Browse > Article
http://dx.doi.org/10.7838/jsebs.2019.24.2.179

Effects of Information Overload on Hostile Behaviors Online  

Jin, Sanghyung (Standigm)
Rhee, Cheul (Department of e-business, Ajou University)
Jang, Youngbin (Department of Agricultural Economics and Rural Development, Seoul National University)
Publication Information
The Journal of Society for e-Business Studies / v.24, no.2, 2019 , pp. 179-197 More about this Journal
Abstract
Although there have been lots of studies about users' behaviors online, few have explored the mechanism of hostile behaviors. In this sense, this study aims at discovering what may elevate users' hostile behaviors. More specifically, we tried to find the relationship between flaming behavior and perception factors such as perceived risk, anonymity and expected emotional reaction. A survey was conducted to investigate the relationship of the above variables. As a result, all these variables show significant effects on flaming, and information overload are found to act as a moderator. We carefully conclude that flaming in online community can be reduced by preventing information overload each user perceives.
Keywords
Flaming; Information Overload; Public Self-Awareness; Perceived Identifiability; Affective Social Presence;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Riva, G., Mantovani, F., Capideville, C. S., Preziosa, A., Morganti, F., Villani, D., Gaggioli, A., Botella, C., and Alcañiz, M., "Affective interactions using virtual reality: the link between presence and emotions," Cyberpsychology & Behavior, Vol. 10, No. 1, pp. 45-56, 2007.   DOI
2 Siegel, J., Dubrovsky, V., Kiesler, S., and McGuire, T. W., "Group Processes in Computer-Mediated Communication," Organizational Behavior and Human Decision Processes, Vol. 37, No. 2, pp. 157-187, 1986.   DOI
3 Slonje, R., and Smith, P. K., "Cyberbullying: Another Main Type of Bullying?," Scandinavian Journal of Psychology, Vol. 49, No. 2, pp. 147-154, 2008.   DOI
4 Sourander, A., Brunstein Klomek, A., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T., and Helenius, H., "Psychosocial Risk Factors Associated with Cyberbullying among Adolescents: A Population-Based Study," Archives of General Psychiatry, Vol. 67, No. 7, pp. 720-728, 2010.   DOI
5 Suler, J., "The Online Disinhibition Effect," Cyberpsychology & behavior: the impact of the Internet, multimedia and virtual reality on behavior and society, Vol. 7, No. 3, pp. 321-326, 2004.   DOI
6 Tanis, M. and Postmes, T., "Two Faces of Anonymity: Paradoxical Effects of Cues to Identity in Cmc," Computers in Human Behavior, Vol. 23, No. 2, pp. 955-970, 2007.   DOI
7 Whittaker, S., Terveen, L., Hill, W., and Cherny, L., "The Dynamics of Mass Interaction," CSCW '98: Proceedings of the 1998 ACM conference on Computer supported cooperative work: ACM Press, pp. 79-91, 1998.
8 Ramaprasad, A. and Rai, A., "Envisioning Management of Information," Omega, Vol. 24, No. 2, pp. 79-193, 1996.
9 Alonzo, M. and Aiken, M., "Flaming in Electronic Communication," Decision Support Systems, Vol. 36, No. 3, pp. 205-213, 2004.   DOI
10 Ang, R. P., Tan, K. A., and Talib Mansor, A., "Normative Beliefs About Aggression as a Mediator of Narcissistic Exploitativeness and Cyberbullying," Journal of interpersonal violence, Vol. 26, No. 13, pp. 2619-2634, 2011.   DOI
11 Bargh, J. A., McKenna, K. Y. A., and Fitzsimons, G. M., "Can You See the Real Me? Activation and Expression of the "True Self" on the Internet," Journal of Social Issues, Vol. 58, No. 1, pp. 33-48, 2002.   DOI
12 Baron, R. M. and Kenny, D. A., "The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations," Journal of Personality and Social Psychology, Vol. 51, No. 6, 1986.
13 Biocca, F., Harms, C., and Gregg, J., "The Networked Minds Measure of Social Presence: Pilot Test of the Factor Structure and Concurrent Validity," 4th annual International Workshop on Presence, Philadelphia, 2001.
14 Blumler, J. G., "The Role of Theory in Uses and Gratifications Studies," Communication Research, Vol. 6, No. 1, pp. 9-36, 1979.   DOI
15 Fanti, K. A., Demetriou, A. G., and Hawa, V. V., "A Longitudinal Study of Cyberbullying: Examining Riskand Protective Factors," European Journal of Developmental Psychology, Vol. 9, No. 2, pp. 168-181, 2012.   DOI
16 Cho, D. and Kwon, K. H., "The impacts of identity verification and disclosure of social cues on flaming in online user comments," Computersin Human Behavior, Vol. 51, pp. 363-372, 2015.   DOI
17 Christopherson, K. M., "The Positive and Negative Implications of Anonymity in Internet Social Interactions: "On the Internet, Nobody Knows You're a Dog"," Computers in Human Behavior, Vol. 23, No. 6, pp. 3038-3056, 2007.   DOI
18 Dumont, G. and Candler, G., "Virtual Jungles: Survival, Accountability, and Governance in Online Communities," The American Review of Public Administration, Vol. 35, No. 3, pp. 287-299, 2005.   DOI
19 Derks, D., Fischer, A. H., and Bos, A. E., "The role of emotion in computermediated communication: A review," Computers in human behavior, Vol. 24, No. 3, pp. 766-785, 2008.   DOI
20 Eppler, M. J. and Mengis, J., "The concept of information overload: A review of literature from organization science, accounting, marketing, MIS, and related disciplines," The information society, Vol. 20, No. 5, pp. 325-344, 2004.   DOI
21 Fenigstein, A. and Vanable, P. A., "Paranoia and self-consciousness," Journal of Personality and Social Psychology, Vol. 62, No. 1, 1992.
22 Fornell, C. and Larcker, D. F., "Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics," Journal of Marketing Research, Vol. 18, No. 3, pp. 382-388, 1981.   DOI
23 Hallikas, J., Karvonen, I., Pulkkinen, U., Virolainen, V.-M., and Tuominen, M., "Risk Management Processes in Supplier Networks," International Journal of Production Economics, Vol. 90, No. 1, pp. 47-58, 2004.   DOI
24 Kiesler, S., Zubrow, D., Moses, A. M., and Geller, V., "Affect in computer-mediated communication: An experiment in synchronous terminal-to-terminal discussion," Human Computer Interaction, Vol. 1, pp. 77-104, 1985.   DOI
25 Jane, E. A., "Flaming? What flaming? The pitfalls and potentials of researching online hostility. Ethics and Information Technology," Vol. 17, No. 1, pp. 65-87, 2015.   DOI
26 Jessup, L. M., Connolly, T., and Tansik, D. A., "Toward Atheory of Automated Group Work the Deindividuating Effects of Anonymity," Small group research, Vol. 21, No. 3, pp. 333-348, 1990.   DOI
27 Joinson, A. N., "Self-Disclosure in Computer-Mediated Communication: The Role of Self-Awareness and Visual Anonymity," European Journal of Social Psychology, Vol. 31, No. 2, pp. 177-192, 2001.   DOI
28 Jones, Q., Ravid, G., and Rafaeli, S., "Information Overload and the Message Dynamics of Online Interaction Spaces: A Theoretical Model and Empirical Exploration," Information Systems Research, Vol. 15, No. 2, pp. 194-210, 2004.   DOI
29 Kiesler, S., Siegel, J., and McGuire, T. W., "Social psychological aspects of computer-mediated communication. American Psychologist," Vol. 39, No. 10, pp. 1123-1134, 1984.   DOI
30 Lee, J. M., Shin K. S., and Suh, A. Y., "The Influence of Self-discrepancy in Virtual and Cross Worlds on Individuals Activities in Online Communities," The Journal of Society for e-Business Studies, Vol. 16, No. 3, pp. 23-45, 2011.   DOI
31 Kahneman, D. and Tversky, A., "Prospect Theory: An Analysis of Decision under Risk," Econometrica: Journal of the Econometric Society, pp. 99-127, 2013.
32 Kiesler, S., Siegel, J., and McGuire, T. W., "Social Psychological Aspects of Computer-Mediated Communication," American Psychologist, Vol. 39, No. 10, 1984.
33 Kowalski, R. M. and Limber, S. P., "Electronic Bullying among Middle School Students," Journal of Adolescent Health, Vol. 41, No. 6, (Supplement), pp. S22-S30, 2007.   DOI
34 Ning Shen, K. and Khalifa, M., "Exploring Multidimensional Conceptualization of Social Presence in the Context of Online Communities," International Journal of Human-Computer Interaction, Vol. 24, No. 7, pp. 722-748, 2008.   DOI
35 Lapidot-Lefler, N. and Barak, A., "Effects of Anonymity, Invisibility, and Lack of Eye-Contact on Toxic Online Disinhibition," Computers in Human Behavior, Vol. 28, No. 2, pp. 434-443, 2012.   DOI
36 Lea, M., O'Shea, T., Fung, P., and Spears, R., 'Flaming' in computer-mediated communication: Observations, explanations, implications, 1992.
37 Lewis, D. D. and Knowles, K. A., "Threading Electronic Mail: A Preliminary Study," Information Processing & Management, Vol. 33, No. 2, pp. 209-217, 1997.   DOI
38 Midha, V. and Nandedkar, A., "Impact of Similarity between Avatar and Their Users on Their Perceived Identifiability: Evidence from Virtual Teams in Second Life Platform," Computers in Human Behavior, Vol. 28, No. 3, pp. 929-932, 2012.   DOI
39 Moor, P. J., Heuvelman, A., and Verleur, R., "Flaming on Youtube," Computers in Human Behavior, Vol. 26, No. 6, pp. 1536-1546, 2010.   DOI
40 Nunnally, J. C. and Bernstein, I. H., Psychometric Theory, McGraw-Hill New York, 1978.
41 Pinsonneault, A. and Heppel, N., "Anonymity in Group Support Systems Research: A New Conceptualization, Measure, and Contingency Framework," Journal of Management Information Systems, Vol. 14, No. 3, pp. 89-108, 1997.   DOI
42 Podsakoff, P. M. and Organ, D. W., "Self-Reports in Organizational Research: Problems and Prospects," Journal of Management, Vol. 12, No. 4, pp. 531-544, 1986.   DOI
43 Prentice-Dunn, S. and Rogers, R. W., "Effects of Public and Private Self- Awareness on Deindividuation and Aggression," Journal of Personality and Social Psychology, Vol. 43, No. 3, 1982.