
The Cyber Effect
A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
$0.99/mo for the first 3 months

Buy for $20.25
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Rachel Fulginiti
-
By:
-
Mary Aiken PhD
About this listen
A groundbreaking exploration of how cyberspace is changing the way we think, feel, and behave.
Mary Aiken is the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, criminology, and technology to investigate the intersection where technology and human behavior meet. In this, her first book, Aiken has created a starting point for all future conversations about how the Internet is shaping development and behavior, societal norms and values, children, safety, security, and our perception of the world.
Cyberspace is an environment full of surveillance, but who is looking out for us? The Cyber Effect offers a fascinating and chilling look at a future we can still do something about. Drawing on her own research and extensive experience with law enforcement, Mary Aiken covers a wide range of subjects, from the impact of screens on the developing child to the explosion of teen sexting and the acceleration of compulsive and addictive behaviors online (gaming, shopping, pornography). She examines the escalation of cyberchondria (anxiety produced by self-diagnosing online), cyberstalking, and organized cybercrime in the deep web. Aiken provides surprising statistics and incredible but true case studies of hidden trends that are shaping our culture and raising troubling questions about where the digital revolution is taking us.
The Cyber Effect will upend your assumptions about your online life and forever change the way you think about the technology you, your friends, and your family use. Listeners will gain a new understanding of the rapid change taking shape around us and come away with critical tools to become part of this very necessary conversation.
©2016 Mary Aiken (P)2016 Random House AudioListeners also enjoyed...
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Ultra-Processed People
- Why We Can't Stop Eating Food That Isn't Food
- By: Chris van Tulleken
- Narrated by: Chris van Tulleken, Dr. Xand van Tulleken
- Length: 11 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
How much of our daily caloric intake comes from ingesting substances that, technically speaking, do not meet traditional definitions of “food”? Chances are, if you’re eating something that came wrapped in plastic and contains a funky ingredient you don’t have in your kitchen, it's most likely—almost definitely—ultra-processed food, or UPF.
-
-
ridiculously biased take on data
- By Brit_TV_fan on 11-25-23
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
Cult of the Dead Cow
- How the Original Hacking Supergroup Might Just Save the World
- By: Joseph Menn
- Narrated by: Jonathan Davis
- Length: 8 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.
-
-
Liberal Bias Rife and Unchecked
- By Sam Kopp on 12-18-19
By: Joseph Menn
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Ghost in the Wires
- My Adventures as the World’s Most Wanted Hacker
- By: Kevin Mitnick, William L. Simon
- Narrated by: Ray Porter
- Length: 13 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world’s biggest companies—and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable.
-
-
For a smart guy, Mitnick was an idiot
- By Joshua on 09-17-14
By: Kevin Mitnick, and others
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
Ultra-Processed People
- Why We Can't Stop Eating Food That Isn't Food
- By: Chris van Tulleken
- Narrated by: Chris van Tulleken, Dr. Xand van Tulleken
- Length: 11 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
How much of our daily caloric intake comes from ingesting substances that, technically speaking, do not meet traditional definitions of “food”? Chances are, if you’re eating something that came wrapped in plastic and contains a funky ingredient you don’t have in your kitchen, it's most likely—almost definitely—ultra-processed food, or UPF.
-
-
ridiculously biased take on data
- By Brit_TV_fan on 11-25-23
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
A story that stands the test of time
- By Todd on 08-11-20
By: Cliff Stoll
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- By Ken Vanden branden on 07-23-23
By: Scott J. Shapiro
-
Glow Kids
- How Screen Addiction Is Hijacking Our Kids - and How to Break the Trance
- By: Nicholas Kardaras PhD
- Narrated by: Jonathan Davis
- Length: 11 hrs and 5 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Glow Kids, Dr. Nicholas Kardaras will examine how technology - more specifically, age-inappropriate screen tech, with all of its glowing ubiquity - has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain’s pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis.
-
-
Fear Mongering - a modern day Mazes and Monsters
- By Veronica on 11-03-20
-
The Shallows
- What the Internet Is Doing to Our Brains
- By: Nicholas Carr
- Narrated by: Richard Powers
- Length: 10 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Weaving insights from philosophy, neuroscience, and history into a rich narrative, The Shallows explains how the internet is rerouting our neural pathways, replacing the subtle mind of the book reader with the distracted mind of the screen watcher. A gripping story of human transformation played out against a backdrop of technological upheaval, The Shallows will forever alter the way we think about media and our minds.
-
-
It is not consistant, so it is frustrating.
- By Adam Shields on 08-03-12
By: Nicholas Carr
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
The Man Who Mistook His Wife for a Hat: and Other Clinical Tales
- By: Oliver Sacks
- Narrated by: Jonathan Davis, Oliver Sacks - introduction
- Length: 9 hrs and 33 mins
- Unabridged
-
Overall
-
Performance
-
Story
Oliver Sacks' The Man Who Mistook His Wife for a Hat tells the stories of individuals afflicted with fantastic perceptual and intellectual aberrations: patients who have lost their memories and with them the greater part of their pasts; who are no longer able to recognize people and common objects; who are stricken with violent tics and grimaces or who shout involuntary obscenities; whose limbs have become alien; who have been dismissed as retarded yet are gifted with uncanny artistic or mathematical talents.
-
-
I rarely stop reading a book halfway through...
- By Rusty on 09-04-15
By: Oliver Sacks
-
Just Listen
- Discover the Secret to Getting Through to Absolutely Anyone
- By: Mark Goulston MD
- Narrated by: Arthur Morey
- Length: 7 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
Drawing on his experience as a psychiatrist, business consultant, and coach, author Mark Goulston combines his background with the latest scientific research to help listeners turn the "impossible" and "unreachable" people in their lives into allies, devoted customers, loyal colleagues, and lifetime friends. Just Listen provides simple but powerful techniques listeners can use to really get through to people.
-
-
Meh.
- By AnnMarie on 08-23-21
By: Mark Goulston MD
-
Irresistible
- The Rise of Addictive Technology and the Business of Keeping Us Hooked
- By: Adam Alter
- Narrated by: Adam Alter
- Length: 8 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Welcome to the age of behavioral addiction - an age in which half of the American population is addicted to at least one behavior. We obsess over our emails, Instagram likes, and Facebook feeds; we binge on TV episodes and YouTube videos; we work longer hours each year; and we spend an average of three hours each day using our smartphones. Half of us would rather suffer a broken bone than a broken phone, and Millennial kids spend so much time in front of screens that they struggle to interact with real, live humans.
-
-
Not scientifically sound
- By Alex Gertner on 09-05-20
By: Adam Alter
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Algorithms of Oppression
- How Search Engines Reinforce Racism
- By: Safiya Umoja Noble
- Narrated by: Shayna Small
- Length: 6 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Run a Google search for “black girls” - what will you find? “Big Booty” and other sexually explicit terms are likely to come up as top search terms. But, if you type in “white girls”, the results are radically different. The suggested porn sites and un-moderated discussions about “why black women are so sassy” or “why black women are so angry” presents a disturbing portrait of black womanhood in modern society. In Algorithms of Oppression, Safiya Umoja Noble challenges the idea that search engines like Google offer an equal playing field for all forms of ideas, identities, and activities.
-
-
Read this book. Tell everyone you know about it.
- By Joshua Daniel-Wariya on 06-06-19
-
The Code Book
- The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- By: Simon Singh
- Narrated by: Patty Nieman
- Length: 10 hrs and 27 mins
- Abridged
-
Overall
-
Performance
-
Story
In his first book since the best-selling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logistical breakthrough that made internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.
-
-
clarity
- By Maria on 04-19-25
By: Simon Singh
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
Critic reviews
What listeners say about The Cyber Effect
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Theresa P
- 09-10-16
This should be required reading
I am a mother of a one year old son, and I am hooked on this book! I've gone old school and I raise him during the day, work at night. This book is so helpful and I wish everyone knew the content to protect our kid's futures.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful
-
Overall
-
Performance
-
Story
- Joe Moore
- 04-01-17
You need to read/listen
You need to read/listen to this book. The internet is all around us. We use it every day. Understanding how it affects us and others is important.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
3 people found this helpful
-
Overall
-
Performance
-
Story
- Kacy Manning
- 06-02-21
In spite of the 2016 copyright
In spite of the 2016 copyright, this is a must read for all parents. The inside given within this book it’s really eye-opening. Our dependence upon the computers we hold in our hand and call our phone phone, is mine boggling.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Arathyum
- 10-28-16
Excellent book, full of relevant info.
It is amazing the quantity of useful topics , examples, concepts and tips. it's a must read for everyone who uses, technology or is emotionally linked to someone who uses computers or any digital gadget.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- Mark P Pfeiffer
- 12-06-19
a must read for every digital citizen
it was amazing and makes you aware we are "a part of the greatest unregulated experiment of humankind" thanks Mary!!!
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- S. Yates
- 11-06-16
Interesting but sometimes biased
Any additional comments?
Interesting but uneven book. On the pro side, the author clearly has spent a great deal of time and effort in her field, and has thought deeply about a number of issues. Her passion for her subject area is obvious and it gives the book a sincerity and vitality. Some sections are very interesting, especially discussions of how social interaction on the internet can act to normalize various behavior, the impact of digital life on sex, romance, pornography, and human relationships, and medical websites and interplay with whether we see ourselves as "well." The book is also very thought provoking as it explores how technology connects us in one sense, but leaves of alone in a very real, physical way.
The author's true mission in life is protecting children from digital harm - whether that is protection from online predators or it is protection from the side effects of technology. As a result, at least a third of the book catalogs the state of research on these issues and can, if you do not share the interest as passionately (and especially if you are not a parent), drone on a bit too long. That said, she highlights some studies that appear to be definitive but which are mostly ignored - including that children under the age of 2 should spend as little time as possible (and none, ideally) in front of screens because it can and does negatively impact their mental development, can slow language acquisition, and does not help them develop in any way whatsoever (basically, Baby Einstein and any app or show aimed at the under-2 set is a lie).
On the negative side and what made the book a bit annoying at times is that she comes across as overly idealistic. She makes sweeping statements about what should be done, but completely ignores whether or not those changes are feasible. She blithely discusses curating internet content in a way that ignores freedom of speech and proposes intricate and far reaching regulations for technology developers that seem at the very least legally tenuous. She also sometimes has flimsy evidence to back her claims. I give this somewhat of a pass because, as she rightly points out, controlled studies take years or decades to carry out (especially when you are studying developmental effects on children), and not only can we not afford to wait decades before making educated guesses and putting in place protections, but we also cannot do controlled studies on any technology that we believe is harmful (as you can't knowingly put child subjects in harm's way). That said, she sometimes takes this understandable paucity of hard facts as an invitation to opine without recourse to any evidence where there should be some. She also seems to cherry pick the opinions of others who support her without fully putting forth the opposing view, and she lost some real credibility when she referred to Stephen Hawking as the world's foremost physicist as an intro to his well-publicized (and not unfounded) warnings about technology as an existential threat.
In short, the book is very interesting despite its shortcomings and worth the time.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
11 people found this helpful