Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet Psychology (The Basics)

Buy
Internet Psychology (The Basics), 9781138656062 (1138656062), Routledge, 2017

We can't imagine our lives without the Internet. It is the tool of our existence; without it we couldn't work, plan our social and leisure activities, and interact with friends. The Internet’s influence on contemporary society extends across every aspect of our personal and professional lives, but how has this altered us in psychological terms? How are we to understand how the Internet can promote enormous amounts of caring and kindness to strangers and yet be the source of unremitting acts of terror?

This book, grounded in the latest cutting-edge research, enhances our understanding of how we, and our children, behave online. It explores questions such as:

  • Why does our self-control abandon us sometimes on the Internet?
  • Why does the Internet create a separate realm of social and personal relationships?
  • How does all that change us as people?
  • Are youngsters really as exposed and threatened on the web as people think?

Internet Psychology: The Basics is a vital and fascinating guide to the online world, drawing on classic theories of human behaviour to shed fresh light on this central facet of modern life. It argues that, even in an age of constant technological advancement, our understanding of the human psyche remains rooted in these well-established theories. Embracing both positive and negative aspects of Internet use, this easy introduction to the subject will appeal to students and general readers alike.

(HTML tags aren't allowed.)

Data Mining and Knowledge Discovery for Big Data: Methodologies, Challenge and Opportunities (Studies in Big Data)
Data Mining and Knowledge Discovery for Big Data: Methodologies, Challenge and Opportunities (Studies in Big Data)

The field of data mining has made significant and far-reaching advances over the past three decades. Because of its potential power for solving complex problems, data mining has been successfully applied to diverse areas such as business, engineering, social media, and biological science. Many of these applications search for...

An Introduction to Quantum Computing Algorithms
An Introduction to Quantum Computing Algorithms
In 1994 Peter Shor [65] published a factoring algorithm for a quantum computer that finds the prime factors of a composite integer N more efficiently than is possible with the known algorithms for a classical com­ puter. Since the difficulty of the factoring problem is crucial for the se­ curity of a public key encryption system,...
Excel 2016 VBA and Macros (includes Content Update Program) (MrExcel Library)
Excel 2016 VBA and Macros (includes Content Update Program) (MrExcel Library)

MASTER CORE EXCEL 2016 TOOLS FOR BUILDING POWERFUL, RELIABLE SPREADSHEETS!

 

Use this guide to automate virtually any routine task: save yourself hours, days, maybe even weeks! Make Excel do things you thought were impossible, discover macro...


Deep Learning: Practical Neural Networks with Java
Deep Learning: Practical Neural Networks with Java

Build and run intelligent applications by leveraging key Java machine learning libraries

About This Book

  • Develop a sound strategy to solve predictive modelling problems using the most popular machine learning Java libraries.
  • Explore a broad variety of data processing, machine learning,...
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Are you interested in learning about how to hack systems?

Do you want to learn how to protect yourself from being hacked?

Do you wish to learn the art of ethical hacking?

Do you want to know the secrets techniques that genius hackers use?

Do you want to learn how to protect yourself...

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy