首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Internet use has increased rapidly in recent years, and has inevitably led to some negative outcomes, notably cyber bullying and cyber victimization. The purpose of this study was to examine the effects of cyber victimization and parent–adolescent communication on self‐esteem, and the moderating role of parent–adolescent communication in the relationship between cyber victimization and self‐esteem among Turkish adolescents. The participants were 337 adolescents with a mean age of 16.37, (SD = 0.89). The results of hierarchical regression analysis reveal that self‐esteem was predicted negatively by cyber victimization, but positively by mother–adolescent communication. Results also indicate the moderating roles of parent–adolescent communication in the links between cyber victimization and self‐esteem. The findings indicate a need to consider the parent–adolescent relationship while working with victimized youth, and the implications for research and practice are discussed.  相似文献   

2.
许为  葛列众 《心理科学进展》2018,26(9):1521-1534
当前新技术、人机交互的新特征、社会和人的新需求给中国人因学(Human Factors)的进一步发展创造了一个有利时机。本文首先讨论和分析了一些具有代表性的开拓了人因学科研究深度和广度的新技术和新途径, 包括神经人因学, 认知工程, 协同认知系统, 社会技术系统; 以及人因学科应用中的一些挑战和策略。然后, 就进一步发展我国的人因学科, 本文提出首先要解决的问题是建立多学科交叉的人因学科的科研教育体制, 并在此基础上, 注重理论创新, 以创新设计为突破点, 在智能系统、用户体验、航天航空和医疗健康等领域中优先发展和应用。当前迫切需要解决的是, 建立完善的人因学科高校教育体系, 建立完善的人因学科多学科交叉的科研体系, 以及建立人因学科行业资质标准和设计标准体系。  相似文献   

3.
A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber‐physical systems: complex interconnections of cyber and physical components. When cyber‐physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision‐making procedures needed for this are executed based on fault‐tolerant communication and voting and consensus procedures, while the results of these decision‐making procedures are stored in distributed ledgers. Due to the intercommunication, interaction, and independent decision making by autonomous systems, the new whole of a blockchain is a complex entity. Complexity science rather than the usual reductionist scientific approach can help us better understand the behaviour of the new and continuously developing whole of a blockchain as a technological phenomenon.  相似文献   

4.
The article draws the links between social engineering and sociotechnics (and its various forms). It introduces and gives examples of the concepts of sociotechnical duels, social warpiness, and maneuverability of social factors. Also an attempt is made to describe links among various types of social systems and types of sociotechnical activities. Finally, the concept of sociotechnical paradigm (teleological scheme of efficient social activity) is developed. Adam Podgorecki is professor of sociology at Carleton and Warsaw Universities. He is the author of numerous works, includingLaw in Society, Practical Social Sciences, Story of a Polish Thinker, and 25 volumes of Si-tien's fiction.  相似文献   

5.
Abstract

The emphasis of this theoretical note focuses on the link between the concepts of uncertainty and resourcefulness in performance contexts such as professional sport and manufacturing industry. Integrative themes from sport, work, and organization psychology are highlighted. Rigid work organization based on job demarcation and inflexible role specification reduces personal control and instils perfunctory attention to work procedures. In contrast, the sociotechnical systems approach provides a framework for examining how localized control of variance in performance output may be developed through the recognition and promotion of tacit knowledge in individuals. Additionally, through consideration of the theory of learned resourcefulness, the self-regulation of goal-directed activities and a repertoire of cognitive-behavioural skills are suggested as important factors influencing productivity and health at the organizational and individual level. Throughout, the interconnection between these diverse theoretical perspectives is discussed.  相似文献   

6.
许为  葛列众 《心理科学进展》2020,28(9):1409-1425
智能技术为智能时代的工程心理学研究和应用提供了新的机遇。为此, 系统提出了智能时代工程心理学的工作框架。该工作框架包括工程心理学研究和应用的对象、核心问题空间、学科理念、研究重点、应用范围、方法等。智能时代的人机关系呈现出一种新的形式: 人机组队式的人机合作关系。“以人为中心的人工智能”应该是智能时代工程心理学的学科理念。针对智能技术, 近期工程心理学研究者开始开展围绕新型人机关系的理论框架和基本问题、人机组队中的心理结构和决策控制、人机交互等方面的研究工作。为有效支持智能系统的研发, 概括总结了一些工程心理学新方法和提升的方法。最后, 针对当前工程心理学所面对的一些挑战提出了具体的建议。  相似文献   

7.
An Armed Services Vocational Aptitude Battery (ASVAB) Review Panel, with expertise in personnel selection, job classification, psychometrics, and cognitive psychology developed recommendations for changes to the military enlistment test battery. One recommendation was to develop and evaluate a test of cyber/information and communications technology literacy to supplement current ASVAB content. This article summarizes a multiphased Cyber Test development process: (a) a review of information/computer technology literacy definitions and measures, (b) development and pilot testing of a cyber knowledge measure, (c) validation of test scores against final school grades (FSGs) for selected technical training courses, (d) development of an operational reporting metric and subgroup norms, and (e) examination of construct validity. Results indicate the Cyber Test has predictive validity versus technical training school grades and incremental validity comparable to the ASVAB technical knowledge tests when used with the ASVAB Armed Forces Qualification Test (AFQT) verbal/math composite as a baseline.  相似文献   

8.
The primary purpose of this study was to evaluate the relationship between decreased empathy (i.e., cognitive and affective) and indirect and cyber peer aggression among Latinx adolescents during their transition to high school. Further, we examined the degree to which social anxiety moderated this relationship. Participants were 469 Latinx ninth graders, ages 13–17 years (M = 14.52, SD = 0.58; 58% girls). Adolescents completed the Revised Peer Experiences Questionnaire, Cyber Peer Experiences Questionnaire, Basic Empathy Scale, and Social Anxiety Scale for Adolescents at two different time points, 3 months apart. Hierarchical linear regression analyses revealed concurrent and prospective relationships between lower cognitive empathy and the perpetration of both indirect and cyber aggression. In addition, social anxiety moderated the concurrent associations between both types of empathy and both types of aggression perpetration. Results suggest that interventions that facilitate cognitive empathy and decrease social anxiety may help to reduce adolescents' indirect and cyber aggression toward peers throughout the high school transition.  相似文献   

9.
以598名大学生为被试,采用问卷法考察群体相对剥夺与网络集群攻击行为的关系,检验以群体愤怒和群体效能为中介变量的双路径模型及群体认同在双路径模型中所发挥的调节作用。结果发现:(1)群体相对剥夺显著正向预测网络集群攻击行为;(2)群体愤怒和群体效能在群体相对剥夺与网络集群攻击行为之间有中介作用;(3)群体认同在群体相对剥夺通过群体愤怒和群体效能影响网络集群攻击行为的双路径模型中起调节作用。  相似文献   

10.
This study investigated the relationship between cognitive mechanisms, applied by people to rationalize and justify harmful acts, and engagement in traditional peer and cyber aggression among school children. We examined the contribution of moral disengagement (MD), hostile attribution bias, and outcome expectancies, and we further explored the individual contribution of each MD mechanism. Our aim was to identify shared and unique cognitive factors of the two forms of aggression. Three hundred and thirty‐nine secondary school children completed self‐report measures that assessed MD, hostile attribution bias, outcome expectancies, and their roles and involvement in traditional and cyber aggression. We found that the MD total score positively related to both forms of peer‐directed aggression. Furthermore, traditional peer aggression positively related to children's moral justification, euphemistic language, displacement of responsibility and outcome expectancies, and negatively associated with hostile attribution bias. Moral justification also related positively to cyber aggression. Cyber aggression and cyber victimization were associated with high levels of traditional peer aggression and victimization, respectively. The results suggest that MD is a common feature of both traditional and cyber peer aggression, but it seems that traditional forms of aggression demand a higher level of rationalization or justification. Moreover, the data suggest that the expectation of positive outcomes from harmful behavior facilitates engagement in traditional peer aggression. The differential contribution of specific cognitive mechanisms indicates the need for future research to elaborate on the current findings, in order to advance theory and inform existing and future school interventions tackling aggression and bullying. Aggr. Behav. 36:81–94, 2010. © 2009 Wiley‐Liss, Inc.  相似文献   

11.
In this study, the relationships between cyber bullying and involvement in traditional bullying, with reference to social support and gender differences, was examined. Social support plays an important role in empowering victims of cyber bullying and has a significant influence on children and teenagers’ well-being. A sample made up of 458 Israeli junior high students (242 female, 216 male) in the age range of 11 to 13 completed 4 questionnaires. Results indicated that there is an overlap between involvement in cyber bullying and involvement in traditional bullying. The findings indicate that girls were more likely to be cyber victims than boys and that boys were more likely to be cyber bullies than girls. Examination of the relationships between gender and social support variables such as friends, family, and others, shows that girls who were cyber victims reported having more support in all 3 types than cyber bullied boys. These findings can serve as a basis for prevention and intervention programs to cope with cyber bullying.  相似文献   

12.
This study examined adolescents’ cyberbullying, cyber aggression, and cyber victimization from an evolutionary perspective, extending previous research showing that traditional forms of bullying, aggression, and victimization are associated with reproductively relevant outcomes. Consistent with hypotheses based on theory and research linking bullying and aggression to intrasexual competition for mates, results indicated that cyber victimization was positively associated with a number of dating and sexual partners. Findings for cyber aggression were more complex, depending on the degree of cyber victimization experienced by the perpetrator, and the balance of power between the perpetrator and victim. Specifically, nonbullying cyber aggression by perpetrators with equal or less power than the victim had stronger positive relations with the number of dating or sexual partners when perpetrators experienced a high level of cyber victimhood. In contrast, cyberbullying by perpetrators with more power than the victim was negatively associated with the number of dating partners when the perpetrators’ exposure to cyber victimization was low. Although cyber aggression and cyber victimization are new forms of aggression that involve the use of modern electronic devices, the results of this study demonstrate the usefulness of viewing this behavior from an evolutionary perspective and show that adolescents are likely to use cyber aggression against rivals in the context of intrasexual competition for mates.  相似文献   

13.
The ultimate concern of cognitive engineering is how complex sociotechnical systems might be designed so that humans can work within them and control them safely and effectively. Because of this, large amounts of observational data analysis and knowledge elicitation are incorporated in cognitive engineering. At many points, these two methodologies coalesce. In this paper, we describe two complementary cognitive engineering software tools—MacSHAPA and COGENT—that are being developed alongside each other. MacSHAPA is designed for observational data analysis, and COGENT is designed for knowledge elicitation and cognitive engineering, but both sup-port requirements gathering. We first outline current trends in cognitive engineering that have given rise to the need for tools like MacSHAPA and COGENT. We then describe the two tools in more detail, and point to their similarities and differences. Finally, we show how the two tools are complementary, and how they can be used together in engineering psychology research.  相似文献   

14.
与现实自我相对,网络自我是个体在网络世界中的自我。在网络生活日益普及的今天,探讨网络自我与现实自我之间的关系具有重要意义。综合自我身份、外形及人格等方面的研究,可以得知网络自我在一定程度上是现实自我的虚拟投射,但对于一些容易受到社会评价的特征,个体会对网络自我进行适度的理想化。同时,网络平台属性以及用户个人特征都会影响网络自我与现实自我之间的关系。未来研究可以结合不同平台与场景、多种研究方法、在不同文化背景下对网络自我与现实自我之间的关系进行进一步探索。  相似文献   

15.
The concept of intuition has, until recently, received scant scholarly attention within and beyond the psychological sciences, despite its potential to unify a number of lines of inquiry. Presently, the literature on intuition is conceptually underdeveloped and dispersed across a range of domains of application, from education, to management, to health. In this article, we clarify and distinguish intuition from related constructs, such as insight, and review a number of theoretical models that attempt to unify cognition and affect. Intuition's place within a broader conceptual framework that distinguishes between two fundamental types of human information processing is explored. We examine recent evidence from the field of social cognitive neuroscience that identifies the potential neural correlates of these separate systems and conclude by identifying a number of theoretical and methodological challenges associated with the valid and reliable assessment of intuition as a basis for future research in this burgeoning field of inquiry.  相似文献   

16.
ABSTRACT

The authors' aim was to investigate gender and cultural differences in the attributions used to determine causality for hypothetical public and private face-to-face and cyber victimization scenarios among 3,432 adolescents (age range = 11–15 years; 49% girls) from China, Cyprus, the Czech Republic, India, Japan, and the United States, while accounting for their individualism and collectivism. Adolescents completed a questionnaire on cultural values and read four hypothetical victimization scenarios, including public face-to-face victimization, public cyber victimization, private face-to-face victimization, and private cyber victimization. After reading the scenarios, they rated different attributions (i.e., self-blame, aggressor-blame, joking, normative, conflict) according to how strongly they believed the attributions explained why victimization occurred. Overall, adolescents reported that they would utilize the attributions of self-blame, aggressor-blame, and normative more for public forms of victimization and face-to-face victimization than for private forms of victimization and cyber victimization. Differences were found according to gender and country of origin as well. Such findings underscore the importance of delineating between different forms of victimization when examining adolescents' attributions.  相似文献   

17.
The functional‐cognitive meta‐theoretical framework has been offered as a conceptual basis for facilitating greater communication and cooperation between the functional/behavioural and cognitive traditions within psychology, thus leading to benefits for both scientific communities. The current article is written from the perspective of two functional researchers, who are also proponents of the functional‐cognitive framework, and attended the “Building Bridges between the Functional and Cognitive Traditions” meeting at Ghent University in the summer of 2014. The article commences with a brief summary of the functional approach to theory, followed by our reflections upon the functional‐cognitive framework in light of that meeting. In doing so, we offer three ways in which the framework could be clarified: (a) effective communication between the two traditions is likely to be found at the level of behavioural observations rather than effects or theory, (b) not all behavioural observations will be deemed to be of mutual interest to both traditions, and (c) observations of mutual interest will be those that serve to elaborate and extend existing theorising in the functional and/or cognitive traditions. The article concludes with a summary of what we perceive to be the strengths and weaknesses of the framework, and a suggestion that there is a need to determine if the framework is meta‐theoretical or is in fact a third theoretical approach to doing psychological science.  相似文献   

18.
Children and young adults with neurodevelopmental disorders (ND) are at increased risk of bullying compared to typically developing peers. It is still unclear to what extent they are involved in cyber bullying. This systematic review aimed at studying the prevalence of cyber bullying as perpetrators, victims, or both (“bully-victims”) among students with ND in a school setting and in need of special education. The Web of Science, Scopus, ERIC, PsycINFO, PubMED, and Cochrane databases were searched including a manual search of reference lists, until February 24, 2018. Eight studies conducted in Europe, North America, the Middle East, and Australia were included reporting a prevalence of cyber-victimization among students with ND of 0%–41%, a prevalence of cyber-perpetration of 0%–16.7%, and a prevalence of bully-victims of 6.7%. Three out of five studies using control groups showed that students with ND might be more involved in cyber bullying overall compared to typically developing students. Students in segregated school settings report slightly higher prevalence rates of cyber bullying compared to students with ND in inclusive school settings, especially among girls. When comparing prevalence rates among studies using the same definition, we found similar prevalence rates. There was a tendency towards students with ND being more involved in cyber bullying compared to typically developing students, but this needs to be confirmed in future studies that should include control groups with typically developing students as well as validated and standardized measurements of cyber bullying and ND diagnoses.  相似文献   

19.
The present study was conducted to investigate the impact of cyber aggression and cyber victimization on the mental health and well-being of young adults. The sample consisted of 508 young adults, ages ranging from 18 to 25 years (mean±SD = 20.53 ± 1.77 years, 68.5% female). The data were collected from young adults studying at various universities of Rawalpindi and Islamabad, Pakistan. The participants completed the Cyberbullying and Cyber Victimization Scales, Depression, Anxiety, and Stress Scales (DASS-21), and The Warwick–Edinburgh Mental Well-being Scale (WEMWBS). The results showed a significant effect of cyber victimization on mental health and well-being. After controlling for the effect of age, gender, and residential status (staying at hostel vs. home), the cyber victimization significantly negatively predicted the well-being and significantly positively predicted mental health (i.e., depression, anxiety, and stress). In contrast, cyber aggression appeared to have a nonsignificant impact on both the mental health and well-being of young adults. Furthermore, the moderating role of gender was assessed for the effect of cyber victimization on mental health. The results revealed that the effect of cyber victimization is moderated by gender only on anxiety. Findings suggest that females are more vulnerable to develop anxiety due to cyber victimization as compared to their male counterparts. The findings of the study have important theoretical and practical implications and suggest the inclusion of some gender-specific strategies to develop counseling programs to save young adults from the negative psychological and emotional impacts of cyber victimization.  相似文献   

20.
Military operators in various environments such as cyber, remotely piloted aircraft, and image analysis are required to use sustained attention or vigilance for long periods. During this time they encounter lapses in attention attributable to the monotonous nature of their tasks. Mistakes during these tasks can have serious consequences. The purpose of this study was to investigate the use of an eye-tracker to detect changes in vigilance performance during a simulated cyber operator task. Twenty participants performed 4 sessions of a 40-min vigilance task while wearing an eye-tracker. Blink frequency, blink duration, PERCLOS (percentage of eye closure), pupil diameter, pupil eccentricity, pupil velocity, and signal detection all had a significant change over time (p < .05) during the task. The significant change of oculometric measurements indicates oculometrics could be used to detect changes in vigilance for military operators. Future research is needed to assess real-time effects of these oculometrics on performance, especially in a real-world setting.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号