Book Read Free

The Cyber Effect

Page 37

by Mary Aiken


  I have had the pleasure of meeting so many exceptional academics during the course my career that it is not possible to name them all, but I would like to mention a few, starting with my dear and bighearted friend Dr. Kate Coleman for her selfless world vision and outstanding contribution to those in need—I am not sure if I can ever live up to your trailblazing example. Professor Andy Phippen and Professor Anthony Goodman, thank you so much for your insightful feedback; it is a joy to engage with academics who truly grasp the significance of the impact of technology on human behavior. Many years ago, clinical forensic psychologist Mike Berry ignited my love of forensics with just one line: “As we say in forensics, if you want to live a long and healthy life, you should change your next of kin frequently.” Thanks to Dr. Joe O’Sullivan for sharing his incredible and invaluable expertise and insights, and to Professor David Finkelhor for demonstrating the value of the contrarian view. Another special thank-you to forensic pediatrician Dr. Sharon W. Cooper. I will always remember her words of support, advice, and encouragement. She is truly an inspiration when it comes to child protection and welfare.

  Next, I would also like to acknowledge some of those worldwide who have reached out and shown interest in my work and discipline, in particular Todd Park, former U.S. chief technology officer and assistant to the president, and Vivian Graubard for inviting me to become part of the Technology Solutions to Human Trafficking Initiative, and for introducing me to Professor Steve Chan and Dr. Jennifer Lynne Musto. Thanks also to the World Cybersecurity Technology Research Summit team at the Center for Secure Information Technologies, Queen’s University Belfast; the Royal Society Cybersecurity Research Project, British Academy London; LaunchBox, Trinity College Dublin; the MIT Media Lab; the Center for Research in the Arts, Social Sciences and Humanities, University of Cambridge; the School of Film and Television, Loyola Marymount University; the University of Southern California Institute for Creative Technologies; SRI International; the Criminal Bar Association; the Law Reform Commission; the President Michael D. Higgins Ethics Initiative; the European Commission Safer Internet groups; the Psychological Society of Ireland; the British Psychological Society; everyone at our EU Child Safety Online Project: Middlesex University, UCD Geary Institute, FDE Institute of Mantua, LUMSA University Rome, Kore University of Enna, and Tilburg University in the Netherlands. Special thanks to Mike Steed and Paladin Capital Group for believing in and funding “pro-techno social” research solutions; to Janneke and the team at Inspiring Fifty for promoting the work of women in technology; to the great networker Diana Eggleston of the Hague Talks for promoting social justice issues; to Professor David Canter and Dr. Donna Youngs for their contribution to the science of investigative psychology; and to the dedicated trio of Florence Olara, Mark Dillon and Dr. Philipp Amann at the Hague Justice Portal for their contribution to peace, justice, and security.

  A very special mention is required for the front-line agencies operating on the cyber frontier. Specifically, I would like to acknowledge the following: the incomparable and inspiring INTERPOL assistant director Michael “Mick” Moran and the exceptional team at the INTERPOL Specialists Group; and Troels Oerting, the former Assistant Director of the Europol European Crime Centre (EC3), and the current head of EC3, Steven Wilson. Also special thanks to Olivier, Philipp, and my fellow academic advisors at Europol, to the members of the Virtual Global Task Force, and to my law enforcement friends and colleagues worldwide, including Bjorn Erik and the Norwegian police; Jon and Colm and the New Zealand team; John, Reg, and Jamie at the MPS; Rachelle, Peter, and Todd at Australian Federal Police; Roberta at the Royal Canadian Mounted Police; detective Jennifer Moloney and Gurchand Singh at the Garda Síochána; the very talented and entertaining Ralph Echemendia; the “experts’ expert” Brian Honan at BH Consulting; and everyone at NCMEC. For the opportunity to address leaders of the future, the West Point cadets, thank you to Dr. Maymi, Colonel Conti, Captain Chapman, and everyone at the Army Cyber Institute West Point. I want to thank Dr. Roger Solomon for his invaluable work with PTSD veterans and a very deep thanks to some dear colleagues in law enforcement: the exceptional Robert Clark, assistant special agent in charge, FBI; the equally exceptional Lieutenant Andrea Grossman, LAPD; and the team at the LAPD ICAC Task Force. These are all outstanding and dedicated people who deliver exceptional service to their communities.

  They say that the first year as an undergrad at MIT is like “drinking knowledge from a fire hose.” My first year in television as a producer was pretty similar. To those in the television business who made me feel so welcome, thanks to Nina Tassler, president of CBS Entertainment, and David Stapf, president of CBS Television Studios. My experience was like something out of the movies: a fifteen-minute interview turned into a few hours of discussion, and CSI:Cyber was born. Special thanks to the charismatic chief executive of CBS, Les Moonves; the charming George F. Schweitzer; the hardworking public relations team; and the CBS Board. It has been a pleasure to work with all of you. I am deeply indebted to the brilliant creator of CSI, Anthony E. Zuiker, and the exceptionally talented Carol Mendelsohn and Ann Donahue, who were generous with their expertise and time. Thanks to our superb show runner Pam Veasey and all of the writing team; thanks also to another creative legend, Jerry Bruckheimer, to the exceptional Jonathan Littman and all the team at Bruckheimer Films, and to Lauren Whitney and Lindsay Dunn, my agents at WME Los Angeles, for making it all happen. It was a wonderful adventure and I am grateful to have had the opportunity to bring my discipline to a worldwide audience—entertaining and educating at the same time.

  Now it’s time to thank the team that came together for the creation of The Cyber Effect. The very charming Suzanne Gluck at WME is at the top of this list. I never understood what the words “super agent” really meant until I met Suzanne, a rare combination of exceptional interpersonal skills and exceptional commercial acumen. Thanks to all those at WME who worked on my behalf in New York and London—especially Simon Trewin, Tracy Fisher, Annemarie Blumenhagen, Lisa Reiter, Eve Attermann, and Clio Seraphim. You made my first book process a seamless and pleasurable experience.

  To my publisher, the remarkable Julie Grau of Spiegel & Grau, who commissioned this book practically as soon as I finished the opening sentence of my pitch. I am grateful for her superb editing and guidance. I want to thank the incredible team at the Random House Publishing Group, who gave me notes, advice, ideas, and logistical assists—Laura Van der Veer, Tom Perry, London King, Leigh Marchant, Andrea DeWerd, Katherine J. Trager, Mark Birkey, Benjamin Dreyer, Rebecca Berlant, Kelly Chian, Sandra Sjursen, Greg Mollica, and Caroline Cunningham. A special shout-out to the meticulous Dr. Selga Medenieks and John Kenney, whose conscientious attention to detail made this book as accurate as humanly possible. I would also like to recognize the artistic skill and talent of Barry McCall. My author photo is not what I see when I look in the mirror.

  To my marvelous friend and collaborator the very talented Martha Sherrill, who has been an enormous help and support in completing this book, and to her husband, the equally talented and gracious Bill Powers: Thank you both for your friendship, advice, and contribution. A special thank-you to Martha for introducing me to the powerhouse duo of Elsa Walsh and Bob Woodward. Not everybody understands my science, but you know you are in the presence of creativity and vision when someone can not only instantly grasp a new subject, but also simultaneously deliver robust, brilliant insights.

  I would also like to thank my family and close friends. You all know who you are. It is very difficult to switch on and off, to segue from challenging work to some sort of normality. The unconditional love and affection of family and friends makes that transition possible. I am eternally grateful for your patience, for your support, and for being there.

  Finally, when considering the worst aspects of online behavior I make it a habit to acknowledge the positives—for example, how technology has enhanced the work of academics in any field. Our connectivity, knowledge base, and resear
ch efforts are made easier and better. As I have maintained throughout my book, technology in itself is not good or bad. It is a tool like any other, one used well or poorly by all of us. Across borders and cultures, collectively, technology can also offer solutions to problematic cyber effects. I remain absolutely optimistic about that.

  GLOSSARY

  Addiction (broad definition)

  A state of dependency, a compulsive need for and use of a substance (heroin, nicotine, caffeine, alcohol, or other) characterized by tolerance and withdrawal symptoms.

  Algorithm

  Step-by-step instructions for carrying out a procedure or solving a particular problem.

  Altruism online

  Actions online to promote the welfare of others.

  Anonymity

  A state of being unknown or unacknowledged.

  Antisocial behavior

  Actions causing harassment, significant or persistent annoyance, intimidation, distress, or alarm.

  Artificial intelligence (A.I.)

  Field of computer science attempting to enable machines to simulate or improve upon human intelligence and behavior.

  Attention-deficit/hyperactivity disorder (ADD/ADHD)

  Childhood condition characterized by persistent inattention, hyperactivity, or impulsivity.

  BDSM: bondage, dominance (or discipline), submission (or sadism), masochism

  Acronym for erotic role-play involving practices of submission and dominance that may include inflicting or receiving physical pain as sexual stimulation.

  Body dysmorphic disorder (BDD)

  Pathological preoccupation with an imagined or exaggerated defect in physical appearance.

  Bystander effect (diffusion of responsibility)

  Psychological phenomenon in which the likelihood of an individual intervening in an emergency or crime decreases when there are others present who may offer help.

  Catfishing

  Luring a person into a relationship under false pretenses.

  Chatbot (Chat robot)

  Computer algorithm simulating human conversation.

  Child abuse material

  A term used rather than “child pornography,” which arguably implies consent of the child and a benign relationship with adult pornographic practices. There is a preference to use the phrase “child abuse material” (CAM) when referring to these images.

  Cognitive dissonance

  A theory that explains an individual’s efforts to resolve conflicting attitudes, thoughts, or behaviors with sometimes irrational justifications.

  Comorbidity

  More than one disorder or condition occurring simultaneously or sequentially, usually affecting one another.

  Crowdfunding

  Request for financial contributions from a large number of people online.

  Cryptocurrency

  A digital currency (e.g., Bitcoin) operated independently of a central authority that uses cryptography to provide security.

  Crypto-markets

  Contraband markets operating on the Internet.

  Cyber

  A modifier relating to the culture of computing, computing networks, and digital and information technologies; can be used as a prefix to describe a person, thing, or idea.

  Cyberbullying

  Repeatedly critical remarks and teasing, often by a group, via electronic or online means.

  Cyberchondria

  Anxiety induced by reviewing morbid or alarming content during health-related search online.

  Cyberchondria by proxy

  Anxiety induced by reviewing morbid or alarming content during health-related search online for others.

  Cybercrime

  A crime committed against a computer or computing system (e.g., hacking) or in which a computer is the principal tool (e.g., transmitting child abuse material).

  Cyber-exhibitionism

  A behavior in which sexual gratification is obtained by indecent exposure to another person online, usually unsolicited.

  Cyber-infidelity

  A romantic and/or sexual relationship conducted solely through online contact with someone other than an individual’s spouse or exclusive partner.

  Cyber juvenile delinquency

  The habitual committing of cybercriminal acts or offenses by a minor.

  Cyber law (virtual law)

  A developing area of law regulating the use of computers and computer networks, as well as activities and transactions involving this technology.

  Cyber maladaptive behavior

  Behavior that inhibits a person’s ability to adjust to particular situations in cyber contexts; attitudes, emotions, responses, and patterns of thought that result in negative outcomes.

  Cyber-migration

  The transfer of interactions from real-world to cyber environments, and the introduction of cyber-influenced attitudes and practices to real-world culture.

  Cyberpsychology

  The study of the impact of technology on human behavior.

  Cyber-security

  Measures taken to protect a computer or computer network and associated data from unauthorized access or use.

  Cyber-socialization

  Acceptance of new or revised behavioral norms accelerated by the characteristics of cyber environments.

  Cyberstalking

  Persistent harassment of an individual, group, or organization using technology.

  Darknets

  Portions of the Deep Web intentionally hidden and not accessible using standard Web browsers and that can be accessed only with specific software, configurations, or authorization.

  Deep Web

  The part of the Internet that is inaccessible to conventional search engines.

  Diagnostic websites

  Websites offering symptom-checking aids, such as checklists.

  Dopamine

  An organic chemical released in the brain that helps to regulate movement and emotional responses, and is also associated with pleasurable feelings.

  Dunbar’s number

  The theoretical limit to the number of people with whom an individual can maintain socially meaningful relationships (approximately 150).

  Eating disorders (anorexia nervosa, bulimia, binge eating)

  Psychological disorders characterized by abnormal eating habits.

  Emotional attachment style

  The ability to make emotional connections with others; established in early childhood relationships with caregivers.

  Face-to-face (FTF)

  In direct contact; within the presence of another person.

  File-sharing

  Distributing electronic data, such as music and film files, to others via an online network.

  Flaming emails

  Hostile and/or abusive verbal attacks in the form of electronic messages and/or posts to online forums.

  Forensic science

  The application of natural sciences for the evaluation of physical evidence in service of the law.

  Fun failure

  In gaming, the anticipation of winning and the excitement of participation, combined with incremental or intermittent successes, resulting in psychologically positive feedback in spite of failure to achieve the stated goal.

  Gamer’s thrombosis

  Deep vein thrombosis (DVT): blood clots usually formed in the lower limbs, which can travel to arteries in the lungs and block blood flow; potentially fatal. Caused by extended periods of physical inactivity, such as lengthy gaming sessions.

  Gaming freak-outs

  Irrational or hysterical behavior; a result of loss of control associated with excessive immersion in a gaming environment.

  Gestalt principle of good continuation

  Phenomenon of visual psychology in which a viewer will perceive a series of visual elements connected in a straight or curved line as belonging together, even if interrupted by another, unrelated form.

  Google stack

  Results of amateur health-related research online, printed and
gathered as a stack of paper and often presented by a patient to a doctor during the consultation process.

  Groupthink

  Psychological phenomenon describing the tendency of members of a group to conform to consensus opinion.

  Hacking

  Use of computers to obtain unauthorized access to data.

  Halo effect

  A good impression made by one characteristic, such as attractiveness, extended without justification to other areas, such as honesty.

  Health anxiety

  Excessive or obsessive concern about one’s health; preoccupation with perceived or potential illness.

 

‹ Prev