Search results

1 – 10 of over 2000
Article
Publication date: 22 October 2020

Christy M.K. Cheung, Randy Yee Man Wong and Tommy K.H. Chan

Online disinhibition is one of the key factors leading to the occurrence of cyberaggression, cyberbullying and various forms of deviant behaviors in the online environment. To…

2050

Abstract

Purpose

Online disinhibition is one of the key factors leading to the occurrence of cyberaggression, cyberbullying and various forms of deviant behaviors in the online environment. To understand the composition of online disinhibition, this study aims to conceptualize online disinhibition and develop a measurement instrument for online disinhibition.

Design/methodology/approach

We followed a rigorous procedure to develop and validate the multidimensional instrument of online disinhibition in three phases: item generation, measurement development and instrument testing.

Findings

We developed a 23-item online disinhibition scale and identified six key dimensions: dissociative anonymity, invisibility, asynchronicity, solipsistic introjections, dissociative imagination and minimization of authority.

Practical implications

The online disinhibition instrument is an accessible and easily administered measure that can be used as a checklist for systems designers and administrators to evaluate the level of online disinhibition among users. It offers systems design information on how to prevent and combat online deviant behaviors on platforms.

Originality/value

This work provides a rich conceptualization of an online disinhibition instrument that can serve as a springboard for future work to understand online deviant behaviors. The newly developed measurement instrument of online disinhibition also adds to the repository of rigorous research scales in this area.

Article
Publication date: 20 September 2021

Wilson Weixun Li, Alvin Chung Man Leung and Wei T. Yue

The anonymity of the Internet supports an increasing number of deviant behaviors such as secret affairs. This paper aims to investigate whether religiosity has a negative…

Abstract

Purpose

The anonymity of the Internet supports an increasing number of deviant behaviors such as secret affairs. This paper aims to investigate whether religiosity has a negative relationship with the incidence of secret affairs in cyberspace and how it moderates the substitution effect between the use of online and off-line channels for such deviant behaviors.

Design/methodology/approach

The authors constructed a cross-sectional county-level dataset containing data on US religious adherents' ratios and actual expenditures on a social website related to extramarital affairs. The data were analyzed by ordinary least squares and two-stage least squares regression models.

Findings

In general, religiosity has a negative relationship with secret affairs in cyberspace. It also moderates the relationship between using online (secret affairs websites) and off-line (entertainment facilities) channels for extramarital affairs. The deterrent effect of religiosity is weakened in religious communities with diversified religious teachings/structures and stricter requirements.

Originality/value

This work enriches the understanding of the role of religiosity in online deviant behaviors and provides essential insights for policymakers (e.g. in relation to spillover effects of social norms in cyberspace).

Details

Internet Research, vol. 32 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 23 September 2021

Sunanda Nayak, Pawan Budhwar, Vijay Pereira and Ashish Malik

Rapid technological advancements and the ever-increasing demand for Internet and social networking sites worldwide have increased the opportunity for extensive use and misuse of…

1653

Abstract

Purpose

Rapid technological advancements and the ever-increasing demand for Internet and social networking sites worldwide have increased the opportunity for extensive use and misuse of these platforms. Research and practice have typically focused on the brighter side of social networking sites due to the adoption of EHRM (Electronic Human Resource Management). However, less is known about the dark side of EHRM, especially the drawbacks associated with the use of social networking (SNs) platforms in organisations. In addition, most of such studies have primarily involved the western country context, and in an emerging country scenario, these kinds of studies are limited. Hence, the study aims to investigate the complexities of the use of SNs as an e-HRM strategy in organisations in an emerging country context.

Design/methodology/approach

Drawing on 26 in-depth interviews of HR practitioners and analysing their narratives surrounding employees' use of social networking (both enterprise social networks [ESNs] and social networking sites [SNSs]), this study illuminates the dark or the adverse side of EHRM. Specifically, it focuses on the link between employees' deviant workplace behaviour and their usage of social networking (SN) platforms in organisations (i.e. SNs at workplaces influencing employee's unethical behaviour at work).

Findings

The empirical findings reveal the subtle intentional and unintentional indulgence of employees via SNs in various types of deviant behaviours such as sharing confidential information, bullying, harassment, breaching colleagues' privacy, etc., at the workplace in the emerging market context of India. Utilising the social networking perspective and the 4Ps of deviant theory, this article describes deviance behaviours in detail and explains the inadvertent complexities of leveraging SNs as an EHRM tool at the workplace. These insights then provide a starting point for discussing the theoretical and managerial implications of the research findings.

Research limitations/implications

Derived from the current research, this model offers an integrative frame-work for understanding DWBs in SNs platforms in general. This also shows that use of SNs at workplace often leads the employee engaging in non-productive activity. Hence future studies can explore the application of this framework in organizations in detail, thus further highlighting the usefulness of EHRM to understand the employee behaviours at the workplace by the organisations.

Practical implications

The research offers several managerial implications concerning the use of SNs as EHRM strategy at the workplace, which is perceived as a global challenge nowadays. Primarily it offers suggestions for the social media professionals and HR practitioners regarding the use of SNs in organisations.

Originality/value

The study's findings highlight the complex process that explains how SNs as an EHRM strategy affect employee deviance behaviours in the workplace. Till date, no known study has considered the possible effect of SNs on deviance behavior at the workplace in an emerging country context.

Details

International Journal of Manpower, vol. 43 no. 1
Type: Research Article
ISSN: 0143-7720

Keywords

Article
Publication date: 24 February 2020

Han-Min Kim, Gee-Woo Bock and Hyung Su Kim

Today, online malicious comments are serious issues. They can cause psychological distress and suicide of victims. Although prior studies have focused on the role of anonymity as…

Abstract

Purpose

Today, online malicious comments are serious issues. They can cause psychological distress and suicide of victims. Although prior studies have focused on the role of anonymity as a major factor in making these comments, results of these studies have been inconsistent. On the other hand, the need for attention from others can provide an alternative explanation for such malicious comments. However, this perspective has been rarely studied. Therefore, the objective of this study was to investigate effects of anonymity and need for attention on posting malicious comments online and compare these two factors, resolving dark sides of online interaction.

Design/methodology/approach

This study obtained 327 questionnaires of Facebook users through a survey and analyzed the research model using partial least squares (PLS) regression.

Findings

Results of this study revealed that the need for attention affected malicious comments through partial mediation of neutralization. On the other hand, anonymity did not significantly affect malicious comments.

Research limitations/implications

This study has the following academic implications. First, we empirically examined the critical influence of need for attention on making malicious comments online based on the impression management theory. Second, this study revealed that the influence of need for attention on making malicious comments was partially mediated by neutralization. Third, this study may offer an explanation for contradicting findings on the role of anonymity in the phenomenon of posting malicious comments online.

Practical implications

Practical implications of this study are as follows. First, SNS platforms can limit activities of persons who post malicious comments frequently. Second, this study suggests that a notice is needed to inform the seriousness and harmful consequences of malicious comments. Third, Facebook practitioners should be aware that low anonymity may not reduce malicious comments.

Originality/value

This study quantitatively examined the effect of need for attention on malicious comments based on the impression management theory. It provides a fact that individuals who want to attract attention from others would write malicious comments through neutralization.

Details

Information Technology & People, vol. 34 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 November 2021

Chuang Wang, Jun Zhang and Matthew K.O. Lee

Widespread concerns about excessive use of mobile instant messaging (MIM) have inspired research in different disciplines. However, the focus thus far tends to be on diagnostics…

Abstract

Purpose

Widespread concerns about excessive use of mobile instant messaging (MIM) have inspired research in different disciplines. However, the focus thus far tends to be on diagnostics and cognitive predictors. There is little understanding from the socio-technical perspective to capture the drivers of excessive use of MIM. To address this research gap, the authors aim to enrich existing literature by adopting a social structure and social learning model (SSSLM) to understand the excessive use of MIM. The authors argue that excessive MIM use is developed and reinforced in highly interactive online communication, through a social learning process.

Design/methodology/approach

The authors conduct a cross-sectional online survey to validate our proposed research model on excessive use of mobile instant messaging (MIM). 368 valid responses are obtained from active MIM users in China.

Findings

The results suggest that highly interactive MIM creates a technology-based social structure that facilitates the social learning process of excessive technology use. The influence of perceived interactivity of MIM on excessive MIM use is mediated by a series of contextualized social learning factors. Furthermore, the influences of perceived interactivity on social learning factors are moderated by MIM use experience.

Originality/value

The authors contribute to literature in related fields by highlighting the crucial role of social learning in facilitating excessive technology use. The authors contribute to the social structure and social learning model by contextualizing it into the context of excessive MIM use. Design guidelines are provided with a purpose to inhibit excessive use of MIM.

Details

Information Technology & People, vol. 35 no. 7
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 14 December 2017

AR Mubarak and Steve Quinn

This study aims to explore the association between internet addiction and problem behaviours on social networking sites (SNS) using the general strain theory (Agnew, 1992).

1199

Abstract

Purpose

This study aims to explore the association between internet addiction and problem behaviours on social networking sites (SNS) using the general strain theory (Agnew, 1992).

Design/methodology/approach

Using the purposive sampling method, a survey was conducted, which collected data from 414 college students studying in two public universities in South Australia. The Delphi method was used to develop the questionnaire used for the survey.

Findings

'Results of this research indicated a significant association between internet addiction and problem behaviours on SNS. Respondents who had engaged in problem behaviours on SNS had high internet addiction test scores (Young, 1998). On the basis of this finding, the present research argues that the general strains associated with the suffering of newly emerging challenges such as internet addiction might contribute to victimisation and deviant and problem behaviours on SNS in specific and possibly in cyberspace in general.

Research limitations/implications

Results of the present study need to be interpreted cautiously due to many limitations it has. This research is a cross-sectional study, which might not adequately explain the associations between internet addiction and problem behaviours on SNS. Longitudinal studies involving larger samples might have added significant value to this study. The present study uses purposive sampling technique, which has limited its generalizability, and its findings may not be generalised to large populations.

Originality/value

Limited information is available pertaining to the association between problem behaviours on SNS and internet addiction. The present study is a pioneering effort, which argues that rapid popularity of SNS is likely to increase internet addiction and the frustration of not getting proper treatment for their internet addiction might lead to deviant behaviours on SNS.

Details

Journal of Information, Communication and Ethics in Society, vol. 17 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 25 June 2020

Naci Akdemir and Christopher James Lawless

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes…

3814

Abstract

Purpose

The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes victimisation and to test the applicability of lifestyle routine activities theory (LRAT) to cybercrime victimisation.

Design/methodology/approach

A mixed methods research paradigm was applied to address the research questions and aims. The data set of Crime Survey of England and Wales (CSEW) 2014/2015 and 42 semi-structured interviews conducted with victims of cybercrime and non-victim control group participants were analysed via binary logistic regression and content analyses methods.

Findings

This research illustrated that Internet users facilitated their victimisation through their online activities. Additionally, using insecure Internet connections and public access computers emerged as risk factors for both cyber-enabled and cyber-dependent crime victimisation. Voluntary and involuntary personal information disclosure through social networking sites and online advertisement websites increased the likelihood of being a target of phishing. Deviant online activities such as free streaming or peer-to-peer sharing emerged to increase the risk of cyber-dependent crime victimisation.

Research limitations/implications

The binary logistic regression analysis results suggested LRAT as a more suitable theoretical framework for cyber-dependent crime victimisation. Future research may test this result with models including more macro variables.

Practical implications

Policymakers may consider implementing regulations regarding limiting the type of information required to login to free Wi-Fi connections. Checking trust signs and green padlocks may be effective safeguarding measures to lessen the adverse impacts of impulsive buying.

Originality/value

This study empirically illustrated that, besides individual-level factors, macro-level factors such as electronic devices being utilised to access the Internet and data breaches of large companies also increased the likelihood of becoming the victim of cyber-enabled and cyber-dependent crime.

Details

Internet Research, vol. 30 no. 6
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 13 July 2021

Denitsa Dineva and Jan Breitsohl

The literature lacks knowledge on how organizations can manage trolling behaviors in online communities. Extant studies tend to either focus on user responses to trolling behaviors

1244

Abstract

Purpose

The literature lacks knowledge on how organizations can manage trolling behaviors in online communities. Extant studies tend to either focus on user responses to trolling behaviors (i.e. a micro-level perspective) or how the trolling infrastructure is governed by platforms (i.e. a macro-level perspective), paying less attention to the organizational community host. With more organizations hosting online communities on social media networks and trolling behaviors increasingly disrupting user engagement within these communities, the current understanding of trolling management practices has become inapt. Given the commercial and social damage caused by trolling behaviors, it is important to understand how these can be best managed. The purpose of this study, therefore, is to examine the meso-level perspective of trolling management by focusing on organizational practice.

Design/methodology/approach

The research design consists of an in-depth non-participatory netnography based on a case study of PETA’s (“People for the Ethical Treatment of Animals”) Facebook community.

Findings

Six distinct trolling management strategies are identified and categorized by their direct versus indirect communication approach: non-engaging, educating, bolstering, expurgating, asserting and mobilizing. Some strategies are deemed to be more successful than others in generating positive community outcomes such as reduced trolling frequency or further support from like-minded community members.

Originality/value

The findings contribute to the meso-level perspective in the trolling management literature by introducing a novel, empirically informed typology of organizational trolling management strategies.

Details

Internet Research, vol. 32 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 September 2007

Fiona Hynes, Nicholas Taylor and Fionnbar Lenihan

This article seeks to explore the role of the mental health professional when involved with assessment and management of individuals with a history of online sexual activity. This…

Abstract

This article seeks to explore the role of the mental health professional when involved with assessment and management of individuals with a history of online sexual activity. This is a relatively new area for many professionals, who are often unaware of the novel and expanding theoretical base for work in this area. A review is provided of the aetiological theories relating to online sexual activity.

Details

The British Journal of Forensic Practice, vol. 9 no. 3
Type: Research Article
ISSN: 1463-6646

Keywords

Article
Publication date: 23 July 2021

Anushree Tandon, Puneet Kaur, Namita Ruparel, Jamid Ul Islam and Amandeep Dhir

Scholars are increasingly focusing on the adverse effects of digitization on human lives in personal and professional contexts. Cyberloafing is one such effect and…

4876

Abstract

Purpose

Scholars are increasingly focusing on the adverse effects of digitization on human lives in personal and professional contexts. Cyberloafing is one such effect and digitization-related workplace behavior that has garnered attention in both academic and mainstream media. However, the existing literature is fragmented and needs to be consolidated to generate a comprehensive and contemporary overview of cyberloafing research and map its current intellectual boundaries. The purpose of this paper is to shed some light on systematic literature review (SLR) in cyberloafing and cyberslacking in the workplace.

Design/methodology/approach

A SLR is conducted to assimilate the existing research. A total of 87 studies selected through a robust protocol are analyzed through content analysis.

Findings

A total of four thematic research areas and inherent gaps are identified, including conceptualization, operationalization, antecedents and stakeholders and consequences. Results are used to assimilate thematic gaps and potential research questions (RQs) to be addressed by future scholars. To advance cyberloafing research, the authors propose a theoretically grounded comprehensive framework based on the SLR findings.

Originality/value

Our study's novelty rests in its state-of-the-art synthesis of cyberloafing research, which encompasses a broader scope than prior SLRs. Furthermore, developing a theoretically grounded comprehensive framework for advancing future research is a unique contribution of this study.

Details

Internet Research, vol. 32 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

1 – 10 of over 2000