DOI QR코드

DOI QR Code

The Relationship between Cyber Characteristics and Malicious Comments on Facebook : The Role of Anonymity and Dissemination

페이스북에서 사이버 특성과 악성댓글의 관계 : 익명성과 전파성의 역할

  • Kim, Han-Min (School of Business, Sungkyunkwan University)
  • Received : 2017.12.11
  • Accepted : 2018.03.26
  • Published : 2018.03.31

Abstract

The internet is spreading widely and malicious comments which is a negative aspect is increasing. Previous studies have considered anonymity as a cyber characteristic of malicious comments. However, there are a theoretical confusion due to inconsistent results. In addition, the dissemination, one of cyber characteristics, have been mentioned the theoretical relationship on malicious comments, but measurement and empirical study about dissemination were still limited. Therefore, this study developed a measurement of dissemination and investigated the relationship between cyber characteristics (anonymity, dissemination) and malicious comments on Facebook. As a result of research, this study identified that anonymity is not significant on malicious comments and discovered that the dissemination of cyber space has a direct influence on malicious comments. This study suggests that information systems can contribute to malicious comments researches by proposing cyber characteristics.

Keywords

References

  1. Almeida, A., Correia, I., and Marinho, S., "Moral Disengagement, Normative Beliefs of Peer Group, and Attitudes Regarding Roles in Bullying", Journal of school Violence, Vol. 9, No. 1, 2009, pp. 23-36. https://doi.org/10.1080/15388220903185639
  2. Anderson, J. and Gerbing, D., "Structural Equation Modeling in Practice : A Review and Recommended Two-Step Approach", Psychological Bulletin, Vol. 103, No. 4, 1988, pp. 411-423. https://doi.org/10.1037/0033-2909.103.3.411
  3. Antoniadou, N. and Kokkinos, C. M., "Cyber and school bullying : Same or different phenomena", Aggression and Violent Behavior, Vol. 25, 2015, pp. 363-372. https://doi.org/10.1016/j.avb.2015.09.013
  4. Armstrong, J. S. and Overton, T. S., "Estimating nonresponse bias in mail surveys", Journal of Marketing Research, Vol. 14, No. 3, 1977, pp. 396-402. https://doi.org/10.2307/3150783
  5. Bachman, R., Paternoster, R., and Ward, S., "The rationality of sexual offending : testing a deterrence/rational choice conception of sexual assault", Law and Society, Vol. 26, No. 2, 1992, pp. 343-372. https://doi.org/10.2307/3053901
  6. Baron, R. M. and Kenny, D. A., "The moderator-mediator variable distinction in social psychological research : Conceptual, strategic, and statistical considerations", Journal of Personality and Social Psychology, Vol. 51, No. 6, 1986, pp. 1173-1182. https://doi.org/10.1037/0022-3514.51.6.1173
  7. Chin, W., "Issues and Opinion on Structural Equation Modeling", MIS Quarterly, Vol. 22, No. 1, 1998, pp. 7-16.
  8. Cho, D. and Kwon, K. H., "The impacts of identity verification and disclosure of social cues on flaming in online user comments", Computers in Human Behavior, Vol. 51, Part. A, October, 2015, pp. 363-372. https://doi.org/10.1016/j.chb.2015.04.046
  9. Doane, A. N., Pearson, M. R., and Kelley, M. L., "Predictors of cyberbullying perpetration among college students : An application of the Theory of Reasoned Action", Computers in Human Behavior, Vol. 36, 2014, pp. 154-162. https://doi.org/10.1016/j.chb.2014.03.051
  10. Dooley, J. J., Pyzalski, J., and Cross, D. "Cyberbullying versus face-to-face bullying, A theoretical and conceptual review", Journal of Psychology, Vol. 217, 2009, pp. 182-188.
  11. Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error", Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50. https://doi.org/10.2307/3151312
  12. Hite, D. M., Voelker, T., and Robertson, A., "Measuring Perceived Anonymity : The Development of a Context Independent Instrument", Journal of Methods and Measurement in the Social Sciences, Vol. 5, No. 1, 2014, pp. 22-39. https://doi.org/10.2458/jmm.v5i1.18305
  13. Hu, Q., Xu, Z., Dinev, T., and Ling, H., "Does deterrence work in reducing information security policy abuse by employees", Communications of the ACM, Vol. 54, No. 6, 2011, pp. 54-60. https://doi.org/10.1145/1953122.1953142
  14. Huang, Y. and Chou, C., "An analysis of multiple factors of cyberbullying among junior high school students in Taiwan", Computers in Human Behavior, Vol. 26, No. 6, 2010, pp. 1581-1590. https://doi.org/10.1016/j.chb.2010.06.005
  15. Hughes, D. J., Rowe, M., Batey, M., and Lee, A., "A tale of two sites : Twitter vs. Face book and the personality predictors of social media usage", Computers in Human Behavior, Vol. 28, No. 2, 2012, pp. 561-569. https://doi.org/10.1016/j.chb.2011.11.001
  16. Hutchens, M. J., Cicchirillo, V. J., and Hmielowski, J. D., "How could you think that?!?! : Understanding intentions to engage in political flaming", New media & Society, Vol. 17, No. 8, 2015, pp. 1201-1219. https://doi.org/10.1177/1461444814522947
  17. Jessup, L. M., Connolly, T., and Galegher, J., "The Effects of Anonymity on GDSS Group Process in Automated Group Problem Solving", MIS Quarterly, Vol. 14, No. 3, 1990, pp. 312-321.
  18. Kokkinos, C. M., Baltzidis, E., and Xynogala, D., "Prevalence and personality correlates of Facebook bullying among university undergraduates", Computers in Human Behavior, Vol. 55, 2016, pp. 840-850 https://doi.org/10.1016/j.chb.2015.10.017
  19. Kwan, G. C. E. and Skoric, M. M., "Face book bullying : An extension of battles in school", Computers in Human Behavior, Vol. 29, No. 1, 2013, pp. 16-25. https://doi.org/10.1016/j.chb.2012.07.014
  20. Lapidot-Lefler, N. and A. Barak, "Effects of anonymity, invisibility, and lack of eyecontact on toxic online disinhibition", Computers in Human Behavior, Vol. 28, No. 2, 2012, pp. 434-443. https://doi.org/10.1016/j.chb.2011.10.014
  21. Lee, S. H. and Kim, H. W., "Why People Post Benevolent and Malicious Comments Online", Communications of the ACM, Vol. 58, No. 11, 2015, pp. 74-79. https://doi.org/10.1145/2739042
  22. Lewis, H. B., Shame and Guilt in Neurosis, International Universities Press, New York, 1971.
  23. Li, Q., "New bottle but old wine : A research of cyberbullying in schools", Computers in Human Behavior, Vol. 23, 2007, pp. 1777-1791. https://doi.org/10.1016/j.chb.2005.10.005
  24. Lowry, P. B., Moody, G. D., and Chatterjee, S., "Using it Design to Prevent Cyberbullying Journal of Management Information Systems", Journal of Management Information Systems, 2017, Forthcoming.
  25. Lowry, P. B., Zhang, J., Wang, C., and Siponen, M., "Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model", Information Systems Research, Vol. 27, No. 4, 2016, pp. 962-986. https://doi.org/10.1287/isre.2016.0671
  26. Moore, M. J., Nakano, T., Enomoto, A., and Suda, T., "Anonymity and roles associated with aggressive posts in an online forum", Computers in Human Behavior, Vol. 28, No. 3, 2012, pp. 861-867. https://doi.org/10.1016/j.chb.2011.12.005
  27. Moores, T. T. and Chang, J. C. J., "Ethical decision making in software piracy : initial development and test of a four-component model", MIS Quarterly, Vol. 30, No. 1, 2006, pp. 167-180. https://doi.org/10.2307/25148722
  28. Obermann, M. L., "Moral disengagement in self-reported and peer-nominated school bullying", Aggressive Behavior, Vol. 37, No. 2, 2011, pp. 133-144. https://doi.org/10.1002/ab.20378
  29. Paternoster, R. and Simpson, S., "Sanction Threats and Appeals to Morality : Testing a Rational Choice Model of Corporate Crime", Law & Society Review, Vol. 30, No. 3, 1996, pp. 549-584. https://doi.org/10.2307/3054128
  30. Pempek, T. A., Yermolayeva, Y. A., and Calvert, S. L., "College students' social networking experiences on Facebook", Journal of Applied Developmental Psychology, Vol. 30, No. 3, 2009, pp. 227-238. https://doi.org/10.1016/j.appdev.2008.12.010
  31. Podsakoff, P. M., MacKenzie, S. B., Lee, J., and Podsakoff, N. P., "Common Method Biases in Behavioral Research : A Critical Review of the Literature and Recommended Remedies", Journal of Applied Psychology, Vol. 88, No. 5, 2003, pp. 879-903. https://doi.org/10.1037/0021-9010.88.5.879
  32. Pornari, C. D. and Wood, J., "Peer and Cyber Aggression in Secondary School Students : The Role of Moral Disengagement, Hostile Attribution Bias, and Outcome Expectancies", Aggressive Behavior, Vol. 36, No. 2, 2010, pp. 81-94. https://doi.org/10.1002/ab.20336
  33. Postmes, T. and Spears, R., "Deindividuation and antinormative behavior : A meta-analysis", Psychological Bulletin, Vol. 123, No. 3, 1998, pp. 238-259. https://doi.org/10.1037/0033-2909.123.3.238
  34. Prosecution service, Internet malicious commentator processing plan implementation, http://spogood.tistory.com/263 accessed 16 April 2015.
  35. Reinig, B. A. and Mejias, B. J., "The effects of national culture and anonymity on flaming and criticalness in GSS-supported discussions", Small Group Research, Vol. 35, No. 6, 2004, pp. 698-723. https://doi.org/10.1177/1046496404266773
  36. Renati, R., Berrone, C., and Zanetti, M. A., "Morally Disengaged and Unempathic : Do Cyberbullies Fit These Definitions? An Exploratory Study", Cyberpsychology, Behavior, and Social Networking, Vol. 15, No. 8, 2012, pp. 391-398. https://doi.org/10.1089/cyber.2012.0046
  37. Rosner, L. and Kramer, N. C., "Verbal Venting in the Social Web : Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments", Social Media+Society, First Published August 16, 2016, pp. 1-13.
  38. Sari, S. V. and Camadan, F., "The new face of violence tendency : Cyber bullying perpetrators and their victims", Computers in Human Behavior, Vol. 59, No. 1, 2016, pp. 317-326. https://doi.org/10.1016/j.chb.2016.02.027
  39. Siponen, M. and Vance, A., "Neutralization : New Insights into the Problem of Employee Information Systems Security Policy Violations", MIS Quarterly, Vol. 34, No. 3, 2010, pp. 487-502. https://doi.org/10.2307/25750688
  40. Siponen, M., Vance, A., and Willison, R., "New insights into the problem of software piracy : The effects of neutralization, shame, and moral beliefs", Information & Management, Vol. 49, No. 7-8, 2012, pp. 334-341. https://doi.org/10.1016/j.im.2012.06.004
  41. Statista, "Number of monthly active Face book users worldwide as of 2nd quarter 2017 (in millions)", 2017, Available at http://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/.
  42. Sticca, F. and F. Perren, "Is Cyberbullying Worse than Traditional Bullying? Examining the Differential Roles of Medium, Publicity, and Anonymity for the Perceived Severity of Bullying", Journal of Youth and Adolescence, Vol. 42, No. 5, 2013, pp. 739-750. https://doi.org/10.1007/s10964-012-9867-3
  43. Suler, J., "The Online Disinhibition Effect", Cyberpsychology and Behavior, Vol. 7, No. 3, 2004, pp. 321-326. https://doi.org/10.1089/1094931041291295
  44. Thong, J. Y. L. and Yap, C. S., "Testing an Ethical Decision-Making Theory : The Case of Softlifting", Journal of Management Information Systems, Vol. 15, No. 1, 1998, pp. 213-237. https://doi.org/10.1080/07421222.1998.11518203
  45. Tittle, C. R., "Continuing the discussion of control balance", Theoretical Criminology, Vol. 3, No. 3, 1999, pp. 344-352. https://doi.org/10.1177/1362480699003003007
  46. Tittle, C. R., "Thoughts Stimulated by Braithwaite's Analysis of Control Balance Theory", Theoretical Criminology, Vol. 1, No. 1, 1997, 99-110. https://doi.org/10.1177/1362480697001001006
  47. Williams, K. R. and Guerra, N. G., "Prevalence and predictors of Internet bullying", Journal of Adolescent Health, Vol. 41, No. 6, 2007, pp. 14-21. https://doi.org/10.1016/j.jadohealth.2007.02.010
  48. Xu, B., Xu, Z., and Li, D., "Internet aggression in online communities : a contemporary deterrence perspective", Information Systems Journal, Vol. 26, No. 6, 2015, pp. 641-667.
  49. Ybarra, M. L. and Mitchell, K. J., "Online aggressor/targets, aggressors, and targets : a comparison of associated youth characteristics", Journal of Child Psychology and Psychiatry, Vol. 45, No. 7, 2004, pp. 1308-1316. https://doi.org/10.1111/j.1469-7610.2004.00328.x

Cited by

  1. 온라인 루머 행동에 대한 온라인 환경 요인의 영향 연구 vol.18, pp.1, 2020, https://doi.org/10.14400/jdc.2020.18.1.045