Computer harassment paradigm Flashcards

1
Q

What methodology was used?

A
  • Two lab experiments were conducted using the computer harassment paradigm.
  • Male uni students were exposed to different types of identity threat or no threat and were then given the opportunity to send pornographic material to a virtual female interaction partner.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the dependent variable in the study?

A

gender harassment behaviour: extent to which participants engaged in harassing behaviour toward virtual F interaction partner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What was the independent variable in the study?

A

social identity threats: legitimacy threat, distinctiveness threat, prototypicality threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is legitimacy threat?

A

participants led to believe their male identity was not legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is distinctiveness threat?

A

participants led to believe their male identity was not different from other identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is prototypicality threat?

A

participants led to believe their male identity was not prototypical within their group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How did authors control the independent variable?

A

ensured that participants only experienced one type of threat during the experiment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How were participants assigned to diff conditions?

A

random assignment to each threats and a control group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly