Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model

The dramatic increase in social media use has challenged traditional social structures and shifted a great deal of interpersonal communication from the physical world to cyberspace. Much of this social media communication has been positive: Anyone around the world who has access to the Internet has the potential to communicate with and attract a massive global audience. Unfortunately, such ubiquitous communication can be also used for negative purposes such as cyberbullying, which is the focus of this paper. Previous research on cyberbullying, consisting of 135 articles, has improved the understanding of why individuals—mostly adolescents—engage in cyberbullying. However, our study addresses two key gaps in this literature: (1) how the information technology (IT) artifact fosters/inhibits cyberbullying and (2) why people are socialized to engage in cyberbullying. To address these gaps, we propose the social media cyberbullying model (SMCBM), which modifies Akers’ [Akers RL (2011) Social Learning and Socia...

[1]  C. Higgins,et al.  A Self-Efficacy Theory Explanation for the Management of Remote Workers in Virtual Organizations , 1999 .

[2]  W. Heirman,et al.  Cyberbullying: Predicting Victimisation and Perpetration , 2011 .

[3]  L. Treviño,et al.  Behavioral Ethics in Organizations: A Review , 2006 .

[4]  Michelle F. Wright Predictors of Anonymous Cyber Aggression: The Role of Adolescents' Beliefs About Anonymity, Aggression, and the Permanency of Digital Content , 2014, Cyberpsychology Behav. Soc. Netw..

[5]  K. Williams,et al.  Prevalence and predictors of internet bullying. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[6]  Robert S. Tokunaga,et al.  Following you home from school: A critical review and synthesis of research on cyberbullying victimization , 2010, Comput. Hum. Behav..

[7]  Justin W. Patchin,et al.  Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .

[8]  Tom L. Roberts,et al.  Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust , 2015, Inf. Syst. J..

[9]  S. Smoyak,et al.  Perceptions of Cyberstalking Among College Students , 2005 .

[10]  Ekaterina V. Botchkovar,et al.  Social Learning, Reinforcement and Crime: Evidence from Three European Cities , 2012 .

[11]  Tom L. Roberts,et al.  Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..

[12]  Robert D. Crutchfield,et al.  Crime Rate and Social Integration The Impact of Metropolitan Mobility , 1982 .

[13]  H. Machácková,et al.  Cyberbullying: The Discriminant Factors Among Cyberbullies, Cybervictims, and Cyberbully-Victims in a Czech Adolescent Sample. , 2015, Journal of interpersonal violence.

[14]  Michele L. Ybarra,et al.  Youth engaging in online harassment: associations with caregiver-child relationships, Internet use, and personal characteristics. , 2004, Journal of adolescence.

[15]  Robin M. Kowalski,et al.  Traditional bullying as a potential warning sign of cyberbullying , 2012 .

[16]  I. Ajzen The theory of planned behavior , 1991 .

[17]  Richard N. Landers,et al.  An Inconvenient Truth: Arbitrary Distinctions Between Organizational, Mechanical Turk, and Other Convenience Samples , 2015, Industrial and Organizational Psychology.

[18]  R. Lennox,et al.  Conventional wisdom on measurement: A structural equation perspective. , 1991 .

[19]  Carolyn Axtell,et al.  Exploring the impact of workplace cyberbullying on trainee doctors , 2015, Medical education.

[20]  Amar Cheema,et al.  Data collection in a flat world: the strengths and weaknesses of mechanical turk samples , 2013 .

[21]  W. Heirman,et al.  Predicting adolescent perpetration in cyberbullying: an application of the theory of planned behavior. , 2012, Psicothema.

[22]  B. Xiao,et al.  Cyber-Bullying Among University Students: An Empirical Investigation from the Social Cognitive Perspective , 2013 .

[23]  Shu Ching Yang,et al.  Paths to Bullying in Online Gaming: The Effects of Gender, Preference for Playing Violent Games, Hostility, and Aggressive Behavior on Bullying , 2012 .

[24]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[25]  Paul Benjamin Lowry,et al.  "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels , 2016, J. Strateg. Inf. Syst..

[26]  Tolga Aricak,et al.  Cyberbullying among Turkish Adolescents , 2008, Cyberpsychology Behav. Soc. Netw..

[27]  Robyn Cooper,et al.  Responses to Cyberbullying: A Descriptive Analysis of the Frequency of and Impact on LGBT and Allied Youth , 2012 .

[28]  Qing Li Cyberbullying in Schools , 2006 .

[29]  Qing Li,et al.  New bottle but old wine: A research of cyberbullying in schools , 2007, Comput. Hum. Behav..

[30]  Juliana Raskauskas,et al.  Involvement in traditional and electronic bullying among adolescents. , 2007, Developmental psychology.

[31]  Tamara D. Madensen,et al.  The Empirical Status of Social Learning Theory: A Meta‐Analysis , 2010 .

[32]  T. Li Cyber-Harassment: A Study of a New Method for an Old Behavior , 2005 .

[33]  T. Fung,et al.  Predicting Student Behaviors , 2012 .

[34]  Francesca Philips,et al.  Cyberstalking and Cyberpredators: A Threat to Safe Sexuality on the Internet , 2004 .

[35]  Reinis Udris,et al.  Cyberbullying among high school students in Japan: Development and validation of the Online Disinhibition Scale , 2014, Comput. Hum. Behav..

[36]  Peter K. Smith,et al.  Cyberbullying Definition Among Adolescents: A Comparison Across Six European Countries , 2012, Cyberpsychology Behav. Soc. Netw..

[37]  Leroy McFarlane,et al.  An exploration of predatory behaviour in cyberspace: Towards a typology of cyberstalkers , 2003, First Monday.

[38]  Claire Robson,et al.  The Influence of Moral Disengagement, Morally Based Self-Esteem, Age, and Gender on Traditional Bullying and Cyberbullying , 2013 .

[39]  V. Mitchell,et al.  Generation Y Attitudes Towards E-ethics and Internet-related Misbehaviours , 2004 .

[40]  Detmar W. Straub,et al.  Validation Guidelines for IS Positivist Research , 2004, Commun. Assoc. Inf. Syst..

[41]  Ronald L. Akers,et al.  SOCIAL LEARNING THEORY AND ALCOHOL BEHAVIOR AMONG THE ELDERLY , 1989 .

[42]  Lara A. Frumkin,et al.  Cyberbullying experiences on-the-go: when social media can become distressing , 2013 .

[43]  William N. Trumbull Estimations of the Economic Model of Crime Using Aggregate and Individual Level Data , 1989 .

[44]  Justin W. Patchin,et al.  Bullying, Cyberbullying, and Suicide , 2010, Archives of suicide research : official journal of the International Academy for Suicide Research.

[45]  Özgür Erdur-Baker,et al.  Examination of Cyberbullying Experiences among Turkish Students from Different School Types , 2008, Cyberpsychology Behav. Soc. Netw..

[46]  Sheldon DANZlGER,et al.  EXPLAINING URBAN CRIME RATES , 1976 .

[47]  Paul F. Cromwell,et al.  the devil made me do it: use of neutralizations by shoplifters , 2003 .

[48]  A. Sourander,et al.  Psychosocial risk factors associated with cyberbullying among adolescents: a population-based study. , 2010, Archives of general psychiatry.

[49]  David J. Faulds,et al.  Social media: The new hybrid element of the promotion mix , 2009 .

[50]  Qing Li A cross-cultural comparison of adolescents' experience related to cyberbullying , 2008 .

[51]  R. A. Dodder,et al.  techniques of neutralization used by deer poachers in the western united states: a research note , 1999 .

[52]  Paul Benjamin Lowry,et al.  Proposing the control‐reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies , 2015, Inf. Syst. J..

[53]  C. Pornari,et al.  Peer and cyber aggression in secondary school students: the role of moral disengagement, hostile attribution bias, and outcome expectancies. , 2010, Aggressive behavior.

[54]  Peter K. Smith,et al.  Cyberbullying: another main type of bullying? , 2008, Scandinavian journal of psychology.

[55]  E. Vance Wilson,et al.  Antecedents and determinants of information technology habit , 2010, Inf. Manag..

[56]  Julia Riebel,et al.  Cyberbullying in Germany - an exploration of prevalence, overlapping with real life bullying and coping strategies , 2009 .

[57]  J. D. Orcutt,et al.  Gender, Race/Ethnicity, and Deviant Drinking: A Longitudinal Application of Social Structure and Social Learning Theory , 2012 .

[58]  Michael Workman,et al.  A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives , 2010, Comput. Secur..

[59]  Zebbedia G. Gibb,et al.  Who does that anyway? Predictors and personality correlates of cyberbullying in college , 2014, Comput. Hum. Behav..

[60]  Justin M. Smith,et al.  Teenage Drug and Alcohol Use: Comparing Individual and Contextual Effects , 2011 .

[61]  Arik Ragowsky,et al.  Establishing Trust in Electronic Commerce Through Online Word of Mouth: An Examination Across Genders , 2008, J. Manag. Inf. Syst..

[62]  Justin W. Patchin,et al.  Traditional and Nontraditional Bullying Among Youth: A Test of General Strain Theory , 2011 .

[63]  D. Espelage,et al.  Differentiating cyber bullying perpetration from non-physical bullying: commonalities across race, individual, and family predictors. , 2013 .

[64]  A. Hayes Beyond Baron and Kenny: Statistical Mediation Analysis in the New Millennium , 2009 .

[65]  R. Bennett,et al.  Development of a measure of workplace deviance. , 2000, The Journal of applied psychology.

[66]  Jennifer Bonds-Raacke,et al.  College Students' Facebook Stalking of Ex-Partners , 2011, Cyberpsychology Behav. Soc. Netw..

[67]  Petri Puhakainen,et al.  A design theory for information security awareness , 2006 .

[68]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[69]  R. Ang,et al.  Understanding the Relationship Between Proactive and Reactive Aggression, and Cyberbullying Across United States and Singapore Adolescent Samples , 2014, Journal of interpersonal violence.

[70]  P. Markey Bystander intervention in computer-mediated communication , 2000 .

[71]  H. Winklhofer,et al.  Index Construction with Formative Indicators: An Alternative to Scale Development , 2001 .

[72]  Mikko T. Siponen,et al.  Motivating IS security compliance: Insights from Habit and Protection Motivation Theory , 2012, Inf. Manag..

[73]  S. Hemphill,et al.  Adolescent predictors of young adult cyberbullying perpetration and victimization among Australian youth. , 2014, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[74]  Özgür Erdur-Baker,et al.  Cyberbullying and its correlation to traditional bullying, gender and frequent and risky usage of internet-mediated communication tools , 2010, New Media Soc..

[75]  Paul A. Pavlou,et al.  Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..

[76]  Peter K. Smith,et al.  Cyberbullying: its nature and impact in secondary school pupils. , 2008, Journal of child psychology and psychiatry, and allied disciplines.

[77]  Azy Barak,et al.  Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition , 2012, Comput. Hum. Behav..

[78]  Elin Waring,et al.  Coercive mobility and crime: A preliminary examination of concentrated incarceration and social disorganization , 2003 .

[79]  Jim Mitchell,et al.  An examination of types of delinquency through path analysis , 1980, Journal of youth and adolescence.

[80]  Bulent Dilmac,et al.  Psychological Needs as a Predictor of Cyber Bullying: A Preliminary Report on College Students , 2009 .

[81]  Alain Pinsonneault,et al.  Anonymity in Group Support Systems Research: A New Conceptualization, Measure, and Contingency Framework , 1997, J. Manag. Inf. Syst..

[82]  K. Varjas,et al.  High School Students’ Perceptions of Motivations for Cyberbullying: An Exploratory Study , 2010, The western journal of emergency medicine.

[83]  John P. Hoffmann,et al.  A Contextual Analysis of Differential Association, Social Control, and Strain Theories of Delinquency , 2003 .

[84]  Sameer Hinduja,et al.  Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.

[85]  Robert D. Crutchfield,et al.  Labor Stratification and Violent Crime , 1989 .

[86]  Paul Benjamin Lowry,et al.  Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It , 2014, IEEE Transactions on Professional Communication.

[87]  Heidi Vandebosch,et al.  Cyberbullying among youngsters: profiles of bullies and victims , 2009, New Media Soc..

[88]  Michele J. Fleming,et al.  “i h8 u”: The Influence of Normative Beliefs and Hostile Response Selection in Predicting Adolescents' Mobile Phone Aggression—A Pilot Study , 2010 .

[89]  C. Walker,et al.  Twenty First Century Cyberbullying Defined: An Analysis of Intent, Repetition and Emotional Response. , 2012 .

[90]  Lieven Pauwels,et al.  Differential Online Exposure to Extremist Content and Political Violence: Testing the Relative Strength of Social Learning and Competing Perspectives , 2016 .

[91]  Herbert Scheithauer,et al.  Social-Behavioral Correlates of Cyberbullying in a German Student Sample , 2009 .

[92]  Tatsuya Suda,et al.  Anonymity and roles associated with aggressive posts in an online forum , 2012, Comput. Hum. Behav..

[93]  Mikko T. Siponen,et al.  Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work , 2013, Inf. Manag..

[94]  A. Baroncelli,et al.  Unique effects of different components of trait emotional intelligence in traditional bullying and cyberbullying. , 2014, Journal of adolescence.

[95]  Paul Benjamin Lowry,et al.  The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups , 2009, J. Manag. Inf. Syst..

[96]  Daniel L. Sherrell,et al.  Communications of the Association for Information Systems , 1999 .

[97]  Alison Virginia King Constitutionality of Cyberbullying Laws: Keeping the Online Playground Safe for Both Teens and Free Speech , 2010 .

[98]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[99]  Robin M. Kowalski,et al.  Electronic bullying among middle school students. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[100]  Robert Slonje,et al.  The nature of cyberbullying, and strategies for prevention , 2013, Comput. Hum. Behav..

[101]  DinevTamara,et al.  Does deterrence work in reducing information security policy abuse by employees , 2011 .

[102]  D. Mackinnon Introduction to Statistical Mediation Analysis , 2008 .

[103]  George E. Higgins,et al.  Criminological theory in the digital age: The case of social learning theory and digital piracy☆ , 2010 .

[104]  Chien Chou,et al.  An analysis of multiple factors of cyberbullying among junior high school students in Taiwan , 2010, Comput. Hum. Behav..

[105]  T. Postmes,et al.  A Social Identity Model of Deindividuation Phenomena , 1995 .

[106]  D. Cross,et al.  Cyberbullying Versus Face-to-Face Bullying A Theoretical and Conceptual Review , 2009 .

[107]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[108]  L. Lanza-Kaduce,et al.  Liquor Is Quicker , 2006 .

[109]  Constantinos M. Kokkinos,et al.  Cyber-Bullying, Personality and Coping among Pre-Adolescents , 2013, Int. J. Cyber Behav. Psychol. Learn..

[110]  Douglas A. Gentile,et al.  An Empirical Examination of the Strength Differential Hypothesis in Cyberbullying Behavior , 2017 .

[111]  Detmar W. Straub,et al.  Information Technology Adoption Across Time: A Cross-Sectional Comparison of Pre-Adoption and Post-Adoption Beliefs , 1999, MIS Q..

[112]  F. Mishna,et al.  Risk Factors for involvement in cyber bullying: Victims, bullies, and bully-victims , 2012 .

[113]  Ronald L. Akers Social Structure and Social Learning in Crime and Deviance , 2017 .

[114]  Leroy McFarlane,et al.  Cyberstalking: The Technology of Hate , 2003 .

[115]  C. Spiel,et al.  Traditional Bullying and Cyberbullying Identification of Risk Groups for Adjustment Problems , 2009 .

[116]  Robert L. Akers,et al.  A Differential Association-Reinforcement Theory of Criminal Behavior , 1966 .

[117]  P. Valkenburg,et al.  Online communication among adolescents: an integrated model of its attraction, opportunities, and risks. , 2011, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[118]  Tejaswini Herath,et al.  A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..

[119]  Maria Assunta Zanetti,et al.  Morally Disengaged and Unempathic: Do Cyberbullies Fit These Definitions? An Exploratory Study , 2012, Cyberpsychology Behav. Soc. Netw..

[120]  S. Bauman Cyberbullying in a Rural Intermediate School: An Exploratory Study , 2010 .

[121]  Jordana N. Navarro,et al.  Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences , 2012 .

[122]  Dennis F. Galletta,et al.  The Drivers in the Use of Online Whistle-Blowing Reporting Systems , 2013, J. Manag. Inf. Syst..

[123]  Andrew Silke,et al.  Deindividuation, Anonymity, and Violence: Findings From Northern Ireland , 2003, The Journal of social psychology.

[124]  Donald R. Cressey,et al.  Epidemiology and Individual Conduct: A Case from Criminology , 1960 .

[125]  Ronald L. Akers,et al.  Social learning and social structure : a general theory of crime and deviance , 1999 .

[126]  Elisheva F. Gross,et al.  Extending the school grounds?--Bullying experiences in cyberspace. , 2008, The Journal of school health.

[127]  K. Durkin,et al.  COLLEGE STUDENTS AND BINGE DRINKING: AN EVALUATION OF SOCIAL LEARNING THEORY , 2005 .

[128]  Ronald L. Akers,et al.  age, social learning, and social bonding in adolescent substance use , 1999 .

[129]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[130]  Eunyoung Kim,et al.  A Cross-Cultural Test of Social Structure and Social Learning: Alcohol Use among South Korean Adolescents , 2013 .

[131]  Cheryl Burke Jarvis,et al.  A Critical Review of Construct Indicators and Measurement Model Misspecification in Marketing and Consumer Research , 2003 .

[132]  R. Spears,et al.  Knowing Me, Knowing You: Anonymity Effects on Social Identity Processes within Groups , 2001 .

[133]  Judy A. Siguaw,et al.  Formative versus Reflective Indicators in Organizational Measure Development: A Comparison and Empirical Illustration , 2006 .

[134]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .

[135]  Andrea Everard,et al.  Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..

[136]  Çiğdem Topcu,et al.  Cyber Bullying @ Schools: What do Turkish Adolescents Think? , 2013 .

[137]  Paul Benjamin Lowry,et al.  A New Approach to the Problem of Access Policy Violations: Increasing Perceptions of Accountability through the User Interface , 2015 .

[138]  S. Bauman,et al.  Bullying and cyberbullying among deaf students and their hearing peers: an exploratory study. , 2011, Journal of deaf studies and deaf education.

[139]  Juyoung Song,et al.  Does the offline bully-victimization influence cyberbullying behavior among youths? Application of General Strain Theory , 2014, Comput. Hum. Behav..

[140]  J. Graber,et al.  Traditional and Cyber Aggressors and Victims: A Comparison of Psychosocial Characteristics , 2011, Journal of youth and adolescence.

[141]  Mark Warr,et al.  AGE, PEERS, AND DELINQUENCY* , 1993 .

[142]  Jan Pfetsch,et al.  Ethical Media Competence as a Protective Factor Against Cyberbullying and Cybervictimization Among German School Students , 2014, Cyberpsychology Behav. Soc. Netw..

[143]  Steven V. Rouse,et al.  A reliability analysis of Mechanical Turk data , 2015, Comput. Hum. Behav..

[144]  M. Sobel Asymptotic Confidence Intervals for Indirect Effects in Structural Equation Models , 1982 .

[145]  Lourdes Villardón-Gallego,et al.  Cyberbullying in adolescents: Modalities and aggressors' profile , 2010, Comput. Hum. Behav..

[146]  John Suler,et al.  The Online Disinhibition Effect , 2004, Cyberpsychology Behav. Soc. Netw..

[147]  Glenn L. Pierce,et al.  REEXAMINING SOCIAL DISORGANIZATION THEORY USING CALLS TO THE POLICE AS A MEASURE OF CRIME , 1993 .

[148]  David Šmahel,et al.  Cyberbullying in context: Direct and indirect effects by low self-control across 25 European countries , 2011 .

[149]  Laurence Steinberg,et al.  Peer influence on risk taking, risk preference, and risky decision making in adolescence and adulthood: an experimental study. , 2005, Developmental psychology.

[150]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[151]  Marcia J. Simmering,et al.  A Tale of Three Perspectives , 2009 .

[152]  A. Tenbrunsel,et al.  Organizational Behavior and Human Decision Processes , 2013 .

[153]  W. F. Skinner,et al.  A Social Learning Theory Analysis of Computer Crime among College Students , 1997 .

[154]  L. Winfree,et al.  Differential associations and definitions: a panel study of youthful drinking behavior. , 1990, The International journal of the addictions.

[155]  D. Kahan Social Influence, Social Meaning, and Deterrence , 1997 .

[156]  G. Larry Mays,et al.  Social Learning Theory, Self-Reported Delinquency, and Youth Gangs , 1994 .

[157]  Vesna Bilić The Role of Perceived Social Injustice and Care Received from the Environment in Predicting Cyberbullying and Cybervictimization , 2014 .

[158]  Kit-Aun Tan,et al.  Normative Beliefs About Aggression as a Mediator of Narcissistic Exploitativeness and Cyberbullying , 2011, Journal of interpersonal violence.

[159]  Ersilia Menesini,et al.  Morality, values, traditional bullying, and cyberbullying in adolescence. , 2013, The British journal of developmental psychology.

[160]  A. Gillespie,et al.  Cyber‐bullying and Harassment of Teenagers: The Legal Response , 2006 .

[161]  L. Siegel,et al.  Criminology: The Core , 2005 .

[162]  Pamela Irving Jackson,et al.  Crime, youth gangs, and urban transition: The social dislocations of postindustrial economic development , 1991 .

[163]  Dianne L. Hoff,et al.  Cyberbullying: causes, effects, and remedies , 2009 .

[164]  Jennifer Watling Neal,et al.  Social Aggression and Social Position in Middle Childhood and Early Adolescence: Burning Bridges or Building Them? , 2010, The Journal of early adolescence.

[165]  Ronald T. Cenfetelli,et al.  Interpretation of Formative Measurement in Information Systems Research , 2009, MIS Q..

[166]  L. Harris,et al.  Online consumer misbehaviour: an application of neutralization theory , 2009 .

[167]  Christopher P. Barlett,et al.  Predicting Cyberbullying From Anonymity. , 2014 .

[168]  S. Hymel,et al.  Moral disengagement among children and youth: a meta-analytic review of links to aggressive behavior. , 2014, Aggressive behavior.

[169]  Tom L. Roberts,et al.  The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets , 2015, J. Manag. Inf. Syst..

[170]  Tanya N. Beran,et al.  The Relationship between Cyberbullying and School Bullying , 2008 .

[171]  Michelle L. Kelley,et al.  Predictors of cyberbullying perpetration among college students: An application of the Theory of Reasoned Action , 2014, Comput. Hum. Behav..

[172]  Douglas A. Gentile,et al.  Attacking others online: The formation of cyberbullying in late adolescence. , 2012 .

[173]  Qing Li,et al.  Bullying in the new playground: Research into cyberbullying and cyber victimisation , 2007 .

[174]  W. W. Minor,et al.  Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .

[175]  H. Tavani,et al.  Cyberstalking, personal privacy, and moral responsibility , 2002, Ethics and Information Technology.

[176]  Andrew Thatcher,et al.  Modelling Social Cognitive Theory to Explain Software Piracy Intention , 2011, HCI.

[177]  L. Lanza-Kaduce,et al.  Binge Drinking Among College Students: A Partial Test of Akers’ Social Structure-Social Learning Theory , 2013 .

[178]  David Davenport,et al.  Anonymity on the Internet: why the price may be too high , 2002, CACM.

[179]  D. Goh,et al.  Cyberbullying Among Adolescents: The Role of Affective and Cognitive Empathy, and Gender , 2010, Child psychiatry and human development.

[180]  Michele L. Ybarra Linkages between Depressive Symptomatology and Internet Harassment among Young Regular Internet Users , 2004, Cyberpsychology Behav. Soc. Netw..

[181]  Ronald L. Akers,et al.  Social Learning and Structural Factors in Adolescent Substance Use , 2004 .

[182]  Chih-Hung Ko,et al.  The Association between Internet Addiction and Problematic Alcohol Use in Adolescents: The Problem Behavior Model , 2008, Cyberpsychology Behav. Soc. Netw..

[183]  Francine Dehue,et al.  Cyberbullying: Youngsters' Experiences and Parental Perception , 2008, Cyberpsychology Behav. Soc. Netw..

[184]  George W. Burruss,et al.  SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD , 2010 .

[185]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[186]  Justin W. Patchin,et al.  Social Influences on Cyberbullying Behaviors Among Middle and High School Students , 2013, Journal of youth and adolescence.