skip to main content
research-article
Free Access

Why people post benevolent and malicious comments online

Published:23 October 2015Publication History
Skip Abstract Section

Abstract

Explaining motivations for online comments, this study looks to help establish a positive, nonthreatening online comment culture.

References

  1. Aricak, T., Siyahhan, S., Uzunhasanoglu, A., Saribeyoglu, S., Ciplak, S., Yilmaz, N. and Memmedov, C. Cyberbullying among Turkish adolescents. Cyberpsychology and Behavior 11, 3 (2008), 253--261.Google ScholarGoogle ScholarCross RefCross Ref
  2. Bhat, C.S. Cyber bullying: Overview and strategies for school counsellors, guidance officers, and all school personnel. Australian Journal of Guidance and Counselling 18, 1 (2008), 53--66.Google ScholarGoogle ScholarCross RefCross Ref
  3. Fleiss, J.L. Statistical Methods for Rates and Proportions. John Wiley & Sons, Inc., New York, 1981.Google ScholarGoogle Scholar
  4. Flick, U. An Introduction to Qualitative Research. Sage, Thousand Oaks, CA, 1998.Google ScholarGoogle Scholar
  5. Froomkin, M. Flood control on the information ocean: Living with anonymity, digital cash, and distributed databases. Journal of Law and Commerce 15, 2 (1996), 395--453.Google ScholarGoogle Scholar
  6. Froomkin, M. Legal issues in anonymity and pseudonymity. The Information Society 15, 2 (1999), 113--127.Google ScholarGoogle ScholarCross RefCross Ref
  7. Holder, I. The Interpretation of Documents and Material Culture. Sage, Thousand Oaks, CA, 1994.Google ScholarGoogle Scholar
  8. Kim, S.K. A study on the restriction of freedom of expression on the Internet. The Journal of Comparative Law 11, 3 (2011), 47--72.Google ScholarGoogle Scholar
  9. Korea Internet and Security Agency. Internet Ethical Culture Research, Seoul, Korea (2012); http://isis.kisa.or.kr/board/index.jsp?pageId=040100&bbsId=7&itemId=786Google ScholarGoogle Scholar
  10. Kwan, G.C.E. and Skoric, M.M. Facebook bullying: An extension of battles in school. Computers in Human Behavior 29, 1 (2013), 16--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Long, G.P. Who are you? Identity and anonymity in cyberspace. University of Pittsburgh Law Review 55, (1993), 1177--1213.Google ScholarGoogle Scholar
  12. Marsh, T.D. In Defense of Anonymity of the Internet. Res Gestae (Apr. 2007), 24--32.Google ScholarGoogle Scholar
  13. Park, H.J. A critical study on the introduction of the cyber contempt. Anam Law Review 28, 1 (2009), 315-347; http://kiss.kstudy.com/journaL/thesis_name.asp?tname=kiss2002&key=2751961Google ScholarGoogle Scholar
  14. Poster, M. Cyber Democracy: Internet and Public Sphere. University of California, Irvine (1995); http://www.hnet.uci.edu/mposter/writings/democ.htmlGoogle ScholarGoogle Scholar
  15. Seo, H., Houston, J.B., Knight, L.A.T., Kennedy, E.J., and Inglish, A.B. Teens' social media use and collective action. New Media & Society 16, 6 (2014), 883--902.Google ScholarGoogle ScholarCross RefCross Ref
  16. Slonje, R., Smith, P.K., and Frisen, A. The Nature of cyberbullying and strategies for prevention. Computers in Human Behavior 29, 1 (2013), 26--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Stieglitz, E.J. Anonymity of the Internet: How does it work, who needs it, and what are its policy implications? Cardozo Arts and Entertainment Law Journal 24, 3 (2007), 1395--1424.Google ScholarGoogle Scholar
  18. Strauss, A. and Corbin, J. Basics of Qualitative Research: Grounded Theory Procedures and Techniques. Sage, Newbury Park, CA, 1990.Google ScholarGoogle Scholar
  19. Strauss, A. and Corbin, J. Basics of Qualitative Coding. Sage, Thousand Oaks, CA, 1998.Google ScholarGoogle Scholar
  20. The Guardian. Florida cyberbullying: Girls arrested after suicide of Rebecca Sedwick, 12. The Guardian (Oct. 15, 2013); http://www.theguardian.com/world/2013/oct/15/florida-cyberbullying-rebeccasedwick-two-girls-arrestedGoogle ScholarGoogle Scholar
  21. Vandebosch, H. and Cleemput, K.V. Defining cyberbullying: Qualitative research into the perceptions of youngsters. Cyberpsychology and Behavior 11, 4 (2008), 499--503.Google ScholarGoogle ScholarCross RefCross Ref
  22. Varjas, K., Talley, J., Meyers, J., Parris, L., and Cutts, H. High school students' perceptions of motivations for cyberbullying: An exploratory study. Original Research 11, 3 (2010), 269--273.Google ScholarGoogle Scholar

Index Terms

  1. Why people post benevolent and malicious comments online

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 58, Issue 11
              November 2015
              112 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/2838899
              • Editor:
              • Moshe Y. Vardi
              Issue’s Table of Contents

              Copyright © 2015 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 23 October 2015

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format