{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:06:33Z","timestamp":1755907593639,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The National Natural Science Foundation of China","award":["72001102"],"award-info":[{"award-number":["72001102"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1145\/3625469.3625489","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:17:21Z","timestamp":1700569041000},"page":"84-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Study on Influencing Factors of Microblog User's Malicious Disinhibition Behavior"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0593-0429","authenticated-orcid":false,"given":"Feng","family":"Xu","sequence":"first","affiliation":[{"name":"Accounting School, Nanjing University of Finance and Economics, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6673-8970","authenticated-orcid":false,"given":"Chang","family":"Shi","sequence":"additional","affiliation":[{"name":"Accounting School, Nanjing University of Finance and Economics, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4758-714X","authenticated-orcid":false,"given":"Kaili","family":"Gao","sequence":"additional","affiliation":[{"name":"Economics and Management School, Southeast University Chengxian College, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0692-0962","authenticated-orcid":false,"given":"Yong","family":"Qi","sequence":"additional","affiliation":[{"name":"Economics and Management School, Nanjing University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Alonzo M Aiken M. 2004. Flaming in Electronic Communication. Decision Support Systems 205\u2013213. https:\/\/doi.org\/10.1016\/S0167-9236(02)00190-2","DOI":"10.1016\/S0167-9236(02)00190-2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Chesney T Coyne I Logan B 2009. Griefing in Virtual Worlds: Causes Casualties and Coping Strategies. Information Systems Journal 525\u2013548. https:\/\/doi.org\/10.1111\/j.1365-2575.2009.00330.x","DOI":"10.1111\/j.1365-2575.2009.00330.x"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Barlett C P Prot S Anderson C A 2017. An Empirical Examination of the Strength Differential Hypothesis in Cyberbullying Behavior. Psychology of violence 22-32. https:\/\/doi.org\/10.1145\/358669.358692","DOI":"10.1145\/358669.358692"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2014.04.014"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Anderson C L Agarwal R. 2010. Safe Computing: a Multi-method Empirical Examination of Home Computer User Security Behavioral Intentions. MIS Quarterly 613\u2013643. https:\/\/www.jstor.org\/stable\/25750694","DOI":"10.2307\/25750694"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1997.11518174"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Udris R. 2014. Cyberbullying among High School Students in Japan: Development and Validation of the Online Disinhibition Scale. Computers in Human Behavior 253\u2013261. https:\/\/doi.org\/10.1016\/j.chb.2014.09.036","DOI":"10.1016\/j.chb.2014.09.036"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/13617672.2014.884844"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Kiesler S Zubrow D Moses A M 1985. Affect in Computer-mediated Communication: An Experiment in Synchronous Terminal-to-terminal Discussion. Human-Computer Interaction 77\u2013104. https:\/\/dl.acm.org\/doi\/10.1207\/s15327051hci0101_3","DOI":"10.1207\/s15327051hci0101_3"},{"volume-title":"Causes and Implications of Disinhibited Behavior on the Internet","author":"Joinson A.","key":"e_1_3_2_1_10_1","unstructured":"Joinson A. 1998. Causes and Implications of Disinhibited Behavior on the Internet. New York: Academic Press"},{"volume-title":"Explanations, Implications.","author":"Lea M","key":"e_1_3_2_1_11_1","unstructured":"Lea M, O'Shea T, Fung P, 1992. Flaming in Computer-mediated Communication: Observations, Explanations, Implications. London: Harvester Wheatsheaf"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Suler J. 2004. The Online Disinhibition Effect. Cyber psychology & Behavior 321\u2013326. https:\/\/psycnet.apa.org\/record\/2004-16177-001","DOI":"10.1089\/1094931041291295"},{"volume-title":"Psychology and the Internet: Intrapersonal, Interpersonal, and Transpersonal Implications","author":"Gackenbach J.","key":"e_1_3_2_1_13_1","unstructured":"Gackenbach J. 2011. Psychology and the Internet: Intrapersonal, Interpersonal, and Transpersonal Implications. Massachusetts: Academic Press, 75\u201392. https:\/\/www.sciencedirect.com\/book\/9780123694256"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Joinson A N. 2001. Self-disclosure in Computer-mediated Communication: the Role of Self-awareness and Visual Anonymity. European Journal of Social Psychology 177\u2013192. https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ejsp.36","DOI":"10.1002\/ejsp.36"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Leung L. 2002. Loneliness Self-disclosure and ICQ (\" I seek you\") Use. Cyber Psychology & Behavior 241\u2013251. https:\/\/pubmed.ncbi.nlm.nih.gov\/12123247","DOI":"10.1089\/109493102760147240"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Postmes T Spears R Sakhel K 2001. Social Influence in Computer-mediated Communication: the Effects of Anonymity on Group Behavior. Personality and Social Psychology Bulletin 1243\u20131254. https:\/\/journals.sagepub.com\/doi\/10.1177\/01461672012710001","DOI":"10.1177\/01461672012710001"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224490109552102"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Tanis M Postmes T. 2007. Two Faces of Anonymity: Paradoxical Effects of Cues to Identity in CMC. Computers in Human Behavior 955\u2013970. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0747563205000567","DOI":"10.1016\/j.chb.2005.08.004"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Lee S H Kim H W. 2015. Why People Post Benevolent and Malicious Comments Online. Communications of the ACM 74\u201379. https:\/\/dl.acm.org\/doi\/10.1145\/2739042","DOI":"10.1145\/2739042"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Rosner L Kramer N C. 2016. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language use in Online Comments. Social Media+ Society 1\u201312. https:\/\/journals.sagepub.com\/doi\/10.1177\/2056305116664220","DOI":"10.1177\/2056305116664220"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2013.813194"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Lapidot-Lefler N Barak A. 2012. Effects of Anonymity Invisibility and Lack of Eye-contact on Toxic Online Disinhibition. Computers in human behavior 434\u2013443. https:\/\/doi.org\/10.1016\/j.chb.2011.10.014","DOI":"10.1016\/j.chb.2011.10.014"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Lin T C Wu S Shih J F. 2017. Examining the Antecedents of Online Disinhibition. Information Technology & People 189\u2013209. https:\/\/doi.org\/10.1108\/ITP-07-2015-0167","DOI":"10.1108\/ITP-07-2015-0167"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12008"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Lowry P B Zhang J Wang C 2016. Why do Adults Engage in Cyberbullying on Social Media ? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model. Information Systems Research 962\u2013986. https:\/\/pubsonline.informs.org\/doi\/abs\/10.1287\/isre.2016.0671","DOI":"10.1287\/isre.2016.0671"},{"key":"e_1_3_2_1_26_1","unstructured":"Dyer R Green R Pitts M 1995. What's the Flaming Problem? Computer Mediated Communication-Deindividuating or Disinhibiting ?. BCS HCI. 289\u2013302"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Walther J B. 1992. Interpersonal Effects in Computer-mediated Interaction a Relational Perspective. Communication Research 52\u201390. https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/009365092019001003","DOI":"10.1177\/009365092019001003"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.02.004"},{"key":"e_1_3_2_1_29_1","first-page":"1","article-title":"The Benign Online Disinhibition Effect: Could Situational Factors Induce Self-disclosure and Prosocial Behaviors?. Cyberpsychology","author":"Lapidot-Lefler N","year":"2015","unstructured":"Lapidot-Lefler N, Barak A. 2015. The Benign Online Disinhibition Effect: Could Situational Factors Induce Self-disclosure and Prosocial Behaviors?. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 1\u201319. https:\/\/cyberpsychology.eu\/article\/view\/4335","journal-title":"Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Amichai-Hamburger Y Kingsbury M Schneider BH. 2013. Friendship: an Old Concept with a New Meaning ?. Computers in Human Behavior 33\u201339. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0747563212002166","DOI":"10.1016\/j.chb.2012.05.025"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Bastiaensens S Vandebosch H Poels K 2014. Cyberbullying on Social Network Sites: an Experimental Study into Bystanders\u2019 Behavioural Bntentions to Help the Victim or Reinforce the Bully. Computers in Human Behavior 259\u2013271. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0747563212002166","DOI":"10.1016\/j.chb.2013.10.036"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/casp.2135"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.020"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Panopoulos A P Sarri K. 2013. E-mentoring: the Adoption Process and Innovation Challenge. International Journal of Information Management 217\u2013226. https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0268401212001247","DOI":"10.1016\/j.ijinfomgt.2012.10.003"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2011.01555.x"},{"key":"e_1_3_2_1_36_1","unstructured":"Fullwood C. 2015. The Role of Personality in Online Self-presentation. Cyber Psychology 89-110"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.04.019"},{"volume-title":"Deindividuation: the Absence of Self-awareness and Self-regulation in Group Members","author":"Diener E.","key":"e_1_3_2_1_38_1","unstructured":"Diener E. 1980. Deindividuation: the Absence of Self-awareness and Self-regulation in Group Members. The Psychology of Group Influence, 209\u2013242"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Festinger L Pepitone A Newcomb T. 1952. Some Consequences of De-individuation in a Goup. The Journal of Abnormal and Social Psychology 382. https:\/\/psycnet.apa.org\/record\/1953-02609-001","DOI":"10.1037\/h0057906"},{"key":"e_1_3_2_1_40_1","volume-title":"Nebraska symposium on motivation. University of Nebraska Press","author":"Zimbardo P G","year":"1969","unstructured":"Zimbardo P G. 1969. The Human Choice: Individuation, Reason, and Order Versus De-individuation, Impulse, and Chaos. Nebraska symposium on motivation. University of Nebraska Press"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800313"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02723327"},{"volume-title":"Multivariate Data Analysis: a Global Perspective","author":"Hair J F","key":"e_1_3_2_1_43_1","unstructured":"Hair J F, Anderson R E, Babin B J, 2010. Multivariate Data Analysis: a Global Perspective. Upper Saddle River, New Jersey: Pearson"},{"volume-title":"Partial Least Squares Structural Equation Modeling. Handbook of market research","author":"Hair J F","key":"e_1_3_2_1_44_1","unstructured":"Hair J F, Sarstedt M, Ringle C M. 2017. Partial Least Squares Structural Equation Modeling. Handbook of market research. New York: Springer International Publishing, 1\u201340"},{"volume-title":"Multifaceted Conceptions of Fit in Structural Equation Models","author":"Tanaka J S","key":"e_1_3_2_1_45_1","unstructured":"Tanaka J S. 1993. Multifaceted Conceptions of Fit in Structural Equation Models. Sage Focus Editions, 10"}],"event":{"name":"IMMS 2023: 2023 the 6th International Conference on Information Management and Management Science","acronym":"IMMS 2023","location":"Chengdu China"},"container-title":["Proceedings of the 2023 6th International Conference on Information Management and Management Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625469.3625489","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3625469.3625489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T09:44:43Z","timestamp":1755855883000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625469.3625489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":45,"alternative-id":["10.1145\/3625469.3625489","10.1145\/3625469"],"URL":"https:\/\/doi.org\/10.1145\/3625469.3625489","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}