Table 1. The construct validity and reliability of study
Table 2. The construct validity and reliability of study2
Table 3. The results of study1 (Dependant variable:Malicious comments intention)
Table 4. The results of study2 (Dependant variable: Intervention intension)
References
- P. B. Lowry, J. Zhang, C. Wang & M. Siponen. (2016). Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model. Information Systems Research, 27(4), 962-986. DOI : 10.1287/isre.2016.0671
- Supreme prosecutor's office. (16, April 2015). The official blog of the supreme prosecutors' office. Official Blog of Supreme Prosecutors' Office. http://spogood.tistory.com/263
- J. Hwang, H. Lee, K. Kim, H. Zo & A. P. Ciganek. (2016). Cyber neutralisation and flaming. Behaviour & Information Technology, 35(3), 210-224. DOI : 10.1080/0144929X.2015.1135191
- S. S. Lee & J. S. Park. (2009). Neutralization and Its Effect on Internet Malicious Messages: Testing Three Theories of Delinquency. Korean Journal of Criminoloy, 21(2), 245-266.
- M. Siponen. A. Vance & R. Willison. (2012). New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management, 49(7-8), 334-341. DOI : 10.1016/j.im.2012.06.004
- L. Lazuras. V. Barkoukis. D. Ourda & H. Tsorbatzoudis. (2013). A process model of cyberbullying in adolescence. Computers in Human Behavior, 29(3), 881-887. DOI : 10.1016/j.chb.2012.12.015
- S. C. Caravita. P. Di Blasio & C. Salmivalli. (2009). Unique and interactive effects of empathy and social status on involvement in bullying. Social development, 18(1), 140-163. DOI : 10.1111/j.1467-9507.2008.00465.x
- M. L. Ybarra & K. J. Mitchell. (2004). Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of child Psychology and Psychiatry, 45(7), 1308-1316. DOI : 10.1111/j.1469-7610.2004.00328.x
- M. Alonzo & M. Aiken. (2004). Flaming in electronic communication. Decision Support Systems, 36, 205-213. https://doi.org/10.1016/S0167-9236(02)00190-2
- D. Cho & K. H. Kwon. (2015). The impacts of identity verification and disclosure of social cues on flaming in online user comments. Computers in Human Behavior, 51, 363-372. DOI : 10.1016/j.chb.2015.04.046
- T. H. Van Noorden. G. J. Haselager. A. H. Cillessen & W. M. Bukowski. (2015). Empathy and involvement in bullying in children and adolescents: A systematic review. Journal of youth and adolescence, 44(3), 637-657. DOI : 10.1007/s10964-014-0135-6
- G. M. Sykes & D. Matza. (1957). Techniques of neutralization: A theory of delinquency. American sociological review, 22(6), 664-670. DOI : 10.2307/2089195
- M. Siponen & A. Vance. (2010). Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations, MIS Quarterly, 34(3), 487-502. DOI : 10.2307/25750688
- H. Copes. (2003). Streetlife and the rewards of auto theft. Deviant Behavior, 24(4), 309-332. DOI : 10.1080/713840224
- P. Cromwell & Q. Thurman. (2003). The devil made me do it: Use of neutralizations by shoplifters. Deviant Behavior, 24(6), 535-550. DOI : 10.1080/713840271
- A. N. Doane. M. Pearson & M. L. Kelley. (2014). Predictors of cyberbullying perpetration among college students: An application of the Theory of Reasoned Action. Computers in Human Behavior, 36, 154-162. DOI : 10.1016/j.chb.2014.03.051
- I. Ajzen. (1985). From intentions to actions: A theory of planned behavior. In Action control (pp. 11-39). Springer, Berlin, Heidelberg.
- D. Olweus. (1993). Bullying at school: What we know and what we can do. Blackwell Publishers.
- A. N. Doane. M. L. Kelley, E. S. Chiang & M. A. Padilla. (2013). Development of the cyberbullying experiences survey. Emerging Adulthood, 1(3), 207-218. DOI : 10.1177/2167696813479584
- C. Salmivalli & M. Voeten. (2004). Connections between attitudes, group norms, and behaviour in bullying situations. International Journal of Behavioral Development, 28(3), 246-258. DOI : 10.1080/01650250344000488
- G. Steffgen. A. König. J. Pfetsch & A. Melzer. (2011). Are cyberbullies less empathic? Adolescents' cyberbullying behavior and empathic responsiveness. Cyberpsychology, Behavior, and Social Networking, 14(11), 643-648. DOI : 10.1089/cyber.2010.0445
- P. M. Podsakoff, S. B. MacKenzie, J. Y. Lee & N. P. Podsakoff. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of applied psychology, 88(5), 879. https://doi.org/10.1037/0021-9010.88.5.879
- C. Fornell & D. F. Larcker. (1981). Structural equation models with unobservable variables and measurement error: Algebra and statistics. Journal of marketing research, 18(3), 382-388. DOI : 10.2307/3150980
- J. J. Woo, E, M. Kwak & H. J. Lee. (2018). The convergence study of smartphone overuse on cyberbullying: Focusing on mediating effects of aggression. Journal of the Korea Convergence Society, 9(5), 61-67. https://doi.org/10.15207/JKCS.2018.9.5.061
- W. H. Moon, M. J. Kown & Y. H. Kim. (2016). Converging Influence of Empathy and Prejudice against Mental Illness on Discriminatory Behavior toward the Mentally Illness Patients in the Nursing Students. Journal of the Korea Convergence Society, 7(6), 81-88. https://doi.org/10.15207/JKCS.2016.7.6.081
- S. Y. Park. (2017). Convergence study on the influence of dental hygiene student supporting awareness in their empathy about elderly. Journal of Convergence for Information Technology, 7(5), 25-30. https://doi.org/10.22156/CS4SMB.2017.7.5.025