{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T12:22:23Z","timestamp":1742646143891,"version":"3.37.3"},"reference-count":105,"publisher":"Informa UK Limited","issue":"14","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71810107003","71771097"],"award-info":[{"award-number":["71810107003","71771097"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Social Science Fund of China","award":["22VRC153","18ZDA109"],"award-info":[{"award-number":["22VRC153","18ZDA109"]}]},{"name":"Hubei Universities Provincial Teaching and Research Project","award":["2022059"],"award-info":[{"award-number":["2022059"]}]},{"DOI":"10.13039\/501100003172","name":"HUST","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003172","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2024,10,25]]},"DOI":"10.1080\/0144929x.2023.2281491","type":"journal-article","created":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T11:00:20Z","timestamp":1699959620000},"page":"3490-3509","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Effective reporting system to encourage users\u2019 reporting behavior in social media platforms: an empirical study based on structural empowerment theory"],"prefix":"10.1080","volume":"43","author":[{"given":"Hong","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Management, Huazhong University of Science and Technology, Wuhan, People\u2019s Republic of China"}]},{"given":"Yaobin","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Management, Huazhong University of Science and Technology, Wuhan, People\u2019s Republic of China"}]},{"given":"Ling","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Management, Huazhong University of Science and Technology, Wuhan, People\u2019s Republic of China"}]},{"given":"Bin","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Business and Entrepreneurship, University of Texas Rio Grande Valley, Edinburg, TX, USA"}]},{"given":"Ting","family":"Li","sequence":"additional","affiliation":[{"name":"School of Management, Huazhong University of Science and Technology, Wuhan, People\u2019s Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2023,11,14]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.69.3.19.66363"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0146-6402(78)90002-4"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.1986.4.3.359"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1891\/0889-8391.13.2.158"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2018.00799"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.05.003"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415150401"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmab007"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2011.07.029"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2020.103411"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/01492063211045023"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203771587"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.2307\/258093"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543163"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.051"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00595"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8551.2006.00500.x"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-4359(94)90037-X"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.71.3.500"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1602671"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378702400401"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/jan.14289"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2020.1716848"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222260303"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1111\/jonm.12766"},{"key":"e_1_3_2_27_1","volume-title":"Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media","author":"Gillespie T.","year":"2018","unstructured":"Gillespie, T. 2018. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. New Haven & London: Yale University Press."},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2021.1870389"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1017\/9781108890960.013"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951719897945"},{"issue":"42","key":"e_1_3_2_31_1","first-page":"42","article-title":"The Virtues of Moderation","volume":"17","author":"Grimmelmann J.","year":"2015","unstructured":"Grimmelmann, J. 2015. \u201cThe Virtues of Moderation.\u201d Yale Journal of Law and Technology 17 (42): 42\u2013109.","journal-title":"Yale Journal of Law and Technology"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1108\/EBR-11-2018-0203"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637750903310360"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2017.1391913"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-09-2015-0382"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/09585190600641271"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.5771\/2192-4007-2017-4-395"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.12.001"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102251"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.leaqua.2005.03.001"},{"issue":"4","key":"e_1_3_2_41_1","first-page":"65","article-title":"Power Failure in Management Circuits","volume":"57","author":"Kanter R. M.","year":"1979","unstructured":"Kanter, R. M. 1979. \u201cPower Failure in Management Circuits.\u201d Harvard Business Review 57 (4): 65\u201375.","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_42_1","volume-title":"Men and Women of the Corporation","author":"Kanter R. M.","year":"1993","unstructured":"Kanter, R. M. 1993. Men and Women of the Corporation. 2nd ed. New York: Basic Books.","edition":"2"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.10.005"},{"key":"e_1_3_2_44_1","first-page":"2","volume-title":"Building Successful Online Communities: Evidence-Based Social Design","author":"Kiesler S.","year":"2012","unstructured":"Kiesler, S., R. Kraut, P. Resnick, and A. Kittur. 2012. \u201cRegulating Behavior in Online Communities.\u201d In Building Successful Online Communities: Evidence-Based Social Design. Vol. 1, edited by R. E. Kraut and P. Resnick, 2\u20134. Cambridge: The MIT Press."},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.14329\/apjis.2021.31.1.1"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.047"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10229-2"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcr\/ucab014"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.17705\/1pais.15103"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.04.016"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0026570"},{"key":"e_1_3_2_52_1","volume-title":"The Unresponsive Bystander: Why Doesn't He Help?","author":"Latan\u00e9 B.","year":"1970","unstructured":"Latan\u00e9, B., and J. M. Darley. 1970. The Unresponsive Bystander: Why Doesn't He Help?. New York: Appleton-Century Crofts."},{"key":"e_1_3_2_53_1","volume-title":"High Involvement Management","author":"Lawler E. E. I.","year":"1986","unstructured":"Lawler, E. E. I. 1986. High Involvement Management. San Francisco: Jossey-Bass."},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aao2998"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00390"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00577"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107342"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148781"},{"key":"e_1_3_2_59_1","first-page":"205","article-title":"A Power Perspective of Empowerment and Work Groups: Implications for Human Resources Management Research","volume":"14","author":"Liden R.","year":"1996","unstructured":"Liden, R., and S. Arad. 1996. \u201cA Power Perspective of Empowerment and Work Groups: Implications for Human Resources Management Research.\u201d Research in Personnel and Human Resources Management 14: 205\u2013251.","journal-title":"Research in Personnel and Human Resources Management"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.1.114"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305119836778"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1813486116"},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173583"},{"key":"e_1_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206312438773"},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.84.5.888."},{"key":"e_1_3_2_66_1","volume-title":"Protecting Children Online?: Cyberbullying Policies of Social Media Companies","author":"Milosevic T.","year":"2017","unstructured":"Milosevic, T., and S. Livingstone. 2017. Protecting Children Online?: Cyberbullying Policies of Social Media Companies. Cambridge: The MIT Press."},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1080\/17482798.2019.1695219"},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.emj.2021.01.005"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24637"},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816670923"},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2021.1990612"},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1080\/1051712X.2014.903456"},{"key":"e_1_3_2_73_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0103"},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.08.013"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2014.0525"},{"key":"e_1_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.1080\/10410236.2019.1598738"},{"key":"e_1_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2021.2004554"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.1177\/0013164405282471"},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015630930326"},{"key":"e_1_3_2_80_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0022676"},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2009.04.007"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2016.1143032"},{"key":"e_1_3_2_83_1","doi-asserted-by":"publisher","DOI":"10.1097\/00006216-199602020-00006"},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-240X(199708)20:4<341::AID-NUR7>3.0.CO;2-G"},{"key":"e_1_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.1097\/00005110-200105000-00006"},{"key":"e_1_3_2_86_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.256"},{"key":"e_1_3_2_87_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781849200448.n4"},{"key":"e_1_3_2_88_1","volume-title":"Children in the Online World: Risk, Regulation, Rights","author":"Staksrud E.","year":"2013","unstructured":"Staksrud, E. 2013. Children in the Online World: Risk, Regulation, Rights. 1st ed. London: Routledge.","edition":"1"},{"key":"e_1_3_2_89_1","doi-asserted-by":"publisher","DOI":"10.1177\/1464884919868325"},{"key":"e_1_3_2_90_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00695"},{"key":"e_1_3_2_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106972"},{"key":"e_1_3_2_92_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2015.0168"},{"key":"e_1_3_2_93_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0022227"},{"key":"e_1_3_2_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.107174"},{"key":"e_1_3_2_95_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2022\/16296"},{"key":"e_1_3_2_96_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11199-018-0941-5"},{"key":"e_1_3_2_97_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650219855330"},{"key":"e_1_3_2_98_1","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2021.1888829"},{"key":"e_1_3_2_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.58"},{"key":"e_1_3_2_100_1","volume-title":"Proceedings of the Pacific Asia Conference on Information Systems (PACIS)","author":"Wong R. Y. M.","year":"2016","unstructured":"Wong, R. Y. M., C. M. K. Cheung, and B. Xiao. 2016b. \u201cUnderstanding Users\u2019 Willingness to Report Online Harassment on Social Networking Sites: The Role of Efficacy.\u201d Proceedings of the Pacific Asia Conference on Information Systems (PACIS), Chiayi, Taiwan."},{"key":"e_1_3_2_101_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2020.0983"},{"key":"e_1_3_2_102_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2017.07.002"},{"key":"e_1_3_2_103_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2019.103249"},{"key":"e_1_3_2_104_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107346"},{"key":"e_1_3_2_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.12.029"},{"key":"e_1_3_2_106_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2018.1436590"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2023.2281491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T16:10:12Z","timestamp":1732810212000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2023.2281491"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":105,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2024,10,25]]}},"alternative-id":["10.1080\/0144929X.2023.2281491"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2023.2281491","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"type":"print","value":"0144-929X"},{"type":"electronic","value":"1362-3001"}],"subject":[],"published":{"date-parts":[[2023,11,14]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-11-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}