Responsive image
博碩士論文 etd-0629120-151223 詳細資訊
Title page for etd-0629120-151223
論文名稱
Title
影響網路霸凌行為之因素-以去個體化與遏止理論為基礎來探討
Factors Affecting Cyberbullying Behavior - Based on Deindividuation and Containment Theory
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
66
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2020-06-19
繳交日期
Date of Submission
2020-07-29
關鍵字
Keywords
遏止理論、從眾效應、低自我控制理論、網路霸凌、去個體化
cyberbullying, low self-control theory, deindividuation, containment theory, bandwagon effect
統計
Statistics
本論文已被瀏覽 6108 次,被下載 91
The thesis/dissertation has been browsed 6108 times, has been downloaded 91 times.
中文摘要
現今的人際關係交流不在侷限於面對面,而是發展到了網際網路上社群媒體的交流。正因為在社群媒體上的互動日益增加,進而改變了霸凌的型態,隨著傳統霸凌延伸到了網路霸凌。再加上,網路社群媒體匿名的特性而使得霸凌者更加肆無忌憚攻擊他人使得網路霸凌的情況跟著加劇。有鑑於網路霸凌事件日益嚴重,造成了許多社會悲劇事件,因此本研究主要在探討影響網路霸凌行為之因素,是什麼因素讓網路使用者在鍵盤留下負面的評論。因此,本研究以去個體化、遏止理論、從眾效應和低自我控制理論為基礎,建構一個完整的研究模型來解釋網路霸凌的行為因素,並且實際驗證。此外,與其他相關研究不同的是,本研究將低自我控制當作調節變量,以衡量不同人格特質的網路使用者對網路霸凌的程度是否有不同。
本研究於網路社群回收了269份有效樣本以驗證本研究模型,其結果支持我們所做的推論,去個體化、遏止理論和從眾效應都會影響網路使用者是否做出網路霸淩行為的因素,並且在低自我控制的調節下,較喜愛尋求刺激的人相對下會忽略遏止的力量而有較高機率做出網路霸凌行為。
本研究的結果,整合了過去幾個較常被拿來討論網路霸凌行為的觀點。
Abstract
Today's interpersonal communication is not limited to face-to-face communication but has developed into social media on the Internet. It is precisely because of the increasing interaction on social media that the traditional form of bullying has now extended to online bullying. The anonymity of online social media has allowed bullies to be less scrupulous about attacking others, which has intensified the issue of online bullying. Given the many social tragedies caused by this issue, and in view of the increasing severity of cyberbullying incidents, this study explores the factors that affect cyberbullying behavior and cause Internet users to leave negative comments via the keyboard. Based on deindividuation, containment theory, the bandwagon effect, and low self-control theory, we construct and actually verify a complete research model to explain the behavioral factors of cyberbullying. Unlike other related studies, this study uses low self-control as a regulating variable to measure the extent to which Internet users with different personality traits engage in cyberbullying.
We collected 269 valid samples from the online community to validate the research model. The results support our inferences. Deindividuation, the factors in containment theory, and the bandwagon effect all affect whether Internet users perform cyberbullying behaviors. Under the regulation of the factors comprised in low self-control theory, those who prefer to seek stimulation are found to be immune to the power of deterrence and to have a higher probability of performing cyberbullying behaviors.
As a result, our study integrates several views that have been used to discuss cyberbullying behavior in the past.
目次 Table of Contents
論文審定書 i
誌謝 ii
中文摘要 iii
Abstract iv
Contents v
List of Figures vii
Chapter 1. Introduction 1
1.1 Research background 1
1.2 Research motivation 2
1.3 Research purpose 4
Chapter 2. Literature review 6
2.1 Cyberbullying 6
2.2 Deindividuation 7
2.3 Containment Theory 9
2.4 Bandwagon Effect 10
2.5 Low Self-Control Theory 12
Chapter 3 Research Model and Methodology 13
3.1 Research model 13
3.1.1 Deindividuation 14
3.1.2 Containment Theory 15
3.1.3 Bandwagon Effect 16
3.1.4 Low Self-Control Theory 17
3.2 Operational Definition 20
3.3 Research method 23
3.3.1 Research object 23
3.3.2 Questionnaire design 23
Chapter 4 Data Analysis 24
4.1 Sampling and Data Collection 24
4.2 Demographic Analysis 24
4.3 Reliability and Validity 27
4.4 Collinearity Analysis 32
4.5 Common method bias 33
4.6 Hypothesis Testing 35
4.7 Discussion 38
4.7.1 Deindividuation, Containment theory and Bandwagon effect are significantly related 39
4.7.2 Low self-control theory has poor moderate effectiveness 40
Chapter 5 Conclusions and Implications 42
5.1 Conclusions 42
5.2 Academic and Practical Implications 43
5.3 Limitations and Suggestions for Future Study 44
Reference 45
Appendix 49
參考文獻 References
Akers, R. L., Sellers, C. S., Jennings, W.G. (2017), ‘Criminological theories: Introduction, evaluation, and application’, New York: Oxford University Press.
Allison, Kimberley R., and Kay Bussey. (2016), ‘Cyber-bystanding in context: A review of the literature on witnesses' responses to cyberbullying’, Children and Youth Services Review,65, pp.183-194.
Bass, Frank M. (1969), ‘A new product growth for model consumer durables’, Management science ,15.5, pp.215-227.
Campbell, Marilyn A. (2005), ‘cyber bullying: An old problem in a new guise?’, Journal of Psychologists and Counsellors in Schools,15.1, pp.68-76.
Chin, W. W. (1998). ‘The partial least squares approach to structural equation modeling’, Modern methods for business research, 295(2), 295-336.
Corcoran, Lucie, Conor Mc Guckin, and Garry Prentice. (2015), ‘Cyberbullying or cyber aggression ?: A review of existing definitions of cyber-based peer-to-peer aggression’, Societies ,5.2, pp. 245-255.
D’Arcy, J and Hovav, A. (2009), ‘Does one size fit all? Examining the differential. effects of IS security countermeasures’, Journal of Business Ethics, 89, 1, pp.59-71.
Deindividuation.(2017),’https://www.britannica.com/topic/deindividuation’, HUMAN.BEHAVIOUR
Fornell, C., & Larcker, D. F. (1981), ‘Evaluating structural equation models with unobservable variables and measurement error’, Journal of marketing research, 18(1), 39-50.
Gottfredson, Michael R., and Travis Hirschi.(1990), ‘A general theory of crime’ Stanford University Press.
Graham,P.(1995), ‘bullying at school-what we know and what we can do -olweus,D’, pp.154-154.
Grasmick, H. G., Tittle, C. R., Bursik Jr, R. J., & Arneklev, B. J. (1993), ‘Testing the core empirical implications of Gottfredson and Hirschi's general theory of crime’, Journal of research in crime and delinquency, 30(1), pp.5-29.
Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011), ‘PLS-SEM: Indeed a silver bullet’, Journal of Marketing theory and Practice, 19(2), 139-152.
Halpern, D., & Gibbs, J. (2013), ‘Social media as a catalyst for online deliberation? Exploring the affordances of Facebook and YouTube for political expression’, Computers in Human Behavior, 29(3), pp.159-1168.
Hauhart, Robert C. (2017), ‘Containment Theory’, The Encyclopedia of Juvenile Delinquency and Justice.
Hinduja, Sameer, and Justin W.Patchin. (2008), ‘Cyberbullying: An exploratory. analysis of factors related to offending and victimization’, Deviant behavior, 29.2, pp.129-156.
Hinduja, Sameer. (2006), ‘A critical examination of the digital music phenomenon’, Critical Criminology, 14.4, pp.387-409.
Hirschi, Travis, and Michael Gottfredson.(1983), ‘Age and the explanation of crime’ American journal of sociology ,89.3 ,pp.552-584.
Huang, Y.-Y., & Chou, C. (2010) [details removed for peer review].Computer and Human Be
Kennedy, Jay P. (2015), ‘Losing Control: A Test of Containment Theory and Ethical Decision Making’ ,International Journal of Criminal Justice Sciences, 10.1
Kowalski, Robin M., Chad A. Morgan, and Susan P. Limber. (2012), ‘Traditional bullying as a potential warning sign of cyberbullying’, School Psychology International, 33.5, pp.505-519.
Le Bon, G. (1895, trans. 1947), ‘The Crowd: a study of the popular mind’, London:Ernest Benn.
Levine, John M., and Michael A. (2010), ‘Hogg. Encyclopedia of group processes. and intergroup relations’, Vol. 1.
Lowry, P. B., Zhang, J., Wang, C., & Siponen, M. (2016), ‘Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model’, Information Systems Research, 27(4), pp.962-986.
Lowry, Paul Benjamin, Gregory D. Moody, and Sutirtha Chatterjee. (2017), ‘Using IT.design to prevent cyberbullying’, Journal of management information systems,34.3, pp.863-901.
Marsh, Catherine. (1985), ‘Back on the bandwagon: The effect of opinion polls on. public opinion’ , British Journal of Political Science,15.1,pp.51-74.
Nunnally, J. (1978). Psychometric methods. 464–465.
Olweus, D. (1993), ‘Acoso escolar,“bullying”, en las escuelas: hechos e intervenciones’,Centro de investigación para la Promoción de la Salud, Universidad de Bergen, Noruega, 2.
Pierce, Walter M. (1940), ‘Climbing on the Bandwagon’ Public Opinion Quarterly ,4.2, pp.241-243.
Pinsonneault, A. and Heppel, N. (1998), ‘Anonymity in group support systems research: A new conceptualization, measure, and contingency framework’ ,Journal of Management Information Systems, 14, 3, pp.89-108.
Podsakoff, P. M., & Organ, D. W. (1986). Self-reports in organizational research: Problems and prospects. Journal of management, 12(4), 531-544.
Pornari, Chrisa D., and Jane Wood.(2010),’ Peer and cyber aggression in secondary school students: The role of moral disengagement, hostile attribution bias, and outcome expectancies’ Aggressive Behavior: Official Journal of the International Society for Research on Aggression, 36.2, pp.81-94.
Rainie, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., & Dabbish, L. (2013), ‘Anonymity, privacy, and security online’ ,Pew Research Center, 5.
Reckless, Walter C. (1961), ‘The Crime Problem. New York: Appleton-Century-Crofts’ ,Inc., pp.78.
Schmitt‐Beck, Rüdiger.(2015), ‘Bandwagon effect’ , The international encyclopedia. of political communication, pp.1-5.
Shen, X. P., Xu, D., Lin, X., & Fu, X. (2014), ‘The Adoption of Digital Information Products: an Integration of Network effect and bandwagon effect’ ,In PACIS ,pp.136.
Shih, Tsung Jen.(2017), ‘Current Situation, Causes and Impact of Taiwan Youth Online Bullying’, Chinese Journal of Communications, (32), 203-240.
Shih, Jou-fan.(2014), ‘Examining the Antecedents of Online Disinhibition - Internet Psychological Characteristics, Social Influence, and Containment Theory’, 中山大學資訊管理學系研究所學位論文, pp.1-82.
Simola,S.(2015),‘Understanding Moral Courage Through a Feminist and Developmental Ethic of Care’, Journal of Business Ethics,130, 1, pp.29-44.
Simon, Herbert A.(1954), ‘Bandwagon and underdog effects and the possibility of election predictions’ ,Public Opinion Quarterly ,18.3 ,pp.245-253.
Slonje, Robert, and Peter K. Smith. (2008), ‘Cyberbullying: Another main type of bullying?’ Scandinavian journal of psychology ,49.2,pp.147-154.
Snyder, P., Doerfler, P., Kanich, C., & McCoy, D. (2017,), ‘Fifteen minutes of unwanted fame: Detecting and characterizing doxing’, In Proceedings of the 2017 Internet Measurement Conference, ACM, pp. 432-444.
Suler, John. (2004), ‘The online disinhibition effect’ ,Cyberpsychology & behavior, 7.3,pp.321-326.
Thompson, William E., and Richard A. Dodder. (1983), ‘Juvenile delinquency explained? A test of containment theory’ ,Youth & Society ,15.2,pp.71-194.
UNICEF.(2019), ’More than a third of young people in 30 countries report being a. victim of online bullying’
Valasik, Matthew.(2014), ‘Self‐Control Theory’ ,The Encyclopedia of Criminology and Criminal Justice, pp.1-5.
Vannucci, M., Nocentini, A., Mazzoni, G., & Menesini, E. (2012), ‘Recalling unpresented hostile words: False memories predictors of traditional and cyberbullying’, European Journal of Developmental Psychology, 9(2), pp.182-194.
Wang, Jing, Ronald J. Iannotti, and Tonja R. Nansel.(2009), ‘School bullying among adolescents in the United States: Physical, verbal, relational, and cyber’ ,Journal of Adolescent health, 45.4, pp.368-375.
Winter, Stephan, Caroline Brückner, and Nicole C. Krämer.(2015), ‘They came, they liked, they commented: Social influence on Facebook news channels’, Cyberpsychology, Behavior, and Social Networking ,18.8, pp.431-436.
The Child Welfare League Foundation.(2015),‘Cyberbullying survey’
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:自定論文開放時間 user define
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus: 已公開 available


紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code