The Means to Justify the End: Combating Cyber Harassment in Social Media
- 2.8k Downloads
Cyber harassment can have harmful effects on social media users, such as emotional distress and, consequently, withdrawal from social network sites or even life itself. At the same time, users are often upset when network providers intervene and deem such an intrusion an unjust occurrence. This article analyzes how decisions to intervene can be communicated in such a way that users consider them adequate and acceptable. A first experiment shows that informational justice perceptions of social network users depend on the format in which network providers present the decision to intervene. More specifically, if a decision to intervene is presented in the form of a story, as opposed to an analytical rendering of facts and arguments, decisions to intervene prompt more positive informational justice perceptions. A second experiment reveals that when users relate the experience to themselves, narrative transportation increases, which positively affects perceptions of the justice of decisions to intervene.
KeywordsCyber bullying Cyber harassment Identity Justice perception Narrative transportation Self-referencing Social media Storytelling
The author gratefully acknowledges the suggestions of Katja Brunk, Ko de Ruyter, Joëlle Vanhamme, and Martin Wetzels on a previous version of this article.
- Avery, J. (2010). Gender bender brand hijacks and consumer revolt: The Porsche Cayenne story. In J. Avery, S. Beatty, M. B. Holbrook, R. V. Kozinets, & B. Mittal (Eds.), Consumer behavior: Human pursuit of happiness in the world of goods (pp. 645–649). Cincinnati, OH: Open Mentis.Google Scholar
- Baum, K., Catalano, S., Rand, M., & Rose, K. (2009). Stalking victimization in the United States: National crime victimization survey Special Report: Bureau of Justice Statistics.Google Scholar
- Bennett, A., & Royle, N. (2004). Introduction to literature, criticism and theory (3rd ed.). Harlow: Pearson.Google Scholar
- Bocij, P. (2004). Cyberstalking: Harassment in the Internet age and how to protect your family. Westport, CT: Praeger.Google Scholar
- Citron, D. K. (2009). Law’s expressive value in combating cyber gender harassment. Michigan Law Review, 108(3), 373–415.Google Scholar
- comScore, I. (2011). It’s a social world: Top 10 need-to-knows about social networking and where it’s headed.Google Scholar
- Economist. (2011, April 23). Creepy crawlies, 398, 63–64.Google Scholar
- Green, M. C. (2008). Transportation theory. In W. Donsbach (Ed.), International Encyclopedia of Communication (pp. 5170–5175). Oxford, UK: Wiley-Blackwell.Google Scholar
- Greenberg, J. (1993). The social side of fairness: Interpersonal and informational classes of organisational justice. In R. Cropanzano (Ed.), Justice in the workplace: Approaching fairness in human resource management (pp. 79–103). Hillsdale, NJ: Erlbaum.Google Scholar
- Hewitt, J. P. (2003). Self and society: A symbolic interactionist social psychology (9th ed.). Boston, MA: Allyn and Bacon.Google Scholar
- Levine, M. (2013, May 28). Controversial, harmful and hateful speech on Facebook [Facebook Safety Notes]. Blog Retrieved from https://www.facebook.com/notes/facebook-safety/controversial-harmful-and-hateful-speech-on-facebook/574430655911054.
- Lipton, J. D. (2011). Combating cyber-victimization. Berkeley Technology Law Journal, 26(2), 1103–1155.Google Scholar
- Lowensohn, J. (2010, August 6). Report: Conservative groups gaming Digg. CNET Blog Retrieved from http://news.cnet.com/8301-27076_3-20012916-248.html.
- Parker, I. (2012, February 6). The story of a suicide: A gay freshman and the online world. The New Yorker.Google Scholar
- Pruitt, S. (2003). Friendster: A new twist on wired contacts. PCWorld, Software≫Browsers & Add-Ons (August 29). Retrieved from http://www.pcworld.com/article/112257/friendster_new_twist_on_wired_contacts.html.
- Reitsma, R., O’Connell, J., Wise, J., & Jaddou, S. (2011). Consumers and online privacy: How much information is too much? Forrester Research, Inc.Google Scholar
- Sledgianowski, D., & Kulviwat, S. (2009). Using social network sites: The effects of playfulness, critical mass and trust in a hedonic context. Journal of Computer Information Systems, 49(4), 74–83.Google Scholar
- Tajfel, H., & Turner, J. (2004). An integrative theory of intergroup conflict. In M. J. Hatch & M. Schultz (Eds.), Organizational identity: A reader (pp. 56–65). Oxford: Oxford University.Google Scholar
- Tassi, P. (2012, July 13). Facebook didn’t kill Digg, Reddit did. Forbes Blog Retrieved from http://www.forbes.com/sites/insertcoin/2012/07/13/facebook-didnt-kill-digg-reddit-did/.
- Van Laer, T., De Ruyter, K., Visconti, L. M., & Wetzels, M. (forthcoming). The Extended Transportation-Imagery Model: A meta-analysis of the antecedents and consequences of consumers’ narrative transportation. Journal of Consumer Research.Google Scholar