paper - Cyberpsychology

Article: Cyberpsychology—Our Psyche Under the Influence of the Internet
2.427 words
Contents
Cyberpsychology—Our Psyche Under the Influence of the Internet ...................................................... 1
Facebook as a Cyberpsychological Testing Ground............................................................................... 2
Media Equation – the Anthropomorphisation of Technology .................................................................. 5
Fundamental Human Characteristics Cause Riskier Online Behaviour.................................................. 7
Falling for Social Engineering Tricks is All Too Human .......................................................................... 8
Why Cyberpsychology in IT Security? .................................................................................................. 10
Cyberpsychology—Our Psyche Under the
Influence of the Internet
—and what this means for IT security
The Internet has become today’s defining medium and considerably influences the behaviour of many
people. Our experiences in social media, our relationships with devices like smartphones, tablets and
laptops, and the ways in which our immediate physical environment is being artificially expanded by
“cyberspace“, are all part and parcel of the field of “mediapsychology”. What are social apps, online
videos, Internet communities, online shops and chat forums doing to us? If, in the 1960s, TV was
postulated as a “second-hand reality”, what effect will the increasing electronic networking of humanity
with a variety of increasingly intelligent technologies and devices have? Are our online lives riskier
than our real ones? Do we need digital risk literacy? Could some of us already be cyberpsychos?
Kaspersky Lab researched this question in collaboration with Professor Dr Frank Schwab and Dr
Astrid Carolus from the Institute for Media Psychology at the University of Würzburg.
There can no longer be any doubt that the networking of the world via computers, smartphones and
tablets has a considerable influence on our lives. People shop from the comfort of their own homes.
Families and friends keep in touch with one another, even across large distances, by means of social
apps like WhatsApp, or via social networks like Facebook. The Internet has become the key
component in human communication and interaction. Lovers meet online, and customers pay via the
web—but are also robbed by cybercriminals. Even new, digital currencies have been created, like the
online currency Bitcoin, which is now a target for digital bank robbers [1]. Although our online activities
reflect typical human behaviour, technology still adds new aspects to our lives, both as individuals and
as societies.
1
Article: Cyberpsychology—Our Psyche Under the Influence of the Internet
The term “cyberpsychology” has been coined, related to the term “cyberspace”. This field of research
focuses on what people do online and why. More precisely, it examines our feelings, thoughts and
behaviour towards digital media.
Facebook as a Cyberpsychological Testing Ground
A social network like Facebook is, from a cyberpsychological perspective, an exciting topic—and one
which lends itself to investigation using new methods. Field research which, until now, has required
extensive surveys involving hundreds, or even thousands, of people, is now at our fingertips. And the
best part? The test subjects are all volunteers. Or, at least, most of them are.
In June 2014, a study carried out by Cornell University and the University of California in San
Francisco was published. For this study, Facebook had secretly manipulated the contents of the start
pages of almost 700,000 English-speaking users [2]. For a week, the uninformed test subjects were
shown overwhelmingly positive or negative posts from friends in order to discover how this affected
their moods. Users who saw mainly positive entries posted more positive status updates themselves.
Those who saw primarily negative entries posted mainly negative entries themselves. The results
indicate that emotions displayed on Facebook can influence our own emotions—or at least, that the
subjects’ communications were influenced by their feelings.
Another interesting study involving Facebook and psychology was published at the end of 2013. This
research was carried out by a team headed by Andrew Schwartz, Johannes Eichstädt and Margaret
Kern from the University of Pennsylvania, who used language analysis to examine the status updates
posted by 75,000 Facebook members [3]. Using their “Open Vocabulary” technique, the psychologists
were able to produce precise psychograms containing age, gender and typical personality
characteristics. The results also included extremely revealing word clouds that the researchers could
use to predict a Facebook member’s gender.
2
Article: Cyberpsychology—Our Psyche Under the Influence of the Internet
[Image 1: Personality, Gender, and Age in the Language of Social Media: The Open-Vocabulary
Approach; H. Andrew Schwartz, Johannes C. Eichstaedt and Margaret L. Kern et al.:
http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0073791]
Facebook is, in general, a rich source of information for cyberpsychology. Researchers have, for
example, also shown that emotions can be transferred from one member to another. This effect has
been called emotional contagion [4] by Jeff Hancock at Cornell University. In order to study this,
researchers took 689,003 (anonymised) Facebook comments, broke them down and used a database
of 122 million words to show that emotional expressions between friends can be predicted.
An infographic [5] summarises a whole range of thought-provoking facts and theories pertaining to the
global social community. It states, for example, that Facebook can become addictive and that, since
2000, networking via smartphones has reduced the human attention span to less than that of a
goldfish.
3
Article: Cyberpsychology—Our Psyche Under the Influence of the Internet
[Image 2 // Source: Nowsourcing (2012): http://visual.ly/facebook-psychology-addiction-affecting-ourminds]
4
Article: Cyberpsychology—Our Psyche Under the Influence of the Internet
[Image 3 // Caption: Humans also interact emotionally with technical devices]
Media Equation – Threating Computers as Humans
Cyberpsychology, of course, deals not with the behaviour of machines, but with the behaviour of
people in an increasingly media-defined world. In some cases, this behaviour can be very interesting.
People are incredibly bad at communicating with machines. How many users have cursed their
computers, perhaps even pounding their fists on the keyboard, when a device failure caused hours’
worth of work to disappear into a digital black hole? In some circumstances, all it takes is a broken
automatic door to trigger an extremely human reaction.
Psychologists Byron Reeves and Clifford Nass call this effect the “Media Equation” [6]. As soon as
something—like a software package, for example—seems to interact with a person, ancient scripts are
triggered in our brains. Almost instinctively, we treat the object like a conscious, reasoning being. This
equation of media devices with living creatures is known by media psychologists as the media
equation [7]. It’s a phenomenon that enables us to hate computers, even though we know that they
are just machines, incapable of deliberately annoying us.
5
Article: Cyberpsychology—Our Psyche Under the Influence of the Internet
6
Article: Cyberpsychology—Our Psyche Under the Influence of the Internet
[Image 4 // Caption: Kaspersky infographic: The Media Equation, or the relationship between human
beings and technology]
The basic psychological patterns of human behaviour, which are "hard-wired" into our brains and
which were formed around 1.8 million years ago in the Pleistocene era, are now being confronted by a
new, very interactive media space. Many features of this digital media space are completely
unfamiliar, and we must first learn how to interact with them. One way would be to develop a Brain
2.0, which would be better able to cope with these challenges. This is, however, not something that
will happen overnight, as our synapses are too well-rooted. Alternatively, we can try to remember that
we are, unfortunately, incapable of rational behaviour when dealing with machines, and learn certain
behaviour patterns by heart. Many emotional situations can be avoided if we can acquire a better
understanding of those we deal with (including computers). Outbursts of rage are not usually our
computers’ fault; after all, they behave entirely predictably. Instead, we, the users, are to blame. This
also applies to security-relevant behaviour. We cannot prevent our brains, which have been shaped by
evolution, from reacting in certain ways. With a little knowledge of the threats (Online Risk Literacy
[8]), however, we can avoid a great many hazards.
[Image 5 // Caption: The two faces of today’s Internet user]
Fundamental Human Characteristics Cause Riskier Online
Behaviour
In experiments testing the risk awareness of Internet users, three key concepts recur over and over
again: disinhibition, an overly optimistic view of one’s own vulnerability (optimism bias), and the need
to belong [8]. Today’s researchers are still feeling their way in determining the behaviour patterns. For
example, researchers Fogel and Nehmad [9] carried out a study among college students to determine
whether there is a correlation between the existence of a network profile and users’ willingness to take
risks. The results clearly show that such a correlation exists.
Media psychologists Schwab and Carolus carried out a literature study [8] on the topic of
cyberpsychology and online security. They add that, to some extent, users are simply overwhelmed by
the bombardment of information they now face and that they fall back on feelings and trial-and-error
methods, thus acting less rationally than we usually (want to) believe.
Parents are, of course, particularly interested in their children’s online activities, with many concerned
7
Article: Cyberpsychology—Our Psyche Under the Influence of the Internet
that their little ones are facing online risks.
As you would expect, there are a large number of studies on this topic. One long-term study was
carried out in Belgium. The most significant finding, and one which is supported by other studies, gives
us hope: at first glance, children and young people are very sensible. The study [10] was carried out
among 10,000 schoolchildren in classes 4-6. Both contact risks (like the risk of contacting strangers),
and content risks (including the risk of viewing shocking websites) were determined. According to the
study, 4.5 percent of children admitted to having met in person someone they "befriended" via the
Internet. Here, perspective is important. 45 children out of 1,000 meeting strangers is, of course, 45
children too many. This study, however, helps us to identify the children taking excessive risks. Would
the same number of children take this risk if they didn't have access to the Internet? In their free time,
for example? An analysis by Kaspersky Lab [11] supports the assumption that children are, to some
extent, exposed to inappropriate Internet content. The IT security experts identified the inappropriate
sites accessed most often by children during the period from January to May 2014. In most countries,
websites with pornographic and erotic content were by far the most popular.
[Image 6 // Caption: Children and young people can be reckless online]
Falling for Social Engineering Tricks is All Too Human
New technologies also require new words. Like “phishing”, for example [12]. The word is related to
“fishing” and describes a method used by cybercriminals to target important user data. During
phishing, cybercriminals don’t target computers. Instead, they use sophisticated emails and fake
websites to “hack" the people behind them.
8
Article: Cyberpsychology—Our Psyche Under the Influence of the Internet
[Image 7 // Caption: Phishing is a classic social engineering trick]
In social engineering, criminals exploit fundamental patterns in the human psyche. Trust is one such
pattern. A basic level of trust is tremendously important for the psychological development of any
human being. If everything goes according to plan, we develop this at the beginning of our lives. It is a
prerequisite for forming deep relationships with other people, allowing you, for example, to trust your
family and friends. We tend to trust familiar people—even if we only know them from TV, for
example—more than unfamiliar ones.
Authority also has to do with trust. We tend to trust authority figures. After all, they know what they’re
doing! We will, for example, be more likely to believe an email that seems to come from our company’s
own IT department, even though we don’t know the sender personally.
Our desire to help others and our desire to belong are both examples of fundamental human
characteristics [8]. Probably the most famous example of exploiting our desire to help others involves
what’s known as the Nigerian spam email. In such cases, spurious Nigerian princes send emails to
random Internet users, in which they profess to need help transferring large sums of money abroad.
Promising to pay these users a percentage of the money for their help, they swindle gullible recipients
out of the "processing fees" they advance in order to facilitate the transfers. The promised fortunes,
however, never arrive. One example from last year illustrates the social engineering aspect: criminals
claimed to be members of the International Red Cross involved in the Syria conflict and sent users
emails appealing for help [13].
An analysis carried out by Kaspersky Lab of the targets of financially motivated phishing attacks
shows that users of social networks were the most heavily targeted in 2013. More than one in three
attacks took place on Facebook or a similar site. [14]. Apparently, we feel more secure in these
networks because we imagine ourselves to be surrounded by friends. This makes us easier victims.
Finally, cybercriminals also exploit our fundamental human curiosity. New things interest us; we want
to reveal the concealed. We are curious about the contents of attachments, or the pages behind the
links in texts or messages. Often, these are dangerous links or infected PDF attachments—but by the
time we realize this, it is usually too late.
9
Article: Cyberpsychology—Our Psyche Under the Influence of the Internet
[Image 8 // Caption: In 2013, more than one-third of all phishing attacks targeted Facebook and similar
sites.]
Researchers from Carnegie Mellon University published the findings of their phishing studies in 2010
[15]. These showed that there were differences between the sexes. On average, 54.7 percent of
women clicked on phishing emails, compared to 49 percent of men. The researchers identified
differing levels of education on Internet technologies as the cause [16]. They discovered that
educating users did actually help: after receiving training on phishing, the average percentage of
phishing victims fell from 47 to 28 percent.
Digital education is both practical and essential. This is also shown by the simple fact that experienced
Internet users tend to fall for fewer fraud attempts by cybercriminals, as well as being generally more
cautious in cyberspace.
Why Cyberpsychology in IT Security?
Cybercriminals earn a great deal of money from their activities. These criminals are no longer mere
teenagers programming a virus here and there in their spare time. Instead, cybercrime has become an
industry, one which is ingenious when it comes to exploiting human weaknesses. How, though, can
we combat this if we don't know what these weaknesses are and why we have them? Ten years ago,
the world was a simpler place: a new piece of malware came onto the market, was discovered by
researchers, and virus protection software prevented its execution.
Today, Kaspersky’s systems detect 315,000 new malware varieties each day, and the criminal
industry is working full steam ahead. Security software recognises malware programs by their
behaviour, prevents the execution of unknown programs, and is much more evolved than it was just a
few years ago. It cannot, however, prevent users from transferring money to or sharing their credit
card details with supposed “friends”. Nor can it prevent a gamer in the heat of battle from ignoring all
security warnings and installing a harmful patch, believing that it will bring them victory.
10
Article: Cyberpsychology—Our Psyche Under the Influence of the Internet
[Image 9 // Caption: Users in gaming mode are psychologically vulnerable]
Kaspersky Lab’s mission is to ensure a more secure Internet. In order to do this, we have to
understand why people behave in certain ways. Every user needs to understand that his or her
psyche can play tricks on him or her. This understanding of human behaviour is one of the keys to
secure Internet usage today. The more the IT security industry and users know, therefore, the more
difficult it will be for criminals to exploit our human failings.
Kaspersky Lab has put together information on the Media Equation, Social Engineering, Gender
Differences and Gaming from the perspectives of cyberpsychology and IT security. This information
can be found at: www.kaspersky.com/cyberpsychology
Sources:
[1]
https://www.securelist.com/en/analysis/204792331/Financial_cyber_threats_in_2013_Part_2_malware
[2] http://www.pnas.org/content/111/24/8788.full
[3] http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0073791/ Personality,
Gender, and Age in the Language of Social Media: The Open-Vocabulary Approach; H. Andrew
Schwartz, Johannes C. Eichstaedt, Margaret L. Kern, Lukasz Dziurzynski, Stephanie M. Ramones,
Megha Agrawal, Achal Shah, Michal Kosinski, David Stillwell, Martin E. P. Seligman, Lyle H. Ungar,
September 25 (2013)
[4] http://www.bps.org.uk/news/facebook-and-emotional-contagion
11
Article: Cyberpsychology—Our Psyche Under the Influence of the Internet
[5] Facebook Psychology: Is Addiction Affecting Our Minds?; NowSourcing (2012):
http://visual.ly/facebook-psychology-addiction-affecting-our-minds
[6] Media Equation http://en.wikipedia.org/wiki/The_Media_Equation
[7] http://web.stanford.edu/group/cslipublications/cslipublications/site/1575860538.shtml / The Media
Equation: How People Treat Computers, Television, and New Media Like Real People and Places.
Cambridge University Press; Reeves, B., & Nass, C. (1996).
[8] Perceived Online Safety – Current state of research & desiderata; F. Schwab & A. Carolus (2013)
[9] Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human
Behavior / Fogel and Nehmad (2009)
[10] http://users.ugent.be/~mvalcke/CV/unsafe_2011.pdf / M. Valcke, B. De Wever, H. Van Keer, T.
Schellens: Long-term study on safe Internet use in young children; in: Computers & Education 57
(2011) p. 1292-1305, Gent/Belgien 2011, Elsevier Verlag
[11] http://www.kaspersky.com/about/news/virus/2014/Children-and-the-Internet-the-Problem-ofUndesirable-Content
[12] http://www.securelist.com/en/glossary?letter=80#gloss153653685
[13] http://www.kaspersky.com/de/about_kaspersky/news/spam/2013/Nigeria-Scam-Welle_aus_Syrien
[14]
https://www.securelist.com/en/analysis/204792330/Financial_cyber_threats_in_2013_Part_1_phishing
and
http://newsroom.kaspersky.eu/fileadmin/user_upload/de/Downloads/Pictures_etc._NOT_for_Media_se
ction/Kaspersky_Lab_infographics_financial_phishing_targets_2013.jpg
[15] http://lorrie.cranor.org/pubs/pap1162-sheng.pdf / Steve Sheng, Mandy Holbrook, Ponnurangam
Kumaraguru, Lorrie Cranor, Julie Downs: Who Falls for Phish? A Demographic Analysis of Phishing,
Susceptibility and Effectiveness of Interventions, Carnegie Mellon University (2010)
[16] http://en.wikipedia.org/wiki/Mediation_%28statistics%29
About Kaspersky Lab
Kaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions. The company is
ranked among the world’s top four vendors of security solutions for endpoint users*. Throughout its more
than 16-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital
security solutions for large enterprises, SMBs and consumers. Kaspersky Lab, with its holding company
registered in the United Kingdom, currently operates in almost 200 countries and territories across the
globe, providing protection for over 300 million users worldwide. Learn more at www.kaspersky.com.
* The company was rated fourth in the IDC rating Worldwide Endpoint Security Revenue by Vendor, 2012. The rating was published in
the IDC report "Worldwide Endpoint Security 2013–2017 Forecast and 2012 Vendor Shares (IDC #242618, August 2013). The report
ranked software vendors according to earnings from sales of endpoint security solutions in 2012.
12