Cyberpsychology - Monica T. Whitty - E-Book

Cyberpsychology E-Book

Monica T. Whitty

0,0
35,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

CYBERPSYCHOLOGY

An important new textbook for an exciting area of contemporary psychological study and research...

The field of cyberpsychology examines the psychology of interactions between individuals, societies and digital technologies. This engaging and accessible textbook offers a complete introduction to the subject. The authors outline key theories, provide critical assessments, identify areas in need of further research, and discuss ways to use digital technologies as a research tool. They also include a wealth of real life examples, activities and discussion questions for students at undergraduate and graduate levels.

Cyberpsychology provides up-to-date coverage of a wide range of topics relating to online behaviour, and considers the potential impact of these interactions offline:

  • online identity
  • online dating and relationships
  • pornography
  • cyberbullying
  • children's use of the Internet
  • online games and gambling
  • deception
  • online crime

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 563

Veröffentlichungsjahr: 2016

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Title Page

List of Tables, Figures and Boxes

TABLES

FIGURES

BOXES

1 Introduction

2 The ‘Self’ in Cyberspace

2.1 DEFINING THE ‘SELF’

2.2 THE SELF IN CYBERSPACE

2.3 DISEMBODIED SELVES IN CYBERSPACE

2.4 THE CYBORG SELF

2.5 GOFFMAN: PERFORMING SELF ONLINE

2.6 POSSIBLE SELVES IN CYBERSPACE

2.7 SOCIAL IDENTITIES IN CYBERSPACE

2.8 VISUALLY ANONYMOUS?

2.9 CONCLUSIONS

SUGGESTED READINGS

3 Online Relationships

3.1 TRADITIONAL RELATIONSHIPS: OFFLINE REALM

3.2 APPLYING OLD THEORIES TO ONLINE RELATIONSHIPS

3.3 NEW THEORIES TO EXPLAIN ONLINE RELATING

3.4 A BRIEF HISTORY OF ONLINE RELATING

3.5 CONTEMPORARY ONLINE SPACES

3.6 INTERACTING IN VARIOUS SPACES

3.7 FUTURE DEVELOPMENT IN THE FIELD

3.8 CONCLUSIONS

SUGGESTED READINGS

4 Online Dating

4.1 WHAT IS AN ONLINE DATING SITE?

4.2 MOTIVATIONS FOR USING AN ONLINE DATING SITE

4.3 PSYCHOLOGICAL CHARACTERISTICS OF ONLINE DATERS

4.4 COMPARING ONLINE DATING SITES WITH PERSONAL ADS

4.5 PRESENTING ONESELF ON AN ONLINE DATING SITE

4.6 DATING DECEPTION

4.7 A PERFECT MATCH OR A NUMBERS GAME?

4.8 STAGES IN THE ONLINE DATING PROCESS

4.9 CONCLUSIONS

SUGGESTED READINGS

5 Online Sexual Activities

5.1 THE BEGINNINGS OF INTERNET SEX

5.2 THE TRIPLE A ENGINE

5.3 CYBERSEX: DEBILITATING OR LIBERATING?

5.4 INTERACTIVE SEX ENTERTAINMENT

5.5 CYBERSEX ADDICTION

5.6 THE INTERNET AS AN ENABLER OF RISKY OFFLINE SEXUAL ENCOUNTERS

5.7 THE INTERNET AND SEXUAL HEALTH INFORMATION

5.8 SOCIAL SUPPORT AND EXPLORING SEXUALITY

5.9 TEENS AND RISKY SEXUAL ONLINE BEHAVIOUR

5.10 TELEDILDONICS AND THE FUTURE OF SEX IN CYBERSPACE

5.11 CONCLUSIONS

SUGGESTED READINGS

6 Internet Infidelity

6.1 DEFINING INTERNET INFIDELITY

6.2 UNFAITHFUL ONLINE SEXUAL ACTIVITIES

6.3 VIRTUAL OR REAL?

6.4 EMOTIONAL INFIDELITY

6.5 GENDER DIFFERENCES: WHICH IS WORSE – SEX OR LOVE?

6.6 QUALITATIVE DIFFERENCES BETWEEN ONLINE AND OFFLINE AFFAIRS

6.7 VIRTUAL AFFAIRS WITH AN AVATAR

6.8 CONCLUSIONS

SUGGESTED READINGS

7 Children’s and Teens’ Use of Digital Technologies

7.1 INTERNET USAGE

7.2 THE DIGITAL DIVIDE

7.3 DIGITAL TECHNOLOGIES: HARMFUL OR EMPOWERING FOR YOUNG PEOPLE?

7.4 ILLEGAL CONTENT AND ILLEGAL ACTIVITIES

7.5 CYBERBULLYING AND CYBERHARASSMENT

7.6 SCAMS, CHILDREN AND TEENS

7.7 IDENTITY DEVELOPMENT

7.8 ACTIVISM

7.9 RADICALIZATION

7.10 CONCLUSIONS

SUGGESTED READINGS

8 Online Education

8.1 TECHNOLOGY AND LEARNING

8.2 E‐LEARNING

8.3 E‐LEARNING VERSUS FACE‐TO‐FACE LEARNING

8.4 SYNCHRONOUS AND ASYNCHRONOUS COMMUNICATION WITHIN E‐LEARNING

8.5 MEDIA RICHNESS THEORY

8.6 SALMON’S STAGE MODEL OF E‐LEARNING

8.7 3‐D LEARNING ENVIRONMENTS

8.8 CONCLUSIONS

SUGGESTED READINGS

9 Leisure and Entertainment

9.1 WHAT IS LEISURE AND WHAT MOTIVATES OUR PURSUIT OF IT?

9.2 ONLINE FAMILY LEISURE

9.3 OLDER ADULTS

9.4 TECHNOFERENCE: ENCROACHING ON LEISURE TIME WITHIN RELATIONSHIPS

9.5 TELECOMMUNICATION

9.6 TIME AND FUNCTIONAL DISPLACEMENT EFFECTS

9.7 TWITTER

9.8 CONCLUSIONS

SUGGESTED READINGS

10 Online Gaming and Gambling

10.1 INTERNET ADDICTION

10.2 INTERNET GAMBLING ADDICTION

10.3 INTERNET GAMING ADDICTION

10.4 AGGRESSIVE VIDEO GAMES

10.5 TRANSCENDING TABOOS: VIDEO GAMES

10.6 GAMES FOR LEARNING

10.7 CONCLUSIONS

SUGGESTED READINGS

11 Online Deception

11.1 DEFINING DECEPTION

11.2 DECEPTION IN CYBERSPACE

11.3 DO WE LIE MORE ONLINE?

11.4 DETECTING DECEPTION

11.5 CONCLUSIONS

SUGGESTED READINGS

12 Online Crimes: Scams, Fraud and Illegal Downloads

12.1 PHISHING

12.2 VISHING

12.3 WHY ARE PEOPLE TRICKED BY PHISHING?

12.4 IMPROVING DETECTION

12.5 MASS‐MARKETING FRAUD

12.6 AWARENESS CAMPAIGNS

12.7 COGNITIVE AND MOTIVATIONAL ERRORS

12.8 WHAT TYPE OF PERSON TENDS TO BE SUSCEPTIBLE TO MMF?

12.9 STAGES INVOLVED IN THE ONLINE DATING ROMANCE SCAM

12.10 ILLEGAL DOWNLOADS

12.11 CONCLUSIONS

SUGGESTED READINGS

13 Online Crimes: Cyberharassment, Hate Crimes and Cyberwarfare

13.1 ONLINE HARASSMENT AND STALKING

13.2 CYBERSTALKING AND THE LAW

13.3 PSYCHOLOGICALLY PROFILING CRIMINALS AND VICTIMS

13.4 HATE CRIMES

13.5 CYBERWARFARE

13.6 SURVEILLANCE AND MONITORING

13.7 CONCLUSIONS

SUGGESTED READINGS

14 Online Crimes: Child Pornography and Paedophilia

14.1 THE INTERNET AND THE INCREASE IN CHILD PORNOGRAPHY

14.2 CHILD PORNOGRAPHY AND THE LAW

14.3 PSEUDO‐PHOTOGRAPHS

14.4 TYPES OF CHILD PORNOGRAPHY OFFENDERS

14.5 CHARACTERISTICS OF CHILD PORNOGRAPHY OFFENDERS

14.6 THE RELATIONSHIP BETWEEN CHILD PORNOGRAPHY AND HANDS‐ON OFFENDING

14.7 THEORETICAL APPROACHES TO CHILD PORNOGRAPHY OFFENDING

14.8 CONCLUSIONS

SUGGESTED READINGS

15 Online Support and Health Care

15.1 THE INTERNET AND HEALTH

15.2 CHARACTERISTICS AND MOTIVATIONS

15.3 ONLINE HEALTH SEARCHING AND CYBERCHONDRIA

15.4 SOCIAL MEDIA, GROUP FORUMS AND SUPPORT SITES

15.5 E‐THERAPY

15.6 ASSESSING THE EFFECTIVENESS OF E‐THERAPIES

15.7 IMMERSIVE VIRTUAL ENVIRONMENTS AS AIDS TO TREATMENT

15.8 CONCLUSIONS

SUGGESTED READINGS

16 Concluding Thoughts

References

Index

End User License Agreement

List of Tables

Chapter 07

Table 7.1

Opportunities and risks relating to young people’s use of the Internet (adapted from Livingstone, 2009)

Chapter 11

Table 11.1

The feature‐based model: ranking predictions of likelihood of lying (adapted from Hancock et al., 2004)

Chapter 12

Table 12.1

Errors in decision‐making with respect to scams (identified by Lea et al. 2009a, p. 24)

List of Illustrations

Chapter 08

Figure 8.1

Measures of learning performance

Chapter 10

Figure 10.1

The general aggression model’s episodic processes

Chapter 12

Figure 12.1

Example of a phishing email

Guide

Cover

Table of Contents

Begin Reading

Pages

iii

ii

ii

x

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

BPS Textbooks in Psychology

BPS Wiley presents a comprehensive and authoritative series covering everything a student needs in order to complete an undergraduate degree in psychology. Refreshingly written to consider more than North American research, this series is the first to give a truly international perspective. Written by the very best names in the field, the series offers an extensive range of titles from introductory level through to final year optional modules, and every text fully complies with the BPS syllabus in the topic. No other series bears the BPS seal of approval!

Many of the books are supported by a companion website, featuring additional resource materials for both instructors and students, designed to encourage critical thinking, and providing for all your course lecturing and testing needs.

For other titles in this series, please go to http://psychsource.bps.org.uk.

Cyberpsychology

The Study of Individuals, Society and Digital Technologies

MONICA THERESE WHITTY

UNIVERSITY OF WARWICK, UK

GARRY YOUNG

NOTTINGHAM TRENT UNIVERSITY, UK

 

 

 

 

 

 

This edition first published 2017 by the British Psychological Society and John Wiley & Sons, Ltd.© 2017 John Wiley & Sons, Ltd.

Registered OfficeJohn Wiley & Sons, Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

Editorial Offices350 Main Street, Malden, MA 02148–5020, USA9600 Garsington Road, Oxford, OX4 2DQ, UKThe Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

For details of our global editorial offices, for customer services, and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com/wiley‐blackwell.

The right of Monica Therese Whitty and Garry Young to be identified as the authors of this work has been asserted in accordance with the UK Copyright, Designs and Patents Act 1988.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book.

Limit of Liability/Disclaimer of Warranty: While the publisher and authors have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. It is sold on the understanding that the publisher is not engaged in rendering professional services and neither the publisher nor the author shall be liable for damages arising herefrom. If professional advice or other expert assistance is required, the services of a competent professional should be sought.

Library of Congress Cataloging‐in‐Publication Data

Names: Whitty, Monica Therese, 1969– author. | Young, Garry, 1966– author.Title: Cyberpsychology : the study of individuals, society and digital technologies / Monica Whitty, Garry Young.Description: Hoboken : Wiley, 2017. | Includes bibliographical references and index.Identifiers: LCCN 2016014408| ISBN 9780470975626 (pbk.) | ISBN 9781118321126 (epub)Subjects: LCSH: Internet users–Psychology. | Internet–Psychological aspects. | Internet–Social aspects. | Virtual reality–Moral and ethical aspects. | Cyberspace–Psychological aspects. | Computer crimes.Classification: LCC HM851 .W4556 2016 | DDC 302.23/1–dc23LC record available at https://lccn.loc.gov/2016014408

A catalogue record for this book is available from the British Library.

Cover image: Mina De La O / Gettyimages

The British Psychological Society’s free Research Digest e‐mail service rounds up the latest research and relates it to your syllabus in a user‐friendly way. To subscribe go to www.researchdigest.org.uk or send a blank e‐mail to [email protected].

List of Tables, Figures and Boxes

TABLES

7.1

Opportunities and risks relating to young people’s use of the Internet (adapted from Livingstone, 2009)

11.1

The feature‐based model: ranking predictions of likelihood of lying (adapted from Hancock et al., 2004)

12.1

Errors in decision‐making with respect to scams (identified by Lea et al. 2009a, p. 24)

FIGURES

8.1

Measures of learning performance (adapted from Sun & Cheng, 2007, p. 666)

10.1

The general aggression model’s episodic processes (Anderson & Bushman, 2002, p. 34)

12.1

Example of a phishing email

BOXES

7.1

Young people’s use of the Internet in the UK

7.2

Young people’s use of the Internet in the US

1Introduction

Digital technologies play important roles in both our everyday and working lives and will continue to increase in importance in the future. Given this importance it is no wonder that cyberpsychology has emerged as a new subdiscipline within psychology and is being taught in many mainstream psychology degrees as well as disciplines such as media and communications, philosophy, sociology, criminology and security studies. Well‐regarded, high‐impact journals have been available for some time that focus solely on cyberpsychology. Conferences have also been designed to focus on this topic and are growing in popularity. Cyberpsychology master’s courses are sprouting up across the globe and the number of students drawn to these courses continues to increase – most likely because the Internet continues to grow and affect people’s lives in new, challenging and exciting ways.

Cyberpsychology is the study of individuals, societies and digital technologies and the psychology of how these interact. Cyberpsychology applies psychological theory to explain how individuals interact in cyberspace and how these interactions might affect our offline lives. It offers a new way to define the self and society. In this book, we have attempted to cover the breadth and depth of cyberpsychology, although as the discipline expands it is likely to incorporate new and exciting areas and foci.

This book is intended as a textbook for both undergraduate and postgraduate students in psychology as well as other relevant degrees that incorporate psychology into their syllabuses. It aims to set out key theories and empirical research conducted within the field of cyberpsychology. It does so by also considering real‐world problems and events, and considers how theories in this field might shed further light on our understanding of these issues. Moreover, it engages readers with novel and relevant issues – encouraging them to critically evaluate the current literature and to take their own personal stance on particular issues.

We begin the book by focusing on the complex issue of defining the ‘Self’ in cyberspace, and present the argument that the Internet has changed the way we view and understand the self. In Chapter 2, we start by considering traditional theories of the self – for example, trait theory, social identity theory, possible selves, a social constructionist approach and a postmodern view of the self. We follow this with a history of how the self has been understood in cyberspace. In this chapter we acknowledge Turkle’s early work, which theorized that individuals could explore and gain new insights about identity within cyberspace. Other theorists who embraced these utopian views about the Internet are also mentioned in this chapter, with particular reference to feminist theorists, such as Haraway. We note, however, that Turkle has in more recent times rejected her own earlier claims and now takes the opposite view, arguing that digital technologies can lead to a new sense of solitude. Gergen’s theory on the saturated self is also highlighted here, as is his view that new technologies have led to a fragmentation of the self. We briefly outline the ways in which traditional theories of the self have been applied to how the self might be presented in cyberspace – for example, considering Goffman’s ‘performing self’, the theory of ‘possible selves’ and social identity theory. We conclude the chapter by noting that there are few places where users can be visually anonymous, and we therefore suggest that theories of the self online need to consider differences between spaces where users are visually anonymous and those where they present images of themselves, as well as the choices they make to visually present themselves.

In Chapter 3, we set out some of the theories and classic studies that have examined online relationships – both between friends and romantic. We begin by setting out some of the well‐known theories on relationship development that explain how relationships develop in the physical realm, such as social evolutionary theory, social penetration theory, exchange theory and equity theory. We then move on to examine how these theories might be used to explain the development of online relationships, and point out some of their shortcomings. Given these shortcomings, theories have been developed to explain the uniqueness of some relationships initiated and developed in cyberspace compared with the physical world. Theories such as the ‘disinhibition effect’, social presence theory, social information processing theory and hyperpersonal communication theory are outlined. We explain how these theories have emerged and how they have been applied to explain online relating. We also provide a brief history of online relating and detail some of the ways in which relating has changed as technology has developed – especially from a more textual space to a space with greater bandwidth and less visual anonymity.

Online dating has changed from a stigmatized method for finding a date to a popular matching method for people in many countries across a range of ages. Chapter 4 focuses specifically on this phenomenon, and picks up on some of the theories outlined in Chapter 3 to examine how relationship initiation and development differ from but also share commonalities with relationships formed in other places online and in the physical realm. We examine research that has found personality differences relating to use of online dating; for example, some studies have found that shy individuals are more likely to use dating sites compared with more socially confident individuals. We also explore the notion that the self is commodified on online dating sites and that how one is presented is, in part, dependent on which aspects are more likely to draw in desirable dates (this motivation sometimes leads to deception, where daters lie about certain aspects of themselves, such as height and weight). We also go through the stages involved in the online dating process, noting that a new wave of dating apps is changing users’ experiences of this process.

In Chapter 5 we consider online sexual activities. We note that, even in the early days of the Internet, people engaged in cybersex, in the form of erotic textual communication. This chapter outlines some of the well‐cited papers that consider why individuals partake in cybersex. The Triple A Engine, for example, is a model put forward by Cooper and his colleges to argue that the Internet’s affordability, anonymity and accessibility initially led some individuals to be drawn to this space to engage in sexual activities. Cooper believed that some of these people became cybersex compulsives. This chapter further outlines some of the problems associated with cybersex as well as some of its liberating aspects. One of the problems, which continues to exist in contemporary times, is that the Internet enables risky offline sexual encounters, with research revealing correlations between locating sexual partners online and contracting sexually transmitted infections (STIs). Sexting, described in this chapter, is also an activity that is problematic and sometimes illegal. On the flip side, however, the Internet provides sexual health information, which is easy to access, without the perceived embarrassment of asking a doctor, thereby potentially preventing the transmission of sexual diseases.

As we discuss in Chapter 6, some people perceive Internet infidelity to be a genuine betrayal that can have real repercussions in couples’ lives. We define Internet infidelity based on current theories and empirical findings. We examine the sexual and emotional aspects of relationship transgressions both online and offline. This chapter also presents a critical examination of the theories that explain why men and women become jealous in the physical world (e.g., social evolutionary theory and the social cognitive approach) and whether these theories can be applied to explain jealousy about seemingly equivalent activities in cyberspace. Although there is a dearth of research available on Internet infidelity, the chapter points out some possible qualitative differences between online and offline affairs. Online affairs, for example, are potentially easier to split off from people’s everyday lives – making it easier for people engaging in an affair to rationalize that it is not a relationship transgression. We also consider whether having cybersex with an avatar might constitute ‘real’ betrayal. Here, we provide some real‐life examples in which people have felt hurt and betrayed by their partners’ cybersex activities in Second Life.

There has been much talk over the years about the digital divide. Some discuss this with respect to a divide between social classes, while others consider differences between ages (e.g., digital natives vs. digital immigrants). Chapter 7 focuses on digital natives – children’s and teens’ use of digital technologies. It does not, however, simply address the ease with which young people have appropriated digital technologies into their lives. In addition, it considers the issues young people have had to deal with since before there was an Internet (e.g., identity, sexuality, activism) and how these issues are dealt with in cyberspace. We examine here whether the use of digital technologies might be harmful or empowering for young people and detail empirical findings that support both views. A balanced view is provided, pointing out both the risks and the opportunities. We examine the types of illegal content young people might be exposed to and the kinds of illegal activities some young people engage in. We also ask whether, for some youth, exposure to illegal content might be the start of a slippery slope. Although we examine cyberharassment in Chapter 13, in this chapter, we pay some attention to how this behaviour can affect young people. This chapter also outlines how criminals target young people in order to scam them as well as how their identity might be stolen to then be used to scam others (e.g., the grandparents scam). Finally, the chapter addresses the very real concern of radicalization of youth via the Internet.

As far back as 1913, Thomas Edison predicted that new technology would be at the forefront of education. As Chapter 8 illustrates, Edison was probably correct in his prediction, but most likely in ways that he did not imagine. We begin the chapter by focusing on e‐learning and compare this with face‐to‐face learning, noting the advantages e‐learning has to offer. We also comment on the features used in e‐learning that might have a detrimental effect on students’ learning performance. When comparing e‐learning with face‐to‐face learning, we find that different types of learning might benefit from different teaching practices. For example, researchers have found that students prefer face‐to‐face discussions when engaged with difficult tasks and computer‐mediated learning for simple tasks. In this chapter, as we have done in other chapters, we compare and contrast synchronous and asynchronous communication. We highlight the advantages of both with respect to e‐learning. We also point out the necessary conditions for successful e‐learning, including cognitive presence, social presence and teaching presence. In addition, we introduce the reader to media richness theory: a theory that has been applied to a number of settings, including educational. We set out, according to this theory, when it is best to use e‐learning practices. Salmon’s stage model is also looked at in this chapter, together with applications of this model to Second Life. Indeed, Second Life and other 3‐D learning environments have become popular spaces for educators to use as learning environments, and in this chapter we take a look at some of the studies that have evaluated learning in these environments.

In Chapter 9 we move the focus from education to the pursuit of leisure and entertainment. Does the Internet free up time in which to pursue leisure activities? Does it provide new forms of entertainment? This chapter examines these questions and many more. We begin the chapter by operationalizing leisure, pointing out the different forms of leisure, such as serious and casual pastimes, and how, in the past, families might have more often joined together to play a board game at home. In contrast to this more traditional view, when we think of online games, we often image a teenager in a locked bedroom playing games in isolation or hooked up with other teenagers in their own bedrooms. Researchers, however, have found that online games can also help family members to keep in touch. Moreover, and as the reader will learn, one of the main functions of the Internet for older users is the pursuit of leisure activities, such as engaging in virtual hobbies (e.g., constructing family trees). Importantly, this chapter consults the literature on how much time we spend online for leisure and entertainment and how this compares with time spent on entertainment in the physical world. It examines the displacement and the engagement hypotheses. Readers will probably not be surprised to learn that many people multitask entertainment in both realms (e.g., playing an online video game while watching the television). The chapter does question, however, how psychologically healthy it is to combine these tasks. In the final section of this chapter we consider how Twitter has been used as a source of entertainment, as well as the impact it has had on the perceived relationship between those who follow celebrities and the celebrity tweeters themselves.

Chapter 10 considers entertainment in more detail by focusing on gaming and gambling. We begin by examining online gaming and gambling addictions. It has been speculated, for instance, that Internet gambling is potentially more likely to lead to addiction than gambling offline. Certain features of online gambling, such as access, privacy, anonymity and a better game experience, might increase the risk of developing problems. The addition of ‘Internet gaming disorder’ in the latest Diagnostic and Statistical Manual of Mental Disorders (DSM) is considered here together with some of the research linking online gaming problems with other psychological problems (e.g., attention deficit hyperactivity disorder (ADHD), sleep deprivation, substance abuse). This chapter also examines the theories and empirical evidence that address whether video games might lead to violent behaviour. Some of these theories include social learning theory, script theory, the frustration–aggression hypothesis, the cognitive neoassociation model and the general aggression model. We provide a critique of each of these theories and give details of studies that have attempted to find evidence for a link between aggressive behaviour and playing aggressive video games. We conclude, however, that the research findings are, at best, weak. Nevertheless, although violent videos games may have little to zero impact on aggressive behaviour, there still might be reason to feel some concern for people who play video games with certain content – that is, content considered taboo in the physical world (such as rape, torture or cannibalism). In this chapter we consider the available literature that investigates this issue, which suggests that some people might not be able to cope psychologically with engaging with this material in a game. Although much of the focus of this chapter is on the negatives of playing video games, we note that there are also many positives. For starters, video games are fun and enjoyed by many. Second, video games are increasing in popularity as educational tools, and in a range of settings. We conclude the chapter by considering some of the ways in which games might be used to teach new skills as well as attitudes.

In earlier chapters, we examine how people self‐disclose more about themselves online (becoming hyperhonest). In contrast, in Chapter 11, we examine whether people are more deceptive in cyberspace compared to in the physical realm. Online, users can potentially deceive a greater number of people in novel ways. We begin this chapter by defining deception and move on to consider the types of deceptions evident in cyberspace: identity‐based deception and message‐based deception. Case studies on the ‘Munchausen by Internet’ phenomenon are provided in order to give examples of identity‐based deception. (Munchausen’s syndrome is a psychological condition where someone lies about being ill or induces symptoms of illness in themselves.) Munchausen by Internet is therefore a psychological condition, and some believe it ought to be formally recognized in the DSM. The Internet might afford us more opportunities to lie, but do we actually lie more on the Internet? This chapter examines the empirical evidence that addresses this question and elucidates some interesting conclusions. The current research suggests that people, in the main, lie more on the telephone. The chapter presents the features‐based model, which explains this finding. We present studies that support this model but also point out that the model is not always supported when a distinction is made between spontaneous and planned lies. We also examine research that has attempted to detect deception – both offline and in cyber realms. Although much research is still needed, computer scientists, in particular, are starting to detect criminals who hide behind multiple identities.

Chapter 12 focuses on deception carried out by criminals including criminal acts such as phishing, mass‐marketing fraud (MMF) and illegal downloads of online material. We begin the chapter by focusing on phishing, explaining how it works and the numbers of people who are tricked by this scam. The chapter also considers spear phishing, which is similar to phishing but involves a targeted attack rather than a random hack. Research has been conducted using real phishing emails to investigate why users respond to these emails. It has been found, for example, that paying attention to visceral triggers increases the likelihood of responding. Personality has also been found to play a role in predicting who is more likely to respond to a phishing email. This chapter considers the training programmes that have been developed to help end users detect phishing emails and the evaluation of these programmes. As the reader will note, there is still a great need to develop more effective training programmes. This chapter also considers another type of scam, that of MMF, which is a type of fraud that exploits mass communication techniques (e.g., bulk mailing, email, instant messaging, social networking sites (SNSs)) to con people out of money. We provide examples and data on the number of victims of this fraud. We provide a detailed account of the stages involved in the online dating romance scam. As with phishing attacks, personality has been found to predict the sorts of person who are more likely to respond to MMFs; however, the profiles potentially differ according to the specific fraud. The sorts of cognitive and motivation errors that victims are likely to make are also noted here. We point out that the harm caused by these types of scams can be both financial and psychological. Prevention and detection of MMF is difficult, as this chapter explains, and awareness campaigns have yet to be properly evaluated. Finally, we examine illegal downloads of online material, such as music and video. We comment on how individuals who engage in these activities often do not recognize their actions as criminal. Approaches to preventing this form of criminal behaviour are discussed, including encouraging individuals to think differently about purchasing materials such as videos and music in the future.

In Chapter 13 we continue focusing on the topic of online crimes by examining cyberharassment, hate crimes and cyberwarfare. We begin the chapter by considering online harassment and online stalking (a form of harassment). We operationalize these terms and discuss some of the problems with inconsistencies in the law across different countries. According to the literature, the Internet has afforded new opportunities to cyberstalk both individuals and organizations. Additionally, cyberstalking can, of course, accompany stalking and harassment in the physical realm. This chapter outlines some of the main distinctions between stalker and cyberstalking profiles, while noting that the research is fairly scant. It then moves on to consider hate crimes more broadly and examines how they might be carried out in cyberspace. We provide examples of hate crimes as well as extremists groups that have an online presence in order to recruit members to their groups. We also consider cyberwarfare – another topic with a scarcity of available research. We note here that governments and society have yet to properly codify and sanction a body of norms to govern state action in cyberspace. We also highlight some of the features of cyberwar that set it apart from traditional warfare. These features, we suggest, need to be considered as scholars and governments rethink the rules of war with respect to cyberwarfare. One way to detect and counteract cyberattacks is via surveillance and monitoring. Although surveillance may be employed with good intentions, it nonetheless impinges on innocent civilians’ privacy. Unsurprisingly, then, there has been much upset voiced by citizens about governments ‘spying’ on their online activities. We conclude this chapter by considering some of the current debates regarding surveillance and monitoring.

Chapter 14 continues to focus on online crimes, this time with a focus on child pornography and paedophilia. We acknowledge the increase in child pornography since the advent of the Internet and offer some reasons for this increase. The chapter also, importantly, provides a summary of legislation around child pornography in the UK and the US, and highlights some of the differences in this legalization. This comparison is made in order to elucidate the problems that can arise when law enforcement has to deal with this crime across borders; the comparison also points out some of the issues surrounding the application of the law to more recent phenomena, such as sexting. The psychological disorders associated with certain types of paedophilia are outlined, as is the role the Internet plays in these disorders. We also explain the differences between paedophiles who view child pornography and those who collect it, breaking down the types of collectors into the following categories: closet collector, isolated collector, cottage collector and commercial collector. This chapter summarizes the research that has considered the profile of the child pornography offender, although we note that many studies contend that a typical child pornography offender profile does not exist. The relationship between those who view child pornography and those who commit hands‐on offences is considered with respect to the slippery slope hypothesis. In the final sections of this chapter we examine theoretical models that have been specifically developed or applied from other fields to explain why someone becomes a paedophile, considering, for example, courtship disorder theory, social learning theory, Finkelhor’s precondition model, the pathways model and the integrated theory of sexual offending.

The focus in Chapter 15 moves from online crimes to online support and health care. We begin the chapter by highlighting figures that demonstrate the shift from obtaining health‐related information in the physical world, via doctors and specialist services, to searching for sources online. We explicate the research that suggests that individuals who have just been diagnosed with a medical condition or who are seeking to help others cope with their medical problems are the most likely to search for health‐related information on the Internet. We acknowledge here the benefits of obtaining health‐related information from the Internet but also point out some of the problems associated with this activity. Some patients, for instance, feel more anxious after reading information about their particular illnesses. In addition, we note a specific problem associated with Internet searches for health‐related information, that of ‘cyberchondria’. Cyberchondria is construed not only as a form of reassurance‐seeking but also as a manifestation of health anxiety and hypochondriasis. In this chapter we also consider the utility of online health forums, presenting evidence to suggest both the positive and negative effects of engaging in such forums. We also focus on e‐therapy, operationalizing the term and examining the research on the benefits and drawbacks of this form of therapy. The dishibition effect is revisited in this chapter in the context of the problems it might cause for some individuals in therapy. Although there has been some research on the evaluation of the effectiveness of e‐therapies (some of which we summarize here), we note that more research is needed and that currently the findings are mixed. We conclude this chapter by considering immersive virtual environments and how they have been employed as tools in the treatment of a range of psychological problems. We provide examples of various psychological problems that could potentially be treated in these environments, such a phobias and post‐traumatic stress disorder.

Our final chapter is a wrap up of the book. In Chapter 16, we remind the reader of some of the main issues discussed in the book and point to the current gaps in the literature. We remind the reader that it is important to understand that, as the Internet evolves, the way we behave online may also change, although some aspects will remain the same. We question whether the Internet has brought about a new world with new psychological issues, opportunities and challenges, and how much of our psychology remains the same.

2The ‘Self’ in Cyberspace

Ever since the beginnings of the Internet, how the self has been constructed and understood in cyberspace has been an area of concern. Are we different people online from the people we are offline, or does the Internet provide us with new opportunities to gain greater insights about ourselves? Do the selves we create in cyberspace transcend to other spaces? This chapter provides an overview of some of the key psychological theories and research that have examined the self in cyberspace. It is recognized in this chapter that scholars operationalize the self in various ways. We are not promoting one theory over another but rather highlighting some of the more influential work carried out in the field.

2.1 DEFINING THE ‘SELF’

There have been many theories put forth to explain the concept of ‘Self’. Philosophers and theologians were the first to try to define the self. Psychologists often use the terms ‘self’ and ‘identity’ interchangeably, although many would argue that these are separate concepts (e.g., Owens, 2006). Although it is beyond the scope of this book to set out the competing psychological theories about the self and identity, before examining the self in cyberspace, it is worthwhile to consider some of these original theories.

As far back as the 1890s, psychologists have attempted to define what they mean by the ‘self’. William James (1892/1963), one of the pioneers in psychology, made a distinction between two aspects of the self: the self as subject, or the ‘I’, and the self as object, or the ‘me’. The ‘looking‐glass self’ was a concept developed by Cooley (1902) to describe the concept that a person’s self grows out of society’s interpersonal interactions and the perceptions of others. For Cooley, there is no self without society.

2.1.1 Trait theory and the self

Trait psychologists have argued that the self contains specific traits that are evolved, heritable and universal across cultures (MacDonald, 1998; McCrae, 2000). These theorists assume that traits are fairly stable over time, that individuals have different traits and that traits influence behaviour. Cattell (1946), for example, proposed a two‐tiered personality structure with 16 primary factors (warmth, reasoning, emotional stability, dominance, liveliness, rule‐consciousness, social boldness, sensitivity, vigilance, abstractedness, privateness, apprehension, openness to change, self‐reliance, perfectionism and tension) and five secondary factors (extroversion, anxiety, tough‐mindedness, independence and self‐control). Goldberg (1990) proposed that there are five personality factors: openness to experience, conscientiousness, extroversion, agreeableness and neuroticism.

2.1.2 Identity: ‘Who am I’?

Identity is essentially about ‘who I am’. Erikson (1950, 1968) was one of the first psychologists to explicitly examine the notion of identity. According to Erikson, identity comprises a consistent set of attitudes and values about oneself. He argued that in achieving identity one must develop some specific ideology: a set of personal values and goals. In forming an identity, he believed, the individual is able to shift their thinking from a here‐and‐now orientation to include a past and a future orientation. Erikson drew from psychodynamic theory to argue that ‘identity formation’ is a developmental task that adolescents must achieve. He believed that every adolescent is confronted with a crisis of identity formation, and that identity formation is the most valuable accomplishment of adolescence. Marcia (1980, 1991) extended Erikson’s work to consider the processes involved in achieving identity. According to Marcia, there are four paths that adolescents can take: identity diffusion, foreclosure, moratorium and identity achievement. Unlike Erikson, Marcia believed that the developmental task of ‘identity’ is constantly being re‐formed as individuals vacillate through phases of achievement and moratorium throughout most of their lives.

Not all psychologists would agree with Erikson’s understanding of identity. Akin to Marcia, many believe that identity is not a task confined to adolescence. For McAdams (1993), identity is the ‘personal myths’ or stories individuals construct about themselves to bring together the different parts of themselves and their lives into a purposeful and convincing whole.

2.1.3 Social identity

Not all psychologists would agree that identity is concerned with an individual’s identity; some would argue instead that identity is more about group membership or ‘social identity’. Tajfel and Turner developed social identity theory to explain people’s tendencies to categories themselves into groups in order to gain a greater sense of self‐worth (see, e.g., Tajfel, 1979; Tajfel & Turner, 1979; Turner, 1975). According to this theory, identity is made up of both social and personal identities. Social identity is defined as membership of specific social groups (such as an activity group) or wider social categories (e.g., nationality or gender). Groups, according to these theorists, give individuals a sense of belonging to the social world. People divide the world into ‘us’ (in‐group) and ‘them’ (out‐group). When a social identity is salient, individuals compare their attitudes and behaviours to those of other group members. According to social identity theory, the in‐group will discriminate against the out‐group in order to enhance its self‐worth. Researchers have proposed that social identity concerns can motivate individuals to rate in‐group members more positively than out‐group members (e.g., Abrams & Hogg, 1988).

The social identity model of deindividuation effects (SIDE) was developed to expand upon social identity theory and self‐categorization theory (Lea & Spears, 1991; Reicher, 1984; Spears & Lea, 1994). This theory conceptualizes self‐construal as flexible and situation‐specific. As Lea, Spears and de Groot (2001) explain, ‘a person’s behavior in any situation can be placed along a continuum ranging from entirely personal (conforming to personal standards) to entirely group‐based (conforming to salient group norms and standards)’ (p. 527). According to SIDE theory, when people are ‘visually anonymous’, their personal identities become less important and social identities become salient. There is a shift from personal identity to group identity, thus promoting behaviour that is normative to the group. Visual anonymity is said to encourage depersonalization because it reduces the interpersonal basis for social comparison, self‐awareness and self‐presentation. When this happens, individuals see and present themselves less as unique individuals and more in terms of their similarity to the perceived prototypical attributes of the salient social group (i.e., stereotyping). In turn, the anonymity of others means that they will be also be perceived for their group attributes rather than as unique individuals. ‘In short, SIDE proposes that depersonalized perceptions of self and others increase attraction toward group members and that this process is stimulated by the dearth of individuating cues in visually anonymous interactions’ (Lea et al., 2001, p. 528).

2.1.4 Possible selves

In attempting to understand the ‘self’, psychologists have debated over whether there is one unitary, measurable self or whether there are multiple aspects. The theory of ‘possible selves’ contends that people do not simply understand themselves as a person in the present moment but also hold cognitive representations of their future selves (Markus & Nurius, 1986, 1987). According to Markus and Nurius (1986, 1987), the self‐concept contains: the ‘expected self’ (the person you believe you can realistically become), the ‘hoped‐for self’ (the person you hope to become) and the ‘feared self’ (the self you do not desire to become).

Higgins (1987, 1989) made a clearer distinction between these aspects of self. He proposed three aspects of self: the ‘actual self’ (your representation of the attributes that you or another believe you actually possess), the ‘ideal self’ (your representation of the attributions that you or another believe you would ideally like to possess), and the ‘ought‐to self’ (your representation of the attributions that you or another believe you ought to possess). Higgins developed ‘self‐discrepancy theory’ to explain that individuals are guided by the aim of becoming closer to two different end states: their ideal self and their ought‐to self. The ‘ideal self‐regulatory system’ focuses on the absence or presence of positive outcomes, whereas the ‘ought self‐regulatory system’ focuses on the absence or presence of negative outcomes. Higgins also argued that individuals who have a large discrepancy between these different selves are more likely to be psychologically unhealthy (e.g., depressed, anxious or have low self‐esteem).

2.1.5 The self as actor

Goffman (1959/1997) took a very different approach to understanding the self and identity. He developed a dramaturgical analysis of social relations and interactions in everyday life. Goffman saw people as actors. He described the self as both a performer and a character. According to Goffman, the ‘self‐as‐performer’ is not merely a social product but also has a basic motivational core. In contrast, the ‘self‐as‐character’ represents an individual’s unique humanity. It is this part of the self that is a social product—that is, it is performed outwardly in social life. The ‘self‐as‐character’ is one’s inner self.

In Goffman’s theory, individuals need to present themselves as acceptable persons to others. He argued that individuals are strategic in their impression formation. In particular, Goffman was interested in distinguishing between expressions ‘given’ (e.g., spoken communication) and expressions ‘given off’ (e.g., nonverbal cues) in a face‐to‐face interaction.

Goffman contended that individuals often perform an idealized view of the situation. He stated, ‘when the individual presents himself before others, his performance will tend to incorporate and exemplify the officially accredited values of the society’ (1959/1997, p. 101). Therefore, he believed that part of individuals’ strategy is to present themselves as acceptable people to others. According to Goffman, ‘the impressions that the others give tend to be treated as claims and promises they have implicitly made, and claims and promises tend to have a moral character’ (p. 21).

2.1.6 The postmodern self

The postmodern movement is complex and diverse; however, in the main, postmodern theorists would agree that human knowledge is subjective. Knowledge is relative and fallible and there is no absolute truth. Postmodern scholars see truth as situational, and it is impossible to separate the observer from the observed. To understand a person, it is necessary to understand their social context, which includes culture and language.

According to postmodern theorists, therefore, the self is fragmented and situational. They would contend that there is no unitary knowable self. Gergen (1991), for example, has argued that the postmodern culture has made the category of ‘self’ redundant. He has stated that the media ‘furnishes us with a multiplicity of incoherent and unrelated languages of the self’ (p. 6). We will return to consider Gergen in more detail later in this chapter.

2.2 THE SELF IN CYBERSPACE

So why consider the self or identity in cyberspace? Is there anything different about this space compared to other mediums to suggest that the self might be expressed or understood in different ways? Many scholars have believed, even in the early days of the Internet, that cyberspace affords unique opportunities for expressing the self.

As already noted, in the 1990s the Internet looked very different from how it looks today. It was more texted‐based, was slower and had fewer people inhabiting its space. In some ways, it was easier than it is today on the Internet to hide and pretend to be someone or something else – or, as Peter Steiner illustrated in a famous New Yorker cartoon in 1993, ‘On the Internet, nobody knows you’re a dog.’ The anonymous nature of the Internet, some scholars argued, provided opportunities for people to be ‘disembodied’ – that is, to create and experience an online identity that was no longer dependent on or constrained by their physical appearance.

2.3 DISEMBODIED SELVES IN CYBERSPACE

Sherry Turkle (1995) was one of the first theorists to consider this idea of disembodiment and selves in cyberspace. She is famous for naming the computer a ‘second self’ and argued that the Internet provided people with the opportunity to ‘re‐invent’ themselves. In her early work, Turkle (1995) studied the interactions that took place in virtual environments, such as MUDs (multiple‐user dungeons or multiuser domains) and MOOs (multiple object oriented). Drawing from psychodynamic theory, she argued that cyberspace provided opportunities for individuals to play with identity. Turkle held the view that cyberspace can be a liberating space for individuals and could be a place where people can discover a deeper truth about themselves. She wrote: ‘As players participate they become authors not only of text but of themselves, constructing new selves through social interaction’ (p. 12).

Turkle believed that the Internet provided psychologists with a radical new lens through which to consider identity. She took a postmodern view of the self, arguing that people can have multiple selves rather than a unitary, continuous self:

I am not implying that MUDs or computer bulletin boards are causally implicated in the dramatic increase of people who exhibit symptoms of multiple personality disorder (MPD), or that people on MUDs have MPD, or that MUDing is like having MPD. What I am saying is that the many manifestations of multiplicity in our culture, including the adoption of online personae, are contributing to a general reconsideration of traditional, unitary notions of identity. (Turkle, 1995, p. 260)

It is important to understand that Turkle did not believe there was a complete schism between online and offline selves. In the virtual space, some of her participants experimented with identities they hoped to ‘become’ in their everyday lives. For example, she described the experience of a participant named Gordon:

On MUDs, Gordon has experimented with many characters, but they all have something in common. Each has qualities that Gordon is trying to develop in himself. He describes one current character as ‘an avatar of me. He is like me, but more effusive, more apt to be flowery and romantic with a sort of tongue‐in‐cheek attitude toward the whole thing’. (Turkle, 1995, p. 190)

Turkle believed that, in Gordon’s case, experimentation online was psychologically healthy as it provided him with a new way to see himself, which could lead to a higher quality of everyday life.

Although Turkle did believe that this disconnection with ‘physical’ bodies in cyberspace created new opportunities to experience the self, she also found that complete separation between offline and online selves was not always psychologically healthy. She wrote:

Sometimes such experiences can facilitate self‐knowledge and personal growth, and sometimes not. MUDs can be places where people blossom or places where they get stuck, caught in self‐contained worlds where things are simpler than in real life, and where, if all else fails, you can retire your character and simply start a real life with another. (Turkle, 1995, p. 185)

Turkle provided a case study of a man who described himself as being too immersed in MUDs. Stewart spent too much time constructing a life in a MUD that was more expansive that the one he lived in physical reality. Turkle described this self as his ideal self, the self he wished to be in his ‘real life’. Stewart self‐consciously used MUDs as a place to experiment with new ways of being and hoped that by doing so he might change as a person in his real life. He felt that the online environment was a safe space to do so. However, Turkle argued that Stewart’s online persona was too far removed from his real self. Online he was very social, the life of the party. However, in the rest of his life he was very socially anxious. Engaging in MUDs highlighted to Stewart the self he wished to be but could not be. This led him to spend many hours in MUDs, preferring this space over his real world. Turkle argued, therefore, that, in considering how psychologically beneficial playing MUDs can be for a person, one needs to consider how similar the person’s online characters are to their ‘real’ self.

2.3.1 Criticisms of Turkle’s early work

Turkle’s work is important because it provided psychologists with a new way of thinking about online identities. Moreover, it challenged early scholars’ views that the Internet was an impersonal medium, where people could only relate in a shallow, illusory and hostile manner (Kiesler, Siegel & McGuire, 1984; Sproull & Kiesler, 1986; Stoll, 1995). Despite these strengths, there are some problems with her work.

Turkle’s early notions of identity in cyberspace were based on her research on MUDs and MOOs. In these spaces, individuals were expected to assume the roles of characters. These places were designed to be playful and fun. Players were expected to be someone other than themselves (Whitty, 2007a; Whitty & Carr, 2003; Wynn & Katz, 1997) and so we might expect people to play out different selves in such spaces. Does her theory hold in other less playful spaces, such as email or a political blog? The Internet is not a homogenous space, and so we cannot develop a one‐theory‐fits‐all approach.

What of this notion of disembodiment? Can people completely separate themselves from their physical bodies to create a utopian self? Others have concurred with Turkle’s view. Clark (1997), for instance, proposed that in ‘the virtual environment, we can exist in either a disembodied or a cyberspatial form’ (p. 86). Rollman, Krug and Parente (2000) wrote, ‘by eliminating time, distance, and body, the architects of the Internet have created an unhindered medium that connects the mind and spirit’ (p. 161). Feminist scholars, such as Haraway (1991) and Plant (1992), argued that the Internet provides real opportunities to create postmodern selves. They were hopeful that individuals could escape the sorts of gendered expectations placed on people in everyday life. For example, Klein (1999) wrote:

In postmodern and cyberthinking, the categories of ‘women’ and ‘men’ (or young and old or white and black) have lost any meaning[;] … it is up to the individual to be whatever s/he desires – including donning the body/ies s/he wishes to appear in, at a given time – some sort of an eternal fancy dress ball, one might think. (p. 202)

Not all scholars agree, however, that individuals can be completely disembodied in cyberspace. Researchers, for instance, have found that complex gender information can be transmitted via text, with certain linguistic cues distinguishing men’s conversations from women’s (Lea & Spears, 1995). Thomson and Murachver (2001) found that women are more likely to make references to emotional and personal information online. Moreover, these researchers found that participants in their experimental study were able to identify the gender of the person they were communicating with online. Whitty (2003a) has argued that ‘although we do not have physical, tangible bodies in cyberspace, we do nevertheless have bodies’ (p. 344). She also makes the point that we have embodied responses to our online encounters. Whitty contends that research on how individuals flirt, engage in sexual activities, and develop and maintain online relationships demonstrates the importance of the body (Whitty 2003a; Whitty & Carr, 2006).

Turkle (2011), herself, has changed her original views about cyberspace. She no longer believes that cyberspace holds the utopian promise she hoped for in the 1990s. She now believes that the Internet is too accessible and too much a part of people’s lives, making individuals feel overwhelmed and depleted. Virtual worlds, she argues, offer richer, better lives than reality. In her more recent work she contends that the Internet can lead to a new sense of solitude. She writes:

Technology is seductive when what it offers meets our human vulnerabilities. And as it turns out, we are very vulnerable indeed. We are lonely but fearful of intimacy. Digital connections and the social robot may offer the illusion of companionship without the demands of friendship. Our networked life allows us to hide from each other, even as we are tethered to each other. (Turkle, 2011, p. 6)

2.3.2 The saturated self

Gergen (2000) took a similar view to Turkle’s current position. He argued that, in postmodern times, the self has become saturated with too many identities. This, he maintained, is due to modern communication technologies. Digital technologies have caused problems for the ‘modern self’. He has argued that the self has become increasingly fragmented.

According to Gergen (2000), seven technologies began this process of social saturation: rail, post, automobile, telephone, radio, motion pictures and commercial publishing; ‘each brought people into increasingly close proximity, exposed them to an increasing range of others, and fostered a range of relationships that could never have occurred before’ (p. 53). He has theorized that, in more recent times, a second or high‐tech phase in the technology of social saturation has emerged, which includes air transportation, television and electronic communication. Consequently, not only are we developing more relationships than before but also the pace at which these relationships unfold is quicker than it has ever been. Moreover, Gergen (2000) pointed out that these relationships are both actual and imaginary. An example of imaginary relationships, he contends, is the downloading of pornographic images from the Internet. He has commented that, ‘as the traditional individual is thrust into an ever‐widening array of relationships, he or she begins increasingly to sense the self as a strategic manipulator. Caught in often contradictory or incoherent activities, one grows anguished over the violation of one’s sense of identity’ (p. 17).

2.4 THE CYBORG SELF

As already mentioned in this chapter, Donna Haraway (1991) argued that, in the early days of the World Wide Web, cyberspace provided real opportunities to create postmodern selves. She believed that women, in particular, could escape gender roles. She named her theory ‘cyborg feminism’. She wrote:

A cyborg is a cybernetic organism, a hybrid of a machine and organism, a creature of social reality as well as a creature of fiction. Social reality is lived social relations, our most important political construction, a world‐changing in fiction. The international women’s movements have constructed ‘women’s experience’, as well as uncovered or discovered this crucial collective object. This experience is a fiction and fact of the most crucial, political kind. Liberation rests on the construction of the consciousness, the imaginative apprehension, of oppression, and so of possibility. The cyborg is a matter of fiction and lived experience that changes what counts as women’s experience in the late twentieth century. (p. 149)

Haraway used the cyborg metaphor to represent the political play of identity. Our bodies, she believed, could be changed by technology, which could thereby change our lives dramatically. Her view is similar, in some ways, to that expressed in Turkle’s early work. However, even Turkle herself found little evidence for the breaking away of gender roles. Some of the same criticisms directed towards Turkle can therefore be applied to Haraway’s work. There has been little evidence to suggest that technology has afforded women opportunities to escape gender in the way Haraway imagined.

2.5 GOFFMAN: PERFORMING SELF ONLINE