An Integrative Theory Addressing Cyberharassment in Light of Technology-Based Opportunism

Journal of Management Information Systems (JMIS),vol. 36(4), pp. 1142-1178 (2019)

78 Pages Posted: 5 Aug 2019 Last revised: 28 Oct 2019

See all articles by Paul Benjamin Lowry

Paul Benjamin Lowry

Virginia Tech - Pamplin College of Business

Jun Zhang

School of Management, University of Science and Technology of China

Gregory D Moody

University of Nevada, Las Vegas - College of Business

Sutirtha Chatterjee

University of Nevada, Las Vegas - Center for Entrepreneurship

Chuang Wang

City University of Hong Kong (CityU) - Department of Information Systems

Tailai Wu

City University of Hong Kong (CityU) - Department of Information Systems

Date Written: July 30, 2019

Abstract

Scholars are increasingly calling for a deeper understanding of cyberharassment (CH) with the goal of devising policies, procedures, and technologies to mitigate it. Accordingly, we conducted CH research that (1) integrated social learning theory (SLT) and self-control theory (SCT); (2) empirically studied this model with two contrasting samples, experienced cyberharassers and less experienced cyberharassers; and (3) conducted post hoc tests to tease out the differences between the two samples. We show that for less experienced cyberharassers, CH is largely a social-psychological-technological phenomenon whereas, for experienced cyberharassers, CH is primarily a psychological-technological phenomenon. Our study makes a threefold contribution: (1) it shows the value of integrating two theories in a holistic and parsimonious manner to explain CH; (2) it shows that SCT alone is a more relevant framework for experienced cyberharassers, whereas a combination of SCT and SLT better explains less experienced cyberharassers; and (3) it reveals that the role of technology in fostering CH is crucial, regardless of the sample. The differential, yet consistent, findings demonstrate that addressing CH is contingent upon not only identifying theoretical approaches but also identifying the particular samples to which these theoretical approaches will be more suitable. Of several implications for practice, the most important may be that anonymity, asynchronicity, and lack of monitoring are the technology choices that foster CH, and thus these should be mitigated in designing social media and other communication technologies.

Keywords: Cyberharassment (CH), deviance, self-control theory (SCT), social learning theory (SLT), technology-based opportunism (TBO), social-psychological-technological (S-P-T) phenomenon

Suggested Citation

Lowry, Paul Benjamin and Zhang, Jun and Moody, Gregory Daniel and Chatterjee, Sutirtha and Wang, Chuang and Wu, Tailai, An Integrative Theory Addressing Cyberharassment in Light of Technology-Based Opportunism (July 30, 2019). Journal of Management Information Systems (JMIS),vol. 36(4), pp. 1142-1178 (2019), Available at SSRN: https://ssrn.com/abstract=3430081

Paul Benjamin Lowry (Contact Author)

Virginia Tech - Pamplin College of Business ( email )

1016 Pamplin Hall
Blacksburg, VA 24061
United States

Jun Zhang

School of Management, University of Science and Technology of China ( email )

Hefei, Anhui
China

Gregory Daniel Moody

University of Nevada, Las Vegas - College of Business ( email )

4505 S. Maryland Parkway
Las Vegas, NV 89154
United States

HOME PAGE: http://https://faculty.unlv.edu/wpmu/gmoody/

Sutirtha Chatterjee

University of Nevada, Las Vegas - Center for Entrepreneurship ( email )

4505 S Maryland Parkway
Las Vegas, NV 89154
United States

Chuang Wang

City University of Hong Kong (CityU) - Department of Information Systems ( email )

83 Tat Chee Avenue
Kowloon
Hong Kong

Tailai Wu

City University of Hong Kong (CityU) - Department of Information Systems ( email )

83 Tat Chee Avenue
Kowloon
Hong Kong

Do you have negative results from your research you’d like to share?

Paper statistics

Downloads
74
Abstract Views
596
Rank
580,905
PlumX Metrics