1
|
Srisinghasongkram P, Trairatvorakul P, Maes M, Chonchaiya W. Effect of early screen media multitasking on behavioural problems in school-age children. Eur Child Adolesc Psychiatry 2021; 30:1281-1297. [PMID: 32856131 DOI: 10.1007/s00787-020-01623-3] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 05/19/2020] [Accepted: 08/17/2020] [Indexed: 11/25/2022]
Abstract
Screen media multitasking (SMM), the act of exposure ≥ 2 screen media simultaneously, is increasing nowadays. Single media use was associated with child's behavioural problems in previous studies. However, the associations between SMM since early childhood and behavioural problems in school-age children had not been elucidated. This study aimed to investigate the association between SMM from age 6 months to 4 years and behavioural problems in 6-year-old children. Two hundred and ninety-one (52.6% girls) healthy children were enrolled since age 6 months and 259 participants were followed-up until age 6 years. SMM was obtained at age 6, 12, 18, 24 months, 3 and 4 years. Behavioural concerns were assessed at age 4 years by the Child Behaviour Checklist and by both the Strengths and Difficulties Questionnaire with the Conners Kiddie Continuous Performance Test at age 6 years. Parenting style, cognitive ability, and baseline characteristics were also ascertained. Partial least squares path modelling was performed to determine both direct and indirect relationships among variables. Results showed that children who had been exposed to SMM for longer duration, specifically at age 18 months, showed more behavioural problems at age 4 and 6 years. Positive parenting during preschool and behavioural concerns at age 4 years were main mediators of those associations. Moreover, SMM in minutes at age 18 months was related to decreased preschool cognition. To minimise behavioural problems in school-age children, SMM should be avoided before 2 years of age so that positive parenting may be successfully implemented since early childhood.
Collapse
Affiliation(s)
- Pornchada Srisinghasongkram
- Maximizing Thai Children's Developmental Potential Research Unit, Division of Growth and Development, Department of Paediatrics, Sor Kor Building, 11th Floor, King Chulalongkorn Memorial Hospital, Faculty of Medicine, Chulalongkorn University, 1873 Rama IV. Road, Pathumwan, Bangkok, 10330, Thailand
- Division of Growth and Development, Department of Paediatrics, Faculty of Medicine, Chulalongkorn University, Bangkok, 10330, Thailand
| | - Pon Trairatvorakul
- Maximizing Thai Children's Developmental Potential Research Unit, Division of Growth and Development, Department of Paediatrics, Sor Kor Building, 11th Floor, King Chulalongkorn Memorial Hospital, Faculty of Medicine, Chulalongkorn University, 1873 Rama IV. Road, Pathumwan, Bangkok, 10330, Thailand
- Division of Growth and Development, Department of Paediatrics, Faculty of Medicine, Chulalongkorn University, Bangkok, 10330, Thailand
| | - Michael Maes
- Department of Psychiatry, Faculty of Medicine, Chulalongkorn University, Bangkok, 10330, Thailand
| | - Weerasak Chonchaiya
- Maximizing Thai Children's Developmental Potential Research Unit, Division of Growth and Development, Department of Paediatrics, Sor Kor Building, 11th Floor, King Chulalongkorn Memorial Hospital, Faculty of Medicine, Chulalongkorn University, 1873 Rama IV. Road, Pathumwan, Bangkok, 10330, Thailand.
- Division of Growth and Development, Department of Paediatrics, Faculty of Medicine, Chulalongkorn University, Bangkok, 10330, Thailand.
| |
Collapse
|
2
|
Moustafa AA, Bello A, Maurushat A. The Role of User Behaviour in Improving Cyber Security Management. Front Psychol 2021; 12:561011. [PMID: 34220596 PMCID: PMC8253569 DOI: 10.3389/fpsyg.2021.561011] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/11/2020] [Accepted: 05/03/2021] [Indexed: 11/13/2022] Open
Abstract
Information security has for long time been a field of study in computer science, software engineering, and information communications technology. The term 'information security' has recently been replaced with the more generic term cybersecurity. The goal of this paper is to show that, in addition to computer science studies, behavioural sciences focused on user behaviour can provide key techniques to help increase cyber security and mitigate the impact of attackers' social engineering and cognitive hacking methods (i.e., spreading false information). Accordingly, in this paper, we identify current research on psychological traits and individual differences among computer system users that explain vulnerabilities to cyber security attacks and crimes. Our review shows that computer system users possess different cognitive capabilities which determine their ability to counter information security threats. We identify gaps in the existing research and provide possible psychological methods to help computer system users comply with security policies and thus increase network and information security.
Collapse
Affiliation(s)
- Ahmed A Moustafa
- School of Psychology, Western Sydney University, Sydney, NSW, Australia.,The Marcs Institute for Brain, Behaviour and Development, Western Sydney University, Sydney, NSW, Australia.,Department of Human Anatomy and Physiology, Faculty of Health Sciences, University of Johannesburg, Johannesburg, South Africa
| | - Abubakar Bello
- School of Social Sciences, Western Sydney University, Sydney, NSW, Australia
| | - Alana Maurushat
- School of Social Sciences, Western Sydney University, Sydney, NSW, Australia
| |
Collapse
|
3
|
Grobler M, Gaire R, Nepal S. User, Usage and Usability: Redefining Human Centric Cyber Security. Front Big Data 2021; 4:583723. [PMID: 33748750 PMCID: PMC7968726 DOI: 10.3389/fdata.2021.583723] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/15/2020] [Accepted: 01/20/2021] [Indexed: 11/13/2022] Open
Abstract
The effectiveness of cyber security measures are often questioned in the wake of hard hitting security events. Despite much work being done in the field of cyber security, most of the focus seems to be concentrated on system usage. In this paper, we survey advancements made in the development and design of the human centric cyber security domain. We explore the increasing complexity of cyber security with a wider perspective, defining user, usage and usability (3U’s) as three essential components for cyber security consideration, and classify developmental efforts through existing research works based on the human centric security design, implementation and deployment of these components. Particularly, the focus is on studies that specifically illustrate the shift in paradigm from functional and usage centred cyber security, to user centred cyber security by considering the human aspects of users. The aim of this survey is to provide both users and system designers with insights into the workings and applications of human centric cyber security.
Collapse
Affiliation(s)
- Marthie Grobler
- CSIRO's Data61, Distributed Systems Security, Melbourne, VIC, Australia
| | - Raj Gaire
- CSIRO's Data61, Distributed Systems Security, Canberra, ACT, Australia
| | - Surya Nepal
- CSIRO's Data61, Distributed Systems Security, Sydney, NSW, Australia
| |
Collapse
|
4
|
Alvarez SL, Baller SL, Walton A. Who Owns Your Health Data? Two Interventions Addressing Data of Wearable Health Devices among Young Adults and Future Health Clinicians. JOURNAL OF CONSUMER HEALTH ON THE INTERNET 2021. [DOI: 10.1080/15398285.2020.1852386] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
Affiliation(s)
- Sarah L. Alvarez
- Department of Health Sciences, James Madison University, Harrisonburg, VA, USA
| | - Stephanie L. Baller
- Department of Health Sciences, James Madison University, Harrisonburg, VA, USA
| | - Anthony Walton
- Department of Health Sciences, James Madison University, Harrisonburg, VA, USA
| |
Collapse
|
5
|
Chou HL, Chou C. A quantitative analysis of factors related to Taiwan teenagers’ smartphone addiction tendency using a random sample of parent-child dyads. COMPUTERS IN HUMAN BEHAVIOR 2019. [DOI: 10.1016/j.chb.2019.05.032] [Citation(s) in RCA: 20] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/07/2023]
|
6
|
Linkov V, Zámečník P, Havlíčková D, Pai CW. Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research. Front Psychol 2019; 10:995. [PMID: 31130903 PMCID: PMC6509749 DOI: 10.3389/fpsyg.2019.00995] [Citation(s) in RCA: 23] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/14/2018] [Accepted: 04/15/2019] [Indexed: 11/13/2022] Open
Abstract
The cybersecurity of autonomous vehicles (AVs) is an important emerging area of research in traffic safety. Because human failure is the most common reason for a successful cyberattack, human-factor researchers and psychologists might improve AV cybersecurity by researching how to decrease the probability of a successful attack. We review some areas of research connected to the human factor in cybersecurity and find many potential issues. Psychologists might research the characteristics of people prone to cybersecurity failure, the types of scenarios they fail in and the factors that influence this failure or over-trust of AV. Human behavior during a cyberattack might be researched, as well as how to educate people about cybersecurity. Multitasking has an effect on the ability to defend against a cyberattack and research is needed to set the appropriate policy. Human-resource researchers might investigate the skills required for personnel working in AV cybersecurity and how to detect potential defectors early. The psychological profile of cyber attackers should be investigated to be able to set policies to decrease their motivation. Finally, the decrease of driver's driving skills as a result of using AV and its connection to cybersecurity skills is also worth of research.
Collapse
Affiliation(s)
- Václav Linkov
- Department of Traffic Psychology, CDV – Transport Research Centre, Brno, Czechia
| | - Petr Zámečník
- Department of Traffic Psychology, CDV – Transport Research Centre, Brno, Czechia
| | - Darina Havlíčková
- Department of Traffic Psychology, CDV – Transport Research Centre, Brno, Czechia
| | - Chih-Wei Pai
- Graduate Institute of Injury Prevention and Control, College of Public Health, Taipei Medical University, Taipei, Taiwan
| |
Collapse
|