Cyber Aggression Between Intentions and Abilities of Cyber Wellness of Student

Published: 25 Jan 2020 | Version 1 | DOI: 10.17632/59mzhd6r9g.1
Contributor(s):

Description of this data

This research is intentionally carried out to explain the behavior of cyber aggression students using the theory model planed of behavior. According to this theory, the behavior of cyber aggression is caused by the intention to carry out an attack. The intention to carry out attacks is influenced by three factors, namely subjective norms, attitudes, and perceived behavioral control. Furthermore, this study also provides an overview of the role of adolescent cyber wellness skills in the occurrence of cyber aggression behavior that is not based on the intention to carry out attacks online.

Experiment data files

Steps to reproduce

The data collection method is using a 1-4 Likert scale. All data collected is processed using WarpPLS 6.0 software. Of the (n= 291) total samplings of students females, 211 (72.5%) and males, 80 (27.5%) age range 15-21 years in high school students of Padang city Indonesia

Latest version

  • Version 1

    2020-01-25

    Published: 2020-01-25

    DOI: 10.17632/59mzhd6r9g.1

    Cite this dataset

    mardianto, Mardianto (2020), “Cyber Aggression Between Intentions and Abilities of Cyber Wellness of Student”, Mendeley Data, v1 http://dx.doi.org/10.17632/59mzhd6r9g.1

Statistics

Views: 7
Downloads: 0

Institutions

Universitas Negeri Padang

Categories

Educational Psychology, Cyber Attack

Licence

CC BY 4.0 Learn more

The files associated with this dataset are licensed under a Creative Commons Attribution 4.0 International licence.

What does this mean?
You can share, copy and modify this dataset so long as you give appropriate credit, provide a link to the CC BY license, and indicate if changes were made, but you may not do so in a way that suggests the rights holder has endorsed you or your use of the dataset. Note that further permission may be required for any content within the dataset that is identified as belonging to a third party.

Report