Combating Online Abuse: What Drives People to Use Online Reporting Functions on Social Networking Sites
暂无分享,去创建一个
[1] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[2] Notice for ‘Cyberbullying in schools: A research of gender differences’ , 2014 .
[3] A. Manstead,et al. Social appraisal: the social world as object of and influence on appraisal processes , 2001 .
[4] Gianluca Gini,et al. Friend similarity in attitudes toward bullying and sense of responsibility to intervene , 2013 .
[5] Norman Miller,et al. Personal responsibility and altruism in children , 1982 .
[6] Francine Dehue,et al. Cyberbullying: Youngsters' Experiences and Parental Perception , 2008, Cyberpsychology Behav. Soc. Netw..
[7] David Gefen,et al. The impact of developer responsiveness on perceptions of usefulness and ease of use: an extension of the technology acceptance model , 1998, DATB.
[8] Alexander Ardichvili,et al. Motivation and barriers to participation in virtual knowledge-sharing communities of practice , 2003, J. Knowl. Manag..
[9] D. Laible,et al. Dimensions of Conscience in Mid-adolescence: Links with Social Behavior, Parenting, and Temperament , 2008 .
[10] Thompson S. H. Teo,et al. Adoption of the Internet and WAP-enabled phones in Singapore , 2003, Behav. Inf. Technol..
[11] Peter K. Smith,et al. Comparing student perceptions of coping strategies and school interventions in managing bullying and cyberbullying incidents , 2012 .
[12] Matthew K. O. Lee,et al. Acceptance of Internet-based learning medium: the role of extrinsic and intrinsic motivation , 2005, Inf. Manag..
[13] R. Zajonc. SOCIAL FACILITATION. , 1965, Science.
[14] Ohbyung Kwon,et al. An empirical study of the factors affecting social network service use , 2010, Comput. Hum. Behav..
[15] F. Mishna,et al. Real-World Dangers in an Online Reality: A Qualitative Study Examining Online Relationships and Cyber Abuse , 2009 .
[16] Elizabeth D. Cox,et al. Problematic internet use among US youth: a systematic review. , 2011, Archives of pediatrics & adolescent medicine.
[17] Dongwon Lee,et al. On the Explanation of Factors Affecting E-Commerce Adoption , 2001, ICIS.
[18] Raafat George Saadé,et al. The impact of cognitive absorption on perceived usefulness and perceived ease of use in on-line learning: an extension of the technology acceptance model , 2005, Inf. Manag..
[19] Deborah A. Small,et al. The Scarecrow and the Tin Man: The Vicissitudes of Human Sympathy and Caring , 2007 .
[20] B. Latané,et al. The Unresponsive Bystander: Why Doesn't He Help? , 1972 .
[21] Stacey J. Bosick,et al. Reporting violence to the police: Predictors through the life course , 2012 .
[22] Thomas Hugh Feeley,et al. Measurement of the bystander intervention model for bullying and sexual harassment. , 2014, Journal of adolescence.
[23] Louis A. Penner,et al. The Social Psychology of Prosocial Behavior , 2006 .
[24] Justin W. Patchin,et al. Bullying, Cyberbullying, and Suicide , 2010, Archives of suicide research : official journal of the International Academy for Suicide Research.
[25] James Hollings,et al. Let the Story Go: The Role of Emotion in the Decision-Making Process of the Reluctant, Vulnerable Witness or Whistle-Blower , 2013 .
[26] Enrique Gracia,et al. Police Involvement in Cases of Intimate Partner Violence Against Women The Influence of Perceived Severity and Personal Responsibility , 2008 .
[27] S. Folkman,et al. Dynamics of a stressful encounter: cognitive appraisal, coping, and encounter outcomes. , 1986, Journal of personality and social psychology.
[28] Younghwa Lee,et al. Threat or coping appraisal: determinants of SMB executives’ decision to adopt anti-malware software , 2009, Eur. J. Inf. Syst..
[29] Rebecca Jacob,et al. Responsibility and accountability , 2015, Journal of anaesthesiology, clinical pharmacology.
[30] F. Mishna,et al. Risk Factors for involvement in cyber bullying: Victims, bullies, and bully-victims , 2012 .
[31] Yajiong Xue,et al. Avoidance of Information Technology Threats: A Theoretical Perspective , 2009, MIS Q..
[32] Ritu Agarwal,et al. Are Individual Differences Germane to the Acceptance of New Information Technologies , 1999 .
[33] Mark Keil,et al. Organizational Silence and Whistle-Blowing on IT Projects: An Integrated Model , 2009, Decis. Sci..
[34] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[35] Virginia Ilie,et al. Psychological Reactance And User Workarounds. A Study In The Context Of Electronic Medical Records Implementations , 2013, ECIS.
[36] Neal M. Ashkanasy,et al. The role of perceptions, appraisals and anticipated emotions in shaping reporting behavior in response to wrongdoing , 2013 .
[37] C. Bolman,et al. Coping with Cyberbullying: Differences Between Victims, Bully‐victims and Children not Involved in Bullying , 2013 .
[38] Roger Tarling,et al. Reporting Crime to the Police , 2010 .
[39] Chien Chou,et al. An analysis of multiple factors of cyberbullying among junior high school students in Taiwan , 2010, Comput. Hum. Behav..
[40] Stanley Schachter,et al. The Psychology of Affiliation: Experimental Studies of the Sources of Gregariousness , 1959 .
[41] Richard S. Lazarus,et al. The role of coping in the emotions and how coping changes over the life course. , 1996 .
[42] Dennis F. Galletta,et al. The Drivers in the Use of Online Whistle-Blowing Reporting Systems , 2013, J. Manag. Inf. Syst..
[43] Craig A. Smith,et al. Appraisal components, core relational themes, and the emotions , 1993 .
[44] R. Lazarus. Psychological stress and the coping process , 1970 .
[45] Meng-Jia Wu,et al. Interventions to Prevent and Reduce Cyber Abuse of Youth: A Systematic Review , 2011 .
[46] Gianluca Gini,et al. Active Defending and Passive Bystanding Behavior in Bullying: The Role of Personal Characteristics and Perceived Peer Pressure , 2010, Journal of abnormal child psychology.
[47] Richard S. Lazarus,et al. The cognition–emotion debate: A bit of history. , 2005 .
[48] Sarah N. Woods,et al. “FearNot!”: a computer-based anti-bullying-programme designed to foster peer intervention , 2011 .
[49] M. Orand,et al. ‘I was bullied too’: stories of bullying and coping in an online community , 2015 .
[50] Stephen A. Rains. The Impact of Anonymity on Perceptions of Source Credibility and Influence in Computer-Mediated Group Communication: A Test of Two Competing Hypotheses , 2007, Commun. Res..
[51] P. Bordia,et al. Differences in sharing knowledge interpersonally and via databases: The role of evaluation apprehension and perceived benefits , 2006 .
[52] J. Juvonen,et al. Sticks and Stones May Break My Bones, but Names Will Make Me Feel Sick: The Psychosocial, Somatic, and Scholastic Consequences of Peer Harassment , 2005, Journal of clinical child and adolescent psychology : the official journal for the Society of Clinical Child and Adolescent Psychology, American Psychological Association, Division 53.
[53] Janis Wolak,et al. Reporting Assaults Against Juveniles to the Police , 2003 .
[54] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[55] Peter Fischer,et al. Coping With Terrorism: The Impact of Increased Salience of Terrorism on Mood and Self-Efficacy of Intrinsically Religious and Nonreligious People , 2006, Personality & social psychology bulletin.
[56] Wendy C. Budin,et al. Making Things Right: Nurses' Experiences with Workplace Bullying—A Grounded Theory , 2012, Nursing research and practice.
[57] Shawn Meghan Burn,et al. A Situational Model of Sexual Assault Prevention through Bystander Intervention , 2009 .
[58] K. Koedinger,et al. Exploring the Assistance Dilemma in Experiments with Cognitive Tutors , 2007 .
[59] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .
[60] Megan Price,et al. Cyberbullying: experiences, impacts and coping strategies as described by Australian young people. , 2010 .
[61] Edward G. Carmines,et al. Reliability and Validity Assessment , 1979 .
[62] Maeve Duggan,et al. Social Media Update 2016 , 2016 .
[63] B. Latané,et al. Bystander intervention in emergencies: diffusion of responsibility. , 1968, Journal of personality and social psychology.