scholarly journals Citizens Versus the Internet: Confronting Digital Challenges With Cognitive Tools

2020 ◽  
Vol 21 (3) ◽  
pp. 103-156
Author(s):  
Anastasia Kozyreva ◽  
Stephan Lewandowsky ◽  
Ralph Hertwig

The Internet has evolved into a ubiquitous and indispensable digital environment in which people communicate, seek information, and make decisions. Despite offering various benefits, online environments are also replete with smart, highly adaptive choice architectures designed primarily to maximize commercial interests, capture and sustain users’ attention, monetize user data, and predict and influence future behavior. This online landscape holds multiple negative consequences for society, such as a decline in human autonomy, rising incivility in online conversation, the facilitation of political extremism, and the spread of disinformation. Benevolent choice architects working with regulators may curb the worst excesses of manipulative choice architectures, yet the strategic advantages, resources, and data remain with commercial players. One way to address some of this imbalance is with interventions that empower Internet users to gain some control over their digital environments, in part by boosting their information literacy and their cognitive resistance to manipulation. Our goal is to present a conceptual map of interventions that are based on insights from psychological science. We begin by systematically outlining how online and offline environments differ despite being increasingly inextricable. We then identify four major types of challenges that users encounter in online environments: persuasive and manipulative choice architectures, AI-assisted information architectures, false and misleading information, and distracting environments. Next, we turn to how psychological science can inform interventions to counteract these challenges of the digital world. After distinguishing among three types of behavioral and cognitive interventions—nudges, technocognition, and boosts—we focus on boosts, of which we identify two main groups: (a) those aimed at enhancing people’s agency in their digital environments (e.g., self-nudging, deliberate ignorance) and (b) those aimed at boosting competencies of reasoning and resilience to manipulation (e.g., simple decision aids, inoculation). These cognitive tools are designed to foster the civility of online discourse and protect reason and human autonomy against manipulative choice architectures, attention-grabbing techniques, and the spread of false information.

2019 ◽  
Author(s):  
Anastasia Kozyreva ◽  
Stephan Lewandowsky ◽  
Ralph Hertwig

[This article is now published open access in the Psychological Science in the Public Interest https://journals.sagepub.com/doi/full/10.1177/1529100620946707. Please refer to and cite the published paper.] The Internet has evolved into a ubiquitous and indispensable digital environment in which people communicate, seek information, and make decisions. Despite offering various benefits, online environments are also replete with smart, highly adaptive choice architectures designed primarily to maximize commercial interests, capture and sustain users’ attention, monetize user data, and predict and influence future behavior. This online landscape holds multiple negative consequences for society, such as a decline in human autonomy, rising incivility in online conversation, the facilitation of political extremism, and the spread of disinformation. Benevolent choice architects working with regulators may curb the worst excesses of manipulative choice architectures, yet the strategic advantages, resources, and data remain with commercial players. One way to address this imbalance is with interventions that empower Internet users to gain some control over their digital environments, in part by boosting their information literacy and their cognitive resistance to manipulation. Our goal is to present a conceptual map of interventions that are based on insights from psychological science. We begin by systematically outlining how online and offline environments differ despite being increasingly inextricable. We then identify four major types of challenges that users encounter in online environments: persuasive and manipulative choice architectures, AI-assisted information architectures, false and misleading information, and distractive environments. Next, we turn to how psychological science can inform interventions to counteract these challenges of the digital world. After distinguishing between three types of behavioral and cognitive interventions—nudges, technocognition, and boosts—we focus in on boosts, of which we identify two main groups: (1) those aimed at enhancing people’s agency in their digital environments (e.g., self-nudging, deliberate ignorance) and (2) those aimed at boosting competences of reasoning and resilience to manipulation (e.g., simple decision aids, inoculation). These cognitive tools are designed to foster the civility of online discourse and protect reason and human autonomy against manipulative choice architectures, attention-grabbing techniques, and the spread of false information.


2018 ◽  
Vol 35 (2) ◽  
pp. 40-47
Author(s):  
S. M. Doguchaeva

The era of digital transformation provides the opportunity for leading companies to change priorities - to begin to take care of the support environment using innovative technologies and become a leading creative platform open for innovation. The successful development of the digital world, the blockchain technology, the Internet of things – the mechanism which will change the financial world. 


2021 ◽  
Vol 5 (6) ◽  
pp. 1137-1142
Author(s):  
Hamdi Alchudri ◽  
Zaini

The incidence of fire and theft is very threatening and causes disruption to people's lifestyles, both due to natural and human factors resulting in loss of life, damage to the environment, loss of property and property, and psychological impacts. The purpose of this study is to create a building security system using Kinect Xbox 360 which can be used to detect fires and loss of valuable objects. The data transmission method uses the Internet of Things (IoT) and skeletal tracking. Skeletal detection uses Arduino Uno which is connected to a fire sensor and Kinect to detect suspicious movements connected to a PC. Kinect uses biometric authentication to automatically enter user data by recognizing objects and detecting skeletons including height, facial features and shoulder length. The ADC (Analog to Digital Converter) value of the fire sensor reading has a range between 200-300. The fire sensor detects the presence of fire through optical data analysis containing ultraviolet, infrared or visual images of fire. The data generated by Kinect by detecting the recognition of the skeleton of the main point of the human body known as the skeleton, where the reading point is authenticated by Kinect from a range of 1.5-3 meters which is declared the optimal measurement, and if a fire occurs, the pump motor will spray water randomly. to extinguish the fire that is connected to the internet via the wifi module. The data displayed is in the form of a graph on the Thingspeak cloud server service. Notification of fire and theft information using the delivery system from input to database


Author(s):  
Aditya Tepalwar ◽  
Asha Sherikar ◽  
Prajyot Mane ◽  
Vishal Fulpagare

Smart appliance design that includes multimedia intelligence to deliver comfortable, convenient, and secure personal services in the home is becoming increasingly crucial in the age of information and communication technology. This research looks at the design and execution of a novel interactive multimedia mirror system called as "smart mirror." The glass that will be used is the foundation of the design of a smart mirror. Two-way glass is suggested because it allows the visuals on the display to be seen more clearly. Our way of life has evolved to the point where making the best use of one's time is critical. Based on user surveys and prototype implementation, we propose the development of an innovative appliance that incorporates interactive information services delivered via a user interface on the surface of a mirror. Our work is based on the assumption that we all check ourselves in the mirror before leaving the house, so why shouldn't the mirror be intelligent? Smart Mirrors will eventually replace regular mirrors, providing users with both mirror and computer-assisted information services as technology improves. Because of the Raspberry Pi microcontroller cards aboard, the devices can connect to the internet, download data from the internet, and show that data on the mirror. Weather data, time and location data, current event data, and user data gathered from web services using a Raspberry Pi 3 microcontroller card are all included in the designed intelligent mirror system. The mirror will light up when the user steps in front of it. When thinking about this project, phrases like Smart Mirror, Interactive services, Raspberry Pi , and Web services come to mind.


2016 ◽  
Author(s):  
Jonathan Mellon

This chapter discusses the use of large quantities of incidentallycollected data (ICD) to make inferences about politics. This type of datais sometimes referred to as “big data” but I avoid this term because of itsconflicting definitions (Monroe, 2012; Ward & Barker, 2013). ICD is datathat was created or collected primarily for a purpose other than analysis.Within this broad definition, this chapter focuses particularly on datagenerated through user interactions with websites. While ICD has beenaround for at least half a century, the Internet greatly expanded theavailability and reduced the cost of ICD. Examples of ICD include data onInternet searches, social media data, and user data from civic platforms.This chapter briefly explains some sources and uses of ICD and thendiscusses some of the potential issues of analysis and interpretation thatarise when using ICD, including the different approaches to inference thatresearchers can use.


Temida ◽  
2011 ◽  
Vol 14 (3) ◽  
pp. 23-36
Author(s):  
Rajko Macura ◽  
Slavoljub Vujovic ◽  
Djuro Mikic

The emergence and spread of Internet communication has led to changes in social relationships, abuse of the Internet and maladaptive behavior. Among the authors who have studied the impact of these changes there is no consensus, and the results of their research are often contradictory. Some authors conclude that Internet communication strengthens networks of its users, while others believe that such communication leads to reduced participation in real social life. In a number of people, excessive use of the Internet adversely affects the mental health and social life and can lead to obsession at the expense of other aspects of life and creating addiction. The greatest risk of negative impacts of online communication is among children and young people. This paper is meant to indicate, the good sides as well as the negative consequences of excessive and non-functional Internet use


Author(s):  
Khoerul Umam

The spread of digital media on the internet was very broad, fast, and cannot be monitored in a structured manner about what media has been uploaded and distributed on the internet network. The spread of digital media like this was very difficult to detect whether the media that shared was privately owned or that of others that is re-shared by media theft or digital media piracy. One step to overcome the theft of digital works is to give them a watermark, which is an identity that is placed on top of the work. However, this is still considered unsafe because the identity attached can be cut and manipulated again until it is not visible. In addition, the use of Steganography method to hide messages in an image can still be manipulated by adding messages continuously so that it accumulates and damages the original owner of the image. In this article, the author provides a solution called Digital Watermarking, a step of encrypting the data of the original owner of the work and putting it into the image of his work. This watermark cannot be seen clearly, but actually in the media there is encrypted data with a strong Advanced Encryption Standard (AES) method. As a result, a tool that can improve the security of media owner data by combining the AES and Steganogaphy methods in the formation of new media that cannot be changed anymore. So, when the media is stolen and used by others and has been edited, the owner's personal data can never be changed.


Sign in / Sign up

Export Citation Format

Share Document