Abstract
Explaining motivations for online comments, this study looks to help establish a positive, nonthreatening online comment culture.
- Aricak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Ciplak, S., Yilmaz, N. and Memmedov, C. Cyberbullying among Turkish adolescents. Cyberpsychology and Behavior 11, 3 (2008), 253--261.Google ScholarCross Ref
- Bhat, C.S. Cyber bullying: Overview and strategies for school counsellors, guidance officers, and all school personnel. Australian Journal of Guidance and Counselling 18, 1 (2008), 53--66.Google ScholarCross Ref
- Fleiss, J.L. Statistical Methods for Rates and Proportions. John Wiley & Sons, Inc., New York, 1981.Google Scholar
- Flick, U. An Introduction to Qualitative Research. Sage, Thousand Oaks, CA, 1998.Google Scholar
- Froomkin, M. Flood control on the information ocean: Living with anonymity, digital cash, and distributed databases. Journal of Law and Commerce 15, 2 (1996), 395--453.Google Scholar
- Froomkin, M. Legal issues in anonymity and pseudonymity. The Information Society 15, 2 (1999), 113--127.Google ScholarCross Ref
- Holder, I. The Interpretation of Documents and Material Culture. Sage, Thousand Oaks, CA, 1994.Google Scholar
- Kim, S.K. A study on the restriction of freedom of expression on the Internet. The Journal of Comparative Law 11, 3 (2011), 47--72.Google Scholar
- Korea Internet and Security Agency. Internet Ethical Culture Research, Seoul, Korea (2012); http://isis.kisa.or.kr/board/index.jsp?pageId=040100&bbsId=7&itemId=786Google Scholar
- Kwan, G.C.E. and Skoric, M.M. Facebook bullying: An extension of battles in school. Computers in Human Behavior 29, 1 (2013), 16--25. Google ScholarDigital Library
- Long, G.P. Who are you? Identity and anonymity in cyberspace. University of Pittsburgh Law Review 55, (1993), 1177--1213.Google Scholar
- Marsh, T.D. In Defense of Anonymity of the Internet. Res Gestae (Apr. 2007), 24--32.Google Scholar
- Park, H.J. A critical study on the introduction of the cyber contempt. Anam Law Review 28, 1 (2009), 315-347; http://kiss.kstudy.com/journaL/thesis_name.asp?tname=kiss2002&key=2751961Google Scholar
- Poster, M. Cyber Democracy: Internet and Public Sphere. University of California, Irvine (1995); http://www.hnet.uci.edu/mposter/writings/democ.htmlGoogle Scholar
- Seo, H., Houston, J.B., Knight, L.A.T., Kennedy, E.J., and Inglish, A.B. Teens' social media use and collective action. New Media & Society 16, 6 (2014), 883--902.Google ScholarCross Ref
- Slonje, R., Smith, P.K., and Frisen, A. The Nature of cyberbullying and strategies for prevention. Computers in Human Behavior 29, 1 (2013), 26--32. Google ScholarDigital Library
- Stieglitz, E.J. Anonymity of the Internet: How does it work, who needs it, and what are its policy implications? Cardozo Arts and Entertainment Law Journal 24, 3 (2007), 1395--1424.Google Scholar
- Strauss, A. and Corbin, J. Basics of Qualitative Research: Grounded Theory Procedures and Techniques. Sage, Newbury Park, CA, 1990.Google Scholar
- Strauss, A. and Corbin, J. Basics of Qualitative Coding. Sage, Thousand Oaks, CA, 1998.Google Scholar
- The Guardian. Florida cyberbullying: Girls arrested after suicide of Rebecca Sedwick, 12. The Guardian (Oct. 15, 2013); http://www.theguardian.com/world/2013/oct/15/florida-cyberbullying-rebeccasedwick-two-girls-arrestedGoogle Scholar
- Vandebosch, H. and Cleemput, K.V. Defining cyberbullying: Qualitative research into the perceptions of youngsters. Cyberpsychology and Behavior 11, 4 (2008), 499--503.Google ScholarCross Ref
- Varjas, K., Talley, J., Meyers, J., Parris, L., and Cutts, H. High school students' perceptions of motivations for cyberbullying: An exploratory study. Original Research 11, 3 (2010), 269--273.Google Scholar
Index Terms
- Why people post benevolent and malicious comments online
Recommendations
Third-person perception of online comments
Using online comments posted on news stories as the context, this study aimed to examine the interplay between the third-person perception (TPP) - that people believe media message have a greater effect on changing the attitudes of others compared with ...
A mixed methods approach to the posting of benevolent comments online
Mixed methods: qualitative study with interview and quantitative study with survey.Social exchange theory with benefit-cost assessment.Four benefit factors and one cost factor in the qualitative study.Research model testing with six decision factors in ...
Comments