This document summarizes a research paper on the influence of dissociative anonymity, invisibility, asynchronicity, and dissociative imagination on cyber incivility behavior. The study used a correlational design with 111 online workers in Indonesia as subjects. The results showed that anonymity, invisibility and asynchronicity had a significant effect on cyber incivility, as these factors are associated with decreased self-control and feelings of reduced responsibility for one's online actions. The paper discusses how characteristics of online communication like lack of non-verbal cues can trigger disinhibited and potentially aggressive behaviors.
This document summarizes several studies on user behavior and motivation in digital systems:
1. One study examined adolescent engagement with the internet and found they engage in self-socialization online to construct their own roles and gain freedom from offline constraints.
2. Another study found people highly identify with online social groups like game communities, almost as much as with their families.
3. A study linked social comparison and rumination on Facebook to increased depressive symptoms over time.
4. One study correlated the amount of physical space people have at home to their level of online socialization.
5. A final study found personality traits like conscientiousness correlated with concerns over privacy and internet addiction, making some
This document summarizes research on social influence and persuasion online. It begins by defining key terms like social influence, persuasion, compliance, and discusses how computer-mediated communication differs from other forms. Namely, it can allow for anonymity, decrease importance of physical appearance, remove barriers to interacting with others, and give users more control over interactions. It then reviews dual process models of persuasion and research showing peripheral cues may be less salient online, leading people to focus more on message content. Several studies comparing online to offline persuasion are summarized, finding online influence may rely more on systematic/central processing of arguments than peripheral cues.
This document summarizes a student's research paper on the effects of social media on communication. The student conducted a survey that found social media causes negative health effects and is harmful to well-being. Most participants visited social media multiple times daily and used it negatively, despite believing it damages communication skills. The research also found social media is ubiquitous in participants' lives. A literature review discussed studies finding social media preference over face-to-face interaction is linked to loneliness, social anxiety, and depression. Excessive internet use can negatively impact psychological well-being and communication beliefs.
Contents lists available at ScienceDirectComputers in Huma.docxbobbywlane695641
ย
This document summarizes a research study that examined the effects of deindividuation on normative and informational social influence within computer-mediated communication. The study created an online experiment to test how anonymity, physical isolation, and task ambiguity affected conformity under conditions of normative versus informational social influence. Results showed that normative influence was almost ineffective when subjects were deindividuated by anonymity and isolation. Informational influence was generally more effective than normative influence via computer-mediated communication, but was also inhibited by deindividuation conditions of anonymity and isolation. Task ambiguity increased conformity for informational influence tasks as predicted.
Running head: FINAL PAPER 1
FINAL PAPER 11
Final Paper
Laura Dunkerson
South University Online
8/24/13
Cyber Bullying
Cyber bullying do your sources use one word or two for this term? Take another look. is one of the current social problems that have flourished with the advancement in technology because many people have access to technology today repetitive of โcurrentโ. The technology has gone to both good and bad hands. In bad hands, technology has been used to orchestrate various criminal activities. Among the criminal activities facilitated by the technology is cyber bullying. Various studies have been conducted on cyber bullying. This paper highlights some of the arguments in these studies. Despite being an activity that came with the advancement in technology, cyber bullying has rapidly spread in the society and can now affect anybody wherever he or she is if he or she is accessible to the internet. Thesis? What will the essay argue?
A research V conducted by a Harford County Examiner revealed that half the population of teenagers is word form victims of cyber bullying and only 10% of the victims take a step to report the matter to their parents. Among the cyber bullying incidents, less than 20% of the incidents get reported to the law enforcement agencies. Approximately 20% of teenagers have photos of them taken while in embarrassing situations. It further revealed that girls are V often involved in cyber bullying than boys. The study therefore indicates that cyber bullying is V common in teenagers than any other age group. It further shows how parents distance themselves towards monitoring what their teenage children do on the internet how does it show that? The evidence about from the source donโt show that. Therefore, it can be concluded that inadequate parental consent is a major contributor to the high trends of cyber bullying (Thaxter, 2010). The information in this paragraph doesnโt support this conclusion.
In regard to this, Thaxter (2010) researched and wrote a journal article titled โCyber bullying: Challenges and strategies faced by juvenile police officers.โ In this article, the author claims that juvenile police officers are expected by the government to ensure the full enforcement of laws and regulations related to cyber bullying in a school classroom setting. This makes the officers to be outstanding educational reserve this sentence doesnโt make sense. This move what move? by the police officers is centered towards the consequences of cyber bullying on the victims and also impacts that the school cyber bullying has on the behavior on the environment and ambiance at the school. A vital technique to link the differing levels of involvement in bullying is by calling attention to all stu ...
Human Communication Research ISSN 0360-3989O R I G I N A L.docxwellesleyterresa
ย
Human Communication Research ISSN 0360-3989
O R I G I N A L A R T I C L E
The Individual or the Group: A Multilevel
Analysis of Cyberbullying in School Classes
Ruth Festl1, Michael Scharkow2, & Thorsten Quandt3
1 Department of Communication, University of Hohenheim, 70599 Stuttgart, Germany
2 Department of Communication, University of Hohenheim, 70599 Stuttgart, Germany
3 Department of Communication, University of Mรผnster, 48143 Mรผnster, Germany
In this study, we focus on the relevance of social influence to explain cyberbullying expe-
riences among German high school students. Social influence is discussed in the context
of computer-mediated communication. To obtain individual and sociostructural data, we
conducted a survey study among German high school students (N = 4,282). Using multi-
level modeling, we found that the attributes of the school class only contributed to the risk
of being involved in cyberbullying to a small extent. Still, procyberbullying norms in class
did enhance the risk of perpetration and victimization for students, even more so than their
individual beliefs. Previous experiences with bullying and intensive, unrestricted use of the
Internet were the strongest individual predictors of cyberbullying involvement.
Keywords: Cyberbullying, Computer-Mediated Communication, Social Norms, Peer
Influence, Multilevel Analysis, Social Network Analysis.
doi:10.1111/hcre.12056
Recent reviews and meta-analyses of cyberbullying show that up to now, most studies
have focused on psychological aspects and individual beliefs and attitudes (e.g., Slonje,
Smith, & Frisen, 2013; Smith, 2012; Tokunaga, 2010). However, cyberbullying is by
definition a social phenomenon: Following the description of traditional bullying by
Olweus (1993) and Smith, Mahdavi, Carvalho, Fisher, and Russell (2008, p. 376), for
example, define cyberbullying as โan aggressive, intentional act carried out by a group
or individual, using electronic forms of contact, repeatedly and over time against a
victim who cannot easily defend him or herself.โ Moreover, like traditional bullying,
cyberbullying frequently occurs between people who know each other outside the
online context. Previous findings regarding cyberbullying show that the perpetrators
and victims often know each other and come from the same school (Dehue, Bolman,
& Vรถllink, 2008; Slonje & Smith, 2008). These parallels imply that attributes of the
school class may not only be important in context of traditional bullying, but also in
terms of explaining cyberbullying involvement.
Corresponding author: Ruth Festl; e-mail: [emailย protected]
Human Communication Research 41 (2015) 535 โ 556 ยฉ 2014 International Communication Association 535
Social Influence on Cyberbullying Involvement R. Festl et al.
Traditional bullying research already includes a large number of studies that pro-
vide a sociostructural perspective on the phenomenon (e.g., Salmivalli, Huttunen, &
Lagerspetz, 1997; Salmivalli, Lager ...
This study examines how computer-mediated communication (CMC) has changed social interactions and relationships through the lens of uncertainty reduction theory (URT). A survey was conducted to understand if people prefer using the internet over face-to-face interactions to reduce uncertainty and form relationships. It also assessed which URT strategies - passive, active, or interactive - people prefer when looking for friendships versus romantic relationships. The study aims to provide quantitative data on how CMC has impacted relationship formation and determine if further research is needed to understand changes in a increasingly digital world.
This document presents a theoretical framework for understanding perpetrators of cyber incivility. It discusses how incivility has become a serious problem both in person and online, negatively impacting individuals, organizations, and society. Previous studies have explained factors leading to in-person incivility but not online incivility. The framework integrates perspectives on online disinhibition and stressor-emotion models of counterproductive work behavior to understand cyber incivility perpetrators. Understanding cyber incivility is important as online communication differs psychologically from in-person interaction.
This document summarizes several studies on user behavior and motivation in digital systems:
1. One study examined adolescent engagement with the internet and found they engage in self-socialization online to construct their own roles and gain freedom from offline constraints.
2. Another study found people highly identify with online social groups like game communities, almost as much as with their families.
3. A study linked social comparison and rumination on Facebook to increased depressive symptoms over time.
4. One study correlated the amount of physical space people have at home to their level of online socialization.
5. A final study found personality traits like conscientiousness correlated with concerns over privacy and internet addiction, making some
This document summarizes research on social influence and persuasion online. It begins by defining key terms like social influence, persuasion, compliance, and discusses how computer-mediated communication differs from other forms. Namely, it can allow for anonymity, decrease importance of physical appearance, remove barriers to interacting with others, and give users more control over interactions. It then reviews dual process models of persuasion and research showing peripheral cues may be less salient online, leading people to focus more on message content. Several studies comparing online to offline persuasion are summarized, finding online influence may rely more on systematic/central processing of arguments than peripheral cues.
This document summarizes a student's research paper on the effects of social media on communication. The student conducted a survey that found social media causes negative health effects and is harmful to well-being. Most participants visited social media multiple times daily and used it negatively, despite believing it damages communication skills. The research also found social media is ubiquitous in participants' lives. A literature review discussed studies finding social media preference over face-to-face interaction is linked to loneliness, social anxiety, and depression. Excessive internet use can negatively impact psychological well-being and communication beliefs.
Contents lists available at ScienceDirectComputers in Huma.docxbobbywlane695641
ย
This document summarizes a research study that examined the effects of deindividuation on normative and informational social influence within computer-mediated communication. The study created an online experiment to test how anonymity, physical isolation, and task ambiguity affected conformity under conditions of normative versus informational social influence. Results showed that normative influence was almost ineffective when subjects were deindividuated by anonymity and isolation. Informational influence was generally more effective than normative influence via computer-mediated communication, but was also inhibited by deindividuation conditions of anonymity and isolation. Task ambiguity increased conformity for informational influence tasks as predicted.
Running head: FINAL PAPER 1
FINAL PAPER 11
Final Paper
Laura Dunkerson
South University Online
8/24/13
Cyber Bullying
Cyber bullying do your sources use one word or two for this term? Take another look. is one of the current social problems that have flourished with the advancement in technology because many people have access to technology today repetitive of โcurrentโ. The technology has gone to both good and bad hands. In bad hands, technology has been used to orchestrate various criminal activities. Among the criminal activities facilitated by the technology is cyber bullying. Various studies have been conducted on cyber bullying. This paper highlights some of the arguments in these studies. Despite being an activity that came with the advancement in technology, cyber bullying has rapidly spread in the society and can now affect anybody wherever he or she is if he or she is accessible to the internet. Thesis? What will the essay argue?
A research V conducted by a Harford County Examiner revealed that half the population of teenagers is word form victims of cyber bullying and only 10% of the victims take a step to report the matter to their parents. Among the cyber bullying incidents, less than 20% of the incidents get reported to the law enforcement agencies. Approximately 20% of teenagers have photos of them taken while in embarrassing situations. It further revealed that girls are V often involved in cyber bullying than boys. The study therefore indicates that cyber bullying is V common in teenagers than any other age group. It further shows how parents distance themselves towards monitoring what their teenage children do on the internet how does it show that? The evidence about from the source donโt show that. Therefore, it can be concluded that inadequate parental consent is a major contributor to the high trends of cyber bullying (Thaxter, 2010). The information in this paragraph doesnโt support this conclusion.
In regard to this, Thaxter (2010) researched and wrote a journal article titled โCyber bullying: Challenges and strategies faced by juvenile police officers.โ In this article, the author claims that juvenile police officers are expected by the government to ensure the full enforcement of laws and regulations related to cyber bullying in a school classroom setting. This makes the officers to be outstanding educational reserve this sentence doesnโt make sense. This move what move? by the police officers is centered towards the consequences of cyber bullying on the victims and also impacts that the school cyber bullying has on the behavior on the environment and ambiance at the school. A vital technique to link the differing levels of involvement in bullying is by calling attention to all stu ...
Human Communication Research ISSN 0360-3989O R I G I N A L.docxwellesleyterresa
ย
Human Communication Research ISSN 0360-3989
O R I G I N A L A R T I C L E
The Individual or the Group: A Multilevel
Analysis of Cyberbullying in School Classes
Ruth Festl1, Michael Scharkow2, & Thorsten Quandt3
1 Department of Communication, University of Hohenheim, 70599 Stuttgart, Germany
2 Department of Communication, University of Hohenheim, 70599 Stuttgart, Germany
3 Department of Communication, University of Mรผnster, 48143 Mรผnster, Germany
In this study, we focus on the relevance of social influence to explain cyberbullying expe-
riences among German high school students. Social influence is discussed in the context
of computer-mediated communication. To obtain individual and sociostructural data, we
conducted a survey study among German high school students (N = 4,282). Using multi-
level modeling, we found that the attributes of the school class only contributed to the risk
of being involved in cyberbullying to a small extent. Still, procyberbullying norms in class
did enhance the risk of perpetration and victimization for students, even more so than their
individual beliefs. Previous experiences with bullying and intensive, unrestricted use of the
Internet were the strongest individual predictors of cyberbullying involvement.
Keywords: Cyberbullying, Computer-Mediated Communication, Social Norms, Peer
Influence, Multilevel Analysis, Social Network Analysis.
doi:10.1111/hcre.12056
Recent reviews and meta-analyses of cyberbullying show that up to now, most studies
have focused on psychological aspects and individual beliefs and attitudes (e.g., Slonje,
Smith, & Frisen, 2013; Smith, 2012; Tokunaga, 2010). However, cyberbullying is by
definition a social phenomenon: Following the description of traditional bullying by
Olweus (1993) and Smith, Mahdavi, Carvalho, Fisher, and Russell (2008, p. 376), for
example, define cyberbullying as โan aggressive, intentional act carried out by a group
or individual, using electronic forms of contact, repeatedly and over time against a
victim who cannot easily defend him or herself.โ Moreover, like traditional bullying,
cyberbullying frequently occurs between people who know each other outside the
online context. Previous findings regarding cyberbullying show that the perpetrators
and victims often know each other and come from the same school (Dehue, Bolman,
& Vรถllink, 2008; Slonje & Smith, 2008). These parallels imply that attributes of the
school class may not only be important in context of traditional bullying, but also in
terms of explaining cyberbullying involvement.
Corresponding author: Ruth Festl; e-mail: [emailย protected]
Human Communication Research 41 (2015) 535 โ 556 ยฉ 2014 International Communication Association 535
Social Influence on Cyberbullying Involvement R. Festl et al.
Traditional bullying research already includes a large number of studies that pro-
vide a sociostructural perspective on the phenomenon (e.g., Salmivalli, Huttunen, &
Lagerspetz, 1997; Salmivalli, Lager ...
This study examines how computer-mediated communication (CMC) has changed social interactions and relationships through the lens of uncertainty reduction theory (URT). A survey was conducted to understand if people prefer using the internet over face-to-face interactions to reduce uncertainty and form relationships. It also assessed which URT strategies - passive, active, or interactive - people prefer when looking for friendships versus romantic relationships. The study aims to provide quantitative data on how CMC has impacted relationship formation and determine if further research is needed to understand changes in a increasingly digital world.
This document presents a theoretical framework for understanding perpetrators of cyber incivility. It discusses how incivility has become a serious problem both in person and online, negatively impacting individuals, organizations, and society. Previous studies have explained factors leading to in-person incivility but not online incivility. The framework integrates perspectives on online disinhibition and stressor-emotion models of counterproductive work behavior to understand cyber incivility perpetrators. Understanding cyber incivility is important as online communication differs psychologically from in-person interaction.
Project Part 1ITT-TechShawn EngbretsonThe Effect o.docxwkyra78
ย
Project Part 1
ITT-Tech
Shawn Engbretson
The Effect of Internet Usage on Marriage
Introduction
The rapid growth of internet usage over the last two decades has been influencing many aspects of our life and most noticeably the ways in which people communicate with each other. Therefore, it is appropriate to ask whether the growth of internet usage influences individualsโ marital decisions in modern society. This study will concentrate on the effect of the growing internet usage on marriage.
Over the last two decades, the internet has become truly widespread, and there is no doubt that this new means of communication influence and profoundly changed many substantial aspects of our lives. Email usage became standard, online dating sites multiplies, social networksโ popularity has been spectacularly growing, all giving evidence of the of the noteworthy role that online communication plays in our lives nowadays and of the very different opportunities we have now as compared to the situation some twenty years ago.
ย The young people are the most likely to exploit fully these opportunities, and there are several ways in which the means of online communication may make their life both easier and richer as compared to the generation of their parents. Easier from the point of view that search for a life partner does not have to be only in the real world, but might be countered on the internet. There are enough examples of happy couples that met for the first time on a social network, a discussion forum or other web platform, or who found each other directly through the services of an online dating site.
This shows just how these successfully formed partnerships have changed our lives in a way or another. The study, the effect of internet usage on marriage, would also help shed some light on the effect of the increasing internet usage on the divorce rate. There are certainly many aspects of marriage that internet usage can influence, but this study will concentrate mostly on the beginning of the marital process. It will particularly try to establish if the reduction of search costs, given by the fact that through the internet, more potential partners can be reached in a significantly shorter time, leads people to marry sooner or later.
I chose this study as way of trying to complement the already growing numbers of studies done on this topic both from a sociological an economic point of view. It will primarily be positioned within the economic stream of literature and by doing so; present an econometric approach that makes it possible to ascertain the effect of an increasing internet usage on individualsโ marital decisions.ย To be able to achieve this using IT as leverage to provide answers to the various questions that arise sums up all the reasons as to why I settled for this topic.
Literature Review
The propagation of the internet and the consequent enrichment of the means of communication bring one of the biggest changes ever t ...
The document summarizes research on the relationship between internet addiction and loneliness among college students. It finds that there is a positive correlation between internet addiction and loneliness, with a correlation value of 0.447. While loneliness and internet addiction are distinct issues, they can be both a cause and consequence of each other. Some individuals turn to excessive internet use to cope with feelings of loneliness, which can then further exacerbate social isolation.
Quantitative report on internet addiction and loneliness.pdfLovelockGifts
ย
The document summarizes research on the relationship between internet addiction and loneliness among college students. It finds that there is a positive correlation between internet addiction and loneliness, with a correlation value of 0.447. While loneliness and internet addiction are distinct issues, they can be both a cause and consequence of each other. Some individuals turn to excessive internet use to cope with feelings of loneliness, which can then further exacerbate social isolation.
The document discusses symptoms and behavior disorders related to internet addiction. It begins with an abstract summarizing the paper's exploration of internet addiction through netnography research. The introduction provides background on internet addiction disorder and its prevalence. The literature review covers topics like dopamine's role in addiction, cognitive behavioral therapy as a treatment, and how internet addiction affects interpersonal relationships and can create fake online personas. The methodology section describes the use of netnography and qualitative data analysis software. Key findings establish six propositions about the neurobiological and psychosocial aspects of internet addiction.
This document summarizes a study that examined the effects of computer-mediated communication (CMC) on face-to-face (FtF) social skills in college students. The study conducted an online survey of college students through Facebook, Twitter, and email. The results found no direct correlation between CMC use and effects on social skills. The document provides background on theories of uncertainty reduction and social cognitive theory. It also discusses literature on CMC and FtF communication and variables like nonverbal cues.
This document summarizes research on cyberbullying among adolescent victims. It finds that cyberbullying can lead to both positive and negative behavioral changes in victims. Positively, it can help them recognize aggressive people online. However, it can also result in lower self-esteem, loneliness, distrust of others, and in extreme cases self-harm. The study examines coping strategies used by victims, which include technical defenses, confronting the aggressor, avoidance, seeking social support, and defensive strategies. The effectiveness of different coping strategies remains unclear.
This document discusses two conceptual approaches - social compensation and rich-get-richer - that have been proposed to explain adolescent online risk-taking behaviors. It summarizes a study that examined which approach better predicts such behaviors using data from the Pew Internet Foundation. The study found that predictors of risk-taking included a lack of extracurricular activities, especially for boys, and infrequent socializing with friends in person, especially for girls. This supports the social compensation approach, which posits that those with less satisfying offline lives engage in more online risk as compensation. The document provides background on the approaches and outlines the study's methodology using the Pew Internet Foundation survey data to analyze relationships between adolescent characteristics and risk behaviors.
Effect of technology on personal communicationAbid Momand
ย
The document discusses the undesirable effects of technology on personal communication. While technology has enabled new forms of communication, it has negatively impacted valuable in-person interactions. Face-to-face communication is more effective than electronic communication as it allows people to connect on a deeper level through body language, facial expressions, and empathy. Several studies have shown that as internet and technology use increases, time spent socializing in person decreases, and empathy and social skills among youth have declined. True emotional support and meaningful exchanges of information require in-person communication that virtual interactions cannot replace.
Jacque lewis - Senior Project -w/o scriptJacque Lewis
ย
This 12-minute mini-documentary explores whether social networks should enforce stricter regulations regarding social media harassment. The documentary features interviews with four professionals who discuss cyberbullying: Deborah Gonzalez, Jennifer Perry, Dr. Valerie Mason-John, and Shelia Mae. Through these interviews, the documentary seeks to answer its research question of whether social networks are responsible for enforcing their own rules against harassment and if those rules need to be stricter. Statistics about cyberbullying are also included throughout the documentary to provide context to the discussion. The documentary was created using Adobe Premiere to edit interview clips together with supplemental b-roll footage and was published on YouTube.
How to Make People Click on a Dangerous Link Despite their Security Awareness mark-smith
ย
It is possible to make virtually any person click on a link, as any person will be curious about something, or interested in some topic, or find the message plausible because they know the sender, or because it fits their expectations (context).
This document provides a literature review and background on examining educational programs designed to combat cyber-bullying. It discusses key areas related to the topic, including definitions of cyber-bullying, gender differences in cyber-bullying experiences, and different approaches taken in existing educational programs. The literature review finds that while programs have been implemented, there is still debate around how to define cyber-bullying and whether programs should take gender-specific or neutral approaches. It also discusses theories like general strain theory and routine activities theory that could provide frameworks for analyzing prevention programs. The proposed study will use thematic analysis and key word in context methods to critically examine educational policies and terminology used to describe cyber-bullying to determine if programs effectively facilitate or
defining Cyberpsychology and discussing its subject matters. Discussing the impact of social media and Facebook on youths.
Elaborating the positive and negative effects of Social Media and suggesting some preventive techniques.
The document discusses factors that predict teenagers' online and offline romantic encounters known as "on-off dating". A study of over 1,800 Romanian teenagers found that use of instant messaging, time spent online, and positive social self-concept were among the strongest predictors for both boys and girls engaging in on-off dating. However, factors like parental monitoring and exposure to sexually explicit content showed more ambiguous relationships to on-off dating behavior.
The document discusses a study on the effects of cyberbullying on student academic performance. It begins with providing context on the growth of technology and related social issues like cyberbullying. The study aims to identify how cyberbullying affects the academic performance of grade 12 students in a specific high school. It reviews related literature showing cyberbullying has negative impacts on psychological, physical, social, and academic outcomes. The methodology section outlines the research design, respondents, data collection through questionnaires, and definition of key terms.
This document summarizes a study on lying in virtual environments among Czech adolescents and young adults. The study examined how frequently lying occurs in different online environments, who is most often the recipient of lies, and common motivations for lying. Results were compared based on gender and three age groups: adolescents, emerging adults, and adults. Key findings include that younger respondents lied more frequently than older ones, and motivations for lying varied between age groups and genders. For example, adolescents of both genders were more likely to lie about age and appearance in chat rooms.
This study examined the effect of technology on face-to-face communication. A survey of 100 Elon University students and observations of students on campus found that:
1) Students spend significant time using technology, with most reporting over 4 hours of daily use.
2) The majority of students bring their devices with them at all times and use them even when spending time with others.
3) Over 90% of students believe technology negatively impacts face-to-face interactions and degrades conversation quality.
4) Nearly half of students communicate more via technology than in person, indicating face-to-face interactions have decreased.
The findings suggest that while awareness of the issue exists, technology continues to replace face-to
Social networks provide opportunities for both benefits and risks. The benefits include maintaining social connections, emotional support, meeting new people, job searching, and online education. However, social networks can also enable harassment, over-exposure to inappropriate content, and risky online behavior. Additionally, a lack of nonverbal cues may decrease empathy. While social networks make some issues more visible, the root problems are often long-standing societal issues, not technology itself. Overall social networks reflect both the good and bad aspects of human social interaction.
Pitfalls of Social MediaSome disadvantages of social network.docxrandymartin91030
ย
Pitfalls of Social Media
Some disadvantages of social networking are addiction, friendships, and how it can become a distraction. According to an article in the Huffington Post by Britney Fitzgerald, โforty-five percent of responders said they feel โworried or uncomfortableโ when email and Facebook are inaccessible.โ Now-a-days society has gotten so dependent to their social networking; they cannot even leave their house without taking their phones or laptops to school. People cannot stand to be without their phones without having anxiety, we need to establish a control over the technology. โItโs not being on social networks that makes people anxious. Itโs being away from them.โ We have grown into this new culture where we cannot even go to sleep without checking our phones, and what is the first thing we do when we wake up? Check our phone. In fact, in a recent study Mobile Mindset study by Lookout โ54 percent admit to checking their phones while lying in bed.โ The unfortunate price we pay for social networking is lack of sleep. A similar study from the University of Bergen found that โpeople with poor sleeping habits were most likely to be Facebook-obsessed.โ It has become apparent that one has created this dependency on modern technology that we have added these aps such as Facebook and YouTube to our cell phones, since we cannot even wait to get home and check from our computers. We donโt even send invitations anymore; all we do is send a Facebook invite.
Another article in the Huffington Post, The Addiction and Cost of Social Media by Sam Fiaorella he states that โif you are not paying for the product, you are the product.โ In this case social networking, the Facebook, Twitter, and Instagram, they are all free however, you are wasting time, emotion and privacy. โAccording to Nielsen and NM Incite's The Social Media Report 2012, โconsumers continue to spend more time on social networks than on any other type of Internet site.โ โAs of July 2012, the total time spent accessing and engaging in social media sites has increased 37 percent in the U.S., representing 121 billion minutes.โ
Emotionally we put our lives out there on social networking. We are willing to share everything we do on a daily basis and post our feelings. We create an โonline version of ourselvesโ in which we are able to let people see and know any โversionโ we allow ourselves to be. โA study by the University of Waterloo as reported in Psychological Science demonstrated that Facebook engagement can increase the likelihood of depression in some people.โ
Privacy is often a forgotten factor in social networking; people seem to forget that whatever they post online can follow them throughout life. Some jobs even check your social sites to make sure you are right for the job. Social networks keep track what you are interested in, you may think its because they want to learn more about you however, โthe more personal the information they can acquire the more they can .
This dissertation examines workplace cyberbullying through five studies. Study 1 develops the Emotion Reaction Model (ERM) to understand workplace cyberbullying from the perspectives of victims and perpetrators. Study 2 validates a measure of workplace cyberbullying acts. Study 3 tests the ERM on a between-person level, finding that workplace stressors are associated with negative emotions which predict cyberbullying victimization. Study 4 identifies groups of cyber-victims based on negative acts experienced and their relationships with emotion regulation strategies. Study 5 tests the ERM on a within-person level, finding that daily work stressors predict daily feelings of anger which predict antisocial online behaviors in working men and women. Overall, the dissertation finds
The impact of mindfulness based interventions on the psychologica.pdfAlemayehuTilahunHail1
ย
This study examined the impact of virtual and classroom-based mindfulness training programs on the psychological capital (PsyCap) levels of nonprofit leaders. PsyCap encompasses hope, resilience, optimism and efficacy. Leaders from a nonprofit leadership organization were divided into an active control group that received virtual training (n=9) and an experimental group that received classroom-based training (n=15). Both groups completed pre- and post-intervention assessments of PsyCap levels and the experimental group also completed mindfulness assessments. The experimental group showed significant improvements in all four PsyCap traits while the control group only improved in hope. Qualitative interviews with the experimental group found the classroom experience positively impacted leaders both personally and professionally.
Project Part 1ITT-TechShawn EngbretsonThe Effect o.docxwkyra78
ย
Project Part 1
ITT-Tech
Shawn Engbretson
The Effect of Internet Usage on Marriage
Introduction
The rapid growth of internet usage over the last two decades has been influencing many aspects of our life and most noticeably the ways in which people communicate with each other. Therefore, it is appropriate to ask whether the growth of internet usage influences individualsโ marital decisions in modern society. This study will concentrate on the effect of the growing internet usage on marriage.
Over the last two decades, the internet has become truly widespread, and there is no doubt that this new means of communication influence and profoundly changed many substantial aspects of our lives. Email usage became standard, online dating sites multiplies, social networksโ popularity has been spectacularly growing, all giving evidence of the of the noteworthy role that online communication plays in our lives nowadays and of the very different opportunities we have now as compared to the situation some twenty years ago.
ย The young people are the most likely to exploit fully these opportunities, and there are several ways in which the means of online communication may make their life both easier and richer as compared to the generation of their parents. Easier from the point of view that search for a life partner does not have to be only in the real world, but might be countered on the internet. There are enough examples of happy couples that met for the first time on a social network, a discussion forum or other web platform, or who found each other directly through the services of an online dating site.
This shows just how these successfully formed partnerships have changed our lives in a way or another. The study, the effect of internet usage on marriage, would also help shed some light on the effect of the increasing internet usage on the divorce rate. There are certainly many aspects of marriage that internet usage can influence, but this study will concentrate mostly on the beginning of the marital process. It will particularly try to establish if the reduction of search costs, given by the fact that through the internet, more potential partners can be reached in a significantly shorter time, leads people to marry sooner or later.
I chose this study as way of trying to complement the already growing numbers of studies done on this topic both from a sociological an economic point of view. It will primarily be positioned within the economic stream of literature and by doing so; present an econometric approach that makes it possible to ascertain the effect of an increasing internet usage on individualsโ marital decisions.ย To be able to achieve this using IT as leverage to provide answers to the various questions that arise sums up all the reasons as to why I settled for this topic.
Literature Review
The propagation of the internet and the consequent enrichment of the means of communication bring one of the biggest changes ever t ...
The document summarizes research on the relationship between internet addiction and loneliness among college students. It finds that there is a positive correlation between internet addiction and loneliness, with a correlation value of 0.447. While loneliness and internet addiction are distinct issues, they can be both a cause and consequence of each other. Some individuals turn to excessive internet use to cope with feelings of loneliness, which can then further exacerbate social isolation.
Quantitative report on internet addiction and loneliness.pdfLovelockGifts
ย
The document summarizes research on the relationship between internet addiction and loneliness among college students. It finds that there is a positive correlation between internet addiction and loneliness, with a correlation value of 0.447. While loneliness and internet addiction are distinct issues, they can be both a cause and consequence of each other. Some individuals turn to excessive internet use to cope with feelings of loneliness, which can then further exacerbate social isolation.
The document discusses symptoms and behavior disorders related to internet addiction. It begins with an abstract summarizing the paper's exploration of internet addiction through netnography research. The introduction provides background on internet addiction disorder and its prevalence. The literature review covers topics like dopamine's role in addiction, cognitive behavioral therapy as a treatment, and how internet addiction affects interpersonal relationships and can create fake online personas. The methodology section describes the use of netnography and qualitative data analysis software. Key findings establish six propositions about the neurobiological and psychosocial aspects of internet addiction.
This document summarizes a study that examined the effects of computer-mediated communication (CMC) on face-to-face (FtF) social skills in college students. The study conducted an online survey of college students through Facebook, Twitter, and email. The results found no direct correlation between CMC use and effects on social skills. The document provides background on theories of uncertainty reduction and social cognitive theory. It also discusses literature on CMC and FtF communication and variables like nonverbal cues.
This document summarizes research on cyberbullying among adolescent victims. It finds that cyberbullying can lead to both positive and negative behavioral changes in victims. Positively, it can help them recognize aggressive people online. However, it can also result in lower self-esteem, loneliness, distrust of others, and in extreme cases self-harm. The study examines coping strategies used by victims, which include technical defenses, confronting the aggressor, avoidance, seeking social support, and defensive strategies. The effectiveness of different coping strategies remains unclear.
This document discusses two conceptual approaches - social compensation and rich-get-richer - that have been proposed to explain adolescent online risk-taking behaviors. It summarizes a study that examined which approach better predicts such behaviors using data from the Pew Internet Foundation. The study found that predictors of risk-taking included a lack of extracurricular activities, especially for boys, and infrequent socializing with friends in person, especially for girls. This supports the social compensation approach, which posits that those with less satisfying offline lives engage in more online risk as compensation. The document provides background on the approaches and outlines the study's methodology using the Pew Internet Foundation survey data to analyze relationships between adolescent characteristics and risk behaviors.
Effect of technology on personal communicationAbid Momand
ย
The document discusses the undesirable effects of technology on personal communication. While technology has enabled new forms of communication, it has negatively impacted valuable in-person interactions. Face-to-face communication is more effective than electronic communication as it allows people to connect on a deeper level through body language, facial expressions, and empathy. Several studies have shown that as internet and technology use increases, time spent socializing in person decreases, and empathy and social skills among youth have declined. True emotional support and meaningful exchanges of information require in-person communication that virtual interactions cannot replace.
Jacque lewis - Senior Project -w/o scriptJacque Lewis
ย
This 12-minute mini-documentary explores whether social networks should enforce stricter regulations regarding social media harassment. The documentary features interviews with four professionals who discuss cyberbullying: Deborah Gonzalez, Jennifer Perry, Dr. Valerie Mason-John, and Shelia Mae. Through these interviews, the documentary seeks to answer its research question of whether social networks are responsible for enforcing their own rules against harassment and if those rules need to be stricter. Statistics about cyberbullying are also included throughout the documentary to provide context to the discussion. The documentary was created using Adobe Premiere to edit interview clips together with supplemental b-roll footage and was published on YouTube.
How to Make People Click on a Dangerous Link Despite their Security Awareness mark-smith
ย
It is possible to make virtually any person click on a link, as any person will be curious about something, or interested in some topic, or find the message plausible because they know the sender, or because it fits their expectations (context).
This document provides a literature review and background on examining educational programs designed to combat cyber-bullying. It discusses key areas related to the topic, including definitions of cyber-bullying, gender differences in cyber-bullying experiences, and different approaches taken in existing educational programs. The literature review finds that while programs have been implemented, there is still debate around how to define cyber-bullying and whether programs should take gender-specific or neutral approaches. It also discusses theories like general strain theory and routine activities theory that could provide frameworks for analyzing prevention programs. The proposed study will use thematic analysis and key word in context methods to critically examine educational policies and terminology used to describe cyber-bullying to determine if programs effectively facilitate or
defining Cyberpsychology and discussing its subject matters. Discussing the impact of social media and Facebook on youths.
Elaborating the positive and negative effects of Social Media and suggesting some preventive techniques.
The document discusses factors that predict teenagers' online and offline romantic encounters known as "on-off dating". A study of over 1,800 Romanian teenagers found that use of instant messaging, time spent online, and positive social self-concept were among the strongest predictors for both boys and girls engaging in on-off dating. However, factors like parental monitoring and exposure to sexually explicit content showed more ambiguous relationships to on-off dating behavior.
The document discusses a study on the effects of cyberbullying on student academic performance. It begins with providing context on the growth of technology and related social issues like cyberbullying. The study aims to identify how cyberbullying affects the academic performance of grade 12 students in a specific high school. It reviews related literature showing cyberbullying has negative impacts on psychological, physical, social, and academic outcomes. The methodology section outlines the research design, respondents, data collection through questionnaires, and definition of key terms.
This document summarizes a study on lying in virtual environments among Czech adolescents and young adults. The study examined how frequently lying occurs in different online environments, who is most often the recipient of lies, and common motivations for lying. Results were compared based on gender and three age groups: adolescents, emerging adults, and adults. Key findings include that younger respondents lied more frequently than older ones, and motivations for lying varied between age groups and genders. For example, adolescents of both genders were more likely to lie about age and appearance in chat rooms.
This study examined the effect of technology on face-to-face communication. A survey of 100 Elon University students and observations of students on campus found that:
1) Students spend significant time using technology, with most reporting over 4 hours of daily use.
2) The majority of students bring their devices with them at all times and use them even when spending time with others.
3) Over 90% of students believe technology negatively impacts face-to-face interactions and degrades conversation quality.
4) Nearly half of students communicate more via technology than in person, indicating face-to-face interactions have decreased.
The findings suggest that while awareness of the issue exists, technology continues to replace face-to
Social networks provide opportunities for both benefits and risks. The benefits include maintaining social connections, emotional support, meeting new people, job searching, and online education. However, social networks can also enable harassment, over-exposure to inappropriate content, and risky online behavior. Additionally, a lack of nonverbal cues may decrease empathy. While social networks make some issues more visible, the root problems are often long-standing societal issues, not technology itself. Overall social networks reflect both the good and bad aspects of human social interaction.
Pitfalls of Social MediaSome disadvantages of social network.docxrandymartin91030
ย
Pitfalls of Social Media
Some disadvantages of social networking are addiction, friendships, and how it can become a distraction. According to an article in the Huffington Post by Britney Fitzgerald, โforty-five percent of responders said they feel โworried or uncomfortableโ when email and Facebook are inaccessible.โ Now-a-days society has gotten so dependent to their social networking; they cannot even leave their house without taking their phones or laptops to school. People cannot stand to be without their phones without having anxiety, we need to establish a control over the technology. โItโs not being on social networks that makes people anxious. Itโs being away from them.โ We have grown into this new culture where we cannot even go to sleep without checking our phones, and what is the first thing we do when we wake up? Check our phone. In fact, in a recent study Mobile Mindset study by Lookout โ54 percent admit to checking their phones while lying in bed.โ The unfortunate price we pay for social networking is lack of sleep. A similar study from the University of Bergen found that โpeople with poor sleeping habits were most likely to be Facebook-obsessed.โ It has become apparent that one has created this dependency on modern technology that we have added these aps such as Facebook and YouTube to our cell phones, since we cannot even wait to get home and check from our computers. We donโt even send invitations anymore; all we do is send a Facebook invite.
Another article in the Huffington Post, The Addiction and Cost of Social Media by Sam Fiaorella he states that โif you are not paying for the product, you are the product.โ In this case social networking, the Facebook, Twitter, and Instagram, they are all free however, you are wasting time, emotion and privacy. โAccording to Nielsen and NM Incite's The Social Media Report 2012, โconsumers continue to spend more time on social networks than on any other type of Internet site.โ โAs of July 2012, the total time spent accessing and engaging in social media sites has increased 37 percent in the U.S., representing 121 billion minutes.โ
Emotionally we put our lives out there on social networking. We are willing to share everything we do on a daily basis and post our feelings. We create an โonline version of ourselvesโ in which we are able to let people see and know any โversionโ we allow ourselves to be. โA study by the University of Waterloo as reported in Psychological Science demonstrated that Facebook engagement can increase the likelihood of depression in some people.โ
Privacy is often a forgotten factor in social networking; people seem to forget that whatever they post online can follow them throughout life. Some jobs even check your social sites to make sure you are right for the job. Social networks keep track what you are interested in, you may think its because they want to learn more about you however, โthe more personal the information they can acquire the more they can .
This dissertation examines workplace cyberbullying through five studies. Study 1 develops the Emotion Reaction Model (ERM) to understand workplace cyberbullying from the perspectives of victims and perpetrators. Study 2 validates a measure of workplace cyberbullying acts. Study 3 tests the ERM on a between-person level, finding that workplace stressors are associated with negative emotions which predict cyberbullying victimization. Study 4 identifies groups of cyber-victims based on negative acts experienced and their relationships with emotion regulation strategies. Study 5 tests the ERM on a within-person level, finding that daily work stressors predict daily feelings of anger which predict antisocial online behaviors in working men and women. Overall, the dissertation finds
The impact of mindfulness based interventions on the psychologica.pdfAlemayehuTilahunHail1
ย
This study examined the impact of virtual and classroom-based mindfulness training programs on the psychological capital (PsyCap) levels of nonprofit leaders. PsyCap encompasses hope, resilience, optimism and efficacy. Leaders from a nonprofit leadership organization were divided into an active control group that received virtual training (n=9) and an experimental group that received classroom-based training (n=15). Both groups completed pre- and post-intervention assessments of PsyCap levels and the experimental group also completed mindfulness assessments. The experimental group showed significant improvements in all four PsyCap traits while the control group only improved in hope. Qualitative interviews with the experimental group found the classroom experience positively impacted leaders both personally and professionally.
This study investigated the mediating role of psychological capital in the association between job burnout, depression, and anxiety symptoms among 969 managers in eastern China. The study found that job burnout was positively associated with depression and anxiety symptoms, and negatively associated with psychological capital. Psychological capital partially mediated the association between job burnout and depression symptoms. The findings suggest psychological capital plays an important role in the relationship between job burnout and mental health problems among managers.
This study examines the distinction between active and passive dimensions of email incivility in the workplace. Prior research has not fully explored these two dimensions. Study 1 aims to empirically validate a two-factor model of email incivility and compare how employees appraise incidents of active versus passive email incivility. Study 2 will examine the relationship between the two dimensions of email incivility and employee well-being outcomes like insomnia and next-day negative affect. The research aims to provide a more nuanced understanding of email incivility and its implications for employees.
This study examines workplace incivility and its socio-demographic determinants in India. It analyzes data from 1,133 employees across various service sector organizations in India. The study finds that employees' age, gender, education level, position, organization type, nature of organization, and working hours significantly predict the likelihood of instigated and experienced incivility. However, marital status and tenure did not predict experiences of uncivil behaviors. The results provide insights into how socio-demographic factors relate to workplace incivility in India and have implications for managing uncivil behaviors.
This study examined the effects of workplace incivility versus support communicated via email on various outcomes. 84 participants completed math tasks while interacting with either an uncivil or supportive supervisor via email. Those in the uncivil condition reported higher negative affect, lower energy, and performed worse on math tasks than those in the supportive condition. Performance differences were mediated by energy levels. No differences in cardiac activity were found between conditions. The results suggest that incivility communicated via email can negatively impact employee well-being, performance, and engagement.
This study examines the impact of workplace incivility on employee performance, with the mediating role of psychological well-being, among female employees in the health sector of Azad Jammu and Kashmir, Pakistan. The study aims to determine if workplace incivility negatively impacts employee performance, and if psychological well-being mediates this relationship. A structural equation model is used to analyze the data and test the hypotheses. The results show that workplace incivility has a significant negative effect on employee performance. Psychological well-being is also found to have a direct negative impact on performance. Additionally, psychological well-being is shown to mediate the relationship between incivility and performance. The findings suggest that incivility reduces psychological well
This study explored nursing students' knowledge, experiences, and perceptions of cyberincivility in the United States, Hong Kong, and South Korea. The researchers administered a questionnaire to 336 nursing students across the three countries. They found that over 50% of respondents had experienced cyberincivility. However, there were significant differences between the three countries in online behavior patterns, knowledge of cyberincivility, frequency of experiencing cyberincivility, and perceived benefits of learning about cybercivility. For example, Hong Kong respondents demonstrated lower knowledge than US and South Korean respondents. The study aims to inform the development of educational programs to promote cybercivility globally while considering sociocultural differences.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
ย
(๐๐๐ ๐๐๐) (๐๐๐ฌ๐ฌ๐จ๐ง ๐)-๐๐ซ๐๐ฅ๐ข๐ฆ๐ฌ
๐๐ข๐ฌ๐๐ฎ๐ฌ๐ฌ ๐ญ๐ก๐ ๐๐๐ ๐๐ฎ๐ซ๐ซ๐ข๐๐ฎ๐ฅ๐ฎ๐ฆ ๐ข๐ง ๐ญ๐ก๐ ๐๐ก๐ข๐ฅ๐ข๐ฉ๐ฉ๐ข๐ง๐๐ฌ:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
๐๐ฑ๐ฉ๐ฅ๐๐ข๐ง ๐ญ๐ก๐ ๐๐๐ญ๐ฎ๐ซ๐ ๐๐ง๐ ๐๐๐จ๐ฉ๐ ๐จ๐ ๐๐ง ๐๐ง๐ญ๐ซ๐๐ฉ๐ซ๐๐ง๐๐ฎ๐ซ:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Communicating effectively and consistently with students can help them feel at ease during their learning experience and provide the instructor with a communication trail to track the course's progress. This workshop will take you through constructing an engaging course container to facilitate effective communication.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
เคนเคฟเคเคฆเฅ เคตเคฐเฅเคฃเคฎเคพเคฒเคพ เคชเฅเคชเฅเคเฅ, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, เคนเคฟเคเคฆเฅ เคธเฅเคตเคฐ, เคนเคฟเคเคฆเฅ เคตเฅเคฏเคเคเคจ, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Make a Field Mandatory in Odoo 17Celine George
ย
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the bodyโs response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Main Java[All of the Base Concepts}.docxadhitya5119
ย
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
1. Journal of Physics: Conference Series
PAPER โข OPEN ACCESS
Cyber Incivility Perpetrator: The Influenced of
Dissociative Anonimity, Invisibility, Asychronicity,
and Dissociative Imagination
To cite this article: S K T Febriana and Fajrianthi 2019 J. Phys.: Conf. Ser. 1175 012238
View the article online for updates and enhancements.
You may also like
Reconstruction of Cyber and Physical
Software Using Novel Spread Method
Wubin Ma, Su Deng and Hongbin Huang
-
Development of cyber physical system
based manufacturing system design for
process optimization
Anbesh Jamwal, Rajeev Agrawal, Vijaya
Kumar Manupati et al.
-
Group consensus of multi-agent systems
subjected to cyber-attacks
Hai-Yun Gao, , Ai-Hua Hu et al.
-
This content was downloaded from IP address 196.191.52.44 on 09/06/2022 at 15:32
2. Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd
1st International Conference on Advance and Scientific Innovation (ICASI)
IOP Conf. Series: Journal of Physics: Conf. Series 1175(2019) 012238
IOP Publishing
doi:10.1088/1742-6596/1175/1/012238
1
Cyber Incivility Perpetrator: The Influenced of Dissociative
Anonimity, Invisibility, Asychronicity, and Dissociative
Imagination
S K T Febriana1
, Fajrianthi2
1
Universitas Lambung Mangkurat, Banjarmasin, Indonesia
2
Universitas Airlangga, Surabaya, Indonesia
silviakristanti@gmail.com
Abstract. cyber incivility is a communication behavior that violates ethics for mutual respect
between one person and another in online. The impacts of cyber incivility include decreasing of
satisfaction and work commitment, deliberate in job deviation until turnover intention.
Unfortunately, empirical studies have so far only addressed the antecedents of cyber incivility
perpetrators from the point of view of work domains and user communications user personalities,
but rarely review online characteristics that cause a person to engage in social disinhibition.
Therefore this study aims to prove the influence of anonymity, invisibility, asyncronicity, and
dissociative imagination on cyber incivility behavior. This study uses correlational design with
multiple linear regression analysis techniques. The subjects were 111 workers from various types
of work (66 females, 45 males, mean of age = 32,8739, standard deviation of age = 5,73)
domiciled in Indonesia recruited by purposive sampling. The result shows that anonymity,
invisibility and asincronicity have a significant effect on the presence of cyber incivility.
1. Introduction
The development of computer-mediated information and communication technology further
facilitates the process of good communication between superiors and subordinates, colleagues,
colleagues, and even consumers and clients (1-3). Nevertheless, the development of increasingly
sophisticated online communication media proves that short messages, chat rooms, social networking
sites, websites can also be a space for cyber incivility (4). Forms of cyber incivility behavior such as,
using abusive, sarcastic, degrading language, saying something painful, not replying to messages at all,
canceling meetings in a short time (5). Cyber incivility is a form of online communication that violates
ethical norms with the aim of harming others (6). This concept is related to cyberbullying, the difference
is if bullying is done by intimidating the target repeatedly, while the incivility is more ambiguous with
low intensity (7).
Survey data shows 91% of workers have experienced cyber incivility from supervisors and
co-workers, even organizations in America estimate US $ 5 billion in health costs to overcome victims
of stress due to rude e-mails (6). Regarding this phenomenon, various empirical studies have proven the
impact of cyber incivility. For example, a study shows that workers who experience the threat of
personal welfare through online messaging show low work commitment, job dissatisfaction, and even
engage in work irregularities (6). Individuals who experience cyber incivility feel a decrease in energy
and increasing negative emotions (8). Even a study shows that this condition causes increasingly severe
psychological stress and continues later (9). Even worse this condition causes fatigue and absenteeism,
leading to ever increasing shifting intentions (10).
3. 1st International Conference on Advance and Scientific Innovation (ICASI)
IOP Conf. Series: Journal of Physics: Conf. Series 1175(2019) 012238
IOP Publishing
doi:10.1088/1742-6596/1175/1/012238
2
Based on the prevalence and the impact, the problem is that empirical studies have only dealt
with the aspects of work and personality to explain the antecedents of cyber incentive perpetrator. For
example, a study using the stress tension model shows that workload conditions accompanied by
innovative email treatment led to cyber incivility (11). Another study by integrating the five-factor
model, Abridged Big Five Circumplex and reasoned action theory proves how the characteristics of an
extroverted, anxious and inadvertent personality in acting can be involved as a cyber incentive
perpetrator (2). Whereas in fact the psychological characteristics of behavior in online communication
are different from behaviors that occur in the real world (12). If in traditional or face-to-face
communication, the process involves verbal and nonverbal cues such as facial expressions,
paralanguage, the presence of social contact cues, which allow emotions to be felt more fully by the
recipient and the sender of the message. The existence of verbal and non-verbal cues causes both parties
to easily make feedback to seek clarity by asking questions or repeating information directly. However,
the online communication process is more text based with the absence of communication partners. As a
result, this condition causes limitations in understanding non-verbal cues and delays in direct feedback
(13). The absence of communication partners by not confronting each other leads to an anonymous
feeling that leads to the effect of disinhibited (encouraging) someone to say and do things that will not
be done when face to face (1). As a result, a person is easy to express personal feelings or do things that
lead to aggressive and hostile behavior in a relaxed and more open way without feeling any obstacles
(14).
Referring to the problem shows the need for further needs to explain how the process of cyber
incivility is occurring and proactive actions to minimize this from the point of view of the psychological
characteristics of online behavior. The phenomenon of disinhibited social behavior in online
communication is caused by toxic online disinhibition (14). This disinhibited behavior refers to
behaviors that are no longer controlled by concerns about self-presentation or the judgment of others so
as to enable a person to apply their own views about what is not normal for them (12). As the study
proves that cyberbullying behavior is strongly influenced by toxic disinhibited factors, this is not related
to the duration of activity using the internet (15). Toxic online disinhibition occurs because of anonymity
and limitations of social cues, such as facial expressions, tone of voice, and body language that cannot
be seen directly in online communication (10). It is confirmed (14) that the presence of disinhibited
behavior in online communication is principally caused by psychological characteristics such as
anonymity, invisibility, asynchronicity, solipsistic introjection, dissociative imagination and
minimization of authority status.
Furthermore related to the role of anonymity in cyber incivility, a longitudional study (16) proves
that in an anonymous situation a person is more at risk for cyberbullying. Empirical evidence explains
that anonymous factors influence the increasing behavior of cyber aggression. For example, (17) proves
that anonymity is so that someone feels that he believes that he is not caught with online content that is
not permanent, in which this condition triggers someone to act cyber aggression. This study explains in
an anonymous situation individuals experience a decrease in self-control so they feel the freedom to act
and say aggressive things. In line with this (18) it proves that the presence of cyberbullying behavior is
caused by perceptions of anonymity and belief in irrelevance between online conditions and real life.
Likewise the study (19) explained that the occurrence of cyberbullying caused by anonymous conditions
allows a person to feel less identified, feel less responsible, and the behavior of his behavior is unknown
to others. Various empirical facts are reinforced by a meta-analysis study which proves that
cyberbullying is predicted to be strong by an attitude of trust in accepting the behavior (1). Thus it can
be concluded that the anonymity factor influences the presence of cyber incivility behavior by being
mediated by beliefs. Therefore the first hypothesis (H1) in this study is: "the more someone
experiences anonymity, the easier it is to do cyber incivility"
The study literature explains how the characteristics of online communication can trigger cyber
incivility behavior. For example, an experimental study proves that feelings are not identified by others
due to invisibility because the lack of an eye contract causes a person to behave unhindered and trigger
cyberbullying. This study proves that invisibility is the strongest predictor that triggers cyberbullying
compared to anonymity (20). Invisibility is a situation in which a person's identity is known but cannot
be seen or heard by others because they do not meet each other. This opportunity causes individuals not
4. 1st International Conference on Advance and Scientific Innovation (ICASI)
IOP Conf. Series: Journal of Physics: Conf. Series 1175(2019) 012238
IOP Publishing
doi:10.1088/1742-6596/1175/1/012238
3
to experience anxiety to be seen or heard by others when typing messages or responding to information
(14). Referring to the empirical evidence, it can be concluded that invisibility influences the presence of
cyber incivility behavior. Therefore the second hypothesis (H2) in this study is: "The higher
someone feels invisibility, the easier it is to do cyber incivility"
Meanwhile, asynchronicity and dissociative imagination also show a positive influence on the
presence of unhindered behavior. This explains that the response that can be delayed due to
synchronicity in online communication gives a person the opportunity to escape responsibility after
posting messages that are personal, emotional, or hostile. Likewise with dissociative imagination factors
that allow one to separate their online personality from real-world responsibilities that cause a person
not to care about their words or actions online because they are isolated from real life (21). Thus it can
be concluded that asynchronicity and dissociative imagination factors influence the presence of cyber
incivility behavior. Therefore the third hypothesis (H3) in this study is: "the more a person
experiences synchronicity, the easier it is to do cyber incivility", while the fourth hypothesis (H4)
is: "the more a person experiences dissociative imagination, the easier it is to do cyber incivility"
2. Method
2.1. Design and Participants
This study uses a correlational design with multiple linear regression analysis technique with the
support of Lisrel 8.7 software. then acting as an independent variable namely anonymity, invisibility,
asyncronicity, and dissociative imagination, while the dependent variable is cyber incivility.
Research subjects were recruited online with purposive sampling method.
The number of subjects was 111 workers (66 females, 45 males, mean of age = 32.8739, standard
deviation of age = 5.73) domiciled in Indonesia. The background of the subject is 54.3% have received
S2 education and 29.6% S1 education. Types of work of subjects include, lecturers, administrative staff,
government employees, human resources, human capital, psychologists, counselors, marketing, and
bankers.
2.2 Materials and Procedure
Data collection is done using a psychological scale in Indonesian. The choice of answers
refers to the Likert scale with five answer choices. Next to measure the dependent variable, the author
translates cyber incentive scale (2). Participants were asked how far they were involved in cyber
incivility behavior in their current work environment, using a scale from 1 ("Never") to 5 ("Always).
The measurement instrument consists of 6 items to explain the cyber incivility experience that
perpetrators have done with r = 0.87, p = 0.001. The measuring instrument items are as follows (2):
Anonimity
Invisibility
Asinchron
Imaginatio
n
Cyber
Incivility
Figure 1. Model Cyber Incivility Perpetrator
5. 1st International Conference on Advance and Scientific Innovation (ICASI)
IOP Conf. Series: Journal of Physics: Conf. Series 1175(2019) 012238
IOP Publishing
doi:10.1088/1742-6596/1175/1/012238
4
Table 1. Cyber Incivility Scale (Perpetrator) ((2)
No. Question Item Standardized
loading
1. Say something hurtfull via email 0.82
2. Say something that demeans or insults others through email. 0.92
3. Email sent using rude and rude tone. 0.78
4. Using Capital Letters (LARGE LETTERS) to shout to others via email.. 0.69
5. Ignore someone's request via email (for example, request a meeting or meeting
schedule)
0.70
6. Replying to someone's email without answering questions from an email 0.80
Whereas to measure the independent variables of anonymity, invisibility, asyncronicity,
imagination dissociative, the authors used the translation of toxic disinhibition scale (21). with cronbach
alpha less than 0.7 and a loading factor of more than 0.5. The measuring instrument items are as follows:
Tabel 2. Anonimity, Invisibility, Asinchronicity, Dissociative Imagination Scale
No. Question Item Loading
faktor
Anonimity
1. I think that other people don't know where I am in the social networking forum 0,821
2. I think that I can hide my identity on the social networking forum 0,854
3. I think there is no need to use "Name" or can use "fake names" on social
networking forums.
0,730
4. I think I can change my identity in social networking forums (for example,
changing gender, career, etc.)
0,646
Invisibility
5. I think that I can't see other people's facial expressions on social networking forums 0,882
6. I think that I can't see the faces of other people on social networking forums 0,899
7. I thought that I could not hear the voices of others on the social networking forum 0,872
8. I thought that I did not know the response of others to my statement on the social
networking forum
0,575
Asynchronicity
9. On social networking forums, I think other people will reply to my message after a
few hours or a few days.
0,674
10. I think that I don't need to immediately reply or respond to someone else's message
in a social networking forum.
0,724
11. I think that feedback and response from others will be delayed on the social
networking forum.
0,841
12. I thought that the message I posted on the social networking forum would not
immediately get an answer or response
0,716
Imajinasi Disosiatif
13. I think that in my social networking forum (virtual) can be a different person
compared to real life
0,683
14. What happened on the social networking forum is not relevant to my real life.. 0,720
15. I think that the rules and norms in social networking forums are different from real
life
0,802
16. I think what I say and do in social networks is not directly related to my real life 0,799
3. Result
3.1. Validity dan Reliability
Based on the cofirmatory factor analysis (CFA) test of the standardized estimation value shows
that all indicators have good validity with the loading value> 0.60 (above 0.60). The indicator is
considered valid if it has a standardized loading above 0.70, even though the research that is still in the
6. 1st International Conference on Advance and Scientific Innovation (ICASI)
IOP Conf. Series: Journal of Physics: Conf. Series 1175(2019) 012238
IOP Publishing
doi:10.1088/1742-6596/1175/1/012238
5
standardized loading development stage 0.50 to 0.60 is still acceptable (24). In detail, the CFA test
proves that the third anonymity indicator has standardized loading below 0.70 (0.69), as well as the
fourth cyber incivility indicator (0.67) and fifth cyber incivility (0.69). While the indicators of
invisibility, ashynchronicity, and imagination have good validity because all standardized loading is
above 0.70. So it can be concluded that the indicators that form the variables of anonymity, invisibility,
asynchronicity, imagination and cyber incivility are all valid.
Furthermore, the variables have good reliability if they have composite reliability values (ฯC>
0.70) and average variance extracted (AVR> 0.50) (24). Based on this, this study proves that anonymous
variables (AVE = 0.595; ฯC = 0.854), invisibility (AVE = 0.846; ฯC = 0.957), asynchronicity (AVE =
0.619; ฯC = 0.865), imagination (AVE = 0.651; ฯC = 0.881), cyber incivility (AVE = 0.605; ฯC = 0.901).
So it can be concluded that the variables of anonymity, invisibility, asynchronicity, imagination and
cyber incivility are all reliable.
The fit model is indicated by a p-value that is not significant (> 0.05) and RMSEA below 0.08
(24). This study proves the model for each variable as follows, an anonymous variable (Chi-square =
14.35, df = 2, p-value = 0.00077, RMSEA = 0.237) indicates the model is not fit. While the invisibility
variable (Chi-square = 1.55, df = 2, p-value = 0.46073, RMSEA = 0.000), asynchronicity (Chi-square =
3.93, df = 2, p-value = 0.13986, RMSEA = 0.094), imagination ( Chi-square = 14.51, df = 2, p-value =
0.00071, RMSEA = 0.238), cyber incivility (Chi-square = 78.57, df = 9, p-value = 0.0000, RMSEA =
0.265). This proves that invisibility is the most fit model.
3.2. Hypotheses Testing & Discussion
The model shows that Chi-Square = 336.61 with 199 degrees of freedom (df = 199) and p value
(p = 0.000), (x2 / df = 1.691), NCP = 137.61 with evidence the interval 90.85-192.24 indicates that the
model is basically this is not fit. Furthermore, RMSEA = 0.079 with RMSEA = 0.064: 0.094 evidence
interval proves that the model is quite "reasonable" and not in the "rejection" category so that the
RMSEA model has good accuracy in assessing the fit model. (ECVI = 4.04, ECVI saturated model =
4.60, ECVI for independence model = 26.55) shows that the model is good to be replicated in subsequent
studies. Model AIC = 444.61, Independence CAIC = 3002.60, saturated CAIC = 1444.51 concluded
that the model is fit because the AIC and CAIC values are smaller than saturated (C) AIC and indepence
(C) AIC. Whereas if viewed from other fit goodness criteria shows (NFI = 0.88, TLI, CFI = 0.95, GFI
= 0.78, AGFI = 0.72), criteria based on CFI showing good models (> 0.90), overall this study shows the
model good or fit.
Based on the results of multiple linear regression analysis with the support of Lisrel 8.7 software
it is found that: Anonymous has a significant positive effect on the presence of cyber incivility behavior
(t = 6.05 /> 1.96) (H1: Accepted). Anonymous has a significant positive effect on the presence of cyber
incivility behavior (t = 6.05 /> 1.96) (H1: Accepted). The findings show that the more a person feels
anonymity, the stronger the possibility of being involved in cyber incivility. As Dissociative anonymity
allows individuals to express themselves and do some behavior that is not available in a real social
environment. Individuals feel free from expectations and cost constraints and the risk of social sanctions
for their actions. This provides an individual opportunity to separate online behavior from their true
lifestyle and personal identity. Thus, they feel they can avoid responsibility for online behavior, even
feel innocent (irresponsible) for inappropriate behavior that has been done (14,22).
7. 1st International Conference on Advance and Scientific Innovation (ICASI)
IOP Conf. Series: Journal of Physics: Conf. Series 1175(2019) 012238
IOP Publishing
doi:10.1088/1742-6596/1175/1/012238
6
Furthermore, the analysis shows that: Invisibility has a significant positive effect on the presence
of cyber incivility behavior (t = 6.19 /> 1.96) (H2: Accepted). The findings show that the more someone
feels invisibility, the stronger the possibility of being involved in cyber incivility actions. This finding
is in line with (20) which has proven that invisibility is the strongest predictor that triggers cyberbullying
compared to anonymity. Invisibility is a condition because it does not meet each other so that a person's
identity is known but cannot be seen or heard by others. This opportunity causes individuals not to
experience anxiety to be seen or heard by others when typing messages or responding to information
(14).
In the third analysis shows that: asynchronity has a significant positive effect on the presence of
cyber incivility behavior (t = 5.37 /> 1.96) (H3: Accepted). The findings show that the more a person
feels asynchronity, the stronger the possibility of being involved in cyber incivility. In online
communication, it is possible that interactions are not synchronized. This allows one to take minutes,
hours, days or even months to reply to a message that results in a delay in the feedback process. This
condition trains one's mind to lead to expressions that violate social norms (14). Whereas in the fourth
analysis shows that: imagination does not significantly influence the presence of cyber incivility
behavior (t=-1.63/<1.96) (H4 : rejected).
This shows that the state of imagination has no significant effect on the presence of cyber
incivility behavior. These findings contradict (14) and (21) which explain that dissociative imagination
is a condition in which a person consciously or unconsciously feels that the imaginary characters formed
in their online persona are different and separate from demands and responsibilities in the real world, so
that circumstances this can evolve in complexity. However, through this finding shows that not everyone
does not heed the rules and norms that apply in online behavior. In fact they can still be responsible for
seeing their online life as a rule and norm that is also in everyday life.
Discussing about the confirmatory fit model results show that Chi-Square = 336.61 with 199
degrees of freedom (df = 199) and a significant p value (p = 0.000), indicating that this model is basically
not fit. Whereas if viewed from other fit goodness criteria shows (NFI = 0.88, TLI, CFI = 0.95, GFI =
0.78, AGFI = 0.72), this criterion proves that only CFI shows a good model (> 0.90), while (RMSEA =
0.079 ) also shows a good model or Fit because the value is below 0.08. Based on these findings it can
be concluded that the Fit model
Overall this article presents empirical evidence of toxic disinhibited (22) online links with
cyber incivility behavior. This shows that disinhibited theory can explain cyber incivility from the point
Figure 2. Multiple Linnier Regression Results predicting Cyber Incivility
Perpetrator
8. 1st International Conference on Advance and Scientific Innovation (ICASI)
IOP Conf. Series: Journal of Physics: Conf. Series 1175(2019) 012238
IOP Publishing
doi:10.1088/1742-6596/1175/1/012238
7
of view of the characteristics of online communication which is certainly different from social.
Characteristics of online, text-based and impersonal communication can trigger difficulties in
coordinating and resolving disputes and ultimately lead to disputes (23). This implication is very
important because media differences can affect inherent characteristics that limit or free up users (13).
As with the characteristics of online media with a low social presence and the opportunity for anonymity
to cause deindividuation and disinhibited, causing individuals to feel the freedom to express themselves
and have the opportunity to engage in anti-social behavior.
This finding is in line with the experimental study (20) which has proven the feeling of being
unidentified by people due to lack of eye and invisibiliy factors having a large impact on disinhibited
behavior causes one to dare to express opinions and trigger disinhibited communication behavior. And
another study (21) which proved that the factor of dissociative anonymity asynchronicity had a
significant effect on toxic disinihibiton. As well as the study (15) which proves toxic disinhibition is the
strongest predictor of cyberbullying behavior. However, the current study found that factors of
dissociative imagination have no effect on the presence of different cyber incivility behavior with
disinhibited theory (14) and study (21) therefore future research needs to consider these findings.
4. Conclusion
Cyber incivility is a form of work deviation behavior that is often experienced by employees
in this era of online media technology sophistication. Research efforts and advance our understanding
of cyber incivility in the workplace in order to reduce and anticipate this dangerous behavior in its
various forms. We hope this article can inspire scientists to investigate further the phenomenon of cyber
incivility and help encourage practitioners to develop policies and actions regarding ethical behavior in
communicating online to reduce and anticipate the effects of cyber incivility.
References
[1] Kowalski RM, Giumetti GW, Schroeder AN, Lattanner MR. Bullying in the digital age: A
critical review and meta-analysis of cyberbullying research among youth. Psychol Bull.
2014;140(4):1073โ137.
[2] Krishnan S. Electronic warfare: A personality model of cyber incivility. Comput Human Behav
[Internet]. 2016;64:537โ46. Available from: http://dx.doi.org/10.1016/j.chb.2016.07.031
[3] Abell L, Brewer G. Machiavellianism, self-monitoring, self-promotion and relational aggression
on Facebook. Comput Human Behav [Internet]. 2014;36(1):258โ62. Available from:
http://dx.doi.org/10.1016/j.chb.2014.03.076
[4] Giumetti GW, Saunders LA, Brunette JP, DiFrancesco FM, Graham PG. Linking Cyber
Incivility With Job Performance Through Job Satisfaction: The Buffering Role of Positive
Affect. Psi Chi J Psychol Res [Internet]. 2016;21(4):230โ40. Available from:
https://lopes.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9
h&AN=120166034&site=eds-live&scope=site
[5] LIM VKG, TEO TSH, CHIN JENY. Bosses and their E-Manners. Commun ACM [Internet].
2008;51(12):155โ7. Available from:
http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=35609295&site=ehost-
live&scope=site
[6] Lim VKG, Teo TSH. Mind your E-mannersโฏ: Impact of cyber incivility on employees รขโฌTM
work
attitude and behavior. J Inf Manag. 2009;46:419โ25.
[7] Kowalski RM, Toth A, Morgan M. Bullying and cyberbullying in adulthood and the workplace.
J Soc Psychol. 2018;158(1):64โ81.
[8] Giumetti G, Schroeder A, Muth ER, Kowalski R, Hatfield AL. What a Rude E-Mailโฏ! Examining
the Differential Effects of Incivility Versus Support on Mood , Energy , Engagement , and ... J
Occup Health Psychol. 2013;18(3):297โ309.
[9] Park Y, Fritz C, Jex SM. Daily Cyber Incivility and Distress. J Manage [Internet].
2015;XX(X):14920631557679. Available from:
http://journals.sagepub.com/doi/10.1177/0149206315576796
9. 1st International Conference on Advance and Scientific Innovation (ICASI)
IOP Conf. Series: Journal of Physics: Conf. Series 1175(2019) 012238
IOP Publishing
doi:10.1088/1742-6596/1175/1/012238
8
[10] Giumetti GW, McKibben ES, Hatfield AL, Schroeder AN, Kowalski RM. Cyber Incivility @
Work: The New Age of Interpersonal Deviance. Cyberpsychology, Behav Soc Netw [Internet].
2012;15(3):148โ54. Available from:
http://online.liebertpub.com/doi/abs/10.1089/cyber.2011.0336
[11] Francis L, Holmvall CM, OโBrien LE. The influence of workload and civility of treatment on
the perpetration of email incivility. Comput Human Behav [Internet]. 2015;46:191โ201.
Available from: http://dx.doi.org/10.1016/j.chb.2014.12.044
[12] Joinson AN. Disinhibition and the internet. In: Psychology and The Internet (Second Edition).
2007. p. 75โ92.
[13] Byron K. Carrying Too Heavy A Loadโฏ? The Communication And Miscommunication Of
Emotion By Email. Acad Manag Rev. 2008;33(2):309โ27.
[14] Suler J. The Online Disinhibition Effect. CyberPsychology Behav [Internet]. 2004;7(3):321โ6.
Available from: http://www.liebertonline.com/doi/abs/10.1089/1094931041291295
[15] Udris R. Cyberbullying among high school students in Japan: Development and validation of the
Online Disinhibition Scale. Comput Human Behav [Internet]. 2014;41(December 2014):253โ61.
Available from: http://dx.doi.org/10.1016/j.chb.2014.09.036
[16] Barlett CP, Gentile DA, Chew C. Predicting cyberbullying from anonymity. Psychol Pop Media
Cult [Internet]. 2016;5(2):171โ80. Available from:
http://doi.apa.org/getdoi.cfm?doi=10.1037/ppm0000055
[17] Wright MF. The Relationship Between Young Adultsโ Beliefs About Anonymity and
Subsequent Cyber Aggression. Cyberpsychology, Behav Soc Netw [Internet]. 2013;16(12):858โ
62. Available from: http://online.liebertpub.com/doi/abs/10.1089/cyber.2013.0009
[18] Barlett C, Chamberlin K, Witkower Z. Predicting cyberbullying perpetration in emerging adults:
A theoretical test of the Barlett Gentile Cyberbullying Model. Aggress Behav. 2017;43(2):147โ
54.
[19] Lowry PB, Zhang J, Wang C, Siponen M. Why do adults engage in cyberbullying on social
media? An integration of online disinhibition and deindividuation effects with the social structure
and social learning model. Inf Syst Res. 2016;27(4):962โ86.
[20] Lapidot-Lefler N, Barak A. Effects of anonymity, invisibility, and lack of eye-contact on toxic
online disinhibition. Comput Human Behav [Internet]. 2012;28(2):434โ43. Available from:
http://dx.doi.org/10.1016/j.chb.2011.10.014
[21] Wu S, Lin T-C, Shih J-F. Examining the Antecedents of Online Disinhibition. Inf Technol
People. 2017;30(1):189โ209.
[22] Suler J. Contemporary media forum. J Appl Psychoanal Stud. 2005;2(3):184โ188.
[23] Lee H. Behavioral Strategies for Dealing with Flaming in an Online Forum. Sociol Q.
2005;46(2):385โ403.
[24] Ghozali, I., Fuad (2014). Structural Equation Modelling: Teori, Konsep, Aplikasi dengan
Program Lisrel 9.10, Edisi : 4; Badan Penerbit Universitas Diponegoro