Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model
暂无分享,去创建一个
Chuang Wang | Paul Benjamin Lowry | Mikko T. Siponen | Jun Zhang | M. Siponen | P. Lowry | Chuang Wang | Jun Zhang
[1] C. Higgins,et al. A Self-Efficacy Theory Explanation for the Management of Remote Workers in Virtual Organizations , 1999 .
[2] W. Heirman,et al. Cyberbullying: Predicting Victimisation and Perpetration , 2011 .
[3] L. Treviño,et al. Behavioral Ethics in Organizations: A Review , 2006 .
[4] Michelle F. Wright. Predictors of Anonymous Cyber Aggression: The Role of Adolescents' Beliefs About Anonymity, Aggression, and the Permanency of Digital Content , 2014, Cyberpsychology Behav. Soc. Netw..
[5] K. Williams,et al. Prevalence and predictors of internet bullying. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[6] Robert S. Tokunaga,et al. Following you home from school: A critical review and synthesis of research on cyberbullying victimization , 2010, Comput. Hum. Behav..
[7] Justin W. Patchin,et al. Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .
[8] Tom L. Roberts,et al. Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust , 2015, Inf. Syst. J..
[9] S. Smoyak,et al. Perceptions of Cyberstalking Among College Students , 2005 .
[10] Ekaterina V. Botchkovar,et al. Social Learning, Reinforcement and Crime: Evidence from Three European Cities , 2012 .
[11] Tom L. Roberts,et al. Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..
[12] Robert D. Crutchfield,et al. Crime Rate and Social Integration The Impact of Metropolitan Mobility , 1982 .
[13] H. Machácková,et al. Cyberbullying: The Discriminant Factors Among Cyberbullies, Cybervictims, and Cyberbully-Victims in a Czech Adolescent Sample. , 2015, Journal of interpersonal violence.
[14] Michele L. Ybarra,et al. Youth engaging in online harassment: associations with caregiver-child relationships, Internet use, and personal characteristics. , 2004, Journal of adolescence.
[15] Robin M. Kowalski,et al. Traditional bullying as a potential warning sign of cyberbullying , 2012 .
[16] I. Ajzen. The theory of planned behavior , 1991 .
[17] Richard N. Landers,et al. An Inconvenient Truth: Arbitrary Distinctions Between Organizational, Mechanical Turk, and Other Convenience Samples , 2015, Industrial and Organizational Psychology.
[18] R. Lennox,et al. Conventional wisdom on measurement: A structural equation perspective. , 1991 .
[19] Carolyn Axtell,et al. Exploring the impact of workplace cyberbullying on trainee doctors , 2015, Medical education.
[20] Amar Cheema,et al. Data collection in a flat world: the strengths and weaknesses of mechanical turk samples , 2013 .
[21] W. Heirman,et al. Predicting adolescent perpetration in cyberbullying: an application of the theory of planned behavior. , 2012, Psicothema.
[22] B. Xiao,et al. Cyber-Bullying Among University Students: An Empirical Investigation from the Social Cognitive Perspective , 2013 .
[23] Shu Ching Yang,et al. Paths to Bullying in Online Gaming: The Effects of Gender, Preference for Playing Violent Games, Hostility, and Aggressive Behavior on Bullying , 2012 .
[24] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[25] Paul Benjamin Lowry,et al. "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels , 2016, J. Strateg. Inf. Syst..
[26] Tolga Aricak,et al. Cyberbullying among Turkish Adolescents , 2008, Cyberpsychology Behav. Soc. Netw..
[27] Robyn Cooper,et al. Responses to Cyberbullying: A Descriptive Analysis of the Frequency of and Impact on LGBT and Allied Youth , 2012 .
[28] Qing Li. Cyberbullying in Schools , 2006 .
[29] Qing Li,et al. New bottle but old wine: A research of cyberbullying in schools , 2007, Comput. Hum. Behav..
[30] Juliana Raskauskas,et al. Involvement in traditional and electronic bullying among adolescents. , 2007, Developmental psychology.
[31] Tamara D. Madensen,et al. The Empirical Status of Social Learning Theory: A Meta‐Analysis , 2010 .
[32] T. Li. Cyber-Harassment: A Study of a New Method for an Old Behavior , 2005 .
[33] T. Fung,et al. Predicting Student Behaviors , 2012 .
[34] Francesca Philips,et al. Cyberstalking and Cyberpredators: A Threat to Safe Sexuality on the Internet , 2004 .
[35] Reinis Udris,et al. Cyberbullying among high school students in Japan: Development and validation of the Online Disinhibition Scale , 2014, Comput. Hum. Behav..
[36] Peter K. Smith,et al. Cyberbullying Definition Among Adolescents: A Comparison Across Six European Countries , 2012, Cyberpsychology Behav. Soc. Netw..
[37] Leroy McFarlane,et al. An exploration of predatory behaviour in cyberspace: Towards a typology of cyberstalkers , 2003, First Monday.
[38] Claire Robson,et al. The Influence of Moral Disengagement, Morally Based Self-Esteem, Age, and Gender on Traditional Bullying and Cyberbullying , 2013 .
[39] V. Mitchell,et al. Generation Y Attitudes Towards E-ethics and Internet-related Misbehaviours , 2004 .
[40] Detmar W. Straub,et al. Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..
[41] Ronald L. Akers,et al. SOCIAL LEARNING THEORY AND ALCOHOL BEHAVIOR AMONG THE ELDERLY , 1989 .
[42] Lara A. Frumkin,et al. Cyberbullying experiences on-the-go: when social media can become distressing , 2013 .
[43] William N. Trumbull. Estimations of the Economic Model of Crime Using Aggregate and Individual Level Data , 1989 .
[44] Justin W. Patchin,et al. Bullying, Cyberbullying, and Suicide , 2010, Archives of suicide research : official journal of the International Academy for Suicide Research.
[45] Özgür Erdur-Baker,et al. Examination of Cyberbullying Experiences among Turkish Students from Different School Types , 2008, Cyberpsychology Behav. Soc. Netw..
[46] Sheldon DANZlGER,et al. EXPLAINING URBAN CRIME RATES , 1976 .
[47] Paul F. Cromwell,et al. the devil made me do it: use of neutralizations by shoplifters , 2003 .
[48] A. Sourander,et al. Psychosocial risk factors associated with cyberbullying among adolescents: a population-based study. , 2010, Archives of general psychiatry.
[49] David J. Faulds,et al. Social media: The new hybrid element of the promotion mix , 2009 .
[50] Qing Li. A cross-cultural comparison of adolescents' experience related to cyberbullying , 2008 .
[51] R. A. Dodder,et al. techniques of neutralization used by deer poachers in the western united states: a research note , 1999 .
[52] Paul Benjamin Lowry,et al. Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies , 2015, Inf. Syst. J..
[53] C. Pornari,et al. Peer and cyber aggression in secondary school students: the role of moral disengagement, hostile attribution bias, and outcome expectancies. , 2010, Aggressive behavior.
[54] Peter K. Smith,et al. Cyberbullying: another main type of bullying? , 2008, Scandinavian journal of psychology.
[55] E. Vance Wilson,et al. Antecedents and determinants of information technology habit , 2010, Inf. Manag..
[56] Julia Riebel,et al. Cyberbullying in Germany - an exploration of prevalence, overlapping with real life bullying and coping strategies , 2009 .
[57] J. D. Orcutt,et al. Gender, Race/Ethnicity, and Deviant Drinking: A Longitudinal Application of Social Structure and Social Learning Theory , 2012 .
[58] Michael Workman,et al. A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives , 2010, Comput. Secur..
[59] Zebbedia G. Gibb,et al. Who does that anyway? Predictors and personality correlates of cyberbullying in college , 2014, Comput. Hum. Behav..
[60] Justin M. Smith,et al. Teenage Drug and Alcohol Use: Comparing Individual and Contextual Effects , 2011 .
[61] Arik Ragowsky,et al. Establishing Trust in Electronic Commerce Through Online Word of Mouth: An Examination Across Genders , 2008, J. Manag. Inf. Syst..
[62] Justin W. Patchin,et al. Traditional and Nontraditional Bullying Among Youth: A Test of General Strain Theory , 2011 .
[63] D. Espelage,et al. Differentiating cyber bullying perpetration from non-physical bullying: commonalities across race, individual, and family predictors. , 2013 .
[64] A. Hayes. Beyond Baron and Kenny: Statistical Mediation Analysis in the New Millennium , 2009 .
[65] R. Bennett,et al. Development of a measure of workplace deviance. , 2000, The Journal of applied psychology.
[66] Jennifer Bonds-Raacke,et al. College Students' Facebook Stalking of Ex-Partners , 2011, Cyberpsychology Behav. Soc. Netw..
[67] Petri Puhakainen,et al. A design theory for information security awareness , 2006 .
[68] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[69] R. Ang,et al. Understanding the Relationship Between Proactive and Reactive Aggression, and Cyberbullying Across United States and Singapore Adolescent Samples , 2014, Journal of interpersonal violence.
[70] P. Markey. Bystander intervention in computer-mediated communication , 2000 .
[71] H. Winklhofer,et al. Index Construction with Formative Indicators: An Alternative to Scale Development , 2001 .
[72] Mikko T. Siponen,et al. Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..
[73] S. Hemphill,et al. Adolescent predictors of young adult cyberbullying perpetration and victimization among Australian youth. , 2014, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[74] Özgür Erdur-Baker,et al. Cyberbullying and its correlation to traditional bullying, gender and frequent and risky usage of internet-mediated communication tools , 2010, New Media Soc..
[75] Paul A. Pavlou,et al. Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..
[76] Peter K. Smith,et al. Cyberbullying: its nature and impact in secondary school pupils. , 2008, Journal of child psychology and psychiatry, and allied disciplines.
[77] Azy Barak,et al. Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition , 2012, Comput. Hum. Behav..
[78] Elin Waring,et al. Coercive mobility and crime: A preliminary examination of concentrated incarceration and social disorganization , 2003 .
[79] Jim Mitchell,et al. An examination of types of delinquency through path analysis , 1980, Journal of youth and adolescence.
[80] Bulent Dilmac,et al. Psychological Needs as a Predictor of Cyber Bullying: A Preliminary Report on College Students , 2009 .
[81] Alain Pinsonneault,et al. Anonymity in Group Support Systems Research: A New Conceptualization, Measure, and Contingency Framework , 1997, J. Manag. Inf. Syst..
[82] K. Varjas,et al. High School Students’ Perceptions of Motivations for Cyberbullying: An Exploratory Study , 2010, The western journal of emergency medicine.
[83] John P. Hoffmann,et al. A Contextual Analysis of Differential Association, Social Control, and Strain Theories of Delinquency , 2003 .
[84] Sameer Hinduja,et al. Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.
[85] Robert D. Crutchfield,et al. Labor Stratification and Violent Crime , 1989 .
[86] Paul Benjamin Lowry,et al. Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It , 2014, IEEE Transactions on Professional Communication.
[87] Heidi Vandebosch,et al. Cyberbullying among youngsters: profiles of bullies and victims , 2009, New Media Soc..
[88] Michele J. Fleming,et al. “i h8 u”: The Influence of Normative Beliefs and Hostile Response Selection in Predicting Adolescents' Mobile Phone Aggression—A Pilot Study , 2010 .
[89] C. Walker,et al. Twenty First Century Cyberbullying Defined: An Analysis of Intent, Repetition and Emotional Response. , 2012 .
[90] Lieven Pauwels,et al. Differential Online Exposure to Extremist Content and Political Violence: Testing the Relative Strength of Social Learning and Competing Perspectives , 2016 .
[91] Herbert Scheithauer,et al. Social-Behavioral Correlates of Cyberbullying in a German Student Sample , 2009 .
[92] Tatsuya Suda,et al. Anonymity and roles associated with aggressive posts in an online forum , 2012, Comput. Hum. Behav..
[93] Mikko T. Siponen,et al. Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work , 2013, Inf. Manag..
[94] A. Baroncelli,et al. Unique effects of different components of trait emotional intelligence in traditional bullying and cyberbullying. , 2014, Journal of adolescence.
[95] Paul Benjamin Lowry,et al. The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups , 2009, J. Manag. Inf. Syst..
[96] Daniel L. Sherrell,et al. Communications of the Association for Information Systems , 1999 .
[97] Alison Virginia King. Constitutionality of Cyberbullying Laws: Keeping the Online Playground Safe for Both Teens and Free Speech , 2010 .
[98] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[99] Robin M. Kowalski,et al. Electronic bullying among middle school students. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[100] Robert Slonje,et al. The nature of cyberbullying, and strategies for prevention , 2013, Comput. Hum. Behav..
[101] DinevTamara,et al. Does deterrence work in reducing information security policy abuse by employees , 2011 .
[102] D. Mackinnon. Introduction to Statistical Mediation Analysis , 2008 .
[103] George E. Higgins,et al. Criminological theory in the digital age: The case of social learning theory and digital piracy☆ , 2010 .
[104] Chien Chou,et al. An analysis of multiple factors of cyberbullying among junior high school students in Taiwan , 2010, Comput. Hum. Behav..
[105] T. Postmes,et al. A Social Identity Model of Deindividuation Phenomena , 1995 .
[106] D. Cross,et al. Cyberbullying Versus Face-to-Face Bullying A Theoretical and Conceptual Review , 2009 .
[107] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[108] L. Lanza-Kaduce,et al. Liquor Is Quicker , 2006 .
[109] Constantinos M. Kokkinos,et al. Cyber-Bullying, Personality and Coping among Pre-Adolescents , 2013, Int. J. Cyber Behav. Psychol. Learn..
[110] Douglas A. Gentile,et al. An Empirical Examination of the Strength Differential Hypothesis in Cyberbullying Behavior , 2017 .
[111] Detmar W. Straub,et al. Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..
[112] F. Mishna,et al. Risk Factors for involvement in cyber bullying: Victims, bullies, and bully-victims , 2012 .
[113] Ronald L. Akers. Social Structure and Social Learning in Crime and Deviance , 2017 .
[114] Leroy McFarlane,et al. Cyberstalking: The Technology of Hate , 2003 .
[115] C. Spiel,et al. Traditional Bullying and Cyberbullying Identification of Risk Groups for Adjustment Problems , 2009 .
[116] Robert L. Akers,et al. A Differential Association-Reinforcement Theory of Criminal Behavior , 1966 .
[117] P. Valkenburg,et al. Online communication among adolescents: an integrated model of its attraction, opportunities, and risks. , 2011, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.
[118] Tejaswini Herath,et al. A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..
[119] Maria Assunta Zanetti,et al. Morally Disengaged and Unempathic: Do Cyberbullies Fit These Definitions? An Exploratory Study , 2012, Cyberpsychology Behav. Soc. Netw..
[120] S. Bauman. Cyberbullying in a Rural Intermediate School: An Exploratory Study , 2010 .
[121] Jordana N. Navarro,et al. Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences , 2012 .
[122] Dennis F. Galletta,et al. The Drivers in the Use of Online Whistle-Blowing Reporting Systems , 2013, J. Manag. Inf. Syst..
[123] Andrew Silke,et al. Deindividuation, Anonymity, and Violence: Findings From Northern Ireland , 2003, The Journal of social psychology.
[124] Donald R. Cressey,et al. Epidemiology and Individual Conduct: A Case from Criminology , 1960 .
[125] Ronald L. Akers,et al. Social learning and social structure : a general theory of crime and deviance , 1999 .
[126] Elisheva F. Gross,et al. Extending the school grounds?--Bullying experiences in cyberspace. , 2008, The Journal of school health.
[127] K. Durkin,et al. COLLEGE STUDENTS AND BINGE DRINKING: AN EVALUATION OF SOCIAL LEARNING THEORY , 2005 .
[128] Ronald L. Akers,et al. age, social learning, and social bonding in adolescent substance use , 1999 .
[129] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[130] Eunyoung Kim,et al. A Cross-Cultural Test of Social Structure and Social Learning: Alcohol Use among South Korean Adolescents , 2013 .
[131] Cheryl Burke Jarvis,et al. A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .
[132] R. Spears,et al. Knowing Me, Knowing You: Anonymity Effects on Social Identity Processes within Groups , 2001 .
[133] Judy A. Siguaw,et al. Formative versus Reflective Indicators in Organizational Measure Development: A Comparison and Empirical Illustration , 2006 .
[134] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .
[135] Andrea Everard,et al. Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..
[136] Çiğdem Topcu,et al. Cyber Bullying @ Schools: What do Turkish Adolescents Think? , 2013 .
[137] Paul Benjamin Lowry,et al. A New Approach to the Problem of Access Policy Violations: Increasing Perceptions of Accountability through the User Interface , 2015 .
[138] S. Bauman,et al. Bullying and cyberbullying among deaf students and their hearing peers: an exploratory study. , 2011, Journal of deaf studies and deaf education.
[139] Juyoung Song,et al. Does the offline bully-victimization influence cyberbullying behavior among youths? Application of General Strain Theory , 2014, Comput. Hum. Behav..
[140] J. Graber,et al. Traditional and Cyber Aggressors and Victims: A Comparison of Psychosocial Characteristics , 2011, Journal of youth and adolescence.
[141] Mark Warr,et al. AGE, PEERS, AND DELINQUENCY* , 1993 .
[142] Jan Pfetsch,et al. Ethical Media Competence as a Protective Factor Against Cyberbullying and Cybervictimization Among German School Students , 2014, Cyberpsychology Behav. Soc. Netw..
[143] Steven V. Rouse,et al. A reliability analysis of Mechanical Turk data , 2015, Comput. Hum. Behav..
[144] M. Sobel. Asymptotic Confidence Intervals for Indirect Effects in Structural Equation Models , 1982 .
[145] Lourdes Villardón-Gallego,et al. Cyberbullying in adolescents: Modalities and aggressors' profile , 2010, Comput. Hum. Behav..
[146] John Suler,et al. The Online Disinhibition Effect , 2004, Cyberpsychology Behav. Soc. Netw..
[147] Glenn L. Pierce,et al. REEXAMINING SOCIAL DISORGANIZATION THEORY USING CALLS TO THE POLICE AS A MEASURE OF CRIME , 1993 .
[148] David Šmahel,et al. Cyberbullying in context: Direct and indirect effects by low self-control across 25 European countries , 2011 .
[149] Laurence Steinberg,et al. Peer influence on risk taking, risk preference, and risky decision making in adolescence and adulthood: an experimental study. , 2005, Developmental psychology.
[150] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[151] Marcia J. Simmering,et al. A Tale of Three Perspectives , 2009 .
[152] A. Tenbrunsel,et al. Organizational Behavior and Human Decision Processes , 2013 .
[153] W. F. Skinner,et al. A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .
[154] L. Winfree,et al. Differential associations and definitions: a panel study of youthful drinking behavior. , 1990, The International journal of the addictions.
[155] D. Kahan. Social Influence, Social Meaning, and Deterrence , 1997 .
[156] G. Larry Mays,et al. Social Learning Theory, Self-Reported Delinquency, and Youth Gangs , 1994 .
[157] Vesna Bilić. The Role of Perceived Social Injustice and Care Received from the Environment in Predicting Cyberbullying and Cybervictimization , 2014 .
[158] Kit-Aun Tan,et al. Normative Beliefs About Aggression as a Mediator of Narcissistic Exploitativeness and Cyberbullying , 2011, Journal of interpersonal violence.
[159] Ersilia Menesini,et al. Morality, values, traditional bullying, and cyberbullying in adolescence. , 2013, The British journal of developmental psychology.
[160] A. Gillespie,et al. Cyber‐bullying and Harassment of Teenagers: The Legal Response , 2006 .
[161] L. Siegel,et al. Criminology: The Core , 2005 .
[162] Pamela Irving Jackson,et al. Crime, youth gangs, and urban transition: The social dislocations of postindustrial economic development , 1991 .
[163] Dianne L. Hoff,et al. Cyberbullying: causes, effects, and remedies , 2009 .
[164] Jennifer Watling Neal,et al. Social Aggression and Social Position in Middle Childhood and Early Adolescence: Burning Bridges or Building Them? , 2010, The Journal of early adolescence.
[165] Ronald T. Cenfetelli,et al. Interpretation of Formative Measurement in Information Systems Research , 2009, MIS Q..
[166] L. Harris,et al. Online consumer misbehaviour: an application of neutralization theory , 2009 .
[167] Christopher P. Barlett,et al. Predicting Cyberbullying From Anonymity. , 2014 .
[168] S. Hymel,et al. Moral disengagement among children and youth: a meta-analytic review of links to aggressive behavior. , 2014, Aggressive behavior.
[169] Tom L. Roberts,et al. The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets , 2015, J. Manag. Inf. Syst..
[170] Tanya N. Beran,et al. The Relationship between Cyberbullying and School Bullying , 2008 .
[171] Michelle L. Kelley,et al. Predictors of cyberbullying perpetration among college students: An application of the Theory of Reasoned Action , 2014, Comput. Hum. Behav..
[172] Douglas A. Gentile,et al. Attacking others online: The formation of cyberbullying in late adolescence. , 2012 .
[173] Qing Li,et al. Bullying in the new playground: Research into cyberbullying and cyber victimisation , 2007 .
[174] W. W. Minor,et al. Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .
[175] H. Tavani,et al. Cyberstalking, personal privacy, and moral responsibility , 2002, Ethics and Information Technology.
[176] Andrew Thatcher,et al. Modelling Social Cognitive Theory to Explain Software Piracy Intention , 2011, HCI.
[177] L. Lanza-Kaduce,et al. Binge Drinking Among College Students: A Partial Test of Akers’ Social Structure-Social Learning Theory , 2013 .
[178] David Davenport,et al. Anonymity on the Internet: why the price may be too high , 2002, CACM.
[179] D. Goh,et al. Cyberbullying Among Adolescents: The Role of Affective and Cognitive Empathy, and Gender , 2010, Child psychiatry and human development.
[180] Michele L. Ybarra. Linkages between Depressive Symptomatology and Internet Harassment among Young Regular Internet Users , 2004, Cyberpsychology Behav. Soc. Netw..
[181] Ronald L. Akers,et al. Social Learning and Structural Factors in Adolescent Substance Use , 2004 .
[182] Chih-Hung Ko,et al. The Association between Internet Addiction and Problematic Alcohol Use in Adolescents: The Problem Behavior Model , 2008, Cyberpsychology Behav. Soc. Netw..
[183] Francine Dehue,et al. Cyberbullying: Youngsters' Experiences and Parental Perception , 2008, Cyberpsychology Behav. Soc. Netw..
[184] George W. Burruss,et al. SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD , 2010 .
[185] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[186] Justin W. Patchin,et al. Social Influences on Cyberbullying Behaviors Among Middle and High School Students , 2013, Journal of youth and adolescence.