Computer harassment paradigm Flashcards
What methodology was used?
- Two lab experiments were conducted using the computer harassment paradigm.
- Male uni students were exposed to different types of identity threat or no threat and were then given the opportunity to send pornographic material to a virtual female interaction partner.
What is the dependent variable in the study?
gender harassment behaviour: extent to which participants engaged in harassing behaviour toward virtual F interaction partner
What was the independent variable in the study?
social identity threats: legitimacy threat, distinctiveness threat, prototypicality threat
What is legitimacy threat?
participants led to believe their male identity was not legitimate
What is distinctiveness threat?
participants led to believe their male identity was not different from other identities
What is prototypicality threat?
participants led to believe their male identity was not prototypical within their group
How did authors control the independent variable?
ensured that participants only experienced one type of threat during the experiment
How were participants assigned to diff conditions?
random assignment to each threats and a control group