Cyber psychology Research Methodologies

CYBER PSYCHOLOGY RESEARCH METHODOLOGIES 6

Cyberpsychology Research Methodologies

Articlesanalysis

Thestudy has selected two articles labeled as article 1 and 2 as shownbelow. The articles relate to the chosen topic (cybertherapy) whichis in the field of cyberpsychology

Article1: Cybertherapy: A Mixed Methods Study of Online Emotional Support

Datacollection approach

Thearticle used quantitative quasi-experimental research approach.

Datacollection methods

Thearticle utilized case study quantitative data collection method.Participants involved in the study were nine mental health providers,online therapist, children, persons working online, and childrenfocus groups (Callahan, &amp Inckle, 2012).

Howparticipants were selected?

Theparticipants in the study were online conversations. The participantswere selected via online using simple random sampling technique sothat each participant could have an equal chance of inclusion in thestudy (Callahan, &amp Inckle, 2012).

Apparatusused

Theapparatus for data collection used were a database and a computerprogram. The database was used to record Ireland children hiplineconversation and describing their online interactions. A computerprogram was utilized in selecting 57,866 online random conversationsand analyzing the data. Inferential and descriptive measures wereused so that a difference between online and telephone interactioncould be determined (Callahan, &amp Inckle, 2012).

Strengthand weakness of the methodology

Someof the strength of the methodology used is that all the participantswere given equal chances of being included in the study. Besides, theuse of database and computer programs to gather and analyze the datawas another source of strength because of the high level of accuracy.On the other hand, some of the weakness is that online interviews maynot be able fully to capture the emotions and attention of theparticipants and hence some valuable information may not be obtained(Callahan, &amp Inckle, 2012).

Rageof currently unsolved issues in Cyberpsychology

Therange of unsolved issue in Cyberpsychology include whetherCybertherapy should be provided to the patients s and at what extentshould it provided among other issues.

QUESTIONSANSWERED IN THIS ARTICLE

Whatissue or problem that needs more research?

Theproblem in an article that needs more research is whether onlinesupport/Cybertherapy is important to the patients. However, moreresearch remains to be done to substantiate the argument whether suchsupport is therapeutically useful.

Howdoes the issue relate to a job or career field?

The manner in which the issue in this topic (Cybertherapy) relates tothe career field chosen (Cyberpsychology) is that it employs internetand technology to offer therapeutically support to the patientlocated in different locations, which are part of cyberpsychology.

Whatwas the research question?

Isthere a difference between the manner in which customers/patientsutilize online methods of mental assistance from face to face ortelephone support? The second research question is what are theadvantages and disadvantages of employing technological supports?Finally, what hinders providers of mental support to give theirsupport using mobile and online technology? (Callahan, &amp Inckle,2012).

Howdata was collected?

Quantitativedata collection methods were to record online response regardingCybertherapy support provided. The data of reply was collated andrecorded using computer database.

Dataanalysis

Thecollected data was analyzed using computer programs, which helped tocome up with important finding on this research (Callahan, &ampInckle, 2012).

Author`sconclusions

Theauthor concluded that online therapy for people suffering mentalhealth is important and should be given more emphasize because itgives clients some degree of confidentiality allowing them todisclose some emotional problems affecting them that otherwise couldnot have been disclosed using face to face interview or eventelephone interview. Hence, the research was important because ithelps to show how online cyber therapy may help to identify mentalhealth problems and solve them (Callahan, &amp Inckle, 2012).

Doesit summarize the relevant material?

Thearticle summarizes all the relevant materials by showing clearing whyCybertherapy is important. Besides, it uses many information sourcesand includes them in the research.

Doesit clarify why this research is important?

Thearticle clarifies that this research is important because it willform a fundamental basis for further studies. It also indicates thatcyber therapy should be provided because some patient may not be in aposition to adequately express their emotion using direct means ofcommunication (Callahan, &amp Inckle, 2012).

Sample

Isthe sample appropriate for the study?

Thesample was appropriate for the study because it comprised of 30% ofthe population under investigation, which according to Mugend andMugenda 2003, such a sample is adequate to come up with finding andvalid conclusions (Callahan, &amp Inckle, 2012).

Isthe sample size sufficient for the research?

A sample of nine mental therapists working online in Ireland wasselected using various search engines. The sample was supplementedusing a sample of other participants such as counselors, therapistand online focus-grouped for children. Such sample is sufficient forresearch because it formed 30% of the target population (Callahan, &ampInckle, 2012).

Instruments

Arethe instruments or measures appropriate for the study?

Theinstruments used were a database, the Internet, telephones, andcomputer programs. Such devices were suitable for the study becausethe study was conducted online (Callahan, &amp Inckle, 2012).

EthicalConsiderations

Doesthe study pose any risks to the participants? If so, what are they?

Thestudy does not pose any risk to the participants because high ethicalconsideration was put in place when carrying out the research toensure that participants remain anonymous (Callahan, &amp Inckle,2012).

Haveall reasonable steps been taken to protect the rights of theparticipants?

Allreasonable steps were put in place to protect participant’s right.For instance, Particular non-gender Pseudonyms was used to protectthe gender and identity of the participants from the third parties.Secondly, informed consent from the participants was obtained priordata mining. The participants were also given an informed consent andgiven a chance to read and ask questions prior signing the forms.Besides, they were assured that any information provided would betreated with utmost confidentiality (Callahan, &amp Inckle, 2012).

Dothe benefits outweigh any risks to participants?

Thebenefits of carrying out this study outweigh the risk to theparticipants because the study provided a fundamental basis forfurther research. It also showed the importance of Cyberpsychology inproviding mental support to the patient who may not be in a positionto access health facility due to geographical barriers (Callahan, &ampInckle, 2012).

Conclusion

Dothe conclusions logically follow the research questions ormethodology?

Theconclusion follows the research question because after conducting theresearch the conclusion was made based on the data analysis’sfindings, which vividly answer the research questions (Callahan, &ampInckle, 2012).

Doesthis study make a significant contribution to the field?

Thestudy makes significant contribution to the field Cyberpsychology inthe sense that it shows the benefits that society can obtain bygiving Cybertherapy an opportunity to prevail (Callahan, &ampInckle, 2012).

Article2: Cybertherapy Treatment Efficacy Validation

Researchapproach

Theresearch utilized quantitative case study

Datacollection methods

Datacollection methods were most vital data relating to the topic wascollected from the previous research work done and stored in thelibraries (Spagnolli, Bracken, &amp Orso, 2014).

Howparticipants were selected?

Theparticipants were general public. The participants were selectedrandomly from the two stated libraries using simple systematicsampling technique (Spagnolli, Bracken, &amp Orso, 2014).

Apparatusused

Thetwo scientific libraries were used as apparatus for data collectionusing computers. In addition, Questionnaires were used as apparatusfor data collection they were distributed to the onlineparticipants. The two libraries used for data collection include ACMdigital and PsycINFO library.

Strengthand weakness of the methodology

Thestrength of the methodology used is that the study employed credibleresearch materials both online and from the stated libraries. On theother hand, the weakness of the methodology is that it failed tocarry out Cochrane search, which was vital for this study. Also, thestudy included an online search for 2011 and failed to conduct anadequate search for the recent periods (Spagnolli, Bracken, &ampOrso, 2014).

Rageof currently unsolved issues in Cyberpsychology

Basedon this article there are range of unsolved issues in Cyberpsychologysuch as existence of necessary validation to support cyber therapy

QUESTIONSANSWERED IN THIS ARTICLE

Whatissue or problem that needs more research?

Inthis article, the study tries to investigate the presence of cybertherapy in offering psychological support and whether such existenceis relevant for validation

Howdoes the issue relate to a job or career field?

Theissue relates to the career field I have chosen in the sense thatCyberpsychology and validation of psychological support employtechnology and the internet to help patients who may not be able tovisit hospital facility due to their health conditions.

Whatwas the research question?

Inwhat ways in users sense the presence of cybertherapy and if suchpresence is relevant for intervention and validation? (Spagnolli,Bracken, &amp Orso, 2014).

Howdata was collected?

Thestudy utilized qualitative data collection techniques where theresearcher used a computer to gather data from the libraries andonline questionnaires.

Dataanalysis

Thedata collected was analyzed quantitatively, and results obtained wereinterpreted. The online search was also used whereby, the studyutilized queries to filter out irrelevant information (Spagnolli,Bracken, &amp Orso, 2014).

Author`sconclusions

Basedon the findings the author concluded that there is a need to come upwith a checklist whenever executing a validation study for thepurpose of improving the manner in which Cybertherapy is conducted(Spagnolli, Bracken, &amp Orso, 2014).

Doesit summarize the relevant material?

Theresearch had summarized all the relevant materials including librarysources that are pertinent to the topic. However, more informationcould be obtained using primary methods of data collection such asinterviews (Spagnolli, Bracken, &amp Orso, 2014).

Doesit clarify why this research is important?

Thestudy has clarified that the research is important because it helpsto identify the relevance of validating cyber psychology support.

Sample

Isthe sample appropriate for the study?

Thesample involved of the 41 research materials obtained from thelibrary was appropriate because it meets the required threshold of30% as stipulated by researchers. Such threshold allows a proper testof significance and validation of the findings (Spagnolli, Bracken, &ampOrso, 2014).

Isthe sample size sufficient for the research?

Thesample selected was sufficient for research because it formed thirtypercent of the targeted population which was sufficient enough forthe purposing of coming up with the significant findings (Spagnolli,Bracken, &amp Orso, 2014).

Instruments

Arethe instruments or measures appropriate for the study?

Thetools used include computers and online questionnaires such tool wasappropriate because the study was based on secondary methods of datacollection.

EthicalConsiderations

Someof the ethical consideration that was taken into account whencollecting data was ensuring that the materials used were credible,valid and all sources used were cited, and authors acknowledge fortheir valuable contribution. The issue of anonymity was also observedto protect the confidentiality of the participants (Spagnolli,Bracken, &amp Orso, 2014).

Doesthe study pose any risks to the participants? If so, what are they?

Thestudy does not pose any risk to the participants because it was basedon secondary data. Besides, research ethics strictly adhered whenconducting the study to protect confidentiality and privacy of theparticipants (Spagnolli, Bracken, &amp Orso, 2014).

Haveall reasonable steps been taken to safeguard the rights of theparticipants?

Allreasonable steps were taken into consideration to protectparticipants’ rights. For instance, all sources used wereacknowledged in the reference section. In addition, the principle ofanonymity was taken into account (Spagnolli, Bracken, &amp Orso,2014).

Dothe benefits outweigh any risks to participants?

Thebenefits of the research outweigh the risk to the participantsbecause the study shows the relevance of validating psychologicalsupport by using cyberpsychology.

Conclusions

Theconclusion made in this research article followed research questionsand methodology because the result of the data was answered to thequestions. Besides, the method used was consistent with the researchtopic making such methods justifiable for this study.

Doesthis study make a significant contribution to the field?

Thestudy makes a vital contribution to the field of cyberpsychologybecause it shed rights on the importance of validating cybertherapy.It also forms the necessary basis for further research to scholars,medics, and academicians (Spagnolli, Bracken, &amp Orso, 2014).

References

Callahan,A., &amp Inckle, K. (2012). Cybertherapy or psychobabble? A mixedmethods study of online emotional support. BritishJournal of Guidance &amp Counseling,40(3),261-278. doi:10.1080/03069885.2012.681768

Spagnolli,A., Bracken, C. C., &amp Orso, V. (2014). The role played by theconcept of presence in validating the efficacy of a cybertherapytreatment: a literature review. VirtualReality,18(1),13-36.