pith. machine review for the scientific record. sign in

arxiv: 2605.03287 · v1 · submitted 2026-05-05 · 💻 cs.HC · cs.CY

Recognition: unknown

Attention: What Prevents Young Adults from Speaking Up Against Cyberbullying in an LLM-Powered Social Media Simulation

Amy Li, Elaine Tsai, Jessie Jia, Nader Akoury, Natalie N. Bazarova, Qian Yang

Authors on Pith no claims yet

Pith reviewed 2026-05-07 15:22 UTC · model grok-4.3

classification 💻 cs.HC cs.CY
keywords cyberbullyingbystander interventionLLM simulationattention shiftsyoung adultssocial mediapublic norm-settingupstander identity
0
0 comments X

The pith

Young adults speak up against cyberbullying in an LLM simulation only after making three specific attention shifts.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper tests whether an interactive multi-agent LLM simulation can help young adults practice public intervention in cyberbullying, a situation complicated by audience dynamics and social risks. Researchers built Upstanders' Practicum and let 34 participants engage freely across refined versions of the tool. They observed that the simulation produced useful practice only once users completed three attention shifts: moving from ignoring the situation to genuine focus, from self-oriented thoughts to concern for the people directly involved, and from trying to fix the private bully-victim conflict to treating the response as public norm-setting. After these changes, participants identified reasons to comment publicly and developed tactful messages through repeated practice alone. The work points to design directions for bystander training that target attention patterns and identity rather than isolated social skills.

Core claim

Practicing public bystander intervention in the LLM-powered simulation helped participants only after they completed three attention shifts: from inattention to paying true attention, from self-focus to attending to those directly involved, and from resolving the private bully-victim conflict to addressing the broader online audience for norm-setting. Only then did users see a reason to speak up publicly and, through continued practice, craft tactful public messages without explicit instruction.

What carries the argument

The three attention shifts observed during free practice in Upstanders' Practicum, the multi-LLM-agent social media simulation, which transform user engagement from private or self-focused responses to public norm-setting actions.

If this is right

  • Participants recognize public comments as a tool for setting online norms rather than only resolving private conflicts.
  • Continued practice after the shifts allows users to produce tactful intervention messages without receiving direct instructions.
  • Bystander education can be redesigned around supporting true attention, building a vocal upstander identity, and framing intervention as public norm-setting.
  • The open-sourced multi-agent platform enables further experiments on cyberbullying response and other social media scenarios.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The same attention-shift sequence could apply to training for other online social challenges such as responding to misinformation or workplace microaggressions.
  • Designers of real social media platforms might add lightweight prompts that guide users through similar attention refocusing before suggesting intervention options.
  • If the shifts prove sufficient, scalable simulation practice could reduce reliance on real-world exposure for developing intervention habits.

Load-bearing premise

That the three attention shifts are causally necessary for any benefits to transfer from the simulation to real-world public intervention and that the LLM-generated social dynamics are realistic enough for that transfer to occur.

What would settle it

A follow-up study in which participants who completed the three attention shifts in the simulation show no increase in real-world public intervention rates compared with those who practiced without completing the shifts, or in which the simulation's generated interactions are shown to differ markedly from actual social media logs.

read the original abstract

Interactive, multi-agent social simulation systems have shown promise for helping users practice navigating various complex social situations across domains. This paper asks: To what extent can such systems help young adult (YA) bystanders speak up publicly against cyberbullying, a task often thwarted by complex, multi-party social dynamics? We created Upstanders' Practicum, a multi-AI-agent social media simulation powered by Large Language Models (LLMs), as a probe and observed 34 YAs freely practicing public bystander intervention across three iteratively refined versions. We found that practicing public bystander intervention in the simulation was helpful, but after participants made three attention shifts: (1) from inattention to paying true attention, (2) from self-focus ("I don't usually do this'') to attending to those directly involved, and (3) from resolving the private conflict between bully and victim ("maybe I could set up the meeting between them'') to addressing the broader audience online ("public comment is about norm-setting"). Only after these shifts did practice in the simulation start to help: participants then saw a reason to speak up publicly and, through continued practice, crafted tactful public messages without explicit instruction. These findings illuminate new design and research opportunities for bystander education beyond social skill instruction, namely, designing for true attention, for fostering a vocal upstander identity, and for seeing bystander intervention as public norm setting. In addition, we open-source Truman Agents (cornell-design-aigroup.github.io/TrumanAgents/), the first-of-its-kind multi-LLM-agent social media simulation platform that Upstanders' Practicum builds upon, for future cyberbullying and social media research.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

3 major / 2 minor

Summary. The paper introduces Upstanders' Practicum, an LLM-powered multi-agent social media simulation for young adults to practice public bystander intervention against cyberbullying. Based on qualitative observations of 34 participants across three iteratively refined versions, it identifies three attention shifts required for the practice to become helpful: (1) from inattention to paying true attention, (2) from self-focus to attending to those directly involved, and (3) from resolving private bully-victim conflicts to addressing the broader online audience for norm-setting. The work also open-sources the Truman Agents platform as a reusable multi-LLM-agent social media simulation tool.

Significance. If the attention-shift findings hold under further scrutiny, the paper advances HCI research on AI-supported social skill practice by emphasizing attentional and identity factors over pure skill instruction in bystander education. The open-sourcing of Truman Agents is a notable strength, supplying a concrete, extensible platform for future studies on cyberbullying dynamics and multi-agent simulations that supports reproducibility and extension by other researchers.

major comments (3)
  1. [Abstract] Abstract: The central claim that 'practicing public bystander intervention in the simulation was helpful, but after participants made three attention shifts' and 'Only after these shifts did practice in the simulation start to help' is load-bearing for the contribution yet rests on post-hoc qualitative interpretation of 34 participants without quantitative pre/post measures of intervention skill, control conditions, or external validation of transfer to real-world behavior.
  2. [Results] Results (attention shifts section): The three shifts are presented as necessary preconditions, but the manuscript provides no details on systematic coding, inter-rater reliability, or how alternative interpretations were ruled out, leaving the necessity claim dependent on interpretive analysis alone.
  3. [Discussion] Discussion: The design implications for 'true attention, fostering a vocal upstander identity, and seeing bystander intervention as public norm setting' follow directly from the shifts but are not tested against established social psychology findings on bystander intervention or compared to non-LLM simulation baselines, weakening claims about unique value of the LLM-powered environment.
minor comments (2)
  1. [Title] The title emphasizes barriers to speaking up while the findings focus on enabling shifts; a minor rephrasing could better reflect the positive design opportunities identified.
  2. [Introduction] The Truman Agents open-source link is given but would benefit from a one-sentence architectural summary in the introduction to help readers unfamiliar with multi-agent LLM systems.

Simulated Author's Rebuttal

3 responses · 1 unresolved

We thank the referee for their constructive and detailed feedback. We address each major comment below, clarifying the exploratory qualitative nature of the study while outlining specific revisions to improve transparency, methodological detail, and contextualization of findings.

read point-by-point responses
  1. Referee: [Abstract] Abstract: The central claim that 'practicing public bystander intervention in the simulation was helpful, but after participants made three attention shifts' and 'Only after these shifts did practice in the simulation start to help' is load-bearing for the contribution yet rests on post-hoc qualitative interpretation of 34 participants without quantitative pre/post measures of intervention skill, control conditions, or external validation of transfer to real-world behavior.

    Authors: We acknowledge that the study is exploratory and qualitative, relying on thematic patterns from participant reflections and behaviors rather than controlled quantitative measures. The design used the simulation as a probe to surface how attention shifts emerged during free practice, not as an efficacy trial. In revision, we will rephrase the abstract to state that the shifts were observed as recurring patterns associated with participants finding the practice helpful, and we will add an explicit Limitations section noting the absence of pre/post skill assessments, control conditions, and real-world transfer validation, while calling for future experimental work to address these. revision: partial

  2. Referee: [Results] Results (attention shifts section): The three shifts are presented as necessary preconditions, but the manuscript provides no details on systematic coding, inter-rater reliability, or how alternative interpretations were ruled out, leaving the necessity claim dependent on interpretive analysis alone.

    Authors: We agree that the analysis process requires more detail. The shifts were derived from iterative thematic analysis of interview transcripts and simulation logs across the 34 participants. In the revised manuscript, we will add a Methods subsection describing the analysis: open coding by multiple researchers, iterative theme refinement through team discussions, and identification of the three shifts as cross-participant patterns. We will also revise language from 'necessary preconditions' to 'observed patterns linked to helpful engagement' and discuss steps taken for analytical rigor, such as memoing and consensus, while noting the interpretive approach as a limitation. revision: yes

  3. Referee: [Discussion] Discussion: The design implications for 'true attention, fostering a vocal upstander identity, and seeing bystander intervention as public norm setting' follow directly from the shifts but are not tested against established social psychology findings on bystander intervention or compared to non-LLM simulation baselines, weakening claims about unique value of the LLM-powered environment.

    Authors: We will expand the Discussion to explicitly connect the attention shifts to established bystander intervention literature, including Latané and Darley's work on the bystander effect and recent studies on online intervention. We will also clarify how the multi-agent LLM simulation enables dynamic, multi-party interactions not easily replicable in non-AI role-play. The design implications will be framed as hypotheses emerging from observations rather than validated outcomes, with explicit statements that direct comparisons to traditional baselines and tests of unique LLM value are left for future research. revision: partial

standing simulated objections not resolved
  • The absence of quantitative pre/post measures, control conditions, and external validation of real-world transfer, which would require a separate controlled experimental study beyond the scope of this exploratory qualitative investigation.

Circularity Check

0 steps flagged

No circularity: qualitative observations derive directly from participant data without reduction to inputs or self-referential definitions

full rationale

The paper reports observational findings from 34 participants freely practicing in an LLM-powered simulation. The three attention shifts are identified post-hoc from user statements and behaviors in the study sessions, then interpreted as enabling the observed benefits. No equations, fitted parameters, predictions, or derivations exist that could reduce to the inputs by construction. No self-citations are invoked as load-bearing uniqueness theorems or ansatzes. The central claim remains an interpretive summary of the collected qualitative data rather than a self-defined or statistically forced result.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 2 invented entities

The central claim rests on the assumption that LLM agents produce realistic enough social dynamics for valid practice and that observed behavioral changes in the simulation reflect meaningful shifts applicable beyond the study. No quantitative free parameters are involved.

axioms (1)
  • domain assumption Multi-agent LLM simulations can generate sufficiently realistic cyberbullying and social media interaction scenarios to serve as effective practice environments for bystander intervention.
    Invoked to justify using the simulation as a probe for real-world behavior change.
invented entities (2)
  • Upstanders' Practicum no independent evidence
    purpose: Multi-AI-agent social media simulation for practicing public bystander intervention against cyberbullying.
    New system created and iteratively refined for this study.
  • Truman Agents no independent evidence
    purpose: First-of-its-kind multi-LLM-agent social media simulation platform.
    Open-sourced platform introduced to support this and future research.

pith-pipeline@v0.9.0 · 5616 in / 1484 out tokens · 74247 ms · 2026-05-07T15:22:56.981085+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

81 extracted references · 13 canonical work pages · 1 internal anchor

  1. [1]

    Maeve Duggan. 1. experiencing online harassment, Dec 2019. URLhttps://www.pewresearch.org/internet/2017/07/11/ experiencing-online-harassment/

  2. [2]

    Tointerveneornottointervene:Youngadults’views on when and how to intervene in online harassment.Journal of Computer-Mediated Communication, 28(5):zmad027, 2023

    AnnaDavidovic,CatherineTalbot,CatherineHamilton-Giachritsis,andAdamJoinson. Tointerveneornottointervene:Youngadults’views on when and how to intervene in online harassment.Journal of Computer-Mediated Communication, 28(5):zmad027, 2023

  3. [3]

    Factors influencing bystanders’ behavioral reactions in cyberbullying situations.Computers in Human Behavior, 78:273–282, 2018

    Jiyeon Song and Insoo Oh. Factors influencing bystanders’ behavioral reactions in cyberbullying situations.Computers in Human Behavior, 78:273–282, 2018

  4. [4]

    Impact and dynamics of hate and counter speech online.EPJ data science, 11(1):3, 2022

    Joshua Garland, Keyan Ghazi-Zahedi, Jean-Gabriel Young, Laurent Hébert-Dufresne, and Mirta Galesic. Impact and dynamics of hate and counter speech online.EPJ data science, 11(1):3, 2022

  5. [5]

    Naturalisticobservationsofpeerinterventionsinbullyingamongelementaryschoolchildren.Manuscript submitted for publication, 1998

    LHawkins,DPepler,andWCraig. Naturalisticobservationsofpeerinterventionsinbullyingamongelementaryschoolchildren.Manuscript submitted for publication, 1998

  6. [6]

    Understanding the bystander effect on toxic twitter conversations,

    Ana Aleksandric, Mohit Singhal, Anne Groggel, and Shirin Nilizadeh. Understanding the bystander effect on toxic twitter conversations,

  7. [7]

    URLhttps://arxiv.org/abs/2211.10764

  8. [8]

    Upstanding by design: Bystander intervention in cyberbullying

    Dominic DiFranzo, Samuel Hardman Taylor, Franccesca Kazerooni, Olivia D Wherry, and Natalya N Bazarova. Upstanding by design: Bystander intervention in cyberbullying. InProceedings of the 2018 CHI conference on human factors in computing systems, pages 1–12, 2018

  9. [9]

    Norm perception as a vehicle for social change.Social issues and policy review, 10(1): 181–211, 2016

    Margaret E Tankard and Elizabeth Levy Paluck. Norm perception as a vehicle for social change.Social issues and policy review, 10(1): 181–211, 2016

  10. [10]

    A systematic literature review of factors that moderate bystanders’ actions in cyberbullying.Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 12(4), 2018

    Fernando Domínguez-Hernández, Lars Bonell, and Alejandro Martínez-González. A systematic literature review of factors that moderate bystanders’ actions in cyberbullying.Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 12(4), 2018

  11. [11]

    Sensemaking, support, safety, retribution, transformation: A restorative justice approach to understanding adolescents’ needs for addressing online harm

    Sijia Xiao, Coye Cheshire, and Niloufar Salehi. Sensemaking, support, safety, retribution, transformation: A restorative justice approach to understanding adolescents’ needs for addressing online harm. InProceedings of the 2022 CHI Conference on Human Factors in Computing Systems,CHI’22,NewYork,NY,USA,2022.AssociationforComputingMachinery. ISBN97814503915...

  12. [12]

    Understandingandaddressingteachershortagesintheunitedstates.TheHamiltonProject,5:1–28,2017

    ThomasSDeeandDanGoldhaber. Understandingandaddressingteachershortagesintheunitedstates.TheHamiltonProject,5:1–28,2017

  13. [13]

    Department of Education

    U.S. Department of Education. Teacher Shortage Areas, 2023. URLhttps://tsa.ed.gov

  14. [14]

    Social skill training with large language models.arXiv preprint arXiv:2404.04204, 2024

    Diyi Yang, Caleb Ziems, William Held, Omar Shaikh, Michael S Bernstein, and John Mitchell. Social skill training with large language models.arXiv preprint arXiv:2404.04204, 2024

  15. [15]

    Constructing learning environments for complex social skills.The Journal of the Learning Sciences, 3(4):387–427, 1994

    Alex Kass, Robin Burke, Eli Blevis, and Mary Williamson. Constructing learning environments for complex social skills.The Journal of the Learning Sciences, 3(4):387–427, 1994

  16. [16]

    Multidisciplinary approaches to research on bullying in adolescence.Adolescent research review, 2(1):1–10, 2017

    Melissa K Holt, Jennifer Greif Green, Mina Tsay-Vogel, Joanna Davidson, and Claire Brown. Multidisciplinary approaches to research on bullying in adolescence.Adolescent research review, 2(1):1–10, 2017

  17. [17]

    Bernstein

    Omar Shaikh, Valentino Emil Chai, Michele Gelfand, Diyi Yang, and Michael S. Bernstein. Rehearsal: Simulating conflict to teach conflict resolution. InProceedings of the 2024 CHI Conference on Human Factors in Computing Systems, CHI ’24, New York, NY, USA, 2024. Association for Computing Machinery. ISBN 9798400703300. doi: 10.1145/3613904.3642159. URLhttp...

  18. [18]

    Agora:Teachingtheskillofconsensus-finding with ai personas grounded in human voice

    SuyashPradeepFulay,PrernaRavi,OmGokhale,EugeneYi,MichielABakker,andDebRoy. Agora:Teachingtheskillofconsensus-finding with ai personas grounded in human voice. InProceedings of the Extended Abstracts of the 2026 CHI Conference on Human Factors in Computing Systems, pages 1–6, 2026

  19. [19]

    An llm-guided tutoring system for social skills training

    Michael Guevarra, Indronil Bhattacharjee, Srijita Das, Christabel Wayllace, Carrie Demmans Epp, Matthew E Taylor, and Alan Tay. An llm-guided tutoring system for social skills training. InProceedings of the AAAI Conference on Artificial Intelligence, volume 39, pages 29643–29645, 2025

  20. [20]

    Roleplay-doh:Enablingdomain-expertstocreate llm-simulated patients via eliciting and adhering to principles

    RyanLouie,AnanjanNandi,WilliamFang,ChengChang,EmmaBrunskill,andDiyiYang. Roleplay-doh:Enablingdomain-expertstocreate llm-simulated patients via eliciting and adhering to principles. InProceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, pages 10570–10603, 2024

  21. [21]

    Erin A Casey, Taryn Lindhorst, and Heather L Storer. The situational-cognitive model of adolescent bystander behavior: Modeling bystander decision-making in the context of bullying and teen dating violence.Psychology of violence, 7(1):33, 2017

  22. [22]

    Bystander intervention in bullying: Role of social skills and gender.The Journal of Early Adolescence, 39(2):141–166, 2019

    Lyndsay N Jenkins and Amanda B Nickerson. Bystander intervention in bullying: Role of social skills and gender.The Journal of Early Adolescence, 39(2):141–166, 2019

  23. [23]

    Bystanders in bullying: Do tom and social competence skills play a role.Journal of educational and developmental psychology, 8(2):174–174, 2018

    Panayiota Metallidou, Magdalini Baxevani, and Grigoris Kiosseoglou. Bystanders in bullying: Do tom and social competence skills play a role.Journal of educational and developmental psychology, 8(2):174–174, 2018. :Preprint submitted to Elsevier Page 21 of 24

  24. [24]

    Collegestudents’perceptionsofbarrierstobystanderintervention.Journalofinterpersonalviolence,35(15-16): 2971–2992, 2020

    KristenYuleandJohnGrych. Collegestudents’perceptionsofbarrierstobystanderintervention.Journalofinterpersonalviolence,35(15-16): 2971–2992, 2020

  25. [25]

    Teens and cyberbullying 2022.Pew Research Center, 2022

    Emily Vogels. Teens and cyberbullying 2022.Pew Research Center, 2022

  26. [26]

    Reportonindicatorsofschoolcrimeandsafety:2020,2021

    VéroniqueIrwin,KeWang,JiashanCui,JizhiZhang,andAlexandraThompson. Reportonindicatorsofschoolcrimeandsafety:2020,2021. URLhttps://nces.ed.gov/pubsearch/pubsinfo.asp?pubid=2021092

  27. [27]

    Cyberbullying among young users of social networks.Journal of Modern Foreign Psychology, 8(3):53–59, 2019

    DV Kiriukhina. Cyberbullying among young users of social networks.Journal of Modern Foreign Psychology, 8(3):53–59, 2019

  28. [28]

    Cyber bullying in adhd and asperger syndrome populations.Research in Autism Spectrum Disorders, 5(3):1201–1208, 2011

    Robin M Kowalski and Cristin Fedina. Cyber bullying in adhd and asperger syndrome populations.Research in Autism Spectrum Disorders, 5(3):1201–1208, 2011

  29. [29]

    Katja Machmutow, Sonja Perren, Fabio Sticca, and Francoise D Alsaker. Peer victimisation and depressive symptoms: Can specific coping strategies buffer the negative impact of cybervictimisation?Emotional and Behavioural Difficulties, 17(3-4):403–420, 2012

  30. [30]

    Cyberbullying: Experiences, impacts and coping strategies as described by australian young people.Youth studies australia, 29(2):51–59, 2010

    Megan Price and John Dalgleish. Cyberbullying: Experiences, impacts and coping strategies as described by australian young people.Youth studies australia, 29(2):51–59, 2010

  31. [31]

    Cyberbullying,schoolbullying,andpsychologicaldistress:A regional census of high school students.American journal of public health, 102(1):171–177, 2012

    ShariKesselSchneider,LydiaO’donnell,AnnStueve,andRobertWSCoulter. Cyberbullying,schoolbullying,andpsychologicaldistress:A regional census of high school students.American journal of public health, 102(1):171–177, 2012

  32. [32]

    Americans’socialmediause2025,November2025

    PewResearchCenter. Americans’socialmediause2025,November2025. URLhttps://www.pewresearch.org/internet/2025/11/ 20/americans-social-media-use-2025/. Accessed May 2, 2026

  33. [33]

    Law, Jennifer D

    Danielle M. Law, Jennifer D. Shapka, Shelley Hymel, Brent F. Olson, and Terry Waterhouse. The changing face of bullying: An empirical comparison between traditional and internet bullying and victimization.Computers in Human Behavior, 28(1):226–232, 2012. ISSN 0747-5632. doi: https://doi.org/10.1016/j.chb.2011.09.004. URLhttps://www.sciencedirect.com/scien...

  34. [34]

    Cyber-bystanding in context: A review of the literature on witnesses’ responses to cyberbullying

    Kimberley R Allison and Kay Bussey. Cyber-bystanding in context: A review of the literature on witnesses’ responses to cyberbullying. Children and Youth Services Review, 65:183–194, 2016

  35. [35]

    Bullies and bystanders

    Nina A Beckford. Bullies and bystanders. Master’s thesis, University of Toledo, 2015

  36. [36]

    ‘can i afford to help?’how affordances of communication modalities guide bystanders’ helping intentions towards harassment on social network sites

    Sara Bastiaensens, Heidi Vandebosch, Karolien Poels, Katrien Van Cleemput, Ann DeSmet, and Ilse De Bourdeaudhuij. ‘can i afford to help?’how affordances of communication modalities guide bystanders’ helping intentions towards harassment on social network sites. Behaviour & Information Technology, 34(4):425–435, 2015

  37. [37]

    Bibb Latané and John M Darley.The unresponsive bystander: Why doesn’t he help?Prentice Hall, 1970

  38. [38]

    Bystander intervention in emergencies: diffusion of responsibility.Journal of personality and social psychology, 8(4p1):377, 1968

    John M Darley and Bibb Latané. Bystander intervention in emergencies: diffusion of responsibility.Journal of personality and social psychology, 8(4p1):377, 1968

  39. [39]

    AidaMidgett,DianaMDoumas,AprilJohnston,RhiannonTrull,andRaissaMiller.Rethinkingbullyinginterventionsforhighschoolstudents: A qualitative study.Journal of Child and Adolescent Counseling, 4(2):146–163, 2018

  40. [40]

    Cyberbullyingmitigationbyaproxy persuasion of a chat member hijacked by a chatbot

    TomoyukiUeda,JunyaNakanishi,ItaruKuramoto,JunBaba,YuichiroYoshikawa,andHiroshiIshiguro. Cyberbullyingmitigationbyaproxy persuasion of a chat member hijacked by a chatbot. InProceedings of the 9th International Conference on Human-Agent Interaction, pages 202–208, 2021

  41. [41]

    Fearnot! an experiment in emergent narrative

    Ruth S Aylett, Sandy Louchart, Joao Dias, Ana Paiva, and Marco Vala. Fearnot! an experiment in emergent narrative. InInternational Workshop on Intelligent Virtual Agents, pages 305–316. Springer, 2005

  42. [42]

    Ann DeSmet, Sara Bastiaensens, Katrien Van Cleemput, Karolien Poels, Heidi Vandebosch, Gie Deboutte, Laura Herrewijn, Steven Malliet, Sara Pabian, Frederik Van Broeckhoven, et al. The efficacy of the friendly attac serious digital game to promote prosocial bystander behavior in cyberbullying among young adolescents: A cluster-randomized controlled trial.C...

  43. [43]

    Hedderich, Natalie N

    Michael A. Hedderich, Natalie N. Bazarova, Wenting Zou, Ryun Shim, Xinda Ma, and Qian Yang. A piece of theatre: Investigating how teachers design llm chatbots to assist adolescent cyberbullying education. InProceedings of the 2024 CHI Conference on Human Factors in Computing Systems, CHI ’24. Association for Computing Machinery, 2024. doi: 10.1145/3613904...

  44. [44]

    Achatbot-basedcoachinginterventionforadolescentstopromotelifeskills: pilot study.JMIR Human Factors, 7(1):e16762, 2020

    SilviaGabrielli,SilviaRizzi,SaraCarbone,ValeriaDonisi,etal. Achatbot-basedcoachinginterventionforadolescentstopromotelifeskills: pilot study.JMIR Human Factors, 7(1):e16762, 2020

  45. [45]

    Chatbots to support children in coping with online threats: Socio- technical requirements

    Lara Schibelsky Godoy Piccolo, Pinelopi Troullinou, and Harith Alani. Chatbots to support children in coping with online threats: Socio- technical requirements. InDesigning Interactive Systems Conference 2021, pages 1504–1517, 2021

  46. [46]

    Isabelle McLeod Daphnis, Ryun Shim, Natalie Bazarova, and Qian Yang

    Haesoo Kim, Nader Akoury, Julia A Sebastien, S. Isabelle McLeod Daphnis, Ryun Shim, Natalie Bazarova, and Qian Yang. Collaborative upstanding: Exploring conversational strategies for cyberbullying upstanding education. InProceedings of the 2026 CHI Conference on Human Factors in Computing Systems, CHI ’26, New York, NY, USA, 2026. Association for Computin...

  47. [47]

    Accountability and empathy by design: Encouraging bystander intervention to cyberbullying on social media.Proceedings of the ACM on Human-Computer Interaction, 3 (CSCW):1–26, 2019

    Samuel Hardman Taylor, Dominic DiFranzo, Yoon Hyung Choi, Shruti Sannon, and Natalya N Bazarova. Accountability and empathy by design: Encouraging bystander intervention to cyberbullying on social media.Proceedings of the ACM on Human-Computer Interaction, 3 (CSCW):1–26, 2019

  48. [48]

    Simulatingcooperativeprosocialbehaviorwithmulti-agent llms: Evidence and mechanisms for ai agents to inform policy decisions

    KarthikSreedhar,AliceCai,JennyMa,JeffreyVNickerson,andLydiaBChilton. Simulatingcooperativeprosocialbehaviorwithmulti-agent llms: Evidence and mechanisms for ai agents to inform policy decisions. InProceedings of the 30th International Conference on Intelligent User Interfaces, pages 1272–1286, 2025

  49. [49]

    Social simulacra: Creating populated prototypes for social computing systems

    Joon Sung Park, Lindsay Popowski, Carrie Cai, Meredith Ringel Morris, Percy Liang, and Michael S Bernstein. Social simulacra: Creating populated prototypes for social computing systems. InProceedings of the 35th Annual ACM Symposium on User Interface Software and Technology, pages 1–18, 2022

  50. [50]

    XinyiMou,ZhongyuWei,andXuanjingHuang. Unveilingthetruthandfacilitatingchange:Towardsagent-basedlarge-scalesocialmovement simulation.InLun-WeiKu,AndreMartins,andVivekSrikumar,editors,FindingsoftheAssociationforComputationalLinguistics:ACL2024, pages 4789–4809, Bangkok, Thailand, August 2024. Association for Computational Linguistics. doi: 10.18653/v1/2024....

  51. [51]

    Sotopia:Interactiveevaluationforsocialintelligenceinlanguageagents

    Xuhui Zhou, Hao Zhu, Leena Mathur, Ruohong Zhang, Haofei Yu, Zhengyang Qi, Louis-Philippe Morency, Yonatan Bisk, Daniel Fried, GrahamNeubig,etal. Sotopia:Interactiveevaluationforsocialintelligenceinlanguageagents. InSecondAgentLearninginOpen-Endedness Workshop

  52. [52]

    S3:Social-networksimulation system with large language model-empowered agents.Available at SSRN 4607026, 2023

    ChenGao,XiaochongLan,ZhihongLu,JinzhuMao,JinghuaPiao,HuandongWang,DepengJin,andYongLi. S3:Social-networksimulation system with large language model-empowered agents.Available at SSRN 4607026, 2023

  53. [53]

    The truman platform: Social media simulation for experimental research

    Dominic DiFranzo and Natalie Bazarova. The truman platform: Social media simulation for experimental research. InICSWM Workshop on Bridging the Lab and the Field, 2018. URLhttps://socialmedialab.cornell.edu/the-truman-platform

  54. [54]

    High school students’ perceptions of motivations for cyberbullying: An exploratory study.Western Journal of Emergency Medicine, 11(3):269, 2010

    Kris Varjas, Jasmaine Talley, Joel Meyers, Leandra Parris, and Hayley Cutts. High school students’ perceptions of motivations for cyberbullying: An exploratory study.Western Journal of Emergency Medicine, 11(3):269, 2010

  55. [55]

    Do they truly intend to harm their friends?: the motives beyond cyberbullying among university students

    Budianto Hamuddin, Syahdan Syahdan, Fathu Rahman, Dian Rianita, and Tatum Derin. Do they truly intend to harm their friends?: the motives beyond cyberbullying among university students. InResearch Anthology on Combating Cyber-Aggression and Online Negativity, pages 775–788. IGI Global Scientific Publishing, 2022

  56. [56]

    An exploration of the reasons why adolescents engage in traditional and cyber bullying.Journal of Educational Sciences and Psychology, 1(2):101–109, 2011

    Courtney Wilton and Marilyn Campbell. An exploration of the reasons why adolescents engage in traditional and cyber bullying.Journal of Educational Sciences and Psychology, 1(2):101–109, 2011

  57. [57]

    John Wiley & Sons, 2006

    Susan Lipkins.Preventing hazing: How parents, teachers, and coaches can stop the violence, harassment, and humiliation. John Wiley & Sons, 2006

  58. [58]

    Springer InternationalPublishing,Cham,2019

    PaulR.SmokowskiandCarolineB.R.Evans.BullyinginYoungAdulthood:CollegeHazingasaFormofBullying,pages151–166. Springer InternationalPublishing,Cham,2019. ISBN978-3-030-20293-4. doi:10.1007/978-3-030-20293-4_7. URLhttps://doi.org/10.1007/ 978-3-030-20293-4_7

  59. [59]

    Bully/victim problems among middle school children.British journal of educational psychology, 62(1):73–87, 1992

    Michael J Boulton and Kerry Underwood. Bully/victim problems among middle school children.British journal of educational psychology, 62(1):73–87, 1992

  60. [60]

    The assessment of cyberstalking: An expanded examination including social networking, attachment, jealousy, and anger in relation to violence and abuse

    Jenna Strawhun, Natasha Adams, and Matthew T Huss. The assessment of cyberstalking: An expanded examination including social networking, attachment, jealousy, and anger in relation to violence and abuse. 2013

  61. [61]

    The doxing dilemma: seeking a remedy for the malicious publication of personal information.Fordham L

    Julia M MacAllister. The doxing dilemma: seeking a remedy for the malicious publication of personal information.Fordham L. Rev., 85: 2451, 2016

  62. [62]

    Doxing and doxees: a qualitative analysis of victim experiences and responses

    Anjuli Franz and Jason Bennett Thatcher. Doxing and doxees: a qualitative analysis of victim experiences and responses. 2023

  63. [63]

    Beyond the five-user assumption: Benefits of increased sample sizes in usability testing.Behavior Research Methods, Instruments, & Computers, 35:379–383, 2003

    Laura Faulkner. Beyond the five-user assumption: Benefits of increased sample sizes in usability testing.Behavior Research Methods, Instruments, & Computers, 35:379–383, 2003

  64. [64]

    Morgan Kaufmann, 2016

    Jeff Sauro and James R Lewis.Quantifying the user experience: Practical statistics for user research. Morgan Kaufmann, 2016

  65. [65]

    QianYang,JustinCranshaw,SaleemaAmershi,ShamsiT.Iqbal,andJaimeTeevan. Sketchingnlp:Acasestudyofexploringtherightthingsto designwithlanguageintelligence.InProceedingsofthe2019CHIConferenceonHumanFactorsinComputingSystems,page1–12,NewYork, NY, USA, 2019. Association for Computing Machinery. ISBN 9781450359702. URLhttps://doi.org/10.1145/3290605.3300415

  66. [66]

    Using affinity diagrams to evaluate interactive prototypes

    Andrés Lucero. Using affinity diagrams to evaluate interactive prototypes. InHuman-Computer Interaction–INTERACT 2015: 15th IFIP TC 13 International Conference, Bamberg, Germany, September 14-18, 2015, Proceedings, Part II 15, pages 231–248. Springer, 2015

  67. [67]

    Gunnar Harboe and Elaine M. Huang. Real-world affinity diagramming practices: Bridging the paper-digital gap. InProceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI ’15, page 95–104, New York, NY, USA, 2015. Association for Computing Machinery. ISBN 9781450331456. doi: 10.1145/2702123.2702561. URLhttps://doi.org/10.1145...

  68. [68]

    Using thematic analysis in psychology.Qualitative research in psychology, 3(2):77–101, 2006

    Virginia Braun and Victoria Clarke. Using thematic analysis in psychology.Qualitative research in psychology, 3(2):77–101, 2006

  69. [69]

    Bystanding or standing by? how the number of bystanders affects the intention to intervene in cyberbullying.New media & society, 18(8):1491–1507, 2016

    Magdalena Obermaier, Nayla Fawzi, and Thomas Koch. Bystanding or standing by? how the number of bystanders affects the intention to intervene in cyberbullying.New media & society, 18(8):1491–1507, 2016

  70. [70]

    Bystander intervention in cyberbullying.Communication Monographs, 83(1):94–119, 2016

    Nicholas Brody and Anita L Vangelisti. Bystander intervention in cyberbullying.Communication Monographs, 83(1):94–119, 2016

  71. [71]

    Unhookedbydesign:Scrollingmindfullyonsocialmediabyautomatingdigitalnudges

    AdityaKumarPurohitandAdrianHolzer. Unhookedbydesign:Scrollingmindfullyonsocialmediabyautomatingdigitalnudges. InAMCIS, volume 21, pages 1–10, 2021

  72. [72]

    The cost of interrupted work: more speed and stress

    Gloria Mark, Daniela Gudith, and Ulrich Klocke. The cost of interrupted work: more speed and stress. InProceedings of the SIGCHI conference on Human Factors in Computing Systems, pages 107–110, 2008

  73. [73]

    Sumeyye Taskin, Hacer Yildirim Kurtulus, Seydi Ahmet Satici, and M Engin Deniz. Doomscrolling and mental well-being in social media users: A serial mediation through mindfulness and secondary traumatic stress.Journal of Community Psychology, 52(3):512–524, 2024

  74. [74]

    Identity-based motivation.Emerging trends in the social and behavioral sciences, 38:1–11, 2015

    Daphna Oyserman. Identity-based motivation.Emerging trends in the social and behavioral sciences, 38:1–11, 2015

  75. [75]

    Investigating how emerging adults exploreidentitythroughwriting:Opportunitiesforaiwritingassistantstohelp

    Talia Wise, Yuewen Yang, Ryun Shim, Kevin Chuan-Kai Chang, Judeth Oden Choi, and Qian Yang. Investigating how emerging adults exploreidentitythroughwriting:Opportunitiesforaiwritingassistantstohelp. page2270–2282,2025. doi:10.1145/3715336.3735848. URL https://doi.org/10.1145/3715336.3735848

  76. [76]

    Habit and identity: Behavioral, cognitive, affective, and motivational facets of an integrated self.Frontiers in psychology, 10:1504, 2019

    Bas Verplanken and Jie Sui. Habit and identity: Behavioral, cognitive, affective, and motivational facets of an integrated self.Frontiers in psychology, 10:1504, 2019

  77. [77]

    TaoLong,SitongWang,ÉmilieFabre,TonyWang,AnupSathya,JasonWu,SavvasDimitriosPetridis,DingLi,TuhinChakrabarty,YueJiang, Jingyi Li, Tiffany Tseng, Ken Nakagaki, Qian Yang, Nikolas Martelaro, Jeffrey V Nickerson, and Lydia B Chilton. Facilitating longitudinal interactionstudiesofaisystems.InAdjunctProceedingsofthe38thAnnualACMSymposiumonUserInterfaceSoftwarean...

  78. [78]

    Doxing:Whatadolescentslookforandtheirintentions.Internationaljournal of environmental research and public health, 16(2):218, 2019

    MengtongChen,AnneShannYueCheung,andKoLingChan. Doxing:Whatadolescentslookforandtheirintentions.Internationaljournal of environmental research and public health, 16(2):218, 2019

  79. [79]

    Motives behind cyberbullying perpetration: A test of uses and gratifications theory.Journal of interpersonal Violence, 36(13-14):NP6699–NP6724, 2021

    Ibrahim Tanrikulu and Özgür Erdur-Baker. Motives behind cyberbullying perpetration: A test of uses and gratifications theory.Journal of interpersonal Violence, 36(13-14):NP6699–NP6724, 2021. :Preprint submitted to Elsevier Page 23 of 24

  80. [80]

    How doxing on social media leads to social stigma and perceived dignity

    Guohou Shan, Wenxi Pu, Jason Bennet Thatcher, and Philip Roth. How doxing on social media leads to social stigma and perceived dignity. 2024

Showing first 80 references.