Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (6)

Godwin Udo, Kallol Bagchi, Laura Trevino & Saini Das. (2023) Using norm activation model and theory of planned behaviour to understand the drivers of cyberharassment among university students. Behaviour & Information Technology 0:0, pages 1-22.
Read now
Asadullah Khaskheli, Yushi Jiang, Syed Ali Raza & Sara Qamar Yousufi. (2022) Social isolation & toxic behavior of students in e-learning: evidence during the time of the COVID-19 pandemic. Interactive Learning Environments 0:0, pages 1-20.
Read now
Stefan Klotz, Simon Kratzer, Markus Westner & Susanne Strahringer. (2022) Literary Sketches in Information Systems Research: Conceptualization and Guidance for Using Vignettes as a Narrative Form. Information Systems Management 39:4, pages 345-362.
Read now
Ofir Turel, Hamed Qahri-Saremi & Isaac Vaghefi. (2021) Special Issue: Dark Sides of Digitalization. International Journal of Electronic Commerce 25:2, pages 127-135.
Read now
Soohyun Cho, Kyungha (Kari) Lee, Arion Cheong, Won Gyun No & Miklos A. Vasarhelyi. (2021) Chain of Values: Examining the Economic Impacts of Blockchain on the Value-Added Tax System. Journal of Management Information Systems 38:2, pages 288-313.
Read now
Hamed Qahri-Saremi & Ofir Turel. (2020) Ambivalence and Coping Responses in Post-Adoptive Information Systems Use. Journal of Management Information Systems 37:3, pages 820-848.
Read now

Articles from other publishers (20)

Stephen McCarthy, Paidi O'Raghallaigh, Yuzhu Li & Frédéric Adam. (2023) Control enactment in context: Understanding the interaction of controlee and controller perceptions in inter‐organisational project teams. Information Systems Journal 33:5, pages 1029-1084.
Crossref
Hong Zhu, Carol Hsu & Zhongyun Zhou. (2023) Bystander pro-celebrity cyberbullying: An integrated perspective of susceptibility to retaliation and social capital gains. Information & Management 60:5, pages 103797.
Crossref
Bastian Kordyaka, Solip Park, Jeanine Krath & Samuli Laato. (2023) Exploring the Relationship Between Offline Cultural Environments and Toxic Behavior Tendencies in Multiplayer Online Games. ACM Transactions on Social Computing 6:1-2, pages 1-20.
Crossref
Ugochukwu Etudo & Victoria Y. Yoon. (2023) Ontology-Based Information Extraction for Labeling Radical Online Content Using Distant Supervision. Information Systems Research.
Crossref
Haiyun (Melody) Zou, Israr Qureshi, Yulin Fang, Heshan Sun, Kai H. Lim, Elaine Ramsey & Patrick McCole. (2022) Investigating the nonlinear and conditional effects of trust—The new role of institutional contexts in online repurchase. Information Systems Journal 33:3, pages 486-523.
Crossref
Martin Adam, Evgheni Croitor, Dominick Werner, Alexander Benlian & Martin Wiener. (2022) Input control and its signalling effects for complementors' intention to join digital platforms. Information Systems Journal 33:3, pages 437-466.
Crossref
Karina Polanco-Levicán & Sonia Salvo-Garrido. (2023) Psychometric Properties of the Moral Disengagement through Technologies Questionnaire (MDTech-Q) in a Sample of Chilean University Students. Healthcare 11:8, pages 1097.
Crossref
Qi Chen, Ofir Turel & Yufei Yuan. (2022) Conflicting social influences regarding controversial information systems: the case of online dating. Information Technology & People 36:2, pages 834-866.
Crossref
A. J. Burns, Tom L. Roberts, Clay Posey, Paul Benjamin Lowry & Bryan Fuller. (2023) Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse. Information Systems Research 34:1, pages 342-362.
Crossref
Chuang Wang, Jun Zhang & Matthew K.O. Lee. (2021) Time flies when chatting online: a social structure and social learning model to understand excessive use of mobile instant messaging. Information Technology & People 35:7, pages 2167-2192.
Crossref
Jonathan (Hua) Ye & Matthew Jensen. (2022) Effects of introducing an online community in a crowdsourcing contest platform. Information Systems Journal 32:6, pages 1203-1230.
Crossref
Mohammad Alamgir Hossain, Mohammed Quaddus, Matthew Warren, Shahriar Akter & Ilias Pappas. (2022) Are you a cyberbully on social media? Exploring the personality traits using a fuzzy-set configurational approach. International Journal of Information Management 66, pages 102537.
Crossref
Marko Mikkola, Noora Ellonen, Markus Kaakinen, Iina Savolainen, Anu Sirola, Izabela Zych, Hye-Jin Paek & Atte Oksanen. (2022) Cyberharassment Victimization on Three Continents: An Integrative Approach. International Journal of Environmental Research and Public Health 19:19, pages 12138.
Crossref
Bowen Zheng & Robert M Davison. (2022) Hybrid Social Media Use and Guanxi Types: How Do Employees Use Social Media in the Chinese Workplace?. Information & Management 59:4, pages 103643.
Crossref
Aihui Chen & Yaobin Lu. (2021) Protective behavior in ride-sharing through the lens of protection motivation theory and usage situation theory. International Journal of Information Management 61, pages 102402.
Crossref
Lennart Jaeger & Andreas Eckhardt. (2020) Eyes wide open: The role of situational information security awareness for security‐related behaviour. Information Systems Journal 31:3, pages 429-472.
Crossref
Christy M.K. Cheung, Randy Yee Man Wong & Tommy K.H. Chan. (2020) Online disinhibition: conceptualization, measurement, and implications for online deviant behavior. Industrial Management & Data Systems 121:1, pages 48-64.
Crossref
Dongming Wu. (2020) Withholding effort in sharing knowledge in online space: differential effects of task characteristics. Journal of Knowledge Management 24:10, pages 2401-2429.
Crossref
Bastian Kordyaka, Katharina Jahn & Bjoern Niehaves. (2020) Towards a unified theory of toxic behavior in video games. Internet Research 30:4, pages 1081-1102.
Crossref
Sutirtha Chatterjee, Gregory Daniel Moody, Paul Benjamin Lowry, Suranjan Chakraborty & Andrew Hardin. (2020) The Nonlinear Influence of Harmonious Information Technology Affordance on Organizational Innovation. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.