Rash impulsivity, vengefulness, virtual-self and amplification of ethical relativism on cyber-smearing against corporations

Office outbursts are often associated with impulsive reactions to something that is said or done that aggravates an individual by offending his or her beliefs, expectations, sensibilities, or principles. Vengefulness is linked to needs for retribution (until satisfied) for a perceived offense. An unsettled issue is whether these antecedents are also manifested in electronic expressions known as cyber smearing. Free speech by constitution and legislation in the US, UK, EU have been held as a cherished value and basic right, but the rights to free speech are not unlimited and in fact are legally constrained to varying degrees regarding issues such as related to privacy, defamation, and harassment. Cyber smearing is a campaign waged to damage the credibility or reputation of others over the Internet. Using a randomized study we investigated rash impulsivity, vengefulness, and anonymous identity (a virtual self), as factors contributing to cyber smearing, and we found that when people who lack self-control and have tendencies to seek revenge especially when shrouded in anonymity of virtual self and concomitantly have high tendencies toward cyber smearing. We also found that those who hold the view in which ethical standards are situational and relative amplifies these cyber smearing behaviors.

[1]  Kristine L. Nowak,et al.  Choose your "buddy icon" carefully: The influence of avatar androgyny, anthropomorphism and credibility in online interactions , 2008, Comput. Hum. Behav..

[2]  Ronald R. Sims,et al.  Designing and Delivering Business Ethics Teaching and Learning , 2006 .

[3]  Richard S. Frase,et al.  Criminal Justice System , 2001 .

[4]  Wynne W. Chin,et al.  On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution , 1995 .

[5]  P. Argenti,et al.  Reputation and the Corporate Brand , 2003 .

[6]  David J. Sharp,et al.  Integrating Ethics Content into the Core Business Curriculum: Do Core Teaching Materials Do the Job? , 2004 .

[7]  Michelle M. Kazmer Disengaging from a distributed research project: Refining a model of group departures , 2010, J. Assoc. Inf. Sci. Technol..

[8]  Nancy L. Leech,et al.  IBM SPSS for Intermediate Statistics , 2014 .

[9]  S. Milgram BEHAVIORAL STUDY OF OBEDIENCE. , 1963, Journal of abnormal psychology.

[10]  R. Gonzalez Applied Multivariate Statistics for the Social Sciences , 2003 .

[11]  H. Tajfel Social Psychology of Intergroup Relations , 1982 .

[12]  M. Workman,et al.  Punishment and ethics deterrents: A study of insider security contravention , 2007 .

[13]  Vivien K. G. Lim,et al.  Workplace Offense and Victims’ Reactions: The Effects of Victim-Offender (Dis)Similarity, Offense-Type, and Cultural Differences , 2008 .

[14]  Christine A. Henle,et al.  The Role of Ethical Ideology in Workplace Deviance , 2005 .

[15]  Mary McMurran,et al.  Personality, personality disorder, and violence , 2009 .

[16]  Geoff Walsham,et al.  Toward Ethical Information Systems: The Contribution of Discourse Ethics , 2010, MIS Q..

[17]  G. McDonald Ethical relativism vs absolutism : research implications , 2010 .

[18]  Robert J. Aalberts,et al.  Detours and frolics on the Internet: Employer liability and management control of cybertorts , 2009 .

[19]  L. Kohlberg,et al.  Developing Senses of Law and Legal Justice , 1971 .

[20]  Stephen Joseph,et al.  Assessing the component structure of four self-report measures of impulsivity , 2004 .

[21]  Andrew West,et al.  Corporate Governance Convergence and Moral Relativism , 2009 .

[22]  Peggy A. Cloninger,et al.  Can Ethics Education Improve Ethical Judgment? an Empirical Study , 2010 .

[23]  Katie Bonebrake College Students' Internet Use, Relationship Formation, and Personality Correlates , 2002, Cyberpsychology Behav. Soc. Netw..

[24]  Peter O'Connor,et al.  User-Generated Content and Travel: A Case Study on Tripadvisor.Com , 2008, ENTER.

[25]  Todd Lucas,et al.  Self and other justice beliefs, impulsivity, rumination, and forgiveness: Justice beliefs can both prevent and promote forgiveness , 2010 .

[26]  Ken Kelley’s,et al.  Multiple Regression , 2002, Deutsche medizinische Wochenschrift.

[27]  Michael Workman,et al.  A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives , 2010, Comput. Secur..

[28]  Kyoko Fukukawa,et al.  Values and the Perceived Importance of Ethics and Social Responsibility: The U.S. versus China , 2007 .

[29]  Konrad Lee,et al.  Anti-Employer Blogging: Employee Breach of the Duty of Loyalty and the Procedure for Allowing Discovery of a Blogger’s Identity Before Service of Process Is Effected , 2006 .

[30]  Allen C. Johnston,et al.  Mitigation of Identity Theft in the Information Age , 2007, Encyclopedia of Information Ethics and Security.

[31]  Kenneth L. Kraft,et al.  The perceived role of ethics and social responsibility: A scale development , 1996 .

[32]  Pamela R. Johnson,et al.  Stress and workplace violence: it takes two to tango , 1996 .

[33]  J. Etheredge The Perceived Role of Ethics and Social Responsibility: An Alternative Scale Structure , 1999 .

[34]  Monica T. Whitty,et al.  Cyber-Flirting , 2003 .

[35]  Susan R. Fussell Social and Cognitive Processes in Interpersonal Communication: Implications for Advanced Telecommunications Technologies , 1995, Hum. Factors.

[36]  Rex B. Kline,et al.  Principles and Practice of Structural Equation Modeling , 1998 .

[37]  Paul A. Mauger,et al.  The measurement of forgiveness: Preliminary research. , 1992 .

[38]  I. Iancu,et al.  Anger, impulsivity, social support, and suicide risk in patients with posttraumatic stress disorder. , 2001, The Journal of nervous and mental disease.

[39]  Gary M. Fleischman,et al.  Professional Ethical Standards, Corporate Social Responsibility, and the Perceived Role of Ethics and Social Responsibility , 2008 .

[40]  R. Snow,et al.  A Survey-Based Pedagogical Approach to Ethics in the Workplace , 1996 .

[41]  D. Meichenbaum,et al.  Training impulsive children to talk to themselves: a means of developing self-control. , 1971, Journal of abnormal psychology.

[42]  Emilios Avgouleas The Handbook of Technology Management , 2009 .

[43]  Russell A. Sabella Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress , 2007 .

[44]  David L. Turnipseed,et al.  Are good soldiers good?: Exploring the link between organization citizenship behavior and personal ethics , 2002 .

[45]  Michael E. McCullough,et al.  Vengefulness: Relationships with Forgiveness, Rumination, Well-Being, and the Big Five , 2001 .

[46]  Robert J Donovan,et al.  The relationship between youth's moral and legal perceptions of alcohol, tobacco and marijuana and use of these substances. , 2005, Health education research.

[47]  Kenneth Einar Himma Legal, Social, and Ethical Issues , 2004 .

[48]  Mustafa Ari,et al.  [Examination of anger reactions and psychiatric diagnoses in terms of gender in a group of university students having difficulty with anger control]. , 2010, Turk psikiyatri dergisi = Turkish journal of psychiatry.

[49]  Haryani Haron,et al.  Cyber stalking: The social impact of social networking technology , 2010, 2010 International Conference on Education and Management Technology.

[50]  P. R. Pearson,et al.  Age norms for impulsiveness, venturesomeness and empathy in adults , 1985 .

[51]  John Mingers,et al.  Ethics and OR: Operationalising discourse ethics , 2011, Eur. J. Oper. Res..

[52]  M. Hardey Life beyond the Screen: Embodiment and Identity through the Internet: , 2002 .

[53]  Johannes J. Britz,et al.  Sticks and stones and words that harm: Liability vs. responsibility, section 230 and defamatory speech in cyberspace , 2002, Ethics and Information Technology.

[54]  Charles R. Crowell Meta View of Information Ethics , 2007, Encyclopedia of Information Ethics and Security.

[55]  D. F. Morrison,et al.  Multivariate Statistical Methods , 1968 .

[56]  A. Bandura Social Foundations of Thought and Action , 1986 .

[57]  Peter Kirsch,et al.  Beyond revenge: Neural and genetic bases of altruistic punishment , 2011, NeuroImage.

[58]  Amy Bruckman,et al.  Decentralization in Wikipedia Governance , 2009, J. Manag. Inf. Syst..

[59]  Anthony Weston,et al.  A Rulebook for Arguments , 1987 .

[60]  Mark J. Martinko,et al.  Toward an Integrative Theory of Counterproductive Workplace Behavior: A Causal Reasoning Perspective , 2002 .

[61]  Richard A. Spinello,et al.  Cyberethics: Morality and Law in Cyberspace , 2001 .

[62]  Woo-Young Ahn,et al.  Propensity for risk taking and trait impulsivity in the Iowa Gambling Task. , 2011, Personality and individual differences.

[63]  B. Tabachnick,et al.  Using Multivariate Statistics , 1983 .

[64]  Jeff Gavin,et al.  Age/Sex/Location: Uncovering the Social Cues in the Development of Online Relationships , 2001, Cyberpsychology Behav. Soc. Netw..

[65]  Craig A. Mertler,et al.  Advanced and multivariate statistical methods: Practical application and interpretation: Sixth edition , 2001 .

[66]  Monica T. Whitty,et al.  Liberating or debilitating? An examination of romantic relationships, sexual relationships and friendships on the Net , 2008, Comput. Hum. Behav..

[67]  Richard L. Daft,et al.  Organizational information requirements, media richness and structural design , 1986 .

[68]  Nicole B. Ellison,et al.  Social Impacts , 1999 .

[69]  Llandis Barratt-Pugh,et al.  Do policies on bullying make a difference? Contrasting strategy regimes within higher education in Australia and Croatia , 2009 .

[70]  Jennifer A. Chatman,et al.  The Influence of Demographic Heterogeneity on the Emergence and Consequences of Cooperative Norms in Work Teams , 2001 .

[71]  Leon Petrażycki,et al.  Law and Morality. , 1956 .

[72]  J. Watson,et al.  Conditioned emotional reactions , 1920 .

[73]  J. Sinacore Multiple regression: Testing and interpreting interactions , 1993 .

[74]  Michelle DeMoss,et al.  Teaching Ethics and Social Responsibility: An Evaluation of Undergraduate Business Education at the Discipline Level , 2009 .

[75]  Julie J. C. H. Ryan Plagiarism, Graduate Education, and Information Security , 2007, IEEE Security & Privacy.

[76]  Paul Sergius Koku,et al.  An analysis and the effects of class-action lawsuits , 2006 .

[77]  C. Earley,et al.  Creating hybrid team cultures: An empirical test of transnational team functioning. , 2000 .

[78]  Deondra S. Conner Social comparison in virtual work environments: An examination of contemporary referent selection , 2003 .