nerd 35
anime imagery, Japan 594
Anolli, L. 66
anonymity, online 58, 64
anonymous/non-anonymous environment distinction 67
and cyberactivism 379–80
(p. 718) and identification with avatars 50
and impression formation 41–3
and the online self 31–2
and people with an intellectual disability (ID) 42, 267
positive and negative consequences 218
and self-disclosure 223
in video games 513–14
anonymity continuum 42–3
Anonymous hacker group 648, 691, 697–8, 701–2, 703–4, 706, 707
Operation Isis (#OpISIS) 692, 708
targeting Donald Trump 691, 708
Antheunis, M. L. 373
anti-virus technologies 655
AOL Instant Messenger (AIM) 218–19
Apple watch 23
Arab Spring (2010) 371t, 372
and Facebook 698
Arabic world, and OSN usage 176–7, 180–1
Aral, T. 202
Arkin, R. M. 24, 26
Arndt, J. 26
Art of War (Sun Tzu) 666–7
Ashcroft v. Free Speech Coalition (2002), US Supreme Court 594
Association of Sites Advocating Child Protection, The 648
asthma 242
video games and child/adolescent self-management 491, 494–5, 574
attachment:
and partner phubbing 120
and technological interference in parenting relationships 124–5
Attard, A. 244–5
attitudes, and social consequences of online interaction 220–1
Attrill, A. 46, 176, 185, 188, 204
Attrill-Smith, A. 48, 50
Au, A. K. 378
Augustine, A. A. 65
Australia, Internet use by older adults 137, 138
Australian Classification Board (ACB) 616
Australian Seniors Computing Clubs Association 142
autism:
benefits of online inclusion 267, 268
benefits of playing Guitar Hero 573
and online risk 275
autonomy, as predictor of uses and gratifications 342
avatars 268, 310
integration into self 22
and introversion 67
and self-presence 512, 522
Proteus effect 49–50, 51, 519–20
Awan, I. 699
B
Backpage 650
Bailenson, J. N. 50
Baker, Stewart 657
Ballou, K. 82
Bandura, A. 640
Bannon, S. 275, 276, 278
Barak, A. 292
Baranowski, J. 523
Barker, T. H. 125
Barker, V. 414
Bartholomew, K. J. 638
Bassett, D. 478
Batenburg, A. 252
Batey, M. 65, 342
Bayer, J. B. 416
Bazarova, N. N. 224
BBC DoS attack (2015) 681
Be Connected, Australia 142
Beaudoin, M. F. 296
Bebo 693
behavioral confirmation theory 50
behavioral residue 46
Behm-Morawitz, E. 90
Belkin, N. J. 444
Bem, D. J. 40
Benabdellah, Mohamed 656
Ben-Artzi, E. 63
Bennett, K. 254
Bennett, S. 708
Benotsch, E. G. 83
Ben-Ze’ev, A. 60
Bergstrom, J. 374
Berkowitz, A. D. 78–9
Berlin, J. 480–1
(p. 719) Berners-Lee, Tim 261
Berry, N. 403
Berscheid, E. 50
Best, J. 703
Beullens, K. 80, 81
Bieber, Justin 62
Bigl, B. 533
Billedo, C. J. 197
Biocca, F. 512
Bishop, J. 671
Bitcoin 628, 673, 678, 681, 704
BitTorrent 655
Black Lives Matter 371t
black markets, online 628
Blackberry Messenger app 698
Blackboard virtual learning environment 293, 296
Blackhart, G. 202
Blaster 677
Bliuc, A.-M. 372
blogs and blogging 66, 103, 398
average earnings from 405
blogger/consumer relationship 404
‘brand managers’ 405–6
characteristics of blogs and bloggers 399–402
current state 398–9
and cyberactivism 383
extrinsic benefits 405–6
and gender and personality 400–1
hobbyists 400
and mental health 402–5
motivations for 401–2
professionals 400
for the self 402
and self-presentation 404–5
social-adjustive motivations 404
and social connection 403–4
for social support 402–3
uses and gratifications 338
value-expressive motivations 404
Blogosphere 398
Blumler, J. G. 30, 37, 265, 340
Bobkowski, P. S. 85
body image 8, 437
and self-esteem 59
Boeckx, W. 489
Bolino, M. C. 39–40
Bonus, S. 66
Booker, N. A. 80
Bosch-Sijtsema, P. M. 310
Bosworth, K. 492
botnet 681, 681n
Bowker, N. 268
Bowman, M. D. 512
boyd, d. 425
Boyd, d. m. 335
Boyle, S. C. 81, 82
boys, self-disclosure online 423, 424
Božić, J. 85
brain 395, 452, 548–9, 568
effects of video gaming 572–3
and problematic gaming 566–7
BrainHex typology 614, 615
Brey, P. 595, 597
Brezinka, V. 491
Bridges, K. R. 404
brigading 382
Briggs, P. 443
British Psychological Society (BPS) 13
Bronfenbrenner, U. 269–70
Bronkie the Bronchiasaurus for asthma self-management 491
Brown, A. 153
Brown, B. B. 375
Brown, G. 187
Brubaker, J. R. 419–20, 475
Bryant, K. 47, 337, 362
Bryant, P. 595
Bryson, M. 183
Buchanan, H. 248
Buday, R. 524
Bull, S. S. 83
bulletin board systems (BBS) 22, 219, 242
Bullock, E. 246, 253
Bumgarner, B. A. 336
Burt, J. S. 161
Bushman, B. J. 595
Bushnell, C. 161
Bussey, L. 445
Button, M. 670
C
Cabrera-Nguyen, E. P. 81
Cacioppo, J. T. 199
Cacioppo, S. 199
(p. 720) Call of Duty 610
Callison-Burch, V. 475
Calvert, S. L. 592
Campbell, A. 90–1
Campbell, W. K. 511
cancer 291
benefits of video games for children 574, 575
breast 252
chemotherapy and video game distraction 488
Facebook support, Mexico 418–19
online support groups and lurking 291
sharing information, and phase of illness 441
Candy Crush 612
Canvas virtual learning environment 293
CAPTology (Computers as Persuasive Technology) 640
Carbanak cybercrime group 697
Cardersmarket 702
Carr, C. T. 418
Carrier, L. M. 154
catfishing 45, 208–9, 669
Caton, S. 269
Cavazos-Rehg, P. A. 89
Cavezza, C. 672
‘Celebgate’ 667
Chadwick, D. 42, 45, 167, 265–6, 268, 274
Champion, A. R. 84
Chan, L. S. 202
Chang, J. 154
Chang, Y. 418–19
Chapman, M. 269
Charlie Hebdo massacre, Paris (2015) 692
Chau, M. 90
Cheever, N. A. 154
Chen, G. M. 414
Chen, R. 638
Chen, X. 418–19
Chen-Wilson, J. 45, 167
Cheng, W. Y. 80
Cheung, W. S. 297
Chevaliers Romance [link] 616
child pornography/abuse/exploitation (CAM/CEM), online 628, 647
policing 648, 651, 652, 653, 654
Child Pornography Protection Act (1996), US 593
child predators, online 629
ChildLine 670
children:
accommodative use of textese 166
depression and video gaming 570
exergaming 494–5
online harassment statistics 670
psychosocial outcomes of video gaming 570–1
relationship between textese and grammar 162–3
relationship between textese and literacy 160–2
resilience-building for online environments 640–1
and role-play 104–5
self-reports of textism use 156
technology 105–6
toys and play 104–5
video games and health behavior change 523–4, 574–5
video games and health compliance 491–3
video games in psychotherapeutic settings 490–1
video gaming during psychotherapy 573
Chiner, E. 275
Cho, S. E. 188
Choi, S. M. 180
Choo, K. K. R. 696–7, 698, 699, 700
Christensen, H. 254
Chronbach’s alpha score 8
chronic diseases 140
Chung, J. E. 290–1
Church, S. H. 420
Cicchetti, D. V. 8
Cifas 675
Cingel, D. P. 163
Clarke, R. V. G. 636
Classen, C. C. 243
Clinton, Hillary 185
coding 106
Cody, M. J. 49
Coe, J. E. L. 161
Coeckelbergh, M. 601
Cohen, R. 88
(p. 721) cohort effects 125, 557
Coleman, G. 697
Collaborative Aging (in Place) Research Using Technology (CART), US 143
ComicCon Conventions 22
Communication Accommodation Theory 166
computer-assisted (or related) crimes 632, 633
computer-content crimes 632
computer-focused crimes 633
computer-integrity crimes 632
computer-mediated communication (CMC):
abbreviation conventions 152
asynchronicity 29, 44, 206
control over interaction 59–60
editability 43–4, 205–6
emoticons 158
hyperpersonal communication model of (Walther) 28–30, 43–5, 176, 205–6, 224, 415, 425
reallocation of cognitive resources towards message composition 44–5
slang and ‘textspeak’ 45
and social/physical distance 44, 293
conscientiousness:
and image sharing on SNSs 355–6
and online impression management 48–9
and passive online community participation 288–9
and usage of Facebook vs. Twitter 342–3
constructive ecumenical expressivism 602–4, 602 n.11
context collapse 441–2
Conti-Ramsden, G. 161
Contractor, N. 308, 311, 312, 313, 315–16
Convergence Theory 182, 184–5
Coppock, A. 373
copyright infringement see digital piracy
core (actual, true, real) self 18
access and portrayal in online interactions 224
adolescent use of online world to discover 48
and continued online social roles 19–20
and moral and social norms 31
notion disputed by Goffman’s work 39
and online self-presentation, interpretation and manipulation 20–1
and self-discrepancy theory 25–7, 50
stability over time and situation 26
Correa, T. 340
correlation designs 6–8
external validity 6–7, 10, 11
issues and limitations 8
random sampling 6–7, 10
scale construction 7–8
cosplay 22, 513
Coulson, N. S. 245, 246, 248, 253, 291
Council of Europe Convention on Cybercrime 627
couple relationships:
negative impact of social media on young people 88
and technological interference 115, 117, 119–20, 125–7 see also romantic relationships, online
Coyne, S. M. 120, 121, 123, 124, 127
Craig, C. S. 176
Craigslist 650
Creese, S. 669
Crisp, D. A. 254
Cromby, J. 42
crowdsourcing platforms 319
Crowdstrike 655
Crowe, S. M. 166
Cruz, C. 595
Cruz-Moya, O. 159
cryptojacking 678
Crystal, D. 153
cultivation theory 79–80, 81, 82, 90, 92, 534
culture, and online social networks (OSNs) xviii, 173–90
collectivist culture 181
cross-pollination and convergence 181–2, 184–5
cultural hybrids 182
defining culture 174–5
defining online social networks 174
divergence theory 184–5
extremism and radicalism 185
high/low context model of culture (Hall) 175–8
individualistic cultures 181
(p. 722) motivational drives 180
and online self-concept 183–5
and online self-disclosure 176, 187–9
and online self-presentation 185–7
OSNs, culture and motivation 180–2
reciprocity in collective relationships 188
technological architecture of OSNs 181
uncertainty avoidance and self-disclosure 188
Culver, J. D. 246
cyberactivism, and social media xxi, 370–86
brigading 381
cause advocation 381
classic models of collective action 377–9
content creation 381
dissemination 372–3
future of 385–6
may undermine activism 384–5
mobilization problem 372
motives for using social media and their relationship with 374–7
normative behavior demonstration 381
notable cause examples 371t
predicts further social engagement with issues 383–4
sender/receiver relationship 373
and social validation 373–4
specificity/uniqueness of message 373
types of 380–2
vigilantism 382 see also slacktivism
CyberAngels 648
cyberattacks 675–6, 678, 681
policing 655
cyberbullying 58, 630–1, 670–1, 699
and people with an intellectual disability 275
cybercrime:
‘bug bounty’ programs 638
Coder Dojo programs 638
computer-assisted crime 633
computer-focused crime 633
crimes against the virtual person 633
and the ‘dark figure of crime’ 634
defining 627–8, 646–7, 664
diversion and deterrence 637–8
future research 684
human factors exploited by, summary 683, 683–4t
against individuals 665–82, 666f
and online dating 207
and perceived risks for people with an intellectual disability (ID) 274–5
personality variables and susceptibility 640
prevalence 644
preventing 636
quantifying 634–6
reporting 634
resilience building 640–1
rise of xxiv, 627–41
‘Routine Activity Theory’ 636
social engineering and online trickery 666–70
target resistance development 638–41
types of 628–32, 664–5
typologies of 632–3
cybercrime, group element xxv, 691–709
carding forums 702
crime-as-a-service models 696–7, 703
and the Dark Web 693–4, 703, 704
and forums and chat rooms 693, 702
groups as perpetrators of cybercrime 694–9, 700t
groups as victims of cybercrime 699–700, 700t
hacktivists 697–8
hate groups 699
how online criminal groups form and operate 701–8
ideologically and politically motivated cyber groups 697–8
individuals and 698
motives and means 706–8
and offline crimes 701–2
online criminal marketplaces 703
organized cybercriminal groups 697
platforms used by 693–4, 701–4
profiling cybercriminals 707
and social media 693
and transnational organized crime 695–6
(p. 723) trust as a factor for criminal group formation 704–6
young people as victims of 699–700
cybercrime policing xxiv–xxv, 637, 645–58
challenges with extralegal efforts and interventions 656–7
corporate security organizations 650
governmental non-police organizations 651
industry mechanisms 654–5
Internet users and use groups 648–9
law enforcement challenges 653
need for public-private partnerships 657–8
need for support for technical solutions 658
network infrastructure provides (ISPs) 649–50
non-governmental, non-police organizations 651
public police organizations 652
social media companies 657
typology 648
virtual environment security managers 649
cyber-deceptions/thefts 632, 647
cyberetiquette, as barrier to people with an intellectual disability (ID) 271
cyberharassment see harassment, online
cyberlanguage:
advantages for people with an intellectual disability (ID) 268
as barrier for people with an intellectual disability (ID) 271
cyber-pornography see pornography, online
cyberpsychology:
as a branch of psychology 4
as a field of study 4
as a scholarly discipline 3
as a science 3
cybersecurity companies 655
cyberstalking 14, 631, 647, 672
cyberterrorism 631–2
cyber-trespass 632, 646–7
cyber-violence 632, 647
D
Dailymotion 381
Daley, A. 495
Dance Dance Revolution (DDR) 495, 572
Dancetown 573
Danforth, C. M. 364
Danowski, J. 423
Daprosy worm 677–8
Dark Web (Dark Net) 628, 676, 681
and cybercrime groups 693–4, 703, 704
Darkmarket 702
Darkode forum 705–6
Das, E. 252
Data & Society Research Institute study of online harassment 670
data breaches, online 675–6
dating see online dating
David, M. E. 120, 121
Davis, J. H. 704
Davis, J. P. 362
Davis, M. H. 30
Day, K. D. 333
De Bruyckere, P. 101–2
De Caluwé, E. 200, 202, 204
de Kort, Y. 533, 549
De Simone, J. J. 383
death see digital legacy; mourning and memorialization on
social media; post-mortem data management
deception, and research 14
Deci, E. L. 30
decision-making (Systems 1/2) 639
Deguchi, A. 181
DeHaan, S. 26
Dehlawi, Z. 441
Dekker-van Weering, M. 494
Delfabbro, P. H. 457
dementia:
and assistive technology 139–40, 141
carers and vlogs 437–8
and use of digital technologies 138
Denial/Distributed Denial of Services (DoS/DDoS) attacks 632, 666, 678, 681, 692, 698
Dennen, V. P. 296
Denning, D. 631–2
Dental Fear Central online support community 248
Department of Business, Innovation and Skills (BIS), UK 652
(p. 724) depression:
and image sharing on SNSs 363–4
and online support communities 254
and problematic gaming 566
symptoms reduced by video gaming in adults 572
symptoms relieved by exergames 573
and young people’s video gaming 569, 570
Depression Quest 522
DeSmet, A. 492
Deters, F. G. 11, 421
Dew, M. 202
Dhoest, A. 184
diabetes 249, 437, 574
Facebook support groups 419
video games and self-management 491, 492, 494
Diagnostic and Statistical Manual of Mental Disorders (DSM-5) 454, 456, 457, 458, 564
DSM-5 SUD 456
Diamond, M. 595
diaries, health-related 442
digital divide 263–4
digital games, concept of 558–9 see also video games
digital health information xxii, 435–45
curating 442–4
electronic healthcare records 442–3
future directions 444–5
and identity management across contexts 441–2
and life transitions 440–1
peer-to-peer sites 436–8
and phase of illness 441
platform or channel effects 440
privacy concerns 438
sharing and self-disclosure 438–42
trust concerns 438–9
digital hoarding 444
digital legacy 444, 468, 470–1, 474–81
disruptive or painful aspects 478–80
helpful aspects 476–8
loss (‘second death’) 477, 479–80
Digital Millennium Copyright Act, US 655
digital native, myth of, and higher education xvii, 98–110
‘academic digital literacy’ 101
digital literacy 101–4, 106–7, 109
implications for higher education 108–10
lifelong learning 109–10
mobile technologies in schools 107
and parents and the family 104–5
professional development and career change 109–10
shaping experiences 104–8
social media technologies and academic practices 105
technology culture between home and school 107–8
technology practices 100–1, 102, 103, 104
technology practices, in school 106–8
world of work and digital literacy 103
young people’s experiences with technology 101–4 see also children; young people (adolescents and emerging adults)
‘digital natives’ 173
speaking to the deceased on Facebook 477–8
digital piracy/copyright infringement 630, 635, 638, 647
cease and desist letters 655
policing 654–5
digital self (res digitalis) 470
posthumous persistence 470–1
Discord 559
discussion forums 89, 242, 293, 294
disinhibition see online disinhibition effect
displacement theory 118–19, 124, 126
Dixon, M. 161
Dolev-Cohen, M. 292
Dong, Q. 333
Dorpatcheon, N. 64
Douglas, S. P. 176
Dourish, P. 419–20
Downey, J. 185
doxxing (doxing), online 676
Dream Intensity Scale (Yu) 547
drive-by downloads 679
Driver, B. 153
Drossaert, C. H. C. 252
Drouin, M. 153, 164
(p. 725) drug use:
and false consensus 79
and GTP 545, 546
Drury, J. 697
dual pathway model of collective action 377–8, 379
Duck, S. W. 207
Duffield, Amy 480
Duffield, Sharon 480
Duggan, M. 87
Duggan, Marie 670
Duggan, Mark 698
Dumas, T. M. 362
Dunn, R. A. 67
Dünser, A. 5
Durkin, K. 161
Dustman, R. E. 487
Dyn DDoS attack (2016) 678, 681
dyslexia 489
and use of textese 161
Dyson, B. J. 538
E
Earle, A. M. 82
earworms 539
eating disorders 32, 59, 78, 437
online social norms campaigns 91
and young people’s media use 88–9
YouTube support 419 see also pro-anorexia websites
eBay 649, 663
e-commerce governance 648–9
Edipo, P. 63
educational technology 99–100, 102
educational video games 513, 615
Eftekhar, A. 343, 355
Eggermont, E. 489
Eggermont, S. 363
eHarmony.com 200
e-health, eHealth 138, 141, 436–8
Eichenberg, C. 491
Eklund, L. 611
El Emam, K. 441
e-learning environments 292–6
blended (‘hybrid’) learning 292
blended learning, advantages and disadvantages of 293–4
encouraging active participation 297
outcome of active and passive participation on education success 295–6
predictors of active vs. passive participation 294–5
using students as facilitators 297
Ellison, N. B. 206, 335, 416, 417–18
Elmore, K. C. 79
Elphinston, R. A. 5
emails:
asynchronicity 44
lack of physical proximity to message recipient 44
spam 647
university instructors’ responses to formal vs. informal 166
use by older adults 137 see also phishing
embodied cognition 515
Emmelkamp, P. M. G. 493
Emmerson, R. Y. 487
emojis 158
emoticons 23, 27, 158, 159, 176, 222, 268, 293
empowerment:
interventions using video games 488, 574
and online support communities 252
Eno, C. A. 66
Entertainment Software Association (ESA) 451, 509, 618–19
Entertainment Software Rating Board (ESRB), US 616
equality and the Internet 62–3
Equality Act (2010), UK 700
‘equalization hypothesis’ 42
Erola, A. 668
Erwin, L. 154
escapism, and online networks 337, 339, 375
Eschler, J. 440
Eskenazi, T. 202
eSports 613, 614–15
Etgar, S. 120
‘ethical hackers’ 629
Ethical Hackers Against Pedophilia 648
ethics:
and accessing digital messages 155
in online research 13–14
in research 12–13
(p. 726) Europol and cybercrime 696–7
Evans, S. K. 511, 515
exergames/exergaming 494–5, 523
and the elderly 495
and improvement in cognitive functioning 572
and mood improvement 573
and overweight/obesity 495
social benefits 572
expectancy violation theory (EVT) 118
experimental research methods 9–11
controls 9–10, 11
dependent measures 9
field experiments 11
internal validity 10–11
issues and limitations 11
manipulation 9
random assignment 10–11
extinction process 9
extraversion 63–5
and ‘actual self’ on Facebook 48
and adolescent online self-expression 85
and benefits of social media 422
and image sharing on SNSs 343, 353–4
interaction with gender in Internet use 401
and impression management online 48
and number of Facebook friends 343
and online participation 288
as predictor of uses and gratifications 341
and social media use 340–1
and usage of Facebook vs. Twitter 342
eye movement tracking 4–5
Eynon, R. 273
F
Facebook 5, 11, 42, 51
active vs. passive use 219, 222, 228
attempt to prevent revenge porn 658
attitudes, and social consequences of use 220–1
battles with families of deceased users 480–1
and belonging 60
and cancer support, Mexico 418–19
conflicting research on effects 217–18
and connecting with others 414–15
and continuing bonds with the deceased 474–81
and cyberactivism 372, 375, 380, 381, 382, 383
and cyberstalking 672
dead people outnumbering live users 467–8
editability 44
and ethical concerns for research 12–13
and extraversion-introversion 48, 65, 342
face-to-face connection compared 415
feature changes and updates 345
and girls’ self-image 6
graphic interchange formats (GIFs) 27
group aspect 693
and health-related issues 437, 440, 441
and health-related issues, online health communities compared 441–2
health support groups on 418–19
as ‘hunting ground’ for identity thieves 675
image sharing on 250, 352–3, 354, 355, 356, 358, 360, 361, 362, 363
implications of ‘friend’ term 271
and individualistic US culture 187
‘in-memory-of’ feature 476
Japanese use and self-disclosure 188–9
and jealousy and surveillance 197
lonely individuals’ use 228
‘Look Back’ feature 475, 480
motives for using 375
needs and outcomes 345
‘newsroom’ webpage 174
‘Notes’ feature 398
number of users 467
personality factors and self-presentation on 48, 49, 65
personality factors and social consequences of use 220
personality predictors of usage 342–3
as platform for action and engagement 698
positive self-presentation and self-esteem 50
posts linked with names or images 218
private messages vs. status updates 416–17
profile memorialization 475–6
rates of use 396, 413
and revenge porn 673
Saudi Arabian use 180
(p. 727) self-disclosure, and perceived intimacy with Facebook friends 416
self-presentation, US/South Korean students 186, 188
sexually suggestive posts and young people’s risky sexual behavior 79
social anxiety and self-disclosure in private vs. public spaces 422
and social comparison 228
and social support 226, 417–18
speaking to the deceased on 476, 477–8
technological architecture 181
‘Timehop/Year in Review’ features 443, 475
Timeline 474–5
and well-being 420, 433
and US/Singapore cultural identity 186
use by older adults 137
use in France 187
uses and gratifications 333, 334, 335, 336, 337, 338, 339
vlogging on 399
volume of news and illusion of being informed 384
world dominance 467
young people and alcohol posts 79, 80–1
Facebook Messenger 137, 219, 475
Facetime 28, 29, 137
Fahlmann, Scott 158
Fair Use Policies 649–50
Falcone, R. 704
Falk, E. B. 416
fall technology systems for older adults 139
false consensus 79
fantasy selves 22
fantasy world 66–7
Farina, F. 153
Farrell, L. 153
Farrer, L. 254
fear of missing out (FOMO) 61
Federal Bureau of Investigations, US 652
Federal Trade Commission (FTC), US 651
Felson, M. 636
Feng, Y. 444, 445
Fenton, N. 185
Ferguson, C. J. 592, 595
Ferraro, G. P. 174–5
field experiment 11
Financial Coalition Against Child Pornography (FCAP) 654
Finckenauer, J. O. 695–6
Finkelhor, D. 85, 699
Finkenauer, C. 197
Finn, J. 250
firewall 639–40
First World War 442
Fitt’s Law 10
Five Night at Freddy’s 522
Fleming, P. 638
Flickr community 360
flow 568, 573
Flynn, A. 673
Flynn, R. 495
Fogg, B. J. 181, 640
Foo, S. S. 492
Ford, R. 632, 666
Fortune, N. 637
Fortune Magazine 680–1
forums:
and cybercrime groups 693–4, 702, 703, 705, 707
discussion 89, 242, 293, 294
and game transfer phenomena 533
health 290, 438, 440
uses and gratifications 338
video game 285, 636
Fox, J. 50
Fox, S. 63, 67
fraud, online 630
Advance Fee 630
Freedom House Freedom On The Net report (2015) 184
Freud, S. 471–2
Friendster 467
Frison, E. 363
Frith, J. 43
Fritz, J. 533
Froidvaux, N. M. 81
Frumkin, H. 246
Fulk, J. 315
Fullwood, C. 42, 45, 48, 49, 50, 167, 204, 265–6, 268, 336, 343, 403
fun and enjoyment, and the Internet 61–2
Fung, V. 489
Furnell, S. M. 633
(p. 728) G
Gaddis, S. 65
Galbraith, N. 336
Gallagher, Michael 451
Gambetta, D. 705
game intelligence 513, 522
Game of Thrones 37
game transfer phenomena (GTP) xxiii, 532–51
altered auditory perceptions 538–9, 544f
altered body perceptions and relational experiences 539–40, 544f
altered chronoceptive perceptions 540
altered sensorial perceptions 537–8
altered visual perceptions 538, 544f
appraisal, consequences and implications 547–9
automatic mental processes 536, 540–1, 544f
background 533–4
behaviors or actions 541–2, 544f
colored after-effects 538
conditions for manifestation 542–3
core in-game and structural characteristics relevant for 550
directions for future research 550–1
distress and dysfunction 548
duration of the experiences 542–3
forms of manifestation 537–42, 544f
framework and definition 536–7
gaming disorder and problematic smartphone use 546
and gaming habits 544–5
incubation period for manifestation 542
intentional 536, 541
motion sickness symptoms 539
motivations for playing and in-game behaviors 547
origin of 535–6
prevalence and severity 543
and proficiency level and experience 545
psychopathological features 545–6
relevance of gaming platform and video game features 549–50
research approach 535–7
sensations of unreality 540
Sickness of Disembarkment syndrome 539
socio-demographic factors 544
tendency to recall dreams 547
‘Tetris effect’ 534–5
types of transfer 533
video game genres associated with 549
virtual world/reality mix-ups 534, 542
waterfall effects 583
gamer identity 559, 610–11, 618, 619
adolescents 571
gamers 610–11
casual 610–11, 613
hardcore 610–11, 613
‘social’ 612
who they are 610–11
Games With A Purpose (GWAPs) 509
gamification 509
future directions 524–5
and reinforcement 518–19
gaming disorder/Internet gaming disorder (IGD)/gaming addiction xxii, 456–60, 486
analogy with substance dependence 566–7
assessment tools 453–6
controversy around concept 564–5
criteria 453, 454, 541
current approaches to clinical and psychometric assessment 453–6, 455t
and deception 457
definitional differences 565
DSM-5 454, 456, 457, 458
DSM-5 SUD 456
and game perpetuity 514
as a genuine addiction 458–9
guilds (gaming groups) 452
and Internet addiction 456, 458
and GTP 546, 550–1
IGD-20 Test 454
IGDS9-SF 454
IGDT-10 454
and Massively Multiplayer Online Role-Playing Games (MMORPGs) 452–3
prevalence of 565
psychological overview 451–60
withdrawal symptoms and tolerance 457 see also problematic gaming
Garcia, S. 63
Gardner, J. E. 490
Gartner Hype Cycle for Emerging Technologies 525
(p. 729) Gazzard, Hollie 480
gender:
and blogging 401
and casual/hardcore gaming 611
and image sharing on SNSs 353, 358, 359
interaction with age and personality in social media use 341
interaction with personality in Internet use 401
and online dating 201
and psychosocial outcome of gaming 571
and social media use 339–40
and use of textese 160
and video games 612, 616–17, 618
Geniets, A. 273
Gentile, B. 511
Germany, low-context culture 176
‘gerontechnology’ 136
Gerr, F. 246
Get Safe Online 668
Ghost Security Groups 706, 707
targeting ISIS 708
Ghuman, D. 618
Giang, M. T. 90
Gibbs, J. L. 308
Gibson, J. J. 510–11
Giesbers, B. 297
Gilles, B. 489
Gillespie, B. J. 201
Giordano, R. 445
girls:
intimacy in adolescent friendships 423, 424
self-image 6
and sexualized content on social media 84, 87
Giulietti, P. A. 362
Gleason, M. E. J. 30
Global AgeWatch Index 133
Glock, S. 598–9
goal persistence, and social consequences of online interaction 220
goals:
and behavior change 519
and self-presentation/impression management online 21, 24, 30–1, 46–7
Godson, R. 695–6
Goffman, E. 22–4, 38–9, 40, 44, 206, 442
Goldberg, L. R. 220, 535
Goldsmith, M. 669
Gollwitzer, M. 595
Gone Home 522
Gonier, D. 414
Gonzaga, G. C. 199
Gonzales, A. L. 50
Goodno, N. H. 672
Google 536
Google Hangouts 219
Goossens, L. 375
Gordon, F. 268, 271
Gordon, S. 632, 666
Gosling, S. D. 46, 65
Govender, M. 488
Grace, A. 153, 154, 156, 159, 160, 165
Graham, M. B. 425
Grand Theft Auto 515
graphic interchange formats (GIFs) 27
Graves, Tom 657
Gray, J. 6
Gray, K. 253
Great Fantasy Migration hypothesis 511
Greek mythology 666
Green, A. S. 30
Green, T. 412
Greene, J. A. 419
Greenfield, P. M. 425
Greenhow, C. 425
Greitmeyer, T. 592
Grieve, R. 415, 421
Griffiths, K. M. 254
Griffiths, M. D. 454, 534, 618
Grindr 200
Grov, C. 201
Guadagno, R. E. 66, 67
Gudykunst, W. B. 186
Guess, A. 373
Guillory, J. E. 12
Guitar Hero 538, 573
Gurevitch, M. 30, 37, 265, 340
H
hacker groups 691, 692
hacking 629, 666, 647, 676–81
human factors exploited by 677, 678–9, 680, 681, 684t
nation-state sponsored 655
hacktivists 697–8
(p. 730) Hale, W. C. 89
Hall, E. T. 175–8, 179
Hall, J. A. 49
Hall, M. 175
Hall, M. N. 455
Halpern, D. 120–1
Hamburger, Y. A. 63
Hamlett, C. 490
Hamm, J. 139
Hance, M. A. 202
Hancock, J. G. 12
Hancock, J. T. 50, 200, 206, 224
Hanney, J. 153
Hansa 628
Hanson, G. 337
Happn 200
Harambe the gorilla 371t
harassment, online (cyberharassment) 631, 666, 670–4
human factors exploited by 672, 683t
Haridakis, P. 337
Harnish, R. J. 404
Harrington, S. 166
Harrison, B. 639
Hart, L. 162
Hartmann, T. 600
Haslam, S. A. 177
hate crimes 674
offender categories 708
hate speech 631
Haug, S. 91
haveibeenpwned.com 680
Hawkins, R. 251
Hawthorne Effect 6
Hayes, G. R. 419–20
Hayes, R. A. 418
health behavior change, and video games 523–4, 574–5
health information online, UK 241
health support groups and forums, online 437
information disclosure, Facebook compared 441–2
lurking in 286, 288, 290–2
and self-disclosure 438, 440
and social support 418–19
Healthy Surfers project 277
Henry, N. 673
Herath, T. 638
Herring, S. C. 66, 84, 154
Hew, K. F. 297
Hi5 693
Hiekkanen, K. 352
Higgins, E. T. 18, 25–7, 206
high/low context model of culture 175–8
Hill, C. W. L. 175
Hillier, L. 183–4
Hiniker, A. 123
Hinsch, C. 414–15
Hinsley, A. W. 340
hippocampus 572
Hoffman, E. W. 83
Hofstede, G. 175, 178, 179
Hollenbaugh, E. E. 403
Holloway, S. L. 425
Holmes, K. M. 267, 275
Holt, T. J. 702
Holtgraves, T. 160
Holthe, T. 140
Holtzman, N. 65
Hooghe, M. 384
Horn, E. 490
Hornecker, E. 5
House, J. S. 225
Huesmann, L. R. 595
Hughes, D. J. 65, 342
Huh, J. 445
human computer interaction (HCI) 19
Hume, David 602–3
Hunt, D. S. 372
Huo, Y. J. 379
Hwang, H. 383
hyperpersonal communication model (HPCM) 28–30, 43–5, 176, 205–6, 224, 415, 425
I
I2P (the Invisible Internet Project) 694
ideal self 18
and self-discrepancy theory 25–7, 50
identity claims 46
(p. 731) identity exploration:
and adolescent use of social media 424–5
and identity multiplicity in video games 514
Identity Fraud Study, US (2018) 664
identity management, and impression management 57
identity-related cybercrimes (identity theft and identity fraud) 629–30, 657, 666, 674–6
human factors exploited by 675, 683t
Ienca, M. 139
Iizawa, D. 181
Ijsselsteijn, W. A. 533, 549
ILOVEYOU see Lovebug
image sharing on social networking sites xx–xxi, 349–65
age demographic of users 352–3
and agreeableness 355
comparing types across platforms 359–60
and conscientiousness 355–6
documenting events 360
and escapism 362–3
and extraversion 353–4
Facebook, Instagram, and Snapchat 350–1
food images 358–9
and gender differences 353, 358, 359
impression management 359, 361–2
mental health impact 363–4
motivations for 360–3
and narcissism 357
and neuroticism 354–5
and openness to experience 356–7
relationship building and maintenance 360–1
and self-expression 361–2
self-ratings/observer ratings of personality 361
and surveillance/voyeurism 362
travel-based 360
types of image 357–60
impression management and self-presentation, online xvi–xvii, 12, 35–52
acquisitive self-presentation 24, 26
and anonymity and pseudoanonymity 41–3
and blogging 404–5
and culture 185–7
defining 36–8
how people manage impressions online 45–7
and identity exploration in young people 425
and image sharing on SNSs 359, 361–2
impacts on the self 49–50
interchangeability of terms 21, 38
interpretation, manipulation and 20–1
motivations for 39–41
and others’ self-portrayals 23–4
predictors of online self-presentation experimentation 47–9
protective self-presentation 24
relationship between impression management and self-presentation 36–8
selective, and social comparison 227
and self-disclosure/intimacy connection 224
self-presentation strategies 24–5
and slacktivism 384
and theories/models of the self 21–32, 38–9, 43–5
two component model (impression motivation and impression construction) 41, 46–7
unsavory 51
and use of textese 166
and well-being 420–1
Inflammatory Bowel Disease online support communities 246
information and communication technologies (ICTs):
ICT literacy 101, 103
‘traditional’ 306
Information Solutions Group (ISG) 612
informed consent 13, 14
Ingress and GTP 549
inhibition, online compensation for 65–7
Inoue, Y. 512
Instagram 374, 417, 467, 475
and acquisitive self-presentation 24
age demographic of users 352
and body image issues 88
and ‘bulimia symptomology’ 88
and cyberactivism 375
(p. 732) and depression 364
editability 44
graphic interchange formats (GIFs) 27
group aspects 693
and health-related issues 437
image sharing on 351, 352, 355, 356, 357, 358–9, 360, 361, 362, 363
and impression management 23–4, 51–2
motives for using 47, 374–5
and ‘orthorexia nervosa’ 88
and self-discrepancy theory 26
use by older adults 137
uses and gratifications 334, 335, 337
vlogging on 399
and well-being 421
young people and pro-substance use posts 82
instant messaging 420, 425
as rehearsal space 423
and social cues 29
intelligent agents (non-human) 307–8
Intelligent Assistive Technology (IATs) and dementia care 139
International Center for Missing and Exploited Children 654
Internet, significance to us as individuals 663–4
Internet Crimes Against Children (ICAC), US 652
Internet of Things (IoT), and cybercrime 664, 675, 678, 680
Internet Relay Chat (IRC) 23, 693
Internet Watch Foundation 648, 651
interpersonal process model of intimacy 221–2
introversion 63–5, 67–8, 353–4
and avatars 67
and blogging 66
and online chats 65–6
and online participation 288
intrusion detection systems (IDS) 650
Ip, A. 158
Irwin, M. D. 477
ISIS 60, 697
online groups targeting 692, 708
WhatsApp and Telegram 694
Ito, N. 181, 188
Iuga, G. 668
J
Jacks, W. 674
Jackson, E. 162
Jacobsen, J. K. S. 360
Jaeger, P. T. 273
Jalil, R. 188
Jansz, J. 600, 614
Japan, high-context culture 175
Jenaro, C. 264–5, 268–9
Jenkins, H. 182
Jha, Paras 633
Jiang, L. C. 224
Jin, B. 416
Jin, S. A. A. 416
job interviews:
email applications 29
face-to-face, telephone, and videoconferencing compared 28
impression motivation and impression construction 41
Johansson, Scarlett 667
Johnson, K. 201
Johnson, P. R. 376
Joinson, A. N. 44, 335, 337, 338, 417, 639
Jones, C. 102
Jones, E. E. 40
Jones, H. A. 490
Jones, L. M. 85
Jones, W. 443–4
Joo, K. Y. 186
Joshi, P. 153
Juul, J. 600
K
Kaggle crowdsourcing community 316
Kahneman, D. 639, 669
Kaminska, Z. 161
Kapidzic, S. 84
Kaplan, H. 64
Kardashian, Rob 86
Kardefelt-Winther, D. 457
Kasket, E. 476–7
Kaspersky 655
Katz, E. 30, 37, 265, 340
(p. 733) Katz, J. E. 120–1
Kaye, J. 142
Kazaa 679
Kee, K. F. 12
Keep, M. 48
Keipi, P. 700
Kelly, H. H. 117
Kelly, L. 118
Kemp, N. 153, 154, 156, 159, 160, 161, 163–4
Kende, A. 377
Kerkhof, P. 197
Kerr, J. 670
Keskinen, T. 271
keyloggers 679–80
Khalid, C. 84, 361
Khan, M. L. 376
Kharrazi, H. 485
Kik 694
Kim, H. S. 373
Kim, J. 50, 420–1, 471, 480
Kim, K.-O. 383
Kim, M. 375
Kim, Y. 180
Kim, Y. J. 65
King, D. L. 453, 457
Kinnally, W. 80
Kirschner, P. A. 101–2
Kirwan, G. H. 633, 637, 638
Kitayama, S. 183
Kittler, M. G. 176
Klahr, R. 627–8
Klass, D. 472–3
Kleemans, E. R. 699
Klein, O. 378, 384
Klimstra, T. 375
Kneer, J. 598–9
Knight Rider 23
Ko, S. J. 46
Kony, Joseph 371t
Koronczai, B. 456
Kowalski, R. M. 41, 46–7, 671, 699
Krahé, B. 595
Kramer, A. D. 12
Krasnova, H. 121, 127
Kraus, L. A. 30
Kraut, R. 63
Kraut, R. E. 440
Krishnan, A. 374
Kristofferson, K. 384
Krugman, P. 406
Krulikowski, C. 374
Kübler-Ross, E. 472
Kupersmidt, J. B. 79
Kuss, D. J. 452
Kydland, F. 271
L
LaBrie, J. W. 81, 82
Ladas, M. 598
Lala, G. 372
Lam, C. S. 277
Lamberts, K. 669
Lampe, C. 417–18
Lampke, E. 702
Langberg, H. 495
Lankton, N. K. 438
Lannutti, P. J. 478
Lantos, N. A. 377
Larsen, L. H. 495
Lau, P. W. 494
Lauterbach, D. 441–2
Lawrence, Jennifer 667
Leach, C. W. 184
League of Legends 616
Leary, M. R. 20, 41, 46–7
Lee, A. 65, 342, 512
Lee, C. S. 362
Lee, E. 65, 375
Lee, E.-J. 379
Lee, J. 38
Lee, J.-A. 375
Lee, J. W. 492
Lee, J.-E. R. 50, 420–1
Lee, M. Y. 277
Lee, S. 337, 338
Lee, S. Y. 251
Lee-Won, R. J. 186
Lemke, R. 204
Lenhart, A. 86, 423
Leonardi, P. M. 308, 311, 312, 313, 316
Leukfeldt, E. R. 698–9, 701
Leung, L. 338
Lever, J. 201, 708
Lewandowski, G. 166
(p. 734) Lewis, Z. H. 519
LGBT groups:
as cyberstalking targets 672
online anonymity and identity exploration 36
and online dating 201
and online harassment 670, 692, 699
teens and ONS use 183–4
Liang, Y. 494
Likert scales 8, 156, 333
Lim, M. 177
Lim, Y. S. 38
Limperos, A. M. 344
LinkedIn 21, 340, 417
as ‘hunting ground’ for identity thieves 675
use by older adults 137
Linz, D. G. 595
Li-Tsang, C. W. 277
Litt, D. M. 79, 82
Liu, C. 420
Liu, J. 314
Liu, Q. 294
LiveJournal 398
Livingstone, A. G. 184
Lizard Squad 691
Löfgren-Mårtenson, L. 271
London bombings (2007) 360
loneliness 11, 375, 421
benefits of social media 422
and online interaction 228–9
and use of social network sites 61
Long, J. 161
Long, K. M. 176–7, 376
‘Lovebug’ (ILOVEYOU) malware 633, 677
Lu, A. S. 485, 495
Lu, L. 189
Luchman, J. N. 374
Luck, M. 599
Luckenbill, D. F. 703
Luijkx, K. 141
LulzSec hacking group 691, 697, 701–2, 705, 707, 708
Lund, H. H. 495
Lup, K. 363
lurking, psychology of online xx, 285–98
and commitment to the group 289
definitions 285–6
effects 289–90
in e-learning environments 292–6
motivations for 288–9
and nature of the online group 289
as negative behavior 286
in online support groups and health forums 290–2
personal and situational determinants 287–90
and personal characteristics 288–9
and personality traits 288–9
and privacy concerns 289
rates of 286
recommendations for engaging lurkers 296–8
as a transformatory process 287
Luyckx, K. A. 375
Lyddy, F. 153
Lyons, E. J. 519
M
Ma, L. 288
Macafee, T. 383
Macintosh, L. 183
MacKellar, B. 444
Mackinnon, A. J. 254
Madden, M. 87
Madrigal, A. C. 475
Mafia Wars 596
Magdy, S. 694
Maheo, V.-A. 384
Maldonado, G. J. 63
Maleche, H. 80
Malik, M. 352, 361
Malik, S. H. 291
Malinen, S. 286
Malinowsky, C. 140
malware (malicious software) 629, 647, 677–9
anti-malware software 639–40
Microsoft responses 656
vectors 678–9
Manago, A. 187, 425
manga imagery, Japan 594
Mann, I. 668
(p. 735) Mannarelli, T. 46
marijuana, social media and young people’s use of 81, 82
Markey, P. M. 592
Markus, H. R. 183
Martens, L. 614
Martin, A, M. 83
Martin, D. 595
Martin, F. H. 159
Martin-Sanchez, F. 253
Maslow, A. 60, 334
Massively Multiplayer Online Role-Playing Games (MMOs, MMORPGs) 452
and academic performance 571
age and gender of average player 616–17
and fantasy migration 511
and game-based perceptions 549
and gaming disorder 452–3
gender, and motivation for playing 614
and perpetuity/portability 514
and relatedness 521
and sociability/collaboration 514 see also World of Warcraft
Masuchika, G. 594
Match.com 200
Matrix, The (1999) 451–2
‘mall haul’ vlogs 404–5
Maxwell-Smith, M. 362
Maye, R. C. 704
Mayer-Schönberger, V. 470
Mayhew, E. 442
Mazur, E. 204
Mazuro, C. 296, 297
McArthur, D. 442
McAteer, J. 602–3
McBride, C. M. 524
McCain, J. 511
McCain, J. L. 357
McCarthey, S. J. 27
McClimens, S. J. 268, 271
McCormick, M. 591, 595
McDaniel, B. T. 120, 121–2, 123, 124, 125, 127
McDevitt, J. 708
McEwan, T. E. 672
McGarty, C. 372
McGoldrick, D. 418–19
McGrath, J. E. 314
McGuire, M. 698, 699
McKell Institute 135
McKenna, K. Y. A. 30
McKnight, D. H. 438
McMahon, C. 345–6
Meachem, S. 162
measurement:
common measures 4–5
reliability and validity 4
role of 4–5
media richness theory 218
Mehl, M. 421
Mehl, M. R. 11
Meier, E. P. 6
Melissa virus 677
Mendelson, A. 335, 337, 358
mental health and blogging 402–5
Merolli, M. 253
Messerli, F. H. 8
#MeToo 370, 371t
m-health tools 141
Michaud, M. 164
Michinov, N. 187
microblogging 398–9
Microsoft Kinect 512, 576, 617
Microsoft responses to malware 656
Mikulic, M. 13
Milesi, P. 379
Mill, J. S. 591
Miller, D. T. 80
Miller-Ott, A. E. 118
Minecraft “Let’s Play” commentaries 35
Miners, Kimberley 208
minority communities:
effects of online victimization of young people 90
sexting by 84
video game play, and negative perceptions of 89
‘Mirai’ virus 633
Mitchell, J. K. 183–4
Mitchell, K. J. 85, 699
Mixi:
Japanese use and self-disclosure 188–9
technological architecture 181
(p. 736) Mo, P. K. 291
mobile (cell) phones:
and displacement 119
and expectancy violations 118, 119
negative impact on social gatherings 116–17
obsessive or compulsive use 126–7
ownership rates 151
and technological interference in couple relationships 119–22
and technological interference in family and parenting relationships 122–5
use by older adults 137
use by young people with an intellectual disability (ID) 265 see also phubbing
Mohammed, Ahmed 371t
Moje, E. B. 27
Monero virtual currency 704
Monge, P. 308, 311, 312, 313, 316
Monsegur, Hector ‘Sabu’ 705
Moon, J. H. 375
Moorman, M. 336
Mora, M. 63
morals, and the online self 31–2
Morgan, P. L. 639
Morris, M. E. 46, 441
Morris, N. 336, 343
motivation for mindreading, and uses of Facebook 220
mourning and memorialization on social media xxii, 419–20, 467–82
bereavement models 471–4
continuing bond model 472–3
continuing bonds on Facebook 474–81
control issues 478–81
‘coping paradox’ 478
five-stage model of grief 472
Freud’s ‘grief work’ 471–2
online memorials before Facebook 473–4
posthumous online life and digital afterlife 468–71
‘second death’ fears 477, 479–80 see also digital legacy
Mull, I. R. 337, 338
Müller, P. 385
multiple selves 18–19
multi-tasking:
human difficulties with 123–4
using multimedia 61, 68
Mumsnet 35
Munar, A. M. 360
Munson, S. A. 441
Muntinga, D. G. 336
Murphy, E. C. 495
Muscanell, N. 84, 361
Muslims, as targets of online hate crimes 674, 699
My Aged Care portal, Australia 142
mylol.com 87
MySocialBook 443
MySpace 467, 693
profiles of the deceased 419
uses and gratifications 333
N
Nabi, R. L. 420
narcissism:
and fantasy migration 511
and image sharing on SNSs 357
Narcissistic Personality Inventory 357
National Cancer Institute, US 242
National Crime Agency (NCA), UK 652
National Society for the Prevention of Cruelty to Children (NSPCC) 670
Neff, J. J. 315
nested ecological model 269–71, 270f
neurodermatitis and video game distraction 487–8
neuroticism/emotional stability:
and image sharing on SNSs 354–5
interaction with gender in Internet use 401
and online impression management 49
and online self-disclosure 343
and online self-expression 400
and passive online community participation 289
as predictor of uses and gratifications 342
and social media use 340–1
and usage of Facebook vs. Twitter 342
New World Hacking 681
Newman, M. W. 441–2
Newton-John, T. 88
Ng, Y. J. 639
(p. 737) Niche Theory 345
Nicholls, C. M. 670
Nieminen, M. 352
Nintendo Wii 512, 572, 617, 618
Nishida, T. 186
No-IP 656
Noller, P. 5
nomophobia 127
Nørskov, M. 31
Norwegian ‘welfare technology’ 140
Nurse, J. R. C. 627, 668, 669
Nygård, L. 140
Nys, T. 600
O
Oakhill, J. V. 161
Obama, Barack 370
Obar, J. 413–14
observational research 5–6
observer bias 6
Occupy movement 371t
O’Connor, T. J. 489
Odinot, G. 706
Ofcom 264
Office for National Statistics (ONS) Crime Survey of England and Wales (2016) 664
Ogburn, E. L. 199
OKCupid 200
Okdie, B. M. 66, 396
Oksanen, A. 700
older adults, and digital technologies xvii–xviii, 133–44
benefits of exergames 495, 572, 573
dementia and assistive technologies 139–40, 141
and the ‘digital divide’ 135
digital inclusion 136
digital technology use by 135–8
evidence for assistive technologies 138–40
health professionals/service providers, and technologies 140–1
and image sharing on SNSs 352
and impression management 48
issues involved 140–1
reasons for non-use 137–8
risk of falls and assistive technologies 139
and smart home technologies 141
technology for health 138–42
technology to support 136
telecare technology 142–3
what is needed 141–2
Oldmeadow, J. 424
O’Loughlin, N. 267
Olson, P. 697
O’Neill, N. K. 153
online dating 195, 199–210
age and usage 202
agreeability and impression management 49
and asynchronicity 206
and casual sex 202
characteristics of daters 201–3
gender differences 201
homophily 203
impression motivation and impression construction 46–7
and infidelity 198
LGBT people 201
location-based real-time dating (LBRTD) services 199–200
‘matching’ process 200
motivations for 203–4
negative side of 206–10
and ‘online disinhibition effect’ 203, 205
and people with disabilities 204
and personality traits 202
popularity 199
pros of 204–6
and self-discrepancy theory 26
and sexual orientation 200, 201
teen dating websites 87
textspeak and behavioral residue 46
types 199–201
up-dating 209–10
website/app use differences 199 see also catfishing; revenge porn; romance scams
online disinhibition effect 203, 205, 218, 223, 294, 341
and self-disclosure 415–16, 675
online groups as multidimensional networks xx, 306–21
cloud servers 314–15
conventional and network view of groups 319, 320t
(p. 738) defining online groups 308–9
embedding context 315–18, 317f, 319
methodological embeddedness 316
multidimensional network framework 311–13
multiplex ties 311–15, 318
online/offline comparisons 307, 308, 309, 312
people and technologies as nodes 313–14
prior research 309–11
psychological embeddedness 316–17
sociological embeddedness 316
transforming nature 307–8
Online Hate Crime Hub 674
online self xvi, 17–33
and escapism 22
vs. human computer interaction (HCI) 19
involuntary 20
and morals and social norms 31–2
and theories of the self 21–32
unhealthy 32–3
voluntary 20
who am I online? 19–21
online/offline (“real”) world 19
open source software (OSS) 316
openness to experience:
and impression management on SNSs 356–7
interaction with gender in Internet use 401
and social media use 340–1
and usage of Facebook vs. Twitter 342
#OpISIS cyber-attack campaign 692, 708
optimal matching theory of online support communities 251
Optimum Bias 640
Orchard, L. J. 336, 341
organized crime, transnational 695–6
orthorexia nervosa 88
Ortiz, R. R. 85
Ortiz de Gortari, A. B. 534, 535–6, 548
Osborne, D. 379
ostracism 395
O’Sullivan, R. 424
Ouellette, G. 164
ought self 18, 26
and self-discrepancy theory 25–7
Owen, R. 670
P
Packy & Marlon for diabetes self-management 491
Page, Bettie Mae 31
Pan European Game Information (PEGI) system 616
Pang, J. S. 80
Papacharissi, Z. 335, 337, 358
parent-child relationships, and technological interference (technoference) 123–4
and attachment problems 124–5
and child behavior 124, 125
children’s responses to parent’s mobile devise use 125
as dysfunctional circular process 125
future studies to address issues 127–8
Parisod, H. 494
Park, N. 12, 49, 416
Park, S. G. 186
Parkinson’s disease online support forums 244–5
Parks, M. R. 516
Parrila, R. 159
Pasquinelli, E. 595
password hacking 680–1
dictionary attacks 680
guessing 680
weak passwords 680–1
pastebin.com 676
Patel, R. 445
patient support groups, online 316
Patinadan, P. V. 492
Patouris, E. 638
Patridge, S. 592, 596–7, 597 n.6
Patterson, R. 85
PC/laptop access, people with an intellectual disability (ID) 264
Pederson, C. L. 84
pedophilia, virtual 597, 597 n.6, 599–600, 601
policing 648
Peloza, J. 384
Pennebaker, J. W. 402
Pennington, N. 477, 478, 479
people with an intellectual disability (ID), digital inclusion for xix–xx, 261–79
and access to information 268–9
barriers to getting online 269–74, 270f
benefits of being online 265–6, 266b
(p. 739) chrono-system barriers 274
and comorbidities 271
contextual underpinnings of getting online 262–5
cybercrime and online risk 274–6
definition 262–3
difficulties with cyberlanguage and cyberetiquette 271
exo-system barriers 272–3
individual barriers 271
and lack of literacy skills 271
macro-system barriers 273–4
meso-system barriers 272
micro-system barriers 272
motivation for online inclusion 265–9
and occupation and enjoyment 269
and online anonymity 42, 267
and online dating 204
and personal identity 267–8
and policy 263
prevalence of Internet use and being online 263–5
social utility 266–7
strategies to remove barriers 277
support to develop online skills 276–7
support to manage online risk 277–8
and theory 263
perceived reality of online interactions (PROI) 221
Perkins, H. W. 78–9
Perron, B. 250
Persky, S. 524
personality:
and blogging 400, 401
BrainHex typology 614
and choice of media option 37
definition 340
extroversion-introversion 63–5
Five Factor Model (‘big five’) 342, 400
and image sharing on social networking sites 353–7
and impression management 48–9
interaction with gender in Internet use 401
and Internet use xvi–xvii, 57–69
and lurking