DOI QR코드

DOI QR Code

Examining Malicious Online Comments from the Bystander Effect Perspective

  • Sodam Kim (Graduate School of Information, Yonsei University) ;
  • Sumeet Gupta (Indian Institute of Management Raipur) ;
  • So-Hyun Lee (School of Management, Xi'an Jiaotong University) ;
  • Hee-Woong Kim (Graduate School of Information, Yonsei University)
  • Received : 2020.08.21
  • Accepted : 2020.12.08
  • Published : 2021.03.31

Abstract

Cyberbullying has become a social problem as malicious text messages and online comments among teenagers have increased in the late 2000s. Some serious reporting has attempted to impress on us the need to pay more attention to reducing malicious online content as a typical type of cyberbullying. Meanwhile, despite environmental changes that have made it easier to report perpetrators of such messages, it is often the case that the crime occurs in a public place and is tolerated. However, there is a growing tendency for people to exhibit the bystander effect, the problem of personal indifference to witnessing or knowing about crimes, but individuals do not offer any means of help to a victim when other people are present. This effect is rampant in the case of cybercrimes. This study aims to extract the motivations behind posting malicious comments through in-depth interviews and to suggest recommendations for relative issues by demonstrating how the bystander effect can be reduced using causal relationship diagrams of the system dynamics methodology. Hopefully, this work will contribute to a better understanding of factors that could cause a decrease in malicious online comments.

Keywords

Acknowledgement

This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2020S1A5A8046454)

References

  1. Akkermans, H., and Van Helden, K. (2002). Vicious and virtuous cycles in ERP implementation: A case study of interrelations between critical success factors. European Journal of Information Systems, 11(1), 35-46. https://doi.org/10.1057/palgrave.ejis.3000418
  2. Amarah, A., Daimin, G., Norhayatie, I., Kadir, A. Z. A., and Wnidayu, T. (2020). Cyberbullying campaign review for new implementation and prevention. International Journal of Synergy in Engineering and Technology, 1(1), 1-11.
  3. Anderson, J., Bresnahan, M., and Musatics, C. (2014). Combating weight-based cyberbullying on Facebook with the dissenter effect. Cyberpsychology, Behavior, and Social Networking, 17(5), 281-286. https://doi.org/10.1089/cyber.2013.0370
  4. Berne, S., Frisen, A., and Berne, J. (2019). Cyberbullying in childhood and adolescence: Assessment, negative consequences and prevention strategies. In Policing schools: School violence and the juridification of youth (pp. 141-152). Springer, Cham.
  5. Boyce, C., and Neale, P. (2006). Conducting in-depth interviews: A guide for designing and conducting in-depth interviews for evaluation input. Pathfinder International, pp. 3-12.
  6. Chekroun, P., and Brauer, M. (2002). The bystander effect and social control behavior: The effect of the presence of others on people's reactions to norm violations. European Journal of Social Psychology, 32(6), 853-867. https://doi.org/10.1002/ejsp.126
  7. Chen, J. K., and Chen, L. M. (2020). Cyberbullying among adolescents in Taiwan, Hong Kong, and Mainland China: A cross-national study in Chinese societies. Asia Pacific Journal of Social Work and Development, 30(3), 227-241. https://doi.org/10.1080/02185385.2020.1788978
  8. Choi, H., Jung, Y., and Choi, Y. (2019). Understanding of the Fintech phenomenon in the beholder's eyes in South Korea. Asia Pacific Journal of Information Systems, 29(1), 117-143. https://doi.org/10.14329/apjis.2019.29.1.117
  9. Choi, Y. J., Jeon, B. J., and Kim, H. W. (2020). Identification of key cyberbullies: A text mining and social network analysis approach. Telematics and Informatics, 56, 101504.
  10. Cohen, S., Underwood, L. G., and Gottlieb, B. H. (2000). Social support measurement and intervention: A guide for health and social scientists. New York: Oxford University Press.
  11. Corbin, J., and Strauss, A. L. (2008). Strategies for qualitative data analysis. In J. Corbin and A. L. Strauss (eds.), Basics of qualitative research (3rd ed., pp. 73-74). Thousand Oaks, CA: Sage Publications.
  12. Forrester, J. W. (1997). Industrial dynamics. Journal of the Operational Research Society, 48(10), 1037-1041. https://doi.org/10.1057/palgrave.jors.2600946
  13. Glaser, B. G. (1992). Basics of grounded theory analysis: Emergence vs forcing. Sociology Press.
  14. Goodman, L. A. (1961). Snowball sampling. The annals of mathematical statistics. The Annals of Mathematical Statistics, 32(1), 148-170. https://doi.org/10.1214/aoms/1177705148
  15. Hollis-Peel, M. E., Reynald, D. M., Van Bavel, M., Elffers, H., and Welsh, B. C. (2011). Guardianship for crime prevention: A critical review of the literature. Crime, Law and Social Change, 56(1), 53-70. https://doi.org/10.1007/s10611-011-9309-2
  16. Kim, H. M., Bock, G. W., and Kim, H. S. (2020). A new perspective on online malicious comments: Effects of attention and neutralization. Information Technology & People, 34(1), 50-67.
  17. Kim, H. M., and Park, K. (2018). A study of factors on intention of intervention and posting malicious comments. Journal of Digital Convergence, 16(12), 197-206. https://doi.org/10.14400/JDC.2018.16.12.197
  18. Lee, G. (2015). A multiple case study of government internal ideation programs: Understanding challenges and identifying effective practices. Asia Pacific Journal of Information Systems, 25(3), 423-444. https://doi.org/10.14329/apjis.2015.25.3.423
  19. Lee, S. H., Lee, B. Y., and Kim, H. W. (2019). Decisional factors leading to the reuse of an on-demand ride service. Information & Management, 56(4), 493-506. https://doi.org/10.1016/j.im.2018.09.010
  20. Lee, J. U., Seo, K. J., and Kim, H. W. (2014). An exploratory study on the cloud computing services: Issues and suggestion for the success. Asia Pacific Journal of Information Systems, 24(4), 474-491.
  21. Lee, S. H., and Kim, H. W. (2015). Why people post benevolent and malicious comments online. Communications of the ACM, 58(11), 74-79.
  22. Loewenstein, G. (1994). The psychology of curiosity: A review and reinterpretation. Psychological Bulletin, 116(1), 75-98. https://doi.org/10.1037/0033-2909.116.1.75
  23. Menini, S., Moretti, G., Corazza, M., Cabrio, E., Tonelli, S., and Villata, S. (2019). A system to monitor cyberbullying based on message classification and social network analysis. In Proceedings of the Third Workshop on Abusive Language Online, 105-110.
  24. Moscovici, S. (1984). The phenomenon of social representations. In R. M. Farr and S. Moscovici (eds.), Social representations (pp. 3-69). Cambridge and Paris: Cambridge University Press.
  25. Nicksa, S. C. (2014). Bystander's willingness to report theft, physical assault, and sexual assault: The impact of gender, anonymity, and relationship with the offender. Journal of Interpersonal Violence, 29(2), 217-236. https://doi.org/10.1177/0886260513505146
  26. Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., and Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49(4), 376-385. https://doi.org/10.1111/j.1469-7610.2007.01846.x
  27. Somers, T. M., and Nelson, K. (2001). The impact of critical success factors across the stages of enterprise resource planning implementations. Proceedings of the 34th Annual Hawaii International Conference on System Sciences, 1-10.
  28. Song, M., Zhu, Z., Liu, S., Fan, H., Zhu, T., and Zhang, L. (2019). Effects of aggressive traits on cyberbullying: Mediated moderation or moderated mediation? Computers in Human Behavior, 97, 167-178. https://doi.org/10.1016/j.chb.2019.03.015
  29. Sterman, J. D. (2001). Systems dynamics modeling: Tools for learning in a complex world. IEEE Engineering Management Review, 43(4), 8-25.
  30. Strauss, A., and Corbin, J. (1998). Basics of qualitative research techniques. Thousand Oaks, CA: Sage publications.
  31. Sutton, J., and Smith, P. K. (1999). Bullying as a group process: An adaptation of the participant role approach. Aggressive Behavior, 25(2), 97-111. https://doi.org/10.1002/(SICI)1098-2337(1999)25:2<97::AID-AB3>3.0.CO;2-7
  32. Van Bommel, M., Van Prooijen, J. W., Elffers, H., and Van Lange, P. A. (2012). Be aware to care: Public self-awareness leads to a reversal of the bystander effect. Journal of Experimental Social Psychology, 48(4), 926-930.
  33. Van Geel, M., Vedder, P., and Tanilon, J. (2014). Relationship between peer victimization, cyberbullying, and suicide in children and adolescents: A meta-analysis. JAMA Pediatrics, 168(5), 435-442. https://doi.org/10.1001/jamapediatrics.2013.4143
  34. Venkatesh, V., Brown, S. A., and Bala, H. (2013). Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems. MIS Quarterly, 37(1), 21-54. https://doi.org/10.25300/MISQ/2013/37.1.02
  35. Whittaker, E., and Kowalski, R. M. (2015). Cyberbullying via social media. Journal of School Violence, 14(1), 11-29.
  36. Ybarra, M. L., and Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of child Psychology and Psychiatry, 45(7), 1308-1316. https://doi.org/10.1111/j.1469-7610.2004.00328.x
  37. Yin, R. K. (2003). Case study research: Design and methods (5th ed.). Sage Publications, Los Angeles.
  38. You, L., and Lee, Y. H. (2019). The bystander effect in cyberbullying on social network sites: Anonymity, group size, and intervention intentions. Telematics and Informatics, 45, 101284.
  39. Yu, S. I., Lee, S. H., and Kim, H. W. (2013). An exploratory study on smart work: A systems thinking approach. Entrue Journal of Information Technology, 12(3), 57-73.
  40. Zambrano, P., Torres, J., Yanez, A., Macas, A., and Tello-Oquendo, L. (2020). Understanding cyberbullying as an information security attack-life cycle modeling. Annals of Telecommunications, 11, 1-19.
  41. Ziegler, S. (1991). Rosenstein-Manner M. bullying at school: Toronto in an international context. Research Services no. 196. Toronto Board of Education, 1-41.