3 research outputs found

    The Role of Traditional and Online Moral Disengagement on Cyberbullying:Do Externalising Problems Make Any Difference?

    Get PDF
    This study examines the differential role of traditional and online moral disengagement (MD) in relation to cyberbullying. Traditional MD is operationalised as a process operating across contexts, whereas online MD as a contextualised process related to online settings. We hypothesised that they are separate, although correlated, and have different roles depending on externalising tendencies. The sample comprised 856 high school students (mean age = 14.7, S.D. = 1.7; 45.6% females). Regression analyses highlighted that: a) for low externalising adolescents, only online MD was significantly related to cyberbullying; b) for medium externalising adolescents, both online and traditional MD are significant, with the former more strongly associated with cyberbullying; c) for high externalising adolescents, traditional MD is key. Cluster analyses identified five configurations: 1) the Externalising Traditionally Disengaged; 2) the Externalising Not-Disengaged; 3) the Online Disengaged; 4) the All Good; and 5) the Unsuspected. The Online Disengaged has the highest engagement in cyberbullying. The Unsuspected (showing the same low externalising behaviour but significantly higher level of online MD than the All Good) engage in cyberbullying as much as Externalising Traditionally Disengaged and Not-Disengaged. These findings have implications for intervention programmes, underlining the relevance of considering the moral processeses within the online environment

    THE SOLACE OF EXTREMISM: AN EXAMINATION OF EXISTENTIAL MOTIVATION AND THE PERSUASIVENESS OF EXTREME GROUPS

    Get PDF
    This dissertation examines the persuasive appeal of extreme groups under conditions of self-uncertainty. The guiding theoretical framework, uncertainty-identity theory (UIT; Hogg, 2007) argues self-uncertainty motivates people to identify with social groups. In this regard, UIT also considers properties of groups, arguing those high in entitativity (i.e., who tend to be rigid and uncompromising) are extreme in nature, and also more attractive to self-uncertain individuals. Given debate within the literature as to whether liberals or conservatives are more prone to identify with extreme groups (Jost & Napier, 2012), ideological congruence between group (sender) and participant (receiver) is also a factor in this research. The experimental study presented here (N = 423) applies a 2 (group extremism: moderate vs. extreme) × 2 (self-uncertainty: certain vs. uncertain) × 2 (ideological congruence: congruent vs. non-congruent) independent groups design. Altogether, results point to three general conclusions. First, UIT was supported, with self-uncertainty showing a main effect across all outcome variables. Second, self-uncertainty interacted with group extremism, resulting in more favorable attitudes toward positions advocated by an extreme group, as well as more perceived goodwill from the extreme group leaders. Third, ideological congruence between sender and receiver only affected behavioral intentions for liberals and not conservatives. Additionally, the two-way interaction between ideological congruence and group extremism showed greater preference for a moderate congruent group and not an extreme one. Finally, an unexpected main effect for group extremism points to the need for greater scrutiny of source credibility outcomes in future research

    Exploring SME Vulnerabilities to Cyber-criminal Activities Through Employee Behavior and Internet Access

    Get PDF
    Cybercriminal activity may be a relatively new concern to small and medium enterprises (SMEs), but it has the potential to create financial and liability issues for SME organizations. The problem is that SMEs are a future growth target for cybercrime activity as larger corporations begin to address security issues to reduce cybercriminal risks and vulnerabilities. The purpose of this study was to explore a small business owner\u27s knowledge about to the principal elements of decision making for SME investment into cybersecurity education for employees with respect to internet access and employee vulnerabilities. The theoretical framework consisted of the psychological studies by Bandura and Jaishankar that might affect individual decision making in terms of employee risks created through internet use. This qualitative case study involved a participant interview and workplace observations to solicit a small rural business owner\u27s knowledge of cybercriminal exploitation of employees through internet activities such as social media and the potential exploitation of workers by social engineers. Word frequency analysis of the collected data concluded that SME owners are ill equipped to combat employee exploitation of their business through social engineering. Qualitative research is consistent with understanding the decision factors for cost, technical support, and security threat prevention SME organizational leadership use and is the focus of this study as emergent themes. The expectation is that this study will aid in the prevention of social engineering tactics against SME employees and provide a platform for future research for SMEs and cybercriminal activity prevention
    corecore