Journal ArticleDOI
An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism
TLDR
It is shown that anonymity, asynchronicity, and lack of monitoring are the technology choices that foster CH, and thus these should be mitigated in designing social media and other communication technologies and thus the role of technology in fostering CH is crucial, regardless of the sample.Abstract:
Scholars are increasingly calling for a deeper understanding of cyberharassment (CH) with the goal of devising policies, procedures, and technologies to mitigate it. Accordingly, we conducted CH re...read more
Citations
More filters
Journal ArticleDOI
Towards a unified theory of toxic behavior in video games
TL;DR: The results of this study indicate that online disinhibition best explains toxic behavior, whereby toxic behavior victimization, attitude, and behavioral control also play an important role.
Journal ArticleDOI
Eyes wide open: The role of situational information security awareness for security-related behaviour
Lennart Jaeger,Andreas Eckhardt +1 more
TL;DR: Situational information security awareness increases perceived threat and perceived coping efficacy and, ultimately, actual behavioural responses to phishing attacks, and shows that past experience with phishing and a security warning increase awareness, while phishing emails' contextual relevance and misplaced salience decrease awareness.
Journal ArticleDOI
Chain of Values: Examining the Economic Impacts of Blockchain on the Value-Added Tax System
TL;DR: In this article, the authors discuss the benefits of blockchain technology for interorganizational activities by improving data integrity, increasing transaction transparency, and decreasing transaction costs, and discuss the impact of blockchain on inter-organizational transactions.
Journal ArticleDOI
Online disinhibition: conceptualization, measurement, and implications for online deviant behavior
TL;DR: This work provides a rich conceptualization of an online disinhibition instrument that can serve as a springboard for future work to understand online deviant behaviors and adds to the repository of rigorous research scales in this area.
References
More filters
Journal ArticleDOI
Cutoff criteria for fit indexes in covariance structure analysis : Conventional criteria versus new alternatives
Li-tze Hu,Peter M. Bentler +1 more
TL;DR: In this article, the adequacy of the conventional cutoff criteria and several new alternatives for various fit indexes used to evaluate model fit in practice were examined, and the results suggest that, for the ML method, a cutoff value close to.95 for TLI, BL89, CFI, RNI, and G...
Book
Principles and Practice of Structural Equation Modeling
TL;DR: The book aims to provide the skills necessary to begin to use SEM in research and to interpret and critique the use of method by others.
Journal ArticleDOI
Multivariate Data Analysis
TL;DR: In this paper, a six-step framework for organizing and discussing multivariate data analysis techniques with flowcharts for each is presented, focusing on the use of each technique, rather than its mathematical derivation.
Journal ArticleDOI
Multivariate data analysis
TL;DR: This chapter discusses Structural Equation Modeling: An Introduction, and SEM: Confirmatory Factor Analysis, and Testing A Structural Model, which shows how the model can be modified for different data types.
Book
Structural Equations with Latent Variables
TL;DR: The General Model, Part I: Latent Variable and Measurement Models Combined, Part II: Extensions, Part III: Extensions and Part IV: Confirmatory Factor Analysis as discussed by the authors.