Cyber Aggression Between Intentions and Abilities of Cyber Wellness of Students

Published: 25 Jan 2020 | Version 2 | DOI: 10.17632/5gg5fw8dhm.2
Contributor(s):

Description of this data

This research is intentionally carried out to explain the behavior of cyber aggression students using the theory model planed of behavior. According to this theory, the behavior of cyber aggression is caused by the intention to carry out an attack. The intention to carry out attacks is influenced by three factors, namely subjective norms, attitudes, and perceived behavioral control. Furthermore, this study also provides an overview of the role of adolescent cyber wellness skills in the occurrence of cyber aggression behavior that is not based on the intention to carry out attacks online.

Experiment data files

  • New folder
    Cite

Steps to reproduce

The data collection method is using a 1-4 Likert scale. All data collected is processed using WarpPLS 6.0 software. Instrument testing is needed before data analysis is carried out, instrument testing is carried out with validity and reliability tests Of the (n= 291) total samplings of students females, 211 (72.5%) and males, 80 (27.5%) age range 15-21 years in high school students of Padang city Indonesia.

Latest version

  • Version 2

    2020-01-25

    Published: 2020-01-25

    DOI: 10.17632/5gg5fw8dhm.2

    Cite this dataset

    mardianto, Mardianto (2020), “Cyber Aggression Between Intentions and Abilities of Cyber Wellness of Students”, Mendeley Data, v2 http://dx.doi.org/10.17632/5gg5fw8dhm.2

Statistics

Views: 5
Downloads: 0

Previous versions

Compare to version

Institutions

Universitas Negeri Padang, Universitas Negeri Malang

Categories

Educational Psychology, Applied Social Psychology, Communication Psychology, Cyber Attack

Licence

CC BY 4.0 Learn more

The files associated with this dataset are licensed under a Creative Commons Attribution 4.0 International licence.

What does this mean?
You can share, copy and modify this dataset so long as you give appropriate credit, provide a link to the CC BY license, and indicate if changes were made, but you may not do so in a way that suggests the rights holder has endorsed you or your use of the dataset. Note that further permission may be required for any content within the dataset that is identified as belonging to a third party.

Report