The Profile of Ego States and the Experience of Positive and Negative Emotions in the Context of Cyber Threat Vulnerability

The Profile of Ego States and the Experience of Positive and Negative Emotions in the Context of Cyber Threat Vulnerability

Authors

DOI:

https://doi.org/10.16926/eat.2024.13.08

Keywords:

transactional analysis, ego states, affective traits, emotions, cybersecurity

Abstract

Rapid technological development brings new opportunities and new challenges. Among the problems that have emerged with the development of computers and the Internet, cybersecurity issues are paramount. They can be analyzed from many perspectives, on many different levels, and in relation to various, often incomparable scales of impact. The protection against inappropriate content for adults must be approached differently than for underage Internet users. Securing personal devices against cybercriminal attacks is different from securing the infrastructure of companies and institutions. For computer science, the most important thing is to use appropriate software to secure computers and networks. From the perspective of social sciences, the primary focus is on the human being - the user of new technologies. The effectiveness of implemented technical solutions depends primarily on their characteristics, tendencies, knowledge, and skills. Cybersecurity thus appears as an interdisciplinary problem, in which technological and software issues are just as important as personality, social, and educational issues.

In this article, the author presents the results of their own research, in which an analysis was conducted of the profile of the self-states of computer users and their tendency to experience positive and negative emotions, in the context of their potential vulnerability to cyber threats.

Downloads

Download data is not yet available.

Author Biography

Zbigniew Łęski, Jan Dlugosz University in Czestochowa

PhD. Pedagogue. Specialist in media education and education technology. Member of the Educational Transactional Analysis Research Team

References

Ajayi, T. M. (2022). Discursive-manipulative strategies in scam emails and SMS: The Nigerian perspective. Lodz Papers in Pragmatics, 18(1), 175-195. https://doi.org/10.1515/lpp-2022-0008

Albladi, S. M., & Weir, G. R. S. (2017). Personality traits and cyber-attack victimisation: Multiple mediation analysis. 2017 Internet of Things Business Models, Users, and Networks, 1-6. https://doi.org/10.1109/CTTE.2017.8260932

Alevizopoulou, S., Koloveas, P., Tryfonopoulos, C., & Raftopoulou, P. (2021). Social media monitoring for IoT cyber-threats. W 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Workshop on Data Science for Cyber Security (DS4CS @ IEEE CSR), Rhodes, Greece, July. IEEE.

Bada, M., & Nurse, J. R. C. (2020). The social and psychological impact of cyberattacks. W V. Benson & J. Mcalaney (Eds.), Emerging cyber threats and cognitive vulnerabilities (ss. 73–92). Academic Press. https://doi.org/10.1016/B978-0-12-816203-3.00004-6

Benavides-Astudillo, E., Silva-Ordoñez, L., Rocohano-Rámos, R., Fuertes, W., Fernández-Peña, F., Sanchez-Gordon, S., & Bastidas-Chalan, R. (2022). Analysis of vulnerabilities associated with social engineering attacks based on user behavior. W M. Botto-Tobar, S. Montes León, P. Torres-Carrión, M. Zambrano Vizuete, & B. Durakovic (Eds.), Applied Technologies. ICAT 2021. Communications in Computer and Information Science (Vol. 1535). Springer, Cham. https://doi.org/10.1007/978-3-031-03884-6_26

Berne E. (2005). Dzień dobry i co dalej. Poznań: Rebis

Brzozowski P. (2010). Skala uczuć pozytywnych i negatywnych SUPIN. Polska adaptacja skali PANAS Davida Watsona i Lee Anny Clark. Podręcznik. Warszawa: Pracownia Testów Psychologicznych Polskiego Towarzystwa Psychologicznego

Castells M. (2003). Galaktyka Internetu. Poznań: Rebis

Dave, D., Sawhney, G., Aggarwal, P., Silswal, N., & Khut, D. (2023). The new frontier of cybersecurity: Emerging threats and innovations. 2023 29th International Conference on Telecommunications (ICT), 1-6. https://doi.org/10.48550/arXiv.2311.02630

Dunn Cavelty, M., Eriksen, C., & Scharte, B. (2023). Making cyber security more resilient: Adding social considerations to technological fixes. Journal of Risk Research, 26(7), 801-814. https://doi.org/10.1080/13669877.2023.2208146

Fredrickson, B. L. (2001). The role of positive emotions in positive psychology: The broaden-and-build theory of positive emotions. American Psychologist, 56(3), 218–226. https://doi.org/10.1037/0003-066X.56.3.218

Gross, J.J. (2002), Emotion regulation: Affective, cognitive, and social consequences. Psychophysiology, 39: 281-291. https://doi.org/10.1017/S0048577201393198

Hemphill, J. F. (2003). Interpreting the Magnitudes of Correlation Coefficients. American Psychologist, 58(1), 78-79. https://doi.org/10.1037/0003-066X.58.1.78

Łęski, Z. (2016). Duch w maszynie… Kim jest dla nas komputer? Charakterystyka relacji w języku analizy transakcyjnej. Częstochowa: Wydawnictwo AJD w Częstochowie.

Łęski, Z., Kurkowski, M., Gozdecki, B., & Steingartner, W. (2024). Czy można zakochać się w Jessice? — czyli o Nigeryjskim Przekręcie z perspektywy Analizy Transakcyjnej. Przegląd Policyjny, 152(4), 249-261. https://doi.org/10.5604/01.3001.0054.4340

Martowska K. (2012). Lista przymiotnikowa ACL. Harrison G. Gough, Alfred B. Heilburn, Jr. Polska normalizacja. Podręcznik. Warszawa: Pracownia Testów Psychologicznych Polskiego Towarzystwa Psychologicznego.

Nunnally, J. C., & Bernstein, I. H. (1994). Psychometric theory (3rd ed.). New York: McGraw-Hill.

Pierzchała A. (2010). Rodzic, Dorosły, Dziecko – jak można opisać komunikację na forach internetowych. W M. Sokołowski (red.). Oblicza Internetu. (Re)definiowanie sieci. Elbląg: Wydawnictwo PWSZ w Elblągu

Ryan, R. M., & Deci, E. L. (2000). Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. American Psychologist, 55(1), 68–78. https://doi.org/10.1037/0003-066X.55.1.68

Sanders, B. G., Dowland, P. S., & Furnell, S. (2009). An assessment of people’s vulnerabilities in relation to personal and sensitive data. W Advances in Communications, Computing, Networks and Security: Proceedings of the MSc/MRes programmes from the School of Computing, Communications and Electronics, 2007-2008 (Vol. 6, p. 124). University of Plymouth.

Stevart, I., Joines, V. (2016). Analiza transakcyjna dzisiaj. Poznań: Rebis

Tugade, M.M., Fredricson, B.L. (2007). Regulation of positive emotions: emotion regulation strategies that promote resilence. Journal of Happiness Studies, (2007)8, 311-333. DOI: 10.1007/s10902-006-9015-4.

Wieczorek, Z. (2017). Język zmiany w analizie transakcyjnej. Edukacyjna Analiza Transakcyjna, 6,145–156. DOI: 10.16926/eat.2017.06.09

Žvelc, G. (2010). Relational schemas theory and transactional analysis. Transactional Analysis Journal, 40(1), 8-17. https://doi.org/10.1177/036215371004000103

Published

2024-12-30

How to Cite

Łęski, Z. (2024). The Profile of Ego States and the Experience of Positive and Negative Emotions in the Context of Cyber Threat Vulnerability. The Educational Transactional Analysis, (13). https://doi.org/10.16926/eat.2024.13.08

Issue

Section

Research Raports

Most read articles by the same author(s)

1 2 > >> 
Loading...