The Means to Justify the End: Combating Cyber Harassment in Social Media

Cyber harassment can have harmful effects on social media users, such as emotional distress and, consequently, withdrawal from social network sites or even life itself. At the same time, users are often upset when network providers intervene and deem such an intrusion an unjust occurrence. This article analyzes how decisions to intervene can be communicated in such a way that users consider them adequate and acceptable. A first experiment shows that informational justice perceptions of social network users depend on the format in which network providers present the decision to intervene. More specifically, if a decision to intervene is presented in the form of a story, as opposed to an analytical rendering of facts and arguments, decisions to intervene prompt more positive informational justice perceptions. A second experiment reveals that when users relate the experience to themselves, narrative transportation increases, which positively affects perceptions of the justice of decisions to intervene.

[1]  A. Tellegen,et al.  Openness to absorbing and self-altering experiences ("absorption"), a trait related to hypnotic susceptibility. , 1974, Journal of abnormal psychology.

[2]  J. Hewitt Self and Society: A Symbolic Interactionist Social Psychology , 1976 .

[3]  H. Tajfel,et al.  An integrative theory of intergroup conflict. , 1979 .

[4]  R. Gottlieb,et al.  The New Yorker , 1987 .

[5]  H. Rao Unnava,et al.  Self-Referencing , 1989 .

[6]  Beverly Kracher,et al.  Justice, sexual harassment, and the reasonable victim standard , 1993 .

[7]  Russell Cropanzano,et al.  Justice in the workplace: Approaching fairness in human resource management. , 1993 .

[8]  J. Greenberg,et al.  The social side of fairness: Interpersonal and informational classes of organizational justice. , 1993 .

[9]  R. E. Burnkrant,et al.  Effects of Self-Referencing on Persuasion , 1995 .

[10]  M. Hogg,et al.  Group Norms and the Attitude-Behavior Relationship: A Role for Group Identification , 1996 .

[11]  Joan Meyers-Levy,et al.  Moderators of the Impact of Self-Reference on Persuasion , 1996 .

[12]  K. Deaux,et al.  Relationship between social and personal identities: Segregation or integration. , 1996 .

[13]  S. Dollinger,et al.  Individuality and relatedness of the self: an autophotographic study. , 1996, Journal of personality and social psychology.

[14]  S. Gayle Baugh On the Persistence of Sexual Harassment in the Workplace , 1997 .

[15]  T. Postmes,et al.  Breaching or Building Social Boundaries? , 1998 .

[16]  J. Fein,et al.  Interpersonal violence. , 1999, Current opinion in pediatrics.

[17]  Arthur Gross-Schaefer,et al.  Ethics Education in the Workplace: An Effective Tool to Combat Employee Theft , 2000 .

[18]  T. Brock,et al.  Journal of Personality and Social Psychology the Role of Transportation in the Persuasiveness of Public Narratives Text Quality Individual Differences and Situational Influences Transportation Scale Items Gender Differences Discriminant Validation: Need for Cognition Effect of Text Manipulation Beli , 2022 .

[19]  J. Colquitt On the dimensionality of organizational justice: a construct validation of a measure. , 2001, The Journal of applied psychology.

[20]  J. Cacioppo,et al.  DISPOSITIONAL DIFFERENCES IN COGNITIVE MOTIVATION : THE LIFE AND TIMES OF INDIVIDUALS VARYING IN NEED FOR COGNITION , 1996 .

[21]  B. Stevens Hospitality Ethics: Responses from Human Resource Directors and Students to Seven Ethical Scenarios , 2001 .

[22]  M. Bell,et al.  Discrimination, Harassment, and the Glass Ceiling: Women Executives as Change Agents , 2002 .

[23]  Victoria Shoaf,et al.  Ethics on the Web: Applying Moral Decision-Making to the New Media , 2002 .

[24]  M. Gilly,et al.  We Are What We Post? Self‐Presentation in Personal Web Space , 2003 .

[25]  David Wornham A Descriptive Investigation of Morality and Victimisation at Work , 2003 .

[26]  M. Fishbein,et al.  Using theory to design effective health behavior interventions. , 2003 .

[27]  P. Schellens,et al.  Argumentation Schemes in Persuasive Brochures , 2004 .

[28]  J. Finn A Survey of Online Harassment at a University Campus , 2004, Journal of interpersonal violence.

[29]  Majken Schultz,et al.  Organizational identity : a reader , 2004 .

[30]  A. Bennett,et al.  An Introduction to Literature, Criticism and Theory (3rd edition) , 2004 .

[31]  Kristopher J Preacher,et al.  SPSS and SAS procedures for estimating indirect effects in simple mediation models , 2004, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.

[32]  Jennifer Edson Escalas IMAGINE YOURSELF IN THE PRODUCT : Mental Simulation, Narrative Transportation, and Persuasion , 2004 .

[33]  Paul Bocij,et al.  Cyberstalking: Harassment in the Internet Age and How to Protect Your Family , 2004 .

[34]  D. Comer,et al.  Sticks and Stones may Break Your Bones, but Words can Break Your Spirit: Bullying in the Workplace , 2005 .

[35]  K. Leung,et al.  Realpolitik versus fair process: moderating effects of group identification on acceptance of political decisions. , 2007, Journal of personality and social psychology.

[36]  Jennifer Edson Escalas Self-Referencing and Persuasion: Narrative Transportation versus Analytical Elaboration , 2007 .

[37]  Markus Appel,et al.  Fictional Narratives Cultivate Just‐World Beliefs , 2008 .

[38]  Jeremy Harris Lipschultz,et al.  International Encyclopedia of Communication , 2008 .

[39]  Kristopher J Preacher,et al.  Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models , 2008, Behavior research methods.

[40]  Kelly D. Martin,et al.  Commercializing Social Interaction: The Ethics of Stealth Marketing , 2008 .

[41]  Suresh C. Sood,et al.  When consumers and brands talk: Storytelling theory and research in psychology and marketing , 2008 .

[42]  Winnifred R. Louis,et al.  Group Norms and the Attitude–Behaviour Relationship , 2009 .

[43]  Deb Sledgianowski,et al.  Using Social Network Sites: The Effects of Playfulness, Critical Mass and Trust in a Hedonic Context , 2009, J. Comput. Inf. Syst..

[44]  Sarah J. S. Wilner,et al.  Networked Narratives: Understanding Word-of-Mouth Marketing in Online Communities , 2009 .

[45]  Rebecca L. Greenbaum,et al.  When do fair procedures not matter? A test of the identity violation effect. , 2009, The Journal of applied psychology.

[46]  D. Citron Law's Expressive Value in Combating Cyber Gender Harassment , 2009 .

[47]  M. Rand,et al.  National Crime Victimization Survey: Stalking Victimization in the United States , 2009 .

[48]  Ko de Ruyter,et al.  In stories we trust: How narrative apologies provide cover for competitive vulnerability after integrity-violating blog posts , 2010 .

[49]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[50]  Yoshihisa Kashima,et al.  Pathways to Persuasion: Cognitive and Experiential Responses to Health-Promoting Mass Media Messages , 2010, Commun. Res..

[51]  Edward F. McQuarrie,et al.  Narrative and Persuasion in Fashion Advertising , 2010 .

[52]  Jacqueline D. Lipton Combating Cyber-Victimization , 2011 .

[53]  Katja H. Brunk Un/ethical Company and Brand Perceptions: Conceptualising and Operationalising Consumer Meanings , 2012 .

[54]  Term of confusion. , 2013, Scientific American.

[55]  Ko de Ruyter,et al.  A Walk in Customers’ Shoes: How Attentional Bias Modification Affects Ownership of Integrity-violating Social Media Posts , 2013 .

[56]  Ko de Ruyter,et al.  The Extended Transportation-Imagery Model: A Meta-Analysis of the Antecedents and Consequences of Consumers' Narrative Transportation , 2014 .