IS

Wang, Chuang

Topic Weight Topic Terms
0.179 social networks influence presence interactions network media networking diffusion implications individuals people results exchange paper
0.165 model research data results study using theoretical influence findings theory support implications test collected tested
0.101 media social content user-generated ugc blogs study online traditional popularity suggest different discourse news making

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Lowry, Paul Benjamin 1 Siponen, Mikko 1 Zhang, Jun 1
anonymity 1 cyberbullying 1 cyberstalking 1 cyberharassment 1
disinhibition 1 deindividuation 1 differential association 1 differential reinforcement 1
definition 1 imitation 1 neutralization 1 social media 1
social media cyberbullying model 1 SMCBM 1 social structure and social learning model 1 SSSL model 1
social learning 1 social learning theory 1 SLT 1

Articles (1)

Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model (Information Systems Research, 2016)
Authors: Abstract:
    The dramatic increase in social media use has challenged traditional social structures and shifted a great deal of interpersonal communication from the physical world to cyberspace. Much of this social media communication has been positive: Anyone around the world who has access to the Internet has the potential to communicate with and attract a massive global audience. Unfortunately, such ubiquitous communication can be also used for negative purposes such as cyberbullying, which is the focus of this paper. Previous research on cyberbullying, consisting of 135 articles, has improved the understanding of why individualsÑmostly adolescentsÑengage in cyberbullying. However, our study addresses two key gaps in this literature: (1) how the information technology (IT) artifact fosters/inhibits cyberbullying and (2) why people are socialized to engage in cyberbullying. To address these gaps, we propose the social media cyberbullying model (SMCBM), which modifies Akers' [Akers RL (2011) Social Learning and Social Structure: A General Theory of Crime and Deviance, 2nd ed. (Transaction Publishers, New Brunswick, NJ)] social structure and social learning model. Because Akers developed his model for crimes in the physical world, we add a rich conceptualization of anonymity composed of five subconstructs as a key social media structural variable in the SMCBM to account for the IT artifact. We tested the SMCBM with 1,003 adults who have engaged in cyberbullying. The empirical findings support the SMCBM. Heavy social media use combined with anonymity facilitates the social learning process of cyberbullying in social media in a way that fosters cyberbullying. Our results indicate new directions for cyberbullying research and implications for anticyberbullying practices.