최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of information technology applications & management = 한국데이타베이스학회지, v.25 no.1, 2018년, pp.87 - 104
The internet is spreading widely and malicious comments which is a negative aspect is increasing. Previous studies have considered anonymity as a cyber characteristic of malicious comments. However, there are a theoretical confusion due to inconsistent results. In addition, the dissemination, one of...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
핵심어 | 질문 | 논문에서 추출한 답변 |
---|---|---|
악성댓글 현상의 가장 큰 문제 요인은 무엇인가? | 익명성은 자신의 정체가 드러나지 않는 특성으로 정의되며[Hite et al., 2014], 악성댓글 현상의 가장 큰 문제 요인으로 볼 수 있다[Lee and Kim, 2015]. | |
페이스북이 익명의 프로필이나 익명의 댓글을 허용하지 않는 시스템인 이유는 무엇인가? | , 2016]. 페이스북은 실명제를 운영원칙으로 서비스를 제공하기 때문에 익명의 프로필이나 익명의 댓글을 허용하지 않는 시스템이다[Hughes et al., 2012]. | |
개인은 자신이 통제 받는 것 보다 타인이나 외부 요인을 통제할 수 있는 힘이 크다고 인식할 경우 일탈행위를 저지르는 경향이 있는데 이러한 논리가 사이버 공간의 악성댓글에도 적용될 수 있는 이유는 무엇인가? | 이러한 논리는 사이버 공간의 악성댓글에도 적용될 수 있다. 사이버 공간의 전파성은 정보를 쉽게 많은 사람들에게 전파 할 수 있는 특성으로 볼 수 있다[Pempek et al., 2009; Huang and Chou, 2010; Antoniadou and Kokkinos, 2015]. 그렇기 때문에 전파성을 크게 인지한 개인은 자신의 행위가 많은 사람들에게 전파될 수 있으며 타인에 대한 자신의 영향력(힘)이 크다고 인식할 수 있다. 따라서, 페이스북에서 전파성을 크게 인지한 개인은 악성댓글이라는 비윤리적 행위를 저지를 가능성이 크다. |
Almeida, A., Correia, I., and Marinho, S., "Moral Disengagement, Normative Beliefs of Peer Group, and Attitudes Regarding Roles in Bullying", Journal of school Violence, Vol. 9, No. 1, 2009, pp. 23-36.
Anderson, J. and Gerbing, D., "Structural Equation Modeling in Practice : A Review and Recommended Two-Step Approach", Psychological Bulletin, Vol. 103, No. 4, 1988, pp. 411-423.
Antoniadou, N. and Kokkinos, C. M., "Cyber and school bullying : Same or different phenomena", Aggression and Violent Behavior, Vol. 25, 2015, pp. 363-372.
Armstrong, J. S. and Overton, T. S., "Estimating nonresponse bias in mail surveys", Journal of Marketing Research, Vol. 14, No. 3, 1977, pp. 396-402.
Bachman, R., Paternoster, R., and Ward, S., "The rationality of sexual offending : testing a deterrence/rational choice conception of sexual assault", Law and Society, Vol. 26, No. 2, 1992, pp. 343-372.
Baron, R. M. and Kenny, D. A., "The moderator-mediator variable distinction in social psychological research : Conceptual, strategic, and statistical considerations", Journal of Personality and Social Psychology, Vol. 51, No. 6, 1986, pp. 1173-1182.
Chin, W., "Issues and Opinion on Structural Equation Modeling", MIS Quarterly, Vol. 22, No. 1, 1998, pp. 7-16.
Cho, D. and Kwon, K. H., "The impacts of identity verification and disclosure of social cues on flaming in online user comments", Computers in Human Behavior, Vol. 51, Part. A, October, 2015, pp. 363-372.
Doane, A. N., Pearson, M. R., and Kelley, M. L., "Predictors of cyberbullying perpetration among college students : An application of the Theory of Reasoned Action", Computers in Human Behavior, Vol. 36, 2014, pp. 154-162.
Dooley, J. J., Pyzalski, J., and Cross, D. "Cyberbullying versus face-to-face bullying, A theoretical and conceptual review", Journal of Psychology, Vol. 217, 2009, pp. 182-188.
Fornell, C. and Larcker, D. F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error", Journal of Marketing Research, Vol. 18, No. 1, 1981, pp. 39-50.
Hite, D. M., Voelker, T., and Robertson, A., "Measuring Perceived Anonymity : The Development of a Context Independent Instrument", Journal of Methods and Measurement in the Social Sciences, Vol. 5, No. 1, 2014, pp. 22-39.
Hu, Q., Xu, Z., Dinev, T., and Ling, H., "Does deterrence work in reducing information security policy abuse by employees", Communications of the ACM, Vol. 54, No. 6, 2011, pp. 54-60.
Huang, Y. and Chou, C., "An analysis of multiple factors of cyberbullying among junior high school students in Taiwan", Computers in Human Behavior, Vol. 26, No. 6, 2010, pp. 1581-1590.
Hughes, D. J., Rowe, M., Batey, M., and Lee, A., "A tale of two sites : Twitter vs. Face book and the personality predictors of social media usage", Computers in Human Behavior, Vol. 28, No. 2, 2012, pp. 561-569.
Hutchens, M. J., Cicchirillo, V. J., and Hmielowski, J. D., "How could you think that?!?! : Understanding intentions to engage in political flaming", New media & Society, Vol. 17, No. 8, 2015, pp. 1201-1219.
Jessup, L. M., Connolly, T., and Galegher, J., "The Effects of Anonymity on GDSS Group Process in Automated Group Problem Solving", MIS Quarterly, Vol. 14, No. 3, 1990, pp. 312-321.
Kokkinos, C. M., Baltzidis, E., and Xynogala, D., "Prevalence and personality correlates of Facebook bullying among university undergraduates", Computers in Human Behavior, Vol. 55, 2016, pp. 840-850
Kwan, G. C. E. and Skoric, M. M., "Face book bullying : An extension of battles in school", Computers in Human Behavior, Vol. 29, No. 1, 2013, pp. 16-25.
Lapidot-Lefler, N. and A. Barak, "Effects of anonymity, invisibility, and lack of eyecontact on toxic online disinhibition", Computers in Human Behavior, Vol. 28, No. 2, 2012, pp. 434-443.
Lee, S. H. and Kim, H. W., "Why People Post Benevolent and Malicious Comments Online", Communications of the ACM, Vol. 58, No. 11, 2015, pp. 74-79.
Lewis, H. B., Shame and Guilt in Neurosis, International Universities Press, New York, 1971.
Li, Q., "New bottle but old wine : A research of cyberbullying in schools", Computers in Human Behavior, Vol. 23, 2007, pp. 1777-1791.
Lowry, P. B., Moody, G. D., and Chatterjee, S., "Using it Design to Prevent Cyberbullying Journal of Management Information Systems", Journal of Management Information Systems, 2017, Forthcoming.
Lowry, P. B., Zhang, J., Wang, C., and Siponen, M., "Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model", Information Systems Research, Vol. 27, No. 4, 2016, pp. 962-986.
Moore, M. J., Nakano, T., Enomoto, A., and Suda, T., "Anonymity and roles associated with aggressive posts in an online forum", Computers in Human Behavior, Vol. 28, No. 3, 2012, pp. 861-867.
Moores, T. T. and Chang, J. C. J., "Ethical decision making in software piracy : initial development and test of a four-component model", MIS Quarterly, Vol. 30, No. 1, 2006, pp. 167-180.
Obermann, M. L., "Moral disengagement in self-reported and peer-nominated school bullying", Aggressive Behavior, Vol. 37, No. 2, 2011, pp. 133-144.
Paternoster, R. and Simpson, S., "Sanction Threats and Appeals to Morality : Testing a Rational Choice Model of Corporate Crime", Law & Society Review, Vol. 30, No. 3, 1996, pp. 549-584.
Pempek, T. A., Yermolayeva, Y. A., and Calvert, S. L., "College students' social networking experiences on Facebook", Journal of Applied Developmental Psychology, Vol. 30, No. 3, 2009, pp. 227-238.
Podsakoff, P. M., MacKenzie, S. B., Lee, J., and Podsakoff, N. P., "Common Method Biases in Behavioral Research : A Critical Review of the Literature and Recommended Remedies", Journal of Applied Psychology, Vol. 88, No. 5, 2003, pp. 879-903.
Pornari, C. D. and Wood, J., "Peer and Cyber Aggression in Secondary School Students : The Role of Moral Disengagement, Hostile Attribution Bias, and Outcome Expectancies", Aggressive Behavior, Vol. 36, No. 2, 2010, pp. 81-94.
Postmes, T. and Spears, R., "Deindividuation and antinormative behavior : A meta-analysis", Psychological Bulletin, Vol. 123, No. 3, 1998, pp. 238-259.
Prosecution service, Internet malicious commentator processing plan implementation, http://spogood.tistory.com/263 accessed 16 April 2015.
Reinig, B. A. and Mejias, B. J., "The effects of national culture and anonymity on flaming and criticalness in GSS-supported discussions", Small Group Research, Vol. 35, No. 6, 2004, pp. 698-723.
Renati, R., Berrone, C., and Zanetti, M. A., "Morally Disengaged and Unempathic : Do Cyberbullies Fit These Definitions? An Exploratory Study", Cyberpsychology, Behavior, and Social Networking, Vol. 15, No. 8, 2012, pp. 391-398.
Rosner, L. and Kramer, N. C., "Verbal Venting in the Social Web : Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments", Social Media+Society, First Published August 16, 2016, pp. 1-13.
Sari, S. V. and Camadan, F., "The new face of violence tendency : Cyber bullying perpetrators and their victims", Computers in Human Behavior, Vol. 59, No. 1, 2016, pp. 317-326.
Siponen, M. and Vance, A., "Neutralization : New Insights into the Problem of Employee Information Systems Security Policy Violations", MIS Quarterly, Vol. 34, No. 3, 2010, pp. 487-502.
Siponen, M., Vance, A., and Willison, R., "New insights into the problem of software piracy : The effects of neutralization, shame, and moral beliefs", Information & Management, Vol. 49, No. 7-8, 2012, pp. 334-341.
Statista, "Number of monthly active Face book users worldwide as of 2nd quarter 2017 (in millions)", 2017, Available at http://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/.
Sticca, F. and F. Perren, "Is Cyberbullying Worse than Traditional Bullying? Examining the Differential Roles of Medium, Publicity, and Anonymity for the Perceived Severity of Bullying", Journal of Youth and Adolescence, Vol. 42, No. 5, 2013, pp. 739-750.
Suler, J., "The Online Disinhibition Effect", Cyberpsychology and Behavior, Vol. 7, No. 3, 2004, pp. 321-326.
Thong, J. Y. L. and Yap, C. S., "Testing an Ethical Decision-Making Theory : The Case of Softlifting", Journal of Management Information Systems, Vol. 15, No. 1, 1998, pp. 213-237.
Tittle, C. R., "Continuing the discussion of control balance", Theoretical Criminology, Vol. 3, No. 3, 1999, pp. 344-352.
Tittle, C. R., "Thoughts Stimulated by Braithwaite's Analysis of Control Balance Theory", Theoretical Criminology, Vol. 1, No. 1, 1997, 99-110.
Williams, K. R. and Guerra, N. G., "Prevalence and predictors of Internet bullying", Journal of Adolescent Health, Vol. 41, No. 6, 2007, pp. 14-21.
Xu, B., Xu, Z., and Li, D., "Internet aggression in online communities : a contemporary deterrence perspective", Information Systems Journal, Vol. 26, No. 6, 2015, pp. 641-667.
Ybarra, M. L. and Mitchell, K. J., "Online aggressor/targets, aggressors, and targets : a comparison of associated youth characteristics", Journal of Child Psychology and Psychiatry, Vol. 45, No. 7, 2004, pp. 1308-1316.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.