Factors Influencing University Students' Online Disinhibition Behavior – The Moderating Effects of Deterrence and Social Identity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Factors Influencing University Students' Online Disinhibition Behavior – The Moderating Effects of Deterrence and Social Identity

Authors: Wang, Kuei-Ing, Jou-Fan Shih

Abstract:

This study adopts deterrence theory as well as social identities as moderators, and explores their moderating affects on online toxic disinhibition. Survey and Experimental methodologies are applied to test the research model and four hypotheses are developed in this study. The controllability of identity positively influenced the behavior of toxic disinhibition both in experimental and control groups while the fluidity of the identity did not have significant influences on online disinhibition. Punishment certainty, punishment severity as well as social identity negatively moderated the relation between the controllability of the identity and the toxic disinhibition. The result of this study shows that internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the inappropriate behavior will be found and punished severely, the inappropriate behavior then will be weakened.

Keywords: Seductive properties of Internet, Online Disinhibition, Punishment Certainty, Punishment Severity, Social Identity.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1337205

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3835

References:


[1] G. Le Bon, "The crowd: A study of the popular mind” London: Transaction, 1895.
[2] Joinson. Causes and implications of disinhibited behavior on the Net. In 1.Gackenbach (Ed.) Psychology of the Internet, New York: Academic Press. l998.
[3] M. Lea, T. O'Shea, P. Fung, & R. Spears, "Flaming in computer-mediated communication: Observations, explanations, implications,” Contexts of Computer-Mediated Communication. 89-112,1992.
[4] S. Klepper, & D. Nagin, "The Deterrent Effect of Perceived Certainty and Severity of Punishment Revisited,” Criminology, 27,721-746, 1989.
[5] Noam Lapidot-Lefler, & Azy Barak, "Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition,” Computers in Human Behavior, 28(2), 434-443, 2012.
[6] John Suler, "The online disinhibition effect,” Cyberpsychology & Behavior, 7(3), 321-326, 2004.
[7] H. Liang, N. Saraf, Q. Hu, & Y. Xue, "Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management,” MIS Quarterly, 31(1), 59-87, 2007.
[8] S. H. Schwartz, & R. C. Tessler, "A test of a model for reducing measured attitude-behavior inconsistencies,” Journal of Personality and Social Psychology, 24, 225-236, 1972.
[9] W. C. Reckless, "A new theory of delinquency and crime” Federal Probation, 25, 42-46, 1961.
[10] W. C. Reckless, the Crime Problem, Pacific Palisades: Goodyear Publishing Company. 1973.
[11] L. Leung, "Impacts of Net-generation attributes, seductive properties of the Internet, and gratifications-obtained on Internet use,” Telematics and Informatics, 20,107-129, 2003.
[12] Barak, Azy, Boniel-Nissim, Meyran, & John Suler, "Fostering empowerment in online support groups. Computers in Human Behavior,” 24(5), 1867-1883, 2008.
[13] K.Y.A. McKenna, A.S. Greene, & M.E.J. Gleason, "Relationship formation on the Internet: what’s the big attraction?” Journal of Social Issues, 58, 9–31, 2002.
[14] S. Turkle, Life on the screen, .New York: Simon & Schuster, 1995.
[15] S. Reicher, R. Spears, & T. Postmes, "A social identity model of deindividuation phenomena,” European Review of Social Psychology, 6(1), 161-198, 1995.
[16] F. A. Mael, and B. E. Ashforth, "Alumni and their alma mater: a partial test of the reformulated model of organizational identification,” Journal of Organizational Behavior, 13(2), 103-123, 1992.
[17] John J. DiIulio, "Deterrence theory,” 233-236, 2010.
[18] W. E. Thompson, & R. A. Dodder, "Juvenile Delinquency Explained?: A Test of Containment Theory,” Youth & Society, 15(2), 171-194, 1983.
[19] Chin, W. W., A. Gopal, & W. D. Salisbury, "Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation.” Information Systems Research, 8(4), 342-367, 1997.
[20] C. Fornell, & D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research, 18(1), 39-50, 1981.
[21] Adam N. Joinson, "Disinhibition and the Internet” (second ed.) 2007
[22] A. Peace, D. Galletta, and J. Thong, "Software piracy in the workplace: A model and empirical test," Journal of Management Information Systems, 20, 1, 153-177, 2003.
[23] G. Antunes and A. Hunt, "The impact of certainty and severity of punishment on levels of crime in American states: An extended analysis,” Journal of Criminal Law and Criminology, 486-493, 1973.