Journal of Business Ethics

, Volume 123, Issue 1, pp 85–98 | Cite as

The Means to Justify the End: Combating Cyber Harassment in Social Media

Article

Abstract

Cyber harassment can have harmful effects on social media users, such as emotional distress and, consequently, withdrawal from social network sites or even life itself. At the same time, users are often upset when network providers intervene and deem such an intrusion an unjust occurrence. This article analyzes how decisions to intervene can be communicated in such a way that users consider them adequate and acceptable. A first experiment shows that informational justice perceptions of social network users depend on the format in which network providers present the decision to intervene. More specifically, if a decision to intervene is presented in the form of a story, as opposed to an analytical rendering of facts and arguments, decisions to intervene prompt more positive informational justice perceptions. A second experiment reveals that when users relate the experience to themselves, narrative transportation increases, which positively affects perceptions of the justice of decisions to intervene.

Keywords

Cyber bullying Cyber harassment Identity Justice perception Narrative transportation Self-referencing Social media Storytelling 

References

  1. Appel, M. (2008). Fictional narratives cultivate just-world beliefs. Journal of Communication, 58(1), 62–83.CrossRefGoogle Scholar
  2. Avery, J. (2010). Gender bender brand hijacks and consumer revolt: The Porsche Cayenne story. In J. Avery, S. Beatty, M. B. Holbrook, R. V. Kozinets, & B. Mittal (Eds.), Consumer behavior: Human pursuit of happiness in the world of goods (pp. 645–649). Cincinnati, OH: Open Mentis.Google Scholar
  3. Baugh, S. G. (1997). On the persistence of sexual harassment in the workplace. Journal of Business Ethics, 16(9), 899–908. doi:10.1023/a:1017935203669.CrossRefGoogle Scholar
  4. Baum, K., Catalano, S., Rand, M., & Rose, K. (2009). Stalking victimization in the United States: National crime victimization survey Special Report: Bureau of Justice Statistics.Google Scholar
  5. Bell, M. P., McLaughlin, M. E., & Sequeira, J. M. (2002). Discrimination, harassment, and the glass ceiling: Women executives as change agents. Journal of Business Ethics, 37(1), 65–76. doi:10.1023/a:1014730102063.CrossRefGoogle Scholar
  6. Bennett, A., & Royle, N. (2004). Introduction to literature, criticism and theory (3rd ed.). Harlow: Pearson.Google Scholar
  7. Bocij, P. (2004). Cyberstalking: Harassment in the Internet age and how to protect your family. Westport, CT: Praeger.Google Scholar
  8. Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230.CrossRefGoogle Scholar
  9. Brunk, K. H. (2012). Un/ethical company and brand perceptions: Conceptualising and operationalising consumer meanings. Journal of Business Ethics, 111(4), 551–565. doi:10.1007/s10551-012-1339-x.CrossRefGoogle Scholar
  10. Burnkrant, R. E., & Unnava, H. R. (1989). Self-referencing: A strategy for increasing processing of message content. Personality and Social Psychology Bulletin, 15(4), 628–638. doi:10.1177/0146167289154015.CrossRefGoogle Scholar
  11. Burnkrant, R. E., & Unnava, H. R. (1995). Effects of self-referencing on persuasion. Journal of Consumer Research, 22(1), 17–26.CrossRefGoogle Scholar
  12. Cacioppo, J. T., Petty, R. E., Feinstein, J. A., & Jarvis, W. B. G. (1996). Dispositional differences in cognitive motivation: The life and times of individuals varying in need for cognition. Psychological Bulletin, 119(2), 197–253.CrossRefGoogle Scholar
  13. Citron, D. K. (2009). Law’s expressive value in combating cyber gender harassment. Michigan Law Review, 108(3), 373–415.Google Scholar
  14. Colquitt, J. A. (2001). On the dimensionality of organizational justice: A construct validation of a measure. Journal of Applied Psychology, 86(3), 386–400.CrossRefGoogle Scholar
  15. comScore, I. (2011). It’s a social world: Top 10 need-to-knows about social networking and where it’s headed.Google Scholar
  16. Dollinger, S. J., Preston, L. A., O’Brien, S. P., & DiLalla, D. L. (1996). Individuality and relatedness of the self: An autophotographic study. Journal of Personality and Social Psychology, 71(6), 1268–1278.CrossRefGoogle Scholar
  17. Dunlop, S. M., Wakefield, M., & Kashima, Y. (2010). Pathways to persuasion: Cognitive and experiential responses to health-promoting mass media messages. Communication Research, 37(1), 133–164.CrossRefGoogle Scholar
  18. Economist. (2011, April 23). Creepy crawlies, 398, 63–64.Google Scholar
  19. Escalas, J. E. (2004). Imagine yourself in the product: Mental simulation, narrative transportation, and persuasion. [Article]. Journal of Advertising, 33(2), 37–48.CrossRefGoogle Scholar
  20. Escalas, J. E. (2007). Self-referencing and persuasion: Narrative transportation versus analytical elaboration. Journal of Consumer Research, 33(4), 421–429.CrossRefGoogle Scholar
  21. Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19(4), 468–483. doi:10.1177/0886260503262083.CrossRefGoogle Scholar
  22. Fishbein, M., & Yzer, M. C. (2003). Using theory to design effective health behavior interventions. Communication Theory, 13(2), 164–183. doi:10.1111/j.1468-2885.2003.tb00287.x.CrossRefGoogle Scholar
  23. Green, M. C. (2008). Transportation theory. In W. Donsbach (Ed.), International Encyclopedia of Communication (pp. 5170–5175). Oxford, UK: Wiley-Blackwell.Google Scholar
  24. Green, M. C., & Brock, T. C. (2000). The role of transportation in the persuasiveness of public narratives. Journal of Personality and Social Psychology, 79(5), 701–721.CrossRefGoogle Scholar
  25. Greenberg, J. (1993). The social side of fairness: Interpersonal and informational classes of organisational justice. In R. Cropanzano (Ed.), Justice in the workplace: Approaching fairness in human resource management (pp. 79–103). Hillsdale, NJ: Erlbaum.Google Scholar
  26. Gross-Schaefer, A., Trigilio, J., Negus, J., & Ro, C.-S. (2000). Ethics education in the workplace: An effective tool to combat employee theft. Journal of Business Ethics, 26(2), 89–100. doi:10.1023/a:1006038310865.CrossRefGoogle Scholar
  27. Hewitt, J. P. (2003). Self and society: A symbolic interactionist social psychology (9th ed.). Boston, MA: Allyn and Bacon.Google Scholar
  28. Kozinets, R. V., de Valck, K., Wojnicki, A. C., & Wilner, S. J. S. (2010). Networked narratives: Understanding word-of-mouth marketing in online communities. Journal of Marketing, 74(2), 71–89.CrossRefGoogle Scholar
  29. Leung, K., Tong, K–. K., & Lind, E. A. (2007). Realpolitik versus fair process: Moderating effects of group identification on acceptance of political decisions. Journal of Personality and Social Psychology, 92(3), 476–489.CrossRefGoogle Scholar
  30. Levine, M. (2013, May 28). Controversial, harmful and hateful speech on Facebook [Facebook Safety Notes]. Blog Retrieved from https://www.facebook.com/notes/facebook-safety/controversial-harmful-and-hateful-speech-on-facebook/574430655911054.
  31. Lipton, J. D. (2011). Combating cyber-victimization. Berkeley Technology Law Journal, 26(2), 1103–1155.Google Scholar
  32. Lowensohn, J. (2010, August 6). Report: Conservative groups gaming Digg. CNET Blog Retrieved from http://news.cnet.com/8301-27076_3-20012916-248.html.
  33. Martin, K. D., & Smith, N. C. (2008). Commercializing social interaction: The ethics of stealth marketing. Journal of Public Policy & Marketing, 27(1), 45–56.CrossRefGoogle Scholar
  34. Mayer, D. M., Greenbaum, R. L., Kuenzi, M., & Shteynberg, G. (2009). When do fair procedures not matter? A test of the identity violation effect. Journal of Applied Psychology, 94(1), 142–161.CrossRefGoogle Scholar
  35. Meyers-Levy, J., & Peracchio, L. A. (1996). Moderators of the impact of self-reference on persuasion. Journal of Consumer Research, 22(4), 408–423.CrossRefGoogle Scholar
  36. Parker, I. (2012, February 6). The story of a suicide: A gay freshman and the online world. The New Yorker.Google Scholar
  37. Phillips, B. J., & McQuarrie, E. F. (2010). Narrative and persuasion in fashion advertising. Journal of Consumer Research, 37(3), 368–392.CrossRefGoogle Scholar
  38. Pogue, D. (2013). Term of confusion. Scientific American, 308(3), 35.CrossRefGoogle Scholar
  39. Postmes, T., Spears, R., & Lea, M. (1998). Breaching or building social boundaries? Communication Research, 25(6), 689–715. doi:10.1177/009365098025006006.CrossRefGoogle Scholar
  40. Preacher, K. J., & Hayes, A. F. (2004). SPSS and SAS procedures for estimating indirect effects in simple mediation models. Behavior Research Methods, Instruments, & Computers, 36(4), 717–731.CrossRefGoogle Scholar
  41. Preacher, K. J., & Hayes, A. F. (2008). Asymptotic and resampling strategies for assessing and comparing indirect effects in multiple mediator models. Behavior Research Methods, 40(3), 879–891.CrossRefGoogle Scholar
  42. Pruitt, S. (2003). Friendster: A new twist on wired contacts. PCWorld, Software≫Browsers & Add-Ons (August 29). Retrieved from http://www.pcworld.com/article/112257/friendster_new_twist_on_wired_contacts.html.
  43. Reid, A., & Deaux, K. (1996). Relationship between social and personal identities: Segregation or integration. Journal of Personality and Social Psychology, 71(6), 1084–1091.CrossRefGoogle Scholar
  44. Reitsma, R., O’Connell, J., Wise, J., & Jaddou, S. (2011). Consumers and online privacy: How much information is too much? Forrester Research, Inc.Google Scholar
  45. Sama, L. M., & Shoaf, V. (2002). Ethics on the web: Applying moral decision-making to the new media. Journal of Business Ethics, 36(1), 93–103. doi:10.1023/a:1014296128397.CrossRefGoogle Scholar
  46. Schau, H. J., & Gilly, M. C. (2003). We are what we post? Self-presentation in personal web space. Journal of Consumer Research, 30(3), 385–404.CrossRefGoogle Scholar
  47. Schellens, P. J., & de Jong, M. (2004). Argumentation schemes in persuasive brochures. Argumentation, 18(3), 295–323.CrossRefGoogle Scholar
  48. Sledgianowski, D., & Kulviwat, S. (2009). Using social network sites: The effects of playfulness, critical mass and trust in a hedonic context. Journal of Computer Information Systems, 49(4), 74–83.Google Scholar
  49. Stevens, B. (2001). Hospitality ethics: Responses from human resource directors and students to seven ethical scenarios. Journal of Business Ethics, 30(3), 233–242. doi:10.1023/a:1006449526584.CrossRefGoogle Scholar
  50. Tajfel, H., & Turner, J. (2004). An integrative theory of intergroup conflict. In M. J. Hatch & M. Schultz (Eds.), Organizational identity: A reader (pp. 56–65). Oxford: Oxford University.Google Scholar
  51. Tassi, P. (2012, July 13). Facebook didn’t kill Digg, Reddit did. Forbes Blog Retrieved from http://www.forbes.com/sites/insertcoin/2012/07/13/facebook-didnt-kill-digg-reddit-did/.
  52. Tellegen, A., & Atkinson, G. (1974). Openness to absorbing and self-altering experiences (‘absorption’), a trait related to hypnotic susceptibility. Journal of Abnormal Psychology, 83(3), 268–277.CrossRefGoogle Scholar
  53. Terry, D. J., & Hogg, M. A. (1996). Group norms and the attitude-behavior relationship: A role for group identification. Personality and Social Psychology Bulletin, 22(8), 776–793. doi:10.1177/0146167296228002.CrossRefGoogle Scholar
  54. Van Laer, T., & De Ruyter, K. (2010). In stories we trust: How narrative apologies provide cover for competitive vulnerability after integrity-violating blog posts. International Journal of Research in Marketing, 27(2), 164–174. doi:10.1016/j.ijresmar.2009.12.010.CrossRefGoogle Scholar
  55. Van Laer, T., De Ruyter, K., & Cox, D. (2013). A walk in customers’ shoes: How attentional bias modification affects ownership of integrity-violating social media posts. Journal of Interactive Marketing, 27(1), 14–27. doi:10.1016/j.intmar.2012.09.002.Google Scholar
  56. Van Laer, T., De Ruyter, K., Visconti, L. M., & Wetzels, M. (forthcoming). The Extended Transportation-Imagery Model: A meta-analysis of the antecedents and consequences of consumers’ narrative transportation. Journal of Consumer Research.Google Scholar
  57. Vega, G., & Comer, D. R. (2005). Sticks and stones may break your bones, but words can break your spirit: Bullying in the workplace. Journal of Business Ethics, 58(1–3), 101–109. doi:10.1007/s10551-005-1422-7.CrossRefGoogle Scholar
  58. Wells, D. L., & Kracher, B. J. (1993). Justice, sexual harassment, and the reasonable victim standard. Journal of Business Ethics, 12(6), 423–431. doi:10.1007/bf01666555.CrossRefGoogle Scholar
  59. Woodside, A. G., Sood, S., & Miller, K. E. (2008). When consumers and brands talk: Storytelling theory and research in psychology and marketing. Psychology & Marketing, 25(2), 97–145.CrossRefGoogle Scholar
  60. Wornham, D. (2003). A descriptive investigation of morality and victimisation at work. Journal of Business Ethics, 45(1–2), 29–40. doi:10.1023/a:1024116327582.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Department of MarketingESCP Europe Business SchoolLondonUK

Personalised recommendations