{"id":6755,"date":"2021-01-12T16:15:17","date_gmt":"2021-01-12T16:15:17","guid":{"rendered":"https:\/\/cybersmart.com\/?p=6755"},"modified":"2021-10-05T11:46:55","modified_gmt":"2021-10-05T11:46:55","slug":"what-is-cyberpsychology","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/","title":{"rendered":"What is cyberpsychology?"},"content":{"rendered":"

Technology has shaped our lives in ways never have imagined before. And it\u2019s become especially visible now many of us made the shift to<\/span> working remotely<\/span><\/a>. Technological developments have provided us with many opportunities, from new forms of communication to the ability to access and share resources from anywhere on the planet.\u00a0<\/span><\/p>\n

Sadly, that\u2019s not the whole story.<\/span><\/p>\n

Technology also provides cybercriminals with endless new methods for exploitation. It\u2019s no longer enough to manage the struggles of our offline lives. There\u2019s also the added pressure of maintaining our digital selves and online behaviour.\u00a0<\/span><\/p>\n

But why do so many of us behave differently online and take risks that we wouldn\u2019t in our everyday lives? It\u2019s exactly these questions that cyberpsychology seeks to answer.\u00a0<\/span><\/p>\n

What is cyberpsychology?<\/b><\/h3>\n

Cyberpsychology is a relatively young branch of psychology. It got its start back in the 1990s, but it really began to gain relevance during the 2000s<\/a> with the rise of social media. The explosion in online communication made it suddenly very important to understand online behaviours.<\/p>\n

Cyberpsychology<\/span> looks at how we behave in cyberspace, how we interact with and through different devices, as well as how our offline behaviours have been affected by the use of technology and the internet.\u00a0<\/span><\/p>\n

Experts have been warning about the perils of social media for some time. But, for most of us, the recent\u00a0 Netflix documentary, \u201c<\/span>The Social Dilemma<\/span><\/a>\u201d has been a wake-up call in understanding how specific sites, apps and design functionality in cyberspace can be used to target our weaknesses.\u00a0<\/span><\/p>\n

Beyond the obvious problems with manipulative design, technology and the internet are also affecting us in a subtler way. With the advent of the internet of things (IoT), our daily lives are carried with us wherever we go. This mobility comes with advantages; constant connectivity and near-endless information at our fingertips. However, it can also lead to us feeling overwhelmed, saturated with information and obligated to constantly \u2018keep up\u2019 with whatever is happening in the news cycle or on social media.\u00a0<\/span><\/p>\n

For many of us, cyberspace is not as tangible as physical space. In the ‘real’ world we can clearly identify hazards and avoid them. Online, this becomes trickier. This can lead us to have an imaginary sense of security, despite the countless risks we are exposed to online daily. But, being aware of the psychology behind our actions can help us better manage our digital existence and approach it more mindfully.\u00a0<\/span><\/p>\n

What are the psychological features of technology?<\/b><\/h3>\n

Recordability<\/b><\/h4>\n

One of the key features to watch out for in cyberspace is <\/span>\u2018recordability’<\/span><\/a>. Everything we do online, from the content we share publicly or not so publicly to private conversations and our location, is documented and recorded. Our digital experiences can be analysed, revisited and even re-experienced. This can have many positive effects, but can also backfire and be used against us if it’s accessed by someone with malicious intent. So it\u2019s important to always consider not only what we are sharing, but who might have the access to our digital traces.\u00a0<\/span><\/p>\n

Flexible identity<\/b><\/h4>\n

Another feature of online life is the ability to manage our impressions and identity. The lack of physical characteristics in communication, such as appearance, body language and emotional expressions can be a limitation to understanding each other. But they can also give us the flexibility to tailor our digital selves to different audiences.\u00a0<\/span><\/p>\n

However, it can also be used for behaviours of misleading, malicious and even criminal natures. For example, <\/span>
\n<\/span>identity fraud or phishing scams. In combination with records of your digital activities, the offender could use available personal information to build a closer and, seemingly, more trustworthy relationship with you.\u00a0<\/span><\/p>\n

The Disinhibition effect<\/b><\/h4>\n

The last key cyberpsychology theory for analysing our behaviour is <\/span>the disinhibition effect<\/span><\/a>. It explains how the ways we act change in digital environments. In short, we\u2019re less inhibited and composed and more open and confident. So much so, that researchers often compare this effect to being drunk.\u00a0<\/span><\/p>\n

This might sound like a good thing; a society-wide \u2018coming out of our shells\u2019. However, it has a darker side. Many of us have
\nhave poorer judgement online and are more prone to making bad decisions.<\/span><\/p>\n

For example, we are more open to sharing our whereabouts or discussing intimate and private details. This can be influenced by the idea of us as being invisible, anonymous and a belief that offline interactions are \u2018real\u2019 and online as \u2018not or less real\u2019. And this can often lead to us behaving more irresponsible online and failing to consider the consequences of our actions.\u00a0<\/span><\/p>\n

Why is cyberpsychology important?<\/b><\/h3>\n

It\u2019s clear that the internet and technology have given us greater freedom, convenience, and connectivity. But, at the same time, it\u2019s important to be cautious of its possible negative effects. By better understanding our psychological weaknesses as humans interacting with technology we can become more aware, responsible and secure online.\u00a0<\/span><\/p>\n

Looking to improve your cybersecurity but not sure where to begin? Start 2021 the right way, by getting <\/span>certified in Cyber Essentials<\/span><\/a>, the UK government scheme that covers all the fundamentals of cyber hygiene<\/span>.<\/span><\/p>\n

\"CTA<\/a><\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

Technology has shaped our lives in ways never have imagined before. And it\u2019s become especially visible now many of us made the shift to working remotely. Technological developments have provided…<\/p>\n","protected":false},"author":15,"featured_media":6921,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,11],"tags":[9,200,83,201],"yoast_head":"\nWhat is cyberpsychology? - CyberSmart<\/title>\n<meta name=\"description\" content=\"Why do we behave differently online than we do in our everyday lives? It's all down to cyberpsychology. But what is it? How can we use it to improve our safety?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is cyberpsychology? - CyberSmart\" \/>\n<meta property=\"og:description\" content=\"Why do we behave differently online than we do in our everyday lives? It's all down to cyberpsychology. But what is it? How can we use it to improve our safety?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-12T16:15:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-05T11:46:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/01\/CyberPsychology.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anete P\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/01\/CyberPsychology.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anete P\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/\"},\"author\":{\"name\":\"Anete P\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/db15fa7622c37eaf8d122c0bdb534cbc\"},\"headline\":\"What is cyberpsychology?\",\"datePublished\":\"2021-01-12T16:15:17+00:00\",\"dateModified\":\"2021-10-05T11:46:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/\"},\"wordCount\":861,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/01\/CyberPsychology.jpg\",\"keywords\":[\"Cyber Essentials\",\"Cyberpsychology\",\"cybersecurity\",\"Social media\"],\"articleSection\":[\"Blog\",\"Cyber Security 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/\",\"name\":\"What is cyberpsychology? - CyberSmart\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/01\/CyberPsychology.jpg\",\"datePublished\":\"2021-01-12T16:15:17+00:00\",\"dateModified\":\"2021-10-05T11:46:55+00:00\",\"description\":\"Why do we behave differently online than we do in our everyday lives? It's all down to cyberpsychology. But what is it? How can we use it to improve our safety?\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#primaryimage\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/01\/CyberPsychology.jpg\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/01\/CyberPsychology.jpg\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is cyberpsychology?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/db15fa7622c37eaf8d122c0bdb534cbc\",\"name\":\"Anete P\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ab531e27a268d59f6ac55e0fa8e8335b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ab531e27a268d59f6ac55e0fa8e8335b?s=96&d=mm&r=g\",\"caption\":\"Anete P\"},\"url\":\"https:\/\/cybersmart.com\/author\/anete-p\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is cyberpsychology? - CyberSmart","description":"Why do we behave differently online than we do in our everyday lives? It's all down to cyberpsychology. But what is it? How can we use it to improve our safety?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/","og_locale":"en_US","og_type":"article","og_title":"What is cyberpsychology? - CyberSmart","og_description":"Why do we behave differently online than we do in our everyday lives? It's all down to cyberpsychology. But what is it? How can we use it to improve our safety?","og_url":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2021-01-12T16:15:17+00:00","article_modified_time":"2021-10-05T11:46:55+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/01\/CyberPsychology.jpg","type":"image\/jpeg"}],"author":"Anete P","twitter_card":"summary_large_image","twitter_image":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/01\/CyberPsychology.jpg","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Anete P","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/"},"author":{"name":"Anete P","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/db15fa7622c37eaf8d122c0bdb534cbc"},"headline":"What is cyberpsychology?","datePublished":"2021-01-12T16:15:17+00:00","dateModified":"2021-10-05T11:46:55+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/"},"wordCount":861,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/01\/CyberPsychology.jpg","keywords":["Cyber Essentials","Cyberpsychology","cybersecurity","Social media"],"articleSection":["Blog","Cyber Security 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/","url":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/","name":"What is cyberpsychology? - CyberSmart","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/01\/CyberPsychology.jpg","datePublished":"2021-01-12T16:15:17+00:00","dateModified":"2021-10-05T11:46:55+00:00","description":"Why do we behave differently online than we do in our everyday lives? It's all down to cyberpsychology. But what is it? How can we use it to improve our safety?","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#primaryimage","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/01\/CyberPsychology.jpg","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/01\/CyberPsychology.jpg","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/what-is-cyberpsychology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"What is cyberpsychology?"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/db15fa7622c37eaf8d122c0bdb534cbc","name":"Anete P","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ab531e27a268d59f6ac55e0fa8e8335b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ab531e27a268d59f6ac55e0fa8e8335b?s=96&d=mm&r=g","caption":"Anete P"},"url":"https:\/\/cybersmart.com\/author\/anete-p\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/6755"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=6755"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/6755\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media\/6921"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=6755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=6755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=6755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}