Effects of Information Overload on Hostile Behaviors Online

Sanghyung Jin, Cheul Rhee, Youngbin Jang


Although there have been lots of studies about users’ behaviors online, few have explored the mechanism of hostile behaviors. In this sense, this study aims at discovering what may elevate users’ hostile behaviors. More specifically, we tried to find the relationship between flaming behavior and perception factors such as perceived risk, anonymity and expected emotional reaction.
A survey was conducted to investigate the relationship of the above variables. As a result, all these variables show significant effects on flaming, and information overload are found to act as a moderator. We carefully conclude that flaming in online community can be reduced by preventing information overload each user perceives. 

Full Text:



Alonzo, M. and Aiken, M., “Flaming in Electronic Communication,” Decision Support Systems, Vol. 36, No. 3, pp. 205-213, 2004.

Ang, R. P., Tan, K. A., and Talib Mansor, A., “Normative Beliefs About Aggression as a Mediator of Narcissistic Exploitativeness and Cyberbullying,” Journal of interpersonal violence, Vol. 26, No. 13, pp. 2619-2634, 2011.

Bargh, J. A., McKenna, K. Y. A., and Fitzsimons, G. M., “Can You See the Real Me? Activation and Expression of the “True Self” on the Internet,” Journal of Social Issues, Vol. 58, No. 1, pp. 33-48, 2002.

Baron, R. M. and Kenny, D. A., “The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations,” Journal of Personality and Social Psychology, Vol. 51, No. 6, 1986.

Biocca, F., Harms, C., and Gregg, J., “The Networked Minds Measure of Social Presence: Pilot Test of the Factor Structure and Concurrent Validity,” 4th annual International Workshop on Presence, Philadelphia, 2001.

Blumler, J. G., “The Role of Theory in Uses and Gratifications Studies,” Communication Research, Vol. 6, No. 1, pp. 9-36, 1979.

Cho, D. and Kwon, K. H., “The impacts of identity verification and disclosure of social cues on flaming in online user comments,” Computersin Human Behavior, Vol. 51, pp. 363-372, 2015.

Christopherson, K. M., “The Positive and Negative Implications of Anonymity in Internet Social Interactions: “On the Internet, Nobody Knows You’re a Dog”,” Computers in Human Behavior, Vol. 23, No. 6, pp. 3038-3056, 2007.

Dumont, G. and Candler, G., “Virtual Jungles: Survival, Accountability, and Governance in Online Communities,” The American Review of Public Administration, Vol. 35, No. 3, pp. 287-299, 2005.

Derks, D., Fischer, A. H., and Bos, A. E., “The role of emotion in computer-mediated communication: A review,” Computers in human behavior, Vol. 24, No. 3, pp. 766-785, 2008.

Eppler, M. J. and Mengis, J., “The concept of information overload: A review of literature from organization science, accounting, marketing, MIS, and related disciplines,” The information society, Vol. 20, No. 5, pp. 325-344, 2004.

Fanti, K. A., Demetriou, A. G., and Hawa, V. V., “A Longitudinal Study of Cyberbullying: Examining Riskand Protective Factors,” European Journal of Developmental Psychology, Vol. 9, No. 2, pp. 168-181, 2012.

Fenigstein, A. and Vanable, P. A., “Paranoia and self-consciousness,” Journal of Personality and Social Psychology, Vol. 62, No. 1, 1992.

Fornell, C. and Larcker, D. F., “Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics,” Journal of Marketing Research, Vol. 18, No. 3, pp. 382-388, 1981.

Hallikas, J., Karvonen, I., Pulkkinen, U., Virolainen, V.-M., and Tuominen, M., “Risk Management Processes in Supplier Networks,” International Journal of Production Economics, Vol. 90, No. 1, pp. 47-58, 2004.

Jane, E. A., “Flaming? What flaming? The pitfalls and potentials of researching online hostility. Ethics and Information Technology,” Vol. 17, No. 1, pp. 65-87, 2015.

Jessup, L. M., Connolly, T., and Tansik, D. A., “Toward Atheory of Automated Group Work the Deindividuating Effects of Anonymity,” Small group research, Vol. 21, No. 3, pp. 333-348, 1990.

Joinson, A. N., “Self-Disclosure in Computer-Mediated Communication: The Role of Self-Awareness and Visual Anonymity,” European Journal of Social Psychology, Vol. 31, No. 2, pp. 177-192, 2001.

Jones, Q., Ravid, G., and Rafaeli, S., “Information Overload and the Message Dynamics of Online Interaction Spaces: A Theoretical Model and Empirical Exploration,” Information Systems Research, Vol. 15, No. 2, pp. 194-210, 2004.

Kiesler, S., Siegel, J., and McGuire, T. W., “Social psychological aspects of computer-mediated communication. American Psychologist,” Vol. 39, No. 10, pp. 1123-1134, 1984.

Kiesler, S., Zubrow, D., Moses, A. M., and Geller, V., “Affect in computer-mediated communication: An experiment in synchronous terminal-to-terminal discussion,” Human Computer Interaction, Vol. 1, pp. 77-104, 1985.

Lee, J. M., Shin K. S., and Suh, A. Y., “The Influence of Self-discrepancy in Virtual and Cross Worlds on Individuals Activities in Online Communities,” The Journal of Society for e-Business Studies, Vol. 16, No. 3, pp. 23-45, 2011.

Kahneman, D. and Tversky, A., “Prospect Theory: An Analysis of Decision under Risk,” Econometrica: Journal of the Econometric Society, pp. 99-127, 2013.

Kiesler, S., Siegel, J., and McGuire, T. W., “Social Psychological Aspects of Computer-Mediated Communication,” American Psychologist, Vol. 39, No. 10, 1984.

Kowalski, R. M. and Limber, S. P., “Electronic Bullying among Middle School Students,” Journal of Adolescent Health, Vol. 41, No. 6, (Supplement), pp. S22-S30, 2007.

Lapidot-Lefler, N. and Barak, A., “Effects of Anonymity, Invisibility, and Lack of Eye-Contact on Toxic Online Disinhibition,” Computers in Human Behavior, Vol. 28, No. 2, pp. 434-443, 2012.

Lea, M., O’Shea, T., Fung, P., and Spears, R., ‘Flaming’ in computer-mediated communication: Observations, explanations, implications, 1992.

Lewis, D. D. and Knowles, K. A., “Threading Electronic Mail: A Preliminary Study,” Information Processing & Management, Vol. 33, No. 2, pp. 209-217, 1997.

Midha, V. and Nandedkar, A., “Impact of Similarity between Avatar and Their Users on Their Perceived Identifiability: Evidence from Virtual Teams in Second Life Platform,” Computers in Human Behavior, Vol. 28, No. 3, pp. 929-932, 2012.

Moor, P. J., Heuvelman, A., and Verleur, R., “Flaming on Youtube,” Computers in Human Behavior, Vol. 26, No. 6, pp. 1536-1546, 2010.

Ning Shen, K. and Khalifa, M., “Exploring Multidimensional Conceptualization of Social Presence in the Context of Online Communities,” International Journal of Human-Computer Interaction, Vol. 24, No. 7, pp. 722-748, 2008.

Nunnally, J. C. and Bernstein, I. H., Psychometric Theory, McGraw-Hill New York, 1978.

Pinsonneault, A. and Heppel, N., “Anonymity in Group Support Systems Research: A New Conceptualization, Measure, and Contingency Framework,” Journal of Management Information Systems, Vol. 14, No. 3, pp. 89-108, 1997.

Podsakoff, P. M. and Organ, D. W., “Self-Reports in Organizational Research: Problems and Prospects,” Journal of Management, Vol. 12, No. 4, pp. 531-544, 1986.

Prentice-Dunn, S. and Rogers, R. W., “Effects of Public and Private Self- Awareness on Deindividuation and Aggression,” Journal of Personality and Social Psychology, Vol. 43, No. 3, 1982.

Ramaprasad, A. and Rai, A., “Envisioning Management of Information,” Omega, Vol. 24, No. 2, pp. 79-193, 1996.

Riva, G., Mantovani, F., Capideville, C. S., Preziosa, A., Morganti, F., Villani, D., Gaggioli, A., Botella, C., and Alcañiz, M., “Affective interactions using virtual reality: the link between presence and emotions,” Cyberpsychology & Behavior, Vol. 10, No. 1, pp. 45-56, 2007.

Siegel, J., Dubrovsky, V., Kiesler, S., and McGuire, T. W., “Group Processes in Computer-Mediated Communication,” Organizational Behavior and Human Decision Processes, Vol. 37, No. 2, pp. 157-187, 1986.

Slonje, R., and Smith, P. K., “Cyberbullying: Another Main Type of Bullying?,” Scandinavian Journal of Psychology, Vol. 49, No. 2, pp. 147-154, 2008.

Sourander, A., Brunstein Klomek, A., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T., and Helenius, H., “Psychosocial Risk Factors Associated with Cyberbullying among Adolescents: A Population-Based Study,” Archives of General Psychiatry, Vol. 67, No. 7, pp. 720-728, 2010.

Suler, J., “The Online Disinhibition Effect,” Cyberpsychology & behavior: the impact of the Internet, multimedia and virtual reality on behavior and society, Vol. 7, No. 3, pp. 321-326, 2004.

Tanis, M. and Postmes, T., “Two Faces of Anonymity: Paradoxical Effects of Cues to Identity in Cmc,” Computers in Human Behavior, Vol. 23, No. 2, pp. 955-970, 2007.

Whittaker, S., Terveen, L., Hill, W., and Cherny, L., “The Dynamics of Mass Interaction,” CSCW ’98: Proceedings of the 1998 ACM conference on Computer supported cooperative work: ACM Press, pp. 79-91, 1998.


  • There are currently no refbacks.