1 / 15

Module Summer A: Cyber-Therapy

Module Summer A: Cyber-Therapy. Presented By : Dr. Andrew Franklin & Prof. Wayne Andrews. General Overview BB. What is cyber-therapy? Who and what does cyber-therapy treat? Psychological Theory: The Health Belief Model Pros and Cons of Cyber-therapy

nickelson
Download Presentation

Module Summer A: Cyber-Therapy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Module Summer A: Cyber-Therapy Presented By: Dr. Andrew Franklin & Prof. Wayne Andrews

  2. General Overview BB • What is cyber-therapy? • Who and what does cyber-therapy treat? • Psychological Theory: The Health Belief Model • Pros and Cons of Cyber-therapy • How to protect yourself if engaging in cyber-therapy • Specified Definitions • What to look for to ensure online safety and privacy? • How to Encrypt a File Using Microsoft Office Programs?

  3. What is Cyber-Therapy? • Therapeutic counseling for emotional issues via the Web. • Utilizes advanced technologies to perform psychological therapy • Therapy may involve a face-to-face encounter with a psychologist through a video conference or an enhanced audio and visual environment • Some examples include skype, text based chat, email, etc.

  4. What is Cyber-Security Continued…BB • Past nine years the U.S. has undergone a massive heath IT change • Paper health records have now been converted to Electronic Health Records or EHR for short. Leave digital footprints • Cyber therapy is one field that has taken advantage of the U.S. technological advances and is growing rapidly. • So widely accepted due to its benefits to patients who need psychological treatments.

  5. Who and what does Cyber-therapy treat? • People who are undergoing adjustment, trauma, job and familial stress, bereavement, and any other psychological problems. They are regular day people like you and I. • Cybertherapy uses technology to create visual as well as auditory stimulus to aid in behavioral treatments. It augments a person’s virtual reality to address his or her fears, phobias, traumas and behavioral issues

  6. Psychological Theory: Health Belief Model • Proposes that a person will engage in a health behavior (in this case, pursuing cybertherapy to improve psychological, emotional, and cognitive health) • Based on a factors such as perceived susceptibility, perceived severity, perceived benefits, perceived barriers, and perceived self-efficacy

  7. Psychological Theory: Health Belief Model BB • This model has been applied to changing unhealthy behaviors such as smoking, overeating, substance use, and alcohol abuse. In the case of the current module, many individuals determine that psychological help is needed based on anxiety and depression related symptoms, and they agree that the symptoms are severe and that some professional help would be beneficial. • As it relates to this module, some individuals may pursue cybertherapy for counseling purposes for a variety of reasons, but they may perceive many barriers (or costs) that prevent them from fully engaging in the process.

  8. Pros of Cyber-therapy • Allows you to receive therapy from wherever you are in the world (home, on the road, school, etc.) If area does not offer face to face therapy • Does not require you to be physically present. No commute to therapists office • Distance may make it easier for people to open up. • Private, less intimidating than traditional therapy. Sometimes may cost less too.

  9. Cons of Cyber-therapy (Cybersecurity) • Danger that private information can quickly become public. • Some individuals lack an internet connection or the means to connect to the world wide web • Some insurance companies limit the type of web-based cybertherapy service (e.g., videoconferencing only in some states) that can be reimbursed. • Legitimacy and authenticity of the therapist. Is the therapist legal or a fraud? Are they genuine or do they have ulterior motives? Can I trust the therapist?

  10. How to protect yourself if engaging in Cyber-Therapy? BB • Use encryption software to scramble info sending over internet • Imperative that you read and sign HIPPA documentation. Rights of patients. • Use a digital signature for electronic documents that uses public key encryption • Public key encryption ensures documents haven’t been altered. Public Key encryption uses two keys: private key and public key

  11. Specified Definitions BB • HIPPA is a list of federal laws whose purpose it is to protect patient privacy • Digital signature is the electronic equivalent of a handwritten signature. • Encryption is the process of converting information or data into a code, especially to prevent unauthorized access • A Private Key (secret key) which only you use (and of course protect with a well-chosen, carefully protected passphrase) and refers to a key used for symmetric encryption • Public Key, which other people use. Public keys are often stored on public key servers. • Example: Let's say that Alice wants to send a message to Bob using PGP (a popular public key encryption system). She encrypts the message with Bob's public key and sends it using her favorite email program. Once the message is encrypted with Bob's public key, only Bob can decrypt the message using his private key.

  12. What To Look For To Ensure Online Safety And Privacy?

  13. What To Look For To Ensure Online Safety And Privacy Continued…. BB • The lowest level of validation, Domain Validation (DV), simply validates ownership of the domain and not the legitimacy of the organization requesting the certificate. In other words, if you bought the domain “amaz0n.com” and requested a certificate for it, you would get the certificate because you own the domain. • To see whether a website is safe to visit, you can check for security info about the site. Chrome will alert you if you can’t visit the site safely or privately. Secure = , View Site or Not Secure = , Not secure or Dangerous=

  14. How to Encrypt a File Using Microsoft Office Programs BB • Open a Microsoft Office program and click Open Other Documents. • Click Browse • Select a file you want to encrypt and click Open. • Click the File tab at the top of the page. • Click "Protect Document" on the left side. • Select Encrypt with Password from the pop-up menu. • Enter a password for the file. .

  15. References • Barak, A., & Grohol, J. M. Current and future trends in internet-supported mental health interventions. Journal of Technology in Human Services, 29, 155-196. • Buchanan, Sam (2002). Commentary: Digital Signatures and Public Key Encryption, Accessed 5/30/2018, http://afongen.com/ • Cicarelli, S. K., & White, J. N. (2015). Psychology, 5th edition. Upper Saddle River, NJ: Pearson. • Hochbaum, G. (1958). Public participation in medical screening programs. (DHEW Publication No. 572, Public Health Service). Washington D. C.: US Government Printing Office. • . • Pfleeger, Charles P., Pfleeger, Shari L. and Margulies, Jonathan (2015). Security in Computing, 5th Edition. Prentice Hall, Massachusetts • Rosenstock, I. M. (1974). Historical origins of the health belief model. Health Education Monographs, 2, 328-335. • Schwartz, Allan (2012). Commentary: The Dangers of Online Therapy, Accessed 5/30/2018, https://www.mentalhelp.net/blogs/the-dangers-of-online-therapy/

More Related