Journal of Community Medicine & Public Health Care Category: Medical Type: Research Article

Specification A Model for Study of Perceived Usefulness

Cruz García Lirios1*
1 Academic trans disciplinary network, Autonomous University of Mexico State , Instituto Literario 100, Centro, Cuauhtémoc, 50000 Mexico City, Toluca, Mexico

*Corresponding Author(s):
Cruz García Lirios
Academic Trans Disciplinary Network, Autonomous University Of Mexico State , Instituto Literario 100, Centro, Cuauhtémoc, 50000 Mexico City, Toluca, Mexico
Tel:+52 55 25184238,
Email:hyphatya@hotmail.es

Received Date: Nov 27, 2020
Accepted Date: Dec 24, 2020
Published Date: Dec 31, 2020

Abstract

The review and discussion of harassment on the Internet was the objective of this work. A documentary study was carried out with an intentional selection of sources indexed to repositories such as Dialnet, Latindex, Publindex, Redalyc and Scielo, considering the period from 2010 to 2019, as well as the keywords. A model was specified that included the variables reviewed in the literature, but the research design limited the consultation, debate and composition of the model, suggesting the inclusion of other variables that the literature identifies as inherent to violence among Internet users.

Keywords

Bullying; Sexting; Stalking; Stashing; Trolling

Introduction

A review of the literature regarding the study of Internet harassment refers to variables such as; stalking (stalking), stashing (ninguneo), trolling (discrediting), sexting (harassment) and bullying (ridicule). Each one explains the origin, development and consolidation of asymmetric relationships that are not necessarily related to other economic, political, social, cultural or educational differences, but as they are transversal, they widen the gap between victims, stalkers, spectators and promoters [1]. 

In this way, a review and discussion is necessary to highlight their relationships and direct their composition towards the exploration, explanation and prediction of the behavior of the actors involved in the harassment through electronic technologies, devices and networks [2]. 

However, the literature consulted has focused its attention on the relationship between perpetrators and victims without considering the mediating or moderating function of the spectators, promoters or apologists of Internet harassment [3]. 

In the hegemonic analysis of the differences between stalkers and victims, preponderant indicators have been found: bullying, trolling, stashing , sexting or stalking , but a partial and unidirectional analysis between the variables inhibits the observation of harassment as an extensive system of economic differences, political, social, cultural or educational among the parties involved [4]. 

It is about the establishment of a diversified agenda in its composition and extension, as well as heterogeneous among its actors. Therefore, the analysis of the relationships between the indicators of Internet harassment opens the discussion around the construction of a common agenda to the interested parties in which the victim and perpetrator are passive and active, specifying their function based on the environment and electronic resources with which they have more than a pathology related to the violent, situational or dispositional nature of the parties involved [5]. 

A documentary study was conducted with sources indexed to international repositories such as Dialnet, Latindex, Publindex, Redalyc and Scielo, considering the period from 2010 to 2018, as well as the inclusion of the keywords. 

The information was processed based on the Delphi technique which considers rounds of synthesis, qualification, discussion and integration of the differences between expert judges of the topics in order to structure criteria for the interpretation of an expert agenda that compares with the agenda extracted from the literature review [6]. 

The synthesis of the data to be discussed in the first round was obtained from the review of the literature, highlighting the indicators: stalking, trolling, stashing, sexting and bullying, but not including reasoning about relationships so that judges will evaluate the content, assigned -1 for unfavorable content to harassment, 0 for unlinked content and +1 for favorable content. 

The data were processed in the analysis package for social sciences (SPSS for its acronym in English version 17), and frequencies were estimated from d e them were established hypotheses in order to specify the model.

Relationship Specification

The model specification is based on the assumptions of the Theory of Reasoned Action, the Theory of Planned Behavior, the Theory of Self-efficacy, the Theory of Acceptance of Technology, the Theory of Electronic Consumption and the Theory of Diffusion of Innovations according to which the perceptions of utility, ease, risk, control, efficiency and compatibility directly and indirectly determine the use of an electronic technology or device. 

Relationship between perceptual factors and cyberbullying be direct. Or, indirectly through the perception of efficacy and / or the perception of ease. 

Direct relationships are estimated by multiple regressions in which seven perceptual variables simultaneously affect cyberbullying. This is because it is considered that an interrelation between the perceptual variables would affect the predictive power of each one on cyberbullying [7]. 

The perception of control, as established by the Theory of Planned Behavior, is a factor that, when associated with the intensive use of a technology, mostly affects the planning of an information device [8]. 

However, as it is a general perception, as, the Reasoned Action Theory establishes, its predictive power is reduced to its minimum expression since it requires its association with another perceptual factor such as efficiency or ease of use [9]. 

Thus, the perception of utility, according to the Theory of Acceptance of Technology, influences to a greater extent if it is linked to the perception of ease of use, but decreases its impact if it is related to the perception of risk as provided by the Theory. of Electronic Consumption. This logic applies to each of the perceptual variables and their probable link between them when anticipating the effects of cyberbullying [10]. 

On the other hand, the perception of compatibility is more influential on the use of technology as preached by the Theory of the Diffusion of Innovations since the relationship with another perception would imply a system difficult to match with the lifestyle and intensive use of technology [11]. 

In the case of risk perception, the Electronic Consumption Theory points out that its power is more incisive over the use of an electronic device if uncertainty or distrust is not reduced by a perceptual control or utility factor [12]. 

Finally, in the case of the perception of efficiency, the Theory of Self-efficacy warns that it has a greater impact on the use of technology if it is associated with the achievement of achievements which is very close to the perception of utility. That is why that the indirect effect of perceived efficiency will be greater than its direct bearing on the use of technology [13]. 

In indirect relationships, the effects of perceptual variables obey the same logic of interrelation and determination, but unlike direct relationships, measurement errors have interference with the estimation of an exogenous variable over an endogenous or mediating variable before predict the effects of their association on cyberbullying [14]. 

Both systems, the one of direct routes and the one of indirect paths, when being included in the specification model try to predict the cyber bullying considering different interrelation edges between perceptual variables that the state of knowledge warns as fundamental, but they have only been able to establish by routes Direct its predictive power. 

In consequence a, l to interrelation between the perception of usefulness, compatibility, control, harassment and impact risk by perceptions of effectiveness and ease, the cyberbullying is adjusted shall to the observed data.

Final considerations

The contribution of the present work to the state of the matter lies in the specification of a model in which two agendas were compared, one of experts who warn asymmetric relations between the parties involved in the harassment, but detached from the literature consulted which highlights the prevalence of risk-prone lifestyles and as a consequence of harassment. 

However, the harassment at the time of opening the discussion around its measurement since in view of the diversity of components the weighting of its dimensions and indicators becomes more complex, a balance between the definitions and the features of these [15]. 

In the present work it has been discussed that the pre-existing differences between the actors involved such as the perpetrators, the victims, the spectators and the promoters, although it is a reflection of their economic, political, social, cultural or educational asymmetries, so is the Establishment of an agenda that has focused its attention on axes and discussion topics such as harassment seen from pathologies that emerge in the interrelation. 

García warns that the harassment is collateral and simultaneous to the use of the Internet since the development of capacities, skills and information resources potentializes the harassment not mediated by a technology, device or digital network [16]. 

Precisely, in this reflexive line the present work highlights the relationships between the variables subtracted from a first review of the literature and pointed out in the qualification of expert judges. 

García, Hernández, Aguilar and Morales showed that the intensive use of electronic devices and networks increases Internet harassment in relation to other determinants that allude to expectations of achievement, identity, utility, ease and risk [17]. 

In fact, the situational factor combined with the dispositional factor, or the intensive use of the Internet added to the skills and knowledge explain the harassment, but only one type of harassment more oriented to the processing of information as a resource for the ridicule of a potential victim more than the observation of relations between the interested parties such as those who search, store, document, process and disseminate information related to bullying [18]. 

It is necessary to construct an integral model in which, once the relationships between the variables are specified, it is possible to test the hypotheses in order to contribute to the state of the matter.

References

  1. Romera E, Rey R, Ortega R (2011) Factors associated with involvement in Bullying. A study in Nicaragua. Psychosocial Intervention 20: 61-70.
  2. García L, Orellana O, Pomalaya R, Yanac E, Sotelo L, et al. (2010) Cyberbullying in secondary school students in metropolitan Lima. J Res Psychol 13: 83-99.
  3. Buelga S, Pons J (2012) Aggressions among teenagers through the mobile phone and the Internet. Psychol Interven 21: 91-101
  4. Sago B (2013) Factors influencing social media adoption and frequency of use: And examination of Facebook, Twitter, Pirenterest and Google. Int J Bus Com 3: 1-14.
  5. Valdés A, Yañez A, Martínez E (2013) Differences between subgroups of students involved in b ullying: victims, aggressors-victims and aggressors. Liberabit 19: 215-222.
  6. Kupczynski L, Mundi M, Green M (2013) The prevalence of cyberbullying among ethnic groups of high school students. Int J Edu Res 1: 48-53.
  7. Garaigordobil M, Oñederra J (2010) Emotional intelligence in victims of bullying and aggressors. European J Edu Psychol 3: 243-256.
  8. García L, Orellana O, Pomalaya R., Yanac E, Orellana D, et al. ( 2011) Peer bullying (bullying): empathy and social maladjustment in Bullying participants. J Res Psychol 14: 271-276.
  9. Gómez A (2013) Bullying the power of violence. A qualitative perspective on bullies and victims in primary schools in Colima. Mexican J Edu Res 18: 839-870.
  10. Kotaman H (2010) Turkish early childhood educators sense of teacher efficacy. Edu Psychol 8: 603-516.
  11. León, B., Castaño, E., Fajardo, F. and Gómez, T. (2012). Cyberbullying in a sample of secondary school students: modulating variables and social networks. Journal of Research in Educational Psychology, 10, 771-778.
  12. Martínez, A. and Reild , L. (2013). Psychometric validation of the questionnaire “This is how we get along in school” to evaluate bullying in the first place. Mexican Journal of Educational Research, 18, 11-36.
  13. Mendoza, B. (2011). Peer bullying and aggression escalation in the student teacher relationship. Iberoamerican Psychology, 19, 58-71.
  14. Quintana, A., Montgomery, J., Malaver, C. and Ruíz, G. (2012). Perception of Bullying , conflict management and school climate in directors and teachers of educational centers. Journal of Research in Psychology, 15, 35-47.
  15. Molina, HD, Llamas, B. and García, C. (2018). Reliability and validity of an instrument that measures the harassment perceived on the Internet. Eureka 15: 225-243.
  16. García C (2018) Reliability and validity of an instrument that measures the use of the Internet. Context 7: 31-37
  17. García C, Hernández J, Aguilar JA, Morales ML (2017) Reliability and validity of an instrument that measures perceptual determinants of harassment through the internet. Encounters, 14: 103-117.
  18. García C, Carreón J, Hernández J, Bustos J, Morales M, et al. (2013) Utilitarian and efficient dimensions of Internet use. Management Vision 12: 281-292.

Citation: Lirios CG (2020) Formalization of sustainable local development management. J Community Med Public Health Care 7: 071.

Copyright: © 2020  Cruz García Lirios, et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Herald Scholarly Open Access is a leading, internationally publishing house in the fields of Sciences. Our mission is to provide an access to knowledge globally.



© 2024, Copyrights Herald Scholarly Open Access. All Rights Reserved!