{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T17:59:49Z","timestamp":1761760789862,"version":"build-2065373602"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"11","license":[{"start":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T00:00:00Z","timestamp":1761696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:p>\n                    In the era of interdisciplinary partnerships, the field of cyberpsychology has emerged as a crucial nexus for understanding the intersection of human behavior and technology. This article explores the profound contributions of cyberpsychology to computing and technology, drawing on foundational work that highlights key areas. While human-computer interaction (HCI) and user-experience (UX) design have benefited from psychological principles, the broader integration of comprehensive psychological theories within computing remains relatively limited. This article examines the critical influence of cyberpsychology on cybersecurity and cyberprivacy, virtual reality and AI, the future of work, and the challenges of misinformation and disinformation. These areas represent some of the most pressing technological issues of the 21\n                    <jats:sup>st<\/jats:sup>\n                    century, where the insights from cyberpsychology are increasingly vital.\n                  <\/jats:p>","DOI":"10.1145\/3720535","type":"journal-article","created":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:13:36Z","timestamp":1759936416000},"page":"72-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Cyberpsychology Influence on Modern Computing"],"prefix":"10.1145","volume":"68","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5314-4524","authenticated-orcid":false,"given":"Julie R.","family":"Ancis","sequence":"first","affiliation":[{"name":"New Jersey Institute of Technology, Informatics, Newark, New Jersey, United States"}]}],"member":"320","published-online":{"date-parts":[[2025,10,29]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3555531"},{"key":"e_1_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Ali\u0107 M. and Sopi\u0107 L. Privacy paradox and generation Z. In 46th MIPRO ICT and Electronics Convention\u00a0(2023) 1532\u20131537.","DOI":"10.23919\/MIPRO57284.2023.10159918"},{"issue":"1","key":"e_1_3_1_4_2","article-title":"The age of cyberpsychology: An overview","volume":"1","author":"Ancis J.R.","year":"2020","unstructured":"Ancis, J.R. The age of cyberpsychology: An overview. Tech, Mind, Behav\u00a01, 1, (2020).","journal-title":"Tech, Mind, Behav"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3533406.3533411"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780198812746.001.0001"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1037\/xge0000729"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2022.101782"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1177\/17456916221091833"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11920-017-0788-4"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.2196\/30979"},{"issue":"1","key":"e_1_3_1_12_2","article-title":"The personalization\u2013privacy paradox at the nexus of social exchange and construal level theories","volume":"39","author":"Cloarec J.","year":"2022","unstructured":"Cloarec, J., Meyer-Waarden, L., and Munzel, A. The personalization\u2013privacy paradox at the nexus of social exchange and construal level theories. Psych Marketing 39, 1 (2022).","journal-title":"Psych Marketing"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.19101\/IJACR.2016.623006"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023788"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.3758\/s13423-019-01651-4"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/2.291294"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1177\/1071181319631383"},{"key":"e_1_3_1_18_2","volume-title":"Proceedings of Alt. Chi \u201807","author":"Harrison S.","year":"2007","unstructured":"Harrison, S., Tatar, D., and Sengers, P. The three paradigms of HCI. In Proceedings of Alt. Chi \u201807. ACM SIGCHI (2007)."},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuron.2017.06.011"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2020.1778787"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519792"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Leonov P.Y. et al. The main social engineering techniques aimed at hacking information systems. In 2021 Ural Symp. on Biomedical Engineering Radioelectronics and Information Technology (2021) 0471\u20130473.","DOI":"10.1109\/USBEREIT51232.2021.9455031"},{"key":"e_1_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Lewandowsky S. and van der Linden S. Countering misinformation and fake news through inoculation and prebunking. Eur Rev Soc Psychol (2021) 348\u2013384.","DOI":"10.1080\/10463283.2021.1876983"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781315460536"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-021-01056-1"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9737.003.0012"},{"issue":"47","key":"e_1_3_1_27_2","article-title":"Reliance on emotion promotes belief in fake news","volume":"5","author":"Martel C.","year":"2020","unstructured":"Martel, C., Pennycook, G., and Rand, D.G. Reliance on emotion promotes belief in fake news. Cogn Research 5, 47 (2020).","journal-title":"Cogn Research"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1037\/h0048495"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4964-1_2"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2004.tb02547.x"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3533406.3533409"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v13i01.3242"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1038\/nrn1651"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1037\/ppm0000247"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2008.2007864"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2020.101595"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2022.102588"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2018.01.004"},{"key":"e_1_3_1_39_2","first-page":"147","volume-title":"The Psychology of Fake News: Accepting, Sharing, and Correcting Misinformation","author":"van der Linden S.","year":"2021","unstructured":"van der Linden, S. and Roozenbeek, J. Psychological inoculation against fake news. In The Psychology of Fake News: Accepting, Sharing, and Correcting Misinformation, R. Greifeneder et al., (Eds.). Routledge (2021), 147\u2013169."},{"key":"e_1_3_1_40_2","doi-asserted-by":"crossref","unstructured":"Waldman A.E. Cognitive biases dark patterns and the \u201cprivacy paradox\u201d. Current Issues in Psychology (2019); https:\/\/ssrn.com\/abstract=3456155","DOI":"10.1016\/j.copsyc.2019.08.025"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.53941\/ijndi0101006"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3720535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T17:57:02Z","timestamp":1761760622000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3720535"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,29]]},"references-count":40,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1145\/3720535"],"URL":"https:\/\/doi.org\/10.1145\/3720535","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2025,10,29]]},"assertion":[{"value":"2024-09-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}