Browse > Article
http://dx.doi.org/10.21219/jitam.2018.25.1.087

The Relationship between Cyber Characteristics and Malicious Comments on Facebook : The Role of Anonymity and Dissemination  

Kim, Han-Min (School of Business, Sungkyunkwan University)
Publication Information
Journal of Information Technology Applications and Management / v.25, no.1, 2018 , pp. 87-104 More about this Journal
Abstract
The internet is spreading widely and malicious comments which is a negative aspect is increasing. Previous studies have considered anonymity as a cyber characteristic of malicious comments. However, there are a theoretical confusion due to inconsistent results. In addition, the dissemination, one of cyber characteristics, have been mentioned the theoretical relationship on malicious comments, but measurement and empirical study about dissemination were still limited. Therefore, this study developed a measurement of dissemination and investigated the relationship between cyber characteristics (anonymity, dissemination) and malicious comments on Facebook. As a result of research, this study identified that anonymity is not significant on malicious comments and discovered that the dissemination of cyber space has a direct influence on malicious comments. This study suggests that information systems can contribute to malicious comments researches by proposing cyber characteristics.
Keywords
Anonymity; Dissemination; Malicious Comments; Facebook; Neutrailzation; Situational Morality;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Dooley, J. J., Pyzalski, J., and Cross, D. "Cyberbullying versus face-to-face bullying, A theoretical and conceptual review", Journal of Psychology, Vol. 217, 2009, pp. 182-188.
2 Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error", Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50.   DOI
3 Hite, D. M., Voelker, T., and Robertson, A., "Measuring Perceived Anonymity : The Development of a Context Independent Instrument", Journal of Methods and Measurement in the Social Sciences, Vol. 5, No. 1, 2014, pp. 22-39.   DOI
4 Hu, Q., Xu, Z., Dinev, T., and Ling, H., "Does deterrence work in reducing information security policy abuse by employees", Communications of the ACM, Vol. 54, No. 6, 2011, pp. 54-60.   DOI
5 Huang, Y. and Chou, C., "An analysis of multiple factors of cyberbullying among junior high school students in Taiwan", Computers in Human Behavior, Vol. 26, No. 6, 2010, pp. 1581-1590.   DOI
6 Hughes, D. J., Rowe, M., Batey, M., and Lee, A., "A tale of two sites : Twitter vs. Face book and the personality predictors of social media usage", Computers in Human Behavior, Vol. 28, No. 2, 2012, pp. 561-569.   DOI
7 Hutchens, M. J., Cicchirillo, V. J., and Hmielowski, J. D., "How could you think that?!?! : Understanding intentions to engage in political flaming", New media & Society, Vol. 17, No. 8, 2015, pp. 1201-1219.   DOI
8 Jessup, L. M., Connolly, T., and Galegher, J., "The Effects of Anonymity on GDSS Group Process in Automated Group Problem Solving", MIS Quarterly, Vol. 14, No. 3, 1990, pp. 312-321.
9 Kokkinos, C. M., Baltzidis, E., and Xynogala, D., "Prevalence and personality correlates of Facebook bullying among university undergraduates", Computers in Human Behavior, Vol. 55, 2016, pp. 840-850   DOI
10 Kwan, G. C. E. and Skoric, M. M., "Face book bullying : An extension of battles in school", Computers in Human Behavior, Vol. 29, No. 1, 2013, pp. 16-25.   DOI
11 Lapidot-Lefler, N. and A. Barak, "Effects of anonymity, invisibility, and lack of eyecontact on toxic online disinhibition", Computers in Human Behavior, Vol. 28, No. 2, 2012, pp. 434-443.   DOI
12 Lee, S. H. and Kim, H. W., "Why People Post Benevolent and Malicious Comments Online", Communications of the ACM, Vol. 58, No. 11, 2015, pp. 74-79.   DOI
13 Lewis, H. B., Shame and Guilt in Neurosis, International Universities Press, New York, 1971.
14 Li, Q., "New bottle but old wine : A research of cyberbullying in schools", Computers in Human Behavior, Vol. 23, 2007, pp. 1777-1791.   DOI
15 Lowry, P. B., Moody, G. D., and Chatterjee, S., "Using it Design to Prevent Cyberbullying Journal of Management Information Systems", Journal of Management Information Systems, 2017, Forthcoming.
16 Lowry, P. B., Zhang, J., Wang, C., and Siponen, M., "Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model", Information Systems Research, Vol. 27, No. 4, 2016, pp. 962-986.   DOI
17 Moore, M. J., Nakano, T., Enomoto, A., and Suda, T., "Anonymity and roles associated with aggressive posts in an online forum", Computers in Human Behavior, Vol. 28, No. 3, 2012, pp. 861-867.   DOI
18 Moores, T. T. and Chang, J. C. J., "Ethical decision making in software piracy : initial development and test of a four-component model", MIS Quarterly, Vol. 30, No. 1, 2006, pp. 167-180.   DOI
19 Paternoster, R. and Simpson, S., "Sanction Threats and Appeals to Morality : Testing a Rational Choice Model of Corporate Crime", Law & Society Review, Vol. 30, No. 3, 1996, pp. 549-584.   DOI
20 Obermann, M. L., "Moral disengagement in self-reported and peer-nominated school bullying", Aggressive Behavior, Vol. 37, No. 2, 2011, pp. 133-144.   DOI
21 Pempek, T. A., Yermolayeva, Y. A., and Calvert, S. L., "College students' social networking experiences on Facebook", Journal of Applied Developmental Psychology, Vol. 30, No. 3, 2009, pp. 227-238.   DOI
22 Podsakoff, P. M., MacKenzie, S. B., Lee, J., and Podsakoff, N. P., "Common Method Biases in Behavioral Research : A Critical Review of the Literature and Recommended Remedies", Journal of Applied Psychology, Vol. 88, No. 5, 2003, pp. 879-903.   DOI
23 Pornari, C. D. and Wood, J., "Peer and Cyber Aggression in Secondary School Students : The Role of Moral Disengagement, Hostile Attribution Bias, and Outcome Expectancies", Aggressive Behavior, Vol. 36, No. 2, 2010, pp. 81-94.   DOI
24 Postmes, T. and Spears, R., "Deindividuation and antinormative behavior : A meta-analysis", Psychological Bulletin, Vol. 123, No. 3, 1998, pp. 238-259.   DOI
25 Prosecution service, Internet malicious commentator processing plan implementation, http://spogood.tistory.com/263 accessed 16 April 2015.
26 Reinig, B. A. and Mejias, B. J., "The effects of national culture and anonymity on flaming and criticalness in GSS-supported discussions", Small Group Research, Vol. 35, No. 6, 2004, pp. 698-723.   DOI
27 Renati, R., Berrone, C., and Zanetti, M. A., "Morally Disengaged and Unempathic : Do Cyberbullies Fit These Definitions? An Exploratory Study", Cyberpsychology, Behavior, and Social Networking, Vol. 15, No. 8, 2012, pp. 391-398.   DOI
28 Siponen, M. and Vance, A., "Neutralization : New Insights into the Problem of Employee Information Systems Security Policy Violations", MIS Quarterly, Vol. 34, No. 3, 2010, pp. 487-502.   DOI
29 Rosner, L. and Kramer, N. C., "Verbal Venting in the Social Web : Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments", Social Media+Society, First Published August 16, 2016, pp. 1-13.
30 Sari, S. V. and Camadan, F., "The new face of violence tendency : Cyber bullying perpetrators and their victims", Computers in Human Behavior, Vol. 59, No. 1, 2016, pp. 317-326.   DOI
31 Siponen, M., Vance, A., and Willison, R., "New insights into the problem of software piracy : The effects of neutralization, shame, and moral beliefs", Information & Management, Vol. 49, No. 7-8, 2012, pp. 334-341.   DOI
32 Statista, "Number of monthly active Face book users worldwide as of 2nd quarter 2017 (in millions)", 2017, Available at http://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/.
33 Sticca, F. and F. Perren, "Is Cyberbullying Worse than Traditional Bullying? Examining the Differential Roles of Medium, Publicity, and Anonymity for the Perceived Severity of Bullying", Journal of Youth and Adolescence, Vol. 42, No. 5, 2013, pp. 739-750.   DOI
34 Suler, J., "The Online Disinhibition Effect", Cyberpsychology and Behavior, Vol. 7, No. 3, 2004, pp. 321-326.   DOI
35 Thong, J. Y. L. and Yap, C. S., "Testing an Ethical Decision-Making Theory : The Case of Softlifting", Journal of Management Information Systems, Vol. 15, No. 1, 1998, pp. 213-237.   DOI
36 Tittle, C. R., "Continuing the discussion of control balance", Theoretical Criminology, Vol. 3, No. 3, 1999, pp. 344-352.   DOI
37 Ybarra, M. L. and Mitchell, K. J., "Online aggressor/targets, aggressors, and targets : a comparison of associated youth characteristics", Journal of Child Psychology and Psychiatry, Vol. 45, No. 7, 2004, pp. 1308-1316.   DOI
38 Tittle, C. R., "Thoughts Stimulated by Braithwaite's Analysis of Control Balance Theory", Theoretical Criminology, Vol. 1, No. 1, 1997, 99-110.   DOI
39 Williams, K. R. and Guerra, N. G., "Prevalence and predictors of Internet bullying", Journal of Adolescent Health, Vol. 41, No. 6, 2007, pp. 14-21.   DOI
40 Xu, B., Xu, Z., and Li, D., "Internet aggression in online communities : a contemporary deterrence perspective", Information Systems Journal, Vol. 26, No. 6, 2015, pp. 641-667.
41 Armstrong, J. S. and Overton, T. S., "Estimating nonresponse bias in mail surveys", Journal of Marketing Research, Vol. 14, No. 3, 1977, pp. 396-402.   DOI
42 Almeida, A., Correia, I., and Marinho, S., "Moral Disengagement, Normative Beliefs of Peer Group, and Attitudes Regarding Roles in Bullying", Journal of school Violence, Vol. 9, No. 1, 2009, pp. 23-36.   DOI
43 Anderson, J. and Gerbing, D., "Structural Equation Modeling in Practice : A Review and Recommended Two-Step Approach", Psychological Bulletin, Vol. 103, No. 4, 1988, pp. 411-423.   DOI
44 Antoniadou, N. and Kokkinos, C. M., "Cyber and school bullying : Same or different phenomena", Aggression and Violent Behavior, Vol. 25, 2015, pp. 363-372.   DOI
45 Bachman, R., Paternoster, R., and Ward, S., "The rationality of sexual offending : testing a deterrence/rational choice conception of sexual assault", Law and Society, Vol. 26, No. 2, 1992, pp. 343-372.   DOI
46 Doane, A. N., Pearson, M. R., and Kelley, M. L., "Predictors of cyberbullying perpetration among college students : An application of the Theory of Reasoned Action", Computers in Human Behavior, Vol. 36, 2014, pp. 154-162.   DOI
47 Baron, R. M. and Kenny, D. A., "The moderator-mediator variable distinction in social psychological research : Conceptual, strategic, and statistical considerations", Journal of Personality and Social Psychology, Vol. 51, No. 6, 1986, pp. 1173-1182.   DOI
48 Chin, W., "Issues and Opinion on Structural Equation Modeling", MIS Quarterly, Vol. 22, No. 1, 1998, pp. 7-16.
49 Cho, D. and Kwon, K. H., "The impacts of identity verification and disclosure of social cues on flaming in online user comments", Computers in Human Behavior, Vol. 51, Part. A, October, 2015, pp. 363-372.   DOI