Search results
1 – 10 of over 2000Christy M.K. Cheung, Randy Yee Man Wong and Tommy K.H. Chan
Online disinhibition is one of the key factors leading to the occurrence of cyberaggression, cyberbullying and various forms of deviant behaviors in the online environment. To…
Abstract
Purpose
Online disinhibition is one of the key factors leading to the occurrence of cyberaggression, cyberbullying and various forms of deviant behaviors in the online environment. To understand the composition of online disinhibition, this study aims to conceptualize online disinhibition and develop a measurement instrument for online disinhibition.
Design/methodology/approach
We followed a rigorous procedure to develop and validate the multidimensional instrument of online disinhibition in three phases: item generation, measurement development and instrument testing.
Findings
We developed a 23-item online disinhibition scale and identified six key dimensions: dissociative anonymity, invisibility, asynchronicity, solipsistic introjections, dissociative imagination and minimization of authority.
Practical implications
The online disinhibition instrument is an accessible and easily administered measure that can be used as a checklist for systems designers and administrators to evaluate the level of online disinhibition among users. It offers systems design information on how to prevent and combat online deviant behaviors on platforms.
Originality/value
This work provides a rich conceptualization of an online disinhibition instrument that can serve as a springboard for future work to understand online deviant behaviors. The newly developed measurement instrument of online disinhibition also adds to the repository of rigorous research scales in this area.
Details
Keywords
Wilson Weixun Li, Alvin Chung Man Leung and Wei T. Yue
The anonymity of the Internet supports an increasing number of deviant behaviors such as secret affairs. This paper aims to investigate whether religiosity has a negative…
Abstract
Purpose
The anonymity of the Internet supports an increasing number of deviant behaviors such as secret affairs. This paper aims to investigate whether religiosity has a negative relationship with the incidence of secret affairs in cyberspace and how it moderates the substitution effect between the use of online and off-line channels for such deviant behaviors.
Design/methodology/approach
The authors constructed a cross-sectional county-level dataset containing data on US religious adherents' ratios and actual expenditures on a social website related to extramarital affairs. The data were analyzed by ordinary least squares and two-stage least squares regression models.
Findings
In general, religiosity has a negative relationship with secret affairs in cyberspace. It also moderates the relationship between using online (secret affairs websites) and off-line (entertainment facilities) channels for extramarital affairs. The deterrent effect of religiosity is weakened in religious communities with diversified religious teachings/structures and stricter requirements.
Originality/value
This work enriches the understanding of the role of religiosity in online deviant behaviors and provides essential insights for policymakers (e.g. in relation to spillover effects of social norms in cyberspace).
Details
Keywords
Sunanda Nayak, Pawan Budhwar, Vijay Pereira and Ashish Malik
Rapid technological advancements and the ever-increasing demand for Internet and social networking sites worldwide have increased the opportunity for extensive use and misuse of…
Abstract
Purpose
Rapid technological advancements and the ever-increasing demand for Internet and social networking sites worldwide have increased the opportunity for extensive use and misuse of these platforms. Research and practice have typically focused on the brighter side of social networking sites due to the adoption of EHRM (Electronic Human Resource Management). However, less is known about the dark side of EHRM, especially the drawbacks associated with the use of social networking (SNs) platforms in organisations. In addition, most of such studies have primarily involved the western country context, and in an emerging country scenario, these kinds of studies are limited. Hence, the study aims to investigate the complexities of the use of SNs as an e-HRM strategy in organisations in an emerging country context.
Design/methodology/approach
Drawing on 26 in-depth interviews of HR practitioners and analysing their narratives surrounding employees' use of social networking (both enterprise social networks [ESNs] and social networking sites [SNSs]), this study illuminates the dark or the adverse side of EHRM. Specifically, it focuses on the link between employees' deviant workplace behaviour and their usage of social networking (SN) platforms in organisations (i.e. SNs at workplaces influencing employee's unethical behaviour at work).
Findings
The empirical findings reveal the subtle intentional and unintentional indulgence of employees via SNs in various types of deviant behaviours such as sharing confidential information, bullying, harassment, breaching colleagues' privacy, etc., at the workplace in the emerging market context of India. Utilising the social networking perspective and the 4Ps of deviant theory, this article describes deviance behaviours in detail and explains the inadvertent complexities of leveraging SNs as an EHRM tool at the workplace. These insights then provide a starting point for discussing the theoretical and managerial implications of the research findings.
Research limitations/implications
Derived from the current research, this model offers an integrative frame-work for understanding DWBs in SNs platforms in general. This also shows that use of SNs at workplace often leads the employee engaging in non-productive activity. Hence future studies can explore the application of this framework in organizations in detail, thus further highlighting the usefulness of EHRM to understand the employee behaviours at the workplace by the organisations.
Practical implications
The research offers several managerial implications concerning the use of SNs as EHRM strategy at the workplace, which is perceived as a global challenge nowadays. Primarily it offers suggestions for the social media professionals and HR practitioners regarding the use of SNs in organisations.
Originality/value
The study's findings highlight the complex process that explains how SNs as an EHRM strategy affect employee deviance behaviours in the workplace. Till date, no known study has considered the possible effect of SNs on deviance behavior at the workplace in an emerging country context.
Details
Keywords
Han-Min Kim, Gee-Woo Bock and Hyung Su Kim
Today, online malicious comments are serious issues. They can cause psychological distress and suicide of victims. Although prior studies have focused on the role of anonymity as…
Abstract
Purpose
Today, online malicious comments are serious issues. They can cause psychological distress and suicide of victims. Although prior studies have focused on the role of anonymity as a major factor in making these comments, results of these studies have been inconsistent. On the other hand, the need for attention from others can provide an alternative explanation for such malicious comments. However, this perspective has been rarely studied. Therefore, the objective of this study was to investigate effects of anonymity and need for attention on posting malicious comments online and compare these two factors, resolving dark sides of online interaction.
Design/methodology/approach
This study obtained 327 questionnaires of Facebook users through a survey and analyzed the research model using partial least squares (PLS) regression.
Findings
Results of this study revealed that the need for attention affected malicious comments through partial mediation of neutralization. On the other hand, anonymity did not significantly affect malicious comments.
Research limitations/implications
This study has the following academic implications. First, we empirically examined the critical influence of need for attention on making malicious comments online based on the impression management theory. Second, this study revealed that the influence of need for attention on making malicious comments was partially mediated by neutralization. Third, this study may offer an explanation for contradicting findings on the role of anonymity in the phenomenon of posting malicious comments online.
Practical implications
Practical implications of this study are as follows. First, SNS platforms can limit activities of persons who post malicious comments frequently. Second, this study suggests that a notice is needed to inform the seriousness and harmful consequences of malicious comments. Third, Facebook practitioners should be aware that low anonymity may not reduce malicious comments.
Originality/value
This study quantitatively examined the effect of need for attention on malicious comments based on the impression management theory. It provides a fact that individuals who want to attract attention from others would write malicious comments through neutralization.
Details
Keywords
Chuang Wang, Jun Zhang and Matthew K.O. Lee
Widespread concerns about excessive use of mobile instant messaging (MIM) have inspired research in different disciplines. However, the focus thus far tends to be on diagnostics…
Abstract
Purpose
Widespread concerns about excessive use of mobile instant messaging (MIM) have inspired research in different disciplines. However, the focus thus far tends to be on diagnostics and cognitive predictors. There is little understanding from the socio-technical perspective to capture the drivers of excessive use of MIM. To address this research gap, the authors aim to enrich existing literature by adopting a social structure and social learning model (SSSLM) to understand the excessive use of MIM. The authors argue that excessive MIM use is developed and reinforced in highly interactive online communication, through a social learning process.
Design/methodology/approach
The authors conduct a cross-sectional online survey to validate our proposed research model on excessive use of mobile instant messaging (MIM). 368 valid responses are obtained from active MIM users in China.
Findings
The results suggest that highly interactive MIM creates a technology-based social structure that facilitates the social learning process of excessive technology use. The influence of perceived interactivity of MIM on excessive MIM use is mediated by a series of contextualized social learning factors. Furthermore, the influences of perceived interactivity on social learning factors are moderated by MIM use experience.
Originality/value
The authors contribute to literature in related fields by highlighting the crucial role of social learning in facilitating excessive technology use. The authors contribute to the social structure and social learning model by contextualizing it into the context of excessive MIM use. Design guidelines are provided with a purpose to inhibit excessive use of MIM.
Details
Keywords
This study aims to explore the association between internet addiction and problem behaviours on social networking sites (SNS) using the general strain theory (Agnew, 1992).
Abstract
Purpose
This study aims to explore the association between internet addiction and problem behaviours on social networking sites (SNS) using the general strain theory (Agnew, 1992).
Design/methodology/approach
Using the purposive sampling method, a survey was conducted, which collected data from 414 college students studying in two public universities in South Australia. The Delphi method was used to develop the questionnaire used for the survey.
Findings
'Results of this research indicated a significant association between internet addiction and problem behaviours on SNS. Respondents who had engaged in problem behaviours on SNS had high internet addiction test scores (Young, 1998). On the basis of this finding, the present research argues that the general strains associated with the suffering of newly emerging challenges such as internet addiction might contribute to victimisation and deviant and problem behaviours on SNS in specific and possibly in cyberspace in general.
Research limitations/implications
Results of the present study need to be interpreted cautiously due to many limitations it has. This research is a cross-sectional study, which might not adequately explain the associations between internet addiction and problem behaviours on SNS. Longitudinal studies involving larger samples might have added significant value to this study. The present study uses purposive sampling technique, which has limited its generalizability, and its findings may not be generalised to large populations.
Originality/value
Limited information is available pertaining to the association between problem behaviours on SNS and internet addiction. The present study is a pioneering effort, which argues that rapid popularity of SNS is likely to increase internet addiction and the frustration of not getting proper treatment for their internet addiction might lead to deviant behaviours on SNS.
Details
Keywords
Naci Akdemir and Christopher James Lawless
The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes…
Abstract
Purpose
The purpose of this study was to explore human factors as the possible facilitator of cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes victimisation and to test the applicability of lifestyle routine activities theory (LRAT) to cybercrime victimisation.
Design/methodology/approach
A mixed methods research paradigm was applied to address the research questions and aims. The data set of Crime Survey of England and Wales (CSEW) 2014/2015 and 42 semi-structured interviews conducted with victims of cybercrime and non-victim control group participants were analysed via binary logistic regression and content analyses methods.
Findings
This research illustrated that Internet users facilitated their victimisation through their online activities. Additionally, using insecure Internet connections and public access computers emerged as risk factors for both cyber-enabled and cyber-dependent crime victimisation. Voluntary and involuntary personal information disclosure through social networking sites and online advertisement websites increased the likelihood of being a target of phishing. Deviant online activities such as free streaming or peer-to-peer sharing emerged to increase the risk of cyber-dependent crime victimisation.
Research limitations/implications
The binary logistic regression analysis results suggested LRAT as a more suitable theoretical framework for cyber-dependent crime victimisation. Future research may test this result with models including more macro variables.
Practical implications
Policymakers may consider implementing regulations regarding limiting the type of information required to login to free Wi-Fi connections. Checking trust signs and green padlocks may be effective safeguarding measures to lessen the adverse impacts of impulsive buying.
Originality/value
This study empirically illustrated that, besides individual-level factors, macro-level factors such as electronic devices being utilised to access the Internet and data breaches of large companies also increased the likelihood of becoming the victim of cyber-enabled and cyber-dependent crime.
Details
Keywords
Denitsa Dineva and Jan Breitsohl
The literature lacks knowledge on how organizations can manage trolling behaviors in online communities. Extant studies tend to either focus on user responses to trolling behaviors…
Abstract
Purpose
The literature lacks knowledge on how organizations can manage trolling behaviors in online communities. Extant studies tend to either focus on user responses to trolling behaviors (i.e. a micro-level perspective) or how the trolling infrastructure is governed by platforms (i.e. a macro-level perspective), paying less attention to the organizational community host. With more organizations hosting online communities on social media networks and trolling behaviors increasingly disrupting user engagement within these communities, the current understanding of trolling management practices has become inapt. Given the commercial and social damage caused by trolling behaviors, it is important to understand how these can be best managed. The purpose of this study, therefore, is to examine the meso-level perspective of trolling management by focusing on organizational practice.
Design/methodology/approach
The research design consists of an in-depth non-participatory netnography based on a case study of PETA’s (“People for the Ethical Treatment of Animals”) Facebook community.
Findings
Six distinct trolling management strategies are identified and categorized by their direct versus indirect communication approach: non-engaging, educating, bolstering, expurgating, asserting and mobilizing. Some strategies are deemed to be more successful than others in generating positive community outcomes such as reduced trolling frequency or further support from like-minded community members.
Originality/value
The findings contribute to the meso-level perspective in the trolling management literature by introducing a novel, empirically informed typology of organizational trolling management strategies.
Details
Keywords
Fiona Hynes, Nicholas Taylor and Fionnbar Lenihan
This article seeks to explore the role of the mental health professional when involved with assessment and management of individuals with a history of online sexual activity. This…
Abstract
This article seeks to explore the role of the mental health professional when involved with assessment and management of individuals with a history of online sexual activity. This is a relatively new area for many professionals, who are often unaware of the novel and expanding theoretical base for work in this area. A review is provided of the aetiological theories relating to online sexual activity.
Details
Keywords
Anushree Tandon, Puneet Kaur, Namita Ruparel, Jamid Ul Islam and Amandeep Dhir
Scholars are increasingly focusing on the adverse effects of digitization on human lives in personal and professional contexts. Cyberloafing is one such effect and…
Abstract
Purpose
Scholars are increasingly focusing on the adverse effects of digitization on human lives in personal and professional contexts. Cyberloafing is one such effect and digitization-related workplace behavior that has garnered attention in both academic and mainstream media. However, the existing literature is fragmented and needs to be consolidated to generate a comprehensive and contemporary overview of cyberloafing research and map its current intellectual boundaries. The purpose of this paper is to shed some light on systematic literature review (SLR) in cyberloafing and cyberslacking in the workplace.
Design/methodology/approach
A SLR is conducted to assimilate the existing research. A total of 87 studies selected through a robust protocol are analyzed through content analysis.
Findings
A total of four thematic research areas and inherent gaps are identified, including conceptualization, operationalization, antecedents and stakeholders and consequences. Results are used to assimilate thematic gaps and potential research questions (RQs) to be addressed by future scholars. To advance cyberloafing research, the authors propose a theoretically grounded comprehensive framework based on the SLR findings.
Originality/value
Our study's novelty rests in its state-of-the-art synthesis of cyberloafing research, which encompasses a broader scope than prior SLRs. Furthermore, developing a theoretically grounded comprehensive framework for advancing future research is a unique contribution of this study.
Details