{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T03:00:26Z","timestamp":1777086026261,"version":"3.51.4"},"reference-count":53,"publisher":"Oxford University Press (OUP)","issue":"3","license":[{"start":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T00:00:00Z","timestamp":1522972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1405634"],"award-info":[{"award-number":["IIS-1405634"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5,1]]},"DOI":"10.1093\/jcmc\/zmy005","type":"journal-article","created":{"date-parts":[[2018,2,22]],"date-time":"2018-02-22T07:23:29Z","timestamp":1519284209000},"page":"146-162","source":"Crossref","is-referenced-by-count":54,"title":["Cyberbullying Bystander Intervention: The Number of Offenders and Retweeting Predict Likelihood of Helping a Cyberbullying Victim"],"prefix":"10.1093","volume":"23","author":[{"given":"Franccesca","family":"Kazerooni","sequence":"first","affiliation":[{"name":"Department of Communication, Cornell University, Ithaca, NY 14853, USA"},{"name":"Department of Communication, Cornell University, Ithaca, NY 14853, USA"}]},{"given":"Samuel Hardman","family":"Taylor","sequence":"additional","affiliation":[{"name":"Department of Communication, Cornell University, Ithaca, NY 14853, USA"}]},{"given":"Natalya N","family":"Bazarova","sequence":"additional","affiliation":[{"name":"Department of Communication, Cornell University, Ithaca, NY 14853, USA"}]},{"given":"Janis","family":"Whitlock","sequence":"additional","affiliation":[{"name":"Bronfenbrenner Center for Translational Research, Cornell University, Ithaca, NY 14853 USA"}]}],"member":"286","published-online":{"date-parts":[[2018,4,6]]},"reference":[{"issue":"1","key":"key\n\t\t\t\t20180430200509_zmy005C1","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.jadohealth.2015.04.011","article-title":"Cyberbullying: Review of an old problem gone viral","volume":"57","author":"Aboujaoude","year":"2015","journal-title":"Journal of Adolescent Health"},{"key":"key\n\t\t\t\t20180430200509_zmy005C2","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.childyouth.2016.03.026","article-title":"Cyber-bystanding in context: A review of the literature on witnesses\u2019 responses to cyberbullying","volume":"65","author":"Allison","year":"2016","journal-title":"Children and Youth Services Review"},{"issue":"1","key":"key\n\t\t\t\t20180430200509_zmy005C3","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1037\/vio0000032","article-title":"An empirical examination of the strength differential hypothesis in cyberbullying behavior","volume":"7","author":"Barlett","year":"2017","journal-title":"Psychology of Violence"},{"key":"key\n\t\t\t\t20180430200509_zmy005C4","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.chb.2013.10.036","article-title":"Cyberbullying on social network sites: An experimental study into bystanders\u2019 behavioural intentions to help the victim or reinforce the bully","volume":"31","author":"Bastiaensens","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key\n\t\t\t\t20180430200509_zmy005C5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/15388220.2014.968281","article-title":"New directions in cyberbullying research","volume":"14","author":"Bauman","year":"2015","journal-title":"Journal of School Violence"},{"key":"key\n\t\t\t\t20180430200509_zmy005C6","author":"boyd","year":"2010"},{"issue":"1","key":"key\n\t\t\t\t20180430200509_zmy005C7","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1080\/03637751.2015.1044256","article-title":"Bystander intervention in cyberbullying","volume":"83","author":"Brody","year":"2016","journal-title":"Communication Monographs"},{"issue":"2","key":"key\n\t\t\t\t20180430200509_zmy005C8","doi-asserted-by":"crossref","first-page":"245","DOI":"10.3390\/soc5020245","article-title":"Cyberbullying or cyber aggression?: A review of existing definitions of cyber-based peer-to-peer aggression","volume":"5","author":"Corcoran","year":"2015","journal-title":"Societies"},{"issue":"10","key":"key\n\t\t\t\t20180430200509_zmy005C9","doi-asserted-by":"crossref","first-page":"1889","DOI":"10.1177\/0886260511431436","article-title":"Repetition, power imbalance, and intentionality: Do these criteria conform to teenagers\u2019 perception of bullying? A role-based analysis","volume":"27","author":"Cuadrado-Gordillo","year":"2012","journal-title":"Journal of Interpersonal Violence"},{"issue":"4","key":"key\n\t\t\t\t20180430200509_zmy005C10","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1037\/h0025589","article-title":"Bystander intervention in emergencies: Diffusion of responsibility","volume":"8","author":"Darley","year":"1968","journal-title":"Journal of Personality and Social Psychology"},{"key":"key\n\t\t\t\t20180430200509_zmy005C11","author":"DiFranzo","year":"2018"},{"key":"key\n\t\t\t\t20180430200509_zmy005C12","author":"Dillon","year":"2016"},{"key":"key\n\t\t\t\t20180430200509_zmy005C13","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.chb.2014.12.009","article-title":"Unresponsive or un-noticed?: Cyberbystander intervention in an experimental cyberbullying context","volume":"45","author":"Dillon","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key\n\t\t\t\t20180430200509_zmy005C14","first-page":"182","article-title":"Cyberbullying versus face-to-face bullying: A theoretical and conceptual review","volume":"217","author":"Dooley","year":"2009","journal-title":"Journal of Psychology"},{"key":"key\n\t\t\t\t20180430200509_zmy005C15","author":"Duggan","year":"2014"},{"issue":"4","key":"key\n\t\t\t\t20180430200509_zmy005C16","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1037\/a0023304","article-title":"The bystander-effect: A meta-analytic review on bystander intervention in dangerous and non-dangerous emergencies","volume":"137","author":"Fischer","year":"2011","journal-title":"Psychological Bulletin"},{"key":"key\n\t\t\t\t20180430200509_zmy005C17","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-3-319-25552-1_6","volume-title":"Cyberbullying across the globe: Gender, family, and mental health","author":"Giumetti","year":"2016"},{"key":"key\n\t\t\t\t20180430200509_zmy005C18","author":"Java","year":"2007"},{"key":"key\n\t\t\t\t20180430200509_zmy005C19","doi-asserted-by":"crossref","first-page":"366","DOI":"10.5465\/amr.1991.4278958","article-title":"Ethical decision making by individuals in organizations: An issue-contingent model","volume":"16","author":"Jones","year":"1991","journal-title":"Academy of Management Review"},{"key":"key\n\t\t\t\t20180430200509_zmy005C20","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1080\/03634528809378703","article-title":"Effects of teacher immediacy and strategy type on college student resistance to on-task demands","volume":"37","author":"Kearney","year":"1988","journal-title":"Communication Education"},{"issue":"4","key":"key\n\t\t\t\t20180430200509_zmy005C21","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1037\/a0035618","article-title":"Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth","volume":"140","author":"Kowalski","year":"2014","journal-title":"Psychological Bulletin"},{"issue":"1","key":"key\n\t\t\t\t20180430200509_zmy005C22","doi-asserted-by":"crossref","first-page":"S13","DOI":"10.1016\/j.jadohealth.2012.09.018","article-title":"Psychological, physical, and academic correlates of cyberbullying and traditional bullying","volume":"53","author":"Kowalski","year":"2013","journal-title":"Journal of Adolescent Health"},{"key":"key\n\t\t\t\t20180430200509_zmy005C23","author":"Kwak","year":"2010"},{"issue":"2","key":"key\n\t\t\t\t20180430200509_zmy005C24","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1023\/A:1022684520514","article-title":"Social anxiety among adolescents: Linkages with peer relations and friendships","volume":"26","author":"La Greca","year":"1998","journal-title":"Journal of Abnormal Child Psychology"},{"issue":"6","key":"key\n\t\t\t\t20180430200509_zmy005C25","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1089\/cyber.2011.0588","article-title":"Cyberbullying: The challenge to define","volume":"15","author":"Langos","year":"2012","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"issue":"2","key":"key\n\t\t\t\t20180430200509_zmy005C26","doi-asserted-by":"crossref","first-page":"180","DOI":"10.2307\/2786599","article-title":"Sex, group size and helping in three cities","volume":"38","author":"Latan\u00e9","year":"1975","journal-title":"Sociometry"},{"key":"key\n\t\t\t\t20180430200509_zmy005C27","volume-title":"The unresponsive bystander: Why doesn\u2019t he help?","author":"Latan\u00e9","year":"1970"},{"issue":"5","key":"key\n\t\t\t\t20180430200509_zmy005C28","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1080\/10410236.2012.700391","article-title":"To tweet or retweet? That is the question for health professionals on Twitter","volume":"28","author":"Lee","year":"2013","journal-title":"Health Communication"},{"issue":"6","key":"key\n\t\t\t\t20180430200509_zmy005C29","doi-asserted-by":"crossref","first-page":"1429","DOI":"10.1037\/a0012634","article-title":"The responsive bystander: How social group membership and group size can encourage as well as inhibit bystander intervention","volume":"95","author":"Levine","year":"2008","journal-title":"Journal of Personality and Social Psychology"},{"issue":"7","key":"key\n\t\t\t\t20180430200509_zmy005C30","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1002\/dc.23710","article-title":"The professional Twitter account: Creation, proper maintenance, and continuous successful operation","volume":"45","author":"Madrigal","year":"2017","journal-title":"Diagnostic Cytopathology"},{"issue":"4","key":"key\n\t\t\t\t20180430200509_zmy005C31","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1037\/a0037521","article-title":"Cyberbullying among adolescents: Measures in search of a construct","volume":"4","author":"Mehari","year":"2014","journal-title":"Psychology of Violence"},{"issue":"2","key":"key\n\t\t\t\t20180430200509_zmy005C32","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1111\/j.2041-210x.2012.00261.x","article-title":"A general and simple method for obtaining R2 from generalized linear mixed effects models","volume":"4","author":"Nakagawa","year":"2013","journal-title":"Methods in Ecology & Evolution"},{"key":"key\n\t\t\t\t20180430200509_zmy005C33","volume-title":"Preventing bullying through Science, policy, and practice","author":"National Academies of Sciences, Engineering, and Medicine","year":"2016"},{"issue":"8","key":"key\n\t\t\t\t20180430200509_zmy005C34","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1177\/1461444814563519","article-title":"Bystanding or standing by? How the number of bystanders affects the intention to intervene in cyberbullying","volume":"18","author":"Obermaier","year":"2014","journal-title":"New Media & Society"},{"key":"key\n\t\t\t\t20180430200509_zmy005C35","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1111\/1467-9507.00073","article-title":"The importance of sex-of-stimulus object: Age trends and sex differences in empathic responsiveness","volume":"7","author":"Olweus","year":"2001","journal-title":"Social Development"},{"key":"key\n\t\t\t\t20180430200509_zmy005C36","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.avb.2015.05.013","article-title":"Measuring cyberbullying: Implications for research","volume":"23","author":"Patchin","year":"2015","journal-title":"Aggression and Violent Behavior"},{"key":"key\n\t\t\t\t20180430200509_zmy005C37","author":"R Core Team","year":"2016"},{"key":"key\n\t\t\t\t20180430200509_zmy005C38","author":"Recuero","year":"2011"},{"key":"key\n\t\t\t\t20180430200509_zmy005C39","author":"Robbins","year":"2014"},{"issue":"5","key":"key\n\t\t\t\t20180430200509_zmy005C40","doi-asserted-by":"crossref","first-page":"990","DOI":"10.1037\/0022-3514.34.5.990","article-title":"Bystander response to an assault: When a man attacks a woman","volume":"34","author":"Shotland","year":"1976","journal-title":"Journal of Personality and Social Psychology"},{"issue":"1","key":"key\n\t\t\t\t20180430200509_zmy005C41","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.chb.2012.05.024","article-title":"The nature of cyberbullying, and strategies for prevention","volume":"29","author":"Slonje","year":"2013","journal-title":"Computers in Human Behavior"},{"key":"key\n\t\t\t\t20180430200509_zmy005C42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/(SICI)1098-2337(2000)26:1<1::AID-AB1>3.0.CO;2-7","article-title":"Bullying in schools: Lessons from two","volume":"26","author":"Smith","year":"2000","journal-title":"Aggressive Behavior"},{"key":"key\n\t\t\t\t20180430200509_zmy005C43","first-page":"26","volume-title":"Principles of cyberbullying research: Definitions, measures, and methodology","author":"Smith","year":"2013"},{"issue":"4","key":"key\n\t\t\t\t20180430200509_zmy005C44","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","article-title":"Cyberbullying: Its nature and impact in secondary school pupils","volume":"49","author":"Smith","year":"2008","journal-title":"Journal of Child Psychology and Psychiatry"},{"key":"key\n\t\t\t\t20180430200509_zmy005C45","author":"Starbird","year":"2012"},{"key":"key\n\t\t\t\t20180430200509_zmy005C46","author":"Starbird","year":"2010"},{"key":"key\n\t\t\t\t20180430200509_zmy005C47","first-page":"264","volume-title":"Controversies in Digital Ethics","author":"Stroud","year":"2016"},{"key":"key\n\t\t\t\t20180430200509_zmy005C48","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.chb.2009.11.014","article-title":"Following you home from school: A critical review and synthesis of research on cyberbullying victimization","volume":"26","author":"Tokunaga","year":"2010","journal-title":"Computers in Human Behavior"},{"key":"key\n\t\t\t\t20180430200509_zmy005C49","author":"Twitter","year":"2016"},{"issue":"4","key":"key\n\t\t\t\t20180430200509_zmy005C50","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1089\/cpb.2007.0042","article-title":"Defining cyberbullying: A qualitative research into the perceptions of youngsters","volume":"11","author":"Vandebosch","year":"2008","journal-title":"CyberPsychology & Behavior"},{"issue":"1","key":"key\n\t\t\t\t20180430200509_zmy005C51","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1080\/15388220.2014.949377","article-title":"Cyberbullying via social media","volume":"14","author":"Whittaker","year":"2015","journal-title":"Journal of School Violence"},{"issue":"6","key":"key\n\t\t\t\t20180430200509_zmy005C52","doi-asserted-by":"crossref","first-page":"S51","DOI":"10.1016\/j.jadohealth.2007.08.019","article-title":"Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts","volume":"41","author":"Wolak","year":"2007","journal-title":"Journal of Adolescent Health"},{"issue":"4","key":"key\n\t\t\t\t20180430200509_zmy005C53","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1016\/j.avb.2014.06.007","article-title":"Digital metamorphosis: Examination of the bystander culture in cyberbullying","volume":"19","author":"Wong-Lo","year":"2014","journal-title":"Aggression and Violent Behavior"}],"container-title":["Journal of Computer-Mediated Communication"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/jcmc\/article-pdf\/23\/3\/146\/24756575\/zmy005.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T07:09:12Z","timestamp":1570777752000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jcmc\/article\/23\/3\/146\/4962534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,6]]},"references-count":53,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2018,4,6]]},"published-print":{"date-parts":[[2018,5,1]]}},"URL":"https:\/\/doi.org\/10.1093\/jcmc\/zmy005","relation":{},"ISSN":["1083-6101"],"issn-type":[{"value":"1083-6101","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,5]]},"published":{"date-parts":[[2018,4,6]]}}}