Zheng Yan's research while affiliated with Albany State University and other places

Publications (48)

Article
Full-text available
In cybersecurity practice, two methodological challenges exist, that is, how to improve validity and reliability of cybersecurity assessment as a weak hypothesis and how to assess and mitigate cybersecurity risks among the K-12 school population as the weakest link. To address these two challenges, the present study aimed to verify the validity and...
Article
Finding leading scholars in a field effectively and efficiently is important and challenging in the science of science research. The present study focused on a specific field of mobile phone behavior as a prototypical case to demonstrate at a microscopic level the real-world complexity of how to find leading scholars in a newly emerging and highly...
Article
How children's understanding of emerging technologies originates is a critical, fundamental, and challenging research question. Placing this question in the history of human evolution and technology development, the present article uses a newly designed literature review method, focused rapid review, to synthesize three fields of research, developm...
Article
K-12 students and teachers are a vulnerable population for cybersecurity risks. Identifying both risk factors and protective factors associated with intuitive and rational judgment of cybersecurity risks would help them develop strategies to tackle cyber risks. A total of 2703 K-12 students and teachers from 45 GenCyber Summer Camps participated in...
Article
The relationship between humans and digital technologies has been documented extensively in the past decades, but has yet to be reviewed through the lens of the current global pandemic crisis. This review synthesizes the rapidly growing literature on digital technology use during the current COVID‐19 pandemic. It addresses the following four topics...
Article
How modern humans behave with digital technologies? This is a basic science question that is both important and complex. To answer this question with a top‐down approach, this article outlines a basic model with four elements and three pathways. As demonstrated in the discussion of five theoretical and empirical research examples, the basic model o...
Article
The COVID‐19 pandemic is currently spreading across the world in an unprecedented way. “Social distancing” has become the latest buzzword in the headlines of media covering the COVID‐19 pandemic As a result, the widely implemented social distancing measures has generated one unprecedented shift that pushes various types of human social interactions...
Article
Information and Communication Technologies (ICTs) are nowadays an interactive means through which humans respond to potentially stressful extreme events (e.g., natural or technological disasters). Despite growing research and reviews on ICTs' role, these often follow an event-specific approach, describing how or what people respond without explaini...
Article
Full-text available
After nearly 3 years of preparation and development, we are now providing, to our readers, the inaugural issue of the newly lunched journal by Wiley, Human Behavior and Emerging Technologies. We thank Wiley's journal development team, the Advisory Board members, the Editorial Board members, and all our colleagues across the world involved in the de...
Chapter
This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research i...
Chapter
This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research i...
Chapter
This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research i...
Data
Articles data file for the systematic review article: ICTs data collection for investigating human coping and resilience during potentially stressful extreme events. PROSPERO 2016:CRD42016042455 http://www.crd.york.ac.uk/PROSPERO/display_record.php?ID=CRD42016042455
Article
It has been widely recognized in the psychology of cybersecurity literature that ordinary users rather than technology systems are the weakest link in cybersecurity. The present study focused on assessing the cybersecurity judgment of 462 college students as a specific group of ordinary users in order to further identify specific weakest links of t...
Chapter
The Internet is a complex artifact system that reflects both technical and social complexity. In this context, technical complexity reflects that the Internet connects millions of computers and billions of users; social complexity reflects both the positive and negative social effects of the Internet (e.g., allowing people to easily communicate wit...
Article
This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research i...
Article
This article addresses why children's use of mobile phones is an unparalleled complex developmental phenomenon in hopes of providing a broad context for this special section. It first outlines mobile phones as a sophisticated personalized and multifunction technology. Then it presents mobile phone use by children as an unparalleled complex developm...
Article
Full-text available
Earthquake survivors are a diverse population. This study focused on a special group of earthquake survivors, who had still stayed in temporary housing camps for about 2 years after China's Wenchuan Earthquake rather than those who moved back to rebuild their lives or immigrated to large cities to seek new lives. The research goals were to (1) asse...
Article
Mobile phone multitasking is widely considered to be a major source of distraction in academic performance. This paper attempts to review the emerging literature by focusing on three questions concerning the influence of mobile phone multitasking on academic performance: (a) How does mobile phone multitasking impair learning? (b) Why does mobile ph...
Article
Full-text available
This study evaluated the mediating role of interpersonal problems in the link between mobile phone addiction levels and negative emotions among mobile phone addicts and possible-mobile phone addicts respectively. The purpose of this study was to address two gaps in research. First, previous research has revealed that a positive association existed...
Article
Full-text available
Number of studies have investigated the relationship between personality and web use behaviors on Social Network Sites (SNS), and the measurement of web use behaviors relies on self-report technique. In this study, the authors investigated the correlation between self-report and web-log measures of web use behaviors, and further examined which one...
Article
Cell phones are becoming the most ubiquitous technology. Researchers in various other disciplines in behavioral sciences have been extensively examining how people use cell phones and what influences cell phone use have on people’s lives for more than 20 years. This review paper provides an overall picture of the science of cell phone use by sketch...
Article
Extensive research reported that only children ("Onlies") have different daily behavior from children with siblings ("Others") in the real world. However, little is known about whether Onlies and Others behave differently in the cyber world, especially on the social network. A pilot study has been conducted to compare the behaviors of Onlies and Ot...
Article
Much research has been conducted to investigate personality and daily behavior of these only children ('Onlies') due to the Chinese one-child-per-family policy, and report the singleton generation to be more selfish. As Microblog becomes increasingly popular recently in China, we studied cyber behavior of Onlies and children with siblings ('Others'...
Article
Unlabelled: The present study examined whether children and adolescents can correctly report dry eyes and blurred distance vision, two visual problems associated with computer vision syndrome. Participants are 913 children and adolescents aged 6-17. They were asked to report their visual problems, including dry eyes and blurred distance vision, an...
Article
Full-text available
Background 20 million migrant workers in China lost their jobs during the economic crisis of 2008. Both urban migration and unemployment have long been documented to be associated with vulnerability to mental problems. This study aims to examine the mental health of unemployed migrant workers in Eastern China and its relation to duration of unemplo...
Article
Initial knowledge of professionalism among medical students is particularly important for designing effective professionalism curricula and for studying the change in the knowledge of professionalism. The study examined first-semester medical students' initial knowledge of important attributes of good doctors. Mixed methods were used to examine ini...
Article
The lower response rate in web surveys has been a major concern for survey researchers. The literature has sought to identify a wide variety of factors that affect response rates in web surveys. In this article, we developed a conceptual model of the web survey process and use the model to systematically review a wide variety of factors influencing...
Article
The Children's Internet Protection Act (CIPA; 2000) requires an Internet filtering and public awareness strategy to protect children under 17 from harmful visual Internet depictions. This study compared high school students who went online with the CIPA restriction and college students who went online without the restriction in order to investigate...
Article
The Internet is a highly complex and newly emerged artifact. Building upon and going beyond two previous studies [Yan, Z. (2005). Age differences in children's understanding of complexity of the Internet. Journal of Applied Developmental Psychology, 26, 385–396.; Yan, Z. (2006). What influences children's and adolescents' understanding of the compl...
Article
Full-text available
Though the Children's Internet Protection Act (CIPA) established requirements for both public libraries and public schools to adopt filters on all of their computers when they receive certain federal funding, it has not attracted a great amount of research into the effects on libraries and schools and the users of these social institutions. This pa...
Article
The present paper is intended to introduce behavioral researchers to Computer Vision Syndrome (CVS), a widely spreading but largely unknown epidemic among professional and ordinary computer users, and to call for behavioral research programs to help computer users address this visual epidemic. Beginning with three clinical cases, the paper analyzes...
Article
Three fifth grade highly aggressive students participated in a study examining effects of an aggression intervention game. Using single-subject multiple baseline research design, the effect of the game was measured across three domains: attribution of peer intent (cognitive), emotional response (affective) and behavior response (behavioral). The re...
Article
An important but challenging task is to understand microdevelopmental varia- tions in learning and developmental processes—how patterns of performance change over short time periods with growing skill and knowledge or with failure to learn. This study analyzed microdevelopmental variations in learning a basic computing skill. Based on 119 microdeve...
Article
This study aimed at analyzing complex relationships among Internet use, Internet users, and conceptual understanding of the Internet. It used path models to examine factors related to Internet use (duration of Internet use, frequency of Internet use, and informal Internet classes) and Internet users (age and gender) in affecting understanding of th...
Article
Students’ previous computer experience has been widely considered an important factor affecting subsequent computer performance. However, little research has been done to examine the contributions of different types of computer experience to computer performance at different time points. The present study compared the effects of four types of compu...
Article
This study examined differences in understanding the technical and social complexity of the Internet across four age groups, 5–8-year-olds, 9–10-year-olds, 11–12-year-olds, and adults. The major findings indicated overall age differences in understanding across the four groups, particularly between 9–10- and 11–12-year-olds, and fewer differences b...
Article
How do children and adults learn to use computers? What developmental processes are involved in learning to use computers? This chapter reviews current understanding of these issues and presents empirical studies demonstrating how to advance that understanding.
Article
In this article, we present our views of the psychology of E-learning as a field of study that is important, interdisciplinary, emerging, and promising. We first define E-learning as the third learning system in the history of human learning, specify two major E-learning practices in education and corpora-tions, and indicate the importance of psych...
Article
People’s activities vary dynamically from moment to moment, and analysis of level of skill complexity in successive activities provides a tool to portray and analyze variation as skills are learned. Systematic examination of these variations is crucial for illuminating the dynamic nature of learning and development – the ways that people construct...
Conference Paper
It is important but challenging to study human cognitive microdevelopment, a developmental process that changes over minutes or hours. This study piloted a dynamic systems approach to describing and explaining students' microdevelopment in learning a computer program. Based on intensive observation of 30 students learning processes, we used both ty...

Citations

... However, complex artifacts have become far more common, and far more complicated, in recent years (Arbesman, 2016;Yan, 2021). Objects that only existed in the realm of fiction as of a few decades ago, such as smartphones, are widely used by adults and children today (Danovitch & Severson, 2021). ...
... Cybercrime directed at children can result in financial (Chalk, 2022) and social emotional (Perez, 2018) consequences and such crimes have increased during the pandemic as youth spend more time learning, playing, and socializing online (FBI, 2020;Jargon, 2020). Children frequently exhibit poor cybersecurity judgement (Yan et al., 2021) and an inability to discuss strategies to keep themselves safe online (Macaulay et al., 2020), which increases their vulnerability to cyberattacks. Simultaneously, the U.S. is facing a severe shortage of cybersecurity professionals (Cyber-Seek, 2021) and the cybersecurity field suffers from a lack of diversity (U.S. Bureau of Labor Statistics, 2021). ...
... Once digital economy has been created, it introduces a new world of business and "technology-related behavior in the global crisis" [1]. Digital money leads to a financial makeover with a variety of brand new perspectives [2]. ...
... ©2022 AELS, INDIA Effective use of DL techniques at once leads the entire healthcare industry towards a more accurate predictive analysis that can mitigate the death rate by 41% more in the upcoming years [11]. The growing implementations of DL learning during the years 2019-2021, aided healthcare practitioners to recover 52.83% of the pandemic loss more efficiently [12]. With the growing cases of Corona, physicians feel a need to conduct more innovation, development, and improvement in the application procedures of deep learning in the recent era (Fig. 3). ...
... Moreover, it has social concerns about young people not seeking regular careers that provide a livelihood. It also reaccentuates that game boosters are inconsistent and have unprincipled integrity due to searching for jobs that make them popular or even famous [58][59][60]78]. Consequently, game providers should facilitate the game players who run social network games by ensuring the games are controlled by requiring continuous personal identification checks. ...
... However, the reality is that, when it comes to online teaching and learning, the majority of Malaysia's private and public universities are underprepared (The Star, 2020). In addition, there are very few studies that seek to investigate the impact of Covid-19 on the educational system (Bao, 2020;Sintema, 2020;Yan, 2020). Students are facing difficulties while experiencing online learning and assessments. ...
... The use of social media increases in global emergencies, such as floods, earthquakes, hurricanes, and tsunamis (Gaspar et al., 2019;Li et al., 2019;Reuter et al., 2017). There is evidence that people pay more attention to rumors in an unprecedented situation (Barua et al., 2020;Pennycook et al., 2020). ...
... As a dimension of entrepreneurship orientation [88], the innovativeness is recognized as fundamental attribute for entrepreneurial action [89]. In the present context, the innovativeness relates to how quickly a SME owner/entrepreneur accepts technological innovation compared to others in the same sociocultural environment [75,90]. ...
... A famous quote is that "humans are the weakest link in cybersecurity" [9]. Cryptocurrency holders will inevitably use social networks for a myriad of scenarios where they need to post their public addresses. ...
... For example, the execution of block chain innovation based systems through which health care suppliers, payers, and patients could share information on a decentralized network that are hard to breach. [93] (3) The extreme objective of cyber security ought to be to fortify resilience. Resilience healthcare systems will find reasonable ways to work on their security and safeguard their organizations and won't rely entirely upon cyber security insurance. ...