The Empirical Study on Human Flesh Search Based on neutralization Theory

Human Flesh Search((HFS) is a search phenomenon emerging on the Internetin recent years, which integrates machine search and manual search, and is usually used to find or identify immoral events or characters. But problematically in the process of HFS, the personal information of search objects is posted on the Internet, which seriously violates the privacy protection of the search objects and affectes the real lives of others. In this paper, we apply the neutralization technology theory and deterrence theory, both prominent in criminology, with the construction of privacy awareness, to study the behavior of participants of the HFS. Using smartPLS2.0 software to analyze 574 questionnaires, we got our research conclusion. We find that the technologies of denial of responsibility, denial of injury, denial of victim, appeal to higher loyalties, avoidance of greater harm and privacy awareness significantly influence the intention to participate in the HFS, but the metaphor of the ledger technology, the certainty of sanction and the severity of the sanction have no significant effect on HFS participation intention. Based on the results of this study, we conduct a detailed analysis and give some appropriate instructions. At last, the research conclusion may have some potentially fruitful reference for related legislation and be helpful to guide the Internet behavior of netizens.

[1]  Catherine D. Marcum,et al.  Deterrence and Digital Piracy , 2008 .

[2]  R. A. Dodder,et al.  techniques of neutralization used by deer poachers in the western united states: a research note , 1999 .

[3]  Sameer Hinduja,et al.  Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.

[4]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .

[5]  Donald L. Mccabe The Influence of Situational Ethics on Cheating Among College Students , 1992 .

[6]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[7]  Bing Wang,et al.  Human Flesh Search Model Incorporating Network Expansion and GOSSIP with Feedback , 2009, 2009 13th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications.

[8]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[9]  Catherine D. Marcum,et al.  A Preliminary Examination of the Role of Viruses , 2010 .

[10]  Jana L. Pershing To Snitch or Not to Snitch? Applying the Concept of Neutralization Techniques to the Enforcement of Occupational Misconduct , 2003 .

[11]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[12]  Mariana Hentea A Perspective on Achieving Information Security Awareness , 2005 .

[13]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[14]  Yu-Hui Tao,et al.  Human Flesh Search: A Supplemental Review , 2012, Cyberpsychology Behav. Soc. Netw..

[15]  Mikko T. Siponen,et al.  Six Design Theories for IS Security Policies and Guidelines , 2006, J. Assoc. Inf. Syst..

[16]  Joseph W. Rogers,et al.  Neutralization Techniques , 1974 .

[17]  Xiaoyan Pan Hunt by the Crowd: An Exploratory Qualitative Analysis on Cyber Surveillance in China , 2010 .

[18]  Lei Zhang,et al.  A study of human flesh search with epidemic models , 2012, WebSci '12.

[19]  Yuen J. Huo,et al.  Trust in the Law , 2002 .

[20]  Carl B. Klockars The Professional Fence , 1975 .

[21]  Stefanie Pötzsch,et al.  Privacy Awareness: A Means to Solve the Privacy Paradox? , 2008, FIDIS.

[22]  Petri Puhakainen,et al.  A design theory for information security awareness , 2006 .

[23]  Donald E. Green Measures of Illegal Behavior in Individual-Level Deterrence Research , 1989 .

[24]  Lee Sproull,et al.  Computers, Networks and Work. , 1991 .

[25]  D. Dabney,et al.  Neutralization and deviance in the workplace: Theft of supplies and medicines by hospital nurses , 1995 .

[26]  B. Guerin Social Behaviors as Determined by Different Arrangements of Social Consequences: Diffusion of Responsibility Effects With Competition , 2003, The Journal of social psychology.

[27]  Mikko T. Siponen,et al.  New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[28]  Dennis E. Garrett,et al.  Issues management and organizational accounts: An analysis of corporate responses to accusations of unethical business practices , 1989 .

[29]  Quint C. Thurman,et al.  Neutralization and Tax Evasion: How Effective Would a Moral Appeal Be in Improving Compliance to Tax Laws? , 1984 .

[30]  S. Hinduja,et al.  Neutralizing Music Piracy: An Empirical Examination , 2008 .

[31]  Izak Benbasat,et al.  Roles of Information Security Awareness and Perceived Fairness in Information Security Policy Compliance , 2009, AMCIS.

[32]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[33]  V. Lim The IT way of loafing on the job: cyberloafing, neutralizing and organizational justice , 2002 .

[34]  Anat Hovav,et al.  Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea , 2012, Inf. Manag..

[35]  Mikko T. Siponen,et al.  A conceptual foundation for organizational information security awareness , 2000, Inf. Manag. Comput. Secur..

[36]  Mikko T. Siponen,et al.  Five dimensions of information security awareness , 2001, CSOC.

[37]  T. Priest,et al.  TECHNIQUES OF NEUTRALIZATION: YOUNG ADULT MARIJUANA SMOKERS , 1970 .

[38]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[39]  Detmar W. Straub,et al.  Security concerns of system users: A study of perceptions of the adequacy of security , 1991, Inf. Manag..

[40]  D'ArcyJohn,et al.  Applying an extended model of deterrence across cultures , 2012 .

[41]  Namjoo Choi,et al.  Knowing is doing: An empirical validation of the relationship between managerial information security awareness and action , 2008, Inf. Manag. Comput. Secur..

[42]  Weng Guo The Conflict of the Right to Privacy and the Right to Know , 2002 .

[43]  Ronald L. Akers,et al.  Criminological Theories: Introduction and Evaluation , 1994 .

[44]  Michael B. Blankenship,et al.  examining the role of differential association and techniques of neutralization in explaining corporate crime , 2005 .

[45]  R. Briggs,et al.  Association for Information Systems , 2009 .

[46]  James A. Hendler,et al.  A Study of the Human Flesh Search Engine: Crowd-Powered Expansion of Online Knowledge , 2010, Computer.

[47]  Susan J. Harrington,et al.  The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..