Cyberpsychology: Journal of Psychosocial Research on Cyberspace https://cyberpsychology.eu/ <p><em>Cyberpsychology: Journal of Psychosocial Research on Cyberspace </em>is a diamond open access, online, peer-reviewed scholarly journal published by Masaryk University. The journal is focused on social science research about cyberspace. It brings psychosocial reflections of the impact of the Internet on people and society. The journal is interdisciplinary, publishing works written by scholars of psychology, media studies, communication science, sociology, political science, ICT security, organizational psychology and also other disciplines with relevance to psychosocial aspects of cyberspace. The journal accepts original research articles, as well as theoretical studies and research meta-analyses.</p> <p>Follow our profiles on social media:</p> <p><a href="https://mobile.twitter.com/cyberpsy_jn" target="_blank" rel="noopener"><img src="https://cyberpsychology.eu/public/site/images/ldedkova/mceclip0.png" width="40" height="40" /></a> <a href="https://www.facebook.com/cyberpsychologyjournal" target="_blank" rel="noopener"><img src="https://cyberpsychology.eu/public/site/images/ldedkova/mceclip3.png" width="40" height="40" /></a> <a href="https://www.linkedin.com/company/cyberpsychology" target="_blank" rel="noopener"><img src="https://cyberpsychology.eu/public/site/images/mbedrosova/linkedin.png" alt="" width="41" height="41" /></a></p> Masaryk University, Faculty of Social Studies en-US Cyberpsychology: Journal of Psychosocial Research on Cyberspace 1802-7962 <p>By submitting a work (hereinafter referred to as the “Work”) into the <em>Cyberpsychology: Journal of Psychosocial Research on Cyberspace</em> (<a href="https://cyberpsychology.eu/">https://cyberpsychology.eu/</a>) (hereinafter referred to as the “Journal”) for the consideration for publication, the author grants the Masaryk University (hereinafter referred to as “MUNI”) a license to the Work, under the following conditions:</p> <p><strong>1. Author’s Statements</strong></p> <p>1.1 The author declares that the Work is free of copyright or other legal defects, it was neither published anywhere else, nor simultaneously offered for publication, except the platforms of standard scientific pre-submission communications (e.g. SSRN, ResearchGate, Academia).</p> <p>1.2 The author declares that he/she is the real author or the joint author of the Work and his/her freedom to grant the license is not limited or excluded, and the author is entitled to dispose of the Work, because especially, but not limited to:</p> <ol> <li>the Work is not an Employee work where the employee would not be entitled to exercise the rights to the Work,</li> <li>using of the Work within the scope of the granted license is not limited by the conditions of provided grant or other financial support</li> <li>using of the Work within the scope of the granted license is not limited by the third parties’ rights (e.g. copyright, the right to the protection of personal data),</li> <li>the Work is not the work of joint authors, where the other joint authors would not agree to grant the license.</li> </ol> <p>1.3 In the case that the Work is the work of joint authors, the author declares that all the joint authors have been informed of these License Terms and that he/she is authorized to grant MUNI the license under these License Terms on behalf of the joint authors.</p> <p>1.4 The author agrees that if the Work is accepted for publication, the proposal to conclude a license agreement for the Work will be on his/her behalf aimed at an indefinite number of persons, while the content of the agreement will be determined by reference to the publicly available licence conditions <em>Creative Commons BY-SA 4.0 International </em>(available from: <a href="https://creativecommons.org/licenses/by-sa/4.0/">https://creativecommons.org/licenses/by-sa/4.0/</a>); such proposal will not be done for the works or the elements (e.g. image or photographic documentation) used by the author in the Work under a contractual license with a third party.</p> <p>1.5 If any of the author’s statements prove to be untrue, the author is aware that he/she is liable for the resulting damage, including the costs associated with any litigation and damage caused by a violation of the Journal’s and/or MUNI’s reputation.</p> <p><strong>2. License Grant</strong></p> <p>2.1 The author grants MUNI gratuitous non-exclusive license to use the Work in all the known manners of use (especially, but not limited to, reproduction, distribution and communication to public), individually, in the collection or together with any other works or elements unlimited as regards to amount and form and media of expression (including electronic).</p> <p>2.2 The license is granted as territorially and quantitatively unlimited.</p> <p>2.3 The license is granted royalty-free.</p> <p>2.4 The license is granted for the duration of economic rights to the Work.</p> <p>2.5 MUNI shall be entitled to grant an authorisation forming part of the licence to the third party or parties, in whole or in part under a sublicense agreement, with or without remuneration.</p> <p>2.6 By granting the license, the author agrees with including the Work into the scientific and bibliographical databases (eg. EBSCO, CEEOL) as well as information systems for providing the informational services, where the Journal is currently indexed as well as those, where it will be indexed <em>pro futuro</em>.</p> <p>2.7 MUNI shall be not obliged to make use of the license.</p> <p><strong>3. Further Use of Work</strong></p> <p>3.1 Given granted the non-exclusive license to the Work, the author shall be entitled to further use the Work. For the purpose of such further use of the Work, the author shall be obliged to state the Journal as the source of publication of the Work.</p> <p>3.2 In the case of disclosure of the Work on the platforms of standard scientific pre-submission communications within the meaning of Art. 1.1, the author shall be obliged to additionally state the Journal as the source of publication of the Work, without undue delay.</p> <p>3.3 The reputation of MUNI and/or Journal shall not be negatively affected by the further use of the Work.</p> <p><strong>4. Varia</strong></p> <p>4.1 Legal relations based on the license shall be governed by the laws of the Czech Republic; any disputes arising out of the license shall be settled by the courts of the Czech Republic.</p> <p>4.2 If the Work is rejected for publication in the Journal, the license shall be, at the moment of the decision of rejection, restricted in such a way that it shall cover use of Work only in the necessary extent within related editorial activities (e.g. review and archiving).</p> Childhood risks and problematic smartphone use: Dual processes of life history strategy and psychological distress https://cyberpsychology.eu/article/view/33834 <p class="Abstract"><span lang="EN-US">Problematic smartphone use (PSU) and its negative consequences among adolescents are so commonly observed that they have become a matter of public concern. Utilizing life history (LH) theory, this study aims to examine how childhood risks (i.e., childhood harshness and unpredictability) would be associated with adolescent PSU via cognitive and emotional processes of LH strategy and psychological distress. A sample of 459 Chinese high school students aged from 14 to 18 (M = 16.90) participated in this study and voluntarily completed an anonymous survey. The results showed that childhood unpredictability and psychological distress were positively correlated with PSU, whereas childhood harshness and the two processes of LH strategy were negatively correlated with PSU. Path analysis further supported a partial mediation model, in which childhood unpredictability increased PSU, via serial mediators of the emotional process of LH strategy and psychological distress. The findings support the efficacy of LH theory in elucidating the development of behavioral addiction. However, the direct and negative association of childhood harshness with PSU was unexpected. It implicates the complexity of childhood environment on adolescent behavioral addictions and warrants further investigation.</span></p> Meng Xuan Zhang Lisbeth Ku Anise M. S. Wu Copyright © 2024 Meng Xuan Zhang, Lisbeth Ku, Anise M. S. Wu https://creativecommons.org/licenses/by-sa/4.0 2024-09-18 2024-09-18 18 4 10.5817/CP2024-4-1 Problematic use of social media in adolescents or excessive social gratification? The mediating role of nomophobia https://cyberpsychology.eu/article/view/35873 <p class="Abstract"><span lang="EN-US">The term problematic social media use (PSMU) refers to the interference produced by social networks in everyday life, where online participation is perceived as rewarding and continues despite negative consequences. The constant gratification (peer connection, instant notifications, scrolling, and variable rewards) has negative consequences for the well-being of adolescents, from the fear of not being connected to developing negative moods. Recent studies of uses and gratifications theory suggest that user preferences, such as the search for friendships and maintaining social relations, are related to PSMU. Based on that theory, this study analyzes the mediating role of nomophobia in the link between social use (social gratification) and problematic social media use among adolescents in Madrid (Spain). The research was conducted in 2022 with adolescents aged 14–17 (N = 820), who self-reported the use of social media, nomophobia, and problematic social media use (Adolescent Risk of Addiction to Social Networks and the Internet Questionnaire; ERA-RSI). The data were analyzed using structural equation modeling (SEM) with partial least squares (PLS). The gratification-oriented social use offered by social networks in interactions with other people and nomophobia were explanatory variables for problematic use in adolescent participants. As predicted, nomophobia mediates the link between social use and PSMU. Social use and nomophobia were positively and significantly related, with a medium effect size. The preference for online social interaction and fear of losing this connection contribute significantly to PSMU. The results revealed the need for school-based prevention and intervention programs for digital well-being.</span></p> Vanesa Pérez-Torres Copyright © 2024 Vanesa Pérez-Torres https://creativecommons.org/licenses/by-sa/4.0 2024-09-18 2024-09-18 18 4 10.5817/CP2024-4-2 “He flattered me”. A comprehensive look into online grooming risk factors: Merging voices of victims, offenders and experts through in-depth interviews https://cyberpsychology.eu/article/view/36761 <p class="Abstract"><span lang="EN-US" style="color: black;">Online grooming is the process by which an adult uses the Internet to initiate a dynamic of </span><span lang="EN-US">sexual persuasion and victimisation through online contact to obtain an encounter or sexual content from a minor. Although there is an abundant literature of attempts to define the risk factors for grooming, fewer studies have addressed the risk factors qualitatively through direct interviews with offenders, victims and experts. Further understanding such characteristics of the grooming process allows the development and improvement of evidence-based prevention programmes, designed to target specific risk factors. To deepen our understanding of how risk factors operate and how offenders exploit minors’ vulnerabilities, the European H2020<sup>1</sup> project RAYUELA conducted 15 in-depth interviews with offenders, 8 with victims, and 23 with subject-matter experts from different European countries. The results, based on a categorical content analysis, are consistent with previously reported risk factors for victims. Social isolation was revealed as the most relevant factor. The age of greatest risk is in adolescence due to the characteristics of this developmental stage, among which sexual curiosity stands out. In relation to gender, although girls receive more requests from groomers, boys are more likely to accept them, showing a different perception of the risk. Other relevant factors found non-heterosexual sexual orientation, and poor family communication. In addition, a high percentage of offenders were found to be from the victims’ environment. Thus, a relevant conclusion is that risk factors cannot be separated from structural aspects of the offline reality, such as gender stereotypes and lack of sex education, so focusing on them in prevention may be more effective than addressing exclusively Internet aspects. </span></p> María Reneses María Riberas-Gutiérrez Nereida Bueno-Guerra Copyright © 2024 María Reneses, María Riberas-Gutiérrez, Nereida Bueno-Guerra https://creativecommons.org/licenses/by-sa/4.0 2024-09-18 2024-09-18 18 4 10.5817/CP2024-4-3 Cognitive screening for children: Piloting a new battery of interactive games in 4- to 8-year-old children https://cyberpsychology.eu/article/view/33802 <p>Cognitive screening at the preschool age can be helpful in the early detection of possible difficulties before the start of school attendance as problems during schooling can have profound consequences. While interactive tools are still limited for the Czech population, tools used for cognitive screening at a younger age often consist of traditional pen-and-paper methods. Such examinations can be very demanding and time-consuming. This pilot study therefore focuses on the usability testing of a newly developed battery of interactive games used for the screening of selected cognitive functions in children aged four to eight in a less demanding and more attractive way. The battery consists of three interactive games testing (1) attention (selective attention), (2) executive functions (inhibitory control), (3) memory (episodic-like memory). The study sample included 24 participants of preschool or younger school age, ranging from 4 to 8 years old, girls = 12 (50%). The analyses also concentrated on the comparison of the newly designed screening tool with selected traditional test methods. The results suggest that the newly developed battery is feasible, and for children, it is entertaining and attractive. The designed cognitive battery is a promising tool for the screening of cognitive functions in younger school-age children.</p> Markéta Jablonská Iveta Fajnerová Tereza Nekovářová Copyright © 2024 Markéta Jablonská, Iveta Fajnerová, Tereza Nekovářová https://creativecommons.org/licenses/by-sa/4.0 2024-09-18 2024-09-18 18 4 10.5817/CP2024-4-4 Can time flow differently if you are a virtual reality newcomer? https://cyberpsychology.eu/article/view/35248 <p class="Abstract"><span lang="EN-US">Virtual Reality (VR) technologies have entered many aspects of daily life (e.g., workplace, education, gaming). VR users report that time flows faster when immersed in a virtual environment. Such an effect is supported by recent scientific evidence (Mullen &amp; Davidenko, 2021). Indeed, a familiarity effect could foster such a time compression effect. To investigate this possibility, a between-subject design was adopted: in one condition, participants explored a virtual environment through a head-mounted display (HMD), whereas in the control condition, participants explored the same environment through a standard monitor. Participants were all instructed to produce an interval of 4 minutes so that longer produced durations in an interval production task were evidence of underestimation. Adopting a prospective time estimation paradigm, the time intervals produced were compared between the two conditions. Results confirmed the time compression effect: participants in the VR condition reported longer produced intervals than participants in the control condition. Furthermore, the significant interaction with levels of prior experience with VR technologies suggests that time compression effects may be more pronounced for VR newcomers, thus favoring an interpretation in terms of familiarity. The present findings provide valuable insights into the perception of time in virtual environments, suggesting the importance of continued research in this emerging technology. Limits, implications, and the need for further research are finally discussed.</span></p> Anna Manfredi Sofia Dal Lago Daniele Luigi Romano Alessandro Gabbiadini Copyright © 2024 Anna Manfredi, Sofia Dal Lago, Daniele Luigi Romano, Alessandro Gabbiadini https://creativecommons.org/licenses/by-sa/4.0 2024-09-18 2024-09-18 18 4 10.5817/CP2024-4-5 Analysis of cognitive behavioural therapy apps for generalised anxiety disorder: Evidence-based content and user experience https://cyberpsychology.eu/article/view/20849 <p>Mental illness substantially contributes to the global burden of disease, with anxiety high in prevalence. The increase of mobile technology, mental health apps have potential to lessen this burden. However, within apps, the use of evidence-based interventions, such as cognitive behavioural therapy (CBT) are limited. Regardless, many commercially available mental health apps are highly rated by users, highlighting the need to understand what makes mental health apps valuable to the user. The contribution of this study was to uncover apps that support generalised anxiety disorder (GAD) and worry with a CBT basis, explore app functionality, and user experience. Firstly, by identifying apps that support GAD and worry and included CBT. Secondly, by identifying and analysing therapeutic and engagement functions within the apps, and finally, by thematically analysing user reviews. Six apps were identified to support GAD and worry that purported to be CBT-based. However, CBT therapeutic features and engagement features were minimally present in the apps. User reviews yielded 112 comments about the apps and key themes were identified about the app users’ global experiences with the app, and about the combination of technological (e.g., useability, reliability) and therapeutic experiences (e.g., learning and using skills). Future development of quality apps to support GAD and worry must consider the empirical standing of both therapeutic and technology aspects, to provide efficacious and engaging interventions.</p> Teresa Munteanu Lee Kannis-Dymand Prudence Millear Monique Jones Copyright © 2024 Teresa Munteanu, Lee Kannis-Dymand, Prudence Millear, Monique Jones https://creativecommons.org/licenses/by-sa/4.0 2024-09-18 2024-09-18 18 4 10.5817/CP2024-4-6 When feeling positive is being “in the zone”: How challenge optimality causes changes in positive affect and flow https://cyberpsychology.eu/article/view/30988 <p>Flow is a state of highly focused attention, associated with player loyalty (thus sought after among game designers). We investigate the link between positive affect (hereby PA) and flow experience. According to the literature, games should ideally induce PA in players and that this might induce higher flow in games at optimal challenge (challenge that matches the player’s skills). We, however, propose that PA and the flow state form a negative feedback loop, where PA could reduce future flow, depending on the challenge conditions. We conducted two experiments, with 144 and 338 university students as participants, respectively. The experiments showed that under the optimal challenge condition, current PA is negatively linked to future flow. Based on this, we propose that game designers should be cautious about the use of PA-inducing stimuli, as they might form a negative feedback loop with flow.</p> Man-Chung Fung Christopher Jackson Copyright © 2024 Man-Chung Fung, Chris Jackson https://creativecommons.org/licenses/by-sa/4.0 2024-09-18 2024-09-18 18 4 10.5817/CP2024-4-7 Is undergraduates’ adoption of the Internet of Things rational? The role of risk perception https://cyberpsychology.eu/article/view/33473 <p class="Abstract"><span lang="EN-US">Users’ intentions and behavior when using the Internet of Things (IoT) are essential issues in contemporary technology research. This research used the Theory of Planned Behavior (TPB) model to predict undergraduates’ IoT use intention and behavior in the smart home context. A total of 412 undergraduates at four universities in Taiwan participated in this study. The Structural Equation Modeling (SEM) approach was utilized to test the hypotheses. The results revealed that undergraduates’ attitudes and subjective norms had a positive effect on their IoT use intention, which, in turn, had effects on their IoT use behavior. This study also found that undergraduates’ risk perception of behavioral control had a negative effect on their IoT use intention. In contrast, their perceived risk of behavioral control had a positive direct effect on their IoT use behavior. This research contributes to the current state of knowledge since the proposed model revealed that undergraduates’ adoption of the Internet of Things might not be entirely rational. Their risk perception of behavioral control might play particular role.</span></p> Chun-Yen Tsai Copyright © 2024 Chun-Yen Tsai https://creativecommons.org/licenses/by-sa/4.0 2024-09-18 2024-09-18 18 4 10.5817/CP2024-4-8 Acceptance and self-protection in government, commercial, and interpersonal surveillance contexts: An exploratory study https://cyberpsychology.eu/article/view/33682 <p class="Abstract"><span lang="EN-US">Digital surveillance is pervasive in cyberspace, with various parties continuously monitoring online activities. The ways in which internet users perceive and respond to such surveillance across overlapping contexts warrants deeper exploration. This study delves into the acceptance of digital surveillance by internet users and their subsequent self-protective actions against it in three distinct contexts: government, commercial, and interpersonal surveillance. Survey responses collected from 356 internet users in the U.S. showed that acceptance levels for surveillance varied between institutional and interpersonal contexts. However, the degree of self-protection remained consistent across all three contexts. Privacy concerns, algorithm awareness, and perceived privacy control played nuanced roles to both surveillance acceptance and self-protection measures in each context. Interestingly, political orientation emerged as a significant moderating factor on surveillance acceptance. Conservative-leaning participants were less accepting of surveillance overall, especially government surveillance. For conservatives, higher privacy concerns meant less acceptance of both government and corporate surveillance. Liberals’ acceptance levels remained fairly consistent and were less affected by privacy concerns. These findings underscore the significance of contextual differences in privacy and surveillance research and provide implications for refining the existing theoretical frameworks.</span></p> Weizi Liu Seo Yoon Lee Mike Yao Copyright © 2024 Weizi Liu, Seo Yoon Lee, Mike Yao https://creativecommons.org/licenses/by-sa/4.0 2024-09-18 2024-09-18 18 4 10.5817/CP2024-4-9 Profiles of bullying, cyberbullying, and disinterest in reading among primary school learners in Spain https://cyberpsychology.eu/article/view/33114 <p>The most prominent roles played by schoolchildren in bullying and cyberbullying situations are those of aggressors, victims, and bystanders. These roles are characterised by differences in the school environment and their achievements. This study aimed to analyse the differences between the roles of those directly involved in bullying and cyberbullying (aggressors, victims, and bystanders) by examining their attitudes and interest in reading. Participants were 326 primary schoolchildren in Murcia, Spain (M = 8.98, SD = 0.84), of whom 53.1% were girls. A multimodal questionnaire on school interaction was used with an instrument on attitudes and reading interests. A latent profile analysis (LPA) was conducted and showed three profiles: a) low levels of aggressiveness and victimisation, b) high indices of aggressiveness, and c) high indices of victimisation. The results revealed differences in attitudes toward and interest in reading among the various profiles. The findings of the study can help customise educational programs by providing bullying and cyberbullying intervention and prevention methods based on the roles of victims, aggressors, and bystanders and their attitudes toward and interests in reading.</p> Inmaculada Méndez Irma Elizabeth Rojas Gómez Cecilia Ruiz-Esteban María Dolores Delgado José Manuel García-Fernández Copyright © 2024 Inmaculada Méndez, Irma Elizabeth Rojas Gómez, Cecilia Ruiz-Esteban, María Dolores Delgado, José Manuel García-Fernández https://creativecommons.org/licenses/by-sa/4.0 2024-09-18 2024-09-18 18 4 10.5817/CP2024-4-10