2017
DOI: 10.1080/07421222.2017.1373012
|View full text |Cite
|
Sign up to set email alerts
|

Using IT Design to Prevent Cyberbullying

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

4
32
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 72 publications
(46 citation statements)
references
References 150 publications
4
32
0
1
Order By: Relevance
“…The proposed PSR scores can contribute to not only supporting consumers to move their information from the shortterm memory to the long-term memory by quantifying and visualizing the PSRs, but also by improving the identification of consumers' tendencies and abilities. CBT discusses two powers [6]. When one power is stronger than the other, the stronger power can attack or hurt the weaker one.…”
Section: Md4: the Model Of Psr Scoresmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed PSR scores can contribute to not only supporting consumers to move their information from the shortterm memory to the long-term memory by quantifying and visualizing the PSRs, but also by improving the identification of consumers' tendencies and abilities. CBT discusses two powers [6]. When one power is stronger than the other, the stronger power can attack or hurt the weaker one.…”
Section: Md4: the Model Of Psr Scoresmentioning
confidence: 99%
“…We determine the PSR scores by collectively considering consumers' IoT information types, weight impact factors, and personal capabilities. Furthermore, we will propose a new design theory for personal PSR assessment that can be used to explain how consumers internally make a disclosure decision [6]. Because a design science research (DSR) concentrates on developing solutions to problems [7], a DSR approach is suitable for the development of our proposed PSR scores and theory.…”
Section: Introductionmentioning
confidence: 99%
“…Social media sites also provide the identity management mechanisms via the security and privacy controls, but the mechanisms fall short of protecting users from broader identity issues on social media. Such lack of control leads to a myriad of issues such as loss of personal information, conflicting or fake identities, abusive behavior, fraud, harassment, and bullying, among others (Whitley et al., ; Lowry et al., ). There is limited work to assess the value gaps between what users want from online identity management and what the social media platforms offer through current technical security and privacy controls. Recent research notes the relevance of values to online identity (Seltsikas & O'Keefe, ; Kim et al., ; Briggs & Thomas, ).…”
Section: Background Literaturementioning
confidence: 99%
“…Social media sites also provide the identity management mechanisms via the security and privacy controls, but the mechanisms fall short of protecting users from broader identity issues on social media. Such lack of control leads to a myriad of issues such as loss of personal information, conflicting or fake identities, abusive behavior, fraud, harassment, and bullying, among others (Whitley et al., ; Lowry et al., ).…”
Section: Background Literaturementioning
confidence: 99%
See 1 more Smart Citation