Acknowledgement
This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2020S1A5A8046454)
References
- Akkermans, H., and Van Helden, K. (2002). Vicious and virtuous cycles in ERP implementation: A case study of interrelations between critical success factors. European Journal of Information Systems, 11(1), 35-46. https://doi.org/10.1057/palgrave.ejis.3000418
- Amarah, A., Daimin, G., Norhayatie, I., Kadir, A. Z. A., and Wnidayu, T. (2020). Cyberbullying campaign review for new implementation and prevention. International Journal of Synergy in Engineering and Technology, 1(1), 1-11.
- Anderson, J., Bresnahan, M., and Musatics, C. (2014). Combating weight-based cyberbullying on Facebook with the dissenter effect. Cyberpsychology, Behavior, and Social Networking, 17(5), 281-286. https://doi.org/10.1089/cyber.2013.0370
- Berne, S., Frisen, A., and Berne, J. (2019). Cyberbullying in childhood and adolescence: Assessment, negative consequences and prevention strategies. In Policing schools: School violence and the juridification of youth (pp. 141-152). Springer, Cham.
- Boyce, C., and Neale, P. (2006). Conducting in-depth interviews: A guide for designing and conducting in-depth interviews for evaluation input. Pathfinder International, pp. 3-12.
- Chekroun, P., and Brauer, M. (2002). The bystander effect and social control behavior: The effect of the presence of others on people's reactions to norm violations. European Journal of Social Psychology, 32(6), 853-867. https://doi.org/10.1002/ejsp.126
- Chen, J. K., and Chen, L. M. (2020). Cyberbullying among adolescents in Taiwan, Hong Kong, and Mainland China: A cross-national study in Chinese societies. Asia Pacific Journal of Social Work and Development, 30(3), 227-241. https://doi.org/10.1080/02185385.2020.1788978
- Choi, H., Jung, Y., and Choi, Y. (2019). Understanding of the Fintech phenomenon in the beholder's eyes in South Korea. Asia Pacific Journal of Information Systems, 29(1), 117-143. https://doi.org/10.14329/apjis.2019.29.1.117
- Choi, Y. J., Jeon, B. J., and Kim, H. W. (2020). Identification of key cyberbullies: A text mining and social network analysis approach. Telematics and Informatics, 56, 101504.
- Cohen, S., Underwood, L. G., and Gottlieb, B. H. (2000). Social support measurement and intervention: A guide for health and social scientists. New York: Oxford University Press.
- Corbin, J., and Strauss, A. L. (2008). Strategies for qualitative data analysis. In J. Corbin and A. L. Strauss (eds.), Basics of qualitative research (3rd ed., pp. 73-74). Thousand Oaks, CA: Sage Publications.
- Forrester, J. W. (1997). Industrial dynamics. Journal of the Operational Research Society, 48(10), 1037-1041. https://doi.org/10.1057/palgrave.jors.2600946
- Glaser, B. G. (1992). Basics of grounded theory analysis: Emergence vs forcing. Sociology Press.
- Goodman, L. A. (1961). Snowball sampling. The annals of mathematical statistics. The Annals of Mathematical Statistics, 32(1), 148-170. https://doi.org/10.1214/aoms/1177705148
- Hollis-Peel, M. E., Reynald, D. M., Van Bavel, M., Elffers, H., and Welsh, B. C. (2011). Guardianship for crime prevention: A critical review of the literature. Crime, Law and Social Change, 56(1), 53-70. https://doi.org/10.1007/s10611-011-9309-2
- Kim, H. M., Bock, G. W., and Kim, H. S. (2020). A new perspective on online malicious comments: Effects of attention and neutralization. Information Technology & People, 34(1), 50-67.
- Kim, H. M., and Park, K. (2018). A study of factors on intention of intervention and posting malicious comments. Journal of Digital Convergence, 16(12), 197-206. https://doi.org/10.14400/JDC.2018.16.12.197
- Lee, G. (2015). A multiple case study of government internal ideation programs: Understanding challenges and identifying effective practices. Asia Pacific Journal of Information Systems, 25(3), 423-444. https://doi.org/10.14329/apjis.2015.25.3.423
- Lee, S. H., Lee, B. Y., and Kim, H. W. (2019). Decisional factors leading to the reuse of an on-demand ride service. Information & Management, 56(4), 493-506. https://doi.org/10.1016/j.im.2018.09.010
- Lee, J. U., Seo, K. J., and Kim, H. W. (2014). An exploratory study on the cloud computing services: Issues and suggestion for the success. Asia Pacific Journal of Information Systems, 24(4), 474-491.
- Lee, S. H., and Kim, H. W. (2015). Why people post benevolent and malicious comments online. Communications of the ACM, 58(11), 74-79.
- Loewenstein, G. (1994). The psychology of curiosity: A review and reinterpretation. Psychological Bulletin, 116(1), 75-98. https://doi.org/10.1037/0033-2909.116.1.75
- Menini, S., Moretti, G., Corazza, M., Cabrio, E., Tonelli, S., and Villata, S. (2019). A system to monitor cyberbullying based on message classification and social network analysis. In Proceedings of the Third Workshop on Abusive Language Online, 105-110.
- Moscovici, S. (1984). The phenomenon of social representations. In R. M. Farr and S. Moscovici (eds.), Social representations (pp. 3-69). Cambridge and Paris: Cambridge University Press.
- Nicksa, S. C. (2014). Bystander's willingness to report theft, physical assault, and sexual assault: The impact of gender, anonymity, and relationship with the offender. Journal of Interpersonal Violence, 29(2), 217-236. https://doi.org/10.1177/0886260513505146
- Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., and Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49(4), 376-385. https://doi.org/10.1111/j.1469-7610.2007.01846.x
- Somers, T. M., and Nelson, K. (2001). The impact of critical success factors across the stages of enterprise resource planning implementations. Proceedings of the 34th Annual Hawaii International Conference on System Sciences, 1-10.
- Song, M., Zhu, Z., Liu, S., Fan, H., Zhu, T., and Zhang, L. (2019). Effects of aggressive traits on cyberbullying: Mediated moderation or moderated mediation? Computers in Human Behavior, 97, 167-178. https://doi.org/10.1016/j.chb.2019.03.015
- Sterman, J. D. (2001). Systems dynamics modeling: Tools for learning in a complex world. IEEE Engineering Management Review, 43(4), 8-25.
- Strauss, A., and Corbin, J. (1998). Basics of qualitative research techniques. Thousand Oaks, CA: Sage publications.
- Sutton, J., and Smith, P. K. (1999). Bullying as a group process: An adaptation of the participant role approach. Aggressive Behavior, 25(2), 97-111. https://doi.org/10.1002/(SICI)1098-2337(1999)25:2<97::AID-AB3>3.0.CO;2-7
- Van Bommel, M., Van Prooijen, J. W., Elffers, H., and Van Lange, P. A. (2012). Be aware to care: Public self-awareness leads to a reversal of the bystander effect. Journal of Experimental Social Psychology, 48(4), 926-930.
- Van Geel, M., Vedder, P., and Tanilon, J. (2014). Relationship between peer victimization, cyberbullying, and suicide in children and adolescents: A meta-analysis. JAMA Pediatrics, 168(5), 435-442. https://doi.org/10.1001/jamapediatrics.2013.4143
- Venkatesh, V., Brown, S. A., and Bala, H. (2013). Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems. MIS Quarterly, 37(1), 21-54. https://doi.org/10.25300/MISQ/2013/37.1.02
- Whittaker, E., and Kowalski, R. M. (2015). Cyberbullying via social media. Journal of School Violence, 14(1), 11-29.
- Ybarra, M. L., and Mitchell, K. J. (2004). Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of child Psychology and Psychiatry, 45(7), 1308-1316. https://doi.org/10.1111/j.1469-7610.2004.00328.x
- Yin, R. K. (2003). Case study research: Design and methods (5th ed.). Sage Publications, Los Angeles.
- You, L., and Lee, Y. H. (2019). The bystander effect in cyberbullying on social network sites: Anonymity, group size, and intervention intentions. Telematics and Informatics, 45, 101284.
- Yu, S. I., Lee, S. H., and Kim, H. W. (2013). An exploratory study on smart work: A systems thinking approach. Entrue Journal of Information Technology, 12(3), 57-73.
- Zambrano, P., Torres, J., Yanez, A., Macas, A., and Tello-Oquendo, L. (2020). Understanding cyberbullying as an information security attack-life cycle modeling. Annals of Telecommunications, 11, 1-19.
- Ziegler, S. (1991). Rosenstein-Manner M. bullying at school: Toronto in an international context. Research Services no. 196. Toronto Board of Education, 1-41.