Do Shy Individuals Engage in Cyber Aggression? The Multiple Mediation of Passive Use and Relative Deprivation and the Moderation of Moral Sensitivity

Jinzhe Zhao,Zhen Guo,Liying Jiao,Mengke Yu,Huiyue Shi,Yan Xu
DOI: https://doi.org/10.1177/08944393231176326
2023-05-16
Social Science Computer Review
Abstract:Social Science Computer Review, Ahead of Print. Shyness has been shown to be linked to aggression. However, whether this relationship occurs in cyberspace and the mechanisms that might affect it are largely unexplored. Based on the social fitness model, the current study examined the relationship between shyness and cyber aggression, as well as the mediating roles of passive use and relative deprivation. Moreover, according to the integration of the social information processing model and moral domain theory, moral sensitivity serves as a moderator in the direct and indirect links between shyness and cyber aggression. A total of 700 Chinese college students (Mage = 18.68, 53.57% women) participated in the current study and completed multiple questionnaires, namely, the Shyness Scale, Cyber-Aggression Scale, Passive Use of Social Network Site Scale, Relative Deprivation Scale, and Ethical Sensitivity Scale. The results showed that shyness was positively associated with cyber aggression through the multiple mediating effects of passive use and relative deprivation. Additionally, moderated mediation analysis indicated that moral sensitivity moderated the direct and indirect relationship between shyness and cyber aggression. A high level of moral sensitivity weakened the association of shyness with cyber aggression and the association of relative deprivation with cyber aggression, supporting the moderated mediation model. This study implicates the underlying mechanisms of the relationship between shyness and cyber aggression and preventative interventions to reduce the risk of cyber aggression.
social sciences, interdisciplinary,computer science, interdisciplinary applications,information science & library science
What problem does this paper attempt to address?