DOI QR코드

DOI QR Code

언제 나 자신을 보호하는가? 소셜 미디어에서 온라인 성희롱에 대한 회피 동기: 위협 회피 이론을 기반으로

When do I Protect Myself? Avoidance Motivation toward Online Sexual Harassment on Social Media: A Study Based on Threat Avoidance Theory

  • 투고 : 2022.08.04
  • 심사 : 2022.09.02
  • 발행 : 2022.09.30

초록

소셜미디어의 사용이 증가함에 따라 소셜미디어 상에서의 온라인 범죄도 증가하고 있다. 본 연구에서는 다양한 범죄 중 온라인 상에서의 성희롱에 집중하여 소셜미디어 사용자들이 온라인 성희롱을 피하기 위하여 어떤 방식으로 소셜미디어를 사용하는지를 논의하고자 한다. 이를 위하여 기술 위협 회피 이론을 기반으로 회피 동기에 영향을 주는 요인을 밝혔다. 이때, 소셜미디어 상의 기술적인 기능을 회피동기를 기반하여 기능별로 반영하여 측정하였으며 환경적인 요인이 행동의 동기에 어떤 영향을 주는지 검증하기 위하여 소셜미디어 상의 성애화 정도의 영향을 검증하였다. 그 결과 소셜미디어 상에서 성애화 정도가 클수록 회피동기가 적어짐을 알 수 있었다. 이를 통해 소셜미디어 상에 성적인 분위기가 성희롱을 회피하는 것을 줄이므로 지속적인 플랫폼 상의 게시물에 대한 관리를 통하여 성희롱에 대한 소셜미디어 사용자들이 적절한 대응을 할 수 있고 플랫폼도 범죄가 줄어드는 분위기를 형성하는 것이 중요하다.

With the increasing use of social media, the occurrence of cyber crimes on social media has also increased. In this paper, we focus on online sexual harassment among various cyber crimes and discuss how social media users use social media to avoid online sexual harassment. Drawing on threat avoidance theory, the factors affecting avoidance motivation were identified. Avoidance motivation was measured based on the affordance of social media, and the influence of the degree of sexualization was tested to examine how environmental factors affect motivation behavior. The results indicated that the more users perceived sexualization on social media, the lower their motivation to avoid sexual harassment. Thus, it is important to create an atmosphere on social media where crime is minimized, and users are able to respond appropriately by continuously managing their accounts on these platforms.

키워드

과제정보

This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2019S1A5A8034695).

참고문헌

  1. Bae, J. K. (2017). The structural relationships among information security threat factors and information protection behavior of the FinTech services: Focus on theoretical perspectives of technology threat avoidance and health protective behaviors. Journal of Information Systems, 26(3), 313-337. https://doi.org/10.5859/KAIS.2017.26.3.313
  2. Kim, S., & Kim, J. (2016). A study on factors influencing privacy decision making on the internet: Focus on dual-calculus model. Journal of Information Systems, 25(3), 197-215. https://doi.org/10.5859/KAIS.2016.25.3.197
  3. Act on the protection of children and youth against sex offenses, Article 25-2(1).
  4. Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A Phishing threat avoidance perspective. Computers in Human Behavior, 38, 304-312. https://doi.org/10.1016/j.chb.2014.05.046
  5. Asante-Offei, K. O., & Yaokumah, W. (2021). Cyber-identity theft and Fintech services: Technology threat avoidance perspective. Journal of Information Technology Research, 14(3), 1-19. https://doi.org/10.4018/JITR.2021070101
  6. Benavides-Espinoza, C., & Cunningham, G. B. (2010). Bystanders' reactions to sexual harassment. Sex Roles, 63(3-4), 201-213. https://doi.org/10.1007/s11199-010-9781-7
  7. Berson, I. R. (2003). Grooming cybervictims: The psychosocial effects of online exploitation for youth. Journal of School Violence, 2(1), 5-18. https://doi.org/10.1300/J202v02n01_02
  8. Carpenter, D., Young, D. K., Barrett, P., & McLeod, A. J. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44.
  9. Chan, T. K., Cheung, C. M., & Wong, R. Y. (2019). Cyberbullying on social networking sites: The crime opportunity and affordance perspectives. Journal of Management Information Systems, 36(2), 574-609. https://doi.org/10.1080/07421222.2019.1599500
  10. Chen, D. Q., & Liang, H. (2019). Wishful thinking and IT threat avoidance: An extension to the technology threat avoidance theory. IEEE Transactions on Engineering Management, 66(4), 552-567. https://doi.org/10.1109/tem.2018.2835461
  11. Choi, D., & DeLong, M. (2019). Defining female self sexualization for the twenty-first century. Sexuality & Culture, 23(4), 1350-1371. https://doi.org/10.1007/s12119-019-09617-3
  12. Couraud, J. R. (2014). Risk perception in online communities. Doctoral dissertation, Utah State University. Retrieved from http://digitalcommons.usu.edu/etd/3898/
  13. Davern, M., Shaft, T., & Te'eni, D. (2012). Cognition matters: Enduring questions in cognitive IS research. Journal of the Association for Information Systems, 13(4), 273-314. https://doi.org/10.17705/1jais.00290
  14. Fitzgerald, L. F., & Shullman, S. L. (1993). Sexual harassment: A research analysis and agenda for the 1990s. Journal of Vocational Behavior, 42(1), 5-27. https://doi.org/10.1006/jvbe.1993.1002
  15. Fitzgerald, L. F., Hulin, C. L., & Drasgow, F. (1994). The antecedents and consequences of sexual harassment in organizations: An integrated model. In G. P. Keita & J. J. Hurrell, Jr. (Eds.), Job stress in a changing workforce: Investigating gender, diversity, and family issues (pp. 55-73). American Psychological Association.
  16. Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18(3), 382-388. https://doi.org/10.2307/3150980
  17. Gadlin, H. (1991). Careful maneuvers: Mediating sexual harassment. Negotiation Journal, 7, 139. https://doi.org/10.1111/j.1571-9979.1991.tb00610.x
  18. Gibson, J. J. (1977). The theory of affordances. Hilldale, USA, 1(2), 67-82.
  19. Gillam, A. R., & Waite, A. M. (2021). Gender differences in predictors of technology threat avoidance. Information & Computer Security, 29(3), 393-412. https://doi.org/10.1108/ICS-01-2020-0008
  20. Gruber, J. E. (1989). How women handle sexual harassment: A literature review. Sociology and Social Research, 74(1), 3-9.
  21. Gruber, J. E., & Bjorn, L. (1986). Women's responses to sexual harassment: An analysis of sociocultural, organizational, and personal resource models. Social Science Quarterly, 67(4), 814.
  22. Gumbus, A., & Meglich, P. (2013). Abusive online conduct: Discrimination and harassment in cyberspace. Journal of Management Policy and Practice, 14(5), 47-56.
  23. Gutek, B. A., & Koss, M. P. (1993). Changed women and changed organizations: Consequences of and coping with sexual harassment. Journal of Vocational Behavior, 42(1), 28-48. https://doi.org/10.1006/jvbe.1993.1003
  24. Gwartney-Gibbs, P. A., & Lach, D. H. (1992). Sociological explanations for failure to seek sexual harassment remedies. Mediation Quarterly, 9(4), 365-374. https://doi.org/10.1002/crq.3900090408
  25. Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2-24. https://doi.org/10.1108/ebr-11-2018-0203
  26. Herring, S. C. (2003). Gender and power in on-line communication. The Handbook of Language and Gender, 202-228.
  27. Jain, S., & Agrawal, S. (2020). Perceived vulnerability of cyberbullying on social networking sites: Effects of security measures, addiction and self-disclosure. Indian Growth and Development Review.
  28. Karahanna, E., Xu, S. X., Xu, Y., & Zhang, N. A. (2018). The needs-affordances-features perspective for the use of social media. MIS Quarterly, 42(3), 737-756. https://doi.org/10.25300/misq/2018/11492
  29. Knapp, D. E., Faley, R. H., Ekeberg, S. E., & Dubois, C. L. (1997). Determinants of target responses to sexual harassment: A conceptual framework. Academy of Management Review, 22(3), 687-729. https://doi.org/10.5465/AMR.1997.9708210723
  30. Lee, Y., & Larsen, K. R. (2009). Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems, 18(2), 177-187. https://doi.org/10.1057/ejis.2009.11
  31. Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71-90. https://doi.org/10.2307/20650279
  32. Liang, H., & Xue, Y. L. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 1. https://doi.org/10.17705/1jais.00219
  33. Liss, M., Erchull, M. J., & Ramsey, L. R. (2011). Empowering or oppressing? Development and exploration of the enjoyment of sexualization scale. Personality and Social Psychology Bulletin, 37(1), 55-68. https://doi.org/10.1177/0146167210386119
  34. Lynch, A. (2007). Expanding the definition of provocative dress: An examination of female flashing behavior on a college campus. Clothing and Textiles Research Journal, 25(2), 184-201. https://doi.org/10.1177/0887302X06298699
  35. Majchrzak, A., Faraj, S., Kane, G. C., & Azad, B. (2013). The contradictory influence of social media affordances on online communal knowledge sharing. Journal of Computer-Mediated Communication, 19(1), 38-55. https://doi.org/10.1111/jcc4.12030
  36. Nova, F. F., Rifat, M. R., Saha, P., Ahmed, S. I., & Guha, S. (2019, January). Online sexual harassment over anonymous social media In Bangladesh. In Proceedings of the Tenth International Conference on Information and Communication Technologies and Development, 1-12.
  37. Nowatzki, J., & Morry, M. M. (2009). Women's intentions regarding, and acceptance of, self-sexualizing behavior. Psychology of Women Quarterly, 33(1), 95-107. https://doi.org/10.1111/j.1471-6402.2008.01477.x
  38. O'Hare, E., & O'Donohue, W. (1998). Sexual harassment: Identifying risk factors. Archives of Sexual Behavior, 27, 561-580. https://doi.org/10.1023/A:1018769016832
  39. Pearce, K. E., & Vitak, J. (2016). Performing honor online: The affordances of social media for surveillance and impression management in an honor culture. New Media & Society, 18(11), 2595-2612. https://doi.org/10.1177/1461444815600279
  40. Rhoa, H., & Yub, I. (2011). The impact of information technology threat avoidance factors on avoidance behavior of user. Retrieved from https://pdfs.semanticscholar.org/a9e9/31b792c403f49a91a1dbdfdfbc34b92f1d8c.pdf
  41. Rosenstock, I. M., Strecher, V. J., & Becker, M. H. (1994). The health behavior model and HIV risk behavior change. In R. J. DiClemente & J. L. Peterson (Eds.), Preventing AIDS: Theories and methods of behavioral interventions (pp. 5-24). New York, NY: Plenum Press.
  42. Scarduzio, J. A., Sheff, S. E., & Smith, M. (2018). Coping and sexual harassment: How victims cope across multiple settings. Archives of Sexual Behavior, 47(2), 327-340. https://doi.org/10.1007/s10508-017-1065-7
  43. Thacker, R. A., & Ferris, G. R. (1991). Understanding sexual harassment in the workplace: The influence of power and politics within the dyadic interaction of harasser and target. Human Resource Management Review, 1(1), 23-37. https://doi.org/10.1016/1053-4822(91)90009-2
  44. Van Royen, K., Poels, K., & Vandebosch, H. (2016). Harmonizing freedom and protection: Adolescents' voices on automatic monitoring of social networking sites. Children and Youth Services Review, 64, 35-41. https://doi.org/10.1016/j.childyouth.2016.02.024
  45. Van Royen, K., Poels, K., Daelemans, W., & Vandebosch, H. (2015). Automatic monitoring of cyberbullying on social networking sites: From technological feasibility to desirability. Telematics and Informatics, 32(1), 89-97. https://doi.org/10.1016/j.tele.2014.04.002
  46. Vitak, J., & Kim, J. (2014, February). "You Can't Block People Offline" examining how Facebook's affordances shape the disclosure process. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 461-474).
  47. Ward, L. M., Seabrook, R. C., Grower, P., Giaccardi, S., & Lippman, J. R. (2018). Sexual object or sexual subject? Media use, self-sexualization, and sexual agency among undergraduate women. Psychology of Women Quarterly, 42(1), 29-43. https://doi.org/10.1177/0361684317737940
  48. Xue, Y., Liang, H., Mbarika, V., Hauser, R., Schwager, P., & Getahun, M. K. (2015). Investigating the resistance to telemedicine in Ethiopia. International Journal of Medical Informatics, 84(8), 537-547 https://doi.org/10.1016/j.ijmedinf.2015.04.005