2 research outputs found

    Perpetrating Cyber Dating Abuse: A Brief Report on the Role of Aggression, Romantic Jealousy and Gender

    Get PDF
    There is increasing evidence that the use of elec-tronic communication technology (ECT) is being integrated into romantic relationships, which can be used as a medium to control a romantic partner. Most research focuses on the vic-tims of cyber dating abuse, however, we focused on the factors that predict perpetration of cyber dating abuse. We explored whether aggression (verbal aggression, physical aggression, anger and hostility), romantic jealousy (emotional, cognitive and behavioral jealousy), and gender predicted perpetration of cyber dating abuse (n = 189). We found that hostility, behav-ioral jealousy and gender significantly predicted perpetration of cyber dating abuse. The findings of this study contribute to our understanding of the psychological factors that drive cyber dating abuse in romantic relationships

    An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism

    No full text
    Scholars are increasingly calling for a deeper understanding of cyberharassment (CH) with the goal of devising policies, procedures, and technologies to mitigate it. Accordingly, we conducted CH research that (1) integrated social learning theory (SLT) and self-control theory (SCT); (2) empirically studied this model with two contrasting samples, experienced cyberharassers and less experienced cyberharassers; and (3) conducted post hoc tests to tease out the differences between the two samples. We show that for less experienced cyberharassers, CH is largely a social-psychological-technological phenomenon; whereas, for experienced cyberharassers, CH is primarily a psychological-technological phenomenon. Our study makes a threefold contribution: (1) it shows the value of integrating two theories in a holistic and parsimonious manner to explain CH; (2) it shows that SCT alone is a more relevant framework for experienced cyberharassers, whereas a combination of SCT and SLT better explains less experienced cyberharassers; and (3) it reveals that the role of technology in fostering CH is crucial, regardless of the sample. The differential, yet consistent, findings demonstrate that addressing CH is contingent upon not only identifying theoretical approaches but also identifying the particular samples to which these theoretical approaches will be more suitable. Of several implications for practice, the most important may be that anonymity, asynchronicity, and lack of monitoring are the technology choices that foster CH, and thus these should be mitigated in designing social media and other communication technologies
    corecore