首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 39 毫秒
1.
We examined cyber incivility in the workplace of Singapore and also examined its impact on employee job satisfaction, organizational commitment, quit intention, and workplace deviance. Data were collected from 192 employees. Results of the survey showed that male supervisors engaged in active forms of cyber incivility while female supervisors engaged in passive cyber incivility. Regression analyses also showed that cyber incivility was negatively related to employees’ job satisfaction and organizational commitment. Employees who experienced cyber incivility were also more likely to quit their jobs or engaged in deviant behavior against their organization. Thus, cyber incivility has negative consequences on both individuals and organizations. Consequently, it is important that firms educate employees and have appropriate policies to discourage cyber incivility.  相似文献   

2.
The present study tested Protection Motivation Theory (PMT) as an explanation of electronic communication safe behavioral intentions and behaviors and cyberbullying victimization. We recruited 577 college students who completed a battery of surveys examining PMT-based constructs and cyberbullying victimization. We found that higher perceived susceptibility to cyberbullying victimization was associated with lower electronic communication safe behavioral intentions, higher electronic communication risky behaviors, and higher cyberbullying victimization. In addition, higher perceived severity of cyberbullying victimization was associated with higher electronic communication safe behavioral intentions and lower cyberbullying victimization. Furthermore, higher response efficacy and self-efficacy regarding electronic communication safe behaviors were predictive of higher electronic communication safe behavioral intentions. The PMT-based model accounted for over 30% of the variability in cyberbullying victimization. PMT constructs may be promising targets for interventions designed to decrease the incidence of cyberbullying victimization.  相似文献   

3.
As debate continues over the definition of cyberbullying, an important endeavor is identifying aggression–prevention efforts likely to impact reasons for cyberbullying and the broader phenomenon of cyber aggression. No empirical research has examined whether there are useful prevention-related distinctions between perpetrators of cyberbullying vs. perpetrators of brief cyber aggression. Using an online survey, this study explored perpetrators’ beliefs, emotions, and behaviors related to 72 brief vs. 128 extended episodes of cyber aggression. The most pronounced difference was that more extended-episode perpetrators reported having been hurt by something that happened in cyberspace. One pronounced similarity was that if there had been a news story about the perpetrator doing it, 79% or more of both groups said they would not have felt proud; whereas 63% or more said they would have felt ashamed. Among both groups, 76% or more did not agree with the assertion that there should be no offline consequence for online behavior. The findings support prevention efforts intended to do the following: encourage respect and empathy, facilitate adaptive communication and decision-making skills, promote socially appropriate ways of coping with anger and conflict, and increase knowledge and application of relevant rules and laws.  相似文献   

4.
We examine employees’ perceptions of communication problems in the workplace and their active communication behavioral responses when multiple information communication technologies (ICTs) are available for use. Through the lens of the situational theory of publics, we shed light on how employees adapt to increasing communication demands. We uncovered active technology-mediated behavior such as information gaining, action, and social interaction seeking, and their association with perceived risk (i.e., message, information and action). Findings suggest that technology-mediated communication behaviors are not only enabled by the use of ICTs but behavior also involves appropriate structuring of single and multiple ICTs to manage problems encountered during communication.  相似文献   

5.
Research is accumulating to confirm adverse consequences of cyberbullying. Less is known about the perceptions, expectations and reactions of those involved as a function of their different roles (e.g., as bullies, victims, bully-victims) and how this relates to their experiences of traditional bullying. We examined whether cyberbullies' beliefs about the impact of their actions reflects the impact as reported by cybervictims themselves. We tested also whether the emotional reactions to cyberbullying differed depending upon whether the victim was or was not also a victim of traditional bullying behaviours. Participants were 1353 Spanish adolescents. Approximately 8% reported experiences of cyberbullying (compared to 12% reporting experiences of traditional bullying). Cyberbullies believed that their victims would experience more discomfort than cybervictims actually reported experiencing. Those who had experienced victimization in both traditional and cyber contexts evaluated cyberbullying as having greater negative impact than did those who had experienced victimization only in cyber contexts. Perceptions differed according to role and the context(s) in which bullying has been experienced. Findings are discussed in relation to the ways in which technologically delivered aggression may differ from traditional bullying.  相似文献   

6.
This study aims to understand how individuals’ perceptions of the severity of cyberbullying they endure affects their experience with the Information and Communication Technology (ICT) medium through which cyberbullying occurs. To this end, it proposes a theoretical model based on Transactional Theory of Stress and Coping and Expectation-Confirmation Theory. A survey-based study involving 115 cyberbullying victims is employed to empirically validate the proposed model. Results indicate that victims’ perceptions of the severity of a cyberbullying episode negatively impact their satisfaction with ICT. Implications of these results for academics and practitioners are discussed and directions for future research are outlined.  相似文献   

7.
Being aware of the adolescents perceptions' on cyberbullying is one of the main factors that determine the real prevalence of this phenomenon and allows the adequacy of intervention programs. The objectives pursued in this study were: (a) to determine the perceptions adolescents have about cyberbullying and cyber abuse; and (b) to analyse the influence of experiences of cybervictimization and cyberaggression on the perception of cyberbullying and its various forms. The sample consisted of 1753 adolescents of 12–16 years in age. The instrument used to acquire the data was a questionnaire. The results reveal that, of the 5 identifying criteria of cyberbullying, Spanish adolescents have recourse to just three: intent to hurt, imbalance of power, and advertising. Also, this study shows that verbal and visual aggressions, far from being interpreted as forms of cyberbullying, are considered to be mechanisms that foster and facilitate their communication and interaction. Although the victims and aggressors allude to the same set of identifying criteria, the aggressors emphasize the imbalance of power criterion as against the intent to hurt. For the victims, the intentionality being the primary factor, followed by advertising, while the imbalance of power is relegated to a background role.  相似文献   

8.
The popularity of online social networks has created massive social communication among their users and this leads to a huge amount of user-generated communication data. In recent years, Cyberbullying has grown into a major problem with the growth of online communication and social media. Cyberbullying has been recognized recently as a serious national health issue among online social network users and developing an efficient detection model holds tremendous practical significance. In this paper, we have proposed set of unique features derived from Twitter; network, activity, user, and tweet content, based on these feature, we developed a supervised machine learning solution for detecting cyberbullying in the Twitter. An evaluation demonstrates that our developed detection model based on our proposed features, achieved results with an area under the receiver-operating characteristic curve of 0.943 and an f-measure of 0.936. These results indicate that the proposed model based on these features provides a feasible solution to detecting Cyberbullying in online communication environments. Finally, we compare result obtained using our proposed features with the result obtained from two baseline features. The comparison outcomes show the significance of the proposed features.  相似文献   

9.
The current study attempts to examine the relationship between traditional bullyvictimization and cyberbullying behavior based on General Strain Theory perspectives. Offline bullyvictimization can create negative emotional strains. This negative strain combined with the anonymity in cyber space may lead youths to be engaged in cyberbullying behavior as the externalized response to the strain. Using longitudinal Korean National Youth Survey data, this study empirically tested the above theoretical explanation. First, this study found the declining trend of cyberbullying engagement among Korean youths. Secondly, consistent with GST, offline bully-victimization was significantly related to the cyberbullying engagement. Youths who were victims of traditional bullying showed a higher tendency of becoming cyberbullying assaulters with externalizing their strain in cyberspace.  相似文献   

10.

In the face of increasingly prominent cyber security issues, the organization of cyber team analysts has become crucial to thwart cyber threats. Few studies have examined the functioning of the team and the interaction between individuals in a cyber defense context and how the context influences team adaptation. The present study investigates team cognition in a cyber defense context and in particular the nature of task- or team-centered communication among analysts during a cyber defense simulation exercise. Results indicate that markers of situation assessment and shared mental models are both strategically present and linked. Nevertheless, the frequency of these markers varies depending on the quantity and quality of problems encountered; in particular, variations in social support behaviors are observed. Decreasing social support behaviors during high level activities suggests the adaptation of social behaviors depending on the threats and attacks on the system. Theoretical and practical implications are discussed in terms of theories and potential consequences for strategic adaptation and team resilience.

  相似文献   

11.
Less is known about cyberbullying behaviors in college populations because studies on this topic traditionally have focused on adolescent populations, have not measured correlates of this behavior within college samples, or have methodological weaknesses limiting their findings. By using a more comprehensive measure of cyberbullying behaviors and examining what is associated with its occurrence, the current study aims to extend the knowledge about cyberbullying behaviors in college. Results showed that approximately 52% of college students report engaging in cyberbullying behaviors and indicated that victims of CBB and individuals high on a subclinical measure of psychopathy were more likely to report having engaged in CBB. It was also found that victims of CBB, men, and individuals high on subclinical psychopathy engaged in a wider range of cyberbullying behaviors. Age was the only factor associated with a decrease in CBB.  相似文献   

12.
Work overload or work pressure may undermine workers' intrinsic motivation. In the present research, we tested the conditions under which this may (not) occur, including the perceived opportunity to blend on-site and off-site working through the effective use of computers and modern information and communication technology. Our sample consisted of 657 workers (51% female) representing a variety of industries. As hypothesized, it is not high job demands per se, but high demands in combination with a high need for autonomy and a lack of perceived opportunities for blended working that undermines intrinsic work motivation. When workers high in need for autonomy perceived opportunities for blended working, their intrinsic work motivation was not negatively affected by increasing job demands. This main finding suggests that, particularly for workers high in need for autonomy, the perceived opportunity for blended working is an effective, contemporary resource to cope with the increasing job demands typically observed in today's workplace. Theoretically, these findings contribute to the refinement and extension of influential demands-resource models and Person-Job Fit theory. Practically, our findings may show managers how to effectively keep workers intrinsically motivated and productive in their jobs when job demands are high.  相似文献   

13.
Recent years have witnessed the increasing popularity of mobile and networking devices, as well as social networking sites, where users engage in a variety of activities in the cyberspace on a daily and real-time basis. While such systems provide tremendous convenience and enjoyment for users, malicious usages, such as bullying, cruelty, extremism, and toxicity behaviors, also grow noticeably, and impose significant threats to individuals and communities. In this paper, we review computational approaches for cyberbullying and cyberviolence detection, in order to understand two major factors: 1) What are the defining features of online bullying users, and 2) How to detect cyberbullying and cyberviolence. To achieve the goal, we propose a user-activities-content (UAC) triangular view, which defines that users in the cyberspace are centered around the UAC triangle to carry out activities and generate content. Accordingly, we categorize cyberbully features into three main categories: 1) User centered features, 2) Content centered features, and 3) Activity centered features. After that, we review methods for cyberbully detection, by taking supervised, unsupervised, transfer learning, and deep learning, etc., into consideration. The UAC centered view provides a coherent and complete summary about features and characteristics of online users (their activities), approaches to detect bullying users (and malicious content), and helps defend cyberspace from bullying and toxicity.   相似文献   

14.
Cyber incivility is defined as communicative behavior exhibited in computer mediated interactions that violate workplace norms of mutual respect. This study examines the impact of personality traits on cyber incivility via work email. Specifically, by drawing on the abridged big-five dimensional circumplex (AB5C) model of personality and the extant literature on cyber incivility, this study proposes a personality model of cyber incivility and posits that the personality traits of extraversion and emotional stability can be linked to cyber incivility more closely when each of them is accompanied by the personality trait of conscientiousness than when without it. We test our model by conducting a two-phased online survey of 265 full-time employees in the country of India. Results indicate that the relationships of extraversion and emotional stability with cyber incivility are negatively moderated by conscientiousness. Our findings contribute to the knowledge base of both personality and cyber incivility by understanding their linkages.  相似文献   

15.
This paper is a tutorial on how to model hybrid systems as hybrid programs in differential dynamic logic and how to prove complex properties about these complex hybrid systems in KeYmaera, an automatic and interactive formal verification tool for hybrid systems. Hybrid systems can model highly nontrivial controllers of physical plants, whose behaviors are often safety critical such as trains, cars, airplanes, or medical devices. Formal methods can help design systems that work correctly. This paper illustrates how KeYmaera can be used to systematically model, validate, and verify hybrid systems. We develop tutorial examples that illustrate challenges arising in many real-world systems. In the context of this tutorial, we identify the impact that modeling decisions have on the suitability of the model for verification purposes. We show how the interactive features of KeYmaera can help users understand their system designs better and prove complex properties for which the automatic prover of KeYmaera still takes an impractical amount of time. We hope this paper is a helpful resource for designers of embedded and cyber–physical systems and that it illustrates how to master common practical challenges in hybrid systems verification.  相似文献   

16.
Economically complex cyberattacks   总被引:1,自引:0,他引:1  
Most people working in cyber security recognize that the interconnections and complexities of our economy can have a huge effect on the destructiveness of cyber attacks. They refer casually to "network effects," "spillover effects" or "knock-on effects." Yet there is little understanding of how such effects actually work, what conditions are necessary to create them, or how to quantify their consequences. People working in cyber security also generally acknowledge that combinations of cyber attacks could be much more destructive than individual attacks. Yet there is little understanding of exactly why this is the case or what the principles would be for combining attacks to produce maximum destruction. These two sets of problems are actually the same. It is by taking account of the interconnections and complexities in our economy that cyber-attackers could devise combinations of attacks to cause greater destruction. To understand how this would work, we need to look at three features of our economy that are responsible for much of its structural complexity: redundancies, interdependencies, and near monopolies. Then, as we examine these features, we need to see how each of them would prompt a different sort of attack strategy.  相似文献   

17.
This study examines how organizational workers improve their perceived job performance through the use of Mobile Enterprise Systems (MES), while also investigating the impact of perceived organizational agility and location independence on technology acceptance of MES. This study also tests the moderating role of task characteristics (task significance and feedback) on the relationship between MES usage and perceived job performance. Based on the extant technology acceptance model (TAM), we proposed an extended TAM and conducted a large-scale survey among organizational workers who use MES in their workplace across industries. Our findings suggest that both positive attitude toward MES and a high level of habitual MES usage are positively associated with perceived job performance, and that task characteristics positively moderate the relationship between habitual usage (attitude toward MES) and perceived job performance. More importantly, we also found that organizational agility is positively associated with both perceived ease of use and perceived usefulness, while location independence is positively associated with perceived ease of use. The present findings provide us with a deeper understanding of how organizational workers utilize MES and how they improve their perceived job performance through the use of MES. Based on these findings, we discuss further implications and limitations.  相似文献   

18.
While celebrity cyberbullying has increased, previous research mainly focuses on bystanders’ role in general cyberbullying, and the motives for bystander pro-celebrity cyberbullying (BPCB) remain under-investigated. Drawing on the social exchange theory, we investigate BPCB on social media, specifically how publicity and network mutuality affect bystanders’ cost–benefit assessment of, and consequent pro-cyberbullying intention towards, celebrities. The results show that publicity and network mutuality influence bystanders’ perceived susceptibility to retaliation and expected social capital gains, with the former reducing BPCB intention and the latter strengthening it. This work contributes to the research on cyberbullying and offers guidance in combating celebrity cyberbullying.  相似文献   

19.
The present study examines the role of violence tendecy on cyberbullying perpetrations and their victims. Turkish adolescents [N = 286, 167 girls (58,4%) and 119 boys (41,6%)] aged 15–18 years [mean age of 17.6 years (df:0.78)] were recruited from different high school types [101 (35.4%) of the participants were students in vocational high school, 88 (30.7%) anatolian high school and 97 (33.9%) public high school]. Participants completed Revised Cyber Bullying Inventory (RCBI, Topçu & Erdur-Baker, 2010) and Violence Tendency Scale (VTS, Haskan & Yıldırım, 2012). Collected data were analyzed Pearson correlation coefficients and simple regression. Pearson correlations revealed that violence tendency was positively related to cyberbullying perpetration (r = 0.344, p < 0.01). Also, violence tendency was positively related to cyber victimization (r = 0.242, p < 0.01). Also simple regressions revealed that violence tendency was significant individual predictors both cyberbullying perpetration and cyber victimization.  相似文献   

20.
Wearables paired with data analytics and machine learning algorithms that measure physiological (and other) parameters are slowly finding their way into our workplace. Several studies have reported positive effects from using such “physiolytics” devices and purported the notion that it may lead to significant workplace safety improvements or to increased awareness among employees concerning unhealthy work practices and other job‐related health and well‐being issues. At the same time, physiolytics may cause an overdependency on technology and create new constraints on privacy, individuality, and personal freedom. While it is easy to understand why organizations are implementing physiolytics, it remains unclear what employees think about using wearables at their workplace. Using an affordance theory lens, we, therefore, explore the mental models of employees who are faced with the introduction of physiolytics as part of corporate wellness or security programs. We identify five distinct user types each of which characterizes a specific viewpoint on physiolytics at the workplace: the freedom loving, the individualist, the cynical, the tech independent, and the balancer. Our findings allow for better understanding the wider implications and possible user responses to the introduction of wearable technologies in occupational settings and address the need for opening up the “user black box” in IS use research.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号