Skip to main content Accessibility help
×
Hostname: page-component-5c6d5d7d68-wtssw Total loading time: 0 Render date: 2024-08-16T00:08:18.365Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  05 November 2015

John R. Suler
Affiliation:
Rider University, New Jersey
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Psychology of the Digital Age
Humans Become Electric
, pp. 427 - 436
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Adar, E., & Huberman, B.A. (2000). Free riding on Gnutella. Retrieved from http://www.hpl.hp.com/research/idl/papers/gnutella/gnutella.pdfCrossRef
Aiken, M. (2015). Cyberpsyched. New York, NY: Random House.Google Scholar
Aiken, M., Moran, M., Berry, M.J. (2011). Child abuse material and the Internet: Cyberpsychology of online child related sex offending. Paper presented at the 29th Meeting of the INTERPOL Specialist Group on Crimes against Children, Lyons, France.
Aiken, M., & Kirwan, G. (2013). The psychology of cyberchondria and cyberchondria by proxy. In Power, A. & Kirwan, G. (Eds.), Cyberpsychology and new media: A thematic reader (pp. 158–169). New York, NY: Psychology Press.Google Scholar
Akhtar, S. (Ed.). (2013). The electrified mind: Psychopathology and treatment in the era of cell phones and the internet. New York, NY: Jason Aronson.Google Scholar
Amichai-Hamburger, Y. (2005). The social net: Understanding human behavior in cyberspace. Oxford, UK: Oxford University Press.Google Scholar
Anselmi, D. L., & Law, A. L. (2007). Questions of gender: Perspectives and paradoxes. New York, NY: McGraw-Hill.Google Scholar
Anthony, K. (2004). In Weitz, P. (Ed.), Psychotherapy 2.0 (pp. 133–146). London, UK: Karnac.Google Scholar
Anthony, K., & Nagel, D. M. (2010). Therapy online: A practical guide. Thousand Oaks, CA: Sage.CrossRefGoogle Scholar
Ashby, W. R. (1966). Design for a brain: The origin of adaptive behavior. London, UK: Chapman and Hall.Google Scholar
Ashton, K. (2009). That “Internet of things” thing. RFID Journal. Retrieved from http://www.rfidjournal.com/articles/pdf?4986
Attrill, A. (Ed.). (2015a). Cyberpsychology. Oxford, UK: Oxford University Press.Google Scholar
Attrill, A. (2015b). Health psychology online. In Attrill, A. (Ed.), Cyberpsychology (pp. 164–182). Oxford, UK: Oxford University Press.Google Scholar
Attrill, A. (2015c). The manipulation of online self-presentation: Create, edit, re-edit, and present. New York, NY, Palgrave Macmillan.CrossRefGoogle Scholar
Atwood, G., & Stolorow, R. (2014). Structures of subjectivity: Explorations in psychoanalytic phenomenology and contextualism. London, UK: Routledge.Google Scholar
Bainbridge, W. S. (2014). Personality capture and emulation. London, UK: Springer.CrossRefGoogle Scholar
Balick, A. (2013). The psychodynamics of social networking: Connected-up instantaneous culture and the self. London, UK: Karnac.Google Scholar
Barak, A. (Ed.). (2008). Psychological aspects of cyberspace. New York, NY: Cambridge University Press.CrossRefGoogle Scholar
Barnes, S. B. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9). Retrieved from http://firstmonday.org/article/view/1394/1312.CrossRefGoogle Scholar
Bartlett, J. (2014). The dark net: Inside the digital underworld. London, UK: William Heinemann.Google Scholar
Berry, Danielle Bunten. (2011). ‘Why i design multi-player, online games.’ Wayback Machine (archived July 25, 2011). Originally from Berry's personal site, archived by Anticlockwise.com.
Biegelman, M. (2009). Identity theft handbook: Detection, prevention, and security. Hoboken, NJ: Wiley.Google Scholar
Billig, M. (2013). Learn to write badly: How to succeed in the social sciences. New York, NY: Cambridge University Press.CrossRefGoogle Scholar
Biocca, F., & Levy, M. R. (Eds.). (2013). Communication in the age of virtual reality. London, UK: Routledge.Google Scholar
Bisson, T. (1990). They're made out of meat. Retrieved from: http://www.terrybisson.com/page6/page6.html
Blascovich, J., & Bailenson, J. (2012). Infinite reality: The hidden blueprint of our virtual lives. New York, NY: William Morrow.Google Scholar
Buckels, E. E., Trapnell, P. D., & Paulhus, D. L. (2014). Trolls just want to have fun. Personality and Individual Differences, 67, 97–102.CrossRefGoogle Scholar
Burdea, G., & Coiffet, P. (2003). Virtual reality technology. Presence: Teleoperators and Virtual Environments, 12 (6), 663–664.CrossRefGoogle Scholar
Card, S. K., Moran, T. P., & Newell, A. (1986). The psychology of human computer interaction. Mahwah, NJ: Lawrence Erlbaum Associates.Google Scholar
Castronova, E. (2008). Exodus to the virtual world: How online fun is changing reality. New York, NY: Palgrave Macmillan.Google Scholar
Cattell, R. B. (1946). The description and measurement of personality. New York, NY: World Book.Google Scholar
Cooley, C. H. (1902). Human nature and the social order. New York, NY: C. Scribner's Sons.Google Scholar
Cooper, A. (Ed.). (2013). Cybersex: The dark side of the force: A special issue of the Journal Sexual Addiction and Compulsion. London, UK: Routledge.Google Scholar
Craig, A. B. (2013). Understanding augmented reality: Concepts and applications. New York, NY: Morgan Kaufmann.Google Scholar
Crook, C. (2015). The joy of missing out: Finding balance in a wired world. Gabriola Island, BC: New Society.Google Scholar
Csikszentmihalyi, M. (1990). Flow: The psychology of optimal experience. New York, NY: Harper and Row.Google Scholar
Daine, K., Hawton, K., Singaravelu, V., Stewart, A., Simkin, S., & Montgomery, P. (2013). The power of the web: A systematic review of studies of the influence of the Internet on self-harm and suicide in young people. PloS one, 8 (10), e77555.CrossRefGoogle ScholarPubMed
Darley, J. M., & Latané, B. (1968). Bystander intervention in emergencies: Diffusion of responsibility. Journal of Personality and Social Psychology, 8 (4), 377–383.CrossRefGoogle ScholarPubMed
Derrig-Palumbo, K., & Zeine, F. (2005). Online therapy: A therapist's guide to expanding your practice. New York, NY: Norton.Google Scholar
Dewan, N. A., Lorenzi, N. M., Riley, R. T., & Bhattacharya, S. R. (Eds.). (2014). Behavioral healthcare informatics: A guide for the clinician. London, UK: Springer.Google Scholar
Dibbell, J. (1993). A rape in cyberspace. Village Voice, 21 December. Retrieved from http://www.villagevoice.com/2005-10-18/specials/a-rape-in-cyberspace/
Diemer, J. E., Alpers, G. W., Peperkorn, H. M., Shiban, Y., & Mühlberger, A. (2015). The impact of perception and presence on emotional reactions: A review of research in virtual reality. Name: Frontiers in Psychology, 6, 26. Retrieved from http://journal.frontiersin.org/article/10.3389/fpsyg.2015.00400/full.Google ScholarPubMed
Dixon, N. F. (1971). Subliminal perception: The nature of a controversy. New York, NY: McGraw-Hill.Google Scholar
Dyson, E. (2005). Interview. Time Magazine, October.
Earnshaw, R. A. (Ed.). (2014). Virtual reality systems. New York, NY: Academic Press.Google Scholar
Ekman, P. (2007). Emotions revealed: Recognizing faces and feelings to improve communication and emotional life. New York, NY: Holt.Google Scholar
Ellis, A., & Harper, R. A. (1975). A guide to rational living. Chatsworth, CA: Wilshire.Google Scholar
Engelbart, D. C. (1995). Towards augmenting the human intellect and boosting our collective IQ. Communications of the ACM, 38 (8), 30–32.CrossRefGoogle Scholar
Epstein, S., & O'Brien, E. (1985). The person-situation debate in historical and current perspective. Psychological Bulletin, 98 (3), 513–537.CrossRefGoogle ScholarPubMed
Erikson, E. (1968). Identity, youth, and crisis. New York: W.W. Norton.Google Scholar
Exner, J. (2002). The Rorschach: Basic foundations and principles of interpretation. Hoboken, NJ: Wiley.Google Scholar
Festinger, L. (1954). A theory of social comparison processes. Human Relations, 7 (2), 117–140.CrossRefGoogle Scholar
Freud, A. (1937). The ego and the mechanisms of defense. London, UK: Hogarth Press.Google Scholar
Freud, S. (1915). Instincts and their vicissitudes. In Strachey, J. (Ed. & Trans.), The standard edition of the complete psychological works of Sigmund Freud (Vol. 14), 117–140. London, UK: Hogarth Press.Google Scholar
Freud, S. (1919). The uncanny. In Strachey, J. (Ed. & Trans.), The standard edition of the complete psychological works of Sigmund Freud (Vol. 17), 219–256.Google Scholar
Gackenbach, J. (Ed.). (1999). Psychology and the Internet: Intrapersonal, interpersonal, and transpersonal implications. New York, NY: Academic Press.Google Scholar
Gardner, H. (1999). Intelligence reframed: Multiple intelligences for the 21st century. New York, NY: Basic.Google Scholar
Gendlin, E. (1982). Focussing. New York, NY: Bantam.Google Scholar
Gibson, W. (1984). Neuromancer. New York, NY: Ace.Google Scholar
Gill, J., & Stokes, A. (2008). Online counseling: A handbook for practitioners. New York, NY: Palgrave Macmillan.Google Scholar
Godwin, M. (1994). Nine principles for making virtual communities work. Wired Magazine, June, Issue 2.06. Retrieved from http://archive.wired.com/wired/archive/2.06/vc.principles.html
Goss, S., & Anthony, K. (Eds.). (2003). Technology in counseling and psychotherapy. New York, NY: Palgrave Macmillan.CrossRefGoogle Scholar
Greenberg, J. R., & Mitchell, S. A. (1983). Object relations in psychoanalytic theory. Cambridge, MA: Harvard University Press.Google Scholar
Greenfield, D. (1999). Virtual addiction: Help for netheads, cyberfreaks, and those who love them. Oakland, CA: New Harbinger.Google Scholar
Grieve, R., Indian, M., Witteveen, K., Tolan, G. A., & Marrington, J. (2013). Face-to-face or Facebook: Can social connectedness be derived online?Computers in Human Behavior 29 (3), 604–609.CrossRefGoogle Scholar
Griffiths, M. (2000). Does Internet and computer addiction really exist? Some case study evidence. CyberPsychology and Behavior 3 (2), 211–218.CrossRefGoogle Scholar
Guest, T. (2008). Second lives: A journey through virtual worlds. New York, NY: Random House.Google Scholar
Herrigel, E. (1999). Zen in the art of archery. New York, NY: Vintage.Google Scholar
Hewson, C., & Buchanan, T. (Eds.). (2013). Ethical guidelines for Internet-mediated Research. Retrieved from http://www.bps.org.uk/system/files/Public%20files/inf206-guidelines-for-internet-mediated-research.pdf
Hoffman, H. G., Patterson, D. R., & Carrougher, G. J. (2000). Use of virtual reality for adjunctive treatment of adult burn pain during physical therapy: A controlled study. Clinical Journal of Pain, 16 (3), 244–250.CrossRefGoogle ScholarPubMed
Holland, N. N. (1996). The Internet regression. Retrieved from http://www.clas.ufl.edu/users/nholland/inetregr.htm
Holt, T. (2007). Subcultural evolution: Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28 (2) 171–198.CrossRefGoogle Scholar
Hsiung, R. C. (Ed.). (2002). E-therapy: Case studies, guiding principles, and the clinical potential of the internet. New York, NY: W. W. Norton.
Huh, S., & Williams, D. (2010). Dude looks like a lady: Gender swapping in an online game. In Bainbridge, W. (Ed.), Online worlds: Convergence of the real and virtual (pp. 161–174). London, UK: Springer.Google Scholar
Huskerson, T. (2014). Online scam's greatest hits. Relentlessly Creative.Google Scholar
James, W. (2013). The varieties of religious experience: A study in human nature. Norcross, GA: Trinity Press (originally published 1902).Google Scholar
Janis, I. (1972). Groupthink: A psychological study of foreign-policy decisions and fiascoes. Boston, MA: Houghton-Mifflin.Google Scholar
Jelenchick, L. A., Eickhoff, J. C., & Moreno, M. A. (2013). “Facebook depression?” Social networking site use and depression in older adolescents. Journal of Adolescent Health, 52 (1), 128–130.CrossRefGoogle ScholarPubMed
Johnson, D. W., & Johnson, F. P. (2012). Joining together: Group theory and group skills. New York, NY: Pearson.Google Scholar
Joinson, A. N. (1998). Causes and implications of disinhibited behavior on the Internet. In Gackenbach, J. (Ed.), Psychology and the Internet: Intrapersonal, interpersonal, and transpersonal implications (pp. 43–60). New York, NY: Academic Press.Google Scholar
Joinson, A. N. (2003). Understanding the psychology of Internet behavior: Virtual worlds, real lives. New York, NY: Palgrave Macmillan.Google Scholar
Joinson, A., McKenna, K. Y. A., Postmes, T., & Reips, U.D. (Eds.). (2009). The Oxford handbook of Internet psychology. Oxford, UK: Oxford University Press.Google Scholar
Jorgensen, D. (1989). Participant observation: A methodology for human studies. London, UK: Sage.CrossRefGoogle Scholar
Jung, C. G. (1969). Archetypes and the collective unconscious. Collected Works of C.G. Jung (Vol. 9, Part 1). Princeton, NJ: Princeton University Press.
Jung, C. G. (1981). The archetypes and the collective unconscious. Princeton, NJ: Princeton University Press.Google Scholar
Jurgenson, N. (2011). Digital dualism and the fallacy of web objectivity. Retrieved from http://thesocietypages.org/cyborgology/2011/09/13/digital-dualism-and-the-fallacy-of-web-objectivity/
Kabat-Zinn, J. (2005). Wherever you go there you are: Mindfulness meditation in everyday life. New York, NY:Hyperion.Google Scholar
Kim, A. J. (2006). Community building on the web: Secret strategies for successful online communities. Berkeley, CA: Peachpit Press.Google Scholar
King, S. (1995). Effects of mood states on social judgments in cyberspace: Self focussed sad people as the source of flame wars. Retrieved from http://psychcentral.com/storm1.htm
Kirwan, G., & Power, A. (2013). Cybercrime: The psychology of online offenders. New York, NY: Cambridge University Press.CrossRefGoogle Scholar
Kohut, H. (1977). The restoration of the self. Madison, CT: International Universities Press.Google Scholar
Kohut, H. (1980). Self psychology and the humanities. New York, NY: W. W. Norton and Company.Google Scholar
Kowalski, R. M., Limber, S., Limber, S. P., & Agatston, P. W. (2012). Cyberbullying: Bullying in the digital age. New York, NY: John Wiley & Sons.Google Scholar
Kraus, R., Stricker, G., & Speyer, C. (Eds.). (2004). Online counseling: A handbook for mental health professionals. Waltham, MA: Academic Press.Google Scholar
Kurzweil, R. (2013). How to create a mind: The secret of human thought revealed. New York: NY: Penguin.Google Scholar
Lanier, J. (2014). Who owns the future?New York, NY: Simon and Schuster.Google Scholar
Lapidot-Lefler, N., & Barak, A. (2012). Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in Human Behavior, 28 (2), 434–443.CrossRefGoogle Scholar
Levine, M. (1974). Scientific method and the adversary model: Some preliminary thoughts. American Psychologist, 29 (9), 661–677.Google Scholar
Levine, P. A. (1997). Waking the tiger: Healing trauma. Berkeley, CA: North Atlantic.Google Scholar
Licklider, J. C. R. (1960). Man-computer symbiosis. Transactions on Human Factors in Electronics, HFE-1, 4–11.Google Scholar
Lima, M. (2013). Visual complexity: Mapping patterns of information. New York, NY: Princeton Architectural Press.Google Scholar
Linden, A., & Fenn, J. (2003). Understanding Gartner's hype cycles. Strategic Analysis Report Nº R-20–1971 (pp. 1–12). Stamford, CT: Gartner, Inc.
Livingstone, S. (2013). Children and the Internet. Boston, MA: Polity Press.Google Scholar
Loftus, E. F., & Klinger, M. R. (1992). Is the unconscious smart or dumb?American Psychologist, 47 (6), 761–765.CrossRefGoogle ScholarPubMed
Luder, M. T., Pittet, I., Berchtold, A., Akré, C., Michaud, P. A., & Surís, J. C. (2011). Associations between online pornography and sexual behavior among adolescents: Myth or reality?Archives of Sexual Behavior, 40 (5), 1027–1035.CrossRefGoogle ScholarPubMed
Luft, J., & Ingham, H. (1955). The Johari window: A graphic model of interpersonal awareness. Proceedings of the Western Training Laboratory in Group Development. Los Angeles, CA: UCLA.Google Scholar
Mahler, M, Pine, F., & Bergman, A. (1975). The psychological birth of the human infant: Symbiosis and Individuation. New York, NY: Basic.Google Scholar
Malaby, T. (2009). Making virtual worlds: Linden lab and second life. Ithaca, NY: Cornell University Press.Google Scholar
Marczak, M., & Coyne, I. (2015). A focus on cyberbullying. In Attrill, A. (Ed.), Cyberpsychology (pp. 145–163). Oxford, UK: Oxford University Press.Google Scholar
Markham, A., & Buchanan, E. (with contributions from the AOIR Ethics Working Committee) (2012). Ethical decision-making and Internet research. Retrieved from http://www.aoir.org/reports/ethics2.pdf
Maslow, A. (1943). A theory of human motivation. Psychological Review, 50 (4), 370–396.CrossRefGoogle Scholar
Mayer, R. E. (2009). Multimedia learning. New York, NY: Cambridge University Press.CrossRefGoogle Scholar
Mayer-Schonberger, V., & Cukier, K. (2014). Big data: A revolution that will transform how we live, work, and think. New York, NY: Eamon Dolan/Mariner.Google Scholar
McDougall, J. (1989). Theaters of the body: A psychoanalytic approach to psychosomatic Illness. New York, NY: W. W. Norton.Google Scholar
McGinn, C. (2007). The power of movies: How screen and mind interact. New York, NY: Vintage.Google Scholar
McKevitt, P. (2011). Integration of natural language and vision processing: Recent advances. London, UK: Springer.Google Scholar
McLuhan, M., & Fiore, Q. (1967). The medium is the massage: An inventory of effects. New York, NY: Bantam.Google Scholar
McWilliams, N. (2011). Psychoanalytic diagnosis: Understanding personality structure in the clinical process. New York, NY: Guilford Press.Google Scholar
Mead, G. H. (1934). Mind, self, and society. Chicago, IL: University of Chicago Press.Google Scholar
Meadows, M. S. (2008). I, Avatar: The culture and consequences of having a second life. Berkeley, CA:New Riders.Google Scholar
Mehroof, M., & Griffiths, M. (2010). Online gaming addiction: The role of sensation seeking, self-control, neuroticism, aggression, state anxiety, and trait anxiety. Cyberpsychology, Behavior, and Social Networking, 13 (3): 313–316.Google Scholar
Minsky, M. (1980). Telepresence. Omni, 2 (9), 45–51.Google Scholar
Mitchell, K. J., Wells, M., Priebe, G., & Ybarra, M. L. (2014). Exposure to websites that encourage self-harm and suicide: Prevalence rates and association with actual thoughts of self-harm and thoughts of suicide in the United States. Journal of Adolescence, 37 (8), 1335–1344.CrossRefGoogle ScholarPubMed
Moore, R. (2010). Cybercrime: Investigating high technology computer crime. London, UK: Routledge.Google Scholar
Morahan-Martin, J. (2005). Internet abuse: Addiction? Disorder? Symptom? Alternative explanations?Social Science Computer Review, 23 (1), 39–48.CrossRefGoogle Scholar
Moreno, M. A., Jelenchick, L. A., Egan, K. G., Cox, E., Young, H., Gannon, K. E., & Becker, T. (2011). Feeling bad on Facebook: Depression disclosures by college students on a social networking site. Depression and Anxiety, 28 (6), 447–455.CrossRefGoogle ScholarPubMed
Mori, M. (1970). The uncanny valley. IEEE Robotics & Automation Magazine, 19 (2), 98–100.Google Scholar
Moscovici, S., & Zavalloni, M. (1969). The group as a polarizer of attitudes. Journal of Personality and Social Psychology, 12 (2), 125–135.CrossRefGoogle Scholar
Munro, K. (2002). How to resolve conflict online. Retrieved from http://kalimunro.com/wp/articles-info/relationships/article
Myers, I. B., & Myers, P. B. (1995). Gifts differing: Understanding personality type. Mountain View, CA: Davies-Black.Google Scholar
Nagel, K. (1996). The natural life cycle of mailing lists. Retrieved from http://truecenterpublishing.com/psycyber/lifelist.html
Nguyen, M., Bin, Y. S., & Campbell, A. (2012). Comparing online and offline self-disclosure: A systematic review. Cyberpsychology, Behavior, and Social Networking, 15 (2), 103–111.CrossRefGoogle ScholarPubMed
Norman, K. L. (2008). Cyberpsychology: An introduction to human-computer interaction. New York, NY: Cambridge University Press.Google Scholar
Norman, W. T. (1963). Toward an adequate taxonomy of personality attributes: Replicated factor structure in peer nomination personality ratings. Journal of Abnormal and Social Psychology, 66 (6): 574–583.CrossRefGoogle Scholar
Ohta, Y., & Tamura, H. (2014). Mixed reality: Merging real and virtual worlds. London, UK: Springer.Google Scholar
Ornstein, R. (1992). Evolution of consciousness: The origins of the way we think. New York, NY: Simon and Schuster.Google Scholar
Paasonen, S. (2011). Carnal Resonance: Affect and online pornography. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Patchin, J., & Hinduja, S. (2011). Cyberbullying prevention and response: Expert perspectives. London, UK: Routledge.Google Scholar
Penfield, W. (1961). Activation of the record of human experience. Annals of the Royal College of Surgeons, England, 29 (2), 77–84.Google ScholarPubMed
Pennebaker, J. W. (2004). Writing to heal: A guided journal for recovering from trauma and emotional upheaval. Oakland, CA: New Harbinger.Google Scholar
Perls, F. S. (1969). Gestalt therapy verbatim. Gouldsboro, ME: Gestalt Journal Press.Google Scholar
Piaget, J. (2001). The psychology of intelligence. New York, NY: Routledge. (originally published 1947)Google Scholar
Power, A., & Kirwan, G. (2014). Cyberpsychology and new media: A thematic reader. New York, NY: Psychology Press.Google Scholar
Purcell, K., & Rainie, L. (2014). Technology's impact on workers. PEW Research Center: Internet Science & Technology. Retrieved from http://www.pewinternet.org/2014/12/30/technologys-impact-on-workers/
Reeves, B., & Nass, C. (2003). The media equation: How people treat computers, television, and new media like real people and places. Stanford, CA: Center for the Study of Language and Information.Google Scholar
Reips, U. D. (2002). Standards for Internet-based experimenting. Experimental Psychology, 49 (4), 243–256.CrossRefGoogle ScholarPubMed
Rheingold, H. (1993). The virtual community: Homesteading on the electronic frontier. Cambridge, MA: MIT Press.Google Scholar
Richardson, A. (1969). Mental imagery. London, UK: Springer.CrossRefGoogle Scholar
Riessman, F. (1965). The helper therapy principle. Social Work, 10 (2), 26–32.Google Scholar
Riva, G., Loreti, P., Lunghi, M., Vatalaro, F., & Davide, F. (2003). Presence 2010: The emergence of ambient intelligence. Emerging Communication, 5 (1), 59–84.Google Scholar
Riva, G., Waterworth, J., & Murray, D. (Eds.). (2014). Interacting with presence: HCI and the sense of presence in computer-mediated environments. Warsaw, Poland: De Gruyter Open.CrossRefGoogle Scholar
Rosen, L. D., Whaling, K., Rab, S., Carrier, L. M., & Cheever, N. A. (2013). Is Facebook creating “iDisorders”? The link between clinical symptoms of psychiatric disorders and technology use, attitudes and anxiety. Computers in Human Behavior, 29 (3), 1243–1254.CrossRefGoogle Scholar
Rosenhan, D. (1973). On being sane in insane places. Science, 179 (4070), 250–258.CrossRefGoogle ScholarPubMed
Salter, A. (2004). Predators: Pedophiles, rapists, and other sexual offenders. New York, NY: Basic.Google Scholar
Schuemie, M. J., Van Der Straaten, P., Krijn, M., & Van Der Mast, C. A. (2001). Research on presence in virtual reality: A survey. CyberPsychology & Behavior, 4 (2), 183–201.CrossRefGoogle ScholarPubMed
Sharkey, S., Jones, R., Smithson, J., Hewis, E., Emmens, T., Ford, T., & Owens, C. (2011). Ethical practice in internet research involving vulnerable people: lessons from a self-harm discussion forum study (SharpTalk). Journal of Medical Ethics, 37 (12), 752–758.CrossRefGoogle Scholar
Short, J., Williams, E., & Christie, B. (1976). The social psychology of telecommunications. Hoboken, NJ: Wiley.Google Scholar
Short, M. B., Black, L., Smith, A. H., Wetterneck, C. T., & Wells, D. E. (2012). A review of Internet pornography use research: Methodology and content from the past 10 years. Cyberpsychology, Behavior, and Social Networking, 15 (1), 13–23.CrossRefGoogle ScholarPubMed
Silver, N. (2013). The signal and the noise: The art and science of prediction. New York, NY: Penguin.Google Scholar
Simmel, G. (2002). The metropolis and mental life. In G. Bridge & S. Watson (Eds.), The Blackwell City Reader (pp. 11–19). Oxford, UK, and Malden, MA: Wiley-Blackwell.Google Scholar
Sonck, N., Nikken, P., & de Haan, J. (2013). Determinants of Internet mediation: A comparison of the reports by Dutch parents and children. Journal of Children and Media, 7 (1), 96–113.CrossRefGoogle Scholar
Sonja, U., Nicole, M., & Cameran, K.Snapchat elicits more jealousy than Facebook: A comparison of Snapchat and Facebook use. Cyberpsychology, Behavior, and Social Networking, 18 (3), 141–146.
Spector, M., Merrill, M. D., Elen, J., & Bishop, M. J. (Eds.). (2013). Handbook of research on educational communications and technology. London, UK: Springer.Google Scholar
Spradley, J. P. (1980). Participant observation. New York, NY: Holt, Rinehart, and Winston.Google Scholar
Stein, D. J., Black, D. W., Shapira, N. A., & Spitzer, R. L. (2001). Hypersexual disorder and preoccupation with Internet pornography. American Journal of Psychiatry, 158 (10), 1590–1594.CrossRefGoogle ScholarPubMed
Stephenson, N. (1992). Snow crash. New York, NY: Bantam.Google Scholar
Sterling, B. (1992). The hacker crackdown. Retrieved from http://www.gutenberg.org/files/101/101-h/101-h.htm
Sternberg, J. (2012). Misbehavior in cyber places: The regulation in online conduct in virtual communities on the Internet. Lanham, MD: University Press of America.Google Scholar
Steuer, J. (1992). Defining virtual reality: Dimensions determining telepresence. Journal of Communication, 42 (4), 73–93.CrossRefGoogle Scholar
Suler, J. R. (1987). Computer-simulated psychotherapy as an aid in teaching clinical psychology. Teaching of Psychology, 14 (1), 37–39.CrossRefGoogle Scholar
Suler, J. R. (1993). Contemporary psychoanalysis and Eastern thought. Albany, NY: State University of New York Press.Google Scholar
Suler, J. R. (1996). The psychology of cyberspace. Retrieved from http://truecenterpublishing.com/psycyber/psycyber.html
Suler, J. R. (1997). The bad boys of cyberspace. In The psychology of cyberspace. Retrieved from http://truecenterpublishing.com/psycyber/badboys.html
Suler, J. R. (2001). The psychology of avatars and graphical space in multimedia chat communities. In Beiswenger, M. (Ed.) Chat communication (pp. 305–344). Stuttgart, Germany: Ibidem.Google Scholar
Suler, J. R. (2004a). The online disinhibition effect. CyberPsychology and Behavior, 7 (1), 321–326.CrossRefGoogle ScholarPubMed
Suler, J. R. (2004b). The psychology of text relationships. In Kraus, R., Zack, J., & Stricker, G. (Eds.), Online counseling: A handbook for mental health professionals (pp. 19–50). London: Elsevier Academic Press.Google Scholar
Suler, J. R. (2005). eQuest: Case study of a comprehensive online program for self-study and personal growth. CyberPsychology and Behavior, 8 (4), 379–386.CrossRefGoogle ScholarPubMed
Suler, J. R. (2008a). Image, action, word: Interpersonal dynamics in a photo-sharing community. CyberPsychology and Behavior, 11 (5), 555–560.CrossRefGoogle Scholar
Suler, J. R. (2008b). Cybertherapeutic theory and techniques. In Barak, A. (Ed.), Psychological aspects of cyberspace: Theory, research, applications (pp. 102–128). New York, NY: Cambridge University Press.Google Scholar
Suler, J. R. (2010). Madman: Strange adventures of a psychology intern. Doylestown, PA: True Center.Google Scholar
Suler, J. R. (2011). The impact of image streams. International Journal of Applied Psychoanalytic Studies, 9 (1), 84–88.Google Scholar
Suler, J. R. (2013a). Photographic psychology: Image and psyche. Retrieved from http://truecenterpublishing.com/photopsy/selfportraits.htm
Suler, J. R. (2013b). Qualitative research methodology for photographic psychology. Retrieved from http://truecenterpublishing.com/photopsy/QRM-PhotoPsy.pdf
Suler, J. R. (2013c). The varieties of self-portrait experiences. In Photographic psychology: Image and psyche. Retrieved from http://truecenterpublishing.com/photopsy/selfportraits.htm
Suler, J. R., & Phillips, W. (1998). The bad boys of cyberspace. Cyberpsychology and Behavior, 1 (2), 275–294.CrossRefGoogle Scholar
Sweller, J. (1988). Cognitive load during problem solving: Effects on learning. Cognitive Science, 12 (2), 257–285.CrossRefGoogle Scholar
Tikhomirov, O. K., Babaeva, Y. D., & Voiskounsky, A. Y. (1986). Computer-mediated communication. Moscow University Psychological Bulletin, 3 (2), 31–42.Google Scholar
Toffler, A. (1970). Future shock. New York: Random House.Google Scholar
Tuckman, B. (1965). Developmental sequence in small groups. Psychological Bulletin, 63 (6), 384–399.CrossRefGoogle ScholarPubMed
Turing, A. (1950). Computing machinery and intelligence. Mind, LIX (236), 433–460.CrossRefGoogle Scholar
Turkle, S. (1995). Life on the screen: Identity in the age of the Internet. Cambridge, MA: MIT Press.Google Scholar
Turkle, S. (2012). Alone together: Why we expect more from technology and less from each other. New York: Basic.Google Scholar
Voiskounsky, A. (2008). Flow experience in cyberspace: Current studies and perspectives. In Barak, A. (Ed.) Psychological aspects of cyberspace: Theory, research, applications (pp. 70–101). New York, NY: Cambridge University Press.Google Scholar
Walther, J. B. (1996). Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23 (1), 3–43.CrossRefGoogle Scholar
Wang, R., Bianchi, S. M., & Raley, S. B. (2005). Teenagers’ Internet use and family rules: A research note. Journal of Marriage and Family, 67 (5), 1249–1258.CrossRefGoogle Scholar
Warschauer, M. (2004). Technology and social Inclusion: Rethinking the digital divide. Cambridge, MA: MIT Press.Google Scholar
Weinberger, D. (2008). Small pieces loosely joined: A unified theory of the web. New York: Basic.Google Scholar
Weiser, J. (1993). Phototherapy techniques. San Francisco, CA: Jossey-Bass.Google Scholar
Weizenbaum, J. (1966). Eliza: A computer program for the study of natural language communication between man and machine. Communications of the ACM, 9 (1), 36–45.CrossRefGoogle Scholar
Wexelblat, A. (Ed.). (2014). Virtual reality: Applications and explorations. New York, NY: Academic Press.Google Scholar
Whitty, M., & Carr, A. (2006). Cyberspace romance: The psychology of online relationships. New York, NY: Palgrave Macmillan.CrossRefGoogle Scholar
Whyte, W. F. (1943). Street corner society: The social structure of an Italian slum. Chicago IL: University of Chicago Press.Google Scholar
Wiederhold, B., & Wiederhold, M. (2004). Virtual reality therapy for anxiety disorders: Advances in evaluation and treatment. Washington, DC: American Psychological Association.Google Scholar
Winnicott, D. (1971). Playing and reality. London, UK: Tavistock.Google Scholar
Witmer, B. G., & Singer, M. J. (1998). Measuring presence in virtual environments: A presence questionnaire. Presence: Teleoperators and Virtual Environments, 7(3), 225–240.CrossRefGoogle Scholar
Yalom, I. (1980). Existential psychotherapy. New York, NY: Basic.Google Scholar
Yalom, I. (2005). Theory and practice of group psychotherapy. New York, NY: Basic.Google Scholar
Yan, Z. (2012). Encyclopedia of cyber behavior. Hershey, PA: IGI Global.CrossRefGoogle Scholar
Yee, N., & Bailenson, J. (2007). The Proteus effect: The effect of transformed self-representation on behavior. Human Communication Research, 33 (3), 271–290.CrossRefGoogle Scholar
Young, K. (1998). Caught in the net. Hoboken, NY: Wiley.Google Scholar
Young, K., & Nabuco de Abreu, C. (Eds.). (2010). Internet addiction: Handbook and guide to evaluation and treatment. Hoboken, NJ: Wiley.Google Scholar
Zaheer, H., & Griffiths, M. (2008). Gender swapping and socializing in cyberspace: An exploratory study. CyberPsychology and Behavior, 11 (1), 47–53.Google Scholar
Zittrain, J. (2009). The future of the Internet – and how to stop it. New Haven, CT: Yale University Press.Google Scholar
Zubek, J. (Ed.) (1969). Sensory deprivation: Fifteen years of research. New York, NY: Appleton Century Crofts.Google Scholar
Zuckerman, M. (2007). Sensation seeking and risky behavior. Washington, DC: American Psychological Association.CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • John R. Suler, Rider University, New Jersey
  • Book: Psychology of the Digital Age
  • Online publication: 05 November 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316424070.020
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • John R. Suler, Rider University, New Jersey
  • Book: Psychology of the Digital Age
  • Online publication: 05 November 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316424070.020
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • John R. Suler, Rider University, New Jersey
  • Book: Psychology of the Digital Age
  • Online publication: 05 November 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316424070.020
Available formats
×