Cyber neutralisation and flaming

ABSTRACT Individuals are increasingly subjected to flaming or negative behaviours as society becomes digitally adept. Existing research on flaming is largely fragmented and insufficient to understand what induces individuals to engage in flaming actions online. Neutralisation theory, the theory of planned behaviour (TPB), and motivational theory are integrated to develop a theoretical model to better understand flaming in virtual communities. A large-scale online questionnaire targeting individuals who had experience with flaming in a virtual community was employed to analyse the research model. The results indicate that neutralisation techniques acceptability, enjoyment, subjective norms, and low self-control significantly influence flaming. Enjoyment, low moral beliefs, subjective norms, and low self-control influence neutralisation techniques acceptability, or efforts made by individuals to rationalise their deviant behaviour. Neutralisation techniques acceptability is highly correlated with flaming in virtual communities, which has not previously been examined. Intrinsic motivation or enjoyment influences flaming, which is important because neutralisation theory and the TPB do not account for motivation. Virtual communities have a tremendous amount of influence towards an individual's rationalisation of and repeated engagement in flaming. The government, Internet service providers, the media, virtual communities, and Internet activists have an opportunity to define appropriate online behavioural standards that diminish the prevalence of flaming.

[1]  Conan C. Albrecht,et al.  Motivating Content Contributions to Online Communities: Toward a More Comprehensive Theory , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[2]  David Matza,et al.  Delinquency and Drift , 1966 .

[3]  Volkan Topalli,et al.  WHEN BEING GOOD IS BAD: AN EXPANSION OF NEUTRALIZATION THEORY* , 2005 .

[4]  Shadd Maruna,et al.  What Have We Learned from Five Decades of Neutralization Research? , 2005, Crime and Justice.

[5]  Hyeon-Suk Lyu,et al.  Internet policy in Korea: A preliminary framework for assigning moral and legal responsibility to agents in internet activities , 2012, Gov. Inf. Q..

[6]  Robert Agnew,et al.  The Techniques of Neutralization , 1986 .

[7]  Pradeep Kumar Ponnamma Divakaran Pre-release member participation as potential predictors of post-release community members’ adoption behaviour: evidence from the motion picture industry , 2013, Behav. Inf. Technol..

[8]  Milam W. Aiken,et al.  Flaming in electronic communication , 2004, Decis. Support Syst..

[9]  David W. Park,et al.  Interpersonal Effects in Computer-Mediated Interaction , 1994 .

[10]  Yvonne Neudorf,et al.  A General Theory Of Crime , 2016 .

[11]  Heith Copes,et al.  Exploring the Temporal Dynamics of the Neutralization/Delinquency Relationship , 2012 .

[12]  L. Lanza-Kaduce,et al.  Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.

[13]  Michel Tenenhaus,et al.  PLS path modeling , 2005, Comput. Stat. Data Anal..

[14]  E. Sutherland Principles of criminology, 4th ed. , 1947 .

[15]  Ria Verleur,et al.  Flaming on YouTube , 2010, Comput. Hum. Behav..

[16]  Janice Denegri-Knott,et al.  The Labeling Game , 2005 .

[17]  Tanya N. Beran,et al.  The Relationship between Cyberbullying and School Bullying , 2008 .

[18]  Harold G. Grasmick,et al.  Testing the Core Empirical Implications of Gottfredson and Hirschi's General Theory of Crime , 1993 .

[19]  Juhani Iivari,et al.  Why do individuals use computer technology? A Finnish case study , 1995, Inf. Manag..

[20]  A. Power,et al.  Cybercrime: The Psychology of Online Offenders , 2013 .

[21]  Milam W. Aiken,et al.  Flaming among first-time group support system users , 2000, Inf. Manag..

[22]  M. Zanna,et al.  Computer-Mediated Communications: The Focus Is on Me , 1990 .

[23]  Volkan Topalli The Seductive Nature of Autotelic Crime: How Neutralization Theory Serves as a Boundary Condition for Understanding Hardcore Street Offending* , 2006 .

[24]  E. Deci,et al.  Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions. , 2000, Contemporary educational psychology.

[25]  Marilyn Anne Campbell,et al.  Cyberbullying: The New Face of Workplace Bullying? , 2009, Cyberpsychology Behav. Soc. Netw..

[26]  Ming-Chi Lee,et al.  Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit , 2009, Electron. Commer. Res. Appl..

[27]  R. Merton Social Structure and Anomie , 1938 .

[28]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .

[29]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[30]  T. Pratt,et al.  THE EMPIRICAL STATUS OF GOTTFREDSON AND HIRSCHI'S GENERAL THEORY OF CRIME: A META‐ANALYSIS , 2000 .

[31]  George E. Higgins can low self-control help with the understanding of the software piracy problem? , 2004 .

[32]  Anna K. Turnage,et al.  Email Flaming Behaviors and Organizational Conflict , 2007, J. Comput. Mediat. Commun..

[33]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[34]  Mikko T. Siponen,et al.  New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs , 2012, Inf. Manag..

[35]  Joan Oldman,et al.  The Professional Fence , 1976 .

[36]  IgbariaMagid,et al.  Why do individuals use computer technology , 1995 .

[37]  Oded Nov,et al.  Analysis of participation in an online photo-sharing community: A multidimensional perspective , 2010, J. Assoc. Inf. Sci. Technol..

[38]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[39]  Justin W. Patchin,et al.  Bullies Move Beyond the Schoolyard , 2006 .

[40]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[41]  S. R. Hiltz,et al.  Experiments in group decision making: Communication process and outcome in face-to-face versus computerized conferences. , 1986 .

[42]  Jana L. Pershing To Snitch or Not to Snitch? Applying the Concept of Neutralization Techniques to the Enforcement of Occupational Misconduct , 2003 .

[43]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[44]  Justin W. Patchin,et al.  Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .

[45]  Alex R. Piquero,et al.  Self-Control, Moral Beliefs, and Criminal Activity , 2006 .

[46]  Vivian Hsueh-hua Chen,et al.  Group identification as a mediator of the effect of players’ anonymity on cheating in online games , 2015, Behav. Inf. Technol..

[47]  Winnifred R. Louis,et al.  The Attitude–Behavior Relationship in Consumer Conduct: The Role of Norms, Past Behavior, and Self-Identity , 2008, The Journal of social psychology.

[48]  Vladimir M. Cvetković,et al.  The prevalence of cyberbullying among adolescents: A case study of middle schools in Serbia , 2011 .

[49]  Majid Yar,et al.  Handbook of Internet Crime , 2010 .

[50]  T. Hirschi Causes of Delinquency. , 1970, British medical journal.

[51]  Robert Agnew,et al.  THE TECHNIQUES OF NEUTRALIZATION AND VIOLENCE , 1994 .

[52]  Lee Knuttila,et al.  User unknown: 4chan, anonymity and contingency , 2011, First Monday.

[53]  Philip A. Thompsen,et al.  Effects of Pictographs and Quoting on Flaming in Electronic Mail. , 1996 .

[54]  Sujin Lee Analysis of College Students' Online Life-Styles and Their Psychological Profiles in South Korea , 2010, Cyberpsychology Behav. Soc. Netw..

[55]  Paul F. Cromwell,et al.  the devil made me do it: use of neutralizations by shoplifters , 2003 .

[56]  I. Ajzen The theory of planned behavior , 1991 .

[57]  Yung-Fu Chang,et al.  Determinants of knowledge seeking in professional virtual communities , 2014, Behav. Inf. Technol..

[58]  Xianggui Qu,et al.  Multivariate Data Analysis , 2007, Technometrics.

[59]  Thompson S. H. Teo,et al.  Intrinsic and extrinsic motivation in Internet usage , 1999 .

[60]  M. Silberman Toward a theory of criminal deterrence. , 1976 .

[61]  J. M. Kayany Contexts of uninhibited online behavior: flaming in social newsgroups on Usenet , 1998 .

[62]  Jenessa Malin,et al.  Adolescent self-control and music and movie piracy , 2009, Comput. Hum. Behav..

[63]  M. Conner,et al.  Efficacy of the Theory of Planned Behaviour: a meta-analytic review. , 2001, The British journal of social psychology.

[64]  S. Kiesler,et al.  Group decision making and communication technology , 1992 .

[65]  R. Wiebe,et al.  Using an expanded measure of self-control to predict delinquency , 2006 .

[66]  Noel T Brewer,et al.  Meta-analysis of the relationship between risk perception and health behavior: the example of vaccination. , 2007, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.

[67]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[68]  Sara Kiesler,et al.  Social psychological aspects of computer-mediated communication , 1984 .

[69]  W. W. Minor,et al.  Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .

[70]  G. Bohner,et al.  Rape myths as neutralizing cognitions : evidence for a causal impact of anti-victim attitudes on men's self-reported likelihood of raping , 1998 .

[71]  George E. Higgins,et al.  Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software , 2006 .

[72]  T. Postmes,et al.  Deindividuation and antinormative behavior: A meta-analysis. , 1998 .

[73]  P. Zimbardo The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos. , 1969 .

[74]  Ken Levi,et al.  Becoming a Hit Man , 1981 .

[75]  J. Silla,et al.  The influence of familiarity among group members, group atmosphere and assertiveness on uninhibited behavior through three different communication media , 2000 .

[76]  J. Tirole,et al.  Intrinsic and Extrinsic Motivation , 2003 .

[77]  Andrew J. Flanagin,et al.  Reconceptualizing ‘flaming’ and other problematic messages , 2003, New Media Soc..

[78]  Russell Spears,et al.  Computer-Mediated Communication, De-Individuation and Group Decision-Making , 1991, Int. J. Man Mach. Stud..

[79]  R. Paternoster,et al.  Sanction threats and appeals to morality : Testing a rational choice model of corporate crime , 1996 .

[80]  M. Hazani The universal applicability of the theory of neutralization: German youth coming to terms with the Holocaust , 1991 .

[81]  Duane T. Wegener,et al.  Attitudes and attitude change. , 1997, Annual review of psychology.

[82]  Lance Strate,et al.  Communication and Cyberspace: Social Interaction in an Electronic Environment , 1996 .

[83]  Gresham M. Sykes,et al.  Juvenile Delinquency and Subterranean Values , 1961 .

[84]  Quint C. Thurman,et al.  Deviance and the neutralization of moral commitment: An empirical analysis , 1984 .

[85]  Mark Warr,et al.  Explaining the Gender Gap in Delinquency: Peer Influence and Moral Evaluations of Behavior , 1998 .

[86]  Lee Sproull,et al.  Reducing social context cues: electronic mail in organizational communication , 1986 .

[87]  S. Perren,et al.  Cyberbullying and traditional bullying in adolescence: Differential roles of moral disengagement, moral emotions, and moral values , 2012 .

[88]  Timothy R. Hinkin,et al.  A Brief Tutorial on the Development of Measures for Use in Survey Questionnaires , 1998 .

[89]  M. McLure Wasko,et al.  "It is what one does": why people participate and help others in electronic communities of practice , 2000, J. Strateg. Inf. Syst..

[90]  Alex R. Piquero,et al.  THE RELIABILITY AND VALIDITY OF GRASMICK et al.'s SELF‐CONTROL SCALE: A COMMENT ON LONGSHORE et al.* , 1998 .

[91]  David Matza Delinquency and Drift , 1966 .

[92]  David J. Reibstein,et al.  The Direction of Causality Between Perceptions, Affect, and Behavior: An Application to Travel Behavior , 1980 .

[93]  William D. Todor,et al.  Relationships Between Leader Reward and Punishment Behavior and Group Processes and Productivity , 1985 .

[94]  Lloyd E. Ohlin,et al.  Delinquency And Opportunity , 1960 .

[95]  J. Walther Computer-Mediated Communication , 1996 .

[96]  Hangwoo Lee Behavioral Strategies for Dealing with Flaming in An Online Forum , 2005 .

[97]  A. W. Wicker Attitudes Versus Actions: The Relationship of Verbal and Overt Behavioral Responses to Attitude Objects. , 1969 .

[98]  Tim O'Shea,et al.  'Flaming' in computer-mediated communication: Observations, explanations, implications. , 1992 .

[99]  T. Holt,et al.  The Effect of Self-Control on Victimization in the Cyberworld , 2010 .

[100]  S. Kiesler,et al.  Group processes in computer-mediated communication☆ , 1986 .

[101]  Charles D. Barrett Understanding Attitudes and Predicting Social Behavior , 1980 .