中山管理評論

  期刊全文閱覽

中山管理評論  2016/3

第24卷第1期  p.41-75

DOI:10.6160/2016.03.02


題目
整合使用者心理特性、SIDE 及遏止理論探討網路使用者去抑制化行為
Applying User's Psychological Characteristics, SIDE and Containment to Explore the Antecedents of Online Disinhibition
(115_M577fb06085440_Full.pdf 695KB)

作者
王貴英、施柔帆/明新科技大學資訊管理系、國立中山大學資訊管理學系
Kuei-Ing Wang*, Jou-Fan Shih/

Department of Information Management, Minghsin University of Science and Technology; Department of Information Management, National Sun Yat-sen University


摘要(中文)

本研究以遏止理論(Containment)與社會認定去個人化行為(SIDE)為調節變項建構去抑制化行為影響因素的研究模型來探討:(1)網路的使用者心理認知特性因素(匿名性、無形性、非同步性、自我投入、分離的想像認知、低特權認知)對網路使用者去抑制化行為的影響(2)內部遏止因素(道德義務)與外部遏止因素(嚇阻理論)是否會對網路使用者去抑制化行為有調節效果(3)SIDE 理論組織規範強度是否對網路使用者去抑制化行為有調節效果。本研究從某大學隨機抽取五個系500位學生發放問卷,回收問卷中,有效問卷計488份。資料分析顯示在未加入調節變數前,網際網路使用者心理特性對去抑制化行為有顯著影響。加入調節變數後,本研究提出之三個調節變數SIDE:團體規範、內部遏止:道德議題與外部遏止:嚇阻理論,均有顯著調節效果。網路使用者對團體規範的認同強度對使用者心理特質與去抑制化行為之關係具有顯著正向調節效果,而內部遏止:道德強度與外部遏止:懲罰強度則有顯著反向調節作用。本研究結果可解釋為網路使用者會因網路的匿名性、無形性或變換身份不被發現而產生網路去抑制化行為,但若網路上的去抑制化行為不為所屬群體組織認同,或使用者認為網路上的去抑制化行為是會對別人造成傷害,或認為去抑制化行為是不禮貌的行為,或認知到網路上不當言論行為會受到及時嚴厲懲罰時,網路去抑制化行為的強度會減弱。目前教育單位全面提倡網路e 化,網路普及化確實帶給學校很多便利性,卻也相對帶來一些困擾。建議學校當局加強學生網路公民規範教育,讓網路上的不當行為不被同儕認可,可降低網路上去抑制化行為。同時亦應讓學生們瞭解即使在網路使用者的個人資料與特質不易為他人發現,仍應與一般生活上一樣維持應有的禮儀。

(115_M577fb06085440_Abs.pdf(檔案不存在))

關鍵字(中文)

網際網路使用者心理特性、去個人化的社會認定模式、遏止理論、網路去抑制化行為


摘要(英文)

In this study we constructed a comprehensive model integrating diverse factors by synthesizing different perspectives. We then proceeded to examine and integrate the following important aspects :(1) the internet psychological characteristics (dissociative anonymity, invisibility, asynchronicity, solipsistic introjection, dissociative imagination and minimization of authority); (2) the social identity model of deindividuation effects (SIDE) in which group norm; and (3) the containment theory in which punishment and moral issues in this research model, whereas containment as well as SIDE are treated as moderating roles of toxic disinhibition. Survey and expert interview methodologies were applied to test the research model, and four hypotheses were developed in this study. Five hundred questionnaires were collected from university students, among which 488 responses were valid while 12 were not. The result of this study supported all four hypotheses proposed by this study. Internet psychological characteristics positively influenced the behaviors of toxic disinhibition. Punishment, moral intensity negatively moderated the relation between Internet psychological characteristics and the toxic disinhibition behaviors online while social norms had positively moderating effect on the relation between Internet psychological characteristics and the toxic disinhibition behaviors online. Internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the disinhibition behaviors will be punished certainly or severely, resulting in expulsion by the group they belong to, the disinhibition behaviors will be weakened. Thus, we proposed that to prevent the toxic disinhibition behaviors occurring on the Internet especially for the university students, it is important to advocate relative laws, norms and ethics of Internet behaviors on campus.

(115_M577fb06085440_Abs.pdf(檔案不存在))

關鍵字(英文)

The Social Identity Model of Deindividuation Effects, Containment Theory, Internet Psychological Characteristics, Toxic Disinhibition


政策與管理意涵

With the widespread use of technology, people rely on computers and electronic devices more and more. Online communication frameworks are showing heavy usage and rapid growth over the last decade. One phenomenon that has been shown to be characteristic of online communication participants is the online disinhibition effect, defined as a lowering of behavioral inhibitions in the online environment. Many of the human behaviors displayed online (including violence, incitement, flaming, and verbal attacks, on the one hand, and self-disclosure, kindness, and the dispensing of help and advice, on the other) may be attributed to the online disinhibition effect. Although there are many policies to avert illegal behaviors in cyberspace, many people still think that they are safe behind the computer. We use social identity model of deindividuation effects (SIDE) as this study’s social dimension, containment theory as this study’s environmental factors, and studied these social and environmental factors as moderators to observe whether these factors would affect toxic disinhibition or not? This study showed that group norms positively moderated the relationship between psychological characteristics and toxic disinhibition, while moral issues including moral obligations, moral intensity and punishment negatively moderated the relation between psychological characteristics and toxic disinhibition. Internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the disinhibition behavior will be punished certainly or severely, and/or not recognized by the group they are belonging, the disinhibition behavior will be weakened. Additionally, we also find that the opinion of people who are important to individuals leads to toxic disinhibition so it is important that family, social and schools to participate online ethical education program to increase the inner containment of individuals which we proved it can validly reduce uninhibited behavior. Furthermore, they can influence each other not to do uninhibited behavior. Thus, this study proposes that to prevent the toxic disinhibition behaviors occur on internet environment, especially for the university students, it is important to advocate relative laws, norms and ethics of internet behavior in campus. However, we found that outer containment significantly influence toxic disinhibition, managers of website and BBS might explore their policies of outer containment such as the penalty clauses for the violation behavior or violation reporting system in the future.


參考文獻

Anderson, C. L. and Agarwal, R., 2010, “Safe Computing: A Multimethod Emperical
Examination of Home Computer User Security Behavioral Intentions,” MIS
Quarterly, Vol. 34, No. 3, 613-643.
Bagozzi, R. P. and Dholakia, U. M., 2002, “Intentional social action in virtual
communities,” Journal of Interactive Marketing, Vol. 16, No. 2, 2-21.
Barak, A., Boniel-Nissim, M., and Suler, J., 2008, “Fostering empowerment in online
support groups,” Computers in Human Behavior, Vol. 24, No. 5, 1867-1883.
Bargh, J. A., McKenna, K. Y. A., and Fitzsimons, G. M., 2002, “Can You See the Real Me?
Activation and Expression of the “True Self” on the Internet,” Journal of Social
Issues, Vol. 58, No. 1, 33-48.
Beck, L. and Ajzen, I., 1991, “Predicting Dishonest Actions Using the Theory of Planned
Behavior,” Journal of Research in Personality, Vol. 25, No. 3, 285-301.
Berkowitz, A. D., 2004, “An overview of the social norms approach” in Lederman, L. and
Stewart, L. (eds.), Changing the culture of college drinking, First Edition,
Cresskill, NJ: Hampton Press, 193-214.
Campbell, D. T. and Fiske, D. W., 1959, “Convergent and discriminant validation by the
multitrait-multimethod matrix,” Psychological Bulletin, Vol. 56, No. 2, 81-105.
Chin, W. W., Gopal, A., and Salisbury, W. D., 1997, “Advancing the theory of adaptive
structuration: The development of a scale to measure faithfulness of appropriation,”
Information Systems Research, Vol. 8, No. 4, 342-367.
Dholakia, U. M. and Bagozzi, R. P., 2004, “Motivational antecedents, constituents and
consequents of virtual communityidentity” in Godar, S. and Pixie-Ferris, S. (eds.),
Virtual and collaborative teams: Process, technologies, and practice, First
Edition, Hershey, PA: IDEA, 252-267.
Diener, E., 1980, “Deindividuation: The absence of self-awareness and self-regulation in
group members” in Paulus, P. B. (ed.), Psychology of group influence, First
Edition, Hillsdale, NJ: Lawrence Erlbaum Associates, 209-242.
Festinger, L., Pepitone, A., and Newcomb, T., 1952, “Some consequences of deindividuation in a group,” Journal of Abnormal and Social Psychology, Vol. 47,
No. 2, 382-389.
Fishbein, M. and Ajzen, I., 1975, Belief Attitude, Intention and Behavior: An
Introduction to Theory and Research, 1st, Reading, MA: Addison-Wesley.
Fornell, C. and Larcker, D. F., 1981, “Evaluating structural equation models with
unobservable variables and measurement error,” Journal of Marketing Research,
Vol. 18, No. 1, 39-50.
Gorsuch, R. L. and Ortberg, J., 1983, “Moral Obligation and Attitudes: Their Relation to Behavioral Intentions,” Journal of Personality and Social Psychology, Vol. 44,
No. 5, 1025-1028.
Grayson, P. A. and Schwartz, V., 2000, “Commentary on “Contrasting case studies of
frequent Internet use:” Is It Pathological or Adaptive?” Journal of College Student
Psychotherapy, Vol. 14, No. 4, 19-22.
Hair, J. F., Black, W. C., Babin, B. J., and Anderson, R. E., 2010, Multivariate data
analysis, 7th, Upper Saddle River, NJ: Prentice Hall.
Joinson, A., l998, “Causes and implications of disinhibited behavior on the Net” in
Gackenbach, J. (ed.), Psychology of the Internet, First Edition, New York:
Academic Press, 43-60.
Joinson, A. N., 2007, “Disinhibition and the Internet” in Gackenbach, J. (ed.), Psychology
and the Internet: Intrapersonal, interpersonal, and transpersonal implications,
Second Edition, San Diego, CA: Academic Press, 75-92.
Jones, T. M., 1991, “Ethical decision making by individuals in organisations: an issue
contingent model,” Academy of Management Review, Vol. 16, No. 2, 366-395.
Keser, C. and Winden, Frans van, 2000, “Conditional Cooperation and Voluntary
Contributions to Public Goods,” Scandinavian Journal of Economics, Vol. 102,
No. 1, 23-39.
Kiesler, S., Siegal, J., and Mcgire, T. W., 1984, “Social psychological aspects of computer
mediated communication,” American Psychologist, Vol. 39, No. 1, 1123-1134.
Kiesler, S., Zubrow, D., Moses, A. M., and Geller, V., 1985, “Affect in computer-meditated
communication: An experiment in synchronous terminal-to-terminal discussion,”
Human-Computer Interaction, Vol. 1, No. 1, 77-104.
Klepper, S. and Nagin, D., 1989, “The Deterrent Effect Of Perceived Certainty And
Severity Of Punishment Revisited,” Criminology, Vol. 27, No. 4, 721-746.
Lam, S. P., 1999, “Predicting Intentions to Conserve Water From the Theory of Planned
Behavior, Perceived Moral Obligation, and Perceived Water Right,” Journal of
Applied Social Psychology, Vol. 29, No. 5, 1058-1071.
Lapidot-Lefler, N. and Barak, A., 2012, “Effects of anonymity, invisibility, and lack of eyecontact on toxic online disinhibition,” Computers in Human Behavior, Vol. 28,
No. 2, 434-443.
Lea, M., O'Shea, T., Fung, P., and Spears, R., 1992, “Flaming in computer-mediated
communication: observations, explanations, implications” in Lea, M. (ed.),
Contexts of Computer-mediated Communication, First Edition, New York:
Harvester Wheatsheaf, 89-112.
Lee, E. J., 2007, “Deindividuation Effects on Group Polarization in Computer-Mediated
Communication: The Role of Group Identification, Public-Self-Awareness, and
Perceived Argument Quality,” Journal of Communication, Vol. 57, No. 2, 385-403.
Leung, L., 2003, “Impacts of net-generation attributes, seductive properties of the Internet, and gratifications-obtained on Internet use,” Telematics and Informatics, Vol. 20,
No. 2, 107-129.
Mael, F. and Ashforth, B. E., 1992, “Alumni and their alma mater: A partial test of
thereformulated odel of organizational identification,” Journal of Organizational
Behavior, Vol. 13, No. 2, 103-123.
McKenna, K. Y. A. and Bargh, J. A., 2000, “Plan 9 from cyberspace: The implications of
the Internet for personality and social psychology,” Personality and Social
Psychology Review, Vol. 4, No. 1, 57-75.
Nunnally, J. C., 1978, Psychometric theory, 1st, New York: McGraw-Hill.
Peace, A., Galletta, D., and Thong, J., 2003, “Software piracy in the workplace: A model
and empirical test,” Journal of Management Information Systems, Vol. 20, No. 1,
153-177.
Pomazal, R. J. and Jaccard, J. J., 1976, “An informational approach to altruistic behavior,”
Journal of Personality and Social Psychology, Vol. 33, No. 3, 317-326.
Porter, M. E. and Kramer, M. R., 2006, “Strategy-Society:The Link Between Competitive
Advantage and Corporate Social Responsibility,” Harvard Business Review, Vol.
84, No. 12, 78-92.
Postmes, T. and Spears, R., 1998, “Deindividuation and Antinormative Behavior: A MetaAnalysis,” Psychological Bulletin, Vol. 123, No. 3, 238-259.
Postmes, T., Spears, R., and Lea, M., 2000, “The formation of group norms in computermediated communication,” Human Communication Research, Vol. 26, No. 3,
341-371.
Reckless, W. C., 1961, “A new theory of delinquency and crime,” Federal Probation, Vol.
25, No. 1, 42-46.
Reckless, W. C., 1973, The crime problem, 5th, Englewood Cliffs, NJ: Prentice Hall.
Reicher, S., Spears, R., and Postmes, T., 1995, “A social identity model of deindividuation
phenomena,” European Review of Social Psychology, Vol. 6, No. 1, 161-198.
Sassenberg, K. and Postmes, T., 2002, “Cognitive and strategic processes in small groups:
effects of anonymity of the self and anonymity of the group on social influence,”
British Journal of Social Psychology, Vol. 41, No. 3, 463-480.
Schouten, A. P., 2007, Adolescents’ online self-disclosure and self-presentation, Ph. D.
Thesis, Amsterdam School of Communication Research.
Schouten, A. P., Valkenburg, P. M., and Peter, J., 2007, “Precursors and underlying
processes of adolescents' online self-disclosure: Developing and testing an
“Internet-attribute-perception” model,” Media Psychology, Vol. 10, No. 2, 292-315.
Schwartz, S. H. and Tessler, R. C., 1972, “A test of a model for reducing measured attitudebehavior inconsistencies,” Journal of Personality and Social Psychology, Vol. 24,
No. 2, 225-236.
Short, J., Williams, E., and Christie, B., 1976, The social psychology of telecommunications, 1st, New York: John Wiley & Sons.
Silberman, M., 1976, “Toward a Theory of Criminal Deterrence,” American Sociological
Review, Vol. 41, No. 3, 442-461.
Sproull, L. and Kiesler, S., 1986, “Reducing social context cues: Electronic mail in
organizational communications,” Management Science, Vol. 62, No. 2, 1492-1512.
Stritzke, W. G. K., Nguyen, A., and Durkin, K., 2004, “Shyness and computer-mediated
communication: A self-presentational theory perspective,” Media Psychology, Vol.
6, No. 1, 1-22.
Suler, J. R., 2004, “The online disinhibition effect,” CyberPsychology and Behavior, Vol.
7, No. 5, 321-326.
Thompson, W. E. and Dodder, R. A., 1983, “Juvenile Delinquency Explained?: A Test of
Containment Theory,” Youth & Society, Vol. 15, No. 2, 171-194.
Turkle, S., 1984, The second self: Computers and the human spirit, 20th, Cambridge,
MA: MIT Press.
Turkle, S., 1994, “Constructions and reconstructions of self in virtual reality: Playing in the
MUDs. Mind,” Culture, and Activity, Vol. 1, No. 3, 158-167.
Van Dijk, E. and Wilke, H., 1997, “Is It Mine or Is It Ours? Framing Property Rights and
Decision Making in Social Dilemmas,” Organizational Behavior and Human
Decision Processes, Vol. 71, No. 2, 195-209.
Zimbardo, P. G., 1977, Shyness: What is it and what to do about it?, 1st, London: Pan
Books.
Zimbardo, P. G., Arnold, W., Levine, J. D., and Bond, R., 1969, “The human choice:
Individuation, reason, and order vs. deindividuation, impulse and chaos” in Arnold,
W. J. and Levine, D. (eds.), Nebraska symposium on motivation, First Edition,
Lincoln, NE: University of Nebraska Press, 237-307.
Zimring, F. E. and Hawkin, G. J., 1973, Deterrence: the Legal Threat in Crime Control,
1
st, Chicago: The University of Chicago Press.