PECULIARITIES OF USING NEW
Valentina M. Bondarovskaia, Anatolyi A. Stognyi
Institute of Applied Informatics
23b, Velyka Vasylkivska str.,
252004, Kyiv, Ukraine
The objective of our investigation was to develop principle approaches to designing of the system for exposing the factors and means of "hidden" influence of information technology virtual world to individual, group and mass consciousness, to analyzing of psychological, ethic and social consequences of the information technological culture absence nowadays, and to working out the methods of support information psychological security of all categories computer users.
Experience of analyzing modern researches in the field of psychological and ergonomics aspects of the information and communication technologies(ICT) using shows that during the last ten years the intrusion of ICT upon the external and internal world of person have been realized ( Rantanen, 1996; Weinzenbaum, 1996; Baron and Richardson, 1994; ΠpoбπeMьІ..., 1996).
We supposed that the typical factor when committing a breach of informationpsychological security is incorrect setting of tasks related with informatization and automatization in organizational management, in particular, underestimation of human aspect and individual peculiarities, systems of individual conceptions which solving the problems. In the other hand, individual's informationpsychological security at all levels is under a threat of new information technology. We supposed that it is resulted in breaches of a person's orientation, structure of a person's values, goals and motives, formation of his/her aggressive behavior.
A special situation turned out in New Independent Countries of Former Soviet Union. In soviet time there was formed a special type of person, small pan of big social machine(I.Stalyn). In the area of personal responsibility, the "soviet" citizen was culturally trained in learned helplessness and dependency. The state oversaw the planning, organizing and implementing of all facets of each individual's life. The situation created a patronymic system that functioned like