Közösségimédia-használat és biztonság: Az aktív védekező viselkedések háttértényezői
Szerzők
Absztrakt
Hogyan védekezhetünk a digitális tér rejtett fenyegetéseivel szemben?
A közösségi média nemcsak összeköt bennünket, hanem láthatatlan kockázatokkal is szembesít: álhírek, manipulált tartalmak és egyre kifinomultabb mesterséges intelligencia által generált hamis képek próbálják befolyásolni érzékelésünket és döntéseinket.
Ez a tanulmánykötet friss kutatásokon alapulva mutatja be, hogyan érzékelik és kezelik a felhasználók a közösségi médiában jelen lévő veszélyeket, milyen védelmi stratégiák erősíthetik az önhatékonyságot, és miként segítheti a tudatos felelősségvállalás az online biztonságot.
A kötet különlegessége, hogy a védelemmotivációs elmélet keretében vizsgálja a közösségi média biztonsági kihívásait, valamint feltárja a generatív mesterséges intelligencia által készített képek felismerésének határait. A bemutatott elemzések újszerű, gyakorlati tanulságokkal szolgálnak mind a tudomány, mind az oktatás, mind pedig a társadalmi prevenció számára.
E könyv mindenkihez szól, aki érteni és kezelni szeretné a digitális korszak kockázatait – kutatókhoz, oktatókhoz, hallgatókhoz és felelős felhasználókhoz egyaránt.
Szerzői életrajzok
egyetemi docens, Nemzeti Közszolgálati Egyetem Államtudományi és Nemzetközi Tanulmányok Kar Kiberbiztonsági és e-Közigazgatási Tanszék
kutató, Kiberbiztonsági Kutatóintézet
doktorandusz, Nemzeti Közszolgálati Egyetem Hadtudományi Doktori Iskola
doktoranda, Nemzeti Közszolgálati Egyetem Katonai Műszaki Doktori Iskola
tudományos dékánhelyettes, Nemzeti Közszolgálati Egyetem Nemeskürty István Tanárképző Kar
doktorandusz, Nemzeti Közszolgálati Egyetem Katonai Műszaki Doktori Iskola
doktorandusz
deepfake-kutató, Budapesti Corvinus Egyetem
doktoranda
tanársegéd, Nemzeti Közszolgálati Egyetem Nemeskürty István Tanárképző Kar Digitális Média és Kommunikáció Tanszék
nyelvész, közgazdász, kommunikációkutató.
dékán, Nemzeti Közszolgálati Egyetem Nemeskürty István Tanárképző Kar
Hivatkozások
Felhasznált irodalom
Akter, Shahriar et al. (2022): Reconceptualizing Cybersecurity Awareness Capability in the Data-Driven Digital Economy. Annals of Operations Research. Online: https://doi.org/10.1007/s10479-022-04844-8
Al A bdulwahid, Abdulwahid et al. (2015): Security, Privacy and Usability – A Survey of Users’ Perceptions and Attitudes. In Fischer-Hübner, Simone – Lambrinoudakis, Costas – López, Javier (szerk.): Trust, Privacy and Security in Digital Business. TrustBus 2015. Lecture Notes in Computer Science, vol 9264. Cham: Springer. Online: https://doi.org/10.1007/978-3-319-22906-5_12
Alhamad, Hamza – Donyai, Parastou (2021): The Validity of the Theory of Planned Behaviour for Understanding People’s Beliefs and Intentions toward Reusing Medicines. Pharmacy, 9(1), 58. Online: https://doi.org/10.3390/pharmacy9010058
Almansri, Afrah – Al-Emran, Mostafa – Shaalan, Khaled (2023): Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories. Applied Sciences, 13(9), 5700. Online: https://doi.org/10.3390/app13095700
Aron, Jacob (2012): Passwords for Over-55s Are Twice as Secure as Those Chosen by Teenagers. New Scientist, 214(2866), 22. Online: https://doi.org/10.1016/S0262-4079(12)61347-5
Baig, Anas (2024): 25 Essential Cybersecurity Tips and Best Practices for Your Business. LevelBlue, 2024. március 13. Online: https://levelblue.com/blogs/security-essentials/25-essential-cybersecurity-tips-and-best-practices-for-your-business
Baron, Reuben M. – Kenny, David A. (1986): The Moderator–Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations. Journal of Personality and Social Psychology, 51(6), 1173–1182. Online: https://doi.org/10.1037/0022-3514.51.6.1173
Bauer, Johannes M. (2018): The Internet and Income Inequality: Socio-Economic Challenges in a Hyperconnected Society. Telecommunications Policy, 42(4), 333–343. Online: https://doi.org/10.1016/j.telpol.2017.05.009
Berger, Arthur Asa (2012): Seeing Is Believing. An Introduction To Visual Communication. New York: McGraw-Hill Education.
Boehmer, Jan et al. (2015): Determinants of Online Safety Behaviour: Towards an Intervention Strategy for College Students. Behaviour & Information Technology, 34(10), 1022–1035. Online: https://doi.org/10.1080/0144929X.2015.1028448
Carlini, Nicholas et al. (2020): Extracting Training Data from Large Language Models. USENIX Security Symposium. Online: https://www.usenix.org/conference/usenixsecurity21/presentation/carlini-extracting
Casas, Andreu – Williams, Nora Webb (2018): Images that Matter: Online Protests and the Mobilizing Role of Pictures. Political Research Quarterly, 72(2), 360–375. Online: https://doi.org/10.1177/1065912918786805
Chaudhary, Sunil (2024): Driving Behaviour Change with Cybersecurity Awareness. Computers & Security, 142(C), 103858. Online: https://doi.org/10.1016/j.cose.2024.103858
Chesney, Robert – Citron, Danielle Keats (2019): Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security. California Law Review 107(6), 1753–1820. Online: https://www.jstor.org/stable/26891938?seq=1
Chy, Md Kamrul Hasan (2024): Proactive Fraud Defense: Machine Learning’s Evolving Role in Protecting Against Online Fraud. Online: https://doi.org/10.48550/arXiv.2410.20281
Cinelli, Matteo et al. (2020): The COVID-19 Social Media Infodemic. Scientific Reports, 10(1), 16598, Online: https://doi.org/10.1038/s41598-020-73510-5
Cismaru, Magdalena et al. (2011): “Act on Climate Change”: An Application of Protection Motivation Theory. Social Marketing Quarterly, 17(3), 62–84. Online: https://doi.org/10.1080/15245004.2011.595539
Coursera Staff (2024): 9 Cybersecurity Best Practices for Businesses in 2024. Coursera, 2024. november 10. Online: https://www.coursera.org/articles/cybersecurity-best-practices
Cross, Cassandra (2022): Using Artificial Intelligence (AI) and Deepfakes to Deceive Victims: The Need to Rethink Current Romance Fraud Prevention Messaging. Crime Prev Community Saf, 24(1), 30–41. Online: https://doi.org/10.1057/s41300-021-00134-w
Dawson, Jessica – Thomson, Robert (2018): The Future Cybersecurity Workforce: Going Beyond Technical Skills for Successful Cyber Performance. Frontiers in Psychology, 9. Online: https://doi.org/10.3389/fpsyg.2018.00744
Debes, John L. (1969): The Loom of Visual Literacy: An Overview. Audiovisual Instruction, 14(8), 25–27.
Dhariwal, Prafulla – Nichol, Alex (2024): Diffusion Models Beat GANs on Image Synthesis. Proceedings of the 35th International Conference on Neural Information Processing
Systems. Red Hk, NY, USA: Curran Associates Inc., 8780–8794. Online: https://doi.org/10.48550/arXiv.2105.05233
Dobber, Tom – Metoui, Nadia – Trilling, Damian – Helberger, Natali – de Vreese, Claes 2020: Do (Microtargeted) Deepfakes Have Real Effects on Political Attitudes? The International Journal of Press/Politics, 26(1), 1–23. Online: https://doi.org/10.1177/1940161220944364
Dodel, Matias – Mesch, Gustavo (2019): An Integrated Model for Assessing Cyber-Safety Behaviors: How Cognitive, Socioeconomic, and Digital Determinants Affect Diverse Safety Practices. Computers & Security, 86, 75–91. Online: https://doi.org/10.1016/j.cose.2019.05.023
Drogkaris, Prokopios – Bourka, Athena szerk. (2018): Cybersecurity Culture Guidelines: Behavioural Aspects of Cybersecurity. Marousi: European Union Agency For Network and Information Security. Online: https://data.europa.eu/doi/10.2824/324042
Eszteri Dániel (2020): Elosztott mesterséges intelligencia fejlesztés blokklánc alapon az adatvédelem érvényesülése érdekében. Pro Futuro, 10(1), 9–27. Online: https://doi.org/10.26521/Profuturo/2020/1/7554
Ferrara, Emilio (2017): Disinformation and Social Bot Operations in the Run up to the 2017 French Presidential Election. First Monday, 22(8). Online: https://doi.org/10.5210/fm.v22i8.8005
Field, Andy P. (2009): Discovering Statistics Using SPSS (and Sex and Drugs and Rock ‘n’Roll). London: Sage Publications Ltd.
Frank, Joel et al. (2024): A Representative Study on Human Detection of Artificially Generated Media Across Countries. 2024 IEEE Symposium on Security and Privacy (SP), 55–73. Online: https://doi.org/10.48550/arXiv.2312.05976
Gallese, Vittorio (2024): Digital Visions: The Experience of Self and Others in the Age of the Digital Revolution. International Review of Psychiatry, 36(6), 656–666. Online: https://doi.org/10.1080/09540261.2024.2355281
Goodfellow, Ian et al. (2020): Generative Adversarial Networks. Communications of the ACM, 63(11), 139–144. Online: https://doi.org/10.1145/3422622
Gruber, Christiane –Haugbolle, Sune szerk. (2013): Visual Culture in the Modern Middle East: Rhetoric of the Image. Bloomington: Indiana University Press.
Hameleers, Michael –van der Meer, Toni G. L. A.– Dobber, Tom (2024): They Would Never Say Anything Like This! Reasons To Doubt Political Deepfakes. European Journal of Communications, 39(1), 56–70. Online: https://doi.org/10.1177/02673231231184703
Hamoud, Aymen – Aïmeur, Esma (2020): Handling User-Oriented Cyber-Attacks: STRIM, a User-Based Security Training Model. Frontiers of Computer Science, 2. Online: https://doi.org/10.3389/fcomp.2020.00025
Hancock, Jeffrey T. – Naaman, Mor – Levy, Karen (2020): AI-Mediated Communication: Definition, Research Agenda, and Ethical Considerations. Journal of Computer-Mediated Communication, 25(1), 89–100. Online: https://doi.org/10.1093/jcmc/zmz022
Hanus, Bartlomiej – Wu, Yu “Andy” (2016): Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective. Information Systems Management, 33(1), 2–16. Online: https://doi.org/10.1080/10580530.2015.1117842
Harris, Christine – Jenkins, Michael (2006): Gender Differences in Risk Assessment: Why do Women Take Fewer Risks than Men? Judgment and Decision Making, 1(1), 48–63. Online: https://doi.org/10.1017/S1930297500000346
Heffernan, Michael (2015): The Interrogation of Sándor Radó: Geography, Communism and Espionage Between World War Two and the Cold War. Journal of Historical Geography, 47, 74–88. Online: https://doi.org/10.1016/j.jhg.2014.12.004
Hull, James L. (2017): Analyst Burnout in the Cyber Security Operation Center-CSOC: A Phenomenological Study. PhD-disszertáció. Colorado Technical University.
Humaidi, Norshima – Abdallah Alghazo, Saif Hussein (2022): Procedural Information Security Countermeasure Awareness and Cybersecurity Protection Motivation in Enhancing Employee’s Cybersecurity Protective Behaviour. 2022 10th International Symposium on Digital Forensics and Security (ISDFS), 1–10. Online: https://doi.org/10.1109/ISDFS55398.2022.9800834
Huxley, Aldous (1974): The Art of Seeing. London: Chatto & Windus.
Ijaz, Ezza (2024): TikTok Will Ban Beauty Filters for Users Under 18 to Address the Harmful Impact of Unrealistic Beauty Standards on Self-Esteem. WCCFTECH, 2024. november 28. Online: https://wccftech.com/tiktok-will-ban-beauty-filters-for-users-under-18/
Institute of Data (2023): How to Stay Up to Date with Cyber Security. Institute of Data, 2023. október 9. Online: https://www.institutedata.com/blog/how-to-stay-up-todate-with-cyber-security/
Jeong, Jongkil Jay et al. (2019): Towards an Improved Understanding of Human Factors in Cybersecurity. 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), 338–345. Online: https://doi.org/10.1109/CIC48465.2019.00047
Johnson, John A. (2014): Measuring Thirty Facets of the Five Factor Model with a 120-Item Public Domain Inventory: Development of the Ipip-Neo-120. Journal of Research in Personality, 51, 78–89. Online: https://doi.org/10.1016/j.jrp.2014.05.003
Keith, Timothy Z. (2019): Multiple Regression and Beyond. An Introduction to Multiple Regression and Structural Equation Modeling. New York: Routledge.
Khader, Mohammed – Karam, Marcel – Fares, Hanna (2021): Cybersecurity Awareness Framework for Academia. Information, 12(10), 417. Online: https://doi.org/10.3390/info12100417
Khan, Naurin Farooq – Ikram, Naveed – Saleem, Sumera (2024): Effects of Socioeconomic and Digital Inequalities on Cybersecurity in a Developing Country. Security Journal, 37, 214–244. Online: https://doi.org/10.1057/s41284-023-00375-4
Kietzmann, Jan et al. (2019): Deepfakes: Trick or Treat? Business Horizons, 63(2), 135–146. Online: https://doi.org/10.1016/j.bushor.2019.11.006
Kiran, Uzma et al. (2025): Explanatory and Predictive Modeling of Cybersecurity Behaviors Using Protection Motivation Theory. Computers & Security, 149, 104204. Online: https://doi.org/10.1016/j.cose.2024.104204
Kirjakovski, Atanas (2023): Rethinking Perception and Cognition in the Digital Environment. Frontiers in Cognition, 2. Online: https://doi.org/10.3389/fcogn.2023.1266404
Kirschner, Julianna (2024): The Newest Generational Divide: Social Media Influence on Digital Natives. Visual Communication Quarterly, 31(3), 199–205. Online: https://doi.org/10.1080/15551393.2024.2396791
Lađević, Adrian Lokner et al. (2024): Detection of AI-Generated Synthetic Images with a Lightweight CNN. AI, 5(3), 1575–1593. Online: https://doi.org/10.3390/ai5030076
Lanier, Jaron (2020): Miért töröld magad azonnal a közösségi oldalakról? 10 érv. Budapest: Európa.
Lazard, Allison J. – Bock, Mary A.– Mackert, Michael S. (2020): Impact of Photo Manipulation and Visual Literacy on Consumers’ Responses to Persuasive Communication. Journal of Visual Literacy, 39(2), 90–110. Online: https://doi.org/10.1080/1051144X.2020.1737907
Lebek, Benedikt et al. (2014): Information Security Awareness and Behavior: A Theory-Based Literature Review. Management Research Review, 37(12), 1049–1092. Online: https://doi.org/10.1108/MRR-04-2013-0085
Li, Ling et al. (2019): Investigating the Impact of Cybersecurity Policy Awareness on Employees’ Cybersecurity Behavior. International Journal of Information Management, 45, 13–24. Online: https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Lu, Zeyu et al. (2023): Seeing Is Not Always Believing: Benchmarking Human and Model Perception of Ai-Generated Images. Proceedings of the 37th International Conference on Neural Information Processing Systems, 25435–25447. Online: https://doi.org/10.48550/arXiv.2304.13023
Maples-Keller, Jessica L. et al. (2019): Using Item Response Theory to Develop a 60-Item Representation of the NEO PI–R Using the International Personality Item Pool: Development of the IPIP–NEO–60. Journal of Personality Assessment, 101(1), 4–15. Online: https://doi.org/10.1080/00223891.2017.1381968
Mariano, João et al. (2021): Too Old for Technology? Stereotype Threat and Technology Use by Older Adults. Behaviour & Information Technology, 41(7), 1503–1514, Online: https://doi.org/10.1080/0144929X.2021.1882577
Marikyan, Davit – Papagiannidis, Savvas (2023): Protection Motivation Theory: A review. In Papagiannidis, Savvas (szerk.): TheoryHub Book, 78–93. Online: https://open.ncl.ac.uk/theory-library/TheoryHubBook.pdf
Martineau, Melissa – Spiridon, Elena – Aiken, Mary (2023): A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature. Forensic Sciences, 3(3), 452–477. Online: https://doi.org/10.3390/forensicsci3030032
Martin-Rodriguez, Fernando – Garcia-Mojon, Rocio – Fernandez-Barciela, Monica (2023): Detection of AI-Created Images Using Pixel-Wise Feature Extraction and Convolutional Neural Networks. Sensors, 23(22), 9037. Online: https://doi.org/10.3390/s23229037
Marwick, Alice E. – Miller, Ross (2014): Online Harassment, Defamation, and Hateful Speech: A Primer of the Legal Landscape. Fordham Center on Law and Information Policy Report No. 2. Online: https://ssrn.com/abstract=2447904
McCrae, Robert R. – Costa, Paul T. (1997): Personality Trait Structure as a Human Universal. American Psychologist, 52(5), 509–516. Online: https://doi.org/10.1037/0003-066X.52.5.509
McElroy, James C. et al. (2007): Dispositional Factors in Internet Use: Personality versus Cognitive Style. MIS Quarterly, 31(4), 809–820. Online: https://doi.org/10.2307/25148821
McGovern, Orla – Collins, Rebecca – Dunne, Simon (2022): The Associations Between Photo-Editing and Body Concerns Among Females: A Systematic Review. Body Image, 43, 504–517. Online: https://doi.org/10.1016/j.bodyim.2022.10.013
Menard, Philip – Bott, Gregory J. – Crossler, Robert E. (2017): User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination
Theory. Journal of Management Information Systems, 34(4), 1203–1230. Online: https://doi.org/10.1080/07421222.2017.1394083
Messaris, Paul (2012): Visual “Literacy” in the Digital Age. Review of Communication, 12(2), 101–117. Online: https://doi.org/10.1080/15358593.2011.653508
Mijwil, Maad – Salem, Israa Ezzat – Ismaeel, Marwa M. (2023): The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity: A Comprehensive Review. Iraqi Journal for Computer Science and Mathematics, 4(1), 87–101. Online: https://doi.org/10.52866/ijcsm.2023.01.01.008
Mills, Jennifer S. et al. (2018): “Selfie” Harm: Effects on Mood and Body Image in Young Women. Body Image, 27, 86–92. Online: https://doi.org/10.1016/j.bodyim.2018.08.007
Mirsky, Yisroel – Lee, Wenke (2021): The Creation and Detection of Deepfakes: A Survey. ACM Computing Surveys, 54(1), 7:1–7:41. Online: https://doi.org/10.1145/3425780
Mou, Jian et al. (2022): A Test of Protection Motivation Theory in the Information Security Literature: A Meta-Analytic Structural Equation Modeling Approach. Journal of the Association for Information Systems, 23(1), 196–236. Online: https://doi.org/10.17705/1jais.00723
Moustafa, Ahmed A. – Bello, Abubakar – Maurushat, Alana (2021): The Role of User Behaviour in Improving Cyber Security Management. Frontiers in Psychology, 12. Online: https://doi.org/10.3389/fpsyg.2021.561011
Newman, Eryn J. et al. (2012): Nonprobative Photographs (Or Words) Inflate Truthiness. Psychonomic Bulletin & Review, 19(5), 969–974. Online: https://doi.org/10.3758/s13423-012-0292-0
Newton, Julianne H. (2006): Influences of Digital Imaging on the Concept of Photographic Truth. In Messaris, Paul – Humphreys, Lee (szerk.): Digital Media: Transformations in Human Communication. New York: Peter Lang, 3–14.
Nightingale, Sophie J. –Farid, Hany (2022): AI-Synthesized Faces Are Indistinguishable from Real Faces and More Trustworthy. Proceedings of the National Academy of Sciences, 119(8), e2120481119. Online: https://doi.org/10.1073/pnas.2120481119
Nightingale, Sophie J. – Wade, Kimberley A.– Watson, Derrick G. (2017): Can People Identify Original and Manipulated Photos of Real-World Scenes? Cognitive Research: Principles and Implications, 2, 30. Online: https://doi.org/10.1186/s41235-017-0067-2
NMHH (2024): Illúzió vagy valóság? – A deepfake-dilemma. nmhh.hu, 2024. augusztus 9. Online: https://nmhh.hu/cikk/248038/Illuzio_vagy_valosag__A_deepfakedilemma
Nobles, Calvin (2021): The Human Factors Series: Burnout and Fatigue are Sustained Problems in Cybersecurity. LinkedIn, 2021. február 8. Online: https://www.linkedin.com/pulse/human-factors-series-burnout-fatigue-sustained-calvin-nobles-ph-d-/
Nobles, Calvin (2022): Stress, Burnout, and Security Fatigue in Cybersecurity: A Human Factors Problem. HOLISTICA – Journal of Business and Public Administration, 13(1), 49–72. Online: https://doi.org/10.2478/hjbpa-2022-0003
Nurse, Jason R. C. (2019): Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit. In Attrill-Smith, Alison et al. (szerk.): The Oxford Handbook of Cyberpsychology. Oxford: Oxford University Press, 663–690.
OECD (2024): Future of Education and Skills 2030. Online: https://www.oecd.org/en/about/projects/future-of-education-and-skills-2030.html
Ozimek, Phillip et al. (2023): How Photo Editing in Social Media Shapes Self-Perceived Attractiveness and Self-Esteem via Self-Objectification and Physical Appearance Comparisons. BMC Psychology, 11, 99. Online: https://doi.org/10.1186/s40359-023-01143-0
Paletz, Susannah B. F. et al. (2023): Emotional Content and Sharing on Facebook: A Theory Cage Match. Science Advances, 9(39), eade9231. Online: https://doi.org/10.1126/sciadv.ade9231
Parry, Zachariah B. (2009): Digital Manipulation and Photographic Evidence: Defrauding the Courts One Thousand Words at a Time. Journal of Law, Technology & Policy, 2009(1), 175.
Powell, Thomas E. et al. (2015): A Clearer Picture: The Contribution of Visuals and Text to Framing Effects. Journal of Communication, 65(6), 997–1017. Online: https://doi.org/10.1111/jcom.12184
Ricker, Jonas et al. (2024): AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images. In Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses (RAID ‘24). New York: Association for Computing Machinery, 513–530. Online: https://doi.org/10.1145/3678890.3678922
Rogers, Ronald W. (1975): Protection Motivation Theory of Fear Appeals and Attitude Change. Journal of Psychology: Interdisciplinary and Applied, 91(1), 93–114. Online: https://doi.org/10.1080/00223980.1975.9915803
Rohan, Rohani et al. (2021): Understanding of Human Factors in Cybersecurity: A Systematic Literature Review. 2021 International Conference on Computational Performance Evaluation (ComPE), 133–140. Online: https://doi.org/10.1109/ComPE53109.2021.9752358
Rombach, Robin et al. (2022): High-Resolution Image Synthesis with Latent Diffusion Models. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 10684–10695. Online: https://doi.org/10.48550/arXiv.2112.10752
Shaukat, Kamran et al. (2020): A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access, 8, 222310–222354. Online: https://doi.org/10.1109/ACCESS.2020.3041951
Snider, Keren L. G. et al. (2021): Cyberattacks, Cyber Threats, and Attitudes Toward Cybersecurity Policies. Journal of Cybersecurity, 7(1), tyab019. Online: https://doi.org/10.1093/cybsec/tyab019
Spalter, Anne M. – van Dam, Andries (2008): Digital Visual Literacy. Theory Into Practice, 47(2), 93–101. Online: https://doi.org/10.1080/00405840801992256
Sutton, Stephen (2001): Health Behavior: Psychosocial Theories. In Smelser, Neil J. – Baltes, Paul B. (szerk.): International Encyclopedia of the Social & Behavioral Sciences. Oxford: Elsevier, 6499–6506. Online: https://doi.org/10.1016/B0-08-043076-7/03872-9
Švábenský, Valdemar et al. (2021): Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges. Computers & Security, 102, 102154. Online: https://doi.org/10.1016/j.cose.2020.102154
Szabó, Csilla Marianna (2019): Digital Competence of Teachers – How Do We Teach Generation Z? In András, István – Rajcsányi-Molnár, Mónika (szerk.): East West Cohesion III. Strategical Study Volumes. Subotica: Čikoš Group, 197–206
Szokolszky Ágnes (2004): Kutatómunka a pszichológiában. Metodológia, módszerek, gyakorlat. Budapest: Osiris.
TeamPassword (2024): 10 Cybersecurity Best Practices Your Employees Must Follow. TeamPassword, 2024. szeptember 17. Online: https://teampassword.com/blog/cybersecurity-best-practices-for-employees
Thomas, Brian (2024): 5 Shocking IT & Cybersecurity Burnout Statistics. Bitsight, 2024. január 11. Online: https://www.bitsight.com/blog/5-shocking-it-cybersecurity-burnout-statistics
Vannucci, Anna et al. (2020): Social Media Use and Risky Behaviors in Adolescents: A Meta-Analysis. Journal of Adolescence, 79(1), 258–274. Online: https://doi.org/10.1016/j.adolescence.2020.01.014
Veszelszki, Ágnes – Horváth, Evelin – Kovács, Gábor (2022): New Media Literacy in Light of Image Manipulation and Deepfake Technology. In Mammadov, Azad –Lewandowska-Tomaszczyk, Barbara (szerk.): Analysing Media Discourse: Traditional and New. Newcastle upon Tyne: Cambridge Scholars Publishing, 148–178.
Veszelszki Ágnes (2021): deepFAKEnews: Az információmanipuláció új módszerei. In Balázs László (szerk.): Digitális kommunikáció és tudatosság. Budapest: Hungarovox, 93–105.
Veszelszki Ágnes (2023): Deepfake: kételkedés a kételyben. In Aczél Petra – Veszelszki Ágnes (szerk.): Deepfake: a valótlan valóság. Budapest: Gondolat, 13–31.
Vosoughi, Soroush – Roy, Deb – Aral, Sinan (2018): The Spread of True and False News Online. Science, 359 (6380), 1146–1151. Online: https://doi.org/10.1126/science.aap9559
Walker, Sidney – Walker, Sydney (2004): Artmaking in an Age of Visual Culture: Vision and Visuality. Visual Arts Research, 30(2), 23–37. Online: http://www.jstor.org/stable/20715350
Wang, Shensheng – Lilienfeld, Scott O. – Rochat, Philippe (2015): The Uncanny Valley: Existence and Explanations. Review of General Psychology, 19(4), 393–407. Online:https://doi.org/10.1037/gpr0000056
Wang, Sheng-Yu et al. (2020): CNN-Generated Images Are Surprisingly Easy to Spot…for Now. 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 8695–8704. Online: https://doi.org/10.48550/arXiv.1912.11035
Wang, Wentao et al. (2023): DeepArt: A Benchmark to Advance Fidelity Research in AI-Generated Content. Online: https://doi.org/10.48550/arXiv.2312.10407
Wolff, Josephine (2021): How Is Technology Changing the World, and How Should the World Change Technology? Global Perspectives, 2(1), 27353. Online: https://doi.org/10.1525/gp.2021.27353
Youssef, Adel Ben – Dahmani, Mounir – Ragni, Ludovic (2022): ICT Use, Digital Skills and Students’ Academic Performance: Exploring the Digital Divide. Information, 13(3), 129. Online: https://doi.org/10.3390/info13030129
Yu, Joanne et al. (2024): Artificial Intelligence-Generated Virtual Influencer: Examining the Effects of Emotional Display on User Engagement. Journal of Retailing and Consumer Services, 76, 103560. Online: https://doi.org/10.1016/j.jretconser.2023.103560
Yu, Yanqiu – Lau, Mason M. C.– Lau, Joseph T. F. (2022): Application of the Protection Motivation Theory to Understand Determinants of Compliance with the Measure of Banning Gathering Size >4 in All Public Areas for Controlling COVID-19 in a Hong
Kong Chinese Adult General Population. PLoS ONE, 17(5), e0268336. Online: https://doi.org/10.1371/journal.pone.0268336
Zhang, Zhimin et al. (2022): Artificial Intelligence in Cyber Security: Research Advances, Challenges, and Opportunities. Artificial Intelligence Review, 55(2), 1029–1053. Online: https://doi.org/10.1007/s10462-021-09976-0
Letöltések
Megjelenés
Kategóriák
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.