Iris Publishers - Current Trends in Clinical & Medical Sciences (CTCMS)
Specification A Model for Study of Harassment Agenda
Authored by Cruz Garcia Lirios
Introduction
A review of the literature
regarding the study of Internet harassment alludes to variables such as;
stalking, stashing, trolling, sexting and bullying. Each one explains the
origin, development and consolidation of asymmetric relationships that are not
necessarily related to other economic, political, social, cultural or
educational differences, but being cross-cutting they increase the gap between
victims, stalkers, spectators and promoters [1]. In this way, a review and
discussion is necessary to highlight their relationships and guide their
composition towards the exploration, explanation and prediction of the behavior
of the actors involved in harassment through electronic technologies, devices
and networks [2]. However, the literature consulted has focused on the
relationship between perpetrators and victims without considering the mediating
or moderating role of viewers, promoters or apologists for Internet harassment
[3].
In the hegemonic analysis of the
differences between bullies and victims, preponderant indicators have been
found: bullying, trolling, stashing, sexting or stalking, but a partial and
unidirectional analysis between the variables inhibits the observation of
bullying as an extensive system of economic differences, political, social,
cultural or educational among the parties involved [4]. It is about the
establishment of a diversified agenda in its composition and extension, as well
as heterogeneous among its actors. Therefore, the analysis of the relationships
between the indicators of Internet harassment opens the discussion around the
construction of a common agenda for stakeholders in which the victim and
perpetrator are passive and active, specifying their function from the
environment and electronic resources with which they have more than a pathology
related to the violent, situational or dispositional nature of the parties
involved [5]
Studies of Harassment Agenda
The specification of the model is
based on the assumptions of the Theory of Reasoned Action, the Theory of
Planned Behavior, the Theory of Self-efficacy, the Theory of Technology
Acceptance, the Theory of Electronic Consumption and the Theory of the
Dissemination of Innovations according to which the perceptions of utility,
ease, risk, control, efficiency and compatibility directly and indirectly
determine the use of a technology or electronic device. L a relationship
between perceptual factors and cyberbullying direct (hypothesis 1). Or indirect
through the perception of effectiveness (hypothesis 2) and / or the perception
of ease (hypothesis 3). Direct relationships are estimated by multiple
regressions in which seven perceptual variables simultaneously affect
cyberbullying. This is because it is considered that an interrelation between
the perceptual variables would affect the predictive power of each one over
cyberbullying [6]
The perception of control, as
established by the Theory of Planned Behavior, is a factor that, when associated
with the intensive use of a technology, mainly affects the planning of an
information device [7]. However, being a general perception, as established by
the Theory of Reasoned Action, its predictive power is reduced to its minimum
expression since it requires its association with another perceptual factor
such as efficiency or ease of use [8].
In this way, the perception of
utility, according to the Theory of Acceptance of Technology, influences to a
greater extent if it is linked to the perception of ease of use, but it
diminishes its impact if it is related to the perception of risk according to
the Theory. of Electronic Consumption. This logic applies to each of the
perceptual variables and their probable link between them when anticipating the
effects of cyberbullying [9]. For its part, the perception of compatibility is
more influential on the use of technology as predicated by the Theory of the
Diffusion of Innovations since the relationship with another perception would
be a difficult system to get along with lifestyle and intensive use of
technology [10].
In the case of risk perception,
the Theory of Electronic Consumption indicates that its power is more incisive
on the use of an electronic device if the uncertainty or mistrust is not reduced
by a perceptual factor of control or utility [11]. Finally, in the case of the
perception of efficiency, the Theory of Self-efficacy warns that it has a
greater impact on the use of technology if it is associated with the
achievement of achievements which is very close to the perception of utility.
That is why the indirect effect of perceived efficiency will be greater than
its direct bearing on the use of technology [12].
In indirect relationships, the
effects of perceptual variables obey the same logic of interrelation and
determination, but unlike direct relationships, measurement errors have an
influence on the estimation of an exogenous variable on an endogenous variable
or mediator before predict the effects of their association on cyberbullying
[13]
Both systems, direct routes and
indirect pathways, to be included in the specification model try to predict the
cyberbullyng considering different edges of interrelation between perceptual
variables that the state of knowledge warns as fundamental but have only been
able to establish by routes direct their predictive power.
Interrelationship between
perceived usefulness, compatibility, control, harassment and impact risk by
perceptions of effectiveness and ease, to cyberbullying shall conform to the
observed data.
Method
A documentary study was carried
out with sources indexed to international repositories such as Dialnet,
Latindex, Publindex, Redalyc and Scielo, considering the period from 2010 to
2018, as well as the inclusion of key words. The information was processed
based on the Delphi technique, which considers rounds of synthesis,
qualification, discussion and integration of the differences between expert
judges of the topics with the purpose of structuring criteria for the
interpretation of an expert agenda that is compared with the agenda extracted
from the literature review [14].
The synthesis of the data to be
discussed in the first round was obtained from the literature review,
highlighting the indicators: stalking, trolling, stashing, sextint and bullying
, but without including reasoning about the relationships in order that the
judges will evaluate the content , assigned -1 for content unfavorable to
bullying, 0 for unlinked content and +1 for favorable content. The data were
processed in the analysis package for social sciences (SPSS for its acronym in
English version 17), frequencies and d were estimated and from them hypotheses
were established to specify the model.
Results
The contribution of the present
work to the state of the question lies in the specification of a model in which
two agendas were compared, one of experts who warn asymmetric relationships
between the parties involved in the harassment but disconnected from the
literature consulted which highlights the prevalence of lifestyles prone to
risk and because of harassment.
Final considerations
Harassment in times of discussion
opens up regarding its measurement because, given the diversity of components,
the weighting of its dimensions and indicators becomes more complex, and a
balance between definitions and their features is essential [15].
In the present work it has been
argued that pre-existing differences between the actors involved such as the
perpetrators, the victims, the spectators and the promoters, although it is a
reflection of their economic, political, social, cultural or educational
asymmetries, is also the establishment of an agenda that has focused its
attention on axes and topics of discussion such as the harassment seen from
pathologies that emerge in the interrelation. [16] warns that harassment is
collateral and simultaneous to the use of the Internet itself, since the
development of capacities, skills and information resources potentiates
harassment not mediated by a technology, device or digital network.
Precisely, in this reflective
line, this work highlights the relationships between the variables subtracted
from a first review of the literature and specified in the qualification of
expert judges. García, Hernández, Aguilar and [17] demonstrated that the
intensive use of electronic devices and networks increases Internet user
harassment in relation to other determinants that allude to expectations of
achievement, identity, usefulness, ease and risk.
In effect, the situational factor
combined with the dispositional factor, or, the intensive use of the internet
added to the skills and knowledge explain the harassment, but only a type of
harassment more oriented to the processing of information as a resource for the
ridicule of a potential victim more than the observation of relationships
between the interested parties, as is the case of those who search, store,
document, process and disseminate information related to bullying [18-20]. The
construction of an integral model is necessary in which, once the relationships
between the variables are specified, it is possible to contrast the hypotheses
in order to contribute to the state of the question.
To read more about this article: https://irispublishers.com/ctcms/fulltext/specification-a-model-for-study-of-harassment-agenda.ID.000534.php
Indexing List of Iris Publishers: https://medium.com/@irispublishers/what-is-the-indexing-list-of-iris-publishers-4ace353e4eee
Iris
publishers google scholar citations: https://scholar.google.co.in/scholar?hl=en&as_sdt=0%2C5&q=irispublishers&btnG=

Comments
Post a Comment