[1]
Ajzen, I. 1991. The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes. 50, 2 (1991), 179–211. DOI:https://doi.org/10.1016/0749-5978(91)90020-T.
[2]
Aked, J. et al. 2008. Five Ways to Wellbeing: The Evidence | New Economics Foundation.
[3]
Alexander, P.A. and Winne, P.H. 2006. Handbook of Educational Psychology. Erlbaum.
[4]
Alloway, T.P. et al. 2013. Social Networking Sites and Cognitive Abilities: Do They Make You Smarter? Computers & Education. 63, (2013), 10–16. DOI:https://doi.org/10.1016/j.compedu.2012.10.030.
[5]
Alloway, T.P. and Alloway, R.G. 2012. The Impact of Engagement With Social Networking Sites (SNSs) on Cognitive Skills. Computers in Human Behavior. 28, 5 (2012), 1748–1754. DOI:https://doi.org/10.1016/j.chb.2012.04.015.
[6]
Arndt, J. et al. 2004. The Urge to Splurge: A Terror Management Account of Materialism and Consumer Behavior. Journal of Consumer Psychology. 14, 3 (2004), 198–212. DOI:https://doi.org/10.1207/s15327663jcp1403_2.
[7]
Arndt, J. and Goldenberg, J.L. 2017. Where Health and Death Intersect. Current Directions in Psychological Science. 26, 2 (2017), 126–131. DOI:https://doi.org/10.1177/0963721416689563.
[8]
Ashton, R. and Roberts, E. 2006. What Is Valuable and Unique about the Educational Psychologist? Educational Psychology in Practice. 22, 2 (2006), 111–123.
[9]
Axsen, J. and Kurani, K.S. 2013. Developing Sustainability-Oriented Values: Insights From Households in a Trial of Plug-in Hybrid Electric Vehicles. Global Environmental Change. 23, 1 (2013), 70–80. DOI:https://doi.org/10.1016/j.gloenvcha.2012.08.002.
[10]
Baek, Y.M. et al. 2014. My Privacy Is Okay, but Theirs Is Endangered: Why Comparative Optimism Matters in Online Privacy Concerns. Computers in Human Behavior. 31, February (2014), 48–56. DOI:https://doi.org/10.1016/j.chb.2013.10.010.
[11]
Baxter, J. and Frederickson, N. 2005. Every Child Matters: Can Educational Psychology Contribute to Radical Reform? Educational Psychology in Practice. 21, 2 (2005), 87–102.
[12]
Beaver, R. 2011. Educational Psychology Casework: A Practice Guide. Jessica Kingsley.
[13]
Beaver, R. 1996. Educational Psychology Casework: A Practice Guide. J. Kingsley Publishers.
[14]
Bekkers, R. and Wiepking, P. 2011. A Literature Review of Empirical Studies of Philanthropy. Nonprofit and Voluntary Sector Quarterly. 40, 5 (2011), 924–973. DOI:https://doi.org/10.1177/0899764010380927.
[15]
Bertamini, M. et al. 2003. Naive Optics: Predicting and Perceiving Reflections in Mirrors. Journal of Experimental Psychology: Human Perception and Performance. 29, 5 (2003), 982–1002.
[16]
Bianchi, I. and Savardi, U. 2012. What Fits Into a Mirror: Naïve Beliefs About the Field of View. Journal of Experimental Psychology: Human Perception and Performance. 38, 5 (2012), 1144–1158.
[17]
Billieux, J. et al. 2015. Can Disordered Mobile Phone Use Be Considered a Behavioral Addiction? An Update on Current Evidence and a Comprehensive Model for Future Research. Current Addiction Reports. 2, 2 (2015), 156–162. DOI:https://doi.org/10.1007/s40429-015-0054-y.
[18]
Blum, D. 2011. Love at Goon Park: Harry Harlow and the Science of Affection. The Perseus Books Group.
[19]
Bögner, D. et al. 2007. Impact of Sexual Violence on Disclosure During Home Office Interviews. British Journal Of Psychiatry : The Journal Of Mental Science. 191, (2007).
[20]
British Psychological Society. Division of Educational and Child Psychology 1999. Dyslexia, Literacy and Psychological Assessment. British Psychological Society.
[21]
Brown, K.W. and Kasser, T. 2005. Are Psychological and Ecological Well-Being Compatible? The Role of Values, Mindfulness, and Lifestyle. Social Indicators Research. 74, 2 (2005), 349–368.
[22]
Burke, B.L. et al. 2010. Two Decades of Terror Management Theory: A Meta-Analysis of Mortality Salience Research. Personality and Social Psychology Review. 14, 2 (2010), 155–195. DOI:https://doi.org/10.1177/1088868309352321.
[23]
Butler, S. et al. 2011. A Randomized Controlled Trial of Multisystemic Therapy and a Statutory Therapeutic Intervention for Young Offenders. Journal of the American Academy of Child & Adolescent Psychiatry. 50, 12 (2011), 1220-1235.e2. DOI:https://doi.org/10.1016/j.jaac.2011.09.017.
[24]
Cameron, R.J. 2006. Educational Psychology: The Distinctive Contribution. Educational Psychology in Practice. 22, 4 (2006), 289–304. DOI:https://doi.org/10.1080/02667360600999393.
[25]
Campbell, J. et al. 2007. Unrealistic Optimism in Internet Events. Computers in Human Behavior. 23, 3 (2007), 1273–1284. DOI:https://doi.org/10.1016/j.chb.2004.12.005.
[26]
Carr, N. 2010. The Shallows: What the Internet Is Doing to Our Brains. W. W. Norton & Company.
[27]
Cooke, R. and French, D.P. 2008. How Well Do the Theory of Reasoned Action and Theory of Planned Behaviour Predict Intentions and Attendance at Screening Programmes? a Meta-Analysis. Psychology & Health. 23, 7 (2008), 745–765. DOI:https://doi.org/10.1080/08870440701544437.
[28]
Coventry, L. et al. 2014. SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment. Design, User Experience, and Usability. Theories, Methods, and Tools for Designing the User Experience: Third International Conference. Springer International Publishing. 229–239.
[29]
Croson, R. and Shang, J. 2008. The Impact of Downward Social Information on Contribution Decisions. Experimental Economics. 11, 3 (2008), 221–233. DOI:https://doi.org/10.1007/s10683-007-9191-z.
[30]
Croucher, C.J. et al. 2002. Naive Optics: Understanding the Geometry of Mirror Reflections. Journal of Experimental Psychology: Human Perception and Performance. 28, 3 (2002), 546–562.
[31]
Culley, L. et al. 2007. Using Focus Groups With Minority Ethnic Communities: Researching Infertility in British South Asian Communities. Qualitative Health Research. 17, 1 (2007), 102–112. DOI:https://doi.org/10.1177/1049732306296506.
[32]
D’Arcy, J. and Herath, T. 2011. A Review and Analysis of Deterrence Theory in the IS Security Literature: Making Sense of the Disparate Findings. European Journal of Information Systems. 20, 6 (2011), 643–658. DOI:https://doi.org/10.1057/ejis.2011.23.
[33]
Dee, H.M. and Santos, P.E. 2011. The Perception and Content of Cast Shadows: An Interdisciplinary Review. Spatial Cognition & Computation. 11, 3 (2011), 226–253. DOI:https://doi.org/10.1080/13875868.2011.565396.
[34]
Dickinson, J.L. 2009. The People Paradox: Self-Esteem Striving, Immortality Ideologies, and Human Response to Climate Change. Ecology and Society. 14, 1 (2009). DOI:https://doi.org/10.5751/ES-02849-140134.
[35]
Dittmar, H. et al. 2014. The Relationship Between Materialism and Personal Well-Being: A Meta-Analysis. Journal of Personality and Social Psychology,. 107, 5 (2014), 879–924.
[36]
Duckworth, A.L. et al. 2011. Self‐regulation Strategies Improve Self‐discipline in Adolescents: Benefits of Mental Contrasting and Implementation Intentions. Educational Psychology. 31, 1 (2011), 17–26. DOI:https://doi.org/10.1080/01443410.2010.506003.
[37]
Efferson, C. et al. 2015. Female Genital Cutting Is Not a Social Coordination Norm. Science. 349, 6255 (2015), 1446–1447. DOI:https://doi.org/10.1126/science.aaa7978.
[38]
Ehinger, K.A. et al. 2016. Change Blindness for Cast Shadows in Natural Scenes: Even Informative Shadow Changes Are Missed. Attention, Perception, & Psychophysics. 78, 4 (2016), 978–987. DOI:https://doi.org/10.3758/s13414-015-1054-7.
[39]
Ellison, N.B. et al. 2011. Connection Strategies: Social Capital Implications of Facebook-Enabled Communication Practices. New Media & Society. 13, 6 (2011), 873–892. DOI:https://doi.org/10.1177/1461444810385389.
[40]
Enns, J.T. and Rensink, R.A. 1990. Influence of Scene-Based Properties on Visual Search. Science. 247, 4943 (1990), 721–723.
[41]
Evans, L. et al. 2012. Self-Interest and Pro-Environmental Behaviour. Nature Climate Change. 3, 2 (2012), 122–125. DOI:https://doi.org/10.1038/nclimate1662.
[42]
Falvey, M.A. 1997. All My Life’s a Circle: Using the Tools - Circles, Maps and Pathways. Inclusion Press.
[43]
Farid, H. 2006. Digital Doctoring: How to Tell the Real From the Fake. Significance. 3, 4 (2006), 162–166. DOI:https://doi.org/10.1111/j.1740-9713.2006.00197.x.
[44]
Farid, H. 2017. How to Detect Faked Photos. American Scientist. 105, 2 (2017), 77–81. DOI:https://doi.org/10.1511/2017.105.2.77.
[45]
Farid, H. 2009. Image Forgery Detection. IEEE Signal Processing Magazine. 26, 2 (2009), 16–25. DOI:https://doi.org/10.1109/MSP.2008.931079.
[46]
Farid, H. 2016. Photo Forensics. The MIT Press.
[47]
Farid, H. and Bravo, M.J. 2010. Image Forensic Analyses That Elude the Human Visual System. Media Forensics and Security II (2010).
[48]
Farrell, P. et al. 2006. A Review of the Functions and Contribution of Educational Psychologists in England and Wales in light of ‘Every Child Matters: Change for Children’. School of Education, University of Manchester.
[49]
Frederickson, N. et al. 2008. Educational Psychology. Hodder Education.
[50]
Frederickson, N. et al. 2008. Educational Psychology. Hodder Education.
[51]
Frederickson, N. 2015. Special Educational Needs, Inclusion and Diversity. Open Univ Press.
[52]
Gackenbach, J. 2007. Psychology and the Internet: Intrapersonal, Interpersonal, and Transpersonal Implications. Elsevier/Academic Press.
[53]
Gentile, B. et al. 2012. The Effect of Social Networking Websites on Positive Self-Views: An Experimental Investigation. Computers in Human Behavior. 28, 5 (2012), 1929–1933. DOI:https://doi.org/10.1016/j.chb.2012.05.012.
[54]
GlobalActionPlan | Goals For Good: https://www.globalactionplan.org.uk/goals-for-good.
[55]
Gonzales, A.L. and Hancock, J.T. 2011. Mirror, Mirror on My Facebook Wall: Effects of Exposure to Facebook on Self-Esteem. Cyberpsychology, Behavior, and Social Networking. 14, 1–2 (2011), 79–83. DOI:https://doi.org/10.1089/cyber.2009.0411.
[56]
Graham, B. et al. 2014. Overgeneral Memory in Asylum Seekers and Refugees. Journal of Behavior Therapy and Experimental Psychiatry. 45, 3 (2014), 375–380. DOI:https://doi.org/10.1016/j.jbtep.2014.03.001.
[57]
Granovetter, M. 1978. Threshold Models of Collective Behavior. American Journal of Sociology. 83, 6 (1978), 1420–1443. DOI:https://doi.org/10.1086/226707.
[58]
Guo, K.H. 2013. Security-Related Behavior in Using Information Systems in the Workplace: A Review and Synthesis. Computers & Security. 32, February (2013), 242–251. DOI:https://doi.org/10.1016/j.cose.2012.10.003.
[59]
Haga, S.B. et al. 2013. Public Knowledge of and Attitudes Toward Genetics and Genetic Testing. Genetic Testing and Molecular Biomarkers. 17, 4 (2013), 327–335. DOI:https://doi.org/10.1089/gtmb.2012.0350.
[60]
Hann, K.E.J. et al. 2018. Attitudes Towards a Programme of Risk Assessment and Stratified Management for Ovarian Cancer: A Focus Group Study of Uk South Asians’ Perspectives. BMJ Open. 8, 7 (2018). DOI:https://doi.org/10.1136/bmjopen-2018-021782.
[61]
Hann, K.E.J. et al. 2017. Awareness, Knowledge, Perceptions, and Attitudes Towards Genetic Testing for Cancer Risk Among Ethnic Minority Groups: A Systematic Review. BMC Public Health. 17, 1 (2017). DOI:https://doi.org/10.1186/s12889-017-4375-8.
[62]
Henneman, L. et al. 2011. ‘A Low Risk Is Still a Risk’: Exploring Women’s Attitudes towards Genetic Testing for Breast Cancer Susceptibility in Order to Target Disease Prevention. Public Health Genomics. 14, 4–5 (2011), 238–247. DOI:https://doi.org/10.1159/000276543.
[63]
Jobson, L. and Cheraghi, S. 2016. Influence of Memory Theme and Posttraumatic Stress Disorder on Memory Specificity in British and Iranian Trauma Survivors. Memory. 24, 8 (2016), 1015–1022. DOI:https://doi.org/10.1080/09658211.2015.1061015.
[64]
Jobson, L. and Dalgleish, T. 2014. Cultural Differences in the Relationship Between Intrusions and Trauma Narratives Using the Trauma Film Paradigm. PLoS ONE. 9, 9 (2014). DOI:https://doi.org/10.1371/journal.pone.0106759.
[65]
Johnston, A.C. et al. 2016. Dispositional and Situational Factors: Influences on Information Security Policy Violations. European Journal of Information Systems. 25, 3 (2016), 231–251. DOI:https://doi.org/10.1057/ejis.2015.15.
[66]
Johnston, A.C. and Warkentin, M. 2010. Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Quarterly. 34, 3 (2010), 549–566. DOI:https://doi.org/10.2307/25750691.
[67]
Joison, A.N. et al. 2008. The Oxford Handbook Of Internet Psychology. Oxford University Press, USA.
[68]
Junco, R. 2012. Too Much Face and Not Enough Books: The Relationship Between Multiple Indices of Facebook Use and Academic Performance. Computers in Human Behavior. 28, 1 (2012), 187–198. DOI:https://doi.org/10.1016/j.chb.2011.08.026.
[69]
Kee, E. et al. 2013. Exposing Photo Manipulation With Inconsistent Shadows. ACM Transactions on Graphics. 32, 3 (2013), 1–12. DOI:https://doi.org/10.1145/2487228.2487236.
[70]
Kirschner, P.A. and Karpinski, A.C. 2010. Facebook® and Academic Performance. Computers in Human Behavior. 26, 6 (2010), 1237–1245. DOI:https://doi.org/10.1016/j.chb.2010.03.024.
[71]
Kogut, T. and Ritov, I. 2011. The Identifiable Victim Effect. The Science of Giving: Experimental Approaches to the Study of Charity. Psychology Press. 133–145.
[72]
Kogut, T. and Ritov, I. 2011. The Identifiable Victim Effect. The Science of Giving: Experimental Approaches to the Study of Charity. Psychology. 133–145.
[73]
Kratochwill, T.R. et al. 2009. Families and Schools Together: An Experimental Study of Multi-Family Support Groups for Children at Risk. Journal of School Psychology. 47, 4 (2009), 245–265. DOI:https://doi.org/10.1016/j.jsp.2009.03.001.
[74]
Kraut, R. et al. 1998. Internet Paradox: A Social Technology That Reduces Social Involvement and Psychological Well-Being? American Psychologist. 53, 9 (1998), 1017–1031. DOI:https://doi.org/10.1037/0003-066X.53.9.1017.
[75]
Kraut, R. et al. 2002. Internet Paradox Revisited. Journal of Social Issues. 58, 1 (2002), 49–74. DOI:https://doi.org/10.1111/1540-4560.00248.
[76]
Kuss, D.J. and Griffiths, M.D. 2011. Online Social Networking and Addiction—A Review of the Psychological Literature. International Journal of Environmental Research and Public Health. 8, 9 (2011), 3528–3552. DOI:https://doi.org/10.3390/ijerph8093528.
[77]
LaRose, R. et al. 2014. Connection Overload? A Cross Cultural Study of the Consequences of Social Media Connection. Information Systems Management. 31, 1 (2014), 59–73. DOI:https://doi.org/10.1080/10580530.2014.854097.
[78]
Lau, W.F. 2017. Effects of Social Media Usage and Social Media Multitasking on the Academic Performance of University Students. Computers in Human Behavior. 68, March (2017), 286–291. DOI:https://doi.org/10.1016/j.chb.2016.11.043.
[79]
Leadbetter, J. 1999. Applying Psychology in the Classroom. David Fulton.
[80]
Leadbetter, J. 1999. Applying Psychology in the Classroom. David Fulton.
[81]
Lebek, B. et al. 2014. Information Security Awareness and Behavior: A Theory-Based Literature Review. Management Research Review. 37, 12 (2014), 1049–1092. DOI:https://doi.org/10.1108/MRR-04-2013-0085.
[82]
Lopez-Moreno, J. et al. 2010. Measuring the Perception of Light Inconsistencies. Proceedings of the 7th Symposium on Applied Perception in Graphics and Visualization - APGV ’10 (2010).
[83]
Mamassian, P. 2008. Ambiguities and Conventions in the Perception of Visual Art. Vision Research. 48, 20 (2008), 2143–2153. DOI:https://doi.org/10.1016/j.visres.2008.06.010.
[84]
Mamassian, P. 2004. Impossible Shadows and the Shadow Correspondence Problem. Perception. 33, 11 (2004), 1279–1290. DOI:https://doi.org/10.1068/p5280.
[85]
Mamassian, P. et al. 1998. The Perception of Cast Shadows. Trends in Cognitive Sciences. 2, 8 (1998), 288–295. DOI:https://doi.org/10.1016/S1364-6613(98)01204-2.
[86]
McKenna, K.Y.A. et al. 2001. Demarginalizing the Sexual Self. Journal of Sex Research. 38, 4 (2001), 302–311. DOI:https://doi.org/10.1080/00224490109552101.
[87]
Meisel, S.F. et al. 2013. Population-Based, Risk-Stratified Genetic Testing for Ovarian Cancer Risk: A Focus Group Study. Public Health Genomics. 16, (2013), 184–191.
[88]
Mesoudi, A. et al. 2016. The Evolution of Individual and Cultural Variation in Social Learning. Trends in Ecology & Evolution. 31, 3 (2016), 215–225. DOI:https://doi.org/10.1016/j.tree.2015.12.012.
[89]
Misra, S. and Stokols, D. 2012. Psychological and Health Outcomes of Perceived Information Overload. Environment and Behavior. 44, 6 (2012), 737–759. DOI:https://doi.org/10.1177/0013916511404408.
[90]
Muthukrishna, M. et al. 2016. The When and Who of Social Learning and Conformist Transmission. Evolution and Human Behavior. 37, 1 (2016), 10–20. DOI:https://doi.org/10.1016/j.evolhumbehav.2015.05.004.
[91]
Neshat Doost, H.T. et al. 2014. Reduced Autobiographical Memory Specificity in Bereaved Afghan Adolescents. Memory. 22, 6 (2014), 700–709. DOI:https://doi.org/10.1080/09658211.2013.817590.
[92]
Nightingale, S.J. et al. 2017. Can People Identify Original and Manipulated Photos of Real-World Scenes? Cognitive Research: Principles and Implications. 2, 1 (2017), 1–21. DOI:https://doi.org/10.1186/s41235-017-0067-2.
[93]
Nyborg, K. et al. 2016. Social Norms as Solutions. Science. 354, 6308 (2016), 42–43. DOI:https://doi.org/10.1126/science.aaf8317.
[94]
O’Brien, J.F. and Farid, H. 2012. Exposing Photo Manipulation With Inconsistent Reflections. ACM Transactions on Graphics. 31, 1 (2012), 1–11. DOI:https://doi.org/10.1145/2077341.2077345.
[95]
Oppenheimer, D. and Olivola, C.Y. 2011. The Science of Giving: Experimental Approaches to the Study of Charity. Psychology.
[96]
Oppenheimer, D.M. and Olivola, C.Y. 2011. The Science of Giving: Experimental Approaches to the Study of Charity. Psychology Press.
[97]
Ostrovsky, Y. et al. 2005. Perceiving Illumination Inconsistencies in Scenes. Perception. 34, 11 (2005), 1301–1314. DOI:https://doi.org/10.1068/p5418.
[98]
Paul, J.A. et al. 2012. Effect of Online Social Networking on Student Academic Performance. Computers in Human Behavior. 28, 6 (2012), 2117–2127. DOI:https://doi.org/10.1016/j.chb.2012.06.016.
[99]
Pollet, T.V. et al. 2011. Use of Social Network Sites and Instant Messaging Does Not Lead to Increased Offline Social Network Size, or to Emotionally Closer Relationships With Offline Network Members. Cyberpsychology, Behavior, and Social Networking. 14, 4 (2011), 253–258. DOI:https://doi.org/10.1089/cyber.2010.0161.
[100]
Porter, G. 2010. What Makes Cast Shadows Hard to See? Journal of Vision. 10, 3 (2010), 1–18. DOI:https://doi.org/10.1167/10.3.13.
[101]
Pyszczynski, T. et al. 1999. A Dual-Process Model of Defense Against Conscious and Unconscious Death-Related Thoughts: An Extension of Terror Management Theory. Psychological Review. 106, 4 (1999), 835–845. DOI:https://doi.org/10.1037/0033-295X.106.4.835.
[102]
Pyszczynski, T. et al. 2015. Thirty Years of Terror Management Theory. Advances in Experimental Social Psychology: Volume 52. Academic Press, an imprint of Elsevier. 1–70.
[103]
Pyszczynski, T. and Kesebir, P. 2011. Anxiety Buffer Disruption Theory: A Terror Management Account of Posttraumatic Stress Disorder. Anxiety, Stress & Coping. 24, 1 (2011), 3–26. DOI:https://doi.org/10.1080/10615806.2010.517524.
[104]
Rahman, B. et al. 2015. Population-Based Genetic Risk Prediction and Stratification for Ovarian Cancer: Views From Women at High Risk. Familial Cancer. 14, 1 (2015), 135–144. DOI:https://doi.org/10.1007/s10689-014-9769-5.
[105]
Rensink, R.A. and Cavanagh, P. 2004. The Influence of Cast Shadows on Visual Search. Perception. 33, 11 (2004), 1339–1358. DOI:https://doi.org/10.1068/p5322.
[106]
Sanders, M.R. et al. 2007. Maintenance of Treatment Gains: A Comparison of Enhanced, Standard, and Self-directed Triple P-Positive Parenting Program. Journal of Abnormal Child Psychology. 35, 6 (2007), 983–998. DOI:https://doi.org/10.1007/s10802-007-9148-x.
[107]
Sanderson, S.C. et al. 2004. Public Interest in Genetic Testing for Susceptibility to Heart Disease and Cancer: A Population-Based Survey in the UK. Preventive Medicine. 39, 3 (2004), 458–464. DOI:https://doi.org/10.1016/j.ypmed.2004.04.051.
[108]
Sanderson, S.C. et al. 2005. The Effects of a Genetic Information Leaflet on Public Attitudes Towards Genetic Testing. Public Understanding of Science. 14, 2 (2005), 213–224. DOI:https://doi.org/10.1177/0963662505050993.
[109]
Sareen, P. et al. 2015. Through the Looking-Glass: Objects in the Mirror Are Less Real. Psychonomic Bulletin & Review. 22, 4 (2015), 980–986. DOI:https://doi.org/10.3758/s13423-014-0761-8.
[110]
Sekhon, M. et al. 2017. Acceptability of Healthcare Interventions: An Overview of Reviews and Development of a Theoretical Framework. BMC Health Services Research. 17, 1 (2017). DOI:https://doi.org/10.1186/s12913-017-2031-8.
[111]
Siponen, M. and Vance, A. 2010. Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations. MIS Quarterly. 34, 3 (2010), 487–502. DOI:https://doi.org/10.2307/25750688.
[112]
Slovic, P. 2007. If I Look at the Mass I Will Never Act [open access]. Judgment and Decision Making. 2, (2007), 79–95.
[113]
Solity, J. 2008. The Learning Revolution: Michel Thomas Method. Hodder Education.
[114]
Sommestad, T. et al. 2014. Variables Influencing Information Security Policy Compliance. Information Management & Computer Security. 22, 1 (2014), 42–75. DOI:https://doi.org/10.1108/IMCS-08-2012-0045.
[115]
Song, H. et al. 2014. Does Facebook Make You Lonely?: A Meta Analysis. Computers in Human Behavior. 36, July (2014), 446–452. DOI:https://doi.org/10.1016/j.chb.2014.04.011.
[116]
Sparrow, B. et al. 2011. Google Effects on Memory: Cognitive Consequences of Having Information at Our Fingertips. Science. 333, 6043 (2011), 776–778. DOI:https://doi.org/10.1126/science.1207745.
[117]
Strachan, E. et al. 2007. Terror Mismanagement: Evidence That Mortality Salience Exacerbates Phobic and Compulsive Behaviors. Personality and Social Psychology Bulletin. 33, 8 (2007), 1137–1151. DOI:https://doi.org/10.1177/0146167207303018.
[118]
Suler, J. 2004. The Online Disinhibition Effect. CyberPsychology & Behavior. 7, 3 (2004), 321–326. DOI:https://doi.org/10.1089/1094931041291295.
[119]
Tan, M. et al. 2015. The Perception of Lighting Inconsistencies in Composite Outdoor Scenes. ACM Transactions on Applied Perception. 12, 4 (2015), 1–18. DOI:https://doi.org/10.1145/2810038.
[120]
Thompson, C. 2014. Smarter Than You Think: How Technology Is Changing Our Minds for the Better. William Collins.
[121]
Turkle, S. 2012. Alone Together: Why We Expect More From Technology and Less From Each Other. Basic Books.
[122]
Twamley, K. et al. 2009. Recruiting UK-Born Ethnic Minority Women for Qualitative Health Research–lessons Learned From a Study of Maternity Care. Research, Policy and Planning. 27, (2009), 25–38.
[123]
Valkenburg, P.M. and Peter, J. 2008. Adolescents’ Identity Experiments on the Internet: Consequences for Social Competence and Self-Concept Unity. Communication Research. 35, 2 (2008), 208–231. DOI:https://doi.org/10.1177/0093650207313164.
[124]
Valkenburg, P.M. and Peter, J. 2009. Social Consequences of the Internet for Adolescents. Current Directions in Psychological Science. 18, 1 (2009), 1–5. DOI:https://doi.org/10.1111/j.1467-8721.2009.01595.x.
[125]
Vermeulen, E. et al. 2014. Public Attitudes Towards Preventive Genomics and Personal Interest in Genetic Testing to Prevent Disease: A Survey Study. The European Journal of Public Health. 24, 5 (2014), 768–775. DOI:https://doi.org/10.1093/eurpub/ckt143.
[126]
Verplanken, B. and Holland, R.W. 2002. Motivated Decision Making: Effects of Activation and Self-Centrality of Values on Choices and Behavior. Journal of Personality and Social Psychology. 82, 3 (2002), 434–447. DOI:https://doi.org/10.1037/0022-3514.82.3.434.
[127]
Vishwanath, A. et al. 2011. Why Do People Get Phished? Testing Individual Differences in Phishing Vulnerability Within an Integrated, Information Processing Model. Decision Support Systems. 51, 3 (2011), 576–586. DOI:https://doi.org/10.1016/j.dss.2011.03.002.
[128]
Vogt, S. et al. 2016. Changing Cultural Attitudes Towards Female Genital Cutting. Nature. 538, 7626 (2016), 506–509. DOI:https://doi.org/10.1038/nature20100.
[129]
Wagner, P. 2000. Consultation: Developing a Comprehensive Approach to Service Delivery. Educational Psychology in Practice. 16, 1 (2000), 9–18. DOI:https://doi.org/10.1080/026673600115229.
[130]
Wilcox, K. and Stephen, A.T. 2013. Are Close Friends the Enemy? Online Social Networks, Self-Esteem, and Self-Control. Journal of Consumer Research. 40, 1 (2013), 90–103. DOI:https://doi.org/10.1086/668794.
[131]
Woolfolk, A. 2014. Educational Psychology. Pearson Education Limited.
[132]
Woolfolk, A. 2014. Educational Psychology.
[133]
Zagefka, H. et al. 2011. Donating to Disaster Victims: Responses to Natural and Humanly Caused Events. European Journal of Social Psychology. 41, 3 (2011), 353–363. DOI:https://doi.org/10.1002/ejsp.781.
[134]
Zagefka, H. et al. 2013. Familiarity Breeds Compassion: Knowledge of Disaster Areas and Willingness to Donate Money to Disaster Victims. Applied Psychology. 62, 4 (2013), 640–654. DOI:https://doi.org/10.1111/j.1464-0597.2012.00501.x.
[135]
Zaragoza Scherman, A. et al. 2015. Event Centrality of Positive and Negative Autobiographical Memories to Identity and Life Story Across Cultures. Memory. 23, 8 (2015), 1152–1171. DOI:https://doi.org/10.1080/09658211.2014.962997.
[136]
Zhao, S. et al. 2008. Identity Construction on Facebook: Digital Empowerment in Anchored Relationships. Computers in Human Behavior. 24, 5 (2008), 1816–1836. DOI:https://doi.org/10.1016/j.chb.2008.02.012.