Task 7 Flashcards
Affect and Mood
Affect: underlying experience of feelings and emotions & mood
Mood: more long lasting, less directed towards a certain situation
Affective computing
research and development of systems and devices which can identify, interpret, process and respond to humans emotional state
TYPES:
- systems that detect emotions of the user
- systems that express what humans would perceive as emotion
- systems that feel an emotion
How does affective computing work
- Technologies sense emotions of a user by using some combinations of four inputs:
a) facial recognition
b) voice recognition
c) gestures
d) biometrics - Computer software is then used to analyze the gathered data: estimate users emotional state and provide an appropriate response
Methods of affective computing
- knowledge based: informing search processes by databases on emotional words
- statistical approach: deep learning
- Hybrid approach: uses 1) and 2)
Benefits of affective computing
EMOTIONAL INTELLIGENCE: ability of a person to recognize own feelings or emotions and those of others and manage and adjust them to achieve a goal
- without EI a computing system might become smarter but not more useful
- AI can detect conversational cues (e.g. rise of pitch in voice)
- Detect brief facial expressions and subtle emotional cues (help people struggle with hidden issues, such as depression)
- Analyze facial and audiovisual displays of affective states
- emotion and pain project: how sensors can read user levels of pain
- improve empathy: help autistic patients
Concerns about affective computing
- Privacy: data collected can convey extremely personal things - guidelines are needed so that the systems can’t be manipulated
- Lack of consideration given to culturally based emotions: emotions may not be consistent across cultures, leading to unreliability
- costs: equipment needed to achieve good results is costly
Cyberpsychology
emerging discipline focussing on human-machine interaction: how humans are impacted by technology, how they interact online
Cybercrime
- why do we fall for fraud
a) Internet specific crimes: hacking
b) Internet enabled crimes: theft, human trafficking, advance free fraud (minor request – big reward ‘you won 2 mio dollar, only pay 30 cents to call’)
WHY DO WE FALL FOR THESE FRAUDS?
Biases involved:
a) optimism bias: oneself is less likely to experience a negative event
b) instant gratification (involved in piracy): why wait for it on Netflix? I want to watch it now
Forensic cyber psychology
They try to:
a) predict offending
b) enhance understanding of offender
c) determine most appropriate assessment of offender
Theories of crime
Neutralization: develop ways of rationalize behavior to reduce the feelings of guilt (everybody is doing it - Coleman)
Routine Activity Theory: For a crime to happen, there needs to be a likely offender, a suitable target and the absence of guardian
Study cyber psychology:
the greater the perception of threat, the greater the hardline militant attitudes of people
- stress doesn’t play a role in that
Self and identity in cyberspace
SELF: AS essential being
IDENTITY: compared to others with regard to one’s potentials and qualities
VIRTUAL SELF: online without any real life consequences:
- all 3 types of self (ideal, actual and ought) can be expressed and physical gatherings are overcome = identity empowerment
Anonymity in cyberspace
Equalization hypothesis: removal of social cues = less stereotyped = more socialization
Social model of deindividuation:
a) cognitive component: how individuals behave ands see themselves within a group (group completely anonymous = increase in group salience vs. one person anonymous = decrease in group salience)
b) strategic component: to achieve goal directed groups, we favor:
1. complete anonymity 2. complete transparence (each member)
Different behavior in social network sites:
a) broadcaster - speaking in front of group, self-focussed, self-promo
b) communicating - group focused, only few people, high interaction
Impression management in online dating
You want to promote yourself but also you want a small difference between your online and real self
- users often create ideal self online and use these characteristics for self-growth
- users use different identities linked to social context = identity as a social product