Recognition: unknown
Attention: What Prevents Young Adults from Speaking Up Against Cyberbullying in an LLM-Powered Social Media Simulation
Pith reviewed 2026-05-07 15:22 UTC · model grok-4.3
The pith
Young adults speak up against cyberbullying in an LLM simulation only after making three specific attention shifts.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Practicing public bystander intervention in the LLM-powered simulation helped participants only after they completed three attention shifts: from inattention to paying true attention, from self-focus to attending to those directly involved, and from resolving the private bully-victim conflict to addressing the broader online audience for norm-setting. Only then did users see a reason to speak up publicly and, through continued practice, craft tactful public messages without explicit instruction.
What carries the argument
The three attention shifts observed during free practice in Upstanders' Practicum, the multi-LLM-agent social media simulation, which transform user engagement from private or self-focused responses to public norm-setting actions.
If this is right
- Participants recognize public comments as a tool for setting online norms rather than only resolving private conflicts.
- Continued practice after the shifts allows users to produce tactful intervention messages without receiving direct instructions.
- Bystander education can be redesigned around supporting true attention, building a vocal upstander identity, and framing intervention as public norm-setting.
- The open-sourced multi-agent platform enables further experiments on cyberbullying response and other social media scenarios.
Where Pith is reading between the lines
- The same attention-shift sequence could apply to training for other online social challenges such as responding to misinformation or workplace microaggressions.
- Designers of real social media platforms might add lightweight prompts that guide users through similar attention refocusing before suggesting intervention options.
- If the shifts prove sufficient, scalable simulation practice could reduce reliance on real-world exposure for developing intervention habits.
Load-bearing premise
That the three attention shifts are causally necessary for any benefits to transfer from the simulation to real-world public intervention and that the LLM-generated social dynamics are realistic enough for that transfer to occur.
What would settle it
A follow-up study in which participants who completed the three attention shifts in the simulation show no increase in real-world public intervention rates compared with those who practiced without completing the shifts, or in which the simulation's generated interactions are shown to differ markedly from actual social media logs.
read the original abstract
Interactive, multi-agent social simulation systems have shown promise for helping users practice navigating various complex social situations across domains. This paper asks: To what extent can such systems help young adult (YA) bystanders speak up publicly against cyberbullying, a task often thwarted by complex, multi-party social dynamics? We created Upstanders' Practicum, a multi-AI-agent social media simulation powered by Large Language Models (LLMs), as a probe and observed 34 YAs freely practicing public bystander intervention across three iteratively refined versions. We found that practicing public bystander intervention in the simulation was helpful, but after participants made three attention shifts: (1) from inattention to paying true attention, (2) from self-focus ("I don't usually do this'') to attending to those directly involved, and (3) from resolving the private conflict between bully and victim ("maybe I could set up the meeting between them'') to addressing the broader audience online ("public comment is about norm-setting"). Only after these shifts did practice in the simulation start to help: participants then saw a reason to speak up publicly and, through continued practice, crafted tactful public messages without explicit instruction. These findings illuminate new design and research opportunities for bystander education beyond social skill instruction, namely, designing for true attention, for fostering a vocal upstander identity, and for seeing bystander intervention as public norm setting. In addition, we open-source Truman Agents (cornell-design-aigroup.github.io/TrumanAgents/), the first-of-its-kind multi-LLM-agent social media simulation platform that Upstanders' Practicum builds upon, for future cyberbullying and social media research.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces Upstanders' Practicum, an LLM-powered multi-agent social media simulation for young adults to practice public bystander intervention against cyberbullying. Based on qualitative observations of 34 participants across three iteratively refined versions, it identifies three attention shifts required for the practice to become helpful: (1) from inattention to paying true attention, (2) from self-focus to attending to those directly involved, and (3) from resolving private bully-victim conflicts to addressing the broader online audience for norm-setting. The work also open-sources the Truman Agents platform as a reusable multi-LLM-agent social media simulation tool.
Significance. If the attention-shift findings hold under further scrutiny, the paper advances HCI research on AI-supported social skill practice by emphasizing attentional and identity factors over pure skill instruction in bystander education. The open-sourcing of Truman Agents is a notable strength, supplying a concrete, extensible platform for future studies on cyberbullying dynamics and multi-agent simulations that supports reproducibility and extension by other researchers.
major comments (3)
- [Abstract] Abstract: The central claim that 'practicing public bystander intervention in the simulation was helpful, but after participants made three attention shifts' and 'Only after these shifts did practice in the simulation start to help' is load-bearing for the contribution yet rests on post-hoc qualitative interpretation of 34 participants without quantitative pre/post measures of intervention skill, control conditions, or external validation of transfer to real-world behavior.
- [Results] Results (attention shifts section): The three shifts are presented as necessary preconditions, but the manuscript provides no details on systematic coding, inter-rater reliability, or how alternative interpretations were ruled out, leaving the necessity claim dependent on interpretive analysis alone.
- [Discussion] Discussion: The design implications for 'true attention, fostering a vocal upstander identity, and seeing bystander intervention as public norm setting' follow directly from the shifts but are not tested against established social psychology findings on bystander intervention or compared to non-LLM simulation baselines, weakening claims about unique value of the LLM-powered environment.
minor comments (2)
- [Title] The title emphasizes barriers to speaking up while the findings focus on enabling shifts; a minor rephrasing could better reflect the positive design opportunities identified.
- [Introduction] The Truman Agents open-source link is given but would benefit from a one-sentence architectural summary in the introduction to help readers unfamiliar with multi-agent LLM systems.
Simulated Author's Rebuttal
We thank the referee for their constructive and detailed feedback. We address each major comment below, clarifying the exploratory qualitative nature of the study while outlining specific revisions to improve transparency, methodological detail, and contextualization of findings.
read point-by-point responses
-
Referee: [Abstract] Abstract: The central claim that 'practicing public bystander intervention in the simulation was helpful, but after participants made three attention shifts' and 'Only after these shifts did practice in the simulation start to help' is load-bearing for the contribution yet rests on post-hoc qualitative interpretation of 34 participants without quantitative pre/post measures of intervention skill, control conditions, or external validation of transfer to real-world behavior.
Authors: We acknowledge that the study is exploratory and qualitative, relying on thematic patterns from participant reflections and behaviors rather than controlled quantitative measures. The design used the simulation as a probe to surface how attention shifts emerged during free practice, not as an efficacy trial. In revision, we will rephrase the abstract to state that the shifts were observed as recurring patterns associated with participants finding the practice helpful, and we will add an explicit Limitations section noting the absence of pre/post skill assessments, control conditions, and real-world transfer validation, while calling for future experimental work to address these. revision: partial
-
Referee: [Results] Results (attention shifts section): The three shifts are presented as necessary preconditions, but the manuscript provides no details on systematic coding, inter-rater reliability, or how alternative interpretations were ruled out, leaving the necessity claim dependent on interpretive analysis alone.
Authors: We agree that the analysis process requires more detail. The shifts were derived from iterative thematic analysis of interview transcripts and simulation logs across the 34 participants. In the revised manuscript, we will add a Methods subsection describing the analysis: open coding by multiple researchers, iterative theme refinement through team discussions, and identification of the three shifts as cross-participant patterns. We will also revise language from 'necessary preconditions' to 'observed patterns linked to helpful engagement' and discuss steps taken for analytical rigor, such as memoing and consensus, while noting the interpretive approach as a limitation. revision: yes
-
Referee: [Discussion] Discussion: The design implications for 'true attention, fostering a vocal upstander identity, and seeing bystander intervention as public norm setting' follow directly from the shifts but are not tested against established social psychology findings on bystander intervention or compared to non-LLM simulation baselines, weakening claims about unique value of the LLM-powered environment.
Authors: We will expand the Discussion to explicitly connect the attention shifts to established bystander intervention literature, including Latané and Darley's work on the bystander effect and recent studies on online intervention. We will also clarify how the multi-agent LLM simulation enables dynamic, multi-party interactions not easily replicable in non-AI role-play. The design implications will be framed as hypotheses emerging from observations rather than validated outcomes, with explicit statements that direct comparisons to traditional baselines and tests of unique LLM value are left for future research. revision: partial
- The absence of quantitative pre/post measures, control conditions, and external validation of real-world transfer, which would require a separate controlled experimental study beyond the scope of this exploratory qualitative investigation.
Circularity Check
No circularity: qualitative observations derive directly from participant data without reduction to inputs or self-referential definitions
full rationale
The paper reports observational findings from 34 participants freely practicing in an LLM-powered simulation. The three attention shifts are identified post-hoc from user statements and behaviors in the study sessions, then interpreted as enabling the observed benefits. No equations, fitted parameters, predictions, or derivations exist that could reduce to the inputs by construction. No self-citations are invoked as load-bearing uniqueness theorems or ansatzes. The central claim remains an interpretive summary of the collected qualitative data rather than a self-defined or statistically forced result.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Multi-agent LLM simulations can generate sufficiently realistic cyberbullying and social media interaction scenarios to serve as effective practice environments for bystander intervention.
invented entities (2)
-
Upstanders' Practicum
no independent evidence
-
Truman Agents
no independent evidence
Reference graph
Works this paper leans on
-
[1]
Maeve Duggan. 1. experiencing online harassment, Dec 2019. URLhttps://www.pewresearch.org/internet/2017/07/11/ experiencing-online-harassment/
2019
-
[2]
Tointerveneornottointervene:Youngadults’views on when and how to intervene in online harassment.Journal of Computer-Mediated Communication, 28(5):zmad027, 2023
AnnaDavidovic,CatherineTalbot,CatherineHamilton-Giachritsis,andAdamJoinson. Tointerveneornottointervene:Youngadults’views on when and how to intervene in online harassment.Journal of Computer-Mediated Communication, 28(5):zmad027, 2023
2023
-
[3]
Factors influencing bystanders’ behavioral reactions in cyberbullying situations.Computers in Human Behavior, 78:273–282, 2018
Jiyeon Song and Insoo Oh. Factors influencing bystanders’ behavioral reactions in cyberbullying situations.Computers in Human Behavior, 78:273–282, 2018
2018
-
[4]
Impact and dynamics of hate and counter speech online.EPJ data science, 11(1):3, 2022
Joshua Garland, Keyan Ghazi-Zahedi, Jean-Gabriel Young, Laurent Hébert-Dufresne, and Mirta Galesic. Impact and dynamics of hate and counter speech online.EPJ data science, 11(1):3, 2022
2022
-
[5]
Naturalisticobservationsofpeerinterventionsinbullyingamongelementaryschoolchildren.Manuscript submitted for publication, 1998
LHawkins,DPepler,andWCraig. Naturalisticobservationsofpeerinterventionsinbullyingamongelementaryschoolchildren.Manuscript submitted for publication, 1998
1998
-
[6]
Understanding the bystander effect on toxic twitter conversations,
Ana Aleksandric, Mohit Singhal, Anne Groggel, and Shirin Nilizadeh. Understanding the bystander effect on toxic twitter conversations,
-
[7]
URLhttps://arxiv.org/abs/2211.10764
work page internal anchor Pith review Pith/arXiv arXiv
-
[8]
Upstanding by design: Bystander intervention in cyberbullying
Dominic DiFranzo, Samuel Hardman Taylor, Franccesca Kazerooni, Olivia D Wherry, and Natalya N Bazarova. Upstanding by design: Bystander intervention in cyberbullying. InProceedings of the 2018 CHI conference on human factors in computing systems, pages 1–12, 2018
2018
-
[9]
Norm perception as a vehicle for social change.Social issues and policy review, 10(1): 181–211, 2016
Margaret E Tankard and Elizabeth Levy Paluck. Norm perception as a vehicle for social change.Social issues and policy review, 10(1): 181–211, 2016
2016
-
[10]
A systematic literature review of factors that moderate bystanders’ actions in cyberbullying.Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 12(4), 2018
Fernando Domínguez-Hernández, Lars Bonell, and Alejandro Martínez-González. A systematic literature review of factors that moderate bystanders’ actions in cyberbullying.Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 12(4), 2018
2018
-
[11]
Sijia Xiao, Coye Cheshire, and Niloufar Salehi. Sensemaking, support, safety, retribution, transformation: A restorative justice approach to understanding adolescents’ needs for addressing online harm. InProceedings of the 2022 CHI Conference on Human Factors in Computing Systems,CHI’22,NewYork,NY,USA,2022.AssociationforComputingMachinery. ISBN97814503915...
-
[12]
Understandingandaddressingteachershortagesintheunitedstates.TheHamiltonProject,5:1–28,2017
ThomasSDeeandDanGoldhaber. Understandingandaddressingteachershortagesintheunitedstates.TheHamiltonProject,5:1–28,2017
2017
-
[13]
Department of Education
U.S. Department of Education. Teacher Shortage Areas, 2023. URLhttps://tsa.ed.gov
2023
-
[14]
Social skill training with large language models.arXiv preprint arXiv:2404.04204, 2024
Diyi Yang, Caleb Ziems, William Held, Omar Shaikh, Michael S Bernstein, and John Mitchell. Social skill training with large language models.arXiv preprint arXiv:2404.04204, 2024
-
[15]
Constructing learning environments for complex social skills.The Journal of the Learning Sciences, 3(4):387–427, 1994
Alex Kass, Robin Burke, Eli Blevis, and Mary Williamson. Constructing learning environments for complex social skills.The Journal of the Learning Sciences, 3(4):387–427, 1994
1994
-
[16]
Multidisciplinary approaches to research on bullying in adolescence.Adolescent research review, 2(1):1–10, 2017
Melissa K Holt, Jennifer Greif Green, Mina Tsay-Vogel, Joanna Davidson, and Claire Brown. Multidisciplinary approaches to research on bullying in adolescence.Adolescent research review, 2(1):1–10, 2017
2017
-
[17]
Omar Shaikh, Valentino Emil Chai, Michele Gelfand, Diyi Yang, and Michael S. Bernstein. Rehearsal: Simulating conflict to teach conflict resolution. InProceedings of the 2024 CHI Conference on Human Factors in Computing Systems, CHI ’24, New York, NY, USA, 2024. Association for Computing Machinery. ISBN 9798400703300. doi: 10.1145/3613904.3642159. URLhttp...
-
[18]
Agora:Teachingtheskillofconsensus-finding with ai personas grounded in human voice
SuyashPradeepFulay,PrernaRavi,OmGokhale,EugeneYi,MichielABakker,andDebRoy. Agora:Teachingtheskillofconsensus-finding with ai personas grounded in human voice. InProceedings of the Extended Abstracts of the 2026 CHI Conference on Human Factors in Computing Systems, pages 1–6, 2026
2026
-
[19]
An llm-guided tutoring system for social skills training
Michael Guevarra, Indronil Bhattacharjee, Srijita Das, Christabel Wayllace, Carrie Demmans Epp, Matthew E Taylor, and Alan Tay. An llm-guided tutoring system for social skills training. InProceedings of the AAAI Conference on Artificial Intelligence, volume 39, pages 29643–29645, 2025
2025
-
[20]
Roleplay-doh:Enablingdomain-expertstocreate llm-simulated patients via eliciting and adhering to principles
RyanLouie,AnanjanNandi,WilliamFang,ChengChang,EmmaBrunskill,andDiyiYang. Roleplay-doh:Enablingdomain-expertstocreate llm-simulated patients via eliciting and adhering to principles. InProceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, pages 10570–10603, 2024
2024
-
[21]
Erin A Casey, Taryn Lindhorst, and Heather L Storer. The situational-cognitive model of adolescent bystander behavior: Modeling bystander decision-making in the context of bullying and teen dating violence.Psychology of violence, 7(1):33, 2017
2017
-
[22]
Bystander intervention in bullying: Role of social skills and gender.The Journal of Early Adolescence, 39(2):141–166, 2019
Lyndsay N Jenkins and Amanda B Nickerson. Bystander intervention in bullying: Role of social skills and gender.The Journal of Early Adolescence, 39(2):141–166, 2019
2019
-
[23]
Bystanders in bullying: Do tom and social competence skills play a role.Journal of educational and developmental psychology, 8(2):174–174, 2018
Panayiota Metallidou, Magdalini Baxevani, and Grigoris Kiosseoglou. Bystanders in bullying: Do tom and social competence skills play a role.Journal of educational and developmental psychology, 8(2):174–174, 2018. :Preprint submitted to Elsevier Page 21 of 24
2018
-
[24]
Collegestudents’perceptionsofbarrierstobystanderintervention.Journalofinterpersonalviolence,35(15-16): 2971–2992, 2020
KristenYuleandJohnGrych. Collegestudents’perceptionsofbarrierstobystanderintervention.Journalofinterpersonalviolence,35(15-16): 2971–2992, 2020
2020
-
[25]
Teens and cyberbullying 2022.Pew Research Center, 2022
Emily Vogels. Teens and cyberbullying 2022.Pew Research Center, 2022
2022
-
[26]
Reportonindicatorsofschoolcrimeandsafety:2020,2021
VéroniqueIrwin,KeWang,JiashanCui,JizhiZhang,andAlexandraThompson. Reportonindicatorsofschoolcrimeandsafety:2020,2021. URLhttps://nces.ed.gov/pubsearch/pubsinfo.asp?pubid=2021092
2020
-
[27]
Cyberbullying among young users of social networks.Journal of Modern Foreign Psychology, 8(3):53–59, 2019
DV Kiriukhina. Cyberbullying among young users of social networks.Journal of Modern Foreign Psychology, 8(3):53–59, 2019
2019
-
[28]
Cyber bullying in adhd and asperger syndrome populations.Research in Autism Spectrum Disorders, 5(3):1201–1208, 2011
Robin M Kowalski and Cristin Fedina. Cyber bullying in adhd and asperger syndrome populations.Research in Autism Spectrum Disorders, 5(3):1201–1208, 2011
2011
-
[29]
Katja Machmutow, Sonja Perren, Fabio Sticca, and Francoise D Alsaker. Peer victimisation and depressive symptoms: Can specific coping strategies buffer the negative impact of cybervictimisation?Emotional and Behavioural Difficulties, 17(3-4):403–420, 2012
2012
-
[30]
Cyberbullying: Experiences, impacts and coping strategies as described by australian young people.Youth studies australia, 29(2):51–59, 2010
Megan Price and John Dalgleish. Cyberbullying: Experiences, impacts and coping strategies as described by australian young people.Youth studies australia, 29(2):51–59, 2010
2010
-
[31]
Cyberbullying,schoolbullying,andpsychologicaldistress:A regional census of high school students.American journal of public health, 102(1):171–177, 2012
ShariKesselSchneider,LydiaO’donnell,AnnStueve,andRobertWSCoulter. Cyberbullying,schoolbullying,andpsychologicaldistress:A regional census of high school students.American journal of public health, 102(1):171–177, 2012
2012
-
[32]
Americans’socialmediause2025,November2025
PewResearchCenter. Americans’socialmediause2025,November2025. URLhttps://www.pewresearch.org/internet/2025/11/ 20/americans-social-media-use-2025/. Accessed May 2, 2026
2025
-
[33]
Danielle M. Law, Jennifer D. Shapka, Shelley Hymel, Brent F. Olson, and Terry Waterhouse. The changing face of bullying: An empirical comparison between traditional and internet bullying and victimization.Computers in Human Behavior, 28(1):226–232, 2012. ISSN 0747-5632. doi: https://doi.org/10.1016/j.chb.2011.09.004. URLhttps://www.sciencedirect.com/scien...
-
[34]
Cyber-bystanding in context: A review of the literature on witnesses’ responses to cyberbullying
Kimberley R Allison and Kay Bussey. Cyber-bystanding in context: A review of the literature on witnesses’ responses to cyberbullying. Children and Youth Services Review, 65:183–194, 2016
2016
-
[35]
Bullies and bystanders
Nina A Beckford. Bullies and bystanders. Master’s thesis, University of Toledo, 2015
2015
-
[36]
‘can i afford to help?’how affordances of communication modalities guide bystanders’ helping intentions towards harassment on social network sites
Sara Bastiaensens, Heidi Vandebosch, Karolien Poels, Katrien Van Cleemput, Ann DeSmet, and Ilse De Bourdeaudhuij. ‘can i afford to help?’how affordances of communication modalities guide bystanders’ helping intentions towards harassment on social network sites. Behaviour & Information Technology, 34(4):425–435, 2015
2015
-
[37]
Bibb Latané and John M Darley.The unresponsive bystander: Why doesn’t he help?Prentice Hall, 1970
1970
-
[38]
Bystander intervention in emergencies: diffusion of responsibility.Journal of personality and social psychology, 8(4p1):377, 1968
John M Darley and Bibb Latané. Bystander intervention in emergencies: diffusion of responsibility.Journal of personality and social psychology, 8(4p1):377, 1968
1968
-
[39]
AidaMidgett,DianaMDoumas,AprilJohnston,RhiannonTrull,andRaissaMiller.Rethinkingbullyinginterventionsforhighschoolstudents: A qualitative study.Journal of Child and Adolescent Counseling, 4(2):146–163, 2018
2018
-
[40]
Cyberbullyingmitigationbyaproxy persuasion of a chat member hijacked by a chatbot
TomoyukiUeda,JunyaNakanishi,ItaruKuramoto,JunBaba,YuichiroYoshikawa,andHiroshiIshiguro. Cyberbullyingmitigationbyaproxy persuasion of a chat member hijacked by a chatbot. InProceedings of the 9th International Conference on Human-Agent Interaction, pages 202–208, 2021
2021
-
[41]
Fearnot! an experiment in emergent narrative
Ruth S Aylett, Sandy Louchart, Joao Dias, Ana Paiva, and Marco Vala. Fearnot! an experiment in emergent narrative. InInternational Workshop on Intelligent Virtual Agents, pages 305–316. Springer, 2005
2005
-
[42]
Ann DeSmet, Sara Bastiaensens, Katrien Van Cleemput, Karolien Poels, Heidi Vandebosch, Gie Deboutte, Laura Herrewijn, Steven Malliet, Sara Pabian, Frederik Van Broeckhoven, et al. The efficacy of the friendly attac serious digital game to promote prosocial bystander behavior in cyberbullying among young adolescents: A cluster-randomized controlled trial.C...
2018
-
[43]
Michael A. Hedderich, Natalie N. Bazarova, Wenting Zou, Ryun Shim, Xinda Ma, and Qian Yang. A piece of theatre: Investigating how teachers design llm chatbots to assist adolescent cyberbullying education. InProceedings of the 2024 CHI Conference on Human Factors in Computing Systems, CHI ’24. Association for Computing Machinery, 2024. doi: 10.1145/3613904...
-
[44]
Achatbot-basedcoachinginterventionforadolescentstopromotelifeskills: pilot study.JMIR Human Factors, 7(1):e16762, 2020
SilviaGabrielli,SilviaRizzi,SaraCarbone,ValeriaDonisi,etal. Achatbot-basedcoachinginterventionforadolescentstopromotelifeskills: pilot study.JMIR Human Factors, 7(1):e16762, 2020
2020
-
[45]
Chatbots to support children in coping with online threats: Socio- technical requirements
Lara Schibelsky Godoy Piccolo, Pinelopi Troullinou, and Harith Alani. Chatbots to support children in coping with online threats: Socio- technical requirements. InDesigning Interactive Systems Conference 2021, pages 1504–1517, 2021
2021
-
[46]
Isabelle McLeod Daphnis, Ryun Shim, Natalie Bazarova, and Qian Yang
Haesoo Kim, Nader Akoury, Julia A Sebastien, S. Isabelle McLeod Daphnis, Ryun Shim, Natalie Bazarova, and Qian Yang. Collaborative upstanding: Exploring conversational strategies for cyberbullying upstanding education. InProceedings of the 2026 CHI Conference on Human Factors in Computing Systems, CHI ’26, New York, NY, USA, 2026. Association for Computin...
-
[47]
Accountability and empathy by design: Encouraging bystander intervention to cyberbullying on social media.Proceedings of the ACM on Human-Computer Interaction, 3 (CSCW):1–26, 2019
Samuel Hardman Taylor, Dominic DiFranzo, Yoon Hyung Choi, Shruti Sannon, and Natalya N Bazarova. Accountability and empathy by design: Encouraging bystander intervention to cyberbullying on social media.Proceedings of the ACM on Human-Computer Interaction, 3 (CSCW):1–26, 2019
2019
-
[48]
Simulatingcooperativeprosocialbehaviorwithmulti-agent llms: Evidence and mechanisms for ai agents to inform policy decisions
KarthikSreedhar,AliceCai,JennyMa,JeffreyVNickerson,andLydiaBChilton. Simulatingcooperativeprosocialbehaviorwithmulti-agent llms: Evidence and mechanisms for ai agents to inform policy decisions. InProceedings of the 30th International Conference on Intelligent User Interfaces, pages 1272–1286, 2025
2025
-
[49]
Social simulacra: Creating populated prototypes for social computing systems
Joon Sung Park, Lindsay Popowski, Carrie Cai, Meredith Ringel Morris, Percy Liang, and Michael S Bernstein. Social simulacra: Creating populated prototypes for social computing systems. InProceedings of the 35th Annual ACM Symposium on User Interface Software and Technology, pages 1–18, 2022
2022
-
[50]
XinyiMou,ZhongyuWei,andXuanjingHuang. Unveilingthetruthandfacilitatingchange:Towardsagent-basedlarge-scalesocialmovement simulation.InLun-WeiKu,AndreMartins,andVivekSrikumar,editors,FindingsoftheAssociationforComputationalLinguistics:ACL2024, pages 4789–4809, Bangkok, Thailand, August 2024. Association for Computational Linguistics. doi: 10.18653/v1/2024....
-
[51]
Sotopia:Interactiveevaluationforsocialintelligenceinlanguageagents
Xuhui Zhou, Hao Zhu, Leena Mathur, Ruohong Zhang, Haofei Yu, Zhengyang Qi, Louis-Philippe Morency, Yonatan Bisk, Daniel Fried, GrahamNeubig,etal. Sotopia:Interactiveevaluationforsocialintelligenceinlanguageagents. InSecondAgentLearninginOpen-Endedness Workshop
-
[52]
S3:Social-networksimulation system with large language model-empowered agents.Available at SSRN 4607026, 2023
ChenGao,XiaochongLan,ZhihongLu,JinzhuMao,JinghuaPiao,HuandongWang,DepengJin,andYongLi. S3:Social-networksimulation system with large language model-empowered agents.Available at SSRN 4607026, 2023
2023
-
[53]
The truman platform: Social media simulation for experimental research
Dominic DiFranzo and Natalie Bazarova. The truman platform: Social media simulation for experimental research. InICSWM Workshop on Bridging the Lab and the Field, 2018. URLhttps://socialmedialab.cornell.edu/the-truman-platform
2018
-
[54]
High school students’ perceptions of motivations for cyberbullying: An exploratory study.Western Journal of Emergency Medicine, 11(3):269, 2010
Kris Varjas, Jasmaine Talley, Joel Meyers, Leandra Parris, and Hayley Cutts. High school students’ perceptions of motivations for cyberbullying: An exploratory study.Western Journal of Emergency Medicine, 11(3):269, 2010
2010
-
[55]
Do they truly intend to harm their friends?: the motives beyond cyberbullying among university students
Budianto Hamuddin, Syahdan Syahdan, Fathu Rahman, Dian Rianita, and Tatum Derin. Do they truly intend to harm their friends?: the motives beyond cyberbullying among university students. InResearch Anthology on Combating Cyber-Aggression and Online Negativity, pages 775–788. IGI Global Scientific Publishing, 2022
2022
-
[56]
An exploration of the reasons why adolescents engage in traditional and cyber bullying.Journal of Educational Sciences and Psychology, 1(2):101–109, 2011
Courtney Wilton and Marilyn Campbell. An exploration of the reasons why adolescents engage in traditional and cyber bullying.Journal of Educational Sciences and Psychology, 1(2):101–109, 2011
2011
-
[57]
John Wiley & Sons, 2006
Susan Lipkins.Preventing hazing: How parents, teachers, and coaches can stop the violence, harassment, and humiliation. John Wiley & Sons, 2006
2006
-
[58]
Springer InternationalPublishing,Cham,2019
PaulR.SmokowskiandCarolineB.R.Evans.BullyinginYoungAdulthood:CollegeHazingasaFormofBullying,pages151–166. Springer InternationalPublishing,Cham,2019. ISBN978-3-030-20293-4. doi:10.1007/978-3-030-20293-4_7. URLhttps://doi.org/10.1007/ 978-3-030-20293-4_7
-
[59]
Bully/victim problems among middle school children.British journal of educational psychology, 62(1):73–87, 1992
Michael J Boulton and Kerry Underwood. Bully/victim problems among middle school children.British journal of educational psychology, 62(1):73–87, 1992
1992
-
[60]
The assessment of cyberstalking: An expanded examination including social networking, attachment, jealousy, and anger in relation to violence and abuse
Jenna Strawhun, Natasha Adams, and Matthew T Huss. The assessment of cyberstalking: An expanded examination including social networking, attachment, jealousy, and anger in relation to violence and abuse. 2013
2013
-
[61]
The doxing dilemma: seeking a remedy for the malicious publication of personal information.Fordham L
Julia M MacAllister. The doxing dilemma: seeking a remedy for the malicious publication of personal information.Fordham L. Rev., 85: 2451, 2016
2016
-
[62]
Doxing and doxees: a qualitative analysis of victim experiences and responses
Anjuli Franz and Jason Bennett Thatcher. Doxing and doxees: a qualitative analysis of victim experiences and responses. 2023
2023
-
[63]
Beyond the five-user assumption: Benefits of increased sample sizes in usability testing.Behavior Research Methods, Instruments, & Computers, 35:379–383, 2003
Laura Faulkner. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing.Behavior Research Methods, Instruments, & Computers, 35:379–383, 2003
2003
-
[64]
Morgan Kaufmann, 2016
Jeff Sauro and James R Lewis.Quantifying the user experience: Practical statistics for user research. Morgan Kaufmann, 2016
2016
-
[65]
QianYang,JustinCranshaw,SaleemaAmershi,ShamsiT.Iqbal,andJaimeTeevan. Sketchingnlp:Acasestudyofexploringtherightthingsto designwithlanguageintelligence.InProceedingsofthe2019CHIConferenceonHumanFactorsinComputingSystems,page1–12,NewYork, NY, USA, 2019. Association for Computing Machinery. ISBN 9781450359702. URLhttps://doi.org/10.1145/3290605.3300415
-
[66]
Using affinity diagrams to evaluate interactive prototypes
Andrés Lucero. Using affinity diagrams to evaluate interactive prototypes. InHuman-Computer Interaction–INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part II 15, pages 231–248. Springer, 2015
2015
-
[67]
Gunnar Harboe and Elaine M. Huang. Real-world affinity diagramming practices: Bridging the paper-digital gap. InProceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI ’15, page 95–104, New York, NY, USA, 2015. Association for Computing Machinery. ISBN 9781450331456. doi: 10.1145/2702123.2702561. URLhttps://doi.org/10.1145...
-
[68]
Using thematic analysis in psychology.Qualitative research in psychology, 3(2):77–101, 2006
Virginia Braun and Victoria Clarke. Using thematic analysis in psychology.Qualitative research in psychology, 3(2):77–101, 2006
2006
-
[69]
Bystanding or standing by? how the number of bystanders affects the intention to intervene in cyberbullying.New media & society, 18(8):1491–1507, 2016
Magdalena Obermaier, Nayla Fawzi, and Thomas Koch. Bystanding or standing by? how the number of bystanders affects the intention to intervene in cyberbullying.New media & society, 18(8):1491–1507, 2016
2016
-
[70]
Bystander intervention in cyberbullying.Communication Monographs, 83(1):94–119, 2016
Nicholas Brody and Anita L Vangelisti. Bystander intervention in cyberbullying.Communication Monographs, 83(1):94–119, 2016
2016
-
[71]
Unhookedbydesign:Scrollingmindfullyonsocialmediabyautomatingdigitalnudges
AdityaKumarPurohitandAdrianHolzer. Unhookedbydesign:Scrollingmindfullyonsocialmediabyautomatingdigitalnudges. InAMCIS, volume 21, pages 1–10, 2021
2021
-
[72]
The cost of interrupted work: more speed and stress
Gloria Mark, Daniela Gudith, and Ulrich Klocke. The cost of interrupted work: more speed and stress. InProceedings of the SIGCHI conference on Human Factors in Computing Systems, pages 107–110, 2008
2008
-
[73]
Sumeyye Taskin, Hacer Yildirim Kurtulus, Seydi Ahmet Satici, and M Engin Deniz. Doomscrolling and mental well-being in social media users: A serial mediation through mindfulness and secondary traumatic stress.Journal of Community Psychology, 52(3):512–524, 2024
2024
-
[74]
Identity-based motivation.Emerging trends in the social and behavioral sciences, 38:1–11, 2015
Daphna Oyserman. Identity-based motivation.Emerging trends in the social and behavioral sciences, 38:1–11, 2015
2015
-
[75]
Talia Wise, Yuewen Yang, Ryun Shim, Kevin Chuan-Kai Chang, Judeth Oden Choi, and Qian Yang. Investigating how emerging adults exploreidentitythroughwriting:Opportunitiesforaiwritingassistantstohelp. page2270–2282,2025. doi:10.1145/3715336.3735848. URL https://doi.org/10.1145/3715336.3735848
-
[76]
Habit and identity: Behavioral, cognitive, affective, and motivational facets of an integrated self.Frontiers in psychology, 10:1504, 2019
Bas Verplanken and Jie Sui. Habit and identity: Behavioral, cognitive, affective, and motivational facets of an integrated self.Frontiers in psychology, 10:1504, 2019
2019
-
[77]
TaoLong,SitongWang,ÉmilieFabre,TonyWang,AnupSathya,JasonWu,SavvasDimitriosPetridis,DingLi,TuhinChakrabarty,YueJiang, Jingyi Li, Tiffany Tseng, Ken Nakagaki, Qian Yang, Nikolas Martelaro, Jeffrey V Nickerson, and Lydia B Chilton. Facilitating longitudinal interactionstudiesofaisystems.InAdjunctProceedingsofthe38thAnnualACMSymposiumonUserInterfaceSoftwarean...
-
[78]
Doxing:Whatadolescentslookforandtheirintentions.Internationaljournal of environmental research and public health, 16(2):218, 2019
MengtongChen,AnneShannYueCheung,andKoLingChan. Doxing:Whatadolescentslookforandtheirintentions.Internationaljournal of environmental research and public health, 16(2):218, 2019
2019
-
[79]
Motives behind cyberbullying perpetration: A test of uses and gratifications theory.Journal of interpersonal Violence, 36(13-14):NP6699–NP6724, 2021
Ibrahim Tanrikulu and Özgür Erdur-Baker. Motives behind cyberbullying perpetration: A test of uses and gratifications theory.Journal of interpersonal Violence, 36(13-14):NP6699–NP6724, 2021. :Preprint submitted to Elsevier Page 23 of 24
2021
-
[80]
How doxing on social media leads to social stigma and perceived dignity
Guohou Shan, Wenxi Pu, Jason Bennet Thatcher, and Philip Roth. How doxing on social media leads to social stigma and perceived dignity. 2024
2024
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.