Semantic Filter
show all semantic filters
Found 4 articles
  • UNDERSTANDING SEXUAL HARASSMENT IN MASSIVELY MULTIPLAYER ONLINE ROLE-PLAYING GAMES: CRIME OPPORTUNITY AND AFFORDANCE PERSPECTIVES

    2023 | European Conference On Information Systems | Citations: 0

    Authors: So, Bobby; Cheung, Christy

    Abstract: ... Expand

    Semantic filters: crime opportunity theory

    Topics: affordance user experience anonymity cyberbullying usability

    Methods: longitudinal research survey design survey structural equation modeling partial least squares path modeling

    Theories: theory of affordance crime opportunity theory

  • Cyberbullying on social networking sites: A literature review and future research directions

    PDF

    2021 | Information & Management | Citations: 12

    Authors: Chan, Tommy K.H.; Cheung, Christy M.K.; Lee, Zach W.Y.

    Abstract: Cyberbullying on social networking sites is an emerging societal issue that has ... Expand

    Semantic filters: crime opportunity theory

    Topics: cyberbullying social network personality Facebook user satisfaction

    Methods: literature study experiment netnography design artifact literature sample

    Theories: social cognitive theory crime opportunity theory theory of affordance

  • Cyberbullying on Social Networking Sites: The Crime Opportunity and Affordance Perspectives

    PDF

    2019 | Journal of Management Information Systems | Citations: 81

    Authors: Chan, Tommy K. H.; Cheung, Christy M. K.; Wong, Randy Y. M.

    Abstract: Cyberbullying on social networking sites (SNS bullying) is an emerging societal ... Expand

    Semantic filters: crime opportunity theory

    Topics: user experience affordance criminality information retrieval usability

    Methods: survey survey design longitudinal research statistical hypothesis test factor analysis

    Theories: theory of affordance crime opportunity theory

  • A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts

    PDF

    2019 | Management Information Systems Quarterly | Citations: 14

    Authors: Wang, Jingguo; Shan, Zhe; Gupta, Manish; Rao, H. Raghav

    Abstract: This study investigates employee behavior of unauthorized access attempts on inf ... Expand

    Semantic filters: crime opportunity theory

    Topics: insider threat data security mobile application internet technology single sign on

    Methods: instrumental variables estimation statistical hypothesis test regression analysis method descriptive statistic hierarchical linear modeling

    Theories: activity theory crime opportunity theory