{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:21:06Z","timestamp":1726064466592},"reference-count":60,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T00:00:00Z","timestamp":1603324800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IMDS"],"published-print":{"date-parts":[[2020,10,22]]},"abstract":"Purpose<\/jats:title>Online disinhibition is one of the key factors leading to the occurrence of cyberaggression, cyberbullying and various forms of deviant behaviors in the online environment. To understand the composition of online disinhibition, this study aims to conceptualize online disinhibition and develop a measurement instrument for online disinhibition.<\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>We followed a rigorous procedure to develop and validate the multidimensional instrument of online disinhibition in three phases: item generation, measurement development and instrument testing.<\/jats:p><\/jats:sec>Findings<\/jats:title>We developed a 23-item online disinhibition scale and identified six key dimensions: dissociative anonymity, invisibility, asynchronicity, solipsistic introjections, dissociative imagination and minimization of authority.<\/jats:p><\/jats:sec>Practical implications<\/jats:title>The online disinhibition instrument is an accessible and easily administered measure that can be used as a checklist for systems designers and administrators to evaluate the level of online disinhibition among users. It offers systems design information on how to prevent and combat online deviant behaviors on platforms.<\/jats:p><\/jats:sec>Originality\/value<\/jats:title>This work provides a rich conceptualization of an online disinhibition instrument that can serve as a springboard for future work to understand online deviant behaviors. The newly developed measurement instrument of online disinhibition also adds to the repository of rigorous research scales in this area.<\/jats:p><\/jats:sec>","DOI":"10.1108\/imds-08-2020-0509","type":"journal-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T05:54:51Z","timestamp":1603346091000},"page":"48-64","source":"Crossref","is-referenced-by-count":36,"title":["Online disinhibition: conceptualization, measurement, and implications for online deviant behavior"],"prefix":"10.1108","volume":"121","author":[{"given":"Christy M.K.","family":"Cheung","sequence":"first","affiliation":[]},{"given":"Randy Yee Man","family":"Wong","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9930-8897","authenticated-orcid":false,"given":"Tommy K.H.","family":"Chan","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2021020414245004000_ref001","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.chb.2019.05.015","article-title":"The prevalence and impact of online trolling of UK members of parliament","volume":"99","year":"2019","journal-title":"Computers in Human Behavior"},{"issue":"5","key":"key2021020414245004000_ref002","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3234942","article-title":"Social support, reciprocity, and anonymity in responses to sexual abuse disclosures on social media","volume":"25","year":"2018","journal-title":"ACM Transactions on Computer-Human Interaction (TOCHI)"},{"issue":"3","key":"key2021020414245004000_ref003","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1037\/0033-2909.103.3.411","article-title":"Structural equation modeling in practice: a review and recommended two-step approach","volume":"103","year":"1988","journal-title":"Psychological Bulletin"},{"issue":"3","key":"key2021020414245004000_ref004","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1207\/s15327906mbr1603_4","article-title":"An examination of the validity of two models of attitude","volume":"16","year":"1981","journal-title":"Multivariate Behavioral Research"},{"issue":"3","key":"key2021020414245004000_ref005","doi-asserted-by":"crossref","first-page":"459","DOI":"10.2307\/2392322","article-title":"Representing and testing organizational theories: a holistic construal","volume":"27","year":"1982","journal-title":"Administrative Science Quarterly"},{"issue":"5","key":"key2021020414245004000_ref006","doi-asserted-by":"crossref","first-page":"1867","DOI":"10.1016\/j.chb.2008.02.004","article-title":"Fostering empowerment in online support groups","volume":"24","year":"2008","journal-title":"Computers in Human Behavior"},{"issue":"7","key":"key2021020414245004000_ref007","doi-asserted-by":"crossref","first-page":"732","DOI":"10.1521\/jscp.2011.30.7.732","article-title":"Emotional and interpersonal consequences of self-disclosure in a lived, online interaction","volume":"30","year":"2011","journal-title":"Journal of Social and Clinical Psychology"},{"issue":"2","key":"key2021020414245004000_ref008","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1037\/ppm0000055","article-title":"Predicting cyberbullying from anonymity","volume":"5","year":"2016","journal-title":"Psychology of Popular Media Culture"},{"issue":"8","key":"key2021020414245004000_ref009","doi-asserted-by":"crossref","first-page":"1595","DOI":"10.1016\/j.jbusres.2013.10.001","article-title":"You are what you can access: sharing and collaborative consumption online","volume":"67","year":"2014","journal-title":"Journal of Business Research"},{"key":"key2021020414245004000_ref010","volume-title":"EQS Structural Equations Program Manual","year":"1995"},{"key":"key2021020414245004000_ref011","volume-title":"Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming","year":"2001"},{"issue":"2","key":"key2021020414245004000_ref012","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1080\/07421222.2019.1599500","article-title":"Cyberbullying on social networking sites: the crime opportunity and affordance perspectives","volume":"36","year":"2019","journal-title":"Journal of Management Information Systems"},{"issue":"7","key":"key2021020414245004000_ref013","doi-asserted-by":"crossref","first-page":"658","DOI":"10.1080\/0144929X.2013.843721","article-title":"Group identification as a mediator of the effect of players' anonymity on cheating in online games","volume":"34","year":"2015","journal-title":"Behaviour and Information Technology"},{"key":"key2021020414245004000_ref014","article-title":"Online disinhibition: conceptualization, measurement, and relation to aggressive behaviors","year":"2016"},{"key":"key2021020414245004000_ref015","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1177\/001316446002000104","article-title":"A coefficient of agreement for nominal scales","volume":"20","year":"1960","journal-title":"Educational and Psychosocial Measurement"},{"key":"key2021020414245004000_ref016","unstructured":"Cyberbullying Research Center (2019), \u201c2019 cyberbullying data\u201d, available at: https:\/\/cyberbullying.org\/2019-cyberbullying-data (accessed 28 August 2020)."},{"key":"key2021020414245004000_ref017","unstructured":"Duggan, M. (2017), \u201cOnline harassment\u201d, available at: http:\/\/www.pewinternet.org\/2017\/07\/11\/online-harassment-2017\/ (accessed 11 August 2020)."},{"issue":"4","key":"key2021020414245004000_ref018","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1080\/14733145.2012.669772","article-title":"A qualitative investigation into the online counselling relationship: to meet or not to meet, that is the question","volume":"12","year":"2012","journal-title":"Counselling and Psychotherapy Research"},{"issue":"4","key":"key2021020414245004000_ref019","doi-asserted-by":"crossref","first-page":"468","DOI":"10.1177\/0886260503262083","article-title":"A survey of online harassment at a university campus","volume":"19","year":"2004","journal-title":"Journal of Interpersonal Violence"},{"issue":"3","key":"key2021020414245004000_ref020","first-page":"39","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","year":"1981","journal-title":"Journal of Marketing Research"},{"key":"key2021020414245004000_ref021","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1016\/j.chb.2015.06.024","article-title":"Perpetuating online sexism offline: anonymity, interactivity, and the effects of sexist hashtags on social media","volume":"52","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2021020414245004000_ref022","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/17482798.2012.739756","article-title":"What makes a bully a cyberbully? Unravelling the characteristics of cyberbullies across twenty-five European countries","volume":"7","year":"2013","journal-title":"Journal of Children and Media"},{"issue":"3","key":"key2021020414245004000_ref023","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1080\/1369118X.2011.642401","article-title":"Intersecting oppressions and online communities: examining the experiences of women of color in Xbox Live","volume":"15","year":"2012","journal-title":"Information, Communication and Society"},{"key":"key2021020414245004000_ref024","volume-title":"Multivariate Data Analysis","year":"2006"},{"issue":"1","key":"key2021020414245004000_ref025","doi-asserted-by":"crossref","first-page":"400","DOI":"10.3758\/s13428-015-0578-z","article-title":"Attentive Turkers: MTurk participants perform better on online attention checks than do subject pool participants","volume":"48","year":"2016","journal-title":"Behavior Research Methods"},{"issue":"2","key":"key2021020414245004000_ref026","doi-asserted-by":"crossref","first-page":"435","DOI":"10.25300\/MISQ\/2015\/39.2.08","article-title":"Mobile application usability: conceptualization and instrument development","volume":"39","year":"2015","journal-title":"MIS Quarterly"},{"issue":"3","key":"key2021020414245004000_ref027","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1111\/jcc4.12008","article-title":"The effects of anonymity on self\u2010disclosure in blogs: an application of the online disinhibition effect","volume":"18","year":"2013","journal-title":"Journal of Computer\u2010Mediated Communication"},{"issue":"1","key":"key2021020414245004000_ref028","first-page":"301","article-title":"Using mechanical turk data in IS research: risks, rewards, and recommendations","volume":"41","year":"2017","journal-title":"Communications of the Association for Information Systems"},{"key":"key2021020414245004000_ref029","volume-title":"LISREL 7: A Guide to the Program and its Application","year":"1988"},{"issue":"2","key":"key2021020414245004000_ref030","doi-asserted-by":"crossref","first-page":"386","DOI":"10.5465\/amr.2006.20208687","article-title":"The essential impact of context on organizational behavior","volume":"31","year":"2006","journal-title":"Academy of Management Review"},{"key":"key2021020414245004000_ref031","unstructured":"Joinson, A.N. (1998), \u201cCauses and implications of disinhibited information on the internet\u201d, Gackenbach, J. (Ed.), Psychology and the Internet, Academic Press, San Diego, CA, pp. 43-60."},{"issue":"8","key":"key2021020414245004000_ref032","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1108\/IMDS-12-2019-0711","article-title":"The impact of language on retweeting during acute natural disasters: uncertainty reduction and language expectancy perspectives","volume":"120","year":"2020","journal-title":"Industrial Management and Data Systems"},{"issue":"4","key":"key2021020414245004000_ref033","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1057\/palgrave.ejis.3000552","article-title":"A methodology for construct development in MIS research","volume":"14","year":"2005","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"key2021020414245004000_ref034","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.jsis.2016.06.002","article-title":"\u2018Cargo Cult\u2019 science in traditional organization and information systems survey research: a case for using nontraditional methods of data collection, including Mechanical Turk and online panels","volume":"25","year":"2016","journal-title":"The Journal of Strategic Information Systems"},{"issue":"4","key":"key2021020414245004000_ref035","doi-asserted-by":"crossref","first-page":"962","DOI":"10.1287\/isre.2016.0671","article-title":"Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model","volume":"27","year":"2016","journal-title":"Information Systems Research"},{"issue":"4","key":"key2021020414245004000_ref036","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1080\/07421222.2019.1661090","article-title":"An integrative theory addressing cyberharassment in the light of technology-based opportunism","volume":"36","year":"2019","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"key2021020414245004000_ref037","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1177\/1461444815608807","article-title":"# Gamergate and the Fappening: how Reddit's algorithm, governance, and culture support toxic technocultures","volume":"19","year":"2017","journal-title":"New Media and Society"},{"issue":"2","key":"key2021020414245004000_ref038","first-page":"71","article-title":"Adapting to the sharing economy","volume":"56","year":"2015","journal-title":"MIT Sloan Management Review"},{"issue":"4","key":"key2021020414245004000_ref039","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1007\/s12119-015-9283-4","article-title":"\u2018Dude, where's your face?\u2019 Self-presentation, self-description, and partner preferences on a social networking application for men who have sex with men: a content analysis","volume":"19","year":"2015","journal-title":"Sexuality and Culture"},{"issue":"3","key":"key2021020414245004000_ref040","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1287\/isre.2.3.192","article-title":"Development of an instrument to measure the perceptions of adopting an information technology innovation","volume":"2","year":"1991","journal-title":"Information Systems Research"},{"issue":"3","key":"key2021020414245004000_ref041","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1007\/s11109-016-9373-5","article-title":"Tweetment effects on the tweeted: experimentally reducing racist harassment","volume":"39","year":"2017","journal-title":"Political Behavior"},{"issue":"4","key":"key2021020414245004000_ref042","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1287\/isre.10.4.343","article-title":"Dimensionality of the strategic grid framework: the construct and its measurement","volume":"10","year":"1999","journal-title":"Information Systems Research"},{"issue":"5","key":"key2021020414245004000_ref043","doi-asserted-by":"crossref","first-page":"1166","DOI":"10.1108\/IntR-10-2018-442","article-title":"The dark side of social media\u2013and Fifty Shades of Grey introduction to the special issue: the dark side of social media","volume":"28","year":"2018","journal-title":"Internet Research"},{"issue":"10","key":"key2021020414245004000_ref044","doi-asserted-by":"crossref","first-page":"2313","DOI":"10.1002\/asi.23902","article-title":"Trolling here, there, and everywhere: perceptions of trolling behaviors in context","volume":"68","year":"2017","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"1","key":"key2021020414245004000_ref045","first-page":"1","article-title":"A double-edged sword: social media as a tool of online disinhibition regarding American sign language and Deaf cultural experience marginalization, and as a tool of cultural and linguistic exposure","volume":"2","year":"2016","journal-title":"Social Media and Society"},{"issue":"2","key":"key2021020414245004000_ref046","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1080\/15213260701375686","article-title":"Precursors and underlying processes of adolescents' online self-disclosure: developing and testing an \u201cInternet-attribute-perception\u201d model","volume":"10","year":"2007","journal-title":"Media Psychology"},{"issue":"11","key":"key2021020414245004000_ref047","doi-asserted-by":"crossref","first-page":"4177","DOI":"10.1177\/1461444818768547","article-title":"Unpacking (the) secret: anonymous social media and the impossibility of networked anonymity","volume":"20","year":"2018","journal-title":"New Media and Society"},{"key":"key2021020414245004000_ref048","unstructured":"Statista (2020), \u201cGlobal digital population as of July 2020\u201d, available at: https:\/\/www.statista.com\/statistics\/617136\/digital-population-worldwide\/ (accessed 28 August 2020)."},{"issue":"1","key":"key2021020414245004000_ref049","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1287\/isre.13.1.36.97","article-title":"An empirical examination of the concern for information privacy instrument","volume":"13","year":"2002","journal-title":"Information Systems Research"},{"issue":"3","key":"key2021020414245004000_ref050","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1089\/1094931041291295","article-title":"The online disinhibition effect","volume":"7","year":"2004","journal-title":"CyberPsychology and Behavior"},{"issue":"6","key":"key2021020414245004000_ref051","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1057\/ejis.2008.55","article-title":"User satisfaction with business-to-employee portals: conceptualization and scale development","volume":"17","year":"2008","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"key2021020414245004000_ref052","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1108\/INTR-04-2019-541","article-title":"Panel report: the dark side of the digitization of the individual","volume":"29","year":"2019","journal-title":"Internet Research"},{"key":"key2021020414245004000_ref053","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.chb.2014.09.036","article-title":"Cyberbullying among high school students in Japan: development and validation of the Online Disinhibition Scale","volume":"41","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2021020414245004000_ref054","doi-asserted-by":"crossref","first-page":"1060","DOI":"10.1080\/07421222.2018.1523531","article-title":"The \u2018Darth\u2019 side of technology use: an inductively derived typology of cyberdeviance","volume":"35","year":"2018","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"key2021020414245004000_ref055","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1002\/cbm.2116","article-title":"Understanding the overlap between cyberbullying and cyberhate perpetration: moderating effects of toxic online disinhibition","volume":"29","year":"2019","journal-title":"Criminal Behaviour and Mental Health"},{"issue":"1","key":"key2021020414245004000_ref056","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/009365096023001001","article-title":"Computer-mediated communication impersonal, interpersonal, and hyperpersonal interaction","volume":"23","year":"1996","journal-title":"Communication Research"},{"key":"key2021020414245004000_ref057","article-title":"The instigating, impelling, and inhibiting forces in cyberbullying perpetration across gender","year":"2015"},{"key":"key2021020414245004000_ref058","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.chb.2017.10.022","article-title":"Does gender matter in cyberbullying perpetration? An empirical investigation","volume":"79","year":"2018","journal-title":"Computers in Human Behavior"},{"key":"key2021020414245004000_ref059","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.paid.2018.04.001","article-title":"The associations between cyberbullying and callous-unemotional traits among adolescents: the moderating effect of online disinhibition","volume":"140","year":"2019","journal-title":"Personality and Individual Differences"},{"issue":"1","key":"key2021020414245004000_ref060","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1108\/ITP-07-2015-0167","article-title":"Examining the antecedents of online disinhibition","volume":"30","year":"2017","journal-title":"Information Technology and People"}],"container-title":["Industrial Management & Data Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-08-2020-0509\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-08-2020-0509\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T07:55:53Z","timestamp":1612598153000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-08-2020-0509\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,22]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,10,22]]}},"alternative-id":["10.1108\/IMDS-08-2020-0509"],"URL":"https:\/\/doi.org\/10.1108\/imds-08-2020-0509","relation":{},"ISSN":["0263-5577"],"issn-type":[{"value":"0263-5577","type":"print"}],"subject":[],"published":{"date-parts":[[2020,10,22]]}}}