{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T09:53:15Z","timestamp":1776937995549,"version":"3.51.4"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031549748","type":"print"},{"value":"9783031549755","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54975-5_11","type":"book-chapter","created":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:07:02Z","timestamp":1710270422000},"page":"185-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Exploring the Dark Corners of Human-Chatbot Interactions: A Literature Review on Conversational Agent Abuse"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7835-2274","authenticated-orcid":false,"given":"Roberta","family":"De Cicco","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,13]]},"reference":[{"key":"11_CR1","first-page":"262","volume":"213","author":"A Bandura","year":"1969","unstructured":"Bandura, A.: Social-learning theory of identificatory processes. Handbook Socialization Theory Res. 213, 262 (1969)","journal-title":"Handbook Socialization Theory Res."},{"issue":"3","key":"11_CR2","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.intcom.2012.05.001","volume":"24","author":"S Brahnam","year":"2012","unstructured":"Brahnam, S., De Angeli, A.: Gender affordances of conversational agents. Interact. Comput. 24(3), 139\u2013153 (2012)","journal-title":"Interact. Comput."},{"issue":"3","key":"11_CR3","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.intcom.2008.02.001","volume":"20","author":"S Brahnam","year":"2008","unstructured":"Brahnam, S., De Angeli, A.: Special issue on the abuse and misuse of social agents. Interact. Comput. 20(3), 287\u2013291 (2008)","journal-title":"Interact. Comput."},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Brahnam, S., Weaver, M.: Re\/Framing virtual conversational partners: A feminist critique and tentative move towards a new design paradigm. In: Design, User Experience, and Usability: Users and Interactions: 4th International Conference, DUXU 2015, Held as Part of HCI International 2015, Los Angeles, CA, USA, 2\u20137 August\u00a0 2015, Proceedings, Part II 4, pp. 172\u2013183. Springer International Publishing (2015).\u00a0https:\/\/doi.org\/10.1007\/978-3-319-20898-5_17","DOI":"10.1007\/978-3-319-20898-5_17"},{"key":"11_CR5","unstructured":"Brahnam, S.: Strategies for handling customer abuse of ECAs.\u00a0Abuse: the darker side of human-computer interaction, pp. 62\u201367 (2005)"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Chin, H., Molefi, L.W., Yi, M.Y.: Empathy is all you need: How a conversational agent should respond to verbal abuse. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2020)","DOI":"10.1145\/3313831.3376461"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Chin, H., Yi, M.Y.: Should an agent be ignoring it? A study of verbal abuse types and conversational agents\u2019 response styles. In: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u20136 (2019)","DOI":"10.1145\/3290607.3312826"},{"issue":"12","key":"11_CR8","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1080\/10447318.2021.1987680","volume":"38","author":"H Chin","year":"2022","unstructured":"Chin, H., Yi, M.Y.: Voices that care differently: understanding the effectiveness of a conversational agent with an alternative empathy orientation and emotional expressivity in mitigating verbal abuse. Inter. J. Hum. Comput. Interact. 38(12), 1153\u20131167 (2022)","journal-title":"Inter. J. Hum. Comput. Interact."},{"issue":"3","key":"11_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jwb.2021.101194","volume":"56","author":"M Christofi","year":"2021","unstructured":"Christofi, M., Pereira, V., Vrontis, D., Tarba, S., Thrassou, A.: Agility and flexibility in international business research: a comprehensive review and future research directions. J. World Bus. 56(3), 101194 (2021)","journal-title":"J. World Bus."},{"issue":"3","key":"11_CR10","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1075\/is.9.3.07cre","volume":"9","author":"C Creed","year":"2008","unstructured":"Creed, C., Beale, R.: Abusive interactions with embodied agents. Interact. Stud. 9(3), 481\u2013503 (2008)","journal-title":"Interact. Stud."},{"key":"11_CR11","unstructured":"Curry, A.C., Rieser, V.: # MeToo Alexa: how conversational systems respond to sexual harassment. In: Proceedings of the Second ACL Workshop on Ethics in Natural Language Processing, pp. 7\u201314 (2018)"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Darling, K.: Extending legal protection to social robots: the effects of anthropomorphism, empathy, and violent behavior towards robotic objects. In: Calo, F.K. (eds.) Robot Law, Edward Elgar (2016)","DOI":"10.4337\/9781783476732.00017"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"De Angeli, A., Brahnam, S., Wallis, P., Dix, A.: Misuse and abuse of interactive technologies. In CHI 2006 Extended Abstracts on Human Factors in Computing Systems, pp. 1647\u20131650 (2006)","DOI":"10.1145\/1125451.1125753"},{"issue":"3","key":"11_CR14","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.intcom.2008.02.004","volume":"20","author":"A De Angeli","year":"2008","unstructured":"De Angeli, A., Brahnam, S.: I hate you! disinhibition with virtual partners. Interact. Comput. 20(3), 302\u2013310 (2008)","journal-title":"Interact. Comput."},{"key":"11_CR15","unstructured":"De Angeli, A., Brahnam, S.: Sex stereotypes and conversational agents. In: Proceedings of Gender and Interaction: Real and Virtual Women in a Male World, Venice, Italy (2006)"},{"key":"11_CR16","unstructured":"De Angeli, A., Carpenter, R.: Stupid computer! abuse and social identities. In: Proceedings of INTERACT 2005 workshop Abuse: The darker side of Human-Computer Interaction, vol.\u00a0 4, pp. 19\u201325 (2005)"},{"key":"11_CR17","unstructured":"De Angeli, A.: Ethical implications of verbal disinhibition with conversational agents.\u00a0PsychNology J. 7(1) (2009)"},{"issue":"3","key":"11_CR18","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.intcom.2008.02.003","volume":"20","author":"A Dix","year":"2008","unstructured":"Dix, A.: Response to Sometimes it\u2019s hard to be a robot: a call for action on the ethics of abusing artificial agents. Interact. Comput. 20(3), 334\u2013337 (2008)","journal-title":"Interact. Comput."},{"issue":"3","key":"11_CR19","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s11948-022-00376-3","volume":"28","author":"F Fossa","year":"2022","unstructured":"Fossa, F., Sucameli, I.: Gender bias and conversational agents: an ethical perspective on social robotics. Sci. Eng. Ethics 28(3), 23 (2022)","journal-title":"Sci. Eng. Ethics"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Gulz, A., Haake, M., Silvervarg, A., Sj\u00f6d\u00e9n, B., Veletsianos, G.: Building a social conversational pedagogical agent: Design challenges and methodological approaches. In: Conversational Agents and Natural Language Interaction: Techniques and Effective Practices, pp. 128\u2013155. IGI Global (2011)","DOI":"10.4018\/978-1-60960-617-6.ch006"},{"key":"11_CR21","unstructured":"Hern, A.: Apple made Siri deflect questions on feminism, leaked papers reveal (2010).\u00a0\u00a0https:\/\/www.theguardian.com\/technology\/2019\/sep\/06\/apple-rewrote-siri-to-deflect-questions-about-feminism(Accessed 26 August 2023)\u00a0"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Hill, J., Ford, W.R. farreras, I G.: Real conversations with artificial intelligence: A comparison between human-human online conversations and human-chatbot conversations. Comput. Hum. Behav. 49, 245\u2013250 (2015)","DOI":"10.1016\/j.chb.2015.02.026"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.chb.2019.09.003","volume":"102","author":"Z Hilvert-Bruce","year":"2020","unstructured":"Hilvert-Bruce, Z., Neill, J.T.: I\u2019m just trolling: the role of normative beliefs in aggressive behaviour in online gaming. Comput. Hum. Behav. 102, 303\u2013311 (2020)","journal-title":"Comput. Hum. Behav."},{"key":"11_CR24","first-page":"23","volume":"6","author":"S Iacobucci","year":"2022","unstructured":"Iacobucci, S., De Cicco, R.: A literature review of bullshit receptivity: perspectives for an informed policy making against misinformation. J. Behav. Econ. Policy 6, 23\u201340 (2022)","journal-title":"J. Behav. Econ. Policy"},{"issue":"1","key":"11_CR25","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1075\/is.20002.kei","volume":"22","author":"M Keijsers","year":"2021","unstructured":"Keijsers, M., Bartneck, C., Eyssel, F.: What\u2019s to bullying a bot? correlates between chatbot humanlikeness and abuse. Interact. Stud. 22(1), 55\u201380 (2021)","journal-title":"Interact. Stud."},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Keijsers, M., Bartneck, C.: Mindless robots get bullied. In: Proceedings of the 2018 ACM\/IEEE International Conference on Human-robot Interaction, pp. 205\u2013214 (2018)","DOI":"10.1145\/3171221.3171266"},{"key":"11_CR27","unstructured":"Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering, Technical Report EBSE-2007-01. Keele University, School of Computer Science and Mathematics (2007)"},{"issue":"5","key":"11_CR28","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1108\/AAAJ-01-2015-1939","volume":"29","author":"M Massaro","year":"2016","unstructured":"Massaro, M., Dumay, J., Guthrie, J.: On the shoulders of giants: undertaking a structured literature review in accounting. Accounting, Auditing\u00a0 Accountability J, 29(5), 767\u2013801 (2016)","journal-title":"Accounting, Auditing\u00a0 Accountability J,"},{"key":"11_CR29","first-page":"323","volume-title":"The Structure of Multimodal Communication","author":"M-A Morel","year":"1989","unstructured":"Morel, M.-A.: Computer\u2013human communication. In: Taylor, M., Neel, F., Bouhuis, D. (eds.) The Structure of Multimodal Communication, pp. 323\u2013330. North-Holland Elsevier, Amsterdam (1989)"},{"key":"11_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijsu.2021.105906","volume":"88","author":"MJ Page","year":"2021","unstructured":"Page, M.J., et al.: The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. Int. J. Surg. 88, 105906 (2021)","journal-title":"Int. J. Surg."},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Park, N., Jang, K., Cho, S., Choi, J.: Use of offensive language in human-artificial intelligence chatbot interaction: the effects of ethical ideology, social competence, and perceived humanlikeness. Comput. Hum. Behav. 121,\u00a0106795 (2021)","DOI":"10.1016\/j.chb.2021.106795"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Pereira, V., Santos, J., Leite, F., Esc\u00f3rcio, P.: Using BIM to improve building energy efficiency\u2013a scientometric and systematic review. Energy\u00a0 Build.\u00a0250, 111292 (2021)","DOI":"10.1016\/j.enbuild.2021.111292"},{"issue":"1","key":"11_CR33","doi-asserted-by":"publisher","first-page":"4127","DOI":"10.1038\/s41598-023-31146-1","volume":"13","author":"A Pluta","year":"2023","unstructured":"Pluta, A., Mazurek, J., Wojciechowski, J., Wolak, T., Soral, W., Bilewicz, M.: Exposure to hate speech deteriorates neurocognitive mechanisms of the ability to understand others\u2019 pain. Sci. Rep. 13(1), 4127 (2023)","journal-title":"Sci. Rep."},{"key":"11_CR34","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10896-009-9289-5","volume":"25","author":"D Pontzer","year":"2010","unstructured":"Pontzer, D.: A theoretical test of bullying behavior: Parenting, personality, and the bully\/victim relationship. J. Family Violence 25, 259\u2013273 (2010)","journal-title":"J. Family Violence"},{"key":"11_CR35","unstructured":"Reeves, B., Nass, C.: The media equation: How people treat computers, television, and new media like real people, vol.\u00a010(10), Cambridge, UK\u00a0 (1996)"},{"key":"11_CR36","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-642-33197-8_16","volume-title":"Intelligent Virtual Agents","author":"A Silvervarg","year":"2012","unstructured":"Silvervarg, A., Raukola, K., Haake, M., Gulz, A.: The effect of visual gender on abuse in conversation with ECAs. In: Nakano, Y., Neff, M., Paiva, A., Walker, M. (eds.) IVA 2012. LNCS (LNAI), vol. 7502, pp. 153\u2013160. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33197-8_16"},{"key":"11_CR37","unstructured":"Strait, M., Contreras, V., Vela, C.D.: Verbal disinhibition towards robots is associated with general antisociality.\u00a0arXiv preprint arXiv:1808.01076 (2018)"},{"key":"11_CR38","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.1176\/appi.ajp.2013.12070957","volume":"170","author":"MH Teicher","year":"2013","unstructured":"Teicher, M.H., Samson, J.A.: Childhood maltreatment and psychopathology: a case for ecophenotypic variants as clinically and neurobiologically distinct subtypes. Am. J. Psychiatry 170, 1114\u20131133 (2013)","journal-title":"Am. J. Psychiatry"},{"issue":"2","key":"11_CR39","doi-asserted-by":"publisher","first-page":"171","DOI":"10.2190\/EC.41.2.c","volume":"41","author":"G Veletsianos","year":"2009","unstructured":"Veletsianos, G., Miller, C., Doering, A.: EnALI: a research and design framework for virtual characters and pedagogical agents. J. Educ. Comput. Res. 41(2), 171\u2013194 (2009)","journal-title":"J. Educ. Comput. Res."},{"issue":"3","key":"11_CR40","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1016\/j.intcom.2008.02.007","volume":"20","author":"G Veletsianos","year":"2008","unstructured":"Veletsianos, G., Scharber, C., Doering, A.: When sex, drugs, and violence enter the classroom: conversations between adolescents and a female pedagogical agent. Interact. Comput. 20(3), 292\u2013301 (2008)","journal-title":"Interact. Comput."},{"issue":"3","key":"11_CR41","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.intcom.2008.02.002","volume":"20","author":"B Whitby","year":"2008","unstructured":"Whitby, B.: Sometimes it\u2019s hard to be a robot: a call for action on the ethics of abusing artificial agents. Interact. Comput. 20(3), 326\u2013333 (2008)","journal-title":"Interact. Comput."},{"key":"11_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2023.102784","volume":"125","author":"L Whittaker","year":"2023","unstructured":"Whittaker, L., Mulcahy, R., Letheren, K., Kietzmann, J., Russell-Bennett, R.: Mapping the deepfake landscape for innovation: a multidisciplinary systematic review and future research agenda. Technovation 125, 102784 (2023)","journal-title":"Technovation"},{"issue":"1","key":"11_CR43","doi-asserted-by":"publisher","first-page":"5655","DOI":"10.1038\/s41598-019-42199-6","volume":"9","author":"JY Yun","year":"2019","unstructured":"Yun, J.Y., Shim, G., Jeong, B.: Verbal abuse related to self-esteem damage and unjust blame harms mental health and social interaction in college population. Sci. Rep. 9(1), 5655 (2019)","journal-title":"Sci. Rep."}],"container-title":["Lecture Notes in Computer Science","Chatbot Research and Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54975-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:09:18Z","timestamp":1710270558000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54975-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031549748","9783031549755"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54975-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CONVERSATIONS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Chatbot Research and Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"conversations2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}