Access the full text.
Sign up today, get DeepDyve free for 14 days.
(1980)
Gruppkommunikation via dator: Inledande socialpsykologiska studier på KOM-systemet vid FOA [Computerized group communication: Introductory social psychological studies of the KOM system
M. Bauer (1995)
Resistance to new technology and its effects on nuclear power, information technology and biotechnology
P. Neumann (1994)
Expectations of security and privacyCommun. ACM, 37
L. Sproull, S. Kiesler (1991)
Computers, Networks and Work.Scientific American, 265
Övervakad : Internet är tjuv - lyssnarens Mecka [ Under surveillance : Internet is the Mecka of eavesdroppers ]
Sweden: TELDOK
I. Miles, G. Thomas (1995)
Resistance to new technology: User resistance to new interactive media: participants, processes and paradigms
(1997)
E-post säkrare än fax? [E-mail more secure than fax?
S. Weisband, B. Reinig (1995)
Managing user perceptions of email privacyCommun. ACM, 38
(1987)
Mental models and new technology
(1999)
The perils of living in a risk - free world [ The Weekend Review ]
S. Kiesler (1986)
The hidden messages in computer networksHarvard Business Review, 64
J. Soulsby (1979)
Electronic mailComput. Commun., 2
D. Poel, Joseph Leunis (1999)
Consumer Acceptance of the Internet as a Channel of DistributionJournal of Business Research, 45
S. Davis, Brandy Smith, K. Rodrigue, Kim Pulvers (1999)
An Examination of Internet Usage on Two College CampusesCollege student journal, 33
Deann Gauthier, C. Forsyth (1999)
bareback sex, bug chasers, and the gift of deathDeviant Behavior, 20
Kristin Palm (2003)
Revolutionen som kom av sig
N. Weinstein (1989)
Optimistic biases about personal risks.Science, 246 4935
K. Young (1998)
Caught in the Net: How to Recognize the Signs of Internet Addiction--and a Winning Strategy for Recovery
(1997)
Spionprogram" lagras på din hårddisk: Din personlighet kartläggs när du surfar på internet!
L. Frewer, R. Shepherd (1994)
Attributing information to different sources: effects on the perceived qualities of information, on the perceived relevance of information, and on attitude formationPublic Understanding of Science, 3
M. Griffiths (1998)
Internet addiction: Does it really exist?
L. Frewer, Chaya Howard, R. Shepherd (1998)
Understanding public attitudes to technologyJournal of Risk Research, 1
(1994)
Comprehending radiation risks. A report to IAEA (pp. 29–59)
(2000)
Svenskarna läser websidor över genomsnittet
(1998)
Datoriseringens risker [The risks of computerization
L. Persson (1988)
Mood and expectation
L. Adrianson (1987)
Psychological studies of attitudes to and use of computer-mediated communication
(2001)
Symptoms, evaluation, and treatment
(1998)
Så lätt står du blottad på nätet. [You are easily exposed at the Internet
Robert Kraut, Michael Patterson, Vicki Lundmark, S. Kiesler, Tridas Mukophadhyay, W. Scherlis (1998)
Internet paradox. A social technology that reduces social involvement and psychological well-being?The American psychologist, 53 9
(1996)
IT och det fria ordet—myten om Storebror. [IT and freedom of speech—the myth of Big Brother
(1997)
leva.online [Living online
S. Kiesler, D. Zubrow, Annie Moses, V. Geller (1985)
Affect in Computer-Meditated Communication: An Experiment in Synchronous Terminal-to-Terminal DiscussionHum. Comput. Interact., 1
M. Pratarelli, B. Browne, Kimberly Johnson (1999)
The bits and bytes of computer/internet addiction: A factor analytic approachBehavior Research Methods, Instruments, & Computers, 31
(1996)
Computer addictions entangle students
K. Young (1998)
Internet Addiction: The Emergence of a New Clinical DisorderCyberpsychology Behav. Soc. Netw., 1
L. Sjöberg (1999)
Consequences of perceived risk: Demand for mitigationJournal of Risk Research, 2
J. Bremer, P. Rauch (1998)
Children and computers: risks and benefits.Journal of the American Academy of Child and Adolescent Psychiatry, 37 5
(1997)
Dina vanor har blivit handelsvaror [Your habits have become trading items
(1996)
Is the Internet addictive, or are addicts using the Internet? http://rdz.stjohns.edu/~storm/iad.html
J. Sawyer, Mary Kernan, Donald Conlon, H. Garland (1999)
Responses to the Michelangelo Computer Virus Threat: The Role of Information Sources and Risk Homeostasis Theory1Journal of Applied Social Psychology, 29
L. Sjöberg (2000)
Factors in risk perception.Risk analysis : an official publication of the Society for Risk Analysis, 20 1
A. Wildavsky (1997)
But is it true? : a citizen's guide to environmental health and safety issuesContemporary Sociology, 26
(1995)
Säkerhet i elektronisk post
Naveen Donthu, Adriana Garcia (1999)
The Internet ShopperJournal of Advertising Research, 39
L. Sjoberg (1999)
RISK PERCEPTION IN WESTERN EUROPEAMBIO: A Journal of the Human Environment, 28
L. Frewer, Chaya Howard, Duncan Hedderley, R. Shepherd (1996)
What determines trust in information about food-related risks? Underlying psychological constructs.Risk analysis : an official publication of the Society for Risk Analysis, 16 4
(1998)
Klarar den svenska offentlighetsprin - cipen mötet med cyberrymden ? [ Will the Swedish principle of open information access survive meeting cyper space ? ]
P. Slovic, J. Flynn, Mark Layman (1991)
Perceived Risk, Trust, and the Politics of Nuclear WasteScience, 254
USA har koder till hemlig e-post
Nicolai Bodemer, Wolfgang Gaissmaier (1993)
Risk perceptionNature, 361
P. Neumann (1994)
Computer-related risks
S. Kiesler, J. Siegel, T. McGuire (1984)
Social psychological aspects of computer-mediated communicationComputer Supported Cooperative Work
Risks related to information technology (IT) are becoming a focus of concern in current risk debates. The use of IT is rapidly spreading in the population, as is access to computers in general. The present article reviews the literature on IT use (especially electronic mail and various Internet applications) and the related risks. In addition, the results from a survey about IT use and risk perception, given to a random sample of the Swedish population, are reported. In general, participants were quite positive to IT and were, to some extent, aware of the related risks. However, risks of IT were mostly seen as pertinent to other people, a finding in contrast with other results on perceived technology hazards. The attitude toward the use of IT was strongly related to general attitude toward computers, and less clearly to risk perception. Only a small percentage of the respondents reported having had negative experiences with IT hazards such as Internet addiction, depression, and social isolation. When extrapolated to the general population, however, these small percentages amount to large groups in the population that have been negatively affected by IT use.
Risk Analysis – Wiley
Published: Jun 1, 2001
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.