{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T10:49:07Z","timestamp":1777546147552,"version":"3.51.4"},"reference-count":39,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Cyberpsychology, Behavior, and Social Networking"],"published-print":{"date-parts":[[2025,8]]},"abstract":"<jats:p>Cyberbullying is a growing societal challenge linked to the misuse of technology. While the focus of previous studies has largely been on the bullies and victims, the bystander has often been overlooked. This critical subject plays a significant role in stopping the bullying behavior and offering support to the victims. Drawing on the mental accounting theory, people make decisions based on their risk and benefit evaluation, which is shaped by the media environment. Given the significant concern about potential retaliation when participating in supportive behaviors, protecting individual privacy becomes a focus. Considering the insufficient research on relevant psychological mechanism and privacy affordances in previous studies of cyberbullying, we propose a framework to understand how privacy affordances (i.e., visibility, editability, association, and searchability) influence bystanders\u2019 risk and benefit perception, thereby affecting their supportive behaviors in cyberbullying. The results indicate that privacy affordances play a key role in motivating bystanders to engage in defending and resisting behaviors, and both perceived risks and benefits act as powerful intermediary factors in the process. Privacy visibility and searchability reduce perceived risk, and privacy association enhances perceived benefit, thus promoting more supportive behavior. The study extends the application of mental accounting theory in cyberbullying research and refines the concept of affordance in the context of social media privacy. It also provides practical implications for platform optimization, user protection, and governmental internet governance to create a more inclusive and supportive digital environment.<\/jats:p>","DOI":"10.1177\/21522715251364300","type":"journal-article","created":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T16:27:19Z","timestamp":1759249639000},"page":"581-587","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Beyond Silence: How Privacy Affordances Shape Bystander\u2019s Supportive Behaviors in Cyberbullying from a Mental Accounting Perspective"],"prefix":"10.1177","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8312-2294","authenticated-orcid":false,"given":"Mengli","family":"Yu","sequence":"first","affiliation":[{"name":"School of Journalism and Communication, Nankai University, Tianjin, China."},{"name":"Publishing Research Institute, Nankai University, Tianjin, China."},{"name":"Convergence Media Research Center, Nankai University, Tianjin, China."}]},{"given":"Yuxin","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Journalism and Communication, Nankai University, Tianjin, China."}]},{"given":"Yichen","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Journalism and Communication, Nankai University, Tianjin, China."}]},{"given":"Xinyu","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Journalism and Communication, Nankai University, Tianjin, China."}]}],"member":"179","published-online":{"date-parts":[[2025,8,20]]},"reference":[{"key":"e_1_3_6_2_2","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.983979"},{"key":"e_1_3_6_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-024-04831-w"},{"key":"e_1_3_6_4_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2022.1161"},{"key":"e_1_3_6_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2024.101938"},{"key":"e_1_3_6_6_2","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2023.0032"},{"key":"e_1_3_6_7_2","doi-asserted-by":"publisher","DOI":"10.1002\/casp.2135"},{"key":"e_1_3_6_8_2","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2016.1143835"},{"key":"e_1_3_6_9_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0671"},{"key":"e_1_3_6_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2018.03.012"},{"key":"e_1_3_6_11_2","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.4.3.199"},{"key":"e_1_3_6_12_2","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.23"},{"key":"e_1_3_6_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11459-w"},{"key":"e_1_3_6_14_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008066718905"},{"key":"e_1_3_6_15_2","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20317"},{"key":"e_1_3_6_16_2","doi-asserted-by":"publisher","DOI":"10.1111\/jbl.12210"},{"key":"e_1_3_6_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2018.11.015"},{"key":"e_1_3_6_18_2","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.101.2.336"},{"key":"e_1_3_6_19_2","unstructured":"Joshua C. Key Cyberbullying Statistics for 2025. 2024. Available from: https:\/\/www.avast.com\/c-cyberbullying-statistics [Last accessed: May23 2025]."},{"key":"e_1_3_6_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2022.102142"},{"key":"e_1_3_6_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2022.101889"},{"key":"e_1_3_6_22_2","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12273"},{"key":"e_1_3_6_23_2","doi-asserted-by":"publisher","DOI":"10.1080\/03637751.2017.1332418"},{"key":"e_1_3_6_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.107889"},{"key":"e_1_3_6_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-018-0941-3"},{"key":"e_1_3_6_26_2","doi-asserted-by":"publisher","DOI":"10.1037\/a0023304"},{"key":"e_1_3_6_27_2","doi-asserted-by":"publisher","DOI":"10.1108\/08858620210419754"},{"key":"e_1_3_6_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2019.101284"},{"key":"e_1_3_6_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2010.05.001"},{"key":"e_1_3_6_30_2","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12032"},{"key":"e_1_3_6_31_2","doi-asserted-by":"crossref","unstructured":"Beigi G Guo R Nou A et al. Protecting User Privacy: An Approach for Untraceable Web Browsing History and Unambiguous User Profiles. In: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining. WSDM \u201819 Association for Computing Machinery: New York NY USA; 2019; pp. 213\u2013221; doi: 10.1145\/3289600.3291026","DOI":"10.1145\/3289600.3291026"},{"key":"e_1_3_6_32_2","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.2013.11679130"},{"key":"e_1_3_6_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5510913"},{"key":"e_1_3_6_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3132230"},{"key":"e_1_3_6_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.367"},{"key":"e_1_3_6_36_2","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2019.1599500"},{"key":"e_1_3_6_37_2","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_3_6_38_2","doi-asserted-by":"publisher","DOI":"10.1108\/EBR-11-2018-0203"},{"key":"e_1_3_6_39_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22994"},{"key":"e_1_3_6_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.024"}],"container-title":["Cyberpsychology, Behavior, and Social Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/21522715251364300","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/21522715251364300","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/21522715251364300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T17:36:00Z","timestamp":1777397760000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/21522715251364300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":39,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["10.1177\/21522715251364300"],"URL":"https:\/\/doi.org\/10.1177\/21522715251364300","relation":{},"ISSN":["2152-2715","2152-2723"],"issn-type":[{"value":"2152-2715","type":"print"},{"value":"2152-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8]]}}}