Using IT Design to Prevent Cyberbullying

Abstract The rise of social media has fostered increasing instances of deviant behavior. Arguably, the most notable of these is cyberbullying (CB), which is an increasing global concern because of the social and financial ramifications. This has necessitated a new line of research aimed at understanding and preventing CB. Although much progress has been made in understanding CB, little is known about how to prevent it, especially through the information technology (IT) design. Based on the need for a better causal theory and more effective empirical methods to investigate and mitigate this phenomenon, we leverage the control balance theory (CBT) for system design. Our model examines the causes of CB from several novel angles, including (1) the strong nonlinear influence of control imbalances on CB, and (2) using the concept of fit to understand how different design features of information technology artifacts influence factors such as deindividuation and accountability, thus affecting control imbalance. Using an innovative factorial survey method that enabled us to manipulate IT design features to obtain a nuanced view, we tested our model with 507 adults and found strong support for our model. The results show that IT design features create a strong CB opportunity for individuals who perceive that they are controlled by others. Whether this perception is real or imagined, it creates a sense of vulnerability, prompting them to engage in CB. We can thus propose specific IT design feature manipulations that can be used to discourage CB. These results should have salient implications for researchers and social media designers, especially in developing social media networks that are safe, supportive, responsible, and constructive.

[1]  Joseph S. Valacich,et al.  The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use , 2015, J. Manag. Inf. Syst..

[2]  S. Bauman,et al.  Principles of cyberbullying research: definitions, measures, and methodology , 2013 .

[3]  Wanda J. Orlikowski,et al.  Entanglements in Practice: Performing Anonymity Through Social Media , 2014, MIS Q..

[4]  Jennifer Gibbs,et al.  Social media as a catalyst for online deliberation? Exploring the affordances of Facebook and YouTube for political expression , 2013, Comput. Hum. Behav..

[5]  Sabine Matook,et al.  Are You Feeling Lonely? The Impact of Relationship Characteristics and Online Social Network Features on Loneliness , 2015, J. Manag. Inf. Syst..

[6]  D. Espelage,et al.  What Can Be Done About School Bullying? , 2010 .

[7]  Fintan Culwin,et al.  Supporting social awareness in collaborative e-learning , 2012, Br. J. Educ. Technol..

[8]  Neil A. Morgan,et al.  The impact of product market strategy-organizational culture fit on business performance , 2011 .

[9]  Varun Grover,et al.  The Information Systems Field: Making a Case for Maturity and Contribution , 2012, J. Assoc. Inf. Syst..

[10]  C. R. Tittle,et al.  Continuing the Discussion of Control Balance , 1999 .

[11]  D. Ausubel,et al.  Relationships between shame and guilt in the socializing process. , 1955, Psychological review.

[12]  Bruno S. Silvestre,et al.  Social Media? Get Serious! Understanding the Functional Building Blocks of Social Media , 2011 .

[13]  Panagiotis G. Ipeirotis,et al.  Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.

[14]  Robert E. Crossler,et al.  I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks , 2014, J. Inf. Syst..

[15]  Sheri A Bauman,et al.  New Directions in Cyberbullying Research , 2015 .

[16]  D. Gefen,et al.  Consumer trust in B2C e-Commerce and the importance of social presence: experiments in e-Products and e-Services , 2004 .

[17]  Marcia J. Simmering,et al.  A Tale of Three Perspectives , 2009 .

[18]  Milena M. Head,et al.  Exploring human images in website design: a multi-method approach , 2009 .

[19]  Andy Adler,et al.  Evaluating and implementing a collaborative office document system , 2006, Interact. Comput..

[20]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[21]  N. Venkatraman,et al.  The Concept of Fit in Strategy Research: Towards Verbal and Statistical Correspondence , 2018 .

[22]  Mark Levine,et al.  Deindividuation, power relations between groups and the expression of social identity: The effects of visibility to the out‐group , 1994 .

[23]  T. Postmes,et al.  Social Influence in Computer-Mediated Communication: The Effects of Anonymity on Group Behavior , 2001 .

[24]  A. Hovav,et al.  Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures , 2009 .

[25]  Alex R. Piquero,et al.  Applying Tittle’s control balance theory to police deviance , 2001 .

[26]  Ersilia Menesini,et al.  The Measurement of Cyberbullying: Dimensional Structure and Relative Item Severity and Discrimination , 2011, Cyberpsychology Behav. Soc. Netw..

[27]  Teena Willoughby,et al.  Technology and violence: Conceptual issues raised by the rapidly changing social environment , 2013 .

[28]  J. Cadeaux,et al.  Alternative forms of fit in distribution flexibility strategies , 2012 .

[29]  Sandra L. Calvert,et al.  College students' social networking experiences on Facebook , 2009 .

[30]  Yong Lu,et al.  Harnessing the Power of Self-Organization in an Online Community During Organizational Crisis , 2014, MIS Q..

[31]  Rajeev Sharma,et al.  Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research , 2009 .

[32]  Kimberly M. Christopherson The positive and negative implications of anonymity in Internet social interactions: "On the Internet, Nobody Knows You're a Dog" , 2007, Comput. Hum. Behav..

[33]  Marilyn Anne Campbell,et al.  Cyberbullying: The New Face of Workplace Bullying? , 2009, Cyberpsychology Behav. Soc. Netw..

[34]  Richard T. Watson,et al.  Social Loafing in Technology-Supported Teams , 2008, Computer Supported Cooperative Work (CSCW).

[35]  Yajiong Xue,et al.  The Road to Business-IT Alignment: A Case Study of Two Chinese Companies , 2011, Commun. Assoc. Inf. Syst..

[36]  Alex R. Piquero,et al.  AN EMPIRICAL TEST OF TITTLE'S CONTROL BALANCE THEORY* , 1999 .

[37]  Caroline Lang,et al.  Just untag it: Exploring the management of undesirable Facebook photos , 2015, Comput. Hum. Behav..

[38]  Alex R. Piquero,et al.  Extending Tittle's Control Balance Theory to Account for Victimization , 2003 .

[39]  D. Matsumoto,et al.  The Cambridge Dictionary of Psychology , 2009 .

[40]  Martin Schader,et al.  Workers' Task Choice in Crowdsourcing and Human Computation Markets , 2012, ICIS.

[41]  Lara Khansa,et al.  To Cyberloaf or Not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls , 2017, J. Manag. Inf. Syst..

[42]  Jason Bennett Thatcher,et al.  Conceptualizing models using multidimensional constructs: a review and guidelines for their use , 2012, Eur. J. Inf. Syst..

[43]  Sheldene K. Simola,et al.  Understanding Moral Courage Through a Feminist and Developmental Ethic of Care , 2015 .

[44]  Sonja Utz,et al.  It Is All About Being Popular: The Effects of Need for Popularity on Social Network Site Use , 2012, Cyberpsychology Behav. Soc. Netw..

[45]  Gérard P. Cachon,et al.  Perspective: Complexity Theory and Organization Science , 1999, Organization Science.

[46]  T. Postmes,et al.  Breaching or Building Social Boundaries? , 1998 .

[47]  S. Fiske,et al.  Controlling other people. The impact of power on stereotyping. , 1993, The American psychologist.

[48]  Babak Rahimi The Agonistic Social Media: Cyberspace in the Formation of Dissent and Consolidation of State Power in Postelection Iran , 2011 .

[49]  Jack Rivituso,et al.  Cyberbullying Victimization among College Students: An Interpretive Phenomenological Analysis , 2014, J. Inf. Syst. Educ..

[50]  Paul Benjamin Lowry,et al.  Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It , 2014, IEEE Transactions on Professional Communication.

[51]  Tom L. Roberts,et al.  Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors , 2013, MIS Q..

[52]  Alex R. Piquero,et al.  Control balance and exploitative corporate crime , 2006 .

[53]  Gerald C. Kane,et al.  What's Different about Social Media Networks? A Framework and Research Agenda , 2014, MIS Q..

[54]  Matt R. Nobles,et al.  Assessing Stalking Behaviors in a Control Balance Theory Framework , 2013 .

[55]  Marko M. Skoric,et al.  Facebook bullying: An extension of battles in school , 2013, Comput. Hum. Behav..

[56]  J. Grimes,et al.  Promoting transparency and accountability through ICTs, social media, and collaborative e‐government , 2012 .

[57]  Katherine S. Williams Using Tittle's control balance theory to understand computer crime and deviance , 2008 .

[58]  Alex R. Piquero,et al.  Applying Rasch modeling to the validity of a control balance scale , 2001 .

[59]  Jennifer D. Shapka,et al.  Cyber-Aggression and Victimization and Social Information Processing: Integrating the Medium and the Message , 2013 .

[60]  Robert E. Crossler,et al.  Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption , 2013, ICIS.

[61]  Qing Hu,et al.  Does deterrence work in reducing information security policy abuse by employees? , 2011, Commun. ACM.

[62]  Robert Steinbauer,et al.  Ethical Leadership and Followers’ Moral Judgment: The Role of Followers’ Perceived Accountability and Self-leadership , 2014 .

[63]  Anna Cinzia Squicciarini,et al.  Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks , 2011, Computer.

[64]  R. Gregory Dunaway,et al.  An Application of Control Balance Theory to Incarcerated Sex Offenders , 1998 .

[65]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[66]  David A. Nadler,et al.  A model for diagnosing organizational behavior , 1980 .

[67]  Paul Benjamin Lowry,et al.  Using Accountability to Reduce Access Policy Violations in Information Systems , 2013, J. Manag. Inf. Syst..

[68]  Thompson S. H. Teo,et al.  Knowledge portals in Chinese consulting firms: a task–technology fit perspective , 2008, Eur. J. Inf. Syst..

[69]  Lourdes Villardón-Gallego,et al.  Cyberbullying in adolescents: Modalities and aggressors' profile , 2010, Comput. Hum. Behav..

[70]  Lisa Wallander 25 years of factorial surveys in sociology: A review , 2009 .

[71]  Michael Arntfield,et al.  Towards a Cybervictimology: Cyberbullying, Routine Activities Theory, and the Anti-Sociality of Social Media , 2015 .

[72]  Bernard C. Y. Tan,et al.  Group Polarization and Computer-Mediated Communication: Effects of Communication Cues, Social Presence, and Anonymity , 2002, Inf. Syst. Res..

[73]  J. Rosenzweig,et al.  General systems theory: applications for organization and management. , 1972, The Journal of nursing administration.

[74]  Dawn L. Rothe,et al.  Toward a Criminology of International Criminal Law: An Integrated Theory of International Criminal Violations , 2009 .

[75]  Andrew M. Hardin,et al.  Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation , 2015, J. Manag. Inf. Syst..

[76]  Gary Klein,et al.  Resolving Difference Score Issues in Information Systems Research , 2009, MIS Q..

[77]  Robert Slonje,et al.  The nature of cyberbullying, and strategies for prevention , 2013, Comput. Hum. Behav..

[78]  Russell A. Sabella,et al.  Cyberbullying myths and realities , 2013, Comput. Hum. Behav..

[79]  Paul Benjamin Lowry,et al.  Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations , 2015, MIS Q..

[80]  Brian K. Payne,et al.  Expanding the Boundaries of Criminal Justice: Emphasizing the “S” in the Criminal Justice Sciences through Interdisciplinary Efforts , 2016 .

[81]  P. Cuijpers,et al.  Supportive Accountability: A Model for Providing Human Support to Enhance Adherence to eHealth Interventions , 2011, Journal of medical Internet research.

[82]  Jennifer L. Bevan,et al.  Negative emotional and cognitive responses to being unfriended on Facebook: An exploratory study , 2012, Comput. Hum. Behav..

[83]  Viswanath Venkatesh,et al.  E XPECTATION D ISCONFIRMATION AND T ECHNOLOGY A DOPTION : P OLYNOMIAL M ODELING AND R ESPONSE S URFACE A NALYSIS 1 , 2010 .

[84]  Siddharth Suri,et al.  Conducting behavioral research on Amazon’s Mechanical Turk , 2010, Behavior research methods.

[85]  Stefan Harrendorf,et al.  How Can Criminology Contribute to an Explanation of International Crimes , 2014 .

[86]  Andrea Everard,et al.  Privacy Concerns Versus Desire for Interpersonal Awareness in Driving the Use of Self-Disclosure Technologies: The Case of Instant Messaging in Two Cultures , 2011, J. Manag. Inf. Syst..

[87]  Elias Aboujaoude,et al.  Cyberbullying: Review of an Old Problem Gone Viral. , 2015, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[88]  Henry Lieberman,et al.  Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying , 2012, TIIS.

[89]  Paul Benjamin Lowry,et al.  A New Approach to the Problem of Access Policy Violations: Increasing Perceptions of Accountability through the User Interface , 2015 .

[90]  Michelle L. Kelley,et al.  Predictors of cyberbullying perpetration among college students: An application of the Theory of Reasoned Action , 2014, Comput. Hum. Behav..

[91]  Theodore R. Curry Integrating Motivating and Constraining Forces in Deviance Causation: A Test of Causal Chain Hypotheses in Control Balance Theory , 2005 .

[92]  Tobias Greitemeyer,et al.  Facebook's emotional consequences: Why Facebook causes a decrease in mood and why people still use it , 2014, Comput. Hum. Behav..

[93]  Larry D. Rosen,et al.  Is Facebook creating "iDisorders"? The link between clinical symptoms of psychiatric disorders and technology use, attitudes and anxiety , 2013, Comput. Hum. Behav..

[94]  Charles R. Tittle,et al.  Control Balance: Toward A General Theory Of Deviance , 1995 .

[95]  Robin M. Kowalski,et al.  Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. , 2014, Psychological bulletin.

[96]  P. Wood,et al.  Offending Patterns, Control Balance, and Affective Rewards among Convicted Sex Offenders , 2015 .

[97]  Alan Borning,et al.  Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.

[98]  Mark A. Fuller,et al.  A Deontological Approach to Designing Ethical Collaboration , 2009, J. Assoc. Inf. Syst..

[99]  Inmaculada Beltrán-Martín,et al.  Human Resource Flexibility as a Mediating Variable Between High Performance Work Systems and Performance , 2008 .

[100]  Rolph E. Anderson,et al.  Multivariate Data Analysis (7th ed. , 2009 .

[101]  I. Coyne,et al.  Bullying in different contexts: Commonalities, differences and the role of theory , 2009 .

[102]  Geoffrey C. Bowker,et al.  Values in design , 2011, Commun. ACM.

[103]  David G. Rand,et al.  The online laboratory: conducting experiments in a real labor market , 2010, ArXiv.

[104]  Robert S. Tokunaga,et al.  Following you home from school: A critical review and synthesis of research on cyberbullying victimization , 2010, Comput. Hum. Behav..

[105]  Justin W. Patchin,et al.  Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .

[106]  Chuang Wang,et al.  Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model , 2016, Inf. Syst. Res..

[107]  K. Mason Cyberbullying: A preliminary assessment for school personnel , 2008 .

[108]  Robert E. Crossler,et al.  Implications of Monitoring Mechanisms on Bring Your Own Device Adoption , 2017, J. Comput. Inf. Syst..

[109]  Russell B. Clayton,et al.  Cheating, Breakup, and Divorce: Is Facebook Use to Blame? , 2013, Cyberpsychology Behav. Soc. Netw..

[110]  D. Espelage,et al.  Theories of cyberbullying , 2012 .

[111]  Kathleen E. McKone-Sweet,et al.  Improving Performance through an Integrated Manufacturing Program , 2006 .

[112]  Matt R. Nobles,et al.  Protection Against Pursuit: A Conceptual and Empirical Comparison of Cyberstalking and Stalking Victimization Among a National Sample , 2014 .

[113]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[114]  Tom L. Roberts,et al.  Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust , 2015, Inf. Syst. J..

[115]  M ChristophersonKimberly The positive and negative implications of anonymity in Internet social interactions , 2007 .

[116]  Tom L. Roberts,et al.  Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities , 2010, Eur. J. Inf. Syst..

[117]  Ben O'Loughlin,et al.  Social Media Analysis and Public Opinion: The 2010 UK General Election , 2015, J. Comput. Mediat. Commun..

[118]  Gregory A. Bigley,et al.  Effects of organizational and professional identification on the relationship between administrators' social influence and professional employees' adoption of new work behavior. , 2009, The Journal of applied psychology.

[119]  David A. Butz,et al.  Power, Risk, and the Status Quo , 2007, Personality & social psychology bulletin.

[120]  Matt Vogel,et al.  Beyond Traditional Interaction: Exploring the functional form of the exposure-offending association across online network size , 2015 .

[121]  P. Tetlock,et al.  Accounting for the effects of accountability. , 1999, Psychological bulletin.

[122]  Ivan Dimitrijevic,et al.  Relationship between internet use and depression: Focus on physiological mood oscillations, social networking and online addictive behavior , 2015, Comput. Hum. Behav..

[123]  Charles R. Tittle Thoughts Stimulated by Braithwaite's Analysis of Control Balance Theory , 1997 .

[124]  Ulla K. Bunz,et al.  The rules of virtual groups: Trust, liking, and performance in computer-mediated communication , 2005 .

[125]  George W. Burruss,et al.  SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD , 2010 .

[126]  B. Spears,et al.  Emerging Methodological Strategies to Address Cyberbullying: Online Social Marketing and Young People as Co-Researchers , 2013 .

[127]  Jay F. Nunamaker,et al.  A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..

[128]  F. Dehue Cyberbullying Research: New Perspectives and Alternative Methodologies. Introduction to the Special Issue , 2013 .

[129]  Justin W. Patchin,et al.  Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying , 2008 .

[130]  Soumya Ray,et al.  What Leads to Prosocial Behaviors on Social Networking Services: A Tripartite Model , 2017, J. Manag. Inf. Syst..

[131]  Tadao Ichikawa,et al.  A Digital Photography Framework Supporting Social Interaction and Affective Awareness , 1999, HUC.

[132]  Tejaswini Herath,et al.  A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings , 2011, Eur. J. Inf. Syst..

[133]  James Y. L. Thong,et al.  Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies , 2013, MIS Q..

[134]  Wendy Nelson Espeland,et al.  The Discipline of Rankings: Tight Coupling and Organizational Change , 2009 .

[135]  M. Jackson,et al.  Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice , 2013 .

[136]  Wayne F. Velicer,et al.  Item format and the structure of the buss‐durkee hostility inventory , 1985 .

[137]  Dennis F. Galletta,et al.  The Drivers in the Use of Online Whistle-Blowing Reporting Systems , 2013, J. Manag. Inf. Syst..

[138]  Marilyn A. Campbell How research findings can inform legislation and school policy on cyberbullying. , 2013 .

[139]  Andrew Schwarz,et al.  Examining the Impact and Detection of the "Urban Legend" of Common Method Bias , 2017, DATB.

[140]  Charles R. Tittle,et al.  Refining control balance theory , 2004 .

[141]  Premilla D'Cruz,et al.  The interface between technology and customer cyberbullying: Evidence from India , 2014, Inf. Organ..

[142]  Matthew Hickman, Alex Piquero exploring the relationships between gender, control balance, and deviance , 2001 .

[143]  Sheri A Bauman,et al.  This Issue: Theories of Bullying and Cyberbullying , 2014 .

[144]  Suprateek Sarker,et al.  How "Sociotechnical" is our IS Research? An Assessment and Possible Ways Forward , 2013, ICIS.

[145]  Dwight D. Frink,et al.  An accountability account: A review and synthesis of the theoretical and empirical research on felt accountability , 2017 .

[146]  Alain Pinsonneault,et al.  Anonymity in Group Support Systems Research: A New Conceptualization, Measure, and Contingency Framework , 1997, J. Manag. Inf. Syst..

[147]  B. R. Schlenker,et al.  The triangle model of responsibility. , 1994, Psychological review.

[148]  Alex R. Piquero,et al.  Studying the reach of deterrence: Can deterrence theory help explain police misconduct? , 2004 .

[149]  Panagiotis G. Ipeirotis Analyzing the Amazon Mechanical Turk marketplace , 2010, XRDS.

[150]  G. Jasso Factorial Survey Methods for Studying Beliefs and Judgments , 2006 .

[151]  H. Marsh,et al.  Application of confirmatory factor analysis to the study of self-concept: First- and higher order factor models and their invariance across groups. , 1985 .

[152]  Justin W. Patchin,et al.  Bullies Move Beyond the Schoolyard , 2006 .

[153]  Paul Benjamin Lowry,et al.  "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels , 2016, J. Strateg. Inf. Syst..

[154]  Alex R. Piquero,et al.  Anticipated shaming and criminal offending , 2010 .

[155]  Dianne Cyr,et al.  The role of social presence in establishing loyalty in e-Service environments , 2007, Interact. Comput..

[156]  Andy Hochstetler,et al.  An exploratory assessment of tittle's control balance theory: Results from the national youth survey , 2002 .

[157]  Winter A. Mason,et al.  Internet research in psychology. , 2015, Annual review of psychology.

[158]  Gregory D. Saxton,et al.  Information, Community, and Action: How Nonprofit Organizations Use Social Media , 2011, J. Comput. Mediat. Commun..

[159]  Ryad Titah,et al.  Nonlinearities Between Attitude and Subjective Norms in Information Technology Acceptance: A Negative Synergy? , 2009, MIS Q..

[160]  A. Falanga,et al.  Summary and Conclusions , 2009, Pathophysiology of Haemostasis and Thrombosis.

[161]  Paul Benjamin Lowry,et al.  The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks , 2017, J. Manag. Inf. Syst..

[162]  Mohamed Khalifa,et al.  Design for Social Presence in Online Communities: a Multi-Dimensional Approach , 2009, PACIS.

[163]  Esther Shein,et al.  Ephemeral data , 2013, CACM.

[164]  Peter H. Rossi,et al.  Measuring social judgments : the factorial survey approach , 1983 .

[165]  Christopher B. Davison,et al.  The Dangers of Cyberbullying , 2014 .

[166]  Paul Benjamin Lowry,et al.  Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior , 2013, Int. J. Hum. Comput. Stud..

[167]  Helmut Krcmar,et al.  Tweeting to Feel Connected: A Model for Social Connectedness in Online Social Networks , 2013, Int. J. Hum. Comput. Interact..

[168]  Susan V. Scott,et al.  Reconfiguring relations of accountability: Materialization of social media in the travel sector , 2011 .

[169]  Robert Slonje,et al.  Processes of cyberbullying, and feelings of remorse by bullies: A pilot study , 2012 .

[170]  Roman Beck,et al.  Knowledge Exchange and Symbolic Action in Social Media-Enabled Electronic Networks of Practice: A Multilevel Perspective on Knowledge Seekers and Contributors , 2014, MIS Q..

[171]  Eric T. G. Wang,et al.  Factors affecting information systems planning effectiveness: organizational contexts and planning systems dimensions , 2003, Inf. Manag..

[172]  Matt R. Nobles,et al.  A Multi-Theoretical Framework to Assess Gendered Stalking Victimization: The Utility of Self-Control, Social Learning, and Control Balance Theories , 2016 .

[173]  Ning Nan,et al.  Capturing Bottom-Up Information Technology Use Processes: A Complex Adaptive Systems Model , 2011, MIS Q..

[174]  Sonja Utz,et al.  The Role of Social Network Sites in Romantic Relationships: Effects on Jealousy and Relationship Happiness , 2011, J. Comput. Mediat. Commun..

[175]  Anandhi S. Bharadwaj,et al.  A Resource-Based Perspective on Information Technology Capability and Firm Performance: An Empirical Investigation , 2000, MIS Q..