Cyber neutralisation and flaming
暂无分享,去创建一个
Hangjung Zo | Kee Sung Kim | Jiyeon Hwang | Hwansoo Lee | Andrew P. Ciganek | Hangjung Zo | A. Ciganek | Hwansoo Lee | Jiyeon Hwang | Keesung Kim
[1] Conan C. Albrecht,et al. Motivating Content Contributions to Online Communities: Toward a More Comprehensive Theory , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[2] David Matza,et al. Delinquency and Drift , 1966 .
[3] Volkan Topalli,et al. WHEN BEING GOOD IS BAD: AN EXPANSION OF NEUTRALIZATION THEORY* , 2005 .
[4] Shadd Maruna,et al. What Have We Learned from Five Decades of Neutralization Research? , 2005, Crime and Justice.
[5] Hyeon-Suk Lyu,et al. Internet policy in Korea: A preliminary framework for assigning moral and legal responsibility to agents in internet activities , 2012, Gov. Inf. Q..
[6] Robert Agnew,et al. The Techniques of Neutralization , 1986 .
[7] Pradeep Kumar Ponnamma Divakaran. Pre-release member participation as potential predictors of post-release community members’ adoption behaviour: evidence from the motion picture industry , 2013, Behav. Inf. Technol..
[8] Milam W. Aiken,et al. Flaming in electronic communication , 2004, Decis. Support Syst..
[9] David W. Park,et al. Interpersonal Effects in Computer-Mediated Interaction , 1994 .
[10] Yvonne Neudorf,et al. A General Theory Of Crime , 2016 .
[11] Heith Copes,et al. Exploring the Temporal Dynamics of the Neutralization/Delinquency Relationship , 2012 .
[12] L. Lanza-Kaduce,et al. Social learning and deviant behavior: a specific test of a general theory. , 1979, American sociological review.
[13] Michel Tenenhaus,et al. PLS path modeling , 2005, Comput. Stat. Data Anal..
[14] E. Sutherland. Principles of criminology, 4th ed. , 1947 .
[15] Ria Verleur,et al. Flaming on YouTube , 2010, Comput. Hum. Behav..
[16] Janice Denegri-Knott,et al. The Labeling Game , 2005 .
[17] Tanya N. Beran,et al. The Relationship between Cyberbullying and School Bullying , 2008 .
[18] Harold G. Grasmick,et al. Testing the Core Empirical Implications of Gottfredson and Hirschi's General Theory of Crime , 1993 .
[19] Juhani Iivari,et al. Why do individuals use computer technology? A Finnish case study , 1995, Inf. Manag..
[20] A. Power,et al. Cybercrime: The Psychology of Online Offenders , 2013 .
[21] Milam W. Aiken,et al. Flaming among first-time group support system users , 2000, Inf. Manag..
[22] M. Zanna,et al. Computer-Mediated Communications: The Focus Is on Me , 1990 .
[23] Volkan Topalli. The Seductive Nature of Autotelic Crime: How Neutralization Theory Serves as a Boundary Condition for Understanding Hardcore Street Offending* , 2006 .
[24] E. Deci,et al. Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions. , 2000, Contemporary educational psychology.
[25] Marilyn Anne Campbell,et al. Cyberbullying: The New Face of Workplace Bullying? , 2009, Cyberpsychology Behav. Soc. Netw..
[26] Ming-Chi Lee,et al. Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit , 2009, Electron. Commer. Res. Appl..
[27] R. Merton. Social Structure and Anomie , 1938 .
[28] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .
[29] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[30] T. Pratt,et al. THE EMPIRICAL STATUS OF GOTTFREDSON AND HIRSCHI'S GENERAL THEORY OF CRIME: A META‐ANALYSIS , 2000 .
[31] George E. Higgins. can low self-control help with the understanding of the software piracy problem? , 2004 .
[32] Anna K. Turnage,et al. Email Flaming Behaviors and Organizational Conflict , 2007, J. Comput. Mediat. Commun..
[33] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[34] Mikko T. Siponen,et al. New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs , 2012, Inf. Manag..
[35] Joan Oldman,et al. The Professional Fence , 1976 .
[36] IgbariaMagid,et al. Why do individuals use computer technology , 1995 .
[37] Oded Nov,et al. Analysis of participation in an online photo-sharing community: A multidimensional perspective , 2010, J. Assoc. Inf. Sci. Technol..
[38] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[39] Justin W. Patchin,et al. Bullies Move Beyond the Schoolyard , 2006 .
[40] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[41] S. R. Hiltz,et al. Experiments in group decision making: Communication process and outcome in face-to-face versus computerized conferences. , 1986 .
[42] Jana L. Pershing. To Snitch or Not to Snitch? Applying the Concept of Neutralization Techniques to the Enforcement of Occupational Misconduct , 2003 .
[43] R. Bagozzi,et al. On the evaluation of structural equation models , 1988 .
[44] Justin W. Patchin,et al. Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .
[45] Alex R. Piquero,et al. Self-Control, Moral Beliefs, and Criminal Activity , 2006 .
[46] Vivian Hsueh-hua Chen,et al. Group identification as a mediator of the effect of players’ anonymity on cheating in online games , 2015, Behav. Inf. Technol..
[47] Winnifred R. Louis,et al. The Attitude–Behavior Relationship in Consumer Conduct: The Role of Norms, Past Behavior, and Self-Identity , 2008, The Journal of social psychology.
[48] Vladimir M. Cvetković,et al. The prevalence of cyberbullying among adolescents: A case study of middle schools in Serbia , 2011 .
[49] Majid Yar,et al. Handbook of Internet Crime , 2010 .
[50] T. Hirschi. Causes of Delinquency. , 1970, British medical journal.
[51] Robert Agnew,et al. THE TECHNIQUES OF NEUTRALIZATION AND VIOLENCE , 1994 .
[52] Lee Knuttila,et al. User unknown: 4chan, anonymity and contingency , 2011, First Monday.
[53] Philip A. Thompsen,et al. Effects of Pictographs and Quoting on Flaming in Electronic Mail. , 1996 .
[54] Sujin Lee. Analysis of College Students' Online Life-Styles and Their Psychological Profiles in South Korea , 2010, Cyberpsychology Behav. Soc. Netw..
[55] Paul F. Cromwell,et al. the devil made me do it: use of neutralizations by shoplifters , 2003 .
[56] I. Ajzen. The theory of planned behavior , 1991 .
[57] Yung-Fu Chang,et al. Determinants of knowledge seeking in professional virtual communities , 2014, Behav. Inf. Technol..
[58] Xianggui Qu,et al. Multivariate Data Analysis , 2007, Technometrics.
[59] Thompson S. H. Teo,et al. Intrinsic and extrinsic motivation in Internet usage , 1999 .
[60] M. Silberman. Toward a theory of criminal deterrence. , 1976 .
[61] J. M. Kayany. Contexts of uninhibited online behavior: flaming in social newsgroups on Usenet , 1998 .
[62] Jenessa Malin,et al. Adolescent self-control and music and movie piracy , 2009, Comput. Hum. Behav..
[63] M. Conner,et al. Efficacy of the Theory of Planned Behaviour: a meta-analytic review. , 2001, The British journal of social psychology.
[64] S. Kiesler,et al. Group decision making and communication technology , 1992 .
[65] R. Wiebe,et al. Using an expanded measure of self-control to predict delinquency , 2006 .
[66] Noel T Brewer,et al. Meta-analysis of the relationship between risk perception and health behavior: the example of vaccination. , 2007, Health psychology : official journal of the Division of Health Psychology, American Psychological Association.
[67] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .
[68] Sara Kiesler,et al. Social psychological aspects of computer-mediated communication , 1984 .
[69] W. W. Minor,et al. Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .
[70] G. Bohner,et al. Rape myths as neutralizing cognitions : evidence for a causal impact of anti-victim attitudes on men's self-reported likelihood of raping , 1998 .
[71] George E. Higgins,et al. Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software , 2006 .
[72] T. Postmes,et al. Deindividuation and antinormative behavior: A meta-analysis. , 1998 .
[73] P. Zimbardo. The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos. , 1969 .
[74] Ken Levi,et al. Becoming a Hit Man , 1981 .
[75] J. Silla,et al. The influence of familiarity among group members, group atmosphere and assertiveness on uninhibited behavior through three different communication media , 2000 .
[76] J. Tirole,et al. Intrinsic and Extrinsic Motivation , 2003 .
[77] Andrew J. Flanagin,et al. Reconceptualizing ‘flaming’ and other problematic messages , 2003, New Media Soc..
[78] Russell Spears,et al. Computer-Mediated Communication, De-Individuation and Group Decision-Making , 1991, Int. J. Man Mach. Stud..
[79] R. Paternoster,et al. Sanction threats and appeals to morality : Testing a rational choice model of corporate crime , 1996 .
[80] M. Hazani. The universal applicability of the theory of neutralization: German youth coming to terms with the Holocaust , 1991 .
[81] Duane T. Wegener,et al. Attitudes and attitude change. , 1997, Annual review of psychology.
[82] Lance Strate,et al. Communication and Cyberspace: Social Interaction in an Electronic Environment , 1996 .
[83] Gresham M. Sykes,et al. Juvenile Delinquency and Subterranean Values , 1961 .
[84] Quint C. Thurman,et al. Deviance and the neutralization of moral commitment: An empirical analysis , 1984 .
[85] Mark Warr,et al. Explaining the Gender Gap in Delinquency: Peer Influence and Moral Evaluations of Behavior , 1998 .
[86] Lee Sproull,et al. Reducing social context cues: electronic mail in organizational communication , 1986 .
[87] S. Perren,et al. Cyberbullying and traditional bullying in adolescence: Differential roles of moral disengagement, moral emotions, and moral values , 2012 .
[88] Timothy R. Hinkin,et al. A Brief Tutorial on the Development of Measures for Use in Survey Questionnaires , 1998 .
[89] M. McLure Wasko,et al. "It is what one does": why people participate and help others in electronic communities of practice , 2000, J. Strateg. Inf. Syst..
[90] Alex R. Piquero,et al. THE RELIABILITY AND VALIDITY OF GRASMICK et al.'s SELF‐CONTROL SCALE: A COMMENT ON LONGSHORE et al.* , 1998 .
[91] David Matza. Delinquency and Drift , 1966 .
[92] David J. Reibstein,et al. The Direction of Causality Between Perceptions, Affect, and Behavior: An Application to Travel Behavior , 1980 .
[93] William D. Todor,et al. Relationships Between Leader Reward and Punishment Behavior and Group Processes and Productivity , 1985 .
[94] Lloyd E. Ohlin,et al. Delinquency And Opportunity , 1960 .
[95] J. Walther. Computer-Mediated Communication , 1996 .
[96] Hangwoo Lee. Behavioral Strategies for Dealing with Flaming in An Online Forum , 2005 .
[97] A. W. Wicker. Attitudes Versus Actions: The Relationship of Verbal and Overt Behavioral Responses to Attitude Objects. , 1969 .
[98] Tim O'Shea,et al. 'Flaming' in computer-mediated communication: Observations, explanations, implications. , 1992 .
[99] T. Holt,et al. The Effect of Self-Control on Victimization in the Cyberworld , 2010 .
[100] S. Kiesler,et al. Group processes in computer-mediated communication☆ , 1986 .
[101] Charles D. Barrett. Understanding Attitudes and Predicting Social Behavior , 1980 .