Podcast
Questions and Answers
Which of the following best describes the difference between cyberbullying and cyber aggression?
Which of the following best describes the difference between cyberbullying and cyber aggression?
- Cyberbullying includes an imbalance of power and repetition, while cyber aggression does not require these elements. (correct)
- Cyber aggression is carried out by a group, while cyberbullying is carried out by an individual.
- Cyberbullying involves intentional harmful actions perpetrated via technology, while cyber aggression involves only unintentional harm.
- Cyberbullying is limited to direct interactions, while cyber aggression occurs on multiple media platforms.
What is the primary function of 'Butler Lies' in the context of texting, according to the material?
What is the primary function of 'Butler Lies' in the context of texting, according to the material?
- To deceive others about one’s true intentions.
- To avoid confrontation in uncomfortable social situations.
- To manipulate interpersonal interactions for personal gain.
- To cope with social demands for availability and maintain relationships. (correct)
According to the material, how does spending time online and engaging in risky behaviors correlate with cyberbullying?
According to the material, how does spending time online and engaging in risky behaviors correlate with cyberbullying?
- It presents a large risk factor for cyberbullying victimization. (correct)
- It has no significant impact on cyberbullying risk.
- It is only a risk factor for adults, not for adolescents or children.
- It decreases the risk of cyberbullying victimization.
What is the key difference between 'direct cyberbullying' and 'indirect cyberbullying'?
What is the key difference between 'direct cyberbullying' and 'indirect cyberbullying'?
Which of the following is an example of 'astroturfing' as described in the material?
Which of the following is an example of 'astroturfing' as described in the material?
According to the material, what is the 'empowering effect' in the context of Computer-Mediated Communication (CMC)?
According to the material, what is the 'empowering effect' in the context of Computer-Mediated Communication (CMC)?
What does the 'compensatory internet use theory' suggest about digital addiction?
What does the 'compensatory internet use theory' suggest about digital addiction?
According to the material, how does personality relate to cyberbullying? More specifically, how does it relate to the likelihood of an individual being a perpetrator of cyberbullying?
According to the material, how does personality relate to cyberbullying? More specifically, how does it relate to the likelihood of an individual being a perpetrator of cyberbullying?
In the context of privacy management tactics, what does 'content based' refer to?
In the context of privacy management tactics, what does 'content based' refer to?
What is the 'extended real-life hypothesis' regarding online social network profiles?
What is the 'extended real-life hypothesis' regarding online social network profiles?
Flashcards
Phishing
Phishing
Malicious websites enticing users to reveal personal information.
Email spam
Email spam
Unsolicited commercial messages, sometimes hosting malware or phishing links.
Astroturfing
Astroturfing
Using fake online accounts to give the impression of popularity.
Butler Lies
Butler Lies
Managing availability for interpersonal contact.
Signup and view all the flashcards
Extended real-life hypothesis
Extended real-life hypothesis
SNS profiles should accurately reflect users' personalities.
Signup and view all the flashcards
Idealized virtual-identity hypothesis
Idealized virtual-identity hypothesis
Users create embellished versions of self to impress.
Signup and view all the flashcards
Cyberbullying
Cyberbullying
Aggressive act using electronic contact repeatedly against a defenseless victim.
Signup and view all the flashcards
Cyber aggression
Cyber aggression
Intentional harmful actions via technology, lacking power imbalance/repetition.
Signup and view all the flashcards
Cyber incivility
Cyber incivility
Rude online behavior via technology.
Signup and view all the flashcards
Direct cyberbullying
Direct cyberbullying
Aggressive acts limited to perpetrator and victim.
Signup and view all the flashcardsStudy Notes
- Phishing: Malicious websites trick users into revealing personal information.
- Email spam: Unsolicited commercial messages that sometimes contain malware or phishing links.
- Astroturfing: The practice of using fake online accounts to create the impression that an organization, individual, or idea is more popular than it actually is.
- This includes leaving comments that are more favorable to one side and bestowing likes.
Butler Lies
- Meant to manage one's availability for current or future interpersonal contact, similar to how a butler would.
- For example, saying you are on the way when you have not left your house yet.
- Utilized in texting as a way to cope with the social demands for availability that texting imposes, and are told to maintain relationships.
Extended Real-Life Hypothesis
- SNS profiles should accurately reflect users' personalities.
- Users do not want to appear deceptive to audiences who know them well.
Idealized Virtual-Identity Hypothesis
- Users should take advantage of composition time and editing to create embellished versions of themselves to impress audiences.
Cyberbullying
- An aggressive, intentional act carried out by a group or individual via electronic means, repeatedly and over time, against a victim who cannot defend themselves.
- Cyber aggression: Intentional harmful actions via technology, without the element of power imbalance and repetition.
- Cyber incivility: Rude behavior via Information and Communication Technologies like email or text messages.
- Direct cyberbullying: Aggressive acts limited to the perpetrator and victim.
- Indirect cyberbullying: Occurs on multiple media platforms, potentially involving a much larger audience than just the perpetrator and victim.
- Negative outcomes of cyberbullying: Include higher anxiety, depression, loneliness, greater suicidal thoughts, lower self-esteem, and poor academic performance.
Technology Use & Cyberbullying
- Type of technology used by individuals of a specific age group.
- Elementary students: video games.
- Adolescents: SNSs.
- Adults: Massive multiplayer online games.
- Victimization correlates with time spent online, especially for social purposes and risky behaviors, posing a large risk.
Personality, Beliefs & Cyberbullying Victimization
- Youth who feel they have more peer support are less likely to be cyberbullied.
Parental Behaviors to Prevent Cyberbullying
- Parental warmth, family support, positive parent-adolescent relationships, parental rules and monitoring, and collaborative strategies.
Personality, Beliefs & Cyberbully Perpetrators
- Low self-esteem, low cognitive or affective empathy, internalizing behaviors, low self-control, and high levels of thrill-seeking, and impulsivity.
- Dark-side traits: Maladaptive traits such as psychopathy, Machiavellianism, and narcissism.
Types of Social Media
- Broadcast self-media: Users broadcast updates and posts (e.g., Twitter).
- Targeted relationship media: Two-way connection, for building and maintaining relationships (e.g., Facebook, WeChat).
- Collaboration media: Content-based and task-oriented, for collaboration, knowledge building, problem-solving, and reputation (e.g., Wikipedia).
- Creative outlets: Content sharing broadcast platforms, users create and share content (e.g., YouTube).
Social Media Platforms
- Include blogs, microblogs, SNSs, business networks, enterprise social networks, collaborative projects, forums, picture sharing, video sharing, product/service reviews, social bookmarks, virtual social worlds, social gaming, crowdsourcing.
Motivations for Using Social Media
- Need for information.
- Need for entertainment.
- Need for social connection.
- Need for strengthening ego.
- Need for self-actualization.
Flow
- A psychological state of feeling cognitively efficient, motivated, and happy simultaneously.
Privacy Management Tactics
- Network Based: Users decide who to friend or follow, filtering their network.
- Platform based: Choosing privacy settings to control who sees posts (friends only).
- Content based: Being cautious about the information posted.
- Profile based: Less common, uses multiple accounts (personal, professional, fun).
Privacy Boundaries
- Relationship: Regulates who is in one's network and the appropriate interactions for the relationship type.
- Network: Regulates access to one's social connections and interactions.
- Territorial: Regulates content for personal consumption and what's available in interactional spaces.
- Disclosure: Regulates personal and co-owned information disclosed to one's social network.
- Interactional: Regulates potential interaction with those in and out of the social network.
Coping Strategies for Maintaining Privacy on Social Media
- Filtering: Selecting who is accepted into online social circle for relational boundaries.
- Ignoring: Ignoring posts and skimming through information.
- Blocking: Extreme approach for interaction boundary management compared to filtering and ignoring, leads to lower levels of reported usage.
- Withdrawal: Deleting account, censoring posts, or avoiding confrontation.
- Aggression: Defensive mechanism used when the intention is to create interactions that may be confrontational, seek revents or get attention.
- Compliance: Giving into pressures and adjusting one's interpersonal boundary preferences for others.
- Compromise: Managing social media boundary violation by communicating with the other person involved and finding a resolution, mainly with close friends via email, phone, or message.
Equalization Phenomenon
- Predicts reduced participation rate between group members of different status in text-based CMC.
Empowering Effect
- CMC lowers social expectations and risks of social sanctions, stimulating participation and reducing apprehension in revealing an authentic self, leading to increased participation.
Findings: Cultural Differences, CMC/Face-to-Face Communication, & Participation Rate
- Effects were significant for communication media and expert culture, qualified by a significant interaction effect.
- Significant differences in participation rates between American and Chinese experts in FtF groups, with approximately equal participation in CMC groups.
- Results show moderation effect of the communication medium in equalizing participation rate between Chinese and American members in CMC settings.
Findings: Cultural Differences, CMC/Face-to-Face Communication, & Perceived Confidence
- Main effect of the expert's culture was significant, with American experts judged as more confident overall than Chinese experts.
- Main effect of communication medium was not significant, with a significant interaction between medium and expert's culture.
- Chinese experts were perceived significantly less confident than American experts in FtF settings; no significant difference was detected in CMC settings.
Findings: Cultural Differences, CMC/Face-to-Face Communication, & Expertise Recognition
- Main effect of expert's culture and main effect of communication medium were not significant.
- There was a significant interaction effect between the communication medium and expert's culture on expertise recognition.
- Chinese experts were underestimated compared to American experts in FtF groups, but not in CMC groups.
- Although American and Chinese experts had similar levels of actual expertise, their expertise was not recognized equally in FtF groups, but this difference was leveled out in CMC groups.
Findings: Cultural Differences, CMC/Face-to-Face Communication, & Perceived Influence
- Medium effect was not significant.
- Main effect of expert's culture was significant, with the difference qualified by a significant interaction effect between medium and expert's culture.
- Chinese experts were perceived as less influential than American experts in FtF groups.
- Chinese American experts were judged equally influential in CMC groups.
- Neither participation rate nor perceived confidence had a significant effect on expertise recognition.
- Participation rate did not influence perceived influence.
- Perceived confidence had a significant effect on perceived influence.
Compensatory Internet Use Theory
- Suggests that one motive for digital addiction is to use digital tools as a coping mechanism to relieve underlying social interaction issues.
- Allows prediction of digital addiction because people may turn to online IRs to compensate for a lack of offline social interaction.
Digital Addiction & Interpersonal Relationships
- IR was negatively related to the severity of DA.
- Positive association between DA and online relationships indicating individuals exhibit more DA problems when they have stronger online relationships.
- Associations between DA and other offline relationships were significant but negative for peer, parent-child, and teacher-student relationships.
- People have fewer DA problems when they have more offline relationships.
- The strength of the effect of DA and IRs was not significantly or was weakly affected by offline relationships.
- The relationship with online relationships was positively and strongly moderated.
- The association between DA and IRs was stronger in emerging adolescents than in adults.
- The association between DA and IRs in emerging males was stronger than in females.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.