Literature DB >> 35368422

A Preliminary Validation of the Chinese Version of the Information Technology Identity Scale.

Peng Wang1, Haotian Liu1, Xiao Wang1, Xiqing Yuan1, Yu Sun1, Li Xiao1, Wenxuan Li1, Chong Ma1.   

Abstract

Background: Information technology has become an irreplaceable part of people's lives, and the interaction between information technology and self-identity has produced a new type of information technology (IT) identity. However, there is no measurement tool for this concept in China. The main aim of the study was to revise Carter's IT Identity Scale in the context of Chinese cultural background and to determine whether the Chinese version is congruent with the English version.
Methods: In this study, we revised the scale on the basis of the information technology identity scale developed by Carter, translated the scale according to the Chinese cultural environment. Our sample size was 408, and all of them were junior middle school students. After testing this sample, we carried out item analysis, validity analysis, and reliability analysis.
Results: (1) The correlation coefficients between each item and the total score were significant (0.775-0.885). (2) The three-factor structure (relatedness, dependence, emotional energy) of the Chinese version of the IT identity scale was consistent with the original scale. The values of the factor loadings of each item in the three factors of confirmatory factor analysis (CFA) were all greater than 0.700, and the model fit indexes (CFI, NFI, NNFI, TLI and IFI) were all greater than 0.900, indicating a good model fit. (3) Average variance extraction (AVE), composite reliability (CR), Pearson correlation, and the square root of AVE indicated good convergence and discriminant validity. (4) The ɑ coefficients and CR of the three dimensions (ie, relatedness, dependence, emotional energy) were all greater than 0.800, and the split coefficients were all greater than 0.800, indicating high reliability.
Conclusion: The Chinese version of the information technology identity scale presented satisfactory psychometric properties and shared many similarities with the original version. Ultimately, we revised an information technology identity scale suitable for Chinese culture.
© 2022 Wang et al.

Entities:  

Keywords:  information technology; information technology identity; scale revision; self-identity

Year:  2022        PMID: 35368422      PMCID: PMC8965015          DOI: 10.2147/PRBM.S352365

Source DB:  PubMed          Journal:  Psychol Res Behav Manag        ISSN: 1179-1578


Introduction

Information technology has become an irreplaceable part of people’s lives.1,2 This term refers to the various technologies that are used to manage and process information, including sensing technology, computer technology, and communication technology3 (eg, smartphones, MS Office, and WPS Office). The use of information technology has made a significant impact on all aspects of life, not only at material level but also on a spiritual level.4 It has long been reported that young people’s experiences are shaped by the interactions that they maintain within multiple social worlds.5 During this process, the self-identity of users and information technology interact with one another and result in a novel form of information technology identity (referred to as IT identity).6 Carter defined IT identity as a new type of identity, ie, the extent to which a person’s interactions with an IT are viewed as integral to his or her sense of self.1 This form of identity grows from interactions between individuals and information technology during which the use of information technology gives individuals many abilities that they did not have in the past, such as high efficiency, connectivity, and autonomy, that enable them to expand their self-understanding and construct a new identity. When separated from the interaction between individuals and information, as well as losing the capabilities of IT, individuals will experience self-shrinking. That is, due to the lack of information technology resources, individuals’ self-consciousness will shrink. For example, the separation from IT limits the channels for individuals to communicate with others, partially blocks individuals from maintaining social relations, and affects individual self-consciousness in social interaction, which further affects individuals’ IT identity.6

Literature Review

Identity

Psychologists and sociologists have carried out research on “identity” and constructed a variety of theories. These theories can be divided into Role Identity Theory,7,58 Personal Identity Theory,8 and Social Identity Theory,9 all of which emphasize the interaction between society and the self. As an intermediary between people’s behavior and social structures, individual identity is affected by social structure at the same time. It is also shaped people’s attitudes and behaviors. Thoits & Virshup identified clear boundaries between personal identity, role identity and social identity.10 They argued that generalized social identity works at both the individual and collective levels. On the individual level, identity functions as the self-identity of the individual, which is a variation of the social category used to describe “I am.” This categorization includes role identity, as it is described by McCall & Simmons and Stryker.11,12 At the collective level, identity is reflective of the overall group, which is a variation of the social category that describes “Who.” This categorization includes the narrow social identity proposed by Tajfel and Turner.13,14 Characteristics of both personal identity and social identity are simultaneously reflected in the self, but they have their differences. Personal identity is defined by characteristics unique to the individual, while social identity reflects the identity of self-social groups or categories and is the construction of social relationships in self and vast group categories. The difference between them is to be paid in self.15 The theoretical basis of identity is rooted in Mead’s symbolic interactionism and Burke’s identity control theory (ICT).12 The theory of symbolic interaction focuses on instances of indirect communication in which individuals communicate through “symbols”. The concept of the self is a combination of “I” and “Me.” “Me” refers to the self in the society formed through role play, and “I” refers to the independent individual who is not the object of consciousness. Mead believes that “self” originates from social interaction and that symbols play an important role in its development. ICT,12 affect control theory,16 and self-verification theory17 all conceptualize identity processes as control systems that regulate the perception of self-relevant meanings of actors.

The Relationship Between Identity and Information Technology

MeyRowitz was the first researcher to explore the relationship between information technology and identity. He noted that electronic media (eg, Twitter) have restructured patterns of social interaction, and that new technologies weaken and break down physical and social distances. According to MeyRowitz, in the constant renewal of new technologies, individuals will redefine the framework in which the self acquires cues, so as to influencing identity.18 Altheide further explained that information technology brings novel forms of interaction (eg, new options, organizations, and information presentation models) and creates new environments for self and recognition development.19 The keyboard opened new pathways of interaction and offered novel opportunities for collective dependence and flow.19 Carter asserted that IT is a unit of technology (ie, a hardware device, a software application, or a software application environment) that an individual consciously engages with, which is a concept that has implications about what types of IT are most likely to foster a strong IT identity.20 Currently, scholars use the concept of information technology identity to explain the identity generated by using information technology such as smart devices, social networking sites and social media, resulting in concepts such as social networking site identity and social media identity, but which are essentially information technology identities. A study showed that employees’ corporate social media identities can foster support among colleagues, which in turn has a positive impact on job performance and job satisfaction.21 A study on the reliability of patients reporting their health found that patients were asked to measure and report their health using health care services provided by smartphones in the absence of doctors and nurses, and that perceived mobile technology identity directly affected the reliability of self-reporting.22 Esmaeilzadeh’s research found that the identity verification process (IT characterizes through IT experience) fosters IT identity, which, in turn, encourages individuals to engage in beneficial post-adoption behaviors such as feature use and enhanced use.23 Tseng found in virtual retail environments, the characteristics of augmented-reality interactive technology—ownership control and rehears ability—may engender self-referencing, which further fosters information technological identity, then results in brand love.24 This shows that in the mobile information era, scholars are concerned with the application of IT identity theory in mobile IT usage research.

Role Identity

Role identity includes all of its internal changes and diversity, involving self and definition and division of others, inclusions and overall, is a recognition of a role of one thing in other things.7,58 Burke and Stets said role identity (eg, work role, parenting role, etc.) refers to internalized expectations about what it means to be competent while performing a certain role.25 Riley and Burke emphasized that the self-concept generated by role identity reflects that individuals obtain relevant information from others. They also asserted that role identity is a process of self-regulation in which individuals obtain meaning from self-attempts and role verification.26 Building on this perspective, Chen and Wang extend the concept role identity to user behavior in virtual communities, which is reflected in the user’s understanding of their own position and triggers role-playing behavior.27 The development of role identity and the stimulation of community attributes may trigger role conversion.28 In the context of people’s work lives, the use of information technology has an impact on individual work content and work efficiency. When people change their perception of the original work, that is the cognition of the original role. Information technology thus has an impact on role identity. Burke and Stets asserted that role identities are verified when individuals perform in ways that confirm their internalized expectations about what it means to be competent in a certain role.29 In other words, if people associate information technology with their own work roles, they use it to enhance recognition and maintain a sense of role identity. This maintenance thus ultimately enhances an individual’s acceptance of a certain type of technology. For instance, Kim et al found that online self-presentation motivated people to purchase avatars and decorative items on virtual community websites.8 In summary, people use information technology to buy things that match their roles as a means of reflecting their unique self-image and self-identity. The COVID-19 outbreak has had a huge impact on various industries. Teachers are teaching online through Internet platforms. As offline teaching is replaced by online teaching, teachers need to acquire a lot of information technology skills to adapt to online teaching. In the process of teaching and lesson preparation, teachers’ role identity has also changed.30,31

Personal Identity

In the context of social media, the anonymity of online social communication gives people more freedom to express their true feelings, expand their social networks, and strengthen their ties with others,32 which helps shape self-image and, in turn, strengthens the impact that information technology has on personal identity.24 The internet provides individuals with deficits in self-concept with a tempting environment to socially interact with others anonymously and to obtain success through Internet gaming or other such activities.33 According to Kokswijk, “for some adolescents, their virtual personas are at least as important as their real life image”.34 Valkenberg and Peter believe that adolescents are more willing to disclose their so-called true selves on the internet because the anonymous environment reduces social expectations and the risks of social sanction that exist in face‑to‑face interactions.35 Specifically, Valkenburg has said that cyberspace offers every individual an opportunity to instantly change their assumed identity and that avatars can provide adolescents with fun and safe ways to explore different personalities and express themselves while keeping their real identities secret.36 The anonymity of avatars can also give adolescents the courage to act out their fantasies in ways that they normally would not.9

Social Identity

Tajfel explained that the formation of social identity occurs when “An individual individual recognizes that he (or she) belongs to a specific social group, and at the same time recognizes the emotional and value meaning brought to him (or her) by being a member of the group”.37 Shotter once said that “The consciousness of the inner life is created through the linguistic communication that takes place in social life and discourse practice”.38 Other researchers working on related topics have found that individuals can improve their self-worth and self-esteem through social identity. Creating a social identity also strengthens the group as a whole by promoting group belonging, which often involves excluding other groups.39 In the context of the online communities, common topics and points of interest enhance social interaction, deepen emotional connections, and make people feel a strong sense of social identity within a given online space.40 Information technology thus has an impact on social identity. When people put emotion into their engagement with virtual network societies and create social identity, this identity also strengthens their investment in and use of the community.41 The relation between social identity, self-identity, and information technology is exemplified in a Chinese social networking service, ie, douban.com, which allows users to cultivate their interest and customize the features that work best for them.42 Personal interests are at the center of Douban user’s self-narrative and serve as the starting point for people to construct their self-identity.43 A user’s perception of their similarity to others who come from the same background (ie, us) and their perception of the differences that exist between them and other group members (ie, them) function as the conditions for constructing social identity.37 The social identity of Douban’s users is also created through the process of perceiving internal identity and external difference.44 Douban users can also “make like-minded Douban friends” based on their shared interests, which further kindles a sense of internal life and promotes self-narrative through user interactions.42 Interpersonal interaction allows individuals to “find more things that they might like and find more interest in”, which affects identity construction by expanding the field of self-narrative.45

The Expansion of Self-Identity by Information Technology

When individuals identify with a certain type of information technology, they demonstrate three types of perception: relatedness, dependence, and emotional energy.1 Relatedness refers to the degree to which the boundary between self and information technology becomes blurred and the individual develops a sense of connection to information technology. For example, a user might not be able to make a clear distinction between their own abilities and the abilities granted by information technology.1 Dependence refers to the degree of individual dependence on information technology. The more widely used a certain type of information technology is, the more people rely on it to achieve their goals. McMillan and Morrison have said that people are becoming increasingly dependent on the internet to sustain their relationships with family and friends and engage in work and play.24 Ling and Yttri have also commented that because new forms of communication allow for greater flexibility in coordination, people are becoming more reliant on them to meet social expectations.45 Emotional Energy refers to ongoing positive emotions that are associated with information technology, such as emotional attachment and enthusiasm. When people receive positive feedback while interacting with a certain information technology, they often experience positive emotions, such as confidence and trust, that encourage them to continue using the technology.4 Carter developed an IT identity scale containing the three factors of relatedness, dependence and emotional energy, and he examined how well the scale performed on the three factors. This process involved performing a factor analysis (principal axis factoring) with oblique rotation (ie, direct oblimin).46 Information technologies (eg, the internet, smartphones, and software) in China are developing rapidly, and their use is becoming commonplace. Researchers, government authorities, and parents are mostly concerned with the negative effects of information technology (shyness,47,48 loneliness,47,48 internet addiction,49 and depression50) and have neglected to examine its potential benefits, which has led to a relatively incomplete understanding of IT. Because of this, a measurement tool is urgently needed to assess the current status of information technology identity in China. For this reason, we revised Carter’s information technology identity scale with the aim of creating an instrument that can reliably and validly assess the identity of information technology within China’s cultural context.

Methods

Participants

Taking a class as a unit, we randomly selected 408 students (Mage=13.48, SD=0.914) from the eighth grade in the second affiliated middle school of Shandong normal University and Qilu Experimental School, five classes in total, as subjects to test the scale.The test is led by graduate students in psychology and all data completed in one collection. There was a moderate ratio between boys and girls, and their guardians signed a form that consented to their participation in the study.

Instrument

Information technology identity scale includes three factors: relatedness, dependence, and emotional energy.5 In the initial inventory, these three factors each included four items. After adjustment, each factor contained three items, for a total of nine items. Each item in the scale is scored on a five-point scale: strongly disagree, disagree, unsure, agree, and strongly agree. All items were positive and scored on a scale of 1 to 5 respectively. Carter measured IT identity by analyzing user experiences of MS Excel, a pervasive and well-established technology with a relatively unchanging feature set.5 He found evidence that IT identity can be measured using three factors that reflect the strength of positive self-identification with IT. The purpose of the current study was to test the applicability of this scale in the Chinese context. We maintained a three-factor structure for the scale but attributed three items to each of the factors instead of four.

Procedure of the Study

Shuttleworth and Cowief have explained that back translation is a process in which a text that has been translated into a given language is retranslated into a Second Language.51 The process is as follows: First, we invited psychology professors and graduate students to translate the IT Identity Scale developed by Carter, and after discussing it, a consensus was reached on the presentation of the items. Next, we sought out individuals who were proficient in English but not psychology to translate the Chinese scale into English and then discuss with them about the inconsistencies that existed between the original and translated versions. Additional language adjustments have been made to achieve the aim of ensuring that the English is consistent with the original version, and the final Chinese items have been formed by this approach. In China, many individuals and groups, especially enterprises and schools, use WPS Office for office work because WPS Office Personal Edition and Enterprise Edition can meet the different office requirements of individuals and enterprises.44 We replaced the MS Excel usage scenario with the WPS Office usage scenario. We made this shift because WPS Office better fits the context of Chinese work scenarios, and its functional design aligns with the thought processes of Chinese people.52 Although WPS Office’s current domestic market share is less than MS Office’s, its number of monthly active users increased by 8.8% within the first quarter of 2020.45 WPS Office has strong development prospects,53 so we decided to adopt its use situation as a substitute in the scale. Because there are three groups of questions in the original scale that hold similar meanings in the Chinese context, we integrated each group of questions into one item: Q3: When thinking about myself in relation to my WPS Office, I feel energized./When thinking about myself in relation to my WPS Office, I feel pumped up. Q6: When thinking about myself in relation to my WPS Office, I feel connected with WPS Office./When thinking about myself in relation to WPS Office, I feel linked with it. Q9: When thinking about myself in relation to WPS Office, I a feel dependent./When thinking about myself in relation to WPS Office, I feel reliant. According to existing research, the three-factor structure of Carter’s IT identity scale is universal.1,2,5,38 The purpose of this study is to verify the factor structure of the scale in the context of Chinese culture, assuming that there is a similar three-factor structure in our samples, so directly through confirmatory factor analysis, just like Bai et al.54–56 After the test, we sorted out the results and imported the structured data into IBM SPSS Statistics 26.0 and Mplus 8.3 for analysis, and the code we used was in the . We then analyzed the items according to the order. The purpose of the confirmatory factor analysis and the calculation of α coefficient was to check the reliability and validity of the scale according to the discrimination of the items of the scale according to the results. We checked whether the relationship between each item and the corresponding factor aligned with the theoretical relationship that existed between them in the original scale. Each item of the scale conformed to the language expression of Chinese cultural characteristics but did not change the structure of the original scale, which allowed us to determine the structure and items of the Chinese version of the scale based on the test results.

Results

Item Analysis

Analysis of the Discrimination of High and Low Groups

The results of the sample were divided into high and low groups according to the first 27% and the last 27%, and then item discrimination analysis was conducted. As Table 1 shows, there were significant differences between the high and low groups of all the items. A total of nine items were considered to be discriminative and were thus retained.
Table 1

Item Discrimination Analysis

ItemsGroup (M±SD)t
Low Grouping (n=123)High Grouping (n=120)
Q1: When thinking about myself in relation to WPS, I feel confident.2.51±1.044.70±0.6220.075**
Q2: When thinking about myself in relation to WPS, I feel enthusiastic.2.20±1.024.67±0.6023.093**
Q3: When thinking about myself in relation to WPS, I feel energized.2.24±1.004.68±0.6222.853**
Q4: When thinking about myself in relation to WPS, I feel in synch with the software.2.45±1.024.68±0.6220.724**
Q5: When thinking about myself in relation to WPS, I feel close with the software.2.24±0.924.68±0.5025.743**
Q6: When thinking about myself in relation to WPS, I feel connected with the software.2.19±0.934.60±0.5724.508**
Q7: When thinking about myself in relation to WPS, I feel like I need the software.2.45±1.074.65±0.5720.130**
Q8: When thinking about myself in relation to WPS, I feel like I can count on the software.2.51±1.134.78±0.5120.364**
Q9: When thinking about myself in relation to WPS, I feel dependent on the software.1.93±0.854.37±0.9620.943**
Information Technology identity20.72±6.0541.82±3.1234.298**

Notes: **p<0.01. Adapted with permission from Carter, Michelle, “Information Technology (IT) Identity: A Conceptualization, Proposed Measures, and Research Agenda” (2012). All Dissertations. 901. Available from: .2

Item Discrimination Analysis Notes: **p<0.01. Adapted with permission from Carter, Michelle, “Information Technology (IT) Identity: A Conceptualization, Proposed Measures, and Research Agenda” (2012). All Dissertations. 901. Available from: .2

Confirmatory Factor Analysis

As illustrated in Figure 1, confirmatory factor analysis (CFA) was carried out for a total of three factors and nine items. The sample size of this analysis was 408, which was more than 10 times the number of analysis items. The standardized factor loadings, which are depicted in Figure 1, exceeded 0.7 and ranged from 0.716 to 0.929. This result showed a strong correlation between the factor (latent variable) and the analysis items (explicit variable).
Figure 1

Three factors model.

Three factors model. As shown in Table 2, the ratio of chi-square to degree of freedom was a little higher (CFI=0.934 > 0.9, NFI=0.928 > 0.9, NNFI=0.901 > 0.9, TLI=0.901 > 0.9, IFI=0.934 > 0.9). These indexes met the criterions, so we can draw the conclusion that the fitting index of the model was good.
Table 2

The Three-Factor Model Indexes

Common IndexChi-Square Ratio of Degrees of Freedom χ2/dfCFINFINNFITLIIFI
Value9.8380.9340.9280.9010.9010.934
The Three-Factor Model Indexes

Convergence Validity

Confirmatory factor analysis (CFA) was conducted for three factors and nine items. As shown in Table 3, the AVE values of the three factors were all greater than 0.5, and the CR values were all higher than 0.7, which means that the scale had good convergence validity.
Table 3

Model AVE and CR Indexes Results

FactorAverage Variance Extraction (Ave Value)Combination Reliability (CR Value)
Emotional Energy0.7390.894
Relatedness0.7510.899
Dependence0.7040.877
Model AVE and CR Indexes Results

Discriminant Validity

As illustrated in Table 4, according to the analysis of discriminant validity, the square root of AVE square root values for the factors were 0.860, 0.867, and 0.839, which were greater than the maximum value of absolute correlation coefficient between factors (0.779), meaning that the scale had good discriminant validity.
Table 4

Pearson Correlation and AVE Square Root Value

Emotional EnergyRelatednessDependence
Emotional Energy0.860
Relatedness0.7790.867
Dependence0.6740.7770.839

Note: Diagonal number is the square root of AVE.

Pearson Correlation and AVE Square Root Value Note: Diagonal number is the square root of AVE.

Coefficients of Internal Consistency

As Table 5 shown, the reliability coefficient was 0.939, which indicated that the reliability quality of the research data was very high. The reliability coefficient did not increase significantly after any item was deleted, which meant that the item should not be deleted.
Table 5

Cronbach α Coefficient

NameAlpha Coefficient of Deleted ItemCronbach α Coefficient
Q10.9350.939
Q20.933
Q30.93
Q40.934
Q50.929
Q60.928
Q70.932
Q80.932
Q90.936
Cronbach α Coefficient

Calculation of Reliability of Subscale

As shown in Table 6, the Cronbach reliability coefficients of the three subscales were all greater than 0.8, which indicated that the reliability quality of the subscale was high.
Table 6

Reliability Coefficient of Each Subscale of IT Identity

SubscaleNCronbach α Coefficient
Emotional Energy30.889
Relatedness30.890
Dependence30.875
Reliability Coefficient of Each Subscale of IT Identity

Discussion

In making several revisions to the original scale, we developed an IT identity scale that is applicable to Chinese culture and achieved the overall aim of this study. After analysis, the revised scale performed well on all indicators. We did two important things when revising the scale. Firstly, the IT identity scale developed by Carter was based on the MS Office environment, in China, WPS Office is used in many scenarios because of its convenience and comprehensive functions, so we replaced the MS Office environment with WPS Office when revising the scale. Secondly, in the original scale, there were three factors, each containing four items, and in the revision process, we combined two of the items into one for each factor because their meanings were consistent in Chinese context: in the emotional energy dimension, “energized” and “pumped up” both indicate that the individual is energetic when using the WPS Office, and in the relatedness dimension, “connected with” and “linked” both indicate that the individual is connected to the WPS Office when using it; in the dependence dimension, “dependent and reliant” both indicate that the individual is dependent on the WPS Office. In the factor analysis, the factors loading of all items exceeded 0.7. The feasibility of adopting the same three-factor model used to assess the MS Office environment to measure IT identity in the context of WPS Office was verified. According CFA, the indexes were good. After localization, the modified model’s indexes (ie, χ2/ DF, CFI, and NNFI) are similar to those of the original model.2 We believe that the reasons for this result are as follows: (1) After translation and back translation, the sentence structure and meaning of the items in the questionnaire were revised locally, and the scale was reduced according to the repetition of the items, which aligned with the reading and analytical habits of Chinese people. (2) The attributes of WPS were similar to those of MS Office. (3) The structure of our scale was similar to Carter’s.46 The IT identity of WPS Office also assumed a three-factor structure, which verified our hypothesis. We thus determined that the same scale structure can be used to measure IT identity in the contexts of both WPS and MS Office. Moreover, due to the good indicators, there is no need to modify the item expression and questionnaire structure. Information technology is developing rapidly and it has become one of the indispensable resources for individuals. As Cater says, IT identity has become part of an individual’s sense of self,1 and relevant researchers have identified the positive significance of IT identity for people in the areas of healthcare,22,23 consumption,24 and Education.30,31 This study was conducted in a Chinese cultural context, and the Chinese version of the IT Identity Scale performed well, providing a reliable and valid measurement tool for scholars in related field. However, this study did face several limitations that need to be addressed. First, our sample differed from Carter’s in that our participants consisted of junior high school students, while his were mostly individuals between the ages of 20 and 49 (59%). Our group was less representative of the overall domestic cultural demographics, so we suggest that future studies expand the scope of the sample in order to make it more representative. Second, we decided to focus on the use of WPS Office instead of the use of MS Excel in order to align our approach with the Chinese cultural context, but a proportional group of people who use MS Office does exist in China. In 2020, Carter and his team examined two platforms while analyzing desktop computing: MS Excel, a pervasive and establishing technology with a relatively unchanging feature set, and mobile devices, which were more dynamic and emergent. They examined smartphones within the context of IT consumerization (ie, employees’ use of consumer technologies in the workplace for work-related purposes).57 Unlike Carter and his team, we only measured IT identity in one situation, which is an element that we need to improve in a follow-up study. We carried out item analysis, confirmatory factor analysis, and alpha coefficient analysis and proved good performance; however, if possible, we need to analyze multiple situations and clarify the stability of the scale in order to conduct further retesting of the initial sample group.

Conclusion

Based on Carter’s IT Identity Scale, we have revised the scale to obtain a Chinese version of the IT Identity Scale. After various analyses, the revised scale has good psychometric properties and can measure affective energy, relatedness, and independence dimensions related to IT identity. The Chinese version of the IT Identity Scale provides researchers with a reliable and valid tool for measuring identity in information technology.
  9 in total

1.  The theory of planned behaviour: self-identity, social identity and group norms.

Authors:  D J Terry; M A Hogg; K M White
Journal:  Br J Soc Psychol       Date:  1999-09

2.  Who visits online dating sites? Exploring some characteristics of online daters.

Authors:  Patti M Valkenburg; Jochen Peter
Journal:  Cyberpsychol Behav       Date:  2007-12

Review 3.  Integrating psychological and neurobiological considerations regarding the development and maintenance of specific Internet-use disorders: An Interaction of Person-Affect-Cognition-Execution (I-PACE) model.

Authors:  Matthias Brand; Kimberly S Young; Christian Laier; Klaus Wölfling; Marc N Potenza
Journal:  Neurosci Biobehav Rev       Date:  2016-08-30       Impact factor: 8.989

Review 4.  Identity negotiation: where two roads meet.

Authors:  W B Swann
Journal:  J Pers Soc Psychol       Date:  1987-12

5.  Virtual Reality for Teletherapy: Avatars May Combine the Benefits of Face-to-Face Communication with the Anonymity of Online Text-Based Communication.

Authors:  Lily A Baccon; Elodie Chiarovano; Hamish G MacDougall
Journal:  Cyberpsychol Behav Soc Netw       Date:  2018-12-12

6.  The Effect of Shyness on Adolescent Network Problem Behavior: The Role of Gender and Loneliness.

Authors:  Peng Wang; Yun Yan; Fengqiang Gao; Ruifang Zhang; Jun Wang; Xiangping Zhan; Yu Tian
Journal:  Front Psychol       Date:  2020-06-03

7.  Examination of the Coping Flexibility Hypothesis Using the Coping Flexibility Scale-Revised.

Authors:  Tsukasa Kato
Journal:  Front Psychol       Date:  2020-12-11

8.  Relationships Between Social Support, Loneliness, and Internet Addiction in Chinese Postsecondary Students: A Longitudinal Cross-Lagged Analysis.

Authors:  Shujie Zhang; Yu Tian; Yi Sui; Denghao Zhang; Jieru Shi; Peng Wang; Weixuan Meng; Yingdong Si
Journal:  Front Psychol       Date:  2018-09-11
  9 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.