Academic literature on the topic 'Psychology of privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Psychology of privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Psychology of privacy"

1

Small, Mark A., and Pat A. Tetreault. "Social psychology, ‘marital rape exemptions’, and privacy." Behavioral Sciences & the Law 8, no. 2 (1990): 141–49. http://dx.doi.org/10.1002/bsl.2370080206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

PEDERSEN, DARHL M. "MODEL FOR TYPES OF PRIVACY BY PRIVACY FUNCTIONS." Journal of Environmental Psychology 19, no. 4 (December 1999): 397–405. http://dx.doi.org/10.1006/jevp.1999.0140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Norberg, Patricia A., and Daniel R. Horne. "Privacy attitudes and privacy-related behavior." Psychology & Marketing 24, no. 10 (August 28, 2007): 829–47. http://dx.doi.org/10.1002/mar.20186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Illingworth, A. James. "Big Data in I-O Psychology: Privacy Considerations and Discriminatory Algorithms." Industrial and Organizational Psychology 8, no. 4 (December 2015): 567–75. http://dx.doi.org/10.1017/iop.2015.85.

Full text
Abstract:
The “big data” movement is forcing many fields to establish best practices for the collection, analysis, and application of big data, and the field of industrial–organizational (I-O) psychology is not exempt from this disruptive influence. Over the last several years, I-O scientists and practitioners have grappled with questions related to the definition, application, and interpretation of big data (e.g., Doverspike, 2013; Maurath, 2014; Morrison & Abraham, 2015; Poeppelman, Blacksmith, & Yang, 2013). The focal article by Guzzo, Fink, King, Tonidandel, and Landis (2015) continues this discussion and represents one of the first attempts to establish a formal set of recommendations for working with big data in ways that are consistent with I-O psychology's professional guidelines and ethics requirements.
APA, Harvard, Vancouver, ISO, and other styles
5

Newell, Patricia Brierley. "Perspectives on privacy." Journal of Environmental Psychology 15, no. 2 (June 1995): 87–104. http://dx.doi.org/10.1016/0272-4944(95)90018-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shariff, Azim, Joe Green, and William Jettinghoff. "The Privacy Mismatch: Evolved Intuitions in a Digital World." Current Directions in Psychological Science 30, no. 2 (April 2021): 159–66. http://dx.doi.org/10.1177/0963721421990355.

Full text
Abstract:
Although people report grave concern over their data privacy, they take little care to protect it. We suggest that this privacy paradox can be understood in part as the consequence of an evolutionary mismatch: Privacy intuitions evolved in an environment that was radically different from the one found online. This evolved privacy psychology leaves people disconnected from the consequence of online privacy threats.
APA, Harvard, Vancouver, ISO, and other styles
7

Pedersen, Darhl M. "PRIVACY PREFERENCES AND CLASSROOM SEAT SELECTION." Social Behavior and Personality: an international journal 22, no. 4 (January 1, 1994): 393–98. http://dx.doi.org/10.2224/sbp.1994.22.4.393.

Full text
Abstract:
The relationship between privacy preferences and the location of selected seats in a classroom was investigated. Subjects were 17 men and 34 women in an undergraduate psychology class. The location of the seat selected in a rectangular classroom was described according to depth: front, middle, and back. Privacy preferences were measured using Marshalls (1974) Privacy Preference Scale. Those who opted to sit in the back were significantly higher on the Not Neighboring and Seclusion scales.
APA, Harvard, Vancouver, ISO, and other styles
8

Pedersen, Darhl M. "PSYCHOLOGICAL FUNCTIONS OF PRIVACY." Journal of Environmental Psychology 17, no. 2 (June 1997): 147–56. http://dx.doi.org/10.1006/jevp.1997.0049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Robison, Wade L. "Privacy and Personal Identity." Ethics & Behavior 7, no. 3 (September 1997): 195–205. http://dx.doi.org/10.1207/s15327019eb0703_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ashtiani, F. Ebrahimi Bad, and M. Mino Sepehr. "Environmental psychology, Privacy in the workplace (analysis of private territory in an office environment)." Journal of Fundamental and Applied Sciences 8, no. 2 (August 22, 2016): 1829. http://dx.doi.org/10.4314/jfas.v8i2s.123.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Psychology of privacy"

1

Buslig, Aileen Laura Suzanne 1966. "Aggressiveness in privacy-seeking behavior." Diss., The University of Arizona, 1996. http://hdl.handle.net/10150/290660.

Full text
Abstract:
Almost everyone experiences the desire for privacy occasionally. Achieving privacy, on the other hand, can be more difficult, especially when relational concerns are present. While the topic of privacy has received a good deal of attention in a variety of fields (e.g., communication, law, psychology, architecture, sociology), the impact of the act of seeking privacy has received little study. Privacy-seeking is often considered a selfish act, one that is likely to make the seeker feel guilty and the other affected parties rejected. The purpose of the present study is to examine the aggressiveness of various strategies that people use to gain privacy. In the present study, privacy-seekers described how they tried to achieve privacy in a particular situation, the reasons and motivations behind their actions, their perceptions of the situation and their own behavior, and the consequences of their actions. Results indicated that the use of moderate aggressiveness may be a superior strategy for achieving privacy with relational sensitivity, in comparison to aggressive or nonaggressive strategies. Aggressive strategies were seen as more dominant, less pleasant and less composed, and resulted in more negative relational consequences, than moderately aggressive strategies, while nonaggressive strategies were seen as less dominant, equally pleasant and composed, but less satisfying to use than moderately aggressive strategies. The relationship of the intruder (friend or stranger) also played a role in how participants sought privacy. However, no setting effects were found for perceptions of the environment or type of territory and use of aggressiveness.
APA, Harvard, Vancouver, ISO, and other styles
2

Castano, David Charles. "Affect and Online Privacy Concerns." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/41.

Full text
Abstract:
The purpose of this study was to investigate the influence of affect on privacy concerns and privacy behaviors. A considerable amount of research in the information systems field argues that privacy concerns, usually conceptualized as an evaluation of privacy risks, influence privacy behaviors. However, recent theoretical work shows that affect, a pre-cognitive evaluation, has a significant effect on preferences and choices in risky situations. Affect is contrasted with cognitive issues in privacy decision making and the role of affective versus cognitive-consequentialist factors is reviewed in privacy context. A causal model was developed to address how affect influences privacy concerns and privacy behaviors. The model of privacy risk proposed in this model argues that affect (or “feelings”) influences privacy behaviors directly as well as thru privacy concerns. To test the model, subjects were recruited using Mechanical Turk and paid for their participation. Affect, the key construct in this research, was measured using a word association technique as well as methods developed in the implicit attitudes research. Well-known scales were used to measure privacy concerns and behavioral intentions. Data was collected from subjects using a pretested privacy scenario. Data analysis suggests that, in line with published IS research, privacy concerns affect privacy behaviors. Affect has no impact on privacy concerns nor on privacy behaviors at the traditional 5% level of significance, though it is significant at the 10% level of significance. Improving the instruments used to measure affect, use of a large sample size to detect small effect sizes and more control over the instrument administration instead of an online survey are suggested for future research.
APA, Harvard, Vancouver, ISO, and other styles
3

Marrero, Matthew D. "Expectations and Violations of Privacy during Adolescence." ScholarWorks@UNO, 2015. http://scholarworks.uno.edu/td/2097.

Full text
Abstract:
This study tested a conceptual model of adolescents’ feelings of privacy invasion derived from CPM. Specifically, goals were to describe adolescents’ expectations of privacy, to describe how often adolescents are exposed to behaviors that threaten privacy, and to test privacy beliefs, potentially invasive behaviors, and having things to hide as predictors of individual differences in feelings of privacy invasion. Furthermore, each question and hypothesis was examined across four privacy domains and four relationships to determine whether privacy functions similarly or uniquely across domains and relationships. Participants were 118 adolescents (59% female), ranging from age 15 to 18 years of age (M age = 16.4 years, SD = .78). Results indicate that adolescents expect more privacy around their personal information than they expect around domains more aligned with parental monitoring. Sharing personal information elicited the greatest feelings of privacy invasion. The present study found some support the CPM based conceptual model. Adolescents expect information contained within the boundaries to remain private and intrusions into these boundaries elicit feelings of privacy invasion. Additionally, the current study found evidence to support the alternative model that the threat of discovery also elicits feelings of privacy invasion.
APA, Harvard, Vancouver, ISO, and other styles
4

O'REILLY, JOSEPH MATTHEW. "LEGAL PRIVACY AND PSYCHOLOGICAL PRIVACY: AN EVALUATION OF COURT ORDERED DESIGN STANDARDS (ENVIRONMENTAL, PSYCHIATRIC HOSPITALS, ARCHITECTURE)." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187916.

Full text
Abstract:
The legal system and the social sciences share an interest in privacy but have developed separate conceptualizations of the concept. The result is two similar but conflicting theories of privacy that make different assumptions about how people behave and how that behavior can be controlled. The purpose of this study was to begin testing these theories by examining the operationalization of privacy through mandated standards intended to ensure privacy for the mentally ill. Specifically, the standards set in Wyatt v. Stickney, which reflect the idea that privacy is a sphere of space free from outside intrusion, were examined to see if they did indeed ensure privacy. Using two units in a facility that met the standards mandated by the court in Wyatt v. Stickney, the research examined staff and patient perceptions of privacy. Thirty-five patients were interviewed and twenty-four staff completed questionnaires on the overall habitability of the unit and patient privacy. Results indicated that the Wyatt court's operationalization of privacy as primarily a visual phenomena was inadequate and although the specific standards ordered to ensure privacy were reported to be effective by a simple majority of patients, overall patients reported a lack of privacy. Staff responses were generally in agreement with patients but they tended to use more extreme or stronger ratings. The present study also has implications for the legal conceptualization of privacy. It was found that privacy was perceived as important by patients; that autonomy as evidenced by control was an important issue for a minority of patients; and, the right of selective disclosure was not a major concern of patients. Needed future areas of research that were identified included: comparing privacy ratings across a variety of group living situations, comparing the mentally ill's conceptualizations of privacy from others, determining the effect of privacy on the therapeutic goals of an institution and therapeutic outcome and, determine the relative importance of privacy to the mentally ill.
APA, Harvard, Vancouver, ISO, and other styles
5

Blount, Charles Lenward. "Users' privacy and security behaviors on mobile devices." Thesis, University of Maryland, Baltimore County, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571723.

Full text
Abstract:

Preferences and behaviors for privacy management with mobile applications are difficult to capture. Previous measures are mostly based on self-report data, which often does not accurately predict actual user behavior. A deeper understanding was sought, gleaned from observing actual practices. This thesis analyzes 11,777 applications from the Google Play marketplace in order to determine the impact of privacy settings on purchase behavior. This was done by looking at the effect of the number of privacy concessions as well as the effect of individual concessions and category on number of downloads. It was found that users of paid applications do not have a preference for fewer privacy concessions. This study further reinforces the disconnect between the user's often stated preference for privacy and their actual behavior -- a discrepancy known as the “privacy paradox ”. Theoretical and practical implications are discussed.

APA, Harvard, Vancouver, ISO, and other styles
6

Lachman, Karissa. "An exploration of employees' experience of privacy in an open-plan office environment." Master's thesis, University of Cape Town, 2005. http://hdl.handle.net/11427/5840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Easwara, Moorthy Aarthi. "Voice activated personal assistant| Privacy concerns in the public space." Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1527547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Beale, Karen Sue. "The Relationship between Ethnicity, SES, and Education on Parental Beliefs of Manipulation, Contempt, and Privacy." NCSU, 2006. http://www.lib.ncsu.edu/theses/available/etd-11012006-035058/.

Full text
Abstract:
The purpose of this study is to assess whether parental emotion beliefs include the dimensions of manipulation, contempt, and privacy and to examine the degree to which ethnic differences exist for those dimensions. Because reported ethnic differences are often due to other variables such as socio-economic status, individual as well as combined contributions of ethnicity, occupational status, and education are assessed in their relation to parental emotion beliefs. Participants included 1,108 African American, European American, and Lumbee American Indian parents of at least one child 4- to 10-years of age. Parents? beliefs about children?s use of emotion as manipulation, parents? expression of contempt toward their children, and children?s need for emotional privacy did emerge as distinct belief sets and ethnic differences were found. Although education did account for significant amounts of variance in parental beliefs and accounted for the ethnic difference between African American and European American parents for Manipulation, ethnicity was typically a significant predictor above and beyond what could be accounted for by the other predictors. This indicates that there is something unique to ethnicity such as a common set of values, beliefs, or behaviors. Additionally, the largest amounts of variance were overlapping in the three predictor variables, suggesting that ethnicity, occupational status, and education cannot be thought of separately when investigating psychological variables such as emotional beliefs.
APA, Harvard, Vancouver, ISO, and other styles
9

Dienlin, Tobias [Verfasser], and Sabine [Akademischer Betreuer] Trepte. "The psychology of privacy: Analyzing processes of media use and interpersonal communication / Tobias Dienlin ; Betreuer: Sabine Trepte." Hohenheim : Kommunikations-, Informations- und Medienzentrum der Universität Hohenheim, 2017. http://d-nb.info/1126556815/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bakke, Sharen A. "Privacy, Control, and the Use of Information Technology: The Development, Validation, and Testing of the Privacy-Invasive Perceptions Scale." [Kent, Ohio] : Kent State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=kent1145192698.

Full text
Abstract:
Thesis (Ph.D.)--Kent State University, 2006.
Title from PDF t.p. (viewed Sept. 20, 2006). Advisor: Alan Brandyberry and Marvin Troutt. Keywords: privacy; control; information technology use; scale development. Includes bibliographical references (p. 103-120).
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Psychology of privacy"

1

Privacy. New York: Picador, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Keshav Dev. The roots of privacy: Understanding private and public behavior. Bombay: Popular Prakashan, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Understanding Privacy. Cambridge, MA USA: Harvard University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Privacy, intimacy, and isolation. New York: Oxford University Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nippert-Eng, Christena E. Islands of privacy. Chicago: The University of Chicago Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Boling, Patricia. Privacy and thepolitics of intimate life. Ithaca: Cornell University Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

The terrible privacy of Maxwell Sim. New York: Alfred A. Knopf, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shame, exposure, and privacy. New York: W.W. Norton, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Modern privacy: Shifting boundaries, new forms. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1947-, Levering B., ed. Childhood's secrets: Intimacy, privacy, and the self reconsidered. New York: Teachers College Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Psychology of privacy"

1

Boilen, Sara. "Confidentiality and Privacy." In Ethics in Rural Psychology, 121–27. New York, NY : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9781351007603-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bada, Maria. "Psychology of Cybercrime." In Encyclopedia of Cryptography, Security and Privacy, 1–5. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1589-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Palmatier, Robert W., and Kelly D. Martin. "The Psychology of Consumer Privacy." In The Intelligent Marketer’s Guide to Data Privacy, 21–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03724-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smith-Bell, Michele, William J. Winslade, Louis Everstine, Diana Sullivan Everstine, Gary M. Heymann, Reiko Homma True, David H. Frey, et al. "Confidentiality, privilege, and privacy." In Ethical conflicts in psychology., 143–206. Washington: American Psychological Association, 1995. http://dx.doi.org/10.1037/10171-004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smith-Bell, Michele, William J. Winslade, Melba Vasquez, Louis Everstine, Diana Sullivan Everstine, Gary M. Heymann, Reiko Homma True, et al. "Confidentiality, privilege, and privacy." In Ethical conflicts in psychology (2nd ed.)., 149–223. Washington: American Psychological Association, 1999. http://dx.doi.org/10.1037/10329-003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Drogin, Eric Y. "Confidentiality, privilege, and privacy." In Ethical conflicts in psychology (5th ed.)., 245–316. Washington: American Psychological Association, 2019. http://dx.doi.org/10.1037/0000125-005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kargl, Frank, Rens W. van der Heijden, Benjamin Erb, and Christoph Bösch. "Privacy in Mobile Sensing." In Studies in Neuroscience, Psychology and Behavioral Economics, 3–12. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31620-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Small, Mark A., and Richard L. Wiener. "Rethinking Privacy Torts: A View Toward a Psycholegal Perspective." In Handbook of Psychology and Law, 455–72. New York, NY: Springer New York, 1992. http://dx.doi.org/10.1007/978-1-4757-4038-7_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Archer, Karin, Emily Christofides, Amanda Nosko, and Eileen Wood. "Exploring Disclosure and Privacy in a Digital Age." In The Wiley Handbook of Psychology, Technology, and Society, 301–20. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118771952.ch17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Furlong, Mark. "Questionable Psychology." In Re-sizing Psychology in Public Policy and the Private Imagination, 99–136. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-58429-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Psychology of privacy"

1

Howe, Adele E., Indrajit Ray, Mark Roberts, Malgorzata Urbanska, and Zinta Byrne. "The Psychology of Security for the Home Computer User." In 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change. IEEE, 2012. http://dx.doi.org/10.1109/sp.2012.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Research on Legal Protection of Patients’ Right to Privacy in China." In 2019 Scientific Conference on Management, Education and Psychology. The Academy of Engineering and Education (AEE), 2019. http://dx.doi.org/10.35532/jsss.v1.037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zaks, Lev. "Culture of the Second Half of the 20th Century through the Early 21st Century in Action: Creation of Contemporary Publicity." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2019. http://dx.doi.org/10.35853/ufh-public/private-2020-01.

Full text
Abstract:
The article offers a culturological vision of publicity, and partly correlative privacy as universal aspects of the joint existence of people. The analysis methodology is based on the perception of culture as a universal specific way of existence of people and society; the perception of society as a sociocultural system; the perception of the evolution of society and all areas of its existence as a result of their holistic sociocultural determination. Publicity is considered in terms of its characterisation as a sociocultural phenomenon (space-time, socioanthropological, functional, communicative, discursive), and then the evolution of publicity as a function and the product of the cultural system is outlined. The main (and diverse) sociocultural influential factors having determined substantial changes in features of publicity (and its relationship with privacy) as from the second half of the 20th century to the present day are analysed: left-wing influence and democratisation of societies after World War Two; rising prosperity of citizens; origination of consumer society; release of public psychology from some conventional cultural taboos including as a result of secularisation and the sexual revolution; widespread and influential mass-media; informational revolution (information society). Critical effects of these factors in respect of publicity and its evolution have been shown. The information revolution of the second half of the 20th century to the early 21st Century is considered as the crucial factor of the radical qualitive transformation of social life, processes of its institutionalisation and with it, public and private spheres. Peculiarities of contemporary online publicness and its relationship with online privacy are addressed. Axiological problems of online publicness are highlighted.
APA, Harvard, Vancouver, ISO, and other styles
4

Pase, Shane, Garry Hare, Jerri Lynn Hogg, Sean Thoennes, and Crystal Connors. "Panel - Ethics and emerging technology: Ethical concerns from a cognitive, media & technology focused psychology perspective concerning augmented reality, privacy, and sigularity." In 2014 IEEE International Symposium on Ethics in Engineering, Science, and Technology (ETHICS). IEEE, 2014. http://dx.doi.org/10.1109/ethics.2014.6893438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shui Ng, Wing. "Nurture Adolescents’ Cyberethics by Enhancing Their Self-Knowledge and Self-Awareness Using a Pressure-Free Self-Assessment Strategy [Abstract]." In InSITE 2017: Informing Science + IT Education Conferences: Vietnam. Informing Science Institute, 2017. http://dx.doi.org/10.28945/3663.

Full text
Abstract:
Aim/Purpose: In adolescents’ cyberethics education, case-based discussion, debate and role-playing are commonly used instructional strategies to engage students in critical dialogues in an open setting. However, the open setting is entirely different from the private and individual environment when adolescents go online. Teachers are in a position of higher power and peers’ observation provokes certain level of peer pressure. Students may not truly express their attitudes in the process for self-reflection. Background: This study elaborated an instructional strategy with a pressure-free self-assessment exercise that aimed to enhance adolescents’ self-knowledge and self-awareness regarding their attitudes on cyberethics. Methodology: The instructional strategy was divided into two phases. The purpose of the first phase was to enable students to obtain background knowledge on cyberethics. The second phase, with a pressure-free self-assessment element, aimed to enhance students’ self-knowledge and self-awareness on cyberethics. The study was carried out in a subsidized secondary school in Hong Kong. A total of 28 students at secondary three level participated in this study. Contribution: In theoretical perspective, the researcher suggested an adolescents’ cyberethics framework with dimensions of information security, privacy, intellectual property and netiquette. To nurture adolescents’ cyberethics, this study emphasized the importance of including theories of self-presentation, self-knowledge and self-awareness in the area of social psychology into cyberethics education. Findings: Students considered that the self-assessment exercise enabled self-reflection and enhanced self-knowledge on their attitudes of cyberethics. They also found it more effective for self-reflection compared with commonly used strategies and they will be more aware of cyberethics in their future online activities. Recommendations for Practitioners : Education practitioners are recommended to include a pressure-free self-assessment exercise to enhance the teaching effectiveness of cyberethics education. Recommendation for Researchers: This study opens avenues for further investigations of adolescents’ cyberethics with consideration of adolescents’ cognitive, psychological, social and emotional factors. Impact on Society : It is expected that the attitudes and behaviors of digital citizens can be improved by using this instructional strategy in cyberethics education. Future Research: Researcher could explore how different developmental factors affect adolescents’ decision-making on various issues of cyberethics.
APA, Harvard, Vancouver, ISO, and other styles
6

Shehada, Mohammad, Akshit Ahuja, and Steven D. Schrock. "Advancing Pedestrian Safety and Case Study of Pedestrian Psychology at Railroad Grade Crossing." In 2016 Joint Rail Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/jrc2016-5780.

Full text
Abstract:
Contrary to the declining railroad-highway crossing crashes over the past decade, the pedestrian-railroad interface has remained relatively unchanged. While engineering solutions and law enforcement have been tried, little is known about their effectiveness on the pedestrian mindset and psychology. One of the main reason for crashes of this type is that pedestrians tend to be restless while waiting at railroad crossings. This can lead to pedestrians performing irrational acts such as attempting to walk across a crossing before a train arrives. Earlier, trains traveled at slower speeds which pedestrians could react to easily and trains had less freight so it needed less braking distance and thus it was easier to control them. There are many factors with the potential to improve pedestrian safety at railroad crossings. In this paper the current safety norms for railroad crossings existing across in more than 40 major cities in US were analyzed to determine the existing safety standards for pedestrians at railroad grade crossings. State departments of transportation (DOTs) were contacted, along with professionals in public and private sector involved in safety at railroad crossing and ask them what according to them is a high risk railroad grade crossings in their area, safety practices that are common in their area, various threats to Safety implementation and then analyze these crossing for the types, safety signs and equipment present at them.
APA, Harvard, Vancouver, ISO, and other styles
7

Lyssakov, Nikolay, and Elena Lyssakova. "The Issue of Safety in the Flying Profession." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-39.

Full text
Abstract:
The article provides a theoretical analysis of the problem of psychological safety in the flight operation of highly automated aircraft based on interdisciplinary research. Scientific and technological advances in high-risk occupations aim to improve the reliability of the functioning of ergative systems, of which the human operator is the most important element. However, the problem of occupational safety for professionals in extreme situations cannot be regarded as solved. The article covers findings regarding the application of modern digital solutions such as virtual reality and augmented reality, providing an example of a formal investigation into an aircraft accident due to human error. An urgent task of aviation psychology consists of studying psychological aspects of the positive and negative influences of augmented reality on flight activity, since besides obvious options of increasing the professional reliability of a pilot, there is a risk of emergence of a psychological dependence on such a technology, and the consequent occurrence of blunders in piloting and navigation strategies. The authors conclude that the issue of safety in the flying profession shall be solved through the joint effort of all sciences of human factors. Modern digital solutions are only an essential prerequisite for ensuring the occupational safety of pilots. All stages of professionalisation of flight staff, starting with the professional selection of applicants, should be accompanied by predictive methods aimed at diagnosing and developing the individual’s ability to use the possibilities of the real and virtual world productively and synchronously in their work.
APA, Harvard, Vancouver, ISO, and other styles
8

Rani, Sukma, Hendriati Agustiani, Maya R. Ardiwinata, and R. Urip Purwono. "Work Engagement and Organizational Commitment in Private University." In International Conference on Psychology in Health, Educational, Social, and Organizational Settings. SCITEPRESS - Science and Technology Publications, 2018. http://dx.doi.org/10.5220/0008590904640468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Comparison of Research and Application of Private University Teacher Motivation at Home and Abroad." In 2019 Scientific Conference on Management, Education and Psychology. The Academy of Engineering and Education (AEE), 2019. http://dx.doi.org/10.35532/jsss.v1.036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pruteanu, Sorela-Maria, and Marius Nita. "Social Responsibility- Sustainable Challenge for Public and Private Sector." In International Conference Innovative Business Management & Global Entrepreneurship. LUMEN Publishing, 2020. http://dx.doi.org/10.18662/lumproc/ibmage2020/36.

Full text
Abstract:
The focus on social responsibility is even more pronounced given that competitiveness in the private sector can be surpassed by responsible business policies towards both the environment and the community. All institutions from public sector should act in the interest of the communities they represent, promoting at the same time the benefits of the “social responsibility” concept. Including this concept within the public sector creates an added value, in terms of both the morality of the decisions (taken by the legal representatives of the communities) and this kind of behaviour’s promotion by the organizations working for the public sector or by the companies which represent the private sector. Since ancient times, moral judgements were concepts debated by both psychology experts and within the church, however, at present, this area has been expanded so that major companies are building their development strategy by placing customer satisfaction as the central element; and the public sector has the same target: solving citizen’s needs. Making ethical decisions, by taking into consideration communities’ benefits, is a goal both public and private sectors are trying to achieve in their approach of carrying out their mission: act for the good of the community by including social measures and environmental protection in the foundation of their decisions. Competition between community initiatives and socio-environmental projects where companies get involved is getting tighter and tighter in a context where business practices are more and more visible.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography