Publication Cover
Journal of Sexual Aggression
An international, interdisciplinary forum for research, theory and practice
Volume 28, 2022 - Issue 3
286
Views
0
CrossRef citations to date
0
Altmetric
Articles

Antisocial sexual behaviour online scale: validation and psychological and sociodemographic correlates

ORCID Icon, ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon
Pages 393-406 | Received 11 Aug 2021, Accepted 22 Oct 2021, Published online: 13 Nov 2021

References

  • Allen, J. J., Anderson, C. A., & Bushman, B. J. (2018). The General Aggression model. Current Opinion in Psychology, 19, 75–80. https://doi.org/10.1016/j.copsyc.2017.03.034
  • Anderson, C. A., & Bushman, B. J. (2002). Human aggression. Annual Review of Psychology, 53(1), 27–51. https://doi.org/10.1146/annurev.psych.53.100901.135231
  • Anderson, C. A., & Bushman, B. J. (2018). Media violence and the General Aggression model. Journal of Social Issues, 74(2), 386–413. https://doi.org/10.1111/josi.12275
  • Baker, F. B. (2001). The basics of item response theory. ERIC. http://ericae.net/irt/baker.
  • Barlett, C. P. (2019). Social Psychology Theory extensions. Predicting Cyberbullying, 37–47. https://doi.org/10.1016/B978-0-12-816653-6.00005-4
  • Bélanger Lejars, V. O., Bélanger, C. H., & Razmak, J. (2020). Exploring new measures of online sexual activities, device use, and gender differences. Computers in Human Behavior, 108, 106–300. https://doi.org/10.1016/j.chb.2020.106300
  • Boateng, G. O., Neilands, T. B., Frongillo, E. A., Melgar-Quiñonez, H. R., & Young, S. L. (2018). Best practices for developing and validating scales for health, social, and behavioral research: A primer. Frontiers in Public Health, 6, 149. https://doi.org/10.3389/fpubh.2018.00149
  • Burt, S. A., & Donnellan, M. B. (2009). Development and validation of the subtypes of antisocial Behavior questionnaire. Aggressive Behavior, 35(5), 376–398. https://doi.org/10.1002/ab.20314
  • Bushman, B. J., & Anderson, C. A. (2002). Violent video games and hostile expectations: A test of the general aggression model. Personality and Social Psychology Bulletin, 28(12), 1679–1686. https://doi.org/10.1177/014616702237649
  • Byrne, B. M. (2012). Structural equation modeling with mplus. Routledge.
  • Chen, F. F. (2007). Sensitivity of goodness of fit indexes to lack of measurement invariance. Structural Equation Modeling, 14(3), 464–504. https://doi.org/10.1080/10705510701301834
  • Choi, K., Lee, S., & Lee, J. (2017). Mobile phone technology and online sexual harassment among juveniles in South Korea: Effects of self-control and social learning. International Journal of Cyber Criminology, 11(1), 110–127. https://doi.org/10.5281/zenodo.495776
  • Clancy, E., Klettke, B., & Hallford, D. J. (2019). The dark side of sexting–factors predicting the dissemination of sexts. Computers in Human Behavior, 92, 266–272. https://doi.org/10.1016/j.chb.2018.11.023
  • Delevi, R., & Weisskirch, R. S. (2013). Personality factors as predictors of sexting. Computers in Human Behavior, 29(6), 2589–2594. https://doi.org/10.1016/j.chb.2013.06.003
  • Doring, N., Daneback, K., Shaughnessy, K., Grov, C., & Byers, E. S. (2017). Online sexual activity experiences among college students: A four-country comparison. Archives of Sexual Behavior, 46(6), 1641–1652. https://doi.org/10.1007/s10508-015-0656-4
  • Duncan, Z., & March, E. (2019). Using tinder® to start a fire: Predicting antisocial use of tinder® with gender and the dark tetrad. Personality and Individual Differences, 145, 9–14. https://doi.org/10.1016/j.paid.2019.03.014
  • Dunlop, P. D., Lee, K., Ashton, M. C., Butcher, S. B., & Dykstra, A. (2015). Please accept my sincere and humble apologies: The HEXACO model of personality and the proclivity to apologize. Personality and Individual Differences, 79, 140–145. https://doi.org/10.1016/j.paid.2015.02.004
  • Gámez-Guadix, M., Almendros, C., Borrajo, E., & Calvete, E. (2015). Prevalence and association of sexting and online sexual victimization Among spanish adults. Sexuality Research and Social Policy, 12(2), 145–154. https://doi.org/10.1007/s13178-015-0186-9
  • Gosling, S. D., Rentfrow, P. J., & SwannJr.W. B. (2003). A very brief measure of the Big-Five personality domains. Journal of Research in Personality, 37(6), 504–528. https://doi.org/10.1016/S0092-6566(03)00046-1
  • Guadagno, R., Okdie, B., & Kruse, S. (2012). Dating deception: Gender, online dating, and exaggerated self-presentation. Computers in Human Behavior, 28(2), 642–647. https://doi.org/10.1016/j.chb.2011.11.010
  • Hahn, H. A., You, D. S., Sferra, M., Hubbard, M., Thamotharan, S., & Fields, S. A. (2018). Is it Too soon to meet? Examining Differences in geosocial networking App Use and sexual risk Behavior of emerging adults. Sexuality & Culture, 22(1), 1–21. https://doi.org/10.1007/s12119-017-9449-3
  • Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2014). Multivariate Data analysis (7th Edition). Pearson Education.
  • Hu, L., & Bentler, P. (1999). Cutoff criteria for fit indices in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling, 6(1), 1–55. https://doi.org/10.1080/10705519909540118
  • Kim, M., Clark, S., Donnellan, M., & Burt, S. (2020). A multi-Method investigation of the personality correlates of digital aggression. Journal of Research in Personality, 85, 103–923. https://doi.org/10.1016/j.jrp.2020.103923
  • Kline, R. B. (2016). Principles and Practice of Structural Equation modeling. Guilford Publications.
  • Kokkinos, C. M., & Antoniadou, N. (2019). Cyber-bullying and cyber-victimization among undergraduate student teachers through the lens of the General Aggression model. Computers in Human Behavior, 98, 59–68. https://doi.org/10.1016/j.chb.2019.04.007
  • Letourneau, E. J., Henggeler, S. W., McCart, M. R., Borduin, C. M., Schewe, P. A., & Armstrong, K. S. (2013). Two-year follow-up of a randomized effectiveness trial evaluating MST for juveniles who sexually offend. Journal of Family Psychology, 27(9), 78–985. https://doi.org/10.1037/a0034710
  • Liu, Y., & Zheng, L. (2020). Relationships between the Big Five, narcissistic personality traits, and online sexual activities. Personality and Individual Differences, 152, 109–593. https://doi.org/10.1016/j.paid.2019.109593
  • March, E., & Wagstaff, D. L. (2017). Sending nudes: Sex, self-rated mate value, and trait machiavellianism predict sending unsolicited explicit images. Frontiers in Psychology, 8(Article 2210), https://doi.org/10.3389/fpsyg.2017.02210
  • Marôco, J. (2010). Análise de equações estruturais. Report Number.
  • Mobarake, R. K. (2015). Age and gender difference in antisocial behavior among adolescents school students. Mediterranean Journal of Social Sciences, 6(4), 194–200. https://doi.org/10.5901/mjss.2015.v6n4s2p194
  • Moor, L., & Anderson, J. R. (2019). A systematic literature review of the relationship between dark personality traits and antisocial online behaviours. Personality and Individual Differences, 144, 40–55. https://doi.org/10.1016/j.paid.2019.02.027
  • Morelli, M., Chirumbolo, A., Bianchi, D., Baiocco, R., Cattelino, E., Laghi, F., & Drouin, M. (2020). The role of HEXACO personality traits in different kinds of sexting:A cross-cultural study in 10 countries. Computers in Human Behavior, 113, 106–502. https://doi.org/10.1016/j.chb.2020.106502
  • Oswald, F., Lopes, A., Skoda, K., Hesse, C. L., & Pedersen, C. L. (2019). I’ll show You mine so you’ll show Me yours: Motivations and personality variables in photographic exhibitionism. The Journal of Sex Research, 57(5), 1–13. https://doi.org/10.1080/00224499.2019.1639036
  • Petersen, J. L., & Hyde, J. S. (2010). A meta-analytic review of research on gender differences in sexuality, 1993–2007. Psychological Bulletin, 136(1), 21–38. https://doi.org/10.1037/a0017504
  • Peterson, R. A. (2000). A meta-analysis of variance accounted for and factor loadings in Exploratory factor analysis. Marketing Letters, 11(3), 261–275. https://doi.org/10.1023/A:1008191211004
  • Pew Research Center. (2021). Social Media Fact Sheet. https://www.pewresearch.org/internet/fact-sheet/social-media/?menuItem=81867c91-92ad-45b8-a964-a2a894f873ef.
  • Pimentel, C. (2012). Efeitos de Letras de Músicas em Comportamentos Pró-Sociais: Teste do Modelo Geral da Aprendizagem [Tese de Doutorado. Universidade de Brasília].
  • Powell, A., Henry, N., Flynn, A., & Scott, A. J. (2019). Image-based sexual abuse: The extent, nature, and predictors of perpetration in a community sample of Australian adults. Computers in Human Behaviour, 92, 393–402. https://doi.org/10.1016/j.chb.2018.11.009
  • Revelle, W., & Zinbarg, R. E. (2009). Coefficients alpha, beta, ômega, and the GLB: Comments on sijtsma. Psychometrika, 74(1), 145–154. https://doi.org/10.1007/s11336-008-9102-z
  • Rimer, J. R. (2017). Internet sexual offending from an anthropological perspective: Analysing offender perceptions of online spaces. Journal of Sexual Aggression, 23(1), 33–45. https://doi.org/10.1080/13552600.2016.1201158
  • Safernet Brasil. (2021a). Indicadores da Central Nacional de Denúncias de Crimes Cibernéticos. https://indicadores.safernet.org.br/index.html.
  • Safernet Brasil. (2021b). #IndicadoresHelpline. https://helpline.org.br/indicadores/pt/.
  • Salgado, K. R., & Prodócimo, E. (2017). Bullying e cyberbullying: Duas faces da mesma realidade. Revista de Estudos Universitários - REU, 42(2), 375. https://doi.org/10.22484/2177-788.2016v42n2p375-393
  • Samejima, F. (1969). Estimation of latent ability using a response pattern of graded scores. Psychometrika, , 34, , 1–97. https://link.springer.com/article/10.1007/BF03372160
  • Savage, M. W., & Tokunaga, R. S. (2017). Moving toward a theory: Testing an integrated model of cyberbullying perpetration, aggression, social skills, and internet self-efficacy. Computers in Human Behavior, 71, 353–361. https://doi.org/10.1016/j.chb.2017.02.016
  • Shim, J. W., & Paul, B. M. (2014). The role of anonymity in the Effects of inadvertent exposure to online pornography Among young adult males. Social Behavior and Personality: An International Journal, 42(5), 823–834. https://doi.org/10.2224/sbp.2014.42.5.823
  • Silveira, K. S. S., Zappe, J. G., & Dias, A. C. G. (2015). Correlatos dos comportamentos antissociais limitados à adolescência e comportamentos antissociais persistentes. Psicologia em Estudo, 20(3), https://doi.org/10.4025/psicolestud.v20i3.28100
  • Stead, L., Brewer, G., Gardner, K., & Khan, R. (2021). Sexual coercion perpetration and victimisation in females: The influence of borderline and histrionic personality traits, rejection sensitivity, and love styles. Journal of Sexual Aggression, https://doi.org/10.1080/13552600.2021.1909156
  • Stevens, J. P. (2012). Exploratory and confirmatory factor analysis. In Keenan Pituch & James Stevens (Eds.), Applied multivariate statistics for the social sciences (pp. 337–406). Routledge.
  • Sumter, S. R., Vandenbosch, L., & Ligtenberg, L. (2017). Love me tinder: Untangling emerging adults’ motivations for using the dating application tinder. Telematics and Informatics, 34(1), 67–78. https://doi.org/10.1016/j.tele.2016.04.009
  • Tomaszewska, P., & Krahé, B. (2016). Predictors of sexual Aggression victimization and perpetration Among Polish University students: A longitudinal study. Archives of Sexual Behavior, 47(2), 493–505. https://doi.org/10.1007/s10508-016-0823-2
  • Tripodi, F., Eleuteri, S., Giuliani, M., Rossi, R., Livi, S., Petruccelli, I., Daneback, K., & Simonelli, C. (2015). Unusual online sexual interests in heterosexual Swedish and Italian university students. Sexologies, 24(4), e84–e93. https://doi.org/10.1016/j.sexol.2015.03.003
  • Turchik, J. A., Garske, J. P., Probst, D. R., & Irvin, C. R. (2010). Personality, sexuality, and substance use as predictors of sexual risk taking in college students. The Journal of Sex Research, 47(5), 411–419. https://doi.org/10.1080/00224490903161621
  • Yuan, Z. (2018). Exploring Chinese college students’ construction of online identity on the sina microblog. Discourse, Context & Media, 26, 43–51. https://doi.org/10.1016/j.dcm.2018.02.001

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.