Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-8ctnn Total loading time: 0 Render date: 2024-12-27T23:59:59.661Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  11 April 2024

Aaron Cohen
Affiliation:
University of Haifa
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
The Cyber Predators
Dark Personality and Online Misconduct and Crime
, pp. 332 - 375
Publisher: Cambridge University Press
Print publication year: 2024

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abell, L., & Brewer, G. (2014). Machiavellianism, self-monitoring, self-promotion and relational aggression on Facebook. Computers in Human Behavior, 36, 258262. https://doi.org/10.1016/j.chb.2014.03.076CrossRefGoogle Scholar
Aboujaoude, E., & Savage, M. W. (2023). Cyberbullying: Next‐generation research. World Psychiatry, 22(1), 4546. https://doi.org/10.1002/wps.21040CrossRefGoogle ScholarPubMed
Achuthan, K., Nair, V. K., Kowalski, R., Ramanathan, S., & Raman, R. (2022). Cyberbullying research – Alignment to sustainable development and impact of COVID-19: Bibliometrics and science mapping analysis. Computers in Human Behavior. https://doi.org/10.1016/j.chb.2022.107566Google Scholar
Afzal, W., Latif, S., & Siddique, A. (2021). Dark Triad, cyberbullying and psychological distress among adolescents. Education Sciences & Psychology, 59(2), 7176.Google Scholar
Ahmad, H., Arif, A., Khattak, A. M., Habib, A., Asghar, M. Z., & Shah, B. (2020). Applying deep neural networks for predicting Dark Triad personality trait of online users. 2020 International Conference on Information Networking (ICOIN), 102–105.CrossRefGoogle Scholar
Akat, M., Arslan, C., & Hamarta, E. (2022). Dark Triad personality and phubbing: The mediator role of Fomo. Psychological Reports. https://doi.org/10.1177/00332941221109119Google ScholarPubMed
Akdeniz, S., Budak, H., & Ah21çi, Z. G. (2022). Development of a scale of narcissism in social media and investigation of its psychometric characteristics. International Education Studies, 15(1), 200209. https://doi.org/10.5539/ies.v15n1p200CrossRefGoogle Scholar
Akhter, S., Islam, M. H., Haider, S. K. U., Ferdous, R., & Runa, A. S. (2022). Moderating effects of gender and passive Facebook use on the relationship between social interaction anxiety and preference for online social interaction. Journal of Human Behavior in the Social Environment, 32(6), 719737. https://doi.org/10.1080/10911359.2021.1955801CrossRefGoogle Scholar
Alavi, M., Latif, A. A., Ramayah, T., & Tan, J. Y. (2022). Dark tetrad of personality, cyberbullying, and cybertrolling among young adults. Current Psychology, 111. https://doi.org/10.1007/s12144-022-03892-4Google Scholar
Alipan, A., Skues, J., Theiler, S., & Wise, L. (2015). Defining cyberbullying: A multiple perspectives approach. In Annual Review of Cybertherapy and Telemedicine: Virtual Reality in Healthcare: Medical Simulation and Experiential Interface (Vol. 219, pp. 9–13). https://doi.org/10.3233/978-1-61499-595-1-9CrossRefGoogle Scholar
Alotaibi, F. M., Asghar, M. Z., & Ahmad, S. (2021). A hybrid CNN-LSTM model for psychopathic class detection from tweeter users. Cognitive Computation, 13(3), 709723.CrossRefGoogle Scholar
Alqahtani, N., Innab, A., Alammar, K., Alkhateeb, R., Kerari, A., & Alharbi, M. (2022). Cyberloafing behaviours in nursing: The role of nursing stressors. International Journal of Nursing Practice, Early view, 110 https://doi.org/10.1111/ijn.13079Google ScholarPubMed
Aluja, A., Garcia, L. F., Rossier, J., Ostendorf, F., Glicksohn, J., Oumar, B., … & Hansenne, M. (2022). Dark triad traits, social position, and personality: A cross-cultural study. Journal of Cross-Cultural Psychology, 53(3–4), 380402. https://doi.org/10.1177/00220221211072816CrossRefGoogle Scholar
American Psychiatric Association. (1987). Diagnostic and Statistical Manual of Mental Disorders (3rd ed., Revised (DSM-III-R)). Washington, DC: American Psychiatric Press.Google Scholar
American Psychiatric Association. (2000). Diagnostic and Statistical Manual of Mental Disorders (4th ed., text revision). Washington, DC: American Psychiatric Association.Google Scholar
American Psychiatric Association. (2013). Diagnostic and Statistical Manual of Mental Disorders (DSM-5). Retrieved from www.psi.uba.ar/academica/carrerasdegrado/psicologia/sitioscatedras/practicas_profesionales/820_clinica_tr_personalidad_psicosis/material/dsm.PdfGoogle Scholar
Amichai-Hamburger, Y. (2005). Personality and the Internet. In Amichai-Hamburger, Y. (Ed.), The Social Net: Human Behavior in Cyberspace (pp. 2755). Oxford University Press.Google Scholar
Amon, M. J., Necaise, A., Kartvelishvili, N., Williams, A., Solihin, Y., & Kapadia, A. (2023). Modeling user characteristics associated with interdependent privacy perceptions on social media. ACM Transactions on Computer-Human Interaction. http://dx.doi.org/10.1145/3577014CrossRefGoogle Scholar
Andel, S. (January 2020). Why bosses should let employees surf the web at work. The Conversation. Retrieved from https://theconversation.com/why-bosses-should-let-employees-surf-the-web-at-work-128444Google Scholar
Andreassen, C. S. (2015). Online social network site addiction: A comprehensive review. Current Addiction Reports, 2(2), 175184. https://doi.org/10.1007/s40429-015-0056-9CrossRefGoogle Scholar
Andreassen, C. S., & Pallesen, S. (2014). Social network site addiction – An overview. Current Pharmaceutical Design, 20, 40534061.CrossRefGoogle ScholarPubMed
Andreassen, C. S., Pallesen, S., & Griffiths, M. D. (2017). The relationship between addictive use of social media, narcissism, and self-esteem: Findings from a large national survey. Addictive Behaviors, 64, 287293. https://doi.org/10.1016/j.addbeh.2016.03.006CrossRefGoogle ScholarPubMed
Ansari, S. (2020). From the scammer perspective: Predispositions towards online fraud motivation and rationalization. Doctoral dissertation, Purdue University Graduate School.Google Scholar
Antoniadou, N., Kokkinos, C. M., & Markos, A. (2019). Psychopathic traits and social anxiety in cyber-space: A context-dependent theoretical framework explaining online disinhibition. Computers in Human Behavior, 99, 228234.CrossRefGoogle Scholar
Aplin-Houtz, M. J., Leahy, S., Willey, S., Lane, E. K., Sharma, S., & Meriac, J. (2023). Tales from the dark side of technology acceptance: The Dark Triad and the technology acceptance model. Employee Responsibilities and Rights Journal, 133. https://doi.org/10.1007/s10672-023-09453-6Google Scholar
Asghar, J., Akbar, S., Asghar, M. Z., Ahmad, B., Al-Rakhami, M. S., & Gumaei, A. (2021) Detection and classification of psychopathic personality trait from social media text using deep learning model. Computational and Mathematical Methods in Medicine, 5512241. https://doi.org/10.1155/2021/5512241Google Scholar
Asih, S. R. (2023). The Dark Triad personality in relation to cyberbullying: The role of self-esteem as a mediator [Hubungan Kepribadian Dark Triad dan Cyberbullying: Peran Self-Esteem Sebagai Mediator]. ANIMA Indonesian Psychological Journal, 38(1), 038104. https://doi.org/10.24123/aipj.v38i1.4113CrossRefGoogle Scholar
Aviram, I., & Amichai-Hamburger, Y. (2005). Online infidelity: Aspects of dyadic satisfaction, self-disclosure, and narcissism. Journal of Computer-Mediated Communication, 10(3), JCMC1037. https://doi.org/10.1111/j.1083-6101.2005.tb00249.xGoogle Scholar
Azami, M. S., & Taremian, F. (2021). Risk factors associated with cyberbullying, cyber victimization, and cyberbullying-victimization in Iran’s high school students. Iranian Journal of Psychiatry, 16(3), 343352. https://doi.org/10.18502/ijps.v16i3.6261Google ScholarPubMed
Azzahra, K. A., & Sihwi, S. W. (August 2022). Dark Triad personality traits prediction through Twitter analysis using support vector machine method. In 2022 1st International Conference on Smart Technology, Applied Informatics, and Engineering (APICS) (pp. 102–107). IEEE.Google Scholar
Babiak, P., & Hare, R. D. (2006). Snakes in Suits: When Psychopaths Go to Work. New York: Regan Books.Google Scholar
Baheer, R., Khan, K. I., Rafiq, Z., & Rashid, T. (2023). Impact of Dark Triad personality traits on turnover intention and mental health of employees through cyberbullying. Cogent Business & Management, 10(1), 2191777. https://doi.org/10.1080/23311975.2023.2191777CrossRefGoogle Scholar
Balakrishnan, V., Khan, S., & Arabnia, H. R. (2020). Improving cyberbullying detection using Twitter users’ psychological features and machine learning. Computers & Security, 90, 101710. https://doi.org/10.1016/j.cose.2019.101710CrossRefGoogle Scholar
Balakrishnan, J., & Griffiths, M. D. (2018). An exploratory study of “Selfitis” and the development of the Selfitis behavior scale. International Journal of Mental Health Addiction, 16(3), 722736. https://doi.org/10.1007/s11469-017-9844-xCrossRefGoogle ScholarPubMed
Balakrishnan, V., Khan, S., Fernandez, T., & Arabnia, H. R. (2019). Cyberbullying detection on twitter using big five and Dark Triad features. Personality and Individual Differences, 141, 252257. https://doi.org/10.1016/j.paid.2019.01.024CrossRefGoogle Scholar
Balcerowska, J. M., Sawicki, A., Brailovskaia, J., & Zajenkowski, M. (2023). Different aspects of narcissism and social networking sites addiction in Poland and Germany: The mediating role of positive and negative reinforcement expectancies. Personality and Individual Differences, 207, 112172. https://doi.org/10.1016/j.paid.2023.112172CrossRefGoogle Scholar
Balcerowska, J. M., & Sawicki, A. J. (2022). Which aspects of narcissism are related to social networking sties addiction? The role of self-enhancement and self-protection. Personality and Individual Differences, 190, 111530. https://doi.org/10.1016/j.paid.2022.111530CrossRefGoogle Scholar
Balta, S., Jonason, P., Denes, A., Emirtekin, E., Tosuntaş, Ş. B., Kircaburun, K., & Griffiths, M. D. (2019). Dark personality traits and problematic smartphone use: The mediating role of fearful attachment. Personality and Individual Differences, 149, 214219. https://doi.org/10.1016/j.paid.2019.06.005CrossRefGoogle Scholar
Bańka, A., & Orłowski, K. (2012). The structure of the teacher Machiavellianism model in social interactions in a school environment. Polish Psychological Bulletin, 43(4), 215222. https://doi.org/10.2478/v10059-012-0024-3CrossRefGoogle Scholar
Bank Info Security. (August 24, 2022). 2022 Ponemon cost of insider threats global report. Retrieved from www.bankinfosecurity.com/whitepapers/2022-ponemon-cost-insider-threats-global-report-w-10798Google Scholar
Barber, N. (1998). Sex differences in disposition towards kin, security of adult attachment, and sociosexuality as a function of parental divorce. Evolution and Human Behaviour, 19(2), 125132. https://doi.org/10.1016/S1090-5138(98)00004-XCrossRefGoogle Scholar
Barberis, N., Sanchez-Ruiz, M. J., Cannavò, M., Calaresi, D., Verrastro, V. (2023). The Dark Triad and trait emotional intelligence as predictors of problematic social media use and engagement: The mediating role of the fear of missing out. Clinical Neuropsychiatry, 20(2), 129140. https://doi.org/10.36131/cnfioritieditore20230205Google ScholarPubMed
Barry, C. T., & Kauten, R. L. (2014). Nonpathological and pathological narcissism: Which self-reported characteristics are most problematic in adolescents? Journal of Personality Assessment, 96(2), 212219. https://doi.org/10.1080/00223891.2013.830264CrossRefGoogle ScholarPubMed
Basit, A., Zafar, M., Liu, X., Javed, A. R., Jalil, Z., & Kifayat, K. (2021). A comprehensive survey of Al-enabled phishing attacks detection techniques. Telecommunication Systems, 76, 139154. https://doi.org/10.1007/s11235-020-00733-2CrossRefGoogle Scholar
Baughman, H.M., Dearing, S., Giammarco, E., & Vernon, P.A. (2012). Relationships between bullying behaviors and the Dark Triad: A study with adults. Personality and Individual Differences, 52, 571–75. https://doi.org/10.1016/j.paid.2011.11.020CrossRefGoogle Scholar
Bergman, S. M., Fearrington, M. E., Davenport, S. W., & Bergman, J. Z. (2011). Millennials, narcissism, and social networking: What narcissists do on social networking sites and why. Personality and Individual Differences, 50(5), 706711. https://doi.org/10.1016/j.paid.2010.12.022CrossRefGoogle Scholar
Bernat, F. P., & Makin, D. (2014). Cybercrime theory and discerning if there is a crime: The case of digital piracy. International Review of Modern Sociology, 99119. www.jstor.org/stable/43499904Google Scholar
Bertl, B., Pietschnig, J., Tran, U. S., Stieger, S., & Voracek, M. (2017). More or less than the sum of its parts? Mapping the Dark Triad of personality onto a single Dark Core. Personality and Individual Differences, 114, 140144. https://doi.org/10.1016/j.paid.2017.04.002CrossRefGoogle Scholar
Bhasin, D., & Mehta, A. (2019). Cyber stalking: New age terror. International Journal of Law Management Humanities, 2, 320328. www.brainyquote.com/quotes/willowbay_531432Google Scholar
Bhattacharyya, R. (2015). Addiction to modern gadgets and technologies across generations. Eastern Journal of Psychiatry, 18(2), 2737.CrossRefGoogle Scholar
Bhogal, M. S., & Wallace, D. (2022). Cost-inflicting mate retention tactics predict the perpetration of cyber dating abuse. Evolutionary Psychological Science, 8, 19. https://doi.org/10.1007/s40806-021-00307-8CrossRefGoogle Scholar
Bilal, A., Nadeem, A., & Saleem, M. (2022). Cyber-psychopathy trait as predictor of cybersex addiction among university students. Pakistan Journal of Humanities and Social Sciences, 10(1), 2028. https://doi.org/10.52131/pjhss.2022.1001.0170CrossRefGoogle Scholar
Björkqvist, K., Lagerspetz, K. M., & Kaukiainen, A. (1992). Do girls manipulate and boys fight? Developmental trends in regard to direct and indirect aggression. Aggressive Behavior, 18(2), 117127. https://doi.org/10.1002/1098-2337(1992)18:2<117::AID-AB2480180205>3.0.CO;2-33.0.CO;2-3>CrossRefGoogle Scholar
Błachnio, A., Przepiorka, A., Cudo, A., Sękowski, A., & Pantic, I. (2023). The role of Machiavellianism and interdependent agency in Facebook intrusion. Psychological Reports. https://doi-org.ezproxy.haifa.ac.il/10.1177/00332941231153321CrossRefGoogle ScholarPubMed
Blain, M. (2022). Political victimage ritual and evil. In Dryjanska, L., & Pacifici, G. (Eds.), Evil in the Modern World. Cham: Springer. https://doi-org.ezproxy.haifa.ac.il/10.1007/978-3-030-91888-0_8Google Scholar
Blais, J., Aelick, C. A., Scully, J. M., & Pruysers, S. (2023). Antisocial personality traits as potential risk factors for cyberstalking: Not all Dark Triad traits matter. SSRN. https://ssrn.com/abstract=4546645 or https://dx.doi.org/10.2139/ssrn.4546645CrossRefGoogle Scholar
Blickle, G., & Schütte, N. (2017). Trait psychopathy, task performance, and counterproductive work behavior directed toward the organization. Personality and Individual Differences, 109, 225231. https://doi.org/10.1016/j.paid.2017.01.006CrossRefGoogle Scholar
Blötner, C., & Beisemann, M. (2022). The Dark Triad is dead, long live the Dark Triad: An item-response theoretical examination of the Short Dark Tetrad. Personality and Individual Differences, 199, 111858. https://doi.org/10.1016/j.paid.2022.111858CrossRefGoogle Scholar
Blötner, C., & Mokros, A. (2023). The next distinction without a difference: Do psychopathy and sadism scales assess the same construct? Personality and Individual Differences, 205, 112102. https://doi-org.ezproxy.haifa.ac.il/10.1016/j.paid.2023.112102CrossRefGoogle Scholar
Board, B. J., & Fritzon, K. (2005). Disordered personalities at work. Psychology, Crime & Law, 11(1), 1732. https://doi.org/10.1080/10683160310001634304CrossRefGoogle Scholar
Boddy, C. (2011). Corporate Psychopaths: Organizational Destroyers. London: Palgrave Macmillan. https://doi.org/10.1108/09534811211214008CrossRefGoogle Scholar
Bogolyubova, O., Panicheva, P., Tikhonov, R., Ivanov, V., & Ledovaya, Y. (2018). Dark personalities on Facebook: Harmful online behaviors and language. Computers in Human Behavior, 78, 151159. https://doi.org/10.1016/j.chb.2017.09.032CrossRefGoogle Scholar
Bohns, V. (February 22, 2022). How scammers like Anna Delvey and the Tinder Swindler exploit a core feature of human nature. The Conversation. Retrieved from https://interaksyon.philstar.com/trends-spotlights/2022/02/22/211224/how-scammers-like-anna-delvey-and-the-tinder-swindler-exploit-a-core-feature-of-human-nature/Google Scholar
Bonfá-Araujo, B., Lima-Costa, A. R., Hauck-Filho, N., & Jonason, P. K. (2022). Considering sadism in the shadow of the Dark Triad traits: A meta-analytic review of the Dark Tetrad. Personality and Individual Differences, 197, 111767. https://doi.org/10.1016/j.paid.2022.111767CrossRefGoogle Scholar
Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history and scholarship. Journal of Computer-Mediated Communication, 13(1), 210230. https://doi.org/10.1111/j.1083-6101.2007.00393.xCrossRefGoogle Scholar
Brailovskaia, J., Margraf, J., & Köllner, V. (2019). Addicted to Facebook? Relationship between Facebook addiction disorder, duration of Facebook use and narcissism in an inpatient sample. Psychiatry Research, 273, 5257. https://doi.org/10.1016/j.psychres.2019.01.016CrossRefGoogle Scholar
Brailovskaia, J., Ozimek, P., Rohmann, E., & Bierhoff, H. W. (2023). Vulnerable narcissism, fear of missing out (FoMO) and addictive social media use: A gender comparison from Germany. Computers in Human Behavior, 144, 107725. https://doi.org/10.1016/j.chb.2023.107725CrossRefGoogle Scholar
Brand, M., Wegmann, E., Stark, R., Müller, A., Wölfling, K., Robbins, T. W., & Potenza, M. N. (2019). The Interaction of Person-Affect-Cognition-Execution (I-PACE) model for addictive behaviors: Update, generalization to addictive behaviors beyond internet-use disorders, and specification of the process character of addictive behaviors. Neuroscience & Biobehavioral Reviews, 104, 110. https://doi.org/10.1016/j.neubiorev.2019.06.032CrossRefGoogle ScholarPubMed
Branković, I., Dinić, B. M., & Jonason, P. K. (2022). How traditional stalking and cyberstalking correlate with the Dark Tetrad traits? Current Psychology, 15. https://doi-org.ezproxy.haifa.ac.il/10.1007/s12144-022-03681-zGoogle Scholar
Branson, M., & March, E. (2021). Dangerous dating in the digital age: Jealousy, hostility, narcissism, and psychopathy as predictors of Cyber Dating Abuse. Computers in Human Behavior, 119, 106711. https://doi.org/10.1016/j.chb.2021.106711CrossRefGoogle Scholar
Brewer, G., Parkinson, M., Pickles, A., Anson, J., & Mulinder, G. (2023). Dark Triad traits and relationship dissolution. Personality and Individual Differences, 204, 112045. https://doi.org/10.1016/j.paid.2022.112045CrossRefGoogle Scholar
Brod, C. (1984). Technostress: The Human Cost of the Computer Revolution. Reading, MA: Addison-Wesley, 1984.Google Scholar
Brown, W. M., Hazraty, S., & Palasinski, M. (2019). Examining the Dark Tetrad and its links to cyberbullying. Cyberpsychology, Behavior, and Social Networking, 22(8), 552557. https://doi.org/10.1089/cyber.2019.0172CrossRefGoogle ScholarPubMed
Broz, M. (2023). Photutorial, How many pictures are there (2023): Statistics, trends, and forecasts. Retrieved from https://photutorial.com/photos-statistics/Google Scholar
Brubaker, P. J., Montez, D., & Church, S. H. (2021). The power of schadenfreude: predicting behaviors and perceptions of trolling among Reddit users. Social Media + Society, 7(2), 20563051211021382. https://doi.org/10.1177/20563051211021382CrossRefGoogle Scholar
Brunell, A. B., Gentry, W. A., Campbell, W. K., Hoffman, B. J., Kuhnert, K. W., & DeMarree, K. G. (2008). Leader emergence: The case of the narcissistic leader. Personality and Social Psychology Bulletin, 34(12), 16631676. https://doi.org/10.1177/0146167208324101CrossRefGoogle ScholarPubMed
Buckels, E. E., Jones, D. N., & Paulhus, D. L. (2013). Behavioral confirmation of everyday sadism. Psychological Science, 24(11), 22012209. https://doi.org/10.1177/0956797613490749CrossRefGoogle ScholarPubMed
Buckels, E. E., Trapnell, P. D., Andjelovic, T., & Paulhus, D. L. (2019). Internet trolling and everyday sadism: Parallel effects on pain perception and moral judgment. Journal of Personality, 87(2), 328340. https://doi-org.ezproxy.haifa.ac.il/10.1111/jopy.12393CrossRefGoogle ScholarPubMed
Buckels, E. E., Trapnell, P. D., & Paulhus, D. L. (2014). Trolls just want to have fun. Personality and Individual Differences, 67, 97102. https://doi.org/10.1016/j.paid.2014.01.016CrossRefGoogle Scholar
Buffardi, L. E., & Campbell, W. K. (2008). Narcissism and social networking web sites. Personality and Social Psychology Bulletin, 34(10), 13031314. https://doi.org/10.1177/0146167208320061CrossRefGoogle ScholarPubMed
Bui, N. H., & Pasalich, D. S. (2021). Insecure attachment, maladaptive personality traits, and the perpetration of in-person and cyber psychological abuse. Journal of Interpersonal Violence, 36(5–6), 21172139. https://doi.org/10.1177/0886260518760332CrossRefGoogle ScholarPubMed
Burtӑverde, V., Jonason, P. K., Giosan, C., & Ene, C. (2021). Why do people watch porn? An evolutionary perspective on the reasons for pornography consumption. Evolutionary Psychology, 19(2), 14747049211028798. https://doi.org/10.1177/14747049211028798CrossRefGoogle Scholar
Calvert, M., Linden, M., Kyser, K., Zeinert, K., & Foust, M. S. (2021). Personality correlates of gaming and pornography use. Psi Beta Journal of Research, 1(1), 3440. https://doi.org/10.54581/JPWV2620Google Scholar
Campbell, K. (March 15, 2022). The science behind the tinder swindler catfishing, romance scams, and how to protect yourself. Psychology Today. Retrieved from www.psychologytoday.com/intl/blog/more-chemistry/202203/the-science-behind-the-tinder-swindlerGoogle Scholar
Campbell, W. K., Bonacci, A. M., Shelton, J., Exline, J. J., & Bushman, B. J. (2004). Psychological entitlement: Interpersonal consequences and validation of a self-report measure. Journal of Personality Assessment, 83(1), 2945. https://doi.org/10.1207/s15327752jpa8301_04CrossRefGoogle ScholarPubMed
Campbell, W. K., Hoffman, B. J., Campbell, S. M., & Marchisio, G. (2011). Narcissism in organizational contexts. Human Resource Management Review, 21(4), 268284. https://doi.org/10.1016/j.hrmr.2010.10.007Google Scholar
Carpenter, C. J. (2012). Narcissism on Facebook: Self-promotional and anti-social behavior. Personality and Individual Differences, 52(4), 482486. https://doi.org/10.1016/j.paid.2011.11.011CrossRefGoogle Scholar
Carre, J. R., Curtis, S. R., & Jones, D. N. (2018). Ascribing responsibility for online security and data breaches. Managerial Auditing Journal, 33(4), 436446. https://doi.org/10.1108/MAJ-11-2017-1693CrossRefGoogle Scholar
Casale, S., & Banchi, V. (2020). Narcissism and problematic social media use: A systematic literature review. Addictive Behaviors Reports, 11, 100252. https://doi.org/10.1016/j.abrep.2020.100252CrossRefGoogle ScholarPubMed
Casale, S., & Fioravanti, G. (2018). Why narcissists are at risk for developing Facebook addiction: The need to be admired and the need to belong. Addictive Behaviors, 76, 312318. https://doi.org/10.1016/j.addbeh.2017.08.038CrossRefGoogle ScholarPubMed
Chabrol, H., Van Leeuwen, N., Rodgers, R., & Séjourné, N. (2009). Contributions of psychopathic, narcissistic, Machiavellian, and sadistic personality traits to juvenile delinquency. Personality and Individual Differences, 47(7), 734739.CrossRefGoogle Scholar
Chamie, J. (2022). Dating in a changing America. In Population Levels, Trends, and Differentials. Cham: Springer. https://doi.org/10.1007/978-3-031-22479-9_44CrossRefGoogle Scholar
Chandler, D., & Munday, R. (2019). Revenge porn. Dictionary of Social Media. Oxford University Press. Retrieved from www.oxfordreference.com/view/10.1093/acref/9780191803093.001.0001/acref-9780191803093-e-1231Google Scholar
Charlier, S. D., Giumetti, G. W., Reeves, C. J., & Greco, L. M. (2017). Workplace cyberdeviance. In Hertel, G., Stone, D. L., Johnson, R. D., & Passmore, J. (Eds.), Wiley Blackwell Handbooks in Organizational Psychology. The Wiley Blackwell Handbook of the Psychology of the Internet at Work (pp. 131156). Wiley-Blackwell. https://doi.org/10.1002/9781119256151.ch7CrossRefGoogle Scholar
Charalampous, K., Ioannou, M., Georgiou, S., & Stavrinides, P. (2021). Cyberbullying, psychopathic traits, moral disengagement, and school climate: The role of self-reported psychopathic levels and gender. Educational Psychology, 41(3), 282301. https://doi.org/10.1080/01443410.2020.1742874CrossRefGoogle Scholar
Chavan, M., Galperin, B. L., Ostle, A., & Behl, A. (2021). Millennial’s perception on cyberloafing: Workplace deviance or cultural norm? Behaviour & Information Technology, 118. https://doi.org/10.1080/0144929X.2021.1956588Google Scholar
Chen, J. (November 2020). Second World. Investopedia. Retrieved from www.investopedia.com/terms/s/second-world.aspGoogle Scholar
Cheng, Z. W., & Lee, S. L. (2022). Victimizing the psychopaths and Machiavellians online, but not the charming narcissists: The insignificance of powerlessness. Journal of Social and Educational Research, 1(1), 113. www.journalser.com/jser/article/view/6Google Scholar
Cheng, C., & Li, A. Y. L. (2014). Internet addiction prevalence and quality of (real) life: A meta-analysis of 31 nations across seven world regions. Cyberpsychology, Behavior, and Social Networking, 17(12), 755760. https://doi.org/10.1089/cyber.2014.0317CrossRefGoogle ScholarPubMed
Choi, Y. (2018). Narcissism and social media addiction in workplace. Journal of Asian Finance, Economics and Business, 5(2), 95104. https://doi.org/10.13106/jafeb.2018.vol5.no2.95CrossRefGoogle Scholar
Choi, Y., Chu, K., & Choi, E. J. (2019). Social network services addiction in the workplace. The Journal of Asian Finance, Economics and Business, 6(1), 249259. http://doi.org/10.13106/jafeb.2019.vol6.no1.249CrossRefGoogle Scholar
Choi, W. H., Son, J. W., Kim, Y. R., Lee, S. I., Shin, C. J., Kim, S. K., & Ju, G. W. (2011). A study of covert narcissism in adolescent Internet addiction: Relationship to anonymity, presence, interactivity, and achievement motivation. Journal of the Korean Academy of Child and Adolescent Psychiatry, 22(2), 103111. https://doi.org/10.5765/jkacap.2011.22.2.103CrossRefGoogle Scholar
Christie, R., & Geis, F. L. (1970). Studies in Machiavellianism. New York, NY: Academic Press.Google Scholar
Christensen, L. (2022). How to protect yourself from the Tinder Swindler and similar psychopaths. Mental Health Matters, 9(1), 89.Google Scholar
Chung, K. L., Morshidi, I., Yoong, L. C., & Thian, K. N. (2019). The role of the Dark Tetrad and impulsivity in social media addiction: Findings from Malaysia. Personality and Individual Differences, 143, 6267. https://doi.org/10.1016/j.paid.2019.02.016CrossRefGoogle Scholar
Ciocca, G., Robilotta, A., Fontanesi, L., Sansone, A., D’Antuono, L., Limoncin, E., … & Jannini, E. A. (2020). Sexological aspects related to Tinder use: A comprehensive review of the literature. Sexual Medicine Reviews, 8(3), 367378. https://doi.org/10.1016/j.sxmr.2019.12.004CrossRefGoogle ScholarPubMed
Clancy, E. M., Klettke, B., & Hallford, D. J. (2019). The dark side of sexting – factors predicting the dissemination of sexts. Computers in Human Behavior, 92, 266272. https://doi.org/10.1016/j.chb.2018.11.023CrossRefGoogle Scholar
Clancy, E. M., Klettke, B., Hallford, D. J., Crossman, A. M., Maas, M. K., & Toumbourou, J. W. (2020). Sharing is not always caring: Understanding motivations and behavioural associations with sext dissemination. Computers in Human Behavior, 112, 106460. https://doi.org/10.1016/j.chb.2020.106460CrossRefGoogle Scholar
Cleckley, H. (1941/1988). The Mask of Sanity (5th ed.), Private Printing for Educational Use by Emily Cleckley 1988 (Formerly first published by C.V. Mosley Co.in 1941). Georgia: Augusta.Google Scholar
Cohen, A. (2016). Are they among us? A conceptual framework of the relationship between the Dark Triad personality and counterproductive work behaviors (CWBs). Human Resource Management Review, 26(1), 6985. https://doi.org/10.1016/j.hrmr.2015.07.003CrossRefGoogle Scholar
Cohen, A. (2018). Counterproductive Work Behaviors: Understanding the Dark Side of Personalities in Organizational Life. New York: Routledge. https://doi.org/10.4324/9781315454818CrossRefGoogle Scholar
Cohen, A., & Baruch, Y. (2022). Abuse and exploitation of doctoral students: A conceptual model for traversing a long and winding road to academia. Journal of Business Ethics, 180(2), 505522. https://doi-org.ezproxy.haifa.ac.il/10.1007/s10551-021-04905-1CrossRefGoogle Scholar
Coleman, F. L. (1997). Stalking behavior and the cycle of domestic violence. Journal of Interpersonal Violence, 12(3), 420432. https://doi.org/10.1177/088626097012003007CrossRefGoogle Scholar
Coles, B. A., & West, M. (2016). Trolling the trolls: Online forum users constructions of the nature and properties of trolling. Computers in Human Behavior, 60, 233244. https://doi.org/10.1016/j.chb.2016.02.070CrossRefGoogle Scholar
Cooke, D. J., & Michie, C. (2001). Refining the construct of psychopathy: Towards a hierarchical model. Psychological Assessment, 13(2), 171188. https://doi.org/10.1037/1040-3590.13.2.171CrossRefGoogle ScholarPubMed
Coyne, I., & Farley, S. (2018). Cyberbullying within working contexts. In Cassidy, W., Faucher, C., & Jackson, M. (Eds.), Cyberbullying at University in International Contexts, (1st Edition, pp. 8096). Abingdon, UK: Routledge.CrossRefGoogle Scholar
Craker, N., & March, E. (2016). The dark side of Facebook: The Dark Tetrad, negative social potency, and trolling behaviours. Personality and Individual Differences, 102, 7984. https://doi.org/10.1016/j.paid.2016.06.043CrossRefGoogle Scholar
Cressey, D. R. (1953). Other People’s Money. Montclair, NJ: Patterson Smith.Google Scholar
Cristescu, I., Ciuperca, E. M., & Cirnu, C. E. (2022). Exploiting personality traits in social engineering attacks. Romanian Journal of Information Technology & Automatic Control/Revista Românӑ de Informaticӑ și Automaticӑ, 32(1), 113122.CrossRefGoogle Scholar
Curtis, S. R., Basak, A., Carre, J. R., Bošanský, B., Černý, J., BenAsher, N., Gutierrez, M., Jones, D. N., & Kiekintveld, C. (2021). The Dark Triad and strategic resource control in a competitive computer game. Personality and Individual Differences, 168, 110343. https://doi.org/10.1016/j.paid.2020.110343CrossRefGoogle Scholar
Curtis, S. R., & Jones, D. N. (2020). Understanding what makes dark traits “vulnerable”: A distinction between indifference and hostility. Personality and Individual Differences, 160, 109941. https://doi.org/10.1016/j.paid.2020.109941CrossRefGoogle Scholar
Curtis, S. R., Rajivan, P., Jones, D. N., & Gonzalez, C. (2018). Phishing attempts among the Dark Triad: Patterns of attack and vulnerability. Computers in Human Behavior, 87, 174182. https://doi.org/10.1016/j.chb.2018.05.037CrossRefGoogle Scholar
Daderman, A. M., & Ragnestål-Impola, C. (2019). Workplace bullies, not their victims, score high on the Dark Triad and Extraversion, and low on Agreeableness and Honesty-Humility. Heliyon, 5(10), 19. https://doi.org/10.1016/j.heliyon.2019. e02609CrossRefGoogle Scholar
DarkOwl. (2021). Increased threat to food delivery services on the Darknet. Retrieved from www.darkowl.com/blog-content/increased-threat-to-food-delivery-services-on-the-darknetGoogle Scholar
DataProt. (May 5, 2023). Piracy is back: Piracy statistics for 2023. Retrieved from https://dataprot.net/statistics/piracy-statistics/Google Scholar
da Silva, P. G. N., da Fonseca, P. N., de Medeiros, E. D., Couto, R. N., & Pereira, R. S. (2021). Intimate Partner Cyberstalking Scale (IPCS): Evidências Psicométricas no Brasil. Revista Iberoamericana de Diagnóstico y Evaluación Psicológica, 2(59), 517.CrossRefGoogle Scholar
DataReportal. (2023). Digital around the world. Retrieved from https://datareportal.com/global-digital-overviewGoogle Scholar
Davidson, G., Higgleton, E., Sargeant, H., & Seaton, A. (eds.), (1994). Chambers Pocket Dictionary. Edinburgh: Chambers.Google Scholar
DeAndrea, D. C. (2014). Advancing warranting theory. Communication Theory 24(2), 186204. https://doi.org/10.1111/comt.12033CrossRefGoogle Scholar
De Groot, J. (May 6, 2023). What are social engineering attacks? (Types & Definition). Digital Guardian. Retrieved from www.digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attackGoogle Scholar
de Jesus Costa, B., Simões, A. M., & Relva, I. C. (2023). Psychopathic traits and cyber dating abuse: Mediating effect of internet addiction in a university student sample. Journal of Forensic Psychology Research and Practice, 23(2), 113135. https://doi.org/10.1080/24732850.2021.2016116CrossRefGoogle Scholar
DeLisi, M., Drury, A., Elbert, M., Tahja, K., Caropreso, D., & Heinrichs, T. (2017). Sexual sadism and criminal versatility: Does sexual sadism spillover into nonsexual crimes? Journal of Aggression, Conflict and Peace Research, 9(1), 212. https://doi.org/10.1108/JACPR-05-2016-0229CrossRefGoogle Scholar
Demircioğlu, Z. I., & Çıkan, F. (2021). Effects of the Dark Triad Personality Traits on Cyberbullying: A Meta-Analysis. Presented at the International Congress of Psychology, Praha, Çek Cumhuriyeti, 2021. Accessed on July 23, 2021. Retrieved from https://hdl.handle.net/11511/93430Google Scholar
Demircioğlu, Z. I., & Köse, A. G. (2021). Effects of attachment styles, Dark Triad, rejection sensitivity, and relationship satisfaction on social media addiction: A mediated model. Current Psychology, 40, 414428.CrossRefGoogle Scholar
Demircioğlu, Z. I., & Köse, A. G. (2022). Antecedents of problematic social media use and cyberbullying among adolescents: Attachment, the Dark Triad and rejection sensitivity. Current Psychology. https://doi.org/10.1007/s12144-022-04127-2Google ScholarPubMed
Demircioğlu, Z. I., & Köse, A. G. (2023). Mediating roles of impulsivity and risk-taking in the links of the Dark Triad with flirting and dating via social media. Psikoloji Çalışmaları, 42(3), 643665. https://doi.org/10.26650/SP2021-1018862CrossRefGoogle Scholar
Dey, D. (2022). Perception/Deception: Fictional Selves and the Peculiarly Digital Phenomenon of Catfishing. Asiascape: Digital Asia, 9(1–2), 95118. https://doi-org.ezproxy.haifa.ac.il/10.1163/22142312-bja10029CrossRefGoogle Scholar
Djuraskovic, O. (2023). Top Instagram statistics for 2023. https://firstsiteguide.com/instagram-stats/Google Scholar
Dow, G. T. (2023). The Dark Tetrad and malevolent creativity. In Kapoor, H., & Kaufman, J. C. (Eds.), Creativity and Morality (pp. 6980). Academic Press. https://doi.org/10.1016/B978-0-323-85667-6.00010-4CrossRefGoogle Scholar
Drouvelis, M., Gerson, J., Powdthavee, N., & Riyanto, Y. E. (2022). Identity misrepresentation in cyberspace erodes human cooperation. SSRN. https://doi.org/10.2139/ssrn.4014880CrossRefGoogle Scholar
Duffy, A., March, E., & Jonason, P. K. (2023). Intimate partner cyberstalking: Exploring vulnerable narcissism, secondary psychopathy, borderline traits, and rejection sensitivity. Cyberpsychology, Behavior, and Social Networking, 26(3), 147152. https://doi-org.ezproxy.haifa.ac.il/10.1089/cyber.2022.0167CrossRefGoogle ScholarPubMed
Duncan, Z., & March, E. (2019). Using Tinder to start a fire: Predicting antisocial use of Tinder® with gender and the Dark Tetrad. Personality and Individual Differences, 145, 914. https://doi.org/10.1016/j.paid.2019.03.014CrossRefGoogle Scholar
Ehman, A. C., & Gross, A. M. (2019). Sexual cyberbullying: Review, critique, & future directions. Aggression and Violent Behavior, 44, 8087. https://doi.org/10.1016/j.avb.2018.11.001CrossRefGoogle Scholar
Eksi, F. (2012). Examination of narcissistic personality traits’ predicting level of internet addiction and cyber bullying through path analysis. Educational Sciences: Theory and Practice, 12(3), 16941706.Google Scholar
El Keshky, M. E. S., Al-Qarni, M. S., & Khayat, A. H. (2022). Adaptation and psychometric properties of an Arabic version of the smartphone addiction scale (SAS) in the context of Saudi Arabia. Addictive Behaviors, 131, 107335. https://doi.org/10.1016/j.addbeh.2022.107335CrossRefGoogle Scholar
Fagade, T., Spyridopoulos, T., Albishry, N., & Tryfonas, T. (July 2017). System dynamics approach to malicious insider cyber-threat modelling and analysis. In International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 309321). Cham: Springer.Google Scholar
Fan, C. Y., Chu, X. W., Zhang, M., & Zhou, Z. K. (2019). Are narcissists more likely to be involved in cyberbullying? Examining the mediating role of self-esteem. Journal of Interpersonal Violence, 34(15), 31273150.CrossRefGoogle ScholarPubMed
Farooq, R., & Ashraf, R. (2022). Dark trait tetrad and online deception in TikTok users. Applied Psychology Review, 1(1), 2033. https://journals.umt.edu.pk/index.php/aprCrossRefGoogle Scholar
Fegan, R. B., & Bland, A. R. (2021). Social media use and vulnerable narcissism: The differential roles of oversensitivity and egocentricity. International Journal of Environmental Research and Public Health, 18(17), 9172. https://doi.org/10.3390/ijerph18179172CrossRefGoogle ScholarPubMed
Fennimore, A., & Sementelli, A. (2016). Public entrepreneurship and sub-clinical psychopaths: A conceptual frame and implications. International Journal of Public Sector Management, 29(6), 612634. https://doi.org/10.1108/IJPSM-01-2016-0011CrossRefGoogle Scholar
Ferenczi, N., Marshall, T. C., & Bejanyan, K. (2017). Are sex differences in antisocial and prosocial Facebook use explained by narcissism and relational self-construal? Computers in Human Behavior, 77, 2531. https://doi.org/10.1016/j.chb.2017.08.033CrossRefGoogle Scholar
Fichman, P., & Sanfilippo, M. R. (2016). Online Trolling and Its Perpetrators: Under the Cyberbridge. Lanham, MD: Rowman & Littlefield.Google Scholar
Fido, D., Rao, J., & Harper, C. A. (2022). Celebrity status, sex, and variation in psychopathy predicts judgements of and proclivity to generate and distribute deepfake pornography. Computers in Human Behavior, 129, 107141. https://doi.org/10.1016/j.chb.2021.107141CrossRefGoogle Scholar
Fisher, W. A., & Barak, A. (2001). Internet pornography: A social psychological perspective on internet sexuality. Journal of Sex Research, 38(4), 312323. https://doi.org/10.1080/00224490109552102CrossRefGoogle Scholar
Fletcher, E. (2021). Romance scams take record dollars in 2020. Federal Trade Commission. Retrieved from www.ftc.gov/news-events/data-visualizations/data-spotlight/2021/02/romance-scams-take-record-dollars-2020#end2Google Scholar
Ford, D. P. (2013). Virtual harassment: Media characteristics’ role in psychological health. Journal of Managerial Psychology, 28(4), 408428. https://doi.org/10.1108/JMP-12-2012-0398CrossRefGoogle Scholar
Foster, J. D., Campbell, W. K., & Twenge, J. M. (2003). Individual differences in narcissism: Inflated self-views across the lifespan and around the world. Journal of Research in Personality, 37, 469486. http://dx.doi.org/10.1016/S0092-6566(03)00026-6CrossRefGoogle Scholar
Fox, J., & Rooney, M. C. (2015). The Dark Triad and trait self-objectification as predictors of men’s use and self-presentation behaviors on social networking sites. Personality and Individual Differences, 76, 161165. https://doi.org/10.1016/j.paid.2014.12.017CrossRefGoogle Scholar
Freud, S. (1914/91). On narcissism: An introduction. In Sandler, J., Person, E., & Fonagy, P. (Eds.), Freud’s “On Narcissism: An Introduction”. New Haven, CT: Yale University Press. https://doi.org/10.1080/00754170600563638Google Scholar
Freyth, L., & Batinic, B. (2021). How bright and dark personality traits predict dating app behavior. Personality and Individual Differences, 168, 110316. https://doi.org/10.1016/j.paid.2020.110316CrossRefGoogle Scholar
Freyth, L., Batinic, B., & Jonason, P. K. (2023). Social media use and personality: Beyond self-reports and trait-level assessments. Personality and Individual Differences, 202. https://doi.org/10.1016/j.paid.2022.111960CrossRefGoogle Scholar
Furian, L., & March, E. (2023). Trolling, the Dark Tetrad, and the four-facet spectrum of narcissism. Personality and Individual Differences, 208, 112169. https://doi.org/10.1016/j.paid.2023.112169CrossRefGoogle Scholar
Furtner, M. R., Maran, T., & Rauthmann, J. F. (2017). Dark leadership: The role of leaders’ Dark Triad personality traits. In Clark, M., & Gruber, C. (Eds.), Leader Development Deconstructed: Annals of Theoretical Psychology, vol 15 (pp. 7599). Cham: Springer. https://doi.org/10.1007/978-3-319-64740-1_4CrossRefGoogle Scholar
Gaia, J., Murray, D., Sanders, G., Sanders, S., Upadhyaya, S., Wang, X., & Yoo, C. (January 2022). The interaction of dark traits with the perceptions of apprehension. In Proceedings of the 55th Hawaii International Conference on System Sciences. Retrieved from https://hdl.handle.net/10125/79612978-0-9981331-5-7Google Scholar
Gaia, J., Ramamurthy, B., Sanders, G., Sanders, S., Upadhyaya, S., Wang, X., & Yoo, C. (2020). Psychological profiling of hacking potential. Paper presented at the Hawaii International Conference on System Sciences, Hawaii, USA.CrossRefGoogle Scholar
Gaia, J., Sanders, G. L., Sanders, S. P., Upadhyaya, S., Wang, X., & Yoo, C. W. (2021). Dark Traits and hacking potential. Journal of Organizational Psychology, 21(3). https://doi.org/10.33423/jop.v21i3.4307Google Scholar
Gajda, A., Moroń, M., Królik, M., Małuch, M., & Mraczek, M. (2022). The Dark Tetrad, cybervictimization, and cyberbullying: The role of moral disengagement. Current Psychology. https://doi.org/10.1007/s12144-022-03456-6Google Scholar
Gamache, D., Savard, C., Faucher, J., & Cloutier, M. È. (2021). Development and validation of the stalking and obsessive relational intrusions questionnaire (SORI-Q). Journal of Interpersonal Violence, 08862605211042808. https://doi.org/10.1177/08862605211042808Google ScholarPubMed
Gammon, A. R., Converse, P. D., Lee, L. M., & Griffith, R. L. (2011). A personality process model of cyber harassment. International Journal of Management and Decision Making, 11(5–6), 358378. https://doi.org/10.1504/IJMDM.2011.043409CrossRefGoogle Scholar
Garcia, M. A., Lerma, M., Perez, M. G., Medina, K. S., Rodriguez-Crespo, A., & Cooper, T. V. (2023). Psychosocial and personality trait associates of phubbing and being phubbed in Hispanic emerging adult college students. Current Psychology, 114. https://doi-org.ezproxy.haifa.ac.il/10.1007/s12144-023-04767-yGoogle ScholarPubMed
Garcia, D., & Sikström, S. (2014). The dark side of Facebook: Semantic representations of status updates predict the Dark Triad of personality. Personality and Individual Differences, 67, 9296. https://doi.org/10.1016/j.paid.2013.10.001CrossRefGoogle Scholar
Garrido, E. C., Issa, T., Esteban, P. G., & Delgado, S. C. (2021). A descriptive literature review of phubbing behaviors. Heliyon 7(5), e07037. https://doi.org/10.1016/j.heliyon.2021.e07037CrossRefGoogle Scholar
Gavin, J., & Scott, A. J. (2019). Attributions of victim responsibility in revenge pornography. Journal of Aggression, Conflict and Peace Research, 11(4), 263272. https://doi-org.ezproxy.haifa.ac.il/10.1108/JACPR-03-2019-0408CrossRefGoogle Scholar
Geary, C., March, E., & Grieve, R. (2021). Insta-identity: Dark personality traits as predictors of authentic self-presentation on Instagram. Telematics and Informatics, 63, 101669. https://doi.org/10.1016/j.tele.2021.101669CrossRefGoogle Scholar
Gibb, Z. G., & Devereux, P. G. (2014). Who does that anyway? Predictors and personality correlates of cyberbullying in college. Computers in Human Behavior, 38, 816. https://doi.org/10.1016/j.chb.2014.05.009CrossRefGoogle Scholar
Giumetti, G. W., & Kowalski, R. M. (2022). Cyberbullying via social media and well-being. Current Opinion in Psychology, 45, 101314. https://doi.org/10.1016/j.copsyc.2022.101314CrossRefGoogle ScholarPubMed
Giumetti, G. W., Kowalski, R. M., & Feinn, R. S. (2022). Predictors and outcomes of cyberbullying among college students: A two wave study. Aggressive Behavior, 48(1), 4054. https://doi.org/10.1002/ab.21992CrossRefGoogle Scholar
Giumetti, G. W., McKibben, E. S., Hatfield, A. L., Schroeder, A. N., & Kowalski, R. M. (2012). Cyber incivility @ work: The new age of interpersonal deviance. Cyberpsychology, Behavior, and Social Networking, 15, 148154. https://doi.org/10.1089/cyber.2011.0336CrossRefGoogle ScholarPubMed
Gnambs, T., & Appel, M. (2018). Narcissism and social networking behavior: A meta‐analysis. Journal of Personality, 86(2), 200212. https://doi-org.ezproxy.haifa.ac.il/10.1111/jopy.12305CrossRefGoogle ScholarPubMed
Gonzalez, J. M., & Greitemeyer, T. (2018). The relationship between everyday sadism, violent video game play, and fascination with weapons. Personality and Individual Differences, 124, 5153. https://doi.org/10.1016/j.paid.2017.11.045CrossRefGoogle Scholar
Goodboy, A. K., & Martin, M. M. (2015). The personality profile of a cyberbully: Examining the Dark Triad. Computers in Human Behavior, 49, 14. https://doi.org/10.1016/j.chb.2015.02.052CrossRefGoogle Scholar
GOV UK. (2015). Revenge porn. Retrieved from www.gov.uk/government/publications/revenge-pornGoogle Scholar
Greitemeyer, T. (2015). Everyday sadism predicts violent video game preferences. Personality and Individual Differences, 75, 1923. https://doi-org.ezproxy.haifa.ac.il/10.1016/j.paid.2014.10CrossRefGoogle Scholar
Greitemeyer, T., & Sagioglou, C. (2017). The longitudinal relationship between everyday sadism and the amount of violent video game play. Personality and Individual Differences, 104, 238242. https://doi.org/10.1016/j.paid.2016.08.021CrossRefGoogle Scholar
Grieve, R., Lang, C. P., & March, E. (2021). More than a preference for online social interaction: Vulnerable narcissism and phubbing. Personality and Individual Differences, 175, 110715. https://doi.org/10.1016/j.paid.2021.110715CrossRefGoogle Scholar
Grieve, R., & March, E. (2021). “Just checking”: Vulnerable and grandiose narcissism subtypes as predictors of phubbing. Mobile Media & Communication, 9(2), 195209. https://doi.org/10.1177/2050157920942276CrossRefGoogle Scholar
Grigg, D. W. (2010). Cyber-aggression: Definition and concept of cyberbullying. Journal of Psychologists and Counsellors in Schools, 20(2), 143156. https://doi.org/10.1375/ajgc.20.2.143Google Scholar
Grijalva, E., & Harms, P. D. (2014). Narcissism: An integrative synthesis and dominance complementarity model. The Academy of Management Perspectives, 28(2), 108127. http://dx.doi.org/10.5465/amp.2012.0048CrossRefGoogle Scholar
Grubbs, J. B., Tahk, R., Fernandez, D. P., Fernandez, E. F., & Ley, D. (2023). Pornography and pride: Antagonism drives links between narcissism and perceived addiction to pornography. Journal of Research in Personality (2023), https://doi.org/10.1016/j.jrp.2023.104419CrossRefGoogle Scholar
Gruda, D., McCleskey, J., & Khoury, I. (2023). Cause we are living in a Machiavellian world, and I am a Machiavellian major: Machiavellianism and academic major choice. Personality and Individual Differences, 205, 112096. https://doi.org/10.1016/j.paid.2023.112096CrossRefGoogle Scholar
Gunasekara, P. B., & Senaratne, C. (March 2019). Psychopathy prediction and factorial classification on Twitter profiles. In 2019 IEEE 5th International Conference for Convergence in Technology (I2CT) (pp. 1–3). IEEE.CrossRefGoogle Scholar
Gylfason, H. F., Sveinsdottir, A. H., Vésteinsdóttir, V., & Sigurvinsdottir, R. (2021). Haters gonna hate, trolls gonna troll: The personality profile of a Facebook troll. International Journal of Environmental Research and Public Health, 18(11), 5722. https://doi.org/10.3390/ijerph18115722CrossRefGoogle ScholarPubMed
Hacker. (January 28, 2023). In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/HackerGoogle Scholar
Hacktivism. (May 4, 2023). In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/HacktivismGoogle Scholar
Hamarta, E., Akat, M., & Akbulut, Ö. F. (2023). Dark Triad personality and online trolling: The mediating role of empathy. European Journal of Psychology and Educational Research, 6(1), 4553. https://doi.org/10.12973/ejper.6.1.45CrossRefGoogle Scholar
Hancock, J. T., Woodworth, M., & Boochever, R. (2018). Psychopaths online: The linguistic traces of psychopathy in email, text messaging and Facebook. Media and Communication, 6, 8392. https://doi.org/10.17645/mac.v6i3.1499CrossRefGoogle Scholar
Hand, C. J., Ingram, J., Glover, K., Brodie, Z. P., & Scott, G. G. (2022). Perceptions of female celebrity abuse on Twitter: Initial tweet valence, abuse volume, and observer Dark Tetrad characteristic effects. Abuse Volume, and Observer Dark Tetrad Characteristic Effects. https://ssrn-com.ezproxy.haifa.ac.il/abstract=4234899Google Scholar
Hand, C. J., & Scott, G. G. (2022). Beautiful victims: How the halo of attractiveness impacts judgments of celebrity and lay victims of online abuse. Computers in Human Behavior, 107157. https://doi.org/10.1016/j.chb.2021.107157CrossRefGoogle Scholar
Hand, C. J., Scott, G. G., Brodie, Z. P., Ye, X., & Sereno, S. C. (2021). Tweet valence, volume of abuse, and observers’ Dark Tetrad personality factors influence victim-blaming and the perceived severity of twitter cyberabuse. Computers in Human Behavior Reports, 3, 100056. https://doi.org/10.1016/j.chbr.2021.100056CrossRefGoogle Scholar
Hanson, L., & Baker, D. L. (2017). “Corporate psychopaths” in public agencies? Journal of Public Management & Social Policy, 24(1), 2141. https://digitalscholarship.tsu.edu/jpmsp/vol24/iss1/3Google Scholar
Hardaker, C. (2010). Trolling in asynchronous computer-mediated communication: From user discussions to academic definitions. Journal of Politeness Research, 6(2), 215242. https://doi.org/10.1515/jplr.2010.011CrossRefGoogle Scholar
Hare, R. D. (1999). Without Conscience: The Disturbing World of the Psychopaths among Us. New York, NY: Guilford Press.Google Scholar
Harewell, J. L., Pina, A., & Storey, J. E. (2021). Cyberstalking: Prevalence, characteristics, and impact. In Powell, A., Flynn, A., & Sugiura, L. (Eds.), The Palgrave Handbook of Gendered Violence and Technology. Cham: Palgrave Macmillan. https://doi.org/10.1007/978-3-030-83734-1_11Google Scholar
Harms, P. D., Marbut, A., Johnston, A. C., Lester, P., & Fezzey, T. (2022). Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats. Journal of Information Security and Applications, 71, 103378. https://doi.org/10.1016/j.jisa.2022.103378CrossRefGoogle Scholar
Harper, C. A., Fido, D., & Petronzi, D. (2021). Delineating non-consensual sexual image offending: Towards an empirical approach. Aggression and Violent Behavior, 58, e101547. https://doi.org/10.1016/j.avb.2021.101547CrossRefGoogle Scholar
Harper, C. A., Smith, L., Leach, J., Daruwala, N. A., & Fido, D. (2022). Development and validation of the beliefs about revenge pornography questionnaire. Sexual Abuse. https://doi.org/10.1177/10790632221082663Google ScholarPubMed
Harrison, A., Summers, J., & Mennecke, B. (2018). The effects of the Dark Triad on unethical behavior. Journal of Business Ethics, 153, 5377. https://doi.org/10.1007/s10551-016-3368-3CrossRefGoogle Scholar
Hassanein, M., Rady, S., Hussein, W., & Gharib, T. F. (2021). Predicting the Dark Triad for social network users using their personality characteristics. International Journal for Computers & Their Applications, 28(4), 204211.Google Scholar
Hayes, N. L., Marsee, M. A., & Russell, D. W. (2020). Latent profile analysis of traditional and cyber-aggression and victimization: Associations with Dark Triad traits and psychopathology symptoms. Journal of Psychopathology and Behavioral Assessment, 114. https://doi.org/10.1007/s10862-020-09835-2Google Scholar
Hearn, J., & Hall, M. (2022). From physical violence to online violation: Forms, structures and effects: A comparison of the cases of “domestic violence” and “revenge pornography”. Aggression and Violent Behavior, 101779. https://doi.org/10.1016/j.avb.2022.101779CrossRefGoogle Scholar
Heatherington, W., & Coyne, I. (2014). Understanding individual experiences of cyberbullying encountered through work. International Journal of Organizational Theory and Behavior, 17, 163192. https://doi.org/10.1108/IJOTB-17-02-2014-B002CrossRefGoogle Scholar
Henle, C. A., & Blanchard, A. L. (2008). The interaction of work stressors and organizational sanctions on cyberloafing. Journal of Managerial Issues, 20(3), 383400. www.jstor.org/stable/40604617Google Scholar
Herbst, T. (2014). The Dark Side of Leadership: A Psycho-Spiritual Approach towards Understanding the Origins of Personality Dysfunctions: Derailment and the Restoration of Personality. UK: Author House.Google Scholar
Hernández, M. P., Schoeps, K., Maganto, C., & Montoya-Castilla, I. (2021). The risk of sexual-erotic online behavior in adolescents – Which personality factors predict sexting and grooming victimization? Computers in Human Behavior, 114, 106569. https://doi.org/10.1016/j.chb.2020.106569CrossRefGoogle Scholar
Herron, M. M. (2021). Social media bullying in the workplace: Impacts on motivation, productivity, and workplace culture. In Ramos Salazar, L. (Ed.), Handbook of Research on Cyberbullying and Online Harassment in the Workplace, Chapter 4 (pp. 7289). Hershey PA, USA: IGI Global.Google Scholar
Hertlein, K. M., & van Dyck, L. E. (2020). Predicting engagement in electronic surveillance in romantic relationships. Cyberpsychology, Behavior, and Social Networking, 23(9), 604610. https://doi.org/10.1089/cyber.2019.0424CrossRefGoogle ScholarPubMed
Hillier, K., & Greig, C. (March 11, 2022). The art of the con: “Inventing Anna,” “The Tinder Swindler” and gender. The Conversation. Retrieved from https://interaksyon.philstar.com/hobbies-interests/2022/03/11/212645/the-art-of-the-con-inventing-anna-the-tinder-swindler-and-gender/Google Scholar
Hogan, R., & Fico, J. M. (2011). Leadership. In Campbell, W. K., & Miller, J. D. (Eds.), The Handbook of Narcissism and Narcissistic Personality Disorder: Theoretical Approaches, Empirical Findings, and Treatments (pp. 393402). New York: Wiley. https://doi.org/10.1002/9781118093108.ch35CrossRefGoogle Scholar
Holt, T., Bossler, A., & Seigfried-Spellar, K. (2022). Cybercrime and Digital Forensics: An Introduction (3rd Edition). Abingdon: Routledge. http://ebookcentral.proquest.com/lib/ecu/detail.action?docID=6963530CrossRefGoogle Scholar
Horowitz, M. (November 2021). Cybercrime predictions for 2022: Deepfakes, cryptocurrencies and misinformation. Check Point® Software Technologies. https://blog.checkpoint.com/2021/10/26/deepfakes-cryptocurrency-and-mobile-wallets-cybercriminals-find-new-opportunities-in-2022/Google Scholar
Hossain, M. A., Quaddus, M., Warren, M., Akter, S., & Pappas, I. (2022). Are you a cyberbully on social media? Exploring the personality traits using a fuzzy-set configurational approach. International Journal of Information Management, 66. https://doi.org/10.1016/j.ijinfomgt.2022.102537CrossRefGoogle Scholar
Hou, X., Ren, S., Rozgonjuk, D., Song, L., Xi, J., & Mõttus, R. (2023). The longitudinal association between narcissism and problematic social networking sites use: The roles of two social comparison orientations. Addictive Behaviors, 107786. https://doi.org/10.1016/j.addbeh.2023.107786CrossRefGoogle ScholarPubMed
Hu, Y., Li, H., Yang, H., Sun, Y., Sun, L., & Wang, Z. (2019). Detecting stealthy attacks against industrial control systems based on residual skewness analysis. EURASIP Journal on Wireless Communications and Networking, 2019(1), 114.CrossRefGoogle Scholar
Huang, Y., Gan, X., Jin, X., Rao, S., Guo, B., He, Z., & Wei, Z. (2023). The relationship between the Dark Triad and bullying among Chinese adolescents: The role of social exclusion and sense of control. Frontiers in Psychology, 14, 1173860. https://doi.org/10.3389/fpsyg.2023.1173860CrossRefGoogle ScholarPubMed
Hughes, S., & Samuels, H. (2021). Dark desires: The Dark Tetrad and relationship control. Personality and Individual Differences, 171, 110548. https://doi.org/10.1016/j.paid.2020.110548CrossRefGoogle Scholar
Hussain, S. M., Sultan, S., Muniandy, V. D., & Haslindawati, N. (2022). An insight into the differences of psychological disparate motivations between hackers and crackers, Journal of Correctional Issues, 5(1), 2732. https://doi.org/10.52472/jci.v5i1.94CrossRefGoogle Scholar
Hussain, Z., Griffiths, M. D., & Sheffield, D. (2017). An investigation into problematic smartphone use: The role of narcissism, anxiety, and personality factors. Journal of Behavioral Addiction, 6(3), 378386. https://doi.org/10.1556/2006.6.2017.052CrossRefGoogle ScholarPubMed
Hussain, A., Khan, H., AJaml, I., & Akhtar, Y. (2023). Relationship of narcissism, Machiavellianism, and psychopathy personality traits with social media addiction among adults: Gender and marital status are in focus. Journal of Social Sciences Review, 3(2), 10121021.CrossRefGoogle Scholar
Hussain, Z., & Pontes, H. M. (2018). Personality, internet addiction, and other technological addictions: A psychological examination of personality traits and technological addictions. In Bozoglan, B. (Ed.), Psychological, Social, and Cultural Aspects of Internet Addiction (pp. 4571). Hershey, PA: IGI Global:. https://doi.org/10.4018/978-1-5225-3477-8.ch003CrossRefGoogle Scholar
Hussain, Z., & Pontes, H. M. (2019). Personality, internet addiction, and other technological addictions: An update of the research literature. In Bozoglan, B. (Ed.), Multifaceted Approach to Digital Addiction and Its Treatment (pp. 4672). IGI Global. https://doi.org/10.4018/978-1-5225-8449-0.ch003CrossRefGoogle Scholar
Hussain, Z., Wegmann, E., & Griffiths, M. D. (2021). The association between problematic social networking site use, Dark Triad traits, and emotion dysregulation. BMC Psychology, 9, 160 (2021). https://doi.org/10.1186/s40359-021-00668-6CrossRefGoogle ScholarPubMed
IC3. (2015). Internet crime complaint center: 2013 internet crime report. Accessed on August 9, 2016. Retrieved from www.ic3.gov/media/annualreport/2015_ic3report.pdfGoogle Scholar
Ibrahim, Y. (2010). Social Networking Sites (SNS) and the ‘Narcissistic Turn’: The politics of self-exposure. In Social Computing: Concepts, Methodologies, Tools, and Applications (pp. 18551868). IGI Global. https://doi.org/10.4018/978-1-60566-727-0.ch006CrossRefGoogle Scholar
Iftikhar, M., & Tariq, S. (2014). Self-control, narcissistic tendencies and internet addiction among adolescents. Journal of Arts & Social Sciences, 1(2), 3752.Google Scholar
Ildirim, E. (2021). Personality factors predicting cyberbullying and online harassment. In Ramos Salazar, L. (Ed.), Handbook of Research on Cyberbullying and Online Harassment in the Workplace, Chapter 7 (pp. 130152). Hershey PA, USA: IGI Global.Google Scholar
Insurance Fraud. (2022). Retrieved on February 1, 2022, from https://en.wikipedia.org/wiki/Insurance_fraudGoogle Scholar
Internet Live Stats. (2022). Internet users in the world. Retrieved from www.statista.com/statistics/273018/number-of-internet-users-worldwide/Google Scholar
Jabłońska, M. R., & Zajdel, R. (2020). The Dark Triad traits and problematic internet use: Their structure and relations. Polish Sociological Review 212(4), 477495.Google Scholar
James, N. (2023, May 2). Cybersecurity Statistics 2023 [Updated]. Astra. Retrieved from www.getastra.com/blog/security-audit/cyber-security-statistics/Google Scholar
Jandaghi, G., Alvani, S. M., Matin, H. Z., & Kozekanan, S. F. (2015). Cyberloafing management in organizations. Iranian Journal of Management Studies, 8(3), 335349. https://doi.org/10.22059/IJMS.2015.52634Google Scholar
Jauk, E., & Dieterich, R. (2019). Addiction and the dark triad of personality. Frontiers in Psychiatry, 10, 662. https://doi.org/10.3389/fpsyt.2019.00662CrossRefGoogle ScholarPubMed
Jeffrey, C., Peltier, C., & Vannest, K. (2020). The effects of an online psychoeducational workshop to decrease anxiety and increase empowerment in victims of trolling and cyberbullying. Journal of Online Learning Research, 6(3), 265296. Waynesville, NC USA: Association for the Advancement of Computing in Education (AACE). Retrieved on February 5, 2023, from www.learntechlib.org/primary/p/216915/Google Scholar
Jin, C. C., Wang, B. C., & Ji, A. T. (2019). The relationship between the Dark Triad and internet adaptation among adolescents in China: Internet use preference as a mediator. Frontier Psychology, 10, 2023. https://doi.org/10.3389/fpsyg.2019.02023CrossRefGoogle Scholar
Jin, C., Wang, B., Ji, A., & Zhao, B. (2022). Perceived parental monitoring and online deviant behavior among Chinese adolescents: A moderated mediation. Journal of Child and Family Studies, 31(10), 28252836. https://doi.org/10.1007/s10826-022-02237-wCrossRefGoogle Scholar
Johnson, L. K., Plouffe, R. A., & Saklofske, D. H. (2019). Subclinical sadism and the Dark Triad: Should there be a Dark Tetrad? Journal of Individual Differences, 40(3), 127133. https://doi-org.ezproxy.haifa.ac.il/10.1027/1614-0001/a000284CrossRefGoogle Scholar
Johnston, J. E. (February 15, 2022). Think you couldn’t be duped by a con artist? Think again. Psychology Today. Retrieved from www.psychologytoday.com/intl/blog/the-human-equation/202202/think-you-couldnt-be-duped-con-artist-think-againGoogle Scholar
Jonason, P. K. (2014). Personality and politics. Personality and Individual Differences, 71, 181184. https://doi.org/10.1016/j.paid.2014.08.002CrossRefGoogle Scholar
Jonason, P., & Bulyk, R. (2019). Who uses Tinder? The Dark Triad traits, attachment, and mate value. Studia Psychologica: Theoria et Praxis, 19(1), 515. Retrieved from www.infona.pl/resource/bwmeta1.element.ojs-doi-10_21697_sp_2019_19_1_01Google Scholar
Jonason, P. K., Kaźmierczak, I., Campos, A. C., & Davis, M. D. (2021). Leaving without a word: Ghosting and the Dark Triad traits. Acta Psychologica, 220, 103425. https://doi.org/10.1016/j.actpsy.2021.103425CrossRefGoogle ScholarPubMed
Jonason, P. K., Li, N. P., Webster, G. D., & Schmitt, D. P. (2009). The Dark Triad: Facilitating a short‐term mating strategy in men. European Journal of Personality, 23(1), 518. https://doi.org/10.1002/per.698CrossRefGoogle Scholar
Jonason, P. K., Slomski, S., & Partyka, J. (2012). The Dark Triad at work: How toxic employees get their way. Personality and Individual Differences, 52(3), 449453. https://doi.org/10.1016/j.paid.2011.11.008CrossRefGoogle Scholar
Jones, D. N., & Figueredo, A. J. (2013). The core of darkness: Uncovering the heart of the Dark Triad. European Journal of Personality, 27(6), 521531. https://doi.org/10.1002/per.1893CrossRefGoogle Scholar
Jones, D. N., Padilla, E., Curtis, S. R., & Kiekintveld, C. (2021). Network discovery and scanning strategies and the Dark Triad. Computers in Human Behavior, 122, 106799. https://doi.org/10.1016/j.chb.2021.106799CrossRefGoogle Scholar
Jones, D. N., & Paulhus, D. L. (2010). Different provocations trigger aggression in narcissists and psychopaths. Social Psychological and Personality Science, 1, 1218. http://dx.doi.org/10.1177/1948550609347591CrossRefGoogle Scholar
Jones, D. N., & Paulus, D. L. (2009). Machiavellianism. In Leary, M. R., & Hoyle, R. H. (Eds.), Individual Differences in Social Behavior (pp. 93108). New York, NY: Guilford Press.Google Scholar
Jones, D. N., & Paulhus, D. L. (2014). Introducing the short Dark Triad (SD3): A brief measure of dark personality traits. Assessment, 21(1), 2841. https://doi.org/10.1177/1073191113514105CrossRefGoogle ScholarPubMed
Jung, Y. E., Leventhal, B., Kim, Y. S., Park, T. W., Lee, S. H., Lee, M., … & Park, J. I. (2014). Cyberbullying, problematic internet use, and psychopathologic symptoms among Korean youth. Yonsei Medical Journal, 55(3), 826830. https://doi.org/10.3349/ymj.2014.55.3.826CrossRefGoogle ScholarPubMed
Kalaitzaki, A., Laconi, S., Spritzer, D. T., Hauck, S., Gnisci, A., Sergi, I., … & Sahlan, R. N. (2022). The prevalence and predictors of problematic mobile phone use: A 14-country empirical survey. International Journal of Mental Health and Addiction, 120. https://doi-org.ezproxy.haifa.ac.il/10.1007/s11469-022-00901-2Google Scholar
Kallis, R. B., & Meluch, A. L. (2021). Workplace cyberbullying and online harassment as an organizational threat: Exploring the negative organizational outcomes. In Ramos Salazar, L. (Ed.), Handbook of Research on Cyberbullying and Online Harassment in the Workplace, Chapter 9 (pp. 176196). Hershey PA, USA: IGI Global.Google Scholar
Kanbur., E., & Kanbur, A. (2021). Phubbing at workplace. In Bingol, U. (Ed.), Trending Topics on Social Media Researchers, Section 2 (pp. 147160). Berlin: Peter Lang Gmbh.Google Scholar
Kapidzic, S. (2013). Narcissism as a predictor of motivations behind Facebook profile picture selection. Cyberpsychology, Behavior, and Social Networking, 16(1), 1419. https://doi.org/10.1089/cyber.2012.0143CrossRefGoogle ScholarPubMed
Karasavva, V., Brunet, L., Smodis, A., Swanek, J., & Forth, A. (2023b). Putting the Y in cyberflashing: Exploring the prevalence and predictors of the reasons for sending unsolicited nude or sexual images. Computers in Human Behavior, 140, 107593. https://doi.org/10.1016/j.chb.2022.107593CrossRefGoogle Scholar
Karasavva, V., & Forth, A. (2022). Personality, attitudinal, and demographic predictors of non-consensual dissemination of intimate images. Journal of Interpersonal Violence, 37(21–22), NP19265–NP19289. https://doi-org.ezproxy.haifa.ac.il/10.1177/08862605211043586CrossRefGoogle ScholarPubMed
Karasavva, V., Swanek, J., Smodis, A., & Forth, A. (2023a). From myth to reality: Sexual image abuse myth acceptance, the Dark Tetrad, and non-consensual intimate image dissemination proclivity. Journal of Sexual Aggression, 29(1), 5167. https://doi-org.ezproxy.haifa.ac.il/10.1080/13552600.2022.2032430CrossRefGoogle Scholar
Karlsson, A. M. C., & Kajonius, P. J. (2020). Not only Trolls are Trolling the Internet: A study on dark personality traits, online environment, and commentary styles. International Journal of Personality Psychology, 6, 1223. https://doi.org/10.21827/ijpp.6.37214CrossRefGoogle Scholar
Karthikeyan, C. (2020). Workplace cyberbullying and its impact on productivity, In Ramos Salazar, L. (Ed.), Handbook of Research on Cyberbullying and Online Harassment in the Workplace, Chapter 10 (pp. 197214). Hershey PA, USA: IGI Global.Google Scholar
Karthikeyan, C. (2022). Workplace cyberbullying in organizations with criminal intent and subtle means: A very pleasant and safe organization culture brings in a better work culture in an organization. In Handbook of Research on Digital Violence and Discrimination Studies (pp. 568588). IGI Global. https://doi.org/10.4018/978-1-7998-9187-1.ch025Google Scholar
Kasper, T. E., Short, M. B., & Milam, A. C. (2015). Narcissism and Internet pornography use. Journal of Sex & Marital Therapy, 41(5), 481486. https://doi.org/10.1080/0092623X.2014.931313CrossRefGoogle ScholarPubMed
Katagelasticism. (2023, May 9). In Wikipedia. https://en.wikipedia.org/wiki/KatagelasticismGoogle Scholar
Kemp, S. (2023). Facebook statistics and trends. DataReportal. Retrieved from https://datareportal.com/essential-facebook-statsGoogle Scholar
Keskin, H., Akgün, A. E., Ayar, H., & Kayman, Ş. S. (2016). Cyberbullying victimization, counterproductive work behaviours and emotional intelligence at workplace. Procedia-Social and Behavioral Sciences, 235, 281287. https://doi.org/10.1016/j.sbspro.2016.11.031CrossRefGoogle Scholar
Kim, J. H., & Kim, Y. (2019). Instagram user characteristics and the color of their photos: Colorfulness, color diversity, and color harmony. Information Processing & Management, 56(4), 14941505. https://doi.org/10.1016/j.ipm.2018.10.018CrossRefGoogle Scholar
King, Z., Henshel, D., Flora, L., Cains, M. G., Hoffman, B., & Sample, C. (2018). Characterizing and measuring maliciousness for cybersecurity risk assessment. Frontiers in Psychology, 9(39). https://doi.org/10.3389/fpsyg.2018.00039CrossRefGoogle ScholarPubMed
Kircaburun, K., Demetrovics, Z., & Tosuntaş, Ş. B. (2019). Analyzing the links between problematic social media use, Dark Triad traits, and self-esteem. International Journal of Mental Health Addiction, 17, 14961507. https://doi.org/10.1007/s11469-018-9900-1CrossRefGoogle Scholar
Kircaburun, K., & Griffiths, M. D. (2018). The dark side of internet: Preliminary evidence for the associations of dark personality traits with specific online activities and problematic internet use. Journal of Behavioral Addictions, 7(4), 9931003. https://doi.org/10.1556/2006.7.2018.109CrossRefGoogle ScholarPubMed
Kircaburun, K., Jonason, P. K., & Griffiths, M. D. (2018a). The Dark Tetrad traits and problematic social media use: The mediating role of cyberbullying and cyberstalking. Personality and Individual Differences, 135, 264269.CrossRefGoogle Scholar
Kircaburun, K., Jonason, P. K., & Griffiths, M. D. (2018b). The Dark Tetrad traits and problematic online gaming: The mediating role of online gaming motives and moderating role of game types. Personality and Individual Differences, 135, 298303. https://doi-org.ezproxy.haifa.ac.il/10.1016/j.paid.2018.07.038CrossRefGoogle Scholar
Kircaburun, K., March, E., Balta, S., Emirtekin, E., Kışla, T., & Griffiths, M. D. (2022). The role of procrastination between personality traits and addictive mukbang watching among emerging adults. SAGE Open, 12(1). https://doi.org/10.1177/21582440221085006CrossRefGoogle Scholar
Kiziloglu, M., Dluhopolskyi, O., Koziuk, V., Vitvitskyi, S., & Kozlovskyi, S. (2021). Dark personality traits and job performance of employees: The mediating role of perfectionism, stress, and social media addiction. Problems and Perspectives in Sinderman, 19(3), 533544.CrossRefGoogle Scholar
Koban, K., Stein, J. P., Eckhardt, V., & Ohler, P. (2018). Quid pro quo in Web 2.0. Connecting personality traits and Facebook usage intensity to uncivil commenting intentions in public online discussions. Computers in Human Behavior, 79, 918. https://doi.org/10.1016/j.chb.2017.10.015CrossRefGoogle Scholar
Kong, F., Wang, M., Zhang, X., Li, X., & Sun, X. (2021). Vulnerable narcissism in social networking sites: The role of upward and downward social comparisons. Frontiers in Psychology, 3921. https://doi.org/10.3389/fpsyg.2021.711909Google ScholarPubMed
Kowalski, C. M., Rogoza, R., Saklofske, D. H., & Schermer, J. A. (2021). Dark Triads, tetrads, tents, and cores: Why navigate (research) the jungle of dark personality models without a compass (criterion)? Acta Psychologica, 221, 103455. https://doi.org/10.1016/j.actpsy.2021.103455CrossRefGoogle ScholarPubMed
Kowalski., R. M., & Robbins, C. E. (2021). The meaning, prevalence, and outcomes of cyberbullying in the workplace. In Ramos Salazar, L. (Ed.), Handbook of Research on Cyberbullying and Online Harassment in the Workplace, Chapter 1 (pp. 122). Hershey PA, USA: IGI Global.Google Scholar
Kramer, B. K. P., & Seda, M. A. (2017). What in the world were you thinking?! Inside the mindset of fraud perpetrators. International Journal of Psychology Research, 12(3), 229269.Google Scholar
Kristinsdottir, K. H., Gylfason, H. F., & Sigurvinsdottir, R. (2021). Narcissism and social media: The role of communal narcissism. International Journal of Environmental Research and Public Health, 18(19), 10106. MDPI AG. Retrieved from http://dx.doi.org/10.3390/ijerph181910106CrossRefGoogle ScholarPubMed
Kumpasoğlu, G. B., Eltan, S., Merdan-Yıldız, E. D., & Batıgün, A. D. (2021). Mediating role of life satisfaction and death anxiety in the relationship between Dark Triad and social media addiction. Personality and Individual Differences, 172, 18, 110606.CrossRefGoogle Scholar
Kurek, A., Jose, P. E., & Stuart, J. (2019). ‘I did it for the LULZ’: How the dark personality predicts online disinhibition and aggressive online behavior in adolescence. Computers in Human Behavior, 98, 3140. https://doi.org/10.1016/j.chb.2019.03.027CrossRefGoogle Scholar
Laakasuo, M., Repo, M., Drosinou, M., Berg, A., Kunnari, A., Koverola, M., … & Sundvall, J. (2021). The dark path to eternal life: Machiavellianism predicts approval of mind upload technology. Personality and Individual Differences, 177, 110731. https://doi.org/10.1016/j.paid.2021.110731CrossRefGoogle Scholar
Lai, K., Jing, G., Zhao, J., & Xiong, X. (2023). How Dark Triad influences rumors spreading on social media? Mediating role of declining third-person effect. Current Psychology, 17.Google Scholar
Lamphere, R. D., & Lucas, K. T. (2019). Online romance in the 21st century: Deceptive online dating, catfishing, romance scams, and “mail order” marriages. In Chiluwa, I. E., & Samoilenko, S. A. (Eds.), Deception, Fake News, and Misinformation Online (pp. 475488). Hershey: IGI Global.CrossRefGoogle Scholar
Lancaster, M., Seibert, G. S., Cooper, A. N., May, R. W., & Fincham, F. (2019). Relationship quality in the context of cyber dating abuse: The role of attachment. Journal of Family Issues, 41(6), 739758. https://doi.org/10.1177/0192513X19881674CrossRefGoogle Scholar
Lauder, C., & March, E. (2023). Catching the catfish: Exploring gender and the Dark Tetrad as predictors of catfishing perpetration. Computers in Human Behavior, 107599. https://doi.org/10.1016/j.chb.2022.107599CrossRefGoogle Scholar
Lazic, M. (2022). Shocking Insurance Fraud Statistics for 2022. LegalJobs. Retrieved from https://legaljobs.io/blog/insurance-fraud-statistics/Google Scholar
Lee, K., Ashton, M. C., Wiltshire, J., Bourdage, J. S., Visser, B. A., & Gallucci, A. (2013). Sex, power, and money: Prediction from the Dark Triad and honesty–humility. European Journal of Personality, 27(2), 169184. https://doi.org/10.1002/per.1860CrossRefGoogle Scholar
Lee, B., & Paek, S. Y. (2020). Phishing and financial manipulation. In Holt, T., & Bossler, A. (Eds.), The Palgrave Handbook of International Cybercrime and Cyberdeviance. Cham: Palgrave Macmillan. https://doi.org/10.1007/978-3-319-78440-3_43Google Scholar
Lee, S. L. (2019). Predicting SNS addiction with the Big Five and the Dark Triad. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 13(1). http://dx.doi.org/10.5817/CP2019-1-3CrossRefGoogle Scholar
Lee, S. L., & Lim, S. X. (2020). Predicting internet addiction with the Dark Triad: Beyond the five-factor model. Psychology of Popular Media. https://doi.org/10.1037/ppm0000336Google Scholar
Lee, S. L., Tan, Y. E., Tam, C. L., & Ahn, J. (2022). The facilitative effect of impulsiveness on the Dark Triad and social network sites addiction: The Dark Triad, impulsiveness, SNS addiction. International Journal of Technology and Human Interaction (IJTHI), 18(1), 115. https://doi.org/10.4018/IJTHI.297612CrossRefGoogle Scholar
Lee, S. Y., Yao, M. Z., & Su, L. Y. F. (2021). Expressing unpopular opinion or trolling: Can dark personalities differentiate them? Telematics and Informatics, 63, 101645. https://doi.org/10.1016/j.tele.2021.101645Google Scholar
Leite, Â., Cardoso, S., & Monteiro, A. P. (2023). Dark personality traits and online behaviors: Portuguese versions of cyberstalking, online harassment, flaming and trolling scales. International Journal of Environmental Research and Public Health, 20(12), 6136. https://doi.org/10.3390/ijerph20126136CrossRefGoogle ScholarPubMed
Li, W., Bizumic, B., Sivanathan, D., & Chen, J. (2022). Vulnerable and grandiose narcissism differentially predict phubbing via social anxiety and problematic social media use. SSRN. https://ssrn.com/abstract=4225316 or http://dx.doi.org/10.2139/ssrn.4225316CrossRefGoogle Scholar
Lim, V. K. G. (2002). The IT way of loafing on the job – Cyberloafing, neutralizing and organizational justice. Journal of Organizational Behavior, 23(5), 675694. https://doi.org/10.1002/job.161CrossRefGoogle Scholar
Lim, V. K., & Teo, T. S. (2022). Cyberloafing: A review and research agenda. Applied Psychology. https://doi-org.ezproxy.haifa.ac.il/10.1111/apps.12452Google Scholar
Linares, R., Aranda, M., García-Domingo, M., Amezcua, T., Fuentes, V., & Moreno-Padilla, M. (2021). Cyber-dating abuse in young adult couples: Relations with sexist attitudes and violence justification, smartphone usage and impulsivity. PLoS One, 16(6), e0253180. https://doi.org/10.1371/journal.pone.0253180CrossRefGoogle ScholarPubMed
Liu, A., Zhang, E., Leroux, E. J., & Benassi, P. (2022). Sexual sadism disorder and coercive paraphilic disorder: A scoping review. The Journal of Sexual Medicine, 19(3), 496506. https://doi-org.ezproxy.haifa.ac.il/10.1016/j.jsxm.2022.01.002CrossRefGoogle ScholarPubMed
Liu, Y., & Zheng, L. (2020). Relationships between the Big Five, narcissistic personality traits, and online sexual activities. Personality and Individual Differences, 152, 109593. https://doi.org/10.1016/j.paid.2019.109593CrossRefGoogle Scholar
Liu, Y., Zhou, B., Ouyang, Y., Yang, B., & Xie, Q. (2023). Development and validation of Chinese form Short Dark Tetrad (C-SD4). Heliyon. https://doi.org/10.1016/j.heliyon.2023.e12929Google ScholarPubMed
Ljepava, N., Orr, R. R., Locke, S., & Ross, C. (2013). Personality and social characteristics of Facebook non-users and frequent users. Computers in Human Behavior, 29(4), 16021607. https://doi.org/10.1016/j.chb.2013.01.026CrossRefGoogle Scholar
Logic Bomb. (February 13, 2023). In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Logic_bombGoogle Scholar
Lopes, B., & Yu, H. (2017). Who do you troll and Why: An investigation into the relationship between the Dark Triad Personalities and online trolling behaviours towards popular and less popular Facebook profiles. Computers in Human Behavior, 77, 6976. https://doi.org/10.1016/j.chb.2017.08.036CrossRefGoogle Scholar
Lowe-Calverley, E., & Grieve, R. (2017). Web of deceit: Relationships between the Dark Triad, perceived ability to deceive and cyberloafing. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 11(2). https://doi.org/10.5817/CP2017-2-5CrossRefGoogle Scholar
Lykken, D. T. (1995). The Antisocial Personalities. Hillsdale, NJ: Erlbaum. https://doi.org/10.4324/9780203763551Google Scholar
Lyons, M., Gillies, N., & Brewer, G. (2019). Dark Triad traits, Facebook intensity, and intrasexual competition. Personality and Individual Differences, 141, 157159. https://doi.org/10.1016/j.paid.2019.01.012CrossRefGoogle Scholar
Lyons, M., Messenger, A., Perry, R., & Brewer, G. (2020). The Dark Tetrad in Tinder®: Hook-up app for high psychopathy individuals, and a diverse utilitarian tool for Machiavellians? Current Psychology, 41, 659666. https://doi.org/10.1007/s12144-019-00589-zCrossRefGoogle Scholar
Lyons, M., Messenger, A., Perry, R., & Brewer, M. (2022a). The Dark Tetrad in Tinder: hook-up app for high psychopathy individuals, and a diverse utilitarian tool for Machiavellians? Current Psychology, 41, 659666. https://doi.org/10.1007/s12144-019-00589-zCrossRefGoogle Scholar
Lyons, M., Rowe, A., Waddington, R., & Brewer, G. (2022b). Situational and dispositional factors in rape cognitions: The roles of social media and the Dark Triad traits. Journal of Interpersonal Violence, 37(11–12), https://doi.org/10.1177/0886260520985499CrossRefGoogle ScholarPubMed
Maasberg, M., Van Slyke, C., Ellis, S., & Beebe, N. (2020). The Dark Triad and insider threats in cyber security. Communications of the ACM, 63(12), 6480. https://doi.org/10.1145/3408864CrossRefGoogle Scholar
Maasberg, M., Warren, J., & Beebe, N. L. (January 2015). The dark side of the insider: Detecting the insider threat through examination of Dark Triad personality traits. In 2015 48th Hawaii International Conference on System Sciences (pp. 3518–3526). IEEE.CrossRefGoogle Scholar
Madan, A. O. (2014). Cyber aggression/cyber bullying and the Dark Triad: Effect on workplace behavior/performance. International Journal of Computer and Systems Engineering, 8(6), 17401745. https://waset.org/publications/9998533/cyber-aggression-cyber-bullyingand-the-dark-triad-effect-on-workplace-behavior-performanceGoogle Scholar
Maftei, A., Holman, A. C., & Merlici, I. A. (2022). Using fake news as means of cyber-bullying: The link with compulsive internet use and online moral disengagement. Computers in Human Behavior, 127, 107032. https://doi.org/10.1016/j.chb.2021.107032CrossRefGoogle Scholar
Maimon, D., Babko-Malaya, O., Cathey, R., & Hinton, S. (November 2017). Re-Thinking Online Offenders’ SKRAM: Individual Traits and Situational Motivations as Additional Risk Factors for Predicting Cyber Attacks. In 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech) (pp. 232–238). IEEE.CrossRefGoogle Scholar
Mantilla, K. (2013). Gendertrolling: Misogyny adapts to new media. Feminist Studies, 39(2), 563570. https://doi.org/10.1353/fem.2013.0039CrossRefGoogle Scholar
Manuoğlu, E., & Öner-Özkan, B. (2022). Sarcastic and deviant trolling in Turkey: Associations with Dark Triad and aggression. Social Media + Society, 8(3). https://doi.org/10.1177/20563051221126053CrossRefGoogle Scholar
Maple, C., Short, E., & Brown, A. (2011). Cyberstalking in the United Kingdom: An Analysis of the ECHO Pilot Survey. National Centre for Cyberstalking Research, University of Bedfordshire. Retrieved from https://paladinservice.co.uk/wp-content/uploads/2013/12/ECHO_Pilot_Final-Cyberstalking-in-the-UK-University-of-Bedfordshire.pdfGoogle Scholar
Marbut, A. R., & Harms, P. D. (2023). Fiends and fools: A narrative review and neo-socioanalytic perspective on personality and insider threats. Journal of Business and Psychology, 118. https://doi.org/10.1007/s10869-023-09885-9Google Scholar
March, E. (2019). Psychopathy, sadism, empathy, and the motivation to cause harm: New evidence confirms malevolent nature of the Internet Troll. Personality and Individual Differences, 141, 133137. https://doi.org/10.1016/j.paid.2019.01.001CrossRefGoogle Scholar
March, E. (2022). Psychopathy: Cybercrime and cyber abuse. In Marques, P. B., Paulino, P., & Alho, L. (Eds.), Psychopathy and Criminal Behavior (pp. 423444). Academic Press. https://doi.org/10.1016/B978-0-12-811419-3.00015-7CrossRefGoogle Scholar
March, E., Grieve, R., Clancy, E., Klettke, B., van Dick, R., & Hernandez Bark, A. S. (2021b). The role of individual differences in cyber dating abuse perpetration. Cyberpsychology, Behavior, and Social Networking, 24(7), 457463. https://doi.org/10.1089/cyber.2020.0687CrossRefGoogle ScholarPubMed
March, E., Grieve, R., Marrington, J., & Jonason, P. K. (2017). Trolling on Tinder (and other dating apps): Examining the role of the Dark Tetrad and impulsivity. Personality and Individual Differences, 110, 139143. https://doi.org/10.1016/j.paid.2017.01.025CrossRefGoogle Scholar
March, E., Grieve, R., Wagstaff, D., & Slocum, A. (2020a). Exploring anger as a moderator of narcissism and antisocial behaviour on tinder. Personality and Individual Differences, 161, 109961. https://doi.org/10.1016/j.paid.2020.109961CrossRefGoogle Scholar
March, E., Litten, V., Sullivan, D. H., & Ward, L. (2020b). Somebody that I (used to) know: Gender and dimensions of dark personality traits as predictors of intimate partner cyberstalking. Personality and Individual Differences, 163, 110084. https://doi.org/10.1016/j.paid.2020.110084CrossRefGoogle Scholar
March, E., Marrington, J. Z. (2021). Antisocial and Prosocial online behaviour: Exploring the roles of the Dark and Light Triads. Current Psychology. https://doi.org/10.1007/s12144-021-01552-7Google Scholar
March, E., & Marrington, J. Z. (2023). Antisocial and Prosocial online behaviour: Exploring the roles of the Dark and Light Triads. Current Psychology, 42(2), 13901393. https://doi.org/10.1007/s12144-021-01552-7CrossRefGoogle Scholar
March, E., McDonald, L., & Forsyth, L. (2023). Personality and internet trolling: A validation study of a representative sample. Current Psychology, 14. https://doi.org/10.1007/s12144-023-04586-1Google Scholar
March, E., & Steele, G. (2020). High esteem and hurting others online: Trait sadism moderates the relationship between self-esteem and internet trolling. Cyberpsychology, Behavior, and Social Networking, 23(7), 441446. https://doi.org/10.1089/cyber.2019.0652CrossRefGoogle ScholarPubMed
March, E., Szymczak, P., Di Rago, M., & Jonason, P. K. (2022). Passive, invasive, and duplicitous: Three forms of intimate partner cyberstalking. Personality and Individual Differences, 189, 111502. https://doi.org/10.1016/j.paid.2022.111502CrossRefGoogle Scholar
March, E., Szymczak, P., Smoker, M., & Jonason, P. K. (2021a). Who cyberstalked their sexual and romantic partners? Sex differences, dark personality traits, and fundamental social motives. Current Psychology, 14. https://doi.org/10.1007/s12144-021-02174-9Google Scholar
March, E., & Wagstaff, D. L. (2017). Sending nudes: Sex, self-rated mate value, and trait Machiavellianism predict sending unsolicited explicit images. Frontiers in Psychology, 8, 16. 2210. https://doi.org/10.3389/fpsyg.2017.02210CrossRefGoogle ScholarPubMed
Marengo, D., & Settanni, M. (2023). Mining Facebook data for personality prediction: An overview. In Montag, C., & Baumeister, H. (Eds.), Digital Phenotyping and Mobile Sensing: Studies in Neuroscience, Psychology and Behavioral Economics. Cham: Springer. https://doi-org.ezproxy.haifa.ac.il/10.1007/978-3-030-98546-2_8Google Scholar
Marrington, J. Z., March, E., Murray, S., Jeffries, C., Machin, T., & March, S. (2023). An exploration of trolling behaviours in Australian adolescents: An online survey. PLoS One, 18(4), e0284378. https://doi.org/10.1371/journal.pone.0284378CrossRefGoogle ScholarPubMed
Marshall, T. C., Lefringhausen, K., & Ferenczi, N. (2015). The Big Five, self-esteem, and narcissism as predictors of the topics people write about in Facebook status updates. Personality and Individual Differences, 85, 3540. https://doi.org/10.1016/j.paid.2015.04.039CrossRefGoogle Scholar
Martin, B. A., Chrysochou, P., Strong, C., Wang, D., & Yao, J. (2022). Dark personalities and Bitcoin®: The influence of the Dark Tetrad on cryptocurrency attitude and buying intention. Personality and Individual Differences, 188, 111453. https://doi.org/10.1016/j.paid.2021.111453CrossRefGoogle Scholar
Masui, K. (2019). Loneliness moderates the relationship between Dark Tetrad personality traits and internet trolling. Personality and Individual Differences, 150, 109475. https://doi.org/10.1016/j.paid.2019.06.018CrossRefGoogle Scholar
Matulessy, A., & Humaira, N. H. (2016). Hacker personality profiles reviewed in terms of the big five personality traits. Psychology and Behavioral Sciences, 5(6), 137142. www.sciencepublishinggroup.com/j/pbsGoogle Scholar
Mayshak, R., Howard, D., Benstead, M., Klas, A., Skvarc, D., Harries, T., … & Hyder, S. (2023). Dating in the dark: A qualitative examination of dating experiences in Dark Tetrad personalities. Computers in Human Behavior, 143, 107680. https://doi-org.ezproxy.haifa.ac.il/10.1016/j.chb.2023.107680CrossRefGoogle Scholar
Mayshak, R., King, R. M., Chandler, B., & Hannah, M. (2020). To swipe or not to swipe: The Dark Tetrad and risks associated with mobile dating app use. Personality and Individual Differences, 163, 110099. https://doi.org/10.1016/j.paid.2020.110099CrossRefGoogle Scholar
McCain, J. L., & Campbell, W. K. (2018). Narcissism and social media use: A meta-analytic review. Psychology of Popular Media Culture, 7(3), 308327. http://dx.doi.org/10.1037/ppm0000137CrossRefGoogle Scholar
McKenna, F. (2020). Professional refunders are fraud hitmen for hire. [Blog post]. May 26. Retrieved from https://frankonfraud.com/fraud-trends/professional-refunders-are-friendly-fraud-hitmen-for-hire/Google Scholar
Mckinlay, T., & Lavis, T. (2020). Why did she send it in the first place? Victim blame in the context of “revenge porn.” Psychiatry, Psychology and Law, 27(3), 111. https://doi.org/10.1080/13218719.2020.1734977CrossRefGoogle ScholarPubMed
McHoskey, J. W., Worzel, W., & Szyarto, C. (1998). Machiavellianism and psychopathy. Journal of Personality and Social Psychology, 74(1), 192210. https://doi.org/10.1037/0022-3514.74.1.192CrossRefGoogle ScholarPubMed
McEwan, T. (2014, February). Personality differences: trolls and cyberstalkers aren’t the same. The Conversation. Retrieved from https://theconversation.com/personality-differences-trolls-and-cyberstalkers-arent-the-same-23309Google Scholar
Međedović, J., & Petrović, B. (2015). The Dark Tetrad: Structural properties and location in the personality space. Journal of Individual Differences, 36(4), 228236. https://doi.org/10.1027/1614-0001/a000179CrossRefGoogle Scholar
Mehdizadeh, S. (2010). Self-presentation 2.0: Narcissism and self-esteem on Facebook. Cyberpsychology, Behavior, and Social Networking, 13(4), 357364. https://doi.org/10.1089=cyber.2009.0257CrossRefGoogle ScholarPubMed
Meloy, J. R. (1998). The Psychology of Stalking: Clinical and Forensic Perspectives. San Diego, CA: Academic Press.CrossRefGoogle Scholar
Ménard, K. S., & Pincus, A. L. (2012). Predicting overt and cyber stalking perpetration by male and female college students. Journal of Interpersonal Violence, 27(11), 21832207. https://doi.org/10.1177/0886260511432144CrossRefGoogle ScholarPubMed
Menzel, J., Meier, M., & Maier, C. (January 2023). Online gaming and personality: Explaining gamers’ cheating intention. In Proceedings of the 56th Hawaii International Conference on System Sciences (pp. 2346–2355). Retrieved from https://hdl.handle.net/10125/102921CrossRefGoogle Scholar
Miech, K. (July 2022). Definition of cyberloafing – How much does it cost the employer? Unrubble. Retrieved from https://unrubble.com/Blog/definition-of-cyberloafing-how-much-does-it-cost-the-employerGoogle Scholar
Mihelič, K. K., Lim, V. K. G., & Culiberg, B. (2022). Cyberloafing among Gen Z students: The role of norms, moral disengagement, multitasking self-efficacy, and psychological outcomes. European Journal of Psychology of Education, 119. https://doi-org.ezproxy.haifa.ac.il/10.1007/s10212-022-00617-wGoogle Scholar
Millon, T. (2011). Disorders of Personality: Introducing a DSM/ICD Spectrum from Normal to Abnormal. 3rd ed. Hoboken, NJ: Wiley.CrossRefGoogle Scholar
Millon, T., & Grossman, S. D. (2004). Personology: A theory based on evolutionary concepts. In Lenzenweger, M. F., & Clarkin, J. F. (Eds.), Major Theories of Personality Disorder (pp. 332390). New York: Guilford Press.Google Scholar
Min, H., Pavisic, I., Howald, N., Highhouse, S., & Zickar, M. J. (2019). A systematic comparison of three sadism measures and their ability to explain workplace mistreatment over and above the Dark Triad. Journal of Research in Personality, 82, 103862. https://doi.org/10.1016/j.jrp.2019.103862CrossRefGoogle Scholar
Miran, A., Yaseen, F., & Jabeen, S. (2023). Psychopathy and cyberbullying: The role of self-control as moderator among problematic smartphone users. Gomal University Journal of Research, 39(1), 6979.CrossRefGoogle Scholar
Modic, D., Palomäki, J., Drosinou, M., & Laakasuo, M. (2018). The Dark Triad and willingness to commit insurance fraud. Cogent Psychology, 5(1), 1469579. https://doi.org/10.1080/23311908.2018.1469579CrossRefGoogle Scholar
Monacis, L., Griffiths, M. D., Limone, P., Sinatra, M., & Servidio, R. (2020). Selfitis behavior: Assessing the Italian version of the selfitis behavior scale and its mediating role in the relationship of dark traits with social media addiction. International Journal of Environmental Research and Public Health, 17(16), 5738, 1–17. https://doi.org/10.3390/ijerph17165738CrossRefGoogle ScholarPubMed
Moody, G. D., Galletta, D. F., & Dunn, B. K. (2017). Which phish get caught? An exploratory study of individuals’ susceptibility to phishing. European Journal of Information Systems, 26(6), 564584. https://doi.org/10.1057/s41303-017-0058-xCrossRefGoogle Scholar
Moor, L., & Anderson, J. R. (2019). A systematic literature review of the relationship between dark personality traits and antisocial online behaviours. Personality and Individual Differences, 144, 4055. https://doi.org/10.1016/j.paid.2019.02.027CrossRefGoogle Scholar
Morelli, M., Urbini, F., Bianchi, D., Baiocco, R., Cattelino, E., Laghi, F., … & Chirumbolo, A. (2021). The relationship between Dark Triad personality traits and sexting behaviors among adolescents and young adults across 11 countries. International Journal of Environmental Research and Public Health, 18(5), 2526. https://doi.org/10.3390/ijerph18052526CrossRefGoogle Scholar
Mosley, M. A., Lancaster, M., Parker, M. L., & Campbell, K. (2020). Adult attachment and online dating deception: A theory modernized. Sexual and Relationship Therapy, 35(2), 227243. https://doi.org/10.1080/14681994.2020.1714577CrossRefGoogle Scholar
Muris, P., Merckelbach, H., Otgaar, H., & Meijer, E. (2017). The malevolent side of human nature: A meta-analysis and critical review of the literature on the Dark Triad (narcissism, Machiavellianism, and psychopathy). Perspectives on Psychological Science, 12(2), 183204. https://doi.org/10.1177/1745691616666070CrossRefGoogle Scholar
Muris, P., Otgaar, H., Meesters, C., Papasileka, E., & Pineda, D. (2020). The Dark Triad and honesty-humility: A preliminary study on the relations to pornography use. Dignity: A Journal on Sexual Exploitation and Violence, 5(1). https://doi.org/10.23860/dignity.2020.05.01.03CrossRefGoogle Scholar
Musetti, A., Grazia, V., Alessandra, A., Franceschini, C., Corsano, P., & Marino, C. (2022). Vulnerable narcissism and problematic social networking sites use: Focusing the lens on specific motivations for social networking sites use. Healthcare, 10(9), 1719. MDPI AG. http://dx.doi.org/10.3390/healthcare10091719CrossRefGoogle ScholarPubMed
Myers, S. (2006). Introduction to phishing. In Jakobsson, M., & Myers, S. (Eds.), Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Hoboken: Wiley.Google Scholar
Nadkarni, A., & Hofmann, S. G. (2012). Why do people use Facebook? Personality and Individual Differences, 52(3), 243249. https://doi.org/10.1016/j.paid.2011.11.007CrossRefGoogle ScholarPubMed
Naidu, S., Chand, A., Pandaram, A., & Patel, A. (2023). Problematic internet and social network site use in young adults: The role of emotional intelligence and fear of negative evaluation. Personality and Individual Differences, 200, 111915. https://doi.org/10.1016/j.paid.2022.111915CrossRefGoogle Scholar
Navarro, R., Larrañaga, E., Yubero, S., & Villora, B. (2020). Ghosting and breadcrumbing: Prevalence and association with online dating behavior among young adults. Escritos de Psicología-Psychological Writings, 13(2), 4659. https://doi.org/1024310/espsiescpsi.v13i2.9960Google Scholar
Navarro‐Carrillo, G., Torres‐Marín, J., & Carretero‐Dios, H. (2021). Do trolls just want to have fun? Assessing the role of humor‐related traits in online trolling behavior. Computers in Human Behavior, 114, 106551–48. https://doi.org/10.1016/j.chb.2020.106551CrossRefGoogle Scholar
Necula, C. N. (2020). The relation between the Dark Triad and social media addiction, with the moderating role of social anxiety in young people. Journal of Experiential Psychotherapy/Revista de PSIHOterapie Experientiala, 23(3), 4759.Google Scholar
Nicol, S. (2012). Cyber-bullying and trolling. Youth Studies Australia, 31, 34. Retrieved from http://journals.sfu.ca/ysa/index.php/YSA/article/viewFile/78r/98Google Scholar
Nikbin, D., Taghizadeh, S. K., & Rahman, S. A. (2022). Linking Dark Triad traits to Instagram addiction: The mediating role of motives. Technology in Society, 68, 110. https://doi.org/10.1016/j.techsoc.2022.101892CrossRefGoogle Scholar
Nitschinsk, L., Tobin, S. J., & Vanman, E. J. (2022). The Dark Triad and online self-presentation styles and beliefs. Personality and Individual Differences, 194, 111641. https://doi.org/10.1016/j.paid.2022.111641CrossRefGoogle Scholar
Nividita, J. (April 5, 2023). 90+ Cyber crime statistics 2023: Cost, industries & trends. Astra. Retrieved from www.getastra.com/blog/security-audit/cyber-crime-statistics/Google Scholar
Noakes, T., & Noakes, T. (2021). Distinguishing online academic bullying: Identifying new forms of harassment in a dissenting Emeritus Professor’s case. Heliyon, 7(2), e06326. https://doi.org/10.1016/j.heliyon.2021.e06326CrossRefGoogle Scholar
Nocera, T. R., & Dahlen, E. R. (2017). Dark personality traits in cyber aggression among college students. In 63rd Annual Convention of the Southeastern Psychological Association, Atlanta, GA.Google Scholar
Nocera, T. R., & Dahlen, E. R. (2020). Dark Triad personality traits in cyber aggression among college students. Violence and Victims, 35(4), 524538. https://doi.org/10.1891/VV-D-18-00058CrossRefGoogle ScholarPubMed
Nocera, T. R., Dahlen, E. R., Mohn, R. S., Leuty, M. E., & Batastini, A. B. (2022). Dark personality traits and anger in cyber aggression perpetration: Is moral disengagement to blame? Psychology of Popular Media, 11(1), 2434. http://dx.doi.org/10.1037/ppm0000295CrossRefGoogle Scholar
Nübold, A., Bader, J., Bozin, N., Depala, R., Eidast, H., Johan-nessen, E. A., & Prinz, G. (2017). Developing a taxonomy of Dark Triad triggers at work – A grounded theory study protocol. Frontiers in Psychology, 8(293). https://doi.org/10.3389/fpsyg.2017.00293CrossRefGoogle Scholar
Nurse, J. R., Legg, P. A., Buckley, O., Agrafiotis, I., Wright, G., Whitty, M., … & Creese, S. (June 2014). A critical reflection on the threat from human insiders–its nature, industry perceptions, and detection approaches. In International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 270–281). Springer, Cham.CrossRefGoogle Scholar
Nwufo, J. I., Nnadozie, E. E., & Beluonwu, M. I. (2023). Influence of Dark Triad and family functioning on Internet addiction among in-school adolescents in Nsukka Urban of Enugu State, Nigeria. African Journal for the Psychological Studies of Social Issues, 26(2), 2134.Google Scholar
O’Boyle, E. H., Jr., Forsyth, D. R., Banks, G. C., & McDaniel, M. A. (2012). A meta-analysis of the Dark Triad and work behavior: A social exchange perspective. Journal of Applied Psychology, 97(3), 557579. https://doi.org/10.1037/a0025679CrossRefGoogle ScholarPubMed
Olckers, C., & Hattingh, M. (2022). The dark side of social media-cyberbullying, catfishing, and trolling: A systematic literature review. EPiC Series in ComputingProceedings of the SocietyIntegrating Digital World and Real World to Resolve Challenges in Business and Society, 84, 86–99.Google Scholar
O’Meara, A., Davies, J., & Hammond, S. (2011). The psychometric properties and utility of the Short Sadistic Impulse Scale (SSIS). Psychological Assessment, 23(2), 523531. https://doi.org/10.1037/a0022400CrossRefGoogle ScholarPubMed
Ong, E. Y., Ang, R. P., Ho, J. C., Lim, J. C., Goh, D. H., Lee, C. S., & Chua, A. Y. (2011). Narcissism, extraversion and adolescents’ self-presentation on Facebook. Personality and Individual Differences, 50(2), 180185. https://doi.org/10.1016/j.paid.2010.09.022CrossRefGoogle Scholar
Orhan, M. A., & Collisson, B. (2022). Who said there’s no such thing as a free lunch? Customers’ Dark Triad traits predict abuse of food refund policies. Personality and Individual Differences, 190, 111527.CrossRefGoogle Scholar
Osborne, C. (June 18, 2022) How Tinder scammers steal your heart, then your money. ZDNet/Finance. Retrieved from www.zdnet.com/finance/todays-tinder-swindlers-how-scammers-steal-your-heart-then-your-money/Google Scholar
Osterholz, S., Mosel, E. I., & Egloff, B. (2023). # Insta personality: Personality expression in Instagram accounts, impression formation, and accuracy of personality judgments at zero acquaintance. Journal of Personality, 91(3), 566582. https://doi-org.ezproxy.haifa.ac.il/10.1111/jopy.12756CrossRefGoogle ScholarPubMed
Owen, T., Noble, W., & Speed, F. C. (2017). Trolling, the ugly face of the social network. In New Perspectives on Cybercrime. Palgrave Studies in Cybercrime and Cybersecurity (pp. 113139). Cham: Palgrave Macmillan. https://doi-org.ezproxy.haifa.ac.il/10.1007/978-3-319-53856-3_7CrossRefGoogle Scholar
Oxford Dictionaries. (2013). Selfie. Retrieved from www.oxforddictionaries.com/definition/English/selfieGoogle Scholar
Ozimek, P., Bierhoff, H., & Hanke, S. (2018). Do vulnerable narcissists profit more from Facebook use than grandiose narcissists? An examination of narcissistic Facebook use in the light of self-regulation and social comparison theory. Personality and Individual Differences, 124, 168177. https://doi.org/10.1016/j.paid.2017.12.016CrossRefGoogle Scholar
Paananen, A., & Reichl, A. J. (2019). Gendertrolls just want to have fun, too. Personality and Individual Differences, 141, 152156. https://doi.org/10.1016/j.paid.2019.01.011CrossRefGoogle Scholar
Pabian, S., De Backer, C. J., & Vandebosch, H. (2015). Dark Triad personality traits and adolescent cyber-aggression. Personality and Individual Differences, 75, 4146. https://doi.org/10.1016/j.paid.2014.11.015CrossRefGoogle Scholar
Pabian, S., & Vandebosch, H. (2023). The Dark Tetrad, online moral disengagement, and online aggression perpetration among adults. Telematics and Informatics Reports, 100089. https://doi.org/10.1016/j.teler.2023.100089CrossRefGoogle Scholar
Padayachee, K. (2020). Understanding the relationship between the Dark Triad of personality traits and neutralization techniques toward cybersecurity behaviour, 10(4), 119. https://doi.org/10.4018/IJCWT.2020100101Google Scholar
Padayachee, K. (2021). Joint effects of neutralization techniques and the Dark Triad of personality traits on gender: An insider threat perspective. In Conference on Information Communications Technology and Society (ICTAS), 4045. https://doi.org/10.1109/ICTAS50802.2021.9395053CrossRefGoogle Scholar
Panatik, S. A., Abdul Raof, N. N., Yusof, J., Nordin, N. A., & Shahrin, R. (2022). Effect of Dark Triad personality on cyberbullying behavior among Malaysian university students. The Eurasia Proceedings of Educational & Social Sciences (EPESS), 25, 2644.CrossRefGoogle Scholar
Papapicco, C., & Quatera, I. (2019). “Do not make to eat to troll!”: The dark side of web. Online Journal of Communication and Media Technologies, 9(2), e201910. https://doi.org/10.29333/ojcmt/5764CrossRefGoogle Scholar
Patchin, J. W., & Hinduja, S. (2015). Measuring cyberbullying: Implications for research. Aggression and Violent Behavior, 23, 6974. https://doi.org/10.1016/j.avb.2015.05.013CrossRefGoogle Scholar
Paul, B. (2009). Predicting Internet pornography use and arousal: The role of individual difference variables. Journal of Sex Research, 46(4), 344357. https://doi.org/10.1080/00224490902754152CrossRefGoogle ScholarPubMed
Paulhus, D. L., Curtis, S. R., & Jones, D. N. (2018). Aggression as a trait: The Dark Tetrad alternative. Current Opinion in Psychology, 19, 8892. https://doi.org/10.1016/j.copsyc.2017.04.007CrossRefGoogle ScholarPubMed
Paulhus, D. L., & Williams, K. M. (2002). The Dark Triad of personality: Narcissism, Machiavellianism, and psychopathy. Journal of Research in Personality, 36(6), 556563. https://doi.org/10.1016/S0092-6566(02)00505-6CrossRefGoogle Scholar
Pearson, C., & Hussain, Z. (2015). Smartphone use, addiction, narcissism, and personality: A mixed methods investigation. International Journal of Cyber Behavior, Psychology and Learning (IJCBPL), 5(1), 1732. http://doi.org/10.4018/ijcbpl.2015010102CrossRefGoogle Scholar
Pechorro, P., Karandikar, S., Carvalho, B., DeLisi, M., & Jones, D. N. (2023). Screening for dark personalities in Portugal: Intra-and interpersonal correlates, reliability and invariance of the Short Dark Tetrad Portuguese version. Deviant Behavior, 44(4), 551566. https://doi.org/10.1080/01639625.2022.2071655CrossRefGoogle Scholar
Perenc, L. (2022). Psychopathic personality disorder and cybercriminality: An outline of the issue. Current Issues in Personality Psychology, 10(4), 253264.Google ScholarPubMed
Perez del Valle, J., & Hand, C. J. (2022). The role of scrupulosity, experiential avoidance, and the Dark Tetrad in problematic pornography use. Sexual Health & Compulsivity, 29(1–2), 6895, https://doi.org/10.1080/26929953.2022.2101168CrossRefGoogle Scholar
Peterson, J., & Densley, J. (2017). Cyber violence: What do we know and where do we go from here? Aggression and Violent Behavior, 34, 193200. https://doi.org/10.1016/j.avb.2017.01.012CrossRefGoogle Scholar
Petit, J., & Carcioppolo, N. (2020). Associations between the Dark Triad and online communication behavior: A brief report of preliminary findings. Communication Research Reports, 37(5), 286297. https://doi.org/10.1080/08824096.2020.186278CrossRefGoogle Scholar
Pew Research Center. (June 12, 2019). Internet/Broadband Fact Sheet. Retrieved from www.pewinternet.org/fact-sheet/internet-broadband/Google Scholar
Pina, A., Bell, A., Griffin, K., & Vasquez, E. (2021). Image based sexual abuse proclivity and victim blaming: The role of dark personality traits and moral disengagement. Oñati Socio-Legal Series, 11(5), 11791197. https://doi.org/10.35295/osls.iisl/0000-0000-0000-1213CrossRefGoogle Scholar
Pina, A., Holland, J., & James, M. (2017). The malevolent side of revenge porn proclivity: Dark personality traits and sexist ideology. International Journal of Technoethics (IJT), 8(1), 3043. https://doi.org/10.4018/IJT.2017010103CrossRefGoogle Scholar
Pineda, D., Galan, M., Martinez-Martinez, A., Campagne, D. M., & Piqueras, J. A. (2022a). Same personality, new ways to abuse: How Dark Tetrad personalities are connected with cyber intimate partner violence. Journal of Interpersonal Violence, 37(13–14), NP11223–NP11241. https://doi.org/10.1177/0886260521991307CrossRefGoogle ScholarPubMed
Pineda, D., Martínez-Martínez, A., Galán, M., Rico-Bordera, P., & Piqueras, J. A. (2023). The Dark Tetrad and online sexual victimization: Enjoying in the distance. Computers in Human Behavior, 107659. https://doi.org/10.1016/j.chb.2023.107659CrossRefGoogle Scholar
Pineda, D., Rico-Bordera, P., Martínez-Martínez, A., Galán, M., & Piqueras, J. A. (2022b). Dark Tetrad personality traits also play a role in bullying victimization. Frontiers in Psychology, 13. https://doi.org/10.3389/fpsyg.2022.984744CrossRefGoogle ScholarPubMed
Plouffe, R. A., Kowalski, C. M., Papageorgiou, K. A., Dinić, B. M., Artamonova, E., Dagnall, N., … & Stalikas, A. (2023). The revised Assessment of Sadistic Personality (ASP-8): Evidence for validity across four countries. Journal of Personality Assessment, 105(2), 149162. https://doi.org/10.1080/00223891.2022.2055476CrossRefGoogle ScholarPubMed
Plouffe, R. A., Smith, M, & Saklofske, D. H. (2019). A psychometric investigation of the assessment of sadistic personality. Personality and Individual Differences, 140, 5760. https://doi.org/10.1016/j.paid.2018.01.002CrossRefGoogle Scholar
Po, L. C., Sher, C. Y., & Liu, Y. H. (2023). Progress and future directions for research on social media addiction: Visualization-based bibliometric analysis. Telematics and Informatics, 101968. https://doi-org.ezproxy.haifa.ac.il/10.1016/j.tele.2023.101968Google Scholar
Porter, S., Bhanwer, A., Woodworth, M., & Black, P. J. (2014). Soldiers of misfortune: An examination of the Dark Triad and the experience of schadenfreude. Personality and Individual Differences, 67, 6468. https://doi.org/10.1016/j.paid.2013.11.014CrossRefGoogle Scholar
Porter, S., & Woodworth, M. (2006). Psychopathy and aggression. In Patrick, C. J. (Ed.), Handbook of Psychopathy (pp. 481494). New York: Guilford Press.Google Scholar
Preotiuc-Pietro, D., Carpenter, J., Giorgi, S., & Ungar, L. (2016). Studying the Dark Triad of personality through Twitter behavior. In Proceedings of the 25th ACM International Conference on Information and Knowledge Management (pp. 761–770). http://dx.doi.org/10.1145/2983323.298382CrossRefGoogle Scholar
Pyżalski, J. (2012). From cyberbullying to electronic aggression: Typology of the phenomenon. Emotional and Behavioural Difficulties, 17(3–4), 305317. https://doi.org/10.1080/13632752.2012.704319CrossRefGoogle Scholar
Rahman, M. S., & Muldoon, J. (2020). Dark side of technology: Investigating the role of dark personality traits and technological factors in managing cyberloafing behavior. Journal of Strategic Innovation and Sustainability, 15(3), 3654.Google Scholar
Rajesh, T., & Rangaiah, B. (2022). Relationship between personality traits and Facebook addiction: A meta-analysis. Heliyon, 8(8), e10315. https://doi.org/10.1016/j.heliyon.2022.e10315CrossRefGoogle ScholarPubMed
Ramamoorti, S., & Epstein, B. J. (2016). When reckless executives become dangerous fraudsters: Reward structures and auditing procedures need to be reformed to deter Dark Triad personalities. The CPA Journal, 86(11), 610.Google Scholar
Randazzo, M. R., Keeney, M., Kowalski, E., Cappelli, D., and Moore, A. (2004). Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector. U.S. Secret Service and CERT Coordination Center/Carnegie Mellon University Software Engineering Institute. Retrieved from www.secretservice.gov/ntac/its_report_040820.pdfGoogle Scholar
Rauthmann, J. F. (2013). Investigating the MACH–IV with item response theory and proposing the trimmed MACH. Journal of Personality Assessment, 95(4), 388397. https://doi.org/10.1080/00223891.2012.742905CrossRefGoogle ScholarPubMed
Rauthmann, J. F., & Kolar, G. P. (2012). How “dark” are the Dark Triad traits? Examining the perceived darkness of narcissism, Machiavellianism, and psychopathy. Personality and Individual Differences, 53(7), 884889. https://doi.org/10.1016/j.paid.2012.06.020CrossRefGoogle Scholar
Reep-van den Bergh, C. M. M., & Junger, M. (2018). Victims of cybercrime in Europe: a review of victim surveys. Crime Science, 7(1), 115. https://doi.org/10.1186/s40163-018-0079-3CrossRefGoogle Scholar
Reidy, D. E., Zeichner, A., & Seibert, L. A. (2011). Unprovoked aggression: Effects of psychopathic traits and sadism. Journal of Personality, 79(1), 75100.CrossRefGoogle ScholarPubMed
Resett, S., Caino, P. G., & Mesurado, B. (2022). Emotional problems, dark personality, sexting and grooming in adolescents: The role of gender and age. CES Psicología, 15(2), 2343.CrossRefGoogle Scholar
Resett, S., & González Caino, P. C. (2023). Psychometric properties of the revised trolling questionnaire in Argentinean adults. Acta Colombiana de Psicología, 26(2), 101113. www.doi.org/10.14718/ACP.2023.26.2.9CrossRefGoogle Scholar
Rivera, P. (2021). Tweepy: An easy-to-use Python library for accessing the Twitter API. Tweepy. Retrieved from www.tweepy.orgGoogle Scholar
Robertson, S. A., Datu, J. A. D., Brawley, A. M., Pury, C. L., Mateo, N. J. (2016). The Dark Triad and social behavior: The influence of self-construal and power distance. Personality and Individual Differences, 98, 6974. https://doi-org.ezproxy.haifa.ac.il/10.1016/j.paid.2016.03.090CrossRefGoogle Scholar
Rochat, L., Orita, E., Jeannot, E., Achab, S., & Khazaal, Y. (2023). Willingness to pay for a dating app: Psychological correlates. International Journal of Environmental Research and Public Health, 20(3). https://doi.org/10.3390/ijerph20032101CrossRefGoogle ScholarPubMed
Rohwer, E., Flöther, J.-C., Harth, V., & Mache, S. (2022). Overcoming the “Dark Side” of technology: A scoping review on preventing and coping with work-related technostress. International Journal of Environmental Research and Public Health, 19(6), 3625. https://doi.org/10.3390/ijerph19063625CrossRefGoogle ScholarPubMed
Rood, M. L., & Schriner, J. (2021). The Internet never forgets: Image-based sexual abuse and the workplace. In Ramos Salazar, L. (Ed.), Handbook of Research on Cyberbullying and Online Harassment in the Workplace, Chapter 6 (pp. 107128). Hershey PA, USA: IGI Global.Google Scholar
Rosen, L. D., Whaling, K., Rab, S., Carrier, L. M., & Cheever, N. A. (2013). Is Facebook creating “iDisorders”? The link between clinical symptoms of psychiatric disorders and technology use, attitudes and anxiety. Computers in Human Behavior, 29(3), 12431254. https://doi.org/10.1016/j.chb.2012.11.012CrossRefGoogle Scholar
Rosenberg, J., & Egbert, N. (2011). Online impression management: Personality traits and concerns for secondary goals as predictors of self-presentation tactics on Facebook. Journal of Computer-Mediated Communication, 17, 118. https://doi.org/10.1111/j.1083-6101.2011.01560.x.CrossRefGoogle Scholar
Rosenthal, S. A., & Pittinsky, T. L. (2006). Narcissistic leadership. The Leadership Quarterly, 17(6), 617633. https://doi.org/10.1016/j.leaqua.2006.10.005CrossRefGoogle Scholar
Ryan, T., & Xenos, S. (2011). Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage. Computers in Human Behavior, 27(5), 16581664. https://doi.org/10.1016/j.chb.2011.02.004CrossRefGoogle Scholar
Sabillon, R., Cano, J., Cavaller, V., & Serra, J. (2016). Cybercrime and cybercriminals: A comprehensive study. International Journal of Computer Networks and Communications Security, 4(6), 176165.Google Scholar
Safaria, T., Nuqul, F. L., Purwandari, E., Ratnaningsih, I. Z., Khairania, M., Saputra, N., … & Mariati, L. I. (2020). The role of Dark Triad personality on cyberbullying: is it still a problem? International Journal of Scientific & Technology Research, 9(2), 42564260.Google Scholar
Salimi, S., Khojaste, L., Qazizadeh, F., & Abbasi, M. (2023). Designing a structural model for social media addiction based on the Dark Triad of personality: The mediating role of student social comparison. Journal of Research in Psychopathology, 4(12). https://doi.org/10.22098/jrp.2022.11336.1133Google Scholar
Sánchez-Medina, A. J., Galván-Sánchez, I., & Fernández-Monroy, M. (2020). Applying artificial intelligence to explore sexual cyberbullying behaviour. Heliyon, 6(1), e03218. https://doi.org/10.1016/j.heliyon.2020.e03218CrossRefGoogle ScholarPubMed
Sanders, G. L., Upadhyaya, S., & Wang, X. (2019). Inside the insider. IEEE Engineering Management Review, 47(2), 8491. https://doi.org/10.1109/EMR.2019.2917656CrossRefGoogle Scholar
Sari, B. L., & Adriani, Y. (2022). Empathy as a mediator of the effect of Dark Triad personality, social support, and demographic factors on cyberbullying behavior in SMAN 10 Depok students. TAZKIYA Journal of Psychology, 10(2), 122131. https://repository.uinjkt.ac.id/dspace/handle/123456789/66090CrossRefGoogle Scholar
Satchell, L. P., Corr, P. J., & Latzman, R. D. (2022). Pirates with psychopathic personalities? The role of sub-clinical and normative traits in illegal streaming and downloading of media. Journal of Research in Personality, 96, 104158. https://doi.org/10.1016/j.jrp.2021.104158CrossRefGoogle Scholar
Savacı, G. Z., Bayraktar, B. K., & Özen, Ç. (2021). The impacts of behavioral factors on social media addiction. Journal of Computer and Education Research, 9(18), 10591083. https://doi.org/10.18009/jcer.1013726CrossRefGoogle Scholar
Savci, M. (2019). Social media craving and the amount of self-disclosure: The mediating role of the Dark Triad. International Online Journal of Educational Sciences, 11(4), 110. https://doi.org/10.15345/iojes.2019.04.001CrossRefGoogle Scholar
Savci, M., & Griffiths, M. D. (2019). The development of the Turkish Social Media Craving Scale (SMCS): A validation study. International Journal of Mental Health and Addiction. https://doi.org/10.1007/s11469-019-00062-9Google Scholar
Savci, M., Turan, M. E., Griffiths, M. D., & Ercengiz, M. (2021). Histrionic personality, narcissistic personality, and problematic social media use: Testing of a new hypothetical model. International Journal of Mental Health and Addiction, 19, 9861004. https://doi.org/10.1007/s11469-019-00139-5CrossRefGoogle Scholar
Scarduzio, J., & Adams, M. (2022). 9 Exploring coworker online sexual harassment and risk: Factors of uncertainty and ambiguity for employees and organizations. In Engemann, K., Engemann, K., & Scott, C. (Eds.), Volume III Organizational Risk Management: Managing for Uncertainty and Ambiguity (pp. 171188). Berlin, Boston: De Gruyter. https://doi.org/10.1515/9783110670202-009CrossRefGoogle Scholar
Schade, E. C., Voracek, M., & Tran, U. S. (2021). The nexus of the Dark Triad personality traits with cyberbullying, empathy, and emotional intelligence: A structural-equation modeling approach. Frontiers in Psychology, 12. https://doi.org/10.3389/fpsyg.2021.659282CrossRefGoogle ScholarPubMed
Schoenherr, J. R., Lilja-Lolax, K., & Gioe, D. (2022). Multiple approach paths to insider threat (MAP-IT): Intentional, ambivalent and unintentional insider threats. Counter-Insider Threat Research and Practice, 1(1), 123.Google Scholar
Schokkenbroek, J. M., Ponnet, K., Hauspie, T., & Hardyns, W. (2022). Malevolent monitoring: Dark Triad traits, cyber dating abuse and the instrumental role of self-control. In 71nd Annual ICA Conference.Google Scholar
Scholz, D. D., Thielmann, I., & Hilbig, B. E. (2023). Down to the core: The role of the common core of dark traits for aversive relationship behaviors. Personality and Individual Differences, 213, 112263. https://doi.org/10.1016/j.paid.2023.112263CrossRefGoogle Scholar
Schyns, B. (2015). Dark personality in the workplace: Introduction to the special issue. Applied Psychology: An International Review, 64(1), 114. https://doi.org/10.1111/apps.12041CrossRefGoogle Scholar
Scott, G. G., Boyle, E. A., Czerniawska, K., & Courtney, A. (2018). Posting photos on Facebook: The impact of narcissism, social anxiety, loneliness, and shyness. Personality and Individual Differences, 133, 6772. https://doi-org.ezproxy.haifa.ac.il/10.1016/j.paid.2016.12.039CrossRefGoogle Scholar
Scott, G. G., Brodie, Z. P., Wilson, M. J., Ivory, L., Hand, C. J., & Sereno, S. C. (2020). Celebrity abuse on Twitter: The impact of tweet valence, volume of abuse, and Dark Triad personality factors on victim blaming and perceptions of severity. Computers in Human Behavior, 103, 109119. https://doi.org/10.1016/j.chb.2019.09.020CrossRefGoogle Scholar
Seigfried-Spellar, K. C., Villacís-Vukadinović, N., & Lynam, D. R. (2017). Computer criminal behavior is related to psychopathy and other antisocial behavior. Journal of Criminal Justice, 51, 6773. https://doi.org/10.1016/j.jcrimjus.2017.06.003CrossRefGoogle Scholar
Selzer, N., & Oelrich, S. (2021). Saint or Satan? Moral development and Dark Triad influences on cybercriminal intent. In Weulen Kranenbarg, M., & Leukfeldt, R. (Eds.), Cybercrime in Context: The Human Factor in Victimization, Offending, and Policing (pp. 175194). Cham: Springer.CrossRefGoogle Scholar
Servidio, R., Griffiths, M. D., & Demetrovics, Z. (2021). Dark Triad of personality and problematic smartphone use: A preliminary study on the mediating role of fear of missing out. International Journal of Environmental Research and Public Health, 18(16), 8463. https://doi.org/10.3390/ijerph18168463CrossRefGoogle Scholar
Sest, N., & March, E. (2017). Constructing the cyber‐troll: Psychopathy, sadism, and empathy. Personality and Individual Differences, 119, 6972. https://doi.org/10.1016/j.paid.2017.06.038CrossRefGoogle Scholar
Sevi, B. (2019). The dark side of Tinder: The Dark Triad of personality as correlates of Tinder use. Journal of Individual Differences, 40(4), 242246. https://doi.org/10.1027/1614-0001/a000297CrossRefGoogle Scholar
Shabahang, R., Aruguete, M. S., Shim, H., Hosseinkhanzadeh, A. A., & Azadimanesh, P. (2023). From skepticism toward celebrities to celebrity culture hate: Mediating role of perceived celebrity deception and perceived Dark Triad of celebrities. Interpersona: An International Journal on Personal Relationships, 17(1), 88110. https://doi.org/10.5964/ijpr.9221CrossRefGoogle Scholar
Shahnawaz, M. G., Nasir, S., & Rehman, U. (2020). Sadism and cyber aggression: Moral identity as a possible moderator. Journal of Aggression, Maltreatment & Trauma, 29(8), 969983. https://doi-org.ezproxy.haifa.ac.il/10.1080/10926771.2019.1575302CrossRefGoogle Scholar
Shiau, W. L., Dwivedi, Y. K., & Lai, H. H. (2018). Examining the core knowledge on Facebook. International Journal of Information Management, 43, 5263. https://doi.org/10.1016/j.ijinfomgt.2018.06.006CrossRefGoogle Scholar
Shim, J. W., Lee, S., & Paul, B. (2007). Who responds to unsolicited sexually explicit materials on the internet? The role of individual differences. Cyber Psychology & Behavior, 10(1), 7179. https://doi.org/10.1089/cpb.2006.9990CrossRefGoogle ScholarPubMed
Shrivastava, A. (2023). Social media addiction, Dark Triad traits, and the role of self-esteem among Indian GenZ. International Journal of Indian Psychoׄlogy, 11(2), 22862300. https://doi.org/10.25215/1102.228Google Scholar
Siah, P. C., Hue, J. Y., Wong, B. Z. R., & Goh, S. J. (2021). Dark Triad and social media addiction among undergraduates: Coping strategy as a mediator. Contemporary Educational Technology, 13(4). https://doi.org/10.30935/cedtech/11104CrossRefGoogle Scholar
Sindermann, C., Sariyska, R., Lachmann, B., Brand, M., & Montag, C. (2018). Associations between the Dark Triad of personality and unspecified/specific forms of Internet-use disorder. Journal of Behavioral Addictions, 7, 985992. https://doi.org/10.1556/2006.7.2018.114CrossRefGoogle ScholarPubMed
Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49(2), 147154. https://doi.org/10.1111/j.1467-9450.2007.00611.xCrossRefGoogle ScholarPubMed
Smith, A. D. (2021, June 21). The personality disorder we don’t hear enough about. Psychology Today. Retrieved from www.psychologytoday.com/us/blog/and-running/202106/the-personality-disorder-we-dont-hear-enough-aboutGoogle Scholar
Smith, K., Emerson, D., Haight, T., & Wood, B. (2023). An examination of online cheating among business students through the lens of the Dark Triad and Fraud Diamond. Ethics & Behavior, 33(6), 433460. https://doi.org/10.1080/10508422.2022.2104281CrossRefGoogle Scholar
Smith, K. J., Emerson, D. J., & Mauldin, S. (2021). Online cheating at the intersection of the Dark Triad and fraud diamond. Journal of Accounting Education, 57, 100753. https://doi.org/10.1016/j.jaccedu.2021.100753CrossRefGoogle Scholar
Smith, S. F., & Lilienfeld, S. O. (2013). Psychopathy in the workplace: The knowns and unknowns. Aggression and Violent Behavior. 18, 204218. https://doi.org/10.1016/j.avb.2012.11.007CrossRefGoogle Scholar
Smith, K., Mendez, F., & White, G. L. (2014). Narcissism as a predictor of Facebook users’ privacy concern, vigilance, and exposure to risk. International Journal of Technology and Human Interaction (IJTHI), 10(2), 7895. https://doi.org/10.4018/ijthi.2014040105CrossRefGoogle Scholar
Smoker, M., & March, E. (2017). Predicting perpetration of intimate partner cyberstalking: Gender and the Dark Tetrad. Computers in Human Behavior, 72, 390396. https://doi.org/10.1016/j.chb.2017.03.012CrossRefGoogle Scholar
Soleimani Rad, H., & Abolghasemi, A. (2021). The role of psychological needs and Dark Triad traits of personality in selfie-taking behavior. Journal of Modern Psychology, 1(2), 1225. https://doi.org/10.22034/JMP.2021.314664.1020Google Scholar
Sorokowski, P., Kowal, M., Zdybek, P., & Oleszkiewicz, A. (2020). Are online haters psychopaths? Psychological predictors of online hating behavior. Frontiers in Psychology, 11, 553. https://doi.org/10.3389/fpsyg.2020.00553CrossRefGoogle ScholarPubMed
Spain, S. M., Harms, P., & LeBreton, J. M. (2014). The dark side of personality at work. Journal of Organizational Behavior, 35(S1), S41S60. https://doi.org/10.1002/job.1894CrossRefGoogle Scholar
Sparavec, A., March, E., & Grieve, R. (2022). The Dark Triad, empathy, and motives to use social media. Personality and Individual Differences, 194, 111647. https://doi.org/10.1016/j.paid.2022.111647CrossRefGoogle Scholar
Sparks, B., Stephens, S., & Trendell, S. (2023). Image-based sexual abuse: Victim-perpetrator overlap and risk-related correlates of coerced sexting, non-consensual dissemination of intimate images, and cyberflashing. Computers in Human Behavior, 107879. https://doi.org/10.1016/j.chb.2023.107879CrossRefGoogle Scholar
Srinivas, P. Y. K. L., Das, A., & Pulabaigari, V. (2022). Fake spreader is narcissist; real spreader is Machiavellian prediction of fake news diffusion using psycho-sociological facets. Expert Systems with Applications, 207, 117952. https://doi.org/10.1016/j.eswa.2022.117952Google Scholar
Statista. (2021). Global digital population as of January 2021. Retrieved from www.statista.com/statistics/617136/digitalpopulation-worldwide/. Accessed on 1 March 2022.Google Scholar
Statista. (2023a). Cyberbullying – Statistics & facts. Retrieved from www.statista.com/topics/1809/cyber-bullyingGoogle Scholar
Statista. (2023b). Online dating worldwide – Statistics & facts. Retrieved from www.statista.com/topics/7443/online-dating/Google Scholar
Statista. (2023c). Facebook – Statistics & facts. Retrieved from www.statista.com/topics/751/facebook/#topicOverviewGoogle Scholar
Stephenson, P., & Walter, R. (2012). Cyber crime assessment. In 2012 45th Hawaii International Conference on System Science (HICSS), vol. 45, pp. 5404–5413, January 4–7. https://doi.org/10.1109/HICSS.2012.190CrossRefGoogle Scholar
Stiff, C. (2019). The Dark Triad and Facebook surveillance: How Machiavellianism, psychopathy, but not narcissism predict using Facebook to spy on others. Computers in Human Behavior, 94, 6269. https://doi.org/10.1016/j.chb.2018.12.044CrossRefGoogle Scholar
Storey, J. E., Hart, S. D., Meloy, J. R., & Reavis, J. A. (2009). Psychopathy and stalking. Law and Human Behavior, 33(3), 237246. https://doi.org/10.1007/s10979-008-9149.CrossRefGoogle ScholarPubMed
Strickland, M. L., Love, H., & Kimmes, J. (2022). The interaction between adolescent cyber dating abuse and parenting on mental health outcomes. Journal of Child and Family Studies, 112. https://doi.org/10.1007/s10826-022-02433-8Google Scholar
Stuart, J., & Kurek, A. (2019). Looking hot in selfies: Narcissistic beginnings, aggressive outcomes? International Journal of Behavioral Development, 43(6), 500506. https://doi.org/10.1177/0165025419865621CrossRefGoogle Scholar
Sudzina, F., & Pavlicek, A. (2017). Propensity to click on suspicious links: Impact of gender, of age, and of personality traits. In 30th BLED E-Conference Digital Transformation, BLED 2017 Proceedings, vol. 10, pp. 593–602. http://aisel.aisnet.org/bled2017/10CrossRefGoogle Scholar
Sumner, C., Byers, A., Boochever, R., & Park, G. (December 2012). Predicting Dark Triad personality traits from Twitter and a linguistic analysis of tweets. Paper presented at the International Conference on Machine Learning and Applications, Boca Raton, FL.CrossRefGoogle Scholar
Swenson-Lepper, T., & Kerby, A. (2019). Cyberbullies, trolls, and stalkers: Students’ perceptions of ethical issues in social media. Journal of Media Ethics, 34(2), 112. https://doi.org/10.1080/23736992.2019.1599721CrossRefGoogle Scholar
Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664670. https://doi.org/2089195CrossRefGoogle Scholar
Symantec. (2023). 2023 cyber security report. Retrieved from https://pages.checkpoint.com/cyber-security-report-2023.htmlGoogle Scholar
Takezawa, M., Matsui, M., & Kawasaki, N. (2023). Narcissism and intimate partner violence using information and communication technology in Japan. Journal of Family Violence, 38, 931940. https://doi.org/10.1007/s10896-022-00426-1CrossRefGoogle Scholar
Tandon, A., Kaur, P., Ruparel, N., Islam, J. U., & Dhir, A. (2021). Cyberloafing and cyberslacking in the workplace: Systematic literature review of past achievements and future promises. Internet Research. https://doi.org/10.1108/INTR-06-2020-0332Google Scholar
Tang, W. Y., Reer, F., & Quandt, T. (2020). The interplay of gaming disorder, gaming motivations, and the Dark Triad. Journal of Behavioral Addictions, 9(2), 491496.CrossRefGoogle ScholarPubMed
Tang, W. Y., Reer, F., & Quandt, T. (2022). The interplay of the Dark Triad and social media use motives to social media disorder. Personality and Individual Differences, 187, 111402. https://doi.org/10.1016/j.paid.2021.111402CrossRefGoogle Scholar
Tahoon, R. (2020). Mediating effects of dark personality triad and real and mediated social interaction on social media addiction and academic performance in university students. Clinical and Experimental Psychology, 6(4), 110.Google Scholar
Themelidis, L., & Davies, J. (2021). Creating evil: Can sadism be induced? Personality and Individual Differences, 168, 110358. https://doi.org/10.1016/j.paid.2020.110358CrossRefGoogle Scholar
The Tinder Swindler. (December 5, 2022). In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/The_Tinder_SwindlerGoogle Scholar
Thomason-Darch, N. (2021). The Dark Tetrad of personality and the tendency to engage in revenge porn. The Plymouth Student Scientist, 14(2), 651668. http://hdl.handle.net/10026.1/18520Google Scholar
Timmermans, E., De Caluwe, E., & Alexopoulos, C. (2018). Why are you cheating on tinder? Exploring users’ motives and (dark) personality traits. Computers in Human Behavior, 89, 129139. https://doi.org/10.1016/j.chb.2018.07.040CrossRefGoogle Scholar
Treadway, D. C., Yang, J., Bentley, J. R., Williams, L. V., & Reeves, M. (2017). The impact of follower narcissism and LMX perceptions on feeling envied and job performance. The International Journal of Human Resource Management, 122. https://doi.org/10.1080/09585192.2017.1288151Google Scholar
Tripathi, N., & Lim, V. K. (2014). Moderating effect of Machiavellianism and perceived similarity on cyber incivility and its outcomes. In Academy of Management Proceedings, 2014(1), Academy of Management, Briarcliff Manor, New York, NY, p. 12000.CrossRefGoogle Scholar
Tsoukas, A., & March, E. (2018). Predicting short- and long-term mating orientations: The role of sex and the Dark Tetrad. The Journal of Sex Research, 55(9), 12061218. https://doi.org/10.1080/00224499.2017.1420750CrossRefGoogle Scholar
Tucaković, L., Bojić, L., & Nikolić, N. (2022). The battle between light and dark Side of personality: How light and dark personality traits predict mating strategies in the online context. Interpersona: An International Journal on Personal Relationships, 16(2), 295312. https://doi.org/10.5964/ijpr.7869CrossRefGoogle Scholar
Turan, M. E., Adam, F., Kaya, A., & Yıldırım, M. (2023). The mediating role of the dark personality triad in the relationship between ostracism and social media addiction in adolescents. Education and Information Technologies, 117. https://doi-org.ezproxy.haifa.ac.il/10.1007/s10639-023-12002-1Google Scholar
United States Department of Health and Human Services (January 2018). Laws, policies and regulations. Retrieved on June 14, 2019, from www.stopbullying.gov/laws/index.htmlGoogle Scholar
Vaknin, S. (December 28, 2008). The cyber narcissist. Healthy Place. Retrieved on March 1, 2022, from www.healthyplace.com/personality-disorders/malignant-self-love/cyber-narcissistGoogle Scholar
Valentine, J. L., Miles, L. W., Mella Hamblin, K., & Worthen Gibbons, A. (2023). Dating app facilitated sexual assault: A retrospective review of sexual assault medical forensic examination charts. Journal of Interpersonal Violence, 38(9–10), 62986322. https://doi.org/10.1177/08862605221130390CrossRefGoogle ScholarPubMed
Valli, C. (2004). Non-business use of the WWW in three Western Australian organizations. Internet Research, 14(5), 353359. https://doi-org.ezproxy.haifa.ac.il/10.1108/10662240410566944CrossRefGoogle Scholar
VandenBos, G. R. (Ed.). (2007). APA Dictionary of Psychology. American Psychological Association.Google Scholar
Vander Molen, R. J., Kaplan, S., Choi, E., & Montoya, D. (2018). Judgments of the Dark Triad based on Facebook profiles. Journal of Research in Personality, 73, 150163. https://doi.org/10.1016/j.jrp.2017.11.010CrossRefGoogle Scholar
van der Vegt, I., Kleinberg, B., & Gill, P. (2022). Predicting author profiles from online abuse directed at public figures. Journal of Threat Assessment and Management. Advance online publication. http://dx.doi.org/10.1037/tam0000172CrossRefGoogle Scholar
van Geel, M., Goemans, A., Toprak, F., & Vedder, P. (2017). Which personality traits are related to traditional bullying and cyberbullying? A study with the Big Five, Dark Triad and sadism. Personality and Individual Differences, 106, 231235. https://doi.org/10.1016/j.paid.2016.10.063CrossRefGoogle Scholar
Verbalyte, M., Keitel, C., & Howard, K. (2022). Online trolls: Unaffectionate psychopaths or just lonely outcasts and angry partisans?. Politics and Governance, 10(4), 396410. https://doi.org/10.17645/pag.v10i4.5790CrossRefGoogle Scholar
Volkmer, S. A., Gaube, S., Raue, M., & Lermer, E. (2023). Troll story: The Dark Tetrad and online trolling revisited with a glance at humor. PLoS One, 18(3), e0280271. https://doi.org/10.1371/journal.pone.0280271CrossRefGoogle ScholarPubMed
Vranjes, I., Baillien, E., Vandebosch, H., Erreygers, S., & De Witte, H. (2017). The dark side of working online: Towards a definition and an Emotion Reaction model of workplace cyberbullying. Computers in Human Behavior, 69, 324334. https://doi.org/10.1016/j.chb.2016.12.055CrossRefGoogle Scholar
Vyawahare, M., & Chatterjee, M. (2020). Taxonomy of cyberbullying detection and prediction techniques in online social networks. In Jain, L. C., Tsihrintzis, G. A., Balas, V. E., & Sharma, D. (Eds.), Data Communication and Networks (pp. 2137). Springer. https://doi.org/10.1007/978-981-15-0132-6_3CrossRefGoogle Scholar
Wang, P., Hu, H., Mo, P. K., Ouyang, M., Geng, J., Zeng, P., & Mao, N. (2022a). How is father phubbing associated with adolescents’ social networking sites addiction? roles of narcissism, need to belong, and loneliness. The Journal of Psychology, 118. https://doi-org.ezproxy.haifa.ac.il/10.1080/00223980.2022.2034726Google Scholar
Wang, J., Nansel, T. R., & Iannotti, R. J. (2011). Cyber and traditional bullying: Differential association with depression. Journal of Adolescent Health, 48(4), 415417. https://doi.org/10.1016/j.jadohealth.2010.07.012CrossRefGoogle ScholarPubMed
Wang, S., Zhu, X., Ding, W., & Yengejeh, A. A. (2022b). Cyberbullying and cyberviolence detection: A triangular user-activity-content view. IEEE/CAA Journal of Automatica Sinica, 9(8), 13841405. https://doi.org/10.1109/JAS.2022.105740CrossRefGoogle Scholar
Weatherbee, T. G. (2010). Counterproductive use of technology at work: Information & communications technologies and cyberdeviancy. Human Resource Management Review, 20(1), 3544. https://doi.org/10.1016/j.hrmr.2009.03.012CrossRefGoogle Scholar
Widman, L., & McNulty, J. K. (2010). Sexual narcissism and the perpetration of sexual aggression. Archives of Sexual Behavior, 39(4), 926939. https://doi.org/10.1007/s10508-008-9461-7CrossRefGoogle ScholarPubMed
Williams, K. M., Paulhus, D. L., & Hare, R. D. (2007). Capturing the four-factor structure of psychopathy in college students via self-report. Journal of Personality Assessment, 88(2), 205219. https://doi.org/10.1080/00223890701268074CrossRefGoogle ScholarPubMed
Willis, M. L., Oliver, E., & March, E. (2023). Dating in the dark: Vulnerable narcissism predicts inauthentic self-presentation in online dating. Telematics and Informatics. https://doi-org.ezproxy.haifa.ac.il/10.1016/j.tele.2023.101985CrossRefGoogle Scholar
Wilson, D. S., Near, D., & Miller, R. R. (1996). Machiavellianism: A synthesis of the evolutionary and psychological literatures. Psychological Bulletin, 119(2), 285299. https://doi.org/10.1037/0033-2909.119.2.285CrossRefGoogle ScholarPubMed
Wilson, C., Sheridan, L., & Garratt-Reed, D. (2022). Examining cyberstalking perpetration and victimization: A scoping review. Trauma, Violence, & Abuse. https://doi.org/10.1177/15248380221082937Google ScholarPubMed
Wisse, B., Barelds, D. P., & Rietzschel, E. F. (2015). How innovative is your employee? The role of employee and supervisor Dark Triad personality traits in supervisor perceptions of employee innovative behavior. Personality and Individual Differences, 82, 158162. https://doi.org/10.1016/j.paid.2015.03.020CrossRefGoogle Scholar
Wissink, I. B., Standaert, J. C., Stams, G. J. J., Asscher, J. J., & Assink, M. (2023). Risk factors for juvenile cybercrime: A meta-analytic review. Aggression and Violent Behavior, 101836. https://doi-org.ezproxy.haifa.ac.il/10.1016/j.avb.2023.101836CrossRefGoogle Scholar
Withers, K. L., Parrish, J. L., Terrell, S., & Ellis, T. J. (2017). The relationship between the “Dark Triad” personality traits and deviant behavior on social networking sites. In Proceedings of the Americas Conference on Information Systems (AMCIS), Boston, MA.Google Scholar
Wolfe, D. T., & Hermanson, D. R. (2004). The fraud diamond: Considering the four elements of fraud. The CPA Journal, 74(12), 3842. https://digitalcommons.kennesaw.edu/facpubsGoogle Scholar
World Health Organization. (2013). Global and regional estimates of violence against women: Prevalence and health effects of intimate partner violence and non-partner sexual violence. Retrieved from www.who.int/publications/i/item/9789241564625Google Scholar
World Health Organization. (2018). WHO releases new International Classification of Diseases (ICD 11). Retrieved on December 5, 2018, from www.who.int/news-room/detail/18-06-2018-who-releases-new-international-classification-of-diseases-(icd-11)Google Scholar
Wright, M. F., Huang, Z., Wachs, S., Aoyama, I., Kamble, S., Soudi, S., … & Shu, C. (2020). Associations between cyberbullying perpetration and the Dark Triad of personality traits: the moderating effect of country of origin and gender. Asia Pacific Journal of Social Work and Development, 30(3), 242256. https://doi.org/10.1080/02185385.2020.1788979CrossRefGoogle Scholar
Wright, A. G. C., Pincus, A. L., Thomas, K. M., Hopwood, C. J., Markon, K. E., & Krueger, R. F. (2013). Conceptions of narcissism and the DSM-5 pathological personality traits. Assessment, 20, 339352. https://doi.org/10.1177/1073191113486692CrossRefGoogle ScholarPubMed
Wright, M. F., Wachs, S., Huang, Z., Kamble, S. V., Soudi, S., Bayraktar, F., Li, Z., Lei, L., & Shu, C. (2022). Longitudinal associations among Machiavellianism, popularity goals, and adolescents’ cyberbullying involvement: The role of gender. Journal of Genetic Psychology, 183(5), 482493. disinhibitionCrossRefGoogle ScholarPubMed
Wu, J., & Lebreton, J. M. (2011). Reconsidering the dispositional basis of counterproductive work behavior: The role of aberrant personality. Personnel Psychology, 64(3), 593626. https://doi.org/10.1111/j.1744-6570.2011.01220.xCrossRefGoogle Scholar
Wu, B., Zhou, L., Deng, Y., Zhao, J., & Liu, M. (2022). Online disinhibition and online trolling among Chinese college students: the mediation of the Dark Triad and the moderation of gender. Cyberpsychology, Behavior, and Social Networking, 25(11), 744751. https://doi-org.ezproxy.haifa.ac.il/10.1089/cyber.2022.0046CrossRefGoogle ScholarPubMed
Xu, X., Gao, L. F., Lian, S. L., Chen, Q., & Zhou, Z. K. (2022). How the Dark Triad associated with internet gaming disorder? The serial mediation of basic psychological needs satisfaction and negative coping styles. Current Psychology, 19. https://doi-org.ezproxy.haifa.ac.il/10.1007/s12144-022-03996-xGoogle ScholarPubMed
Yeo, V. C. S., Goh, S. K., & Rezaei, S. (2017). Consumer experiences, attitude and behavioral intention toward online food delivery (OFD) services. Journal of Retailing and Consumer services, 35, 150162. https://doi.org/10.1016/j.jretconser.2016.12.013CrossRefGoogle Scholar
Young, K. S., Griffin-Shelley, E., Cooper, A., O’mara, J., & Buchanan, J. (2000). Online infidelity: A new dimension in couple relationships with implications for evaluation and treatment. Sexual Addiction & Compulsivity: The Journal of Treatment and Prevention, 7(1–2), 5974. https://doi.org/10.1080/10720160008400207CrossRefGoogle Scholar
Yuan, G., Liu, Z., & An, Y. (2020a). Machiavellianism, mindfulness and cyberbullying among Chinese junior high school students: The mediating role of empathy. Journal of Aggression, Maltreatment & Trauma, 29(9), 10471058. https://doi.org/10.1080/10926771.2019.1667467CrossRefGoogle Scholar
Yuan, C., Hong, Y., & Wu, J. (2020b). Does Facebook activity reveal your dark side? Using online language features to understand an individual’s Dark Triad and needs. Behaviour & Information Technology, 115. https://doi.org/10.1080/0144929X.2020.1805513Google Scholar
Zerach, G. (2016). Pathological narcissism, cyberbullying victimization and offending among homosexual and heterosexual participants in online dating websites. Computers in Human Behavior, 57, 292299. https://doi.org/10.1016/j.chb.2015.12.038CrossRefGoogle Scholar
Zhang, Z., Bian, S., Zhao, H., & Qi, C. (2022). Dark Triad and cyber aggression among Chinese adolescents during COVID-19: A moderated mediation model. Frontiers in Psychology, 13, 1–9.Google ScholarPubMed
Zhang, S., & Leidner, D. (2014). Workplace cyberbullying: The antecedents and consequences. In: Proceedings of the 20th Americas Conference on Information Systems, AMCIS 2014. Savannah.Google Scholar
Zhang, S., Leidner, D., Cao, X., & Liu, N. (2022). Workplace cyberbullying: A criminological and routine activity perspective. Journal of Information Technology, 37(1), 5179. https://doi.org/10.1177/02683962211027888CrossRefGoogle Scholar
Zhang, H., & Zhao, H. (2020). Dark personality traits and cyber aggression in adolescents: A moderated mediation analysis of belief in virtuous humanity and self-control. Children and Youth Services Review, 119, 105565. https://doi.org/10.1016/j.childyouth.2020.105565CrossRefGoogle ScholarPubMed
Zhou, Y. (2023). The benefits and dangers of online dating apps. Canadian Journal of Family and Youth/Le Journal Canadien de Famille et de la Jeunesse, 15(2), 5462. https://doi.org/10.29173/cjfy29872CrossRefGoogle Scholar
Zweig, J. M., Lachman, P., Yahner, J., & Dank, M. (2014). Correlates of cyber dating abuse among teens. Journal of Youth and Adolescence, 43(8), 13061321. https://doi.org/10.1007/s10964-013-0047-xCrossRefGoogle ScholarPubMed

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Aaron Cohen, University of Haifa
  • Book: The Cyber Predators
  • Online publication: 11 April 2024
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Aaron Cohen, University of Haifa
  • Book: The Cyber Predators
  • Online publication: 11 April 2024
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Aaron Cohen, University of Haifa
  • Book: The Cyber Predators
  • Online publication: 11 April 2024
Available formats
×