{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T04:47:11Z","timestamp":1776746831461,"version":"3.51.2"},"reference-count":40,"publisher":"Oxford University Press (OUP)","issue":"5","license":[{"start":{"date-parts":[[2021,8,2]],"date-time":"2021-08-02T00:00:00Z","timestamp":1627862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Cornell Center for Social Sciences for the Prosocial Behaviors Collaborative Project and the NSF CHS Medium","award":["1405634"],"award-info":[{"award-number":["1405634"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,18]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:sec><jats:title>\u2002<\/jats:title><jats:p>This study evaluates whether increasing information visibility around the identity of a moderator influences bystanders\u2019 likelihood to flag subsequent unmoderated harassing comments. In a 2-day preregistered experiment conducted in a realistic social media simulation, participants encountered ambiguous or unambiguous harassment comments, which were ostensibly flagged by either other users, an automated system (AI), or an unidentified moderation source. The results reveal that visibility of a content moderation source inhibited participants\u2019 flagging of a subsequent unmoderated harassment comment, presumably because their efforts were seen as dispensable, compared to when the moderation source was unknown. On the contrary, there was an indirect effect of other users versus AI as moderation source on subsequent flagging through changes in perceived social norms. Overall, this research shows that the effects of moderation transparency are complex, as increasing visibility of a content moderator may inadvertently inhibit bystander intervention.<\/jats:p><\/jats:sec><jats:sec><jats:title>Lay Summary<\/jats:title><jats:p>This study examines the effects of flagging unmoderated offensive posts on social media, and how this changes the users\u2019 subsequent behavior. We examined users\u2019 reactions to the flagging of these posts by other users, an automated system, or an unspecified process to determine whether this affects the users\u2019 ensuing behavior. A 2-day experiment on a simulated social media site showed that the visibility of the \u201cflagger\u201d impacts how users perceive social norms and think about the accountability for their own online actions. The results showed that the visibility of the person\/system that flagged the material generally deterred subsequent flagging. The analysis also shows that the effect was stronger when the users thought that it was other users, and not an automated system, that had flagged the online harassment.<\/jats:p><\/jats:sec>","DOI":"10.1093\/jcmc\/zmab007","type":"journal-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T19:13:54Z","timestamp":1624389234000},"page":"284-300","source":"Crossref","is-referenced-by-count":35,"title":["Do You Care Who Flagged This Post? Effects of Moderator Visibility on Bystander Behavior"],"prefix":"10.1093","volume":"26","author":[{"given":"Aparajita","family":"Bhandari","sequence":"first","affiliation":[{"name":"Cornell University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5355-0397","authenticated-orcid":false,"given":"Marie","family":"Ozanne","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Natalya N.","family":"Bazarova","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Dominic","family":"DiFranzo","sequence":"additional","affiliation":[{"name":"Lehigh University"}]}],"member":"286","published-online":{"date-parts":[[2021,8,2]]},"reference":[{"issue":"2","key":"2021091818121713100_zmab007-B1","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1177\/0007650316659851","article-title":"Organizational transparency: Conceptualizations, conditions, and consequences","volume":"58","author":"Albu","year":"2019","journal-title":"Business & Society"},{"issue":"5","key":"2021091818121713100_zmab007-B2","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1089\/cyber.2013.0370","article-title":"Combating weight-based cyberbullying on Facebook with the dissenter effect","volume":"17","author":"Anderson","year":"2014","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"2021091818121713100_zmab007-B3","first-page":"671","article-title":"Big data\u2019s disparate impact","volume":"104","author":"Barocas","year":"2016","journal-title":"California Law Review"},{"key":"2021091818121713100_zmab007-B4","author":"Blackwell","year":"2018"},{"issue":"1","key":"2021091818121713100_zmab007-B5","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1080\/03637751.2015.1044256","article-title":"Bystander intervention in cyberbullying","volume":"83","author":"Brody","year":"2016","journal-title":"Communication Monographs"},{"key":"2021091818121713100_zmab007-B6","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1016\/j.chb.2015.06.009","article-title":"How do victims react to cyberbullying on social networking sites? The influence of previous cyberbullying victimization experiences","volume":"52","author":"Cao","year":"2015","journal-title":"Computers in Human Behavior"},{"key":"2021091818121713100_zmab007-B7","first-page":"151","author":"Cialdini","year":"1998","edition":"4th ed"},{"issue":"3","key":"2021091818121713100_zmab007-B8","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1177\/1461444814543163","article-title":"What is a flag for? Social media reporting tools and the vocabulary of complaint","volume":"18","author":"Crawford","year":"2016","journal-title":"New Media & Society"},{"key":"2021091818121713100_zmab007-B9","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1037\/h0025589","article-title":"Bystander intervention in emergencies: Diffusion of responsibility","volume":"8","author":"Darley","year":"1968","journal-title":"Journal of Personality and Social Psychology"},{"key":"2021091818121713100_zmab007-B10","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1016\/j.chb.2015.12.051","article-title":"Deciding whether to look after them, to like it, or leave it: A multidimensional analysis of predictors of positive and negative bystander behavior in cyberbullying among adolescents","volume":"57","author":"DeSmet","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"2021091818121713100_zmab007-B11","first-page":"1","author":"DiFranzo","year":"2018"},{"key":"2021091818121713100_zmab007-B12","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1037\/a0023304","article-title":"The bystander-effect: A meta-analytic review on bystander intervention in dangerous and non-dangerous emergencies","volume":"137","author":"Fischer","year":"2011","journal-title":"Psychological Bulletin"},{"key":"2021091818121713100_zmab007-B13","volume-title":"Custodians of the Internet: Platforms, content moderation, and the hidden decisions that shape social media","author":"Gillespie","year":"2018"},{"issue":"2","key":"2021091818121713100_zmab007-B14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/2053951720943234","article-title":"Content moderation, AI, and the question of scale","volume":"7","author":"Gillespie","year":"2020","journal-title":"Big Data & Society"},{"key":"2021091818121713100_zmab007-B15","first-page":"42","article-title":"The virtues of moderation","volume":"17","author":"Grimmelmann","year":"2015","journal-title":"Yale Journal of Law and Tech"},{"issue":"2","key":"2021091818121713100_zmab007-B16","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1080\/17439760701228789","article-title":"Civil courage: Implicit theories, related concepts, and measurement","volume":"2","author":"Greitemeyer","year":"2007","journal-title":"The Journal of Positive Psychology"},{"issue":"1","key":"2021091818121713100_zmab007-B17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/01972243.2017.1391913","article-title":"Governing online platforms: From contested to cooperative responsibility","volume":"34","author":"Helberger","year":"2018","journal-title":"The Information Society"},{"issue":"3","key":"2021091818121713100_zmab007-B18a","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1002\/ab.21688","article-title":"Bullying participant roles and gender as predictors of bystander intervention","volume":"43","author":"Jenkins,","journal-title":"Aggressive Behavior"},{"key":"2021091818121713100_zmab007-B18","first-page":"1","article-title":"\u201cDid you suspect the post would be removed?\u201d: Understanding user reactions to content removals on Reddit","volume":"3(CSCW","author":"Jhaver","year":"2019","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"issue":"1","key":"2021091818121713100_zmab007-B19","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1080\/00913367.2016.1269304","article-title":"An analysis of data quality: Professional panels, student subject pools, and Amazon's Mechanical Turk","volume":"46","author":"Kees","year":"2017","journal-title":"Journal of Advertising"},{"key":"2021091818121713100_zmab007-B20","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1037\/0022-3514.44.1.78","article-title":"Dispensability of member effort and group motivation losses: Free-rider effects","volume":"44","author":"Kerr","year":"1983","journal-title":"Journal of Personality and Social Psychology"},{"key":"2021091818121713100_zmab007-B21","first-page":"125","volume-title":"Building Successful Online Communities: Evidence-Based Social Design","author":"Kiesler","year":"2012"},{"issue":"4","key":"2021091818121713100_zmab007-B22","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1080\/08824096.2015.1089851","article-title":"Norms in social media: The application of theory of reasoned action and personal norms in predicting interactions with Facebook page like ads","volume":"32","author":"Kim","year":"2015","journal-title":"Communication Research Reports"},{"issue":"6","key":"2021091818121713100_zmab007-B23","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1089\/cyber.2011.0588","article-title":"Cyberbullying: The challenge to define","volume":"15","author":"Langos","year":"2012","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"2021091818121713100_zmab007-B24","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1016\/j.chb.2018.12.038","article-title":"The selectivity of moral disengagement in defenders of cyberbullying: Contextual moral disengagement","volume":"93","author":"Luo","year":"2019","journal-title":"Computers in Human Behavior"},{"key":"2021091818121713100_zmab007-B25","author":"Masur","year":"2020"},{"issue":"5","key":"2021091818121713100_zmab007-B26","doi-asserted-by":"crossref","first-page":"759","DOI":"10.1177\/1073191118760709","article-title":"Who are the Turkers? A characterization of MTurk workers using the personality assessment inventory","volume":"26","author":"McCredie","year":"2019","journal-title":"Assessment"},{"issue":"1","key":"2021091818121713100_zmab007-B27","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/s42380-019-00039-1","article-title":"Styles of bystander intervention in cyberbullying incidents","volume":"2","author":"Moxey","year":"2020","journal-title":"International Journal of Bullying Prevention"},{"issue":"11","key":"2021091818121713100_zmab007-B28","doi-asserted-by":"crossref","first-page":"4366","DOI":"10.1177\/1461444818773059","article-title":"Censored, suspended, shadowbanned: User interpretations of content moderation on social media platforms","volume":"20","author":"Myers West","year":"2018","journal-title":"New Media & Society"},{"issue":"8","key":"2021091818121713100_zmab007-B29","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1177\/1461444814563519","article-title":"Bystanding or standing by? How the number of bystanders affects the intention to intervene in cyberbullying","volume":"18","author":"Obermaier","year":"2016","journal-title":"New Media & Society"},{"key":"2021091818121713100_zmab007-B30","doi-asserted-by":"crossref","DOI":"10.4159\/9780674041660","volume-title":"The logic of collective action: Public goods and the theory of groups","author":"Olson","year":"1965"},{"issue":"2","key":"2021091818121713100_zmab007-B31","first-page":"194","article-title":"Distinctiveness and influence of subjective norms, personal descriptive and injunctive norms, and societal descriptive and injunctive norms on behavioral intent: A case of two behaviors critical to organ donation","volume":"33","author":"Park","year":"2007","journal-title":"Human Communication Research"},{"key":"2021091818121713100_zmab007-B32","first-page":"369","author":"Pater","year":"2016"},{"issue":"2","key":"2021091818121713100_zmab007-B33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v048.i02","article-title":"Lavaan: An R package for structural equation modeling and more. Version 0.5\u201312 (BETA","volume":"48","author":"Rosseel","year":"2012","journal-title":"Journal of Statistical Software"},{"issue":"6","key":"2021091818121713100_zmab007-B34","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1177\/1461444819875990","article-title":"Re-humanizing the platform: Content moderators and the logic of care","volume":"22","author":"Ruckenstein","year":"2020","journal-title":"New Media & Society"},{"key":"2021091818121713100_zmab007-B35","first-page":"123","article-title":"Digital age managing opacity: Information visibility and the paradox of transparency in the digital age","volume":"10","author":"Stohl","year":"2016","journal-title":"International Journal of Communication"},{"key":"2021091818121713100_zmab007-B36","first-page":"1524","article-title":"What do we mean when we talk about transparency? Toward meaningful transparency in commercial content moderation","volume":"13","author":"Suzor","year":"2019","journal-title":"International Journal of Communication"},{"key":"2021091818121713100_zmab007-B37","first-page":"1","article-title":"Accountability and empathy by design: Encouraging bystander intervention to cyberbullying on social media","volume":"3(CSCW","author":"Taylor","year":"2019","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"2021091818121713100_zmab007-B38","first-page":"1","article-title":"Assessing organizational information visibility: Development and validation of the information visibility scale","author":"ter Hoeven","year":"2019","journal-title":"Communication Research"},{"key":"2021091818121713100_zmab007-B39","first-page":"1","article-title":"Detection of harassment on web 2.0","volume":"2","author":"Yin","year":"2009","journal-title":"Proceedings of the Content Analysis in the WEB"}],"container-title":["Journal of Computer-Mediated Communication"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/jcmc\/article-pdf\/26\/5\/284\/40409019\/zmab007.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"http:\/\/academic.oup.com\/jcmc\/article-pdf\/26\/5\/284\/40409019\/zmab007.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T11:25:55Z","timestamp":1725276355000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jcmc\/article\/26\/5\/284\/6335779"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,2]]},"references-count":40,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2021,8,2]]},"published-print":{"date-parts":[[2021,9,18]]}},"URL":"https:\/\/doi.org\/10.1093\/jcmc\/zmab007","relation":{},"ISSN":["1083-6101"],"issn-type":[{"value":"1083-6101","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2021,9,1]]},"published":{"date-parts":[[2021,8,2]]}}}