Skip to main content

Advertisement

Log in

The Means to Justify the End: Combating Cyber Harassment in Social Media

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

Cyber harassment can have harmful effects on social media users, such as emotional distress and, consequently, withdrawal from social network sites or even life itself. At the same time, users are often upset when network providers intervene and deem such an intrusion an unjust occurrence. This article analyzes how decisions to intervene can be communicated in such a way that users consider them adequate and acceptable. A first experiment shows that informational justice perceptions of social network users depend on the format in which network providers present the decision to intervene. More specifically, if a decision to intervene is presented in the form of a story, as opposed to an analytical rendering of facts and arguments, decisions to intervene prompt more positive informational justice perceptions. A second experiment reveals that when users relate the experience to themselves, narrative transportation increases, which positively affects perceptions of the justice of decisions to intervene.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Notes

  1. Analyzes were also run without covariates. The only major differences were inflated effect sizes.

  2. I tested all materials with an extensive pretest.

  3. See the Appendix for all complete scales.

  4. Unlike Experiment 1, I did not deem it useful to measure social identification, because I only considered personal identity violation in Experiment 2.

References

  • Appel, M. (2008). Fictional narratives cultivate just-world beliefs. Journal of Communication, 58(1), 62–83.

    Article  Google Scholar 

  • Avery, J. (2010). Gender bender brand hijacks and consumer revolt: The Porsche Cayenne story. In J. Avery, S. Beatty, M. B. Holbrook, R. V. Kozinets, & B. Mittal (Eds.), Consumer behavior: Human pursuit of happiness in the world of goods (pp. 645–649). Cincinnati, OH: Open Mentis.

    Google Scholar 

  • Baugh, S. G. (1997). On the persistence of sexual harassment in the workplace. Journal of Business Ethics, 16(9), 899–908. doi:10.1023/a:1017935203669.

    Article  Google Scholar 

  • Baum, K., Catalano, S., Rand, M., & Rose, K. (2009). Stalking victimization in the United States: National crime victimization survey Special Report: Bureau of Justice Statistics.

  • Bell, M. P., McLaughlin, M. E., & Sequeira, J. M. (2002). Discrimination, harassment, and the glass ceiling: Women executives as change agents. Journal of Business Ethics, 37(1), 65–76. doi:10.1023/a:1014730102063.

    Article  Google Scholar 

  • Bennett, A., & Royle, N. (2004). Introduction to literature, criticism and theory (3rd ed.). Harlow: Pearson.

  • Bocij, P. (2004). Cyberstalking: Harassment in the Internet age and how to protect your family. Westport, CT: Praeger.

    Google Scholar 

  • Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230.

    Article  Google Scholar 

  • Brunk, K. H. (2012). Un/ethical company and brand perceptions: Conceptualising and operationalising consumer meanings. Journal of Business Ethics, 111(4), 551–565. doi:10.1007/s10551-012-1339-x.

    Article  Google Scholar 

  • Burnkrant, R. E., & Unnava, H. R. (1989). Self-referencing: A strategy for increasing processing of message content. Personality and Social Psychology Bulletin, 15(4), 628–638. doi:10.1177/0146167289154015.

    Article  Google Scholar 

  • Burnkrant, R. E., & Unnava, H. R. (1995). Effects of self-referencing on persuasion. Journal of Consumer Research, 22(1), 17–26.

    Article  Google Scholar 

  • Cacioppo, J. T., Petty, R. E., Feinstein, J. A., & Jarvis, W. B. G. (1996). Dispositional differences in cognitive motivation: The life and times of individuals varying in need for cognition. Psychological Bulletin, 119(2), 197–253.

    Article  Google Scholar 

  • Citron, D. K. (2009). Law’s expressive value in combating cyber gender harassment. Michigan Law Review, 108(3), 373–415.

    Google Scholar 

  • Colquitt, J. A. (2001). On the dimensionality of organizational justice: A construct validation of a measure. Journal of Applied Psychology, 86(3), 386–400.

    Article  Google Scholar 

  • comScore, I. (2011). It’s a social world: Top 10 need-to-knows about social networking and where it’s headed.

  • Dollinger, S. J., Preston, L. A., O’Brien, S. P., & DiLalla, D. L. (1996). Individuality and relatedness of the self: An autophotographic study. Journal of Personality and Social Psychology, 71(6), 1268–1278.

    Article  Google Scholar 

  • Dunlop, S. M., Wakefield, M., & Kashima, Y. (2010). Pathways to persuasion: Cognitive and experiential responses to health-promoting mass media messages. Communication Research, 37(1), 133–164.

    Article  Google Scholar 

  • Economist. (2011, April 23). Creepy crawlies, 398, 63–64.

  • Escalas, J. E. (2004). Imagine yourself in the product: Mental simulation, narrative transportation, and persuasion. [Article]. Journal of Advertising, 33(2), 37–48.

    Article  Google Scholar 

  • Escalas, J. E. (2007). Self-referencing and persuasion: Narrative transportation versus analytical elaboration. Journal of Consumer Research, 33(4), 421–429.

    Article  Google Scholar 

  • Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19(4), 468–483. doi:10.1177/0886260503262083.

    Article  Google Scholar 

  • Fishbein, M., & Yzer, M. C. (2003). Using theory to design effective health behavior interventions. Communication Theory, 13(2), 164–183. doi:10.1111/j.1468-2885.2003.tb00287.x.

    Article  Google Scholar 

  • Green, M. C. (2008). Transportation theory. In W. Donsbach (Ed.), International Encyclopedia of Communication (pp. 5170–5175). Oxford, UK: Wiley-Blackwell.

    Google Scholar 

  • Green, M. C., & Brock, T. C. (2000). The role of transportation in the persuasiveness of public narratives. Journal of Personality and Social Psychology, 79(5), 701–721.

    Article  Google Scholar 

  • Greenberg, J. (1993). The social side of fairness: Interpersonal and informational classes of organisational justice. In R. Cropanzano (Ed.), Justice in the workplace: Approaching fairness in human resource management (pp. 79–103). Hillsdale, NJ: Erlbaum.

    Google Scholar 

  • Gross-Schaefer, A., Trigilio, J., Negus, J., & Ro, C.-S. (2000). Ethics education in the workplace: An effective tool to combat employee theft. Journal of Business Ethics, 26(2), 89–100. doi:10.1023/a:1006038310865.

    Article  Google Scholar 

  • Hewitt, J. P. (2003). Self and society: A symbolic interactionist social psychology (9th ed.). Boston, MA: Allyn and Bacon.

  • Kozinets, R. V., de Valck, K., Wojnicki, A. C., & Wilner, S. J. S. (2010). Networked narratives: Understanding word-of-mouth marketing in online communities. Journal of Marketing, 74(2), 71–89.

    Article  Google Scholar 

  • Leung, K., Tong, K–. K., & Lind, E. A. (2007). Realpolitik versus fair process: Moderating effects of group identification on acceptance of political decisions. Journal of Personality and Social Psychology, 92(3), 476–489.

    Article  Google Scholar 

  • Levine, M. (2013, May 28). Controversial, harmful and hateful speech on Facebook [Facebook Safety Notes]. Blog Retrieved from https://www.facebook.com/notes/facebook-safety/controversial-harmful-and-hateful-speech-on-facebook/574430655911054.

  • Lipton, J. D. (2011). Combating cyber-victimization. Berkeley Technology Law Journal, 26(2), 1103–1155.

    Google Scholar 

  • Lowensohn, J. (2010, August 6). Report: Conservative groups gaming Digg. CNET Blog Retrieved from http://news.cnet.com/8301-27076_3-20012916-248.html.

  • Martin, K. D., & Smith, N. C. (2008). Commercializing social interaction: The ethics of stealth marketing. Journal of Public Policy & Marketing, 27(1), 45–56.

    Article  Google Scholar 

  • Mayer, D. M., Greenbaum, R. L., Kuenzi, M., & Shteynberg, G. (2009). When do fair procedures not matter? A test of the identity violation effect. Journal of Applied Psychology, 94(1), 142–161.

    Article  Google Scholar 

  • Meyers-Levy, J., & Peracchio, L. A. (1996). Moderators of the impact of self-reference on persuasion. Journal of Consumer Research, 22(4), 408–423.

    Article  Google Scholar 

  • Parker, I. (2012, February 6). The story of a suicide: A gay freshman and the online world. The New Yorker.

    Google Scholar 

  • Phillips, B. J., & McQuarrie, E. F. (2010). Narrative and persuasion in fashion advertising. Journal of Consumer Research, 37(3), 368–392.

    Article  Google Scholar 

  • Pogue, D. (2013). Term of confusion. Scientific American, 308(3), 35.

    Article  Google Scholar 

  • Postmes, T., Spears, R., & Lea, M. (1998). Breaching or building social boundaries? Communication Research, 25(6), 689–715. doi:10.1177/009365098025006006.

    Article  Google Scholar 

  • Preacher, K. J., & Hayes, A. F. (2004). SPSS and SAS procedures for estimating indirect effects in simple mediation models. Behavior Research Methods, Instruments, & Computers, 36(4), 717–731.

    Article  Google Scholar 

  • Preacher, K. J., & Hayes, A. F. (2008). Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models. Behavior Research Methods, 40(3), 879–891.

    Article  Google Scholar 

  • Pruitt, S. (2003). Friendster: A new twist on wired contacts. PCWorld, Software≫Browsers & Add-Ons (August 29). Retrieved from http://www.pcworld.com/article/112257/friendster_new_twist_on_wired_contacts.html.

  • Reid, A., & Deaux, K. (1996). Relationship between social and personal identities: Segregation or integration. Journal of Personality and Social Psychology, 71(6), 1084–1091.

    Article  Google Scholar 

  • Reitsma, R., O’Connell, J., Wise, J., & Jaddou, S. (2011). Consumers and online privacy: How much information is too much? Forrester Research, Inc.

  • Sama, L. M., & Shoaf, V. (2002). Ethics on the web: Applying moral decision-making to the new media. Journal of Business Ethics, 36(1), 93–103. doi:10.1023/a:1014296128397.

    Article  Google Scholar 

  • Schau, H. J., & Gilly, M. C. (2003). We are what we post? Self-presentation in personal web space. Journal of Consumer Research, 30(3), 385–404.

    Article  Google Scholar 

  • Schellens, P. J., & de Jong, M. (2004). Argumentation schemes in persuasive brochures. Argumentation, 18(3), 295–323.

    Article  Google Scholar 

  • Sledgianowski, D., & Kulviwat, S. (2009). Using social network sites: The effects of playfulness, critical mass and trust in a hedonic context. Journal of Computer Information Systems, 49(4), 74–83.

    Google Scholar 

  • Stevens, B. (2001). Hospitality ethics: Responses from human resource directors and students to seven ethical scenarios. Journal of Business Ethics, 30(3), 233–242. doi:10.1023/a:1006449526584.

    Article  Google Scholar 

  • Tajfel, H., & Turner, J. (2004). An integrative theory of intergroup conflict. In M. J. Hatch & M. Schultz (Eds.), Organizational identity: A reader (pp. 56–65). Oxford: Oxford University.

    Google Scholar 

  • Tassi, P. (2012, July 13). Facebook didn’t kill Digg, Reddit did. Forbes Blog Retrieved from http://www.forbes.com/sites/insertcoin/2012/07/13/facebook-didnt-kill-digg-reddit-did/.

  • Tellegen, A., & Atkinson, G. (1974). Openness to absorbing and self-altering experiences (‘absorption’), a trait related to hypnotic susceptibility. Journal of Abnormal Psychology, 83(3), 268–277.

    Article  Google Scholar 

  • Terry, D. J., & Hogg, M. A. (1996). Group norms and the attitude-behavior relationship: A role for group identification. Personality and Social Psychology Bulletin, 22(8), 776–793. doi:10.1177/0146167296228002.

    Article  Google Scholar 

  • Van Laer, T., & De Ruyter, K. (2010). In stories we trust: How narrative apologies provide cover for competitive vulnerability after integrity-violating blog posts. International Journal of Research in Marketing, 27(2), 164–174. doi:10.1016/j.ijresmar.2009.12.010.

    Article  Google Scholar 

  • Van Laer, T., De Ruyter, K., & Cox, D. (2013). A walk in customers’ shoes: How attentional bias modification affects ownership of integrity-violating social media posts. Journal of Interactive Marketing, 27(1), 14–27. doi:10.1016/j.intmar.2012.09.002.

    Google Scholar 

  • Van Laer, T., De Ruyter, K., Visconti, L. M., & Wetzels, M. (forthcoming). The Extended Transportation-Imagery Model: A meta-analysis of the antecedents and consequences of consumers’ narrative transportation. Journal of Consumer Research.

  • Vega, G., & Comer, D. R. (2005). Sticks and stones may break your bones, but words can break your spirit: Bullying in the workplace. Journal of Business Ethics, 58(1–3), 101–109. doi:10.1007/s10551-005-1422-7.

    Article  Google Scholar 

  • Wells, D. L., & Kracher, B. J. (1993). Justice, sexual harassment, and the reasonable victim standard. Journal of Business Ethics, 12(6), 423–431. doi:10.1007/bf01666555.

    Article  Google Scholar 

  • Woodside, A. G., Sood, S., & Miller, K. E. (2008). When consumers and brands talk: Storytelling theory and research in psychology and marketing. Psychology & Marketing, 25(2), 97–145.

    Article  Google Scholar 

  • Wornham, D. (2003). A descriptive investigation of morality and victimisation at work. Journal of Business Ethics, 45(1–2), 29–40. doi:10.1023/a:1024116327582.

    Article  Google Scholar 

Download references

Acknowledgments

The author gratefully acknowledges the suggestions of Katja Brunk, Ko de Ruyter, Joëlle Vanhamme, and Martin Wetzels on a previous version of this article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tom van Laer.

Appendix

Appendix

Informational Justice Perception

  1. 1.

    The network provider has been candid in his communications with you.

  2. 2.

    The network provider has explained the procedures thoroughly.

  3. 3.

    The network provider’s explanations regarding the procedures were reasonable.

  4. 4.

    The network provider has communicated details in a timely manner.

  5. 5.

    The network provider has seemed to tailor his communications to your specific needs.

Narrative Transportation

  1. 1.

    While I was reading the wall post, I could easily picture the events in it taking place.

  2. 2.

    While I was reading the wall post, activity going on in the room around me was on my mind. (reverse coded)

  3. 3.

    I could picture myself in the scene of the events described in the wall post.

  4. 4.

    I was mentally involved in the wall post while reading it.

  5. 5.

    After finishing the wall post, I found it easy to put it out of my mind. (reverse coded)

  6. 6.

    I wanted to learn how the wall post ended.

  7. 7.

    The wall post affected me emotionally.

  8. 8.

    I found myself thinking of ways the wall post could have turned out differently.

  9. 9.

    I found my mind wandering while reading the wall post. (reverse coded)

  10. 10.

    The events in the wall post are relevant to my everyday life.

  11. 11.

    The events in the wall post have changed my life.

  12. 12.

    While reading the wall post I had a vivid image of the victim(s).

Social Identification

  1. 1.

    Being a [social network site name] user is a big part of my identity.

  2. 2.

    Being a [social network site name] user is important to me.

  3. 3.

    I feel proud to be a part of the [social network site name] family.

Fantasy Absorption

  1. 1.

    If I wish, I can imagine (or daydream) some things so vividly that they hold my attention in the way a good movie or story does.

  2. 2.

    I can tell a story with elaborations to make it sound better and then have the elaboration seem as real to me as the actual incident, or almost so.

  3. 3.

    I am sometimes able to forget about my present self and get absorbed in a fantasy that I am someone else.

Need for Cognition

  1. 1.

    I would prefer complex to simple problems.

  2. 2.

    I like to have the responsibility of handling a situation that requires a lot of thinking.

  3. 3.

    Thinking is not my idea of fun. (reverse coded)

  4. 4.

    I would rather do something that requires little thought than something that is sure to challenge my thinking abilities. (reverse coded)

  5. 5.

    I try to anticipate and avoid situations where there is likely a chance I will have to think in depth about something. (reverse coded)

  6. 6.

    I find satisfaction in deliberating hard and for long hours.

  7. 7.

    I only think as hard as I have to. (reverse coded)

  8. 8.

    I prefer to think about small, daily projects to long-term ones. (reverse coded)

  9. 9.

    I like tasks that require little thought once I have learned them. (reverse coded)

  10. 10.

    The idea of relying on thought to make my way to the top appeals to me.

  11. 11.

    I really enjoy a task that involves coming up with new solutions to problems.

  12. 12.

    Learning new ways to think does not excite me very much. (reverse coded)

  13. 13.

    I prefer my life to be filled with puzzles that I must solve.

  14. 14.

    The notion of thinking abstractly is appealing to me.

  15. 15.

    I would prefer a task that is intellectual, difficult, and important to one that is somewhat important but does not require much thought.

  16. 16.

    I feel relief rather than satisfaction after completing a task that required a lot of mental effort. (reverse coded)

  17. 17.

    It is enough for me that something gets the job done; I do not care how or why it works. (reverse coded)

  18. 18.

    I usually end up deliberating about issues even when they do not affect me personally.

Reported Identity Violation

Personal Identity Violation

  1. 1.

    I feel like the decision that the network provider made violated some of my personal identity.

  2. 2.

    The decision that the network provider made goes against things that are central (i.e., very important) to my personal identity.

  3. 3.

    I feel that the network provider’s decision violated something that is very important to my personal identity.

  4. 4.

    The network provider’s decision disregarded some things that I value and that are a part of my personal identity.

Social Identity Violation

  1. 5.

    I feel the decision that the network provider made is damaging to the [social network site name] users.

  2. 6.

    The decision that the network provider made goes against [social network site name] users.

  3. 7.

    I feel that the network provider’s decision violated something that is very important to [social network site name] users.

  4. 8.

    The network provider’s decision disregarded some things that I value and that are a part of my identity as a [social network site name] user.

Storytelling

  1. 1.

    The main story character experiences an inciting incident.

  2. 2.

    There is a mundane presentation of the self in everyday life of a main story character in the story.

  3. 3.

    The main story character found the wall post engages in actions to achieve goals.

  4. 4.

    The wall post presents a story that informs about conscious and/or unconscious thoughts of the main story character.

  5. 5.

    The wall post presents a story about how personal evolution or change in the life of the main story character occurs.

  6. 6.

    The wall post describes a world of personal block that does/may prevent goal attainment.

  7. 7.

    The wall post has a beginning, middle, and end.

  8. 8.

    The wall post presents a main story character in clear-cut situations.

  9. 9.

    The wall post has a main story character who offers a lesson learned.

Attitude Toward Interventions

I think interventions are in general….

  1. 1.

    bad—good.

  2. 2.

    wise—unwise. (reverse coded)

  3. 3.

    pleasant—unpleasant. (reverse coded)

  4. 4.

    negative—positive.

Reported Self-referencing

  1. 1.

    To what extent did you think about your experiences with cyber harassment?

  2. 2.

    To what extent did you think what it would be like to be harassed in social media?

  3. 3.

    To what extent were you reminded of your own experiences with cyber harassment?

  4. 4.

    To what extent did you believe that the wall post seemed to be written with you in mind?

  5. 5.

    To what extent did you believe that the wall post related to you personally?

Rights and permissions

Reprints and permissions

About this article

Cite this article

van Laer, T. The Means to Justify the End: Combating Cyber Harassment in Social Media. J Bus Ethics 123, 85–98 (2014). https://doi.org/10.1007/s10551-013-1806-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-013-1806-z

Keywords

Navigation