Browse > Article
http://dx.doi.org/10.15813/kmr.2022.23.3.003

When do I Protect Myself? Avoidance Motivation toward Online Sexual Harassment on Social Media: A Study Based on Threat Avoidance Theory  

Lee, Seohyun (Kyungpook National University)
Lee, Saerom (Kyungpook National University)
Kwak, Dong-heon (Kent State University)
Publication Information
Knowledge Management Research / v.23, no.3, 2022 , pp. 45-64 More about this Journal
Abstract
With the increasing use of social media, the occurrence of cyber crimes on social media has also increased. In this paper, we focus on online sexual harassment among various cyber crimes and discuss how social media users use social media to avoid online sexual harassment. Drawing on threat avoidance theory, the factors affecting avoidance motivation were identified. Avoidance motivation was measured based on the affordance of social media, and the influence of the degree of sexualization was tested to examine how environmental factors affect motivation behavior. The results indicated that the more users perceived sexualization on social media, the lower their motivation to avoid sexual harassment. Thus, it is important to create an atmosphere on social media where crime is minimized, and users are able to respond appropriately by continuously managing their accounts on these platforms.
Keywords
Online sexual harassment; Cyber crime; Avoidance motivation; Threat avoidance theory; Affordance perspectives; Sexualization;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Gadlin, H. (1991). Careful maneuvers: Mediating sexual harassment. Negotiation Journal, 7, 139.   DOI
2 Lynch, A. (2007). Expanding the definition of provocative dress: An examination of female flashing behavior on a college campus. Clothing and Textiles Research Journal, 25(2), 184-201.   DOI
3 Majchrzak, A., Faraj, S., Kane, G. C., & Azad, B. (2013). The contradictory influence of social media affordances on online communal knowledge sharing. Journal of Computer-Mediated Communication, 19(1), 38-55.   DOI
4 Nowatzki, J., & Morry, M. M. (2009). Women's intentions regarding, and acceptance of, self-sexualizing behavior. Psychology of Women Quarterly, 33(1), 95-107.   DOI
5 O'Hare, E., & O'Donohue, W. (1998). Sexual harassment: Identifying risk factors. Archives of Sexual Behavior, 27, 561-580.   DOI
6 Rhoa, H., & Yub, I. (2011). The impact of information technology threat avoidance factors on avoidance behavior of user. Retrieved from https://pdfs.semanticscholar.org/a9e9/31b792c403f49a91a1dbdfdfbc34b92f1d8c.pdf
7 Rosenstock, I. M., Strecher, V. J., & Becker, M. H. (1994). The health behavior model and HIV risk behavior change. In R. J. DiClemente & J. L. Peterson (Eds.), Preventing AIDS: Theories and methods of behavioral interventions (pp. 5-24). New York, NY: Plenum Press.
8 Vitak, J., & Kim, J. (2014, February). "You Can't Block People Offline" examining how Facebook's affordances shape the disclosure process. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 461-474).
9 Lee, Y., & Larsen, K. R. (2009). Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software. European Journal of Information Systems, 18(2), 177-187.   DOI
10 Herring, S. C. (2003). Gender and power in on-line communication. The Handbook of Language and Gender, 202-228.
11 Liang, H., & Xue, Y. L. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 1.   DOI
12 Couraud, J. R. (2014). Risk perception in online communities. Doctoral dissertation, Utah State University. Retrieved from http://digitalcommons.usu.edu/etd/3898/
13 Act on the protection of children and youth against sex offenses, Article 25-2(1).
14 Benavides-Espinoza, C., & Cunningham, G. B. (2010). Bystanders' reactions to sexual harassment. Sex Roles, 63(3-4), 201-213.   DOI
15 Thacker, R. A., & Ferris, G. R. (1991). Understanding sexual harassment in the workplace: The influence of power and politics within the dyadic interaction of harasser and target. Human Resource Management Review, 1(1), 23-37.   DOI
16 Van Royen, K., Poels, K., & Vandebosch, H. (2016). Harmonizing freedom and protection: Adolescents' voices on automatic monitoring of social networking sites. Children and Youth Services Review, 64, 35-41.   DOI
17 Nova, F. F., Rifat, M. R., Saha, P., Ahmed, S. I., & Guha, S. (2019, January). Online sexual harassment over anonymous social media In Bangladesh. In Proceedings of the Tenth International Conference on Information and Communication Technologies and Development, 1-12.
18 Berson, I. R. (2003). Grooming cybervictims: The psychosocial effects of online exploitation for youth. Journal of School Violence, 2(1), 5-18.   DOI
19 Chen, D. Q., & Liang, H. (2019). Wishful thinking and IT threat avoidance: An extension to the technology threat avoidance theory. IEEE Transactions on Engineering Management, 66(4), 552-567.   DOI
20 Chan, T. K., Cheung, C. M., & Wong, R. Y. (2019). Cyberbullying on social networking sites: The crime opportunity and affordance perspectives. Journal of Management Information Systems, 36(2), 574-609.   DOI
21 Jain, S., & Agrawal, S. (2020). Perceived vulnerability of cyberbullying on social networking sites: Effects of security measures, addiction and self-disclosure. Indian Growth and Development Review.
22 Gibson, J. J. (1977). The theory of affordances. Hilldale, USA, 1(2), 67-82.
23 Gruber, J. E., & Bjorn, L. (1986). Women's responses to sexual harassment: An analysis of sociocultural, organizational, and personal resource models. Social Science Quarterly, 67(4), 814.
24 Gwartney-Gibbs, P. A., & Lach, D. H. (1992). Sociological explanations for failure to seek sexual harassment remedies. Mediation Quarterly, 9(4), 365-374.   DOI
25 Liss, M., Erchull, M. J., & Ramsey, L. R. (2011). Empowering or oppressing? Development and exploration of the enjoyment of sexualization scale. Personality and Social Psychology Bulletin, 37(1), 55-68.   DOI
26 Pearce, K. E., & Vitak, J. (2016). Performing honor online: The affordances of social media for surveillance and impression management in an honor culture. New Media & Society, 18(11), 2595-2612.   DOI
27 Fitzgerald, L. F., Hulin, C. L., & Drasgow, F. (1994). The antecedents and consequences of sexual harassment in organizations: An integrated model. In G. P. Keita & J. J. Hurrell, Jr. (Eds.), Job stress in a changing workforce: Investigating gender, diversity, and family issues (pp. 55-73). American Psychological Association.
28 Ward, L. M., Seabrook, R. C., Grower, P., Giaccardi, S., & Lippman, J. R. (2018). Sexual object or sexual subject? Media use, self-sexualization, and sexual agency among undergraduate women. Psychology of Women Quarterly, 42(1), 29-43.   DOI
29 Scarduzio, J. A., Sheff, S. E., & Smith, M. (2018). Coping and sexual harassment: How victims cope across multiple settings. Archives of Sexual Behavior, 47(2), 327-340.   DOI
30 Van Royen, K., Poels, K., Daelemans, W., & Vandebosch, H. (2015). Automatic monitoring of cyberbullying on social networking sites: From technological feasibility to desirability. Telematics and Informatics, 32(1), 89-97.   DOI
31 Xue, Y., Liang, H., Mbarika, V., Hauser, R., Schwager, P., & Getahun, M. K. (2015). Investigating the resistance to telemedicine in Ethiopia. International Journal of Medical Informatics, 84(8), 537-547   DOI
32 Asante-Offei, K. O., & Yaokumah, W. (2021). Cyber-identity theft and Fintech services: Technology threat avoidance perspective. Journal of Information Technology Research, 14(3), 1-19.   DOI
33 Bae, J. K. (2017). The structural relationships among information security threat factors and information protection behavior of the FinTech services: Focus on theoretical perspectives of technology threat avoidance and health protective behaviors. Journal of Information Systems, 26(3), 313-337.   DOI
34 Kim, S., & Kim, J. (2016). A study on factors influencing privacy decision making on the internet: Focus on dual-calculus model. Journal of Information Systems, 25(3), 197-215.   DOI
35 Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A Phishing threat avoidance perspective. Computers in Human Behavior, 38, 304-312.   DOI
36 Carpenter, D., Young, D. K., Barrett, P., & McLeod, A. J. (2019). Refining technology threat avoidance theory. Communications of the Association for Information Systems, 44.
37 Choi, D., & DeLong, M. (2019). Defining female self sexualization for the twenty-first century. Sexuality & Culture, 23(4), 1350-1371.   DOI
38 Davern, M., Shaft, T., & Te'eni, D. (2012). Cognition matters: Enduring questions in cognitive IS research. Journal of the Association for Information Systems, 13(4), 273-314.   DOI
39 Gruber, J. E. (1989). How women handle sexual harassment: A literature review. Sociology and Social Research, 74(1), 3-9.
40 Gillam, A. R., & Waite, A. M. (2021). Gender differences in predictors of technology threat avoidance. Information & Computer Security, 29(3), 393-412.   DOI
41 Gumbus, A., & Meglich, P. (2013). Abusive online conduct: Discrimination and harassment in cyberspace. Journal of Management Policy and Practice, 14(5), 47-56.
42 Gutek, B. A., & Koss, M. P. (1993). Changed women and changed organizations: Consequences of and coping with sexual harassment. Journal of Vocational Behavior, 42(1), 28-48.   DOI
43 Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2-24.   DOI
44 Karahanna, E., Xu, S. X., Xu, Y., & Zhang, N. A. (2018). The needs-affordances-features perspective for the use of social media. MIS Quarterly, 42(3), 737-756.   DOI
45 Knapp, D. E., Faley, R. H., Ekeberg, S. E., & Dubois, C. L. (1997). Determinants of target responses to sexual harassment: A conceptual framework. Academy of Management Review, 22(3), 687-729.   DOI
46 Liang, H., & Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71-90.   DOI
47 Fitzgerald, L. F., & Shullman, S. L. (1993). Sexual harassment: A research analysis and agenda for the 1990s. Journal of Vocational Behavior, 42(1), 5-27.   DOI
48 Fornell, C., & Larcker, D. F. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of Marketing Research, 18(3), 382-388.   DOI