Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 30663

Select areas to restrict search in scientific publication database:
Factors Influencing University Students' Online Disinhibition Behavior – The Moderating Effects of Deterrence and Social Identity
This study adopts deterrence theory as well as social identities as moderators, and explores their moderating affects on online toxic disinhibition. Survey and Experimental methodologies are applied to test the research model and four hypotheses are developed in this study. The controllability of identity positively influenced the behavior of toxic disinhibition both in experimental and control groups while the fluidity of the identity did not have significant influences on online disinhibition. Punishment certainty, punishment severity as well as social identity negatively moderated the relation between the controllability of the identity and the toxic disinhibition. The result of this study shows that internet users hide their real identities when they behave inappropriately on internet, but once they acknowledge that the inappropriate behavior will be found and punished severely, the inappropriate behavior then will be weakened.
Digital Object Identifier (DOI):


[1] G. Le Bon, "The crowd: A study of the popular mind” London: Transaction, 1895.
[2] Joinson. Causes and implications of disinhibited behavior on the Net. In 1.Gackenbach (Ed.) Psychology of the Internet, New York: Academic Press. l998.
[3] M. Lea, T. O'Shea, P. Fung, & R. Spears, "Flaming in computer-mediated communication: Observations, explanations, implications,” Contexts of Computer-Mediated Communication. 89-112,1992.
[4] S. Klepper, & D. Nagin, "The Deterrent Effect of Perceived Certainty and Severity of Punishment Revisited,” Criminology, 27,721-746, 1989.
[5] Noam Lapidot-Lefler, & Azy Barak, "Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition,” Computers in Human Behavior, 28(2), 434-443, 2012.
[6] John Suler, "The online disinhibition effect,” Cyberpsychology & Behavior, 7(3), 321-326, 2004.
[7] H. Liang, N. Saraf, Q. Hu, & Y. Xue, "Assimilation of enterprise systems: the effect of institutional pressures and the mediating role of top management,” MIS Quarterly, 31(1), 59-87, 2007.
[8] S. H. Schwartz, & R. C. Tessler, "A test of a model for reducing measured attitude-behavior inconsistencies,” Journal of Personality and Social Psychology, 24, 225-236, 1972.
[9] W. C. Reckless, "A new theory of delinquency and crime” Federal Probation, 25, 42-46, 1961.
[10] W. C. Reckless, the Crime Problem, Pacific Palisades: Goodyear Publishing Company. 1973.
[11] L. Leung, "Impacts of Net-generation attributes, seductive properties of the Internet, and gratifications-obtained on Internet use,” Telematics and Informatics, 20,107-129, 2003.
[12] Barak, Azy, Boniel-Nissim, Meyran, & John Suler, "Fostering empowerment in online support groups. Computers in Human Behavior,” 24(5), 1867-1883, 2008.
[13] K.Y.A. McKenna, A.S. Greene, & M.E.J. Gleason, "Relationship formation on the Internet: what’s the big attraction?” Journal of Social Issues, 58, 9–31, 2002.
[14] S. Turkle, Life on the screen, .New York: Simon & Schuster, 1995.
[15] S. Reicher, R. Spears, & T. Postmes, "A social identity model of deindividuation phenomena,” European Review of Social Psychology, 6(1), 161-198, 1995.
[16] F. A. Mael, and B. E. Ashforth, "Alumni and their alma mater: a partial test of the reformulated model of organizational identification,” Journal of Organizational Behavior, 13(2), 103-123, 1992.
[17] John J. DiIulio, "Deterrence theory,” 233-236, 2010.
[18] W. E. Thompson, & R. A. Dodder, "Juvenile Delinquency Explained?: A Test of Containment Theory,” Youth & Society, 15(2), 171-194, 1983.
[19] Chin, W. W., A. Gopal, & W. D. Salisbury, "Advancing the theory of adaptive structuration: The development of a scale to measure faithfulness of appropriation.” Information Systems Research, 8(4), 342-367, 1997.
[20] C. Fornell, & D. F. Larcker, "Evaluating structural equation models with unobservable variables and measurement error,” Journal of Marketing Research, 18(1), 39-50, 1981.
[21] Adam N. Joinson, "Disinhibition and the Internet” (second ed.) 2007
[22] A. Peace, D. Galletta, and J. Thong, "Software piracy in the workplace: A model and empirical test," Journal of Management Information Systems, 20, 1, 153-177, 2003.
[23] G. Antunes and A. Hunt, "The impact of certainty and severity of punishment on levels of crime in American states: An extended analysis,” Journal of Criminal Law and Criminology, 486-493, 1973.
Vol:14 No:09 2020Vol:14 No:08 2020Vol:14 No:07 2020Vol:14 No:06 2020Vol:14 No:05 2020Vol:14 No:04 2020Vol:14 No:03 2020Vol:14 No:02 2020Vol:14 No:01 2020
Vol:13 No:12 2019Vol:13 No:11 2019Vol:13 No:10 2019Vol:13 No:09 2019Vol:13 No:08 2019Vol:13 No:07 2019Vol:13 No:06 2019Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007