An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism

Abstract Scholars are increasingly calling for a deeper understanding of cyberharassment (CH) with the goal of devising policies, procedures, and technologies to mitigate it. Accordingly, we conducted CH research that (1) integrated social learning theory (SLT) and self-control theory (SCT); (2) empirically studied this model with two contrasting samples, experienced cyberharassers and less experienced cyberharassers; and (3) conducted post hoc tests to tease out the differences between the two samples. We show that for less experienced cyberharassers, CH is largely a social-psychological-technological phenomenon; whereas, for experienced cyberharassers, CH is primarily a psychological-technological phenomenon. Our study makes a threefold contribution: (1) it shows the value of integrating two theories in a holistic and parsimonious manner to explain CH; (2) it shows that SCT alone is a more relevant framework for experienced cyberharassers, whereas a combination of SCT and SLT better explains less experienced cyberharassers; and (3) it reveals that the role of technology in fostering CH is crucial, regardless of the sample. The differential, yet consistent, findings demonstrate that addressing CH is contingent upon not only identifying theoretical approaches but also identifying the particular samples to which these theoretical approaches will be more suitable. Of several implications for practice, the most important may be that anonymity, asynchronicity, and lack of monitoring are the technology choices that foster CH, and thus these should be mitigated in designing social media and other communication technologies

[1]  Gillian R. Hayes,et al.  Acceptable Use of Technology in Schools: Risks, Policies, and Promises , 2010, IEEE Pervasive Computing.

[2]  Michael D. Reisig,et al.  LOW SELF‐CONTROL, ROUTINE ACTIVITIES, AND FRAUD VICTIMIZATION* , 2008 .

[3]  Catherine D. Marcum,et al.  Music Piracy and Neutralization: A Preliminary Trajectory Analysis from Short-Term Longitudinal Data , 2008 .

[4]  T. Postmes,et al.  Social Influence in Computer-Mediated Communication: The Effects of Anonymity on Group Behavior , 2001 .

[5]  Wesley G. Jennings,et al.  Examining the Influence of Delinquent Peer Association on the Stability of Self-Control in Late Childhood and Early Adolescence: Toward an Integrated Theoretical Model , 2013 .

[6]  Paul Benjamin Lowry,et al.  Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It , 2014, IEEE Transactions on Professional Communication.

[7]  Andrea Everard,et al.  Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..

[8]  Elias Aboujaoude,et al.  Cyberbullying: Review of an Old Problem Gone Viral. , 2015, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[9]  Bodo B. Schlegelmilch,et al.  How Techniques of Neutralization Legitimize Norm- and Attitude-Inconsistent Consumer Behavior , 2013, Journal of Business Ethics.

[10]  D. Whetten What Constitutes a Theoretical Contribution , 1989 .

[11]  T. Holt,et al.  The Effect of Self-Control on Victimization in the Cyberworld , 2010 .

[12]  R. Clarke,et al.  Explaining High-Risk Concentrations of Crime in the City , 2014 .

[13]  Graham Farrell,et al.  Police performance measurement: an annotated bibliography , 2015 .

[14]  Wanda J. Orlikowski,et al.  Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..

[15]  Rajeev Sharma,et al.  Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research , 2009 .

[16]  T. Pratt,et al.  THE EMPIRICAL STATUS OF GOTTFREDSON AND HIRSCHI'S GENERAL THEORY OF CRIME: A META‐ANALYSIS , 2000 .

[17]  Paul A. Pavlou,et al.  Psychological Contract Violation in Online Marketplaces: Antecedents, Consequences, and Moderating Role , 2005, Inf. Syst. Res..

[18]  A. Brink,et al.  Affective Experiences with Sex and Sexual Satisfaction among Dutch Adolescents: the Consequences of Online and Offline Communication about Sexuality with Friends , 2014 .

[19]  Sarah J Beal,et al.  The Role of Emotional Reactivity, Self-regulation, and Puberty in Adolescents' Prosocial Behaviors. , 2012, Social development.

[20]  Mark Capper,et al.  Exploiting the web for education: An anonymous asynchronous role simulation , 1999 .

[21]  Peter Fleming,et al.  From Borrowing to Blending: Rethinking the Processes of Organizational Theory Building , 2011 .

[22]  Danielle M. Reynald,et al.  Toward the Adaptation of Routine Activity and Lifestyle Exposure Theories to Account for Cyber Abuse Victimization , 2016 .

[23]  Harold G. Grasmick,et al.  Testing the Core Empirical Implications of Gottfredson and Hirschi's General Theory of Crime , 1993 .

[24]  Paul Benjamin Lowry,et al.  Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations , 2015, MIS Q..

[25]  Christopher J. Sullivan,et al.  Investigating the Functional Form of the Self-control–Delinquency Relationship in a Sample of Serious Young Offenders , 2014 .

[26]  David A. Makin,et al.  Does Social Learning Theory Condition the Effects of Low Self-Control on College Students' Software Piracy? , 2004 .

[27]  Christopher J. Schreck Criminal victimization and low self-control: An extension and test of a general theory of crime , 1999 .

[28]  Qing Li,et al.  New bottle but old wine: A research of cyberbullying in schools , 2007, Comput. Hum. Behav..

[29]  Paul Benjamin Lowry,et al.  Using IT Design to Prevent Cyberbullying , 2017, J. Manag. Inf. Syst..

[30]  T. Postmes,et al.  Breaching or Building Social Boundaries? , 1998 .

[31]  George E. Higgins,et al.  Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software , 2006 .

[32]  Sandra Wills,et al.  Reusability of Online Role Play: Learning Objects or Learning Designs? , 2009 .

[33]  R. Bachman Explaining Criminals and Crime: Essays in Contemporary Criminological Theory , 2000 .

[34]  B. Spears,et al.  Emerging Methodological Strategies to Address Cyberbullying: Online Social Marketing and Young People as Co-Researchers , 2013 .

[35]  Ronald L. Akers,et al.  The Social Learning Theory of Crime and Deviance , 2009 .

[36]  Suzanne Rivard,et al.  Editor's comments: the ions of theory construction , 2014 .

[37]  James J. Gross,et al.  Getting Our Act Together: Toward a General Model of Self-Control , 2010 .

[38]  M. Huss,et al.  The Assessment of Cyberstalking: An Expanded Examination Including Social Networking, Attachment, Jealousy, and Anger in Relation to Violence and Abuse , 2013, Violence and Victims.

[39]  R. Wortley,et al.  Everyday atrocities: does internal (domestic) sex trafficking of British children satisfy the expectations of opportunity theories of crime? , 2015 .

[40]  Travis C. Pratt,et al.  “Can’t Stop, Won’t Stop”: Self-Control, Risky Lifestyles, and Repeat Victimization , 2014 .

[41]  John Suler,et al.  The Online Disinhibition Effect , 2004, Cyberpsychology Behav. Soc. Netw..

[42]  John F. Rockart,et al.  Editor’s comments , 2005, MIS Q. Executive.

[43]  Toni M. Somers,et al.  The Impact of ERP Implementation on Business Process Outcomes: A Factor-Based Study , 2007, J. Manag. Inf. Syst..

[44]  V. Grover,et al.  An assessment of survey research in POM: from constructs to theory , 1998 .

[45]  Ronald L. Akers,et al.  Rational Choice, Deterrence, and Social Learning Theory in Criminology: The Path Not Taken , 1990 .

[46]  Marcia J. Simmering,et al.  A Tale of Three Perspectives , 2009 .

[47]  George E. Higgins,et al.  Low Self-Control and Social Learning in Understanding Students' Intentions to Pirate Movies in the United States , 2007 .

[48]  Wesley G. Jennings,et al.  Assessing the Overlap in Dating Violence Perpetration and Victimization among South Korean College Students: The Influence of Social Learning and Self-Control , 2011 .

[49]  Dennis F. Galletta,et al.  The Drivers in the Use of Online Whistle-Blowing Reporting Systems , 2013, J. Manag. Inf. Syst..

[50]  A. Bandura,et al.  Social Cognitive Theory of Organizational Management , 1989 .

[51]  D. Wayne Osgood,et al.  A reappraisal of the overlap of violent offenders and victims. , 2008 .

[52]  Richard T. Watson,et al.  Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..

[53]  Alex R. Piquero,et al.  Individual Propensities and Rational Decision-Making: Recent Findings and Promising Approaches: Stephen G. Tibbetts and Chris L. Gibson , 2001 .

[54]  Sam Ransbotham,et al.  Choice and Chance: A Conceptual Model of Paths to Information Security Compromise , 2009, Inf. Syst. Res..

[55]  Sarah Koon-Magnin,et al.  Cyber Stalking and Cyber Harassment Legislation in the United States: A Qualitative Analysis , 2013 .

[56]  Elizabeth E. Umphress,et al.  When Employees Do Bad Things for Good Reasons: Examining Unethical Pro-Organizational Behaviors , 2011, Organ. Sci..

[57]  Xianggui Qu,et al.  Multivariate Data Analysis , 2007, Technometrics.

[58]  Tamara D. Madensen,et al.  The Empirical Status of Social Learning Theory: A Meta‐Analysis , 2010 .

[59]  Jenessa Malin,et al.  Adolescent self-control and music and movie piracy , 2009, Comput. Hum. Behav..

[60]  Kenneth C. Land,et al.  Multilevel Criminal Opportunity , 2012 .

[61]  G. Larry Mays,et al.  Social Learning Theory, Self-Reported Delinquency, and Youth Gangs , 1994 .

[62]  Stephen W. Baron,et al.  Self-Control, Social Consequences, and Criminal Behavior: Street Youth and the General Theory of Crime , 2003 .

[63]  Joseph S. Valacich,et al.  The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use , 2015, J. Manag. Inf. Syst..

[64]  L. Lanza-Kaduce,et al.  Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.

[65]  Eric A. Storch,et al.  Has Cyber Technology Produced a New Group of Peer Aggressors? , 2011, Cyberpsychology Behav. Soc. Netw..

[66]  Andreas Ritter,et al.  Structural Equations With Latent Variables , 2016 .

[67]  Barbara M. Byrne,et al.  Structural equation modeling with EQS : basic concepts, applications, and programming , 2000 .

[68]  Kevin M. Beaver,et al.  An Investigation of Genetic and Environmental Influences Across the Distribution of Self-Control , 2017 .

[69]  Ronald L. Akers,et al.  A Longitudinal Test of Social Learning Theory: Adolescent Smoking , 1996 .

[70]  Dennis F. Galletta,et al.  It’s complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis , 2017, Eur. J. Inf. Syst..

[71]  Huiwen Lian,et al.  When does self-esteem relate to deviant behavior? The role of contingencies of self-worth. , 2009, The Journal of applied psychology.

[72]  Qing Li,et al.  Bullying in the new playground: Research into cyberbullying and cyber victimisation , 2007 .

[73]  Velmer S. Burton,et al.  THE SOCIAL CONSEQUENCES OF SELF-CONTROL: TESTING THE GENERAL THEORY OF CRIME* , 1997 .

[74]  Gurpreet Dhillon,et al.  A Framework and Guidelines for Context-Specific Theorizing in Information Systems Research , 2014, Inf. Syst. Res..

[75]  Alok Gupta,et al.  Special Section Introduction - Ubiquitous IT and Digital Vulnerabilities , 2016, Inf. Syst. Res..

[76]  R. Akers Self-control as a general theory of crime , 1991 .

[77]  Daniel P. Mears,et al.  Self-Control Theory and Nonlinear Effects on Offending , 2013 .

[78]  Chien Chou,et al.  An analysis of multiple factors of cyberbullying among junior high school students in Taiwan , 2010, Comput. Hum. Behav..

[79]  Scott H. Decker,et al.  Criminal and Routine Activities in Online Settings: Gangs, Offenders, and the Internet , 2015 .

[80]  Pamela Wilcox,et al.  The Oxford Handbook of Criminological Theory , 2012 .

[81]  Sheri A Bauman,et al.  This Issue: Theories of Bullying and Cyberbullying , 2014 .

[82]  Adam M. Bossler,et al.  The General Theory of Crime and Computer Hacking: Low Self-control Hackers? , 2011 .

[83]  H. Marsh,et al.  Application of confirmatory factor analysis to the study of self-concept: First- and higher order factor models and their invariance across groups. , 1985 .

[84]  Paul Benjamin Lowry,et al.  "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels , 2016, J. Strateg. Inf. Syst..

[85]  Dana E. Putnam,et al.  Initiation and Maintenance of Online Sexual Compulsivity: Implications for Assessment and Treatment , 2000, Cyberpsychology Behav. Soc. Netw..

[86]  Tolga Aricak,et al.  Cyberbullying among Turkish Adolescents , 2008, Cyberpsychology Behav. Soc. Netw..

[87]  Qing Li Cyberbullying in Schools , 2006 .

[88]  Ryad Titah,et al.  Nonlinearities Between Attitude and Subjective Norms in Information Technology Acceptance: A Negative Synergy? , 2009, MIS Q..

[89]  S. Thompson Social Learning Theory , 2008 .

[90]  Qing Hu,et al.  Does deterrence work in reducing information security policy abuse by employees? , 2011, Commun. ACM.

[91]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[92]  George E. Higgins Gender Differences in Software Piracy: The Mediating Roles of Self-Control Theory and Social Learning Theory , 2006 .

[93]  P. Bentler,et al.  Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives , 1999 .

[94]  Herman T. Tavani,et al.  Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace , 2000, CSOC.

[95]  Maria L. Kraimer,et al.  A Social Capital Theory of Career Success , 2001 .

[96]  Kevin G. Corley,et al.  Building theory about theory building: What constitutes a theoretical contribution? Academy of Management Review, , . , 2011 .

[97]  Yvonne Neudorf,et al.  A General Theory Of Crime , 2016 .

[98]  Paul Benjamin Lowry,et al.  Using Accountability to Reduce Access Policy Violations in Information Systems , 2013, J. Manag. Inf. Syst..

[99]  Michael Roach,et al.  Founder or Joiner? The Role of Preferences and Context in Shaping Different Entrepreneurial Interests , 2015, Manag. Sci..

[100]  Lieven Pauwels,et al.  Differential Online Exposure to Extremist Content and Political Violence: Testing the Relative Strength of Social Learning and Competing Perspectives , 2016 .

[101]  Tom L. Roberts,et al.  Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors , 2013, MIS Q..

[102]  Dennis F. Galletta,et al.  What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors , 2015, MIS Q..

[103]  Sonja Utz,et al.  The Role of Social Network Sites in Romantic Relationships: Effects on Jealousy and Relationship Happiness , 2011, J. Comput. Mediat. Commun..

[104]  T. Postmes,et al.  Deindividuation and antinormative behavior: A meta-analysis. , 1998 .

[105]  Tejaswini Herath,et al.  A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..

[106]  Richard P. Bagozzi,et al.  The Role of Signaling Identity in the Adoption of Personal Technologies , 2014, J. Assoc. Inf. Syst..

[107]  Grazyna Kochanska,et al.  Effortful Control: Factor Structure and Relation to Externalizing and Internalizing Behaviors , 2002, Journal of abnormal child psychology.

[108]  Anthony R. Beech,et al.  Identifying Sexual Grooming Themes Used by Internet Sex Offenders , 2013 .

[109]  V. Braithwaite,et al.  Forgiveness, Reconciliation, and Shame: Three Key Variables in Reducing School Bullying , 2006 .

[110]  W. Ouchi A Conceptual Framework for the Design of Organizational Control Mechanisms , 1979 .

[111]  Chu Hsiang Chang,et al.  To Aggregate or Not to Aggregate: Steps for Developing and Validating Higher-Order Multidimensional Constructs , 2011 .

[112]  Chuang Wang,et al.  Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model , 2016, Inf. Syst. Res..

[113]  Peter K. Smith,et al.  Cyberbullying Definition Among Adolescents: A Comparison Across Six European Countries , 2012, Cyberpsychology Behav. Soc. Netw..

[114]  D. Espelage,et al.  Theories of cyberbullying , 2012 .

[115]  Philip Bobko,et al.  Self-efficacy beliefs: Comparison of five measures. , 1994 .

[116]  E. Gregory,et al.  Psychodemographic Factors Predicting Internet Fraud Tendency among Youths in Southwestern, Nigeria , 2015 .

[117]  L. Harris,et al.  Online consumer misbehaviour: an application of neutralization theory , 2009 .

[118]  Ron Weber,et al.  Evaluating and Developing Theories in the Information Systems Discipline , 2012, J. Assoc. Inf. Syst..

[119]  M. Polakowski,et al.  Linking self- and social control with deviance: Illuminating the structure underlying a general theory of crime and its relation to deviant activity , 1994 .

[120]  Andrew D. Henderson,et al.  Top Management Team Coordination Needs and the CEO Pay Gap: A Competitive Test of Economic and Behavioral Views , 2001 .

[121]  K. Vohs,et al.  Do conscious thoughts cause behavior? , 2011, Annual review of psychology.

[122]  Eleanor Mattern,et al.  From cyberbullying to well‐being: A narrative‐based participatory approach to values‐oriented design for social media , 2015, J. Assoc. Inf. Sci. Technol..

[123]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[124]  Robert L. Akers,et al.  A Differential Association-Reinforcement Theory of Criminal Behavior , 1966 .

[125]  George E. Higgins,et al.  Digital Piracy: Assessing the Contributions of an Integrated Self‐Control Theory and Social Learning Theory Using Structural Equation Modeling , 2006 .

[126]  S. Bauman,et al.  Principles of cyberbullying research: definitions, measures, and methodology , 2013 .

[127]  Nancy P. Rothbard,et al.  Getting Closer at the Company Party: Integration Experiences, Racial Dissimilarity, and Workplace Relationships , 2013, Organ. Sci..

[128]  Rex B. Kline,et al.  Principles and Practice of Structural Equation Modeling , 1998 .

[129]  Yajiong Xue,et al.  Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..

[130]  Arik Ragowsky,et al.  Establishing Trust in Electronic Commerce Through Online Word of Mouth: An Examination Across Genders , 2008, J. Manag. Inf. Syst..

[131]  Blake Ives,et al.  Trust and the Unintended Effects of Behavior Control in Virtual Teams , 2003, MIS Q..

[132]  R. Cialdini Influence: Science and Practice , 1984 .