{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T16:22:26Z","timestamp":1773850946058,"version":"3.50.1"},"reference-count":86,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Cyberhate presents a multifaceted, context-sensitive challenge that existing detection methods often struggle to tackle effectively. Large language models (LLMs) exhibit considerable potential for improving cyberhate detection due to their advanced contextual understanding. However, detection alone is insufficient; it is crucial for software to also promote healthier user behaviors and empower individuals to actively confront the spread of cyberhate. This study investigates whether integrating large language models (LLMs) with persuasive technology (PT) can effectively detect cyberhate and encourage prosocial user behavior in digital spaces. Through an empirical study, we examine users\u2019 perceptions of a self-monitoring persuasive strategy designed to reduce cyberhate. Specifically, the study introduces the Comment Analysis Feature to limit cyberhate spread, utilizing a prompt-based fine-tuning approach combined with LLMs. By framing users\u2019 comments within the relevant context of cyberhate, the feature classifies input as either cyberhate or non-cyberhate and generates context-aware alternative statements when necessary to encourage more positive communication. A case study evaluated its real-world performance, examining user comments, detection accuracy, and the impact of alternative statements on user engagement and perception. The findings indicate that while most of the users (83%) found the suggestions clear and helpful, some resisted them, either because they felt the changes were irrelevant or misaligned with their intended expression (15%) or because they perceived them as a form of censorship (36%). However, a substantial number of users (40%) believed the interventions enhanced their language and overall commenting tone, with 68% suggesting they could have a positive long-term impact on reducing cyberhate. These insights highlight the potential of combining LLMs and PT to promote healthier online discourse while underscoring the need to address user concerns regarding relevance, intent, and freedom of expression.<\/jats:p>","DOI":"10.3390\/computers14050173","type":"journal-article","created":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T07:44:23Z","timestamp":1746171863000},"page":"173","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Combining the Strengths of LLMs and Persuasive Technology to Combat Cyberhate"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0526-8220","authenticated-orcid":false,"given":"Malik","family":"Almaliki","sequence":"first","affiliation":[{"name":"Department of Computer Science, College of Computer Science and Engineering, Taibah University, Yanbu 966144, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6822-1008","authenticated-orcid":false,"given":"Abdulqader M.","family":"Almars","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer Science and Engineering, Taibah University, Yanbu 966144, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3975-7559","authenticated-orcid":false,"given":"Khulood O.","family":"Aljuhani","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer Science and Engineering, Taibah University, Yanbu 966144, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4728-590X","authenticated-orcid":false,"given":"El-Sayed","family":"Atlam","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computer Science and Engineering, Taibah University, Yanbu 966144, Saudi Arabia"},{"name":"Department of Computer Science, Faculty of Science, Tanta University, Tanta 31527, Gharbia, Egypt"}]}],"member":"1968","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"12334","DOI":"10.1109\/ACCESS.2022.3146712","article-title":"Hann: Hybrid attention neural network for detecting COVID-19 related rumors","volume":"10","author":"Almars","year":"2022","journal-title":"IEEE Access"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1093\/jeea\/jvaa045","article-title":"Fanning the flames of hate: Social media and hate crime","volume":"19","author":"Schwarz","year":"2021","journal-title":"J. Eur. Econ. Assoc."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Nobata, C., Tetreault, J., Thomas, A., Mehdad, Y., and Chang, Y. (2016, January 11\u201315). Abusive language detection in online user content. Proceedings of the 25th International Conference on World Wide Web, Montreal, QC, Canada.","DOI":"10.1145\/2872427.2883062"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Noor, T.H., Almars, A.M., Alwateer, M., Almaliki, M., Gad, I., and Atlam, E.S. (2022). Sarima: A seasonal autoregressive integrated moving average model for crime analysis in Saudi Arabia. Electronics, 11.","DOI":"10.3390\/electronics11233986"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Blaya, C. (2019). Cyberhaine: Les Jeunes et la Violence sur Internet, Nouveau Monde.","DOI":"10.14375\/NP.9782369427704"},{"key":"ref_6","unstructured":"Machackova, H., Blaya, C., Bedrosova, M., Smahel, D., and Staksrud, E. (2024, December 30). Children\u2019s Experiences with Cyberhate. Available online: https:\/\/eprints.lse.ac.uk\/106730\/1\/EUkidsonline_childrens_experiences_wth_cyberhate.pdf."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Wachs, S., and Wright, M.F. (2018). Associations between bystanders and perpetrators of online hate: The moderating role of toxic online disinhibition. Int. J. Environ. Res. Public Health, 15.","DOI":"10.3390\/ijerph15092030"},{"key":"ref_8","unstructured":"League, A.D. (2021). Online Hate and Harassment. The American Experience 2021, Center for Technology and Society."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Almaliki, M., Almars, A.M., Gad, I., and Atlam, E.S. (2023). Abmm: Arabic bert-mini model for hate-speech detection on social media. Electronics, 12.","DOI":"10.3390\/electronics12041048"},{"key":"ref_10","unstructured":"Ponte, C., and Batista, S. (2024, December 30). EU kids online Portugal. Usos, compet\u00eancias, riscos e media\u00e7\u00f5es da internet reportados por crian\u00e7as e jovens (9-17 anos). EU Kids Online e NOVA FCSH. Available online: https:\/\/fabricadesites.fcsh.unl.pt\/eukidsonline\/wp-content\/uploads\/sites\/36\/2019\/03\/RELATO%CC%81RIO-FINAL-EU-KIDS-ONLINE.docx.pdf."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"323","DOI":"10.34768\/amcs-2022-0024","article-title":"Hybrid deep learning model-based prediction of images related to cyberbullying","volume":"32","author":"Elmezain","year":"2022","journal-title":"Int. J. Appl. Math. Comput. Sci."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Costa, S., Mendes da Silva, B., and Tavares, M. (2021, January 13\u201315). Video games and gamification against online hate speech?. Proceedings of the 10th International Conference on Digital and Interactive Arts, Aveiro, Portugal.","DOI":"10.1145\/3483529.3483679"},{"key":"ref_13","first-page":"1435","article-title":"Intermediaries and hate speech: Fostering digital citizenship for our information age","volume":"91","author":"Citron","year":"2011","journal-title":"BUL Rev."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Cao, R., Lee, R.K.W., and Hoang, T.A. (2020, January 6\u201310). DeepHate: Hate speech detection via multi-faceted text representations. Proceedings of the 12th ACM Conference on Web Science, Southampton, UK.","DOI":"10.1145\/3394231.3397890"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1481","DOI":"10.1007\/s00607-022-01062-9","article-title":"Users opinion and emotion understanding in social media regarding COVID-19 vaccine","volume":"104","author":"Almars","year":"2022","journal-title":"Computing"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Nugroho, K., Noersasongko, E., Fanani, A.Z., and Basuki, R.S. (2019, January 24\u201325). Improving random forest method to detect hatespeech and offensive word. Proceedings of the 2019 International Conference on Information and Communications Technology (ICOIACT), Yogyakarta, Indonesia.","DOI":"10.1109\/ICOIACT46704.2019.8938451"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Arango, A., P\u00e9rez, J., and Poblete, B. (2019, January 21\u201325). Hate speech detection is not as easy as you may think: A closer look at model validation. Proceedings of the 42nd International ACM Sigir Conference on Research and Development in Information Retrieval, Paris, France.","DOI":"10.1145\/3331184.3331262"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"128923","DOI":"10.1109\/ACCESS.2020.3009244","article-title":"Deep learning based fusion approach for hate speech detection","volume":"8","author":"Zhou","year":"2020","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Swamy, S.D., Jamatia, A., and Gamb\u00e4ck, B. (2019, January 3\u20134). Studying generalisability across abusive language detection datasets. Proceedings of the 23rd Conference on Computational Natural Language Learning (CoNLL), Hong Kong, China.","DOI":"10.18653\/v1\/K19-1088"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"e598","DOI":"10.7717\/peerj-cs.598","article-title":"Towards generalisable hate speech detection: A review on obstacles and solutions","volume":"7","author":"Yin","year":"2021","journal-title":"PeerJ Comput. Sci."},{"key":"ref_21","unstructured":"Mathew, B., Dutt, R., Goyal, P., and Mukherjee, A. (July, January 30). Spread of hate speech in online social media. Proceedings of the 10th ACM Conference on Web Science, Boston, MA, USA."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"107013","DOI":"10.1016\/j.chb.2021.107013","article-title":"The relation between the cyberhate and cyberbullying experiences of adolescents in the Czech Republic, Poland, and Slovakia","volume":"126","author":"Bedrosova","year":"2022","journal-title":"Comput. Hum. Behav."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3415163","article-title":"Hate begets hate: A temporal study of hate speech","volume":"4","author":"Mathew","year":"2020","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"117385","DOI":"10.1109\/ACCESS.2023.3326254","article-title":"Cyberhate Dissemination: A Systematic Literature Map","volume":"11","author":"Almaliki","year":"2023","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"555","DOI":"10.5771\/2192-4007-2018-4-555","article-title":"Perceiving threat and feeling responsible. How severity of hate speech, number of bystanders, and prior reactions of others affect bystanders\u2019 intention to counterargue against hate speech on Facebook","volume":"7","author":"Leonhard","year":"2018","journal-title":"SCM Stud. Commun. Media"},{"key":"ref_26","unstructured":"Schieb, C., and Preuss, M. (2016, January 9\u201313). Governing hate speech by means of counterspeech on Facebook. Proceedings of the 66th ICA Annual Conference, Fukuoka, Japan."},{"key":"ref_27","unstructured":"Preu\u00df, M., Tetzlaff, F., and Zick, A. (2017). Publizieren wird zur Mutprobe. Studie zur Wahrnehmung von und Erfahrungen mit Angriffen unter JournalistInnen [Publishing Is Becoming a Test of Courage: A Study on Perceptions and Experiences Concerning Aggression Among Journalists]. Report, Mediendienst Integration."},{"key":"ref_28","unstructured":"Bartlett, J., and Krasodomski-Jones, A. (2024, December 30). Counter-Speech Examining Content That Challenges Extremism Online. DEMOS. Available online: https:\/\/demos.co.uk\/wp-content\/uploads\/2015\/10\/Counter-speech.pdf."},{"key":"ref_29","first-page":"319","article-title":"Hate speech in cyberspace","volume":"49","author":"Delgado","year":"2014","journal-title":"Wake Forest L. Rev."},{"key":"ref_30","unstructured":"Darley, J.M. (1970). The Unresponsive Bystander: Why Doesn\u2019t He Help?, Appleton-Century Crofts."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1007\/s00779-012-0591-5","article-title":"A foundation for the study of behavior change support systems","volume":"17","year":"2013","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Oinas-Kukkonen, H., and Harjumaa, M. (2008, January 10\u201315). Towards deeper understanding of persuasion in software and information systems. Proceedings of the First International Conference on Advances in Computer-Human Interaction, Sainte Luce, France.","DOI":"10.1109\/ACHI.2008.31"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Fogg, B.J. (2009, January 26\u201329). Creating persuasive technologies: An eight-step design process. Proceedings of the 4th International Conference on Persuasive Technology, Claremont, CA, USA.","DOI":"10.1145\/1541948.1542005"},{"key":"ref_34","unstructured":"Alhasani, M., Mulchandani, D., Oyebode, O., and Orji, R. (2020). A Systematic Review of Persuasive Strategies in Stress Management Apps. BCSS@ PERSUASIVE, Available online: https:\/\/ceur-ws.org\/Vol-2662\/BCSS2020_paper4.pdf."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1177\/1460458216650979","article-title":"Persuasive technology for health and wellness: State-of-the-art and emerging trends","volume":"24","author":"Orji","year":"2018","journal-title":"Health Inform. J."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s41239-019-0142-5","article-title":"Persuasive technology for enhanced learning behavior in higher education","volume":"16","author":"Widyasari","year":"2019","journal-title":"Int. J. Educ. Technol. High. Educ."},{"key":"ref_37","unstructured":"Win, K.T., Mullan, J., Howard, S.K., and Oinas-Kukkonen, H. (2025, January 04). Persuasive Systems Design Features in Promoting Medication Management for Consumers. Available online: https:\/\/scholarspace.manoa.hawaii.edu\/server\/api\/core\/bitstreams\/e876d59d-2ae4-4089-a482-40881f39d75d\/content."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"5223","DOI":"10.1016\/j.aej.2021.10.046","article-title":"A new approach in identifying the psychological impact of COVID-19 on university student\u2019s academic performance","volume":"61","author":"Atlam","year":"2022","journal-title":"Alex. Eng. J."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"e14853","DOI":"10.1111\/ijcp.14853","article-title":"Psychological problems among the university students in Saudi Arabia during the COVID-19 pandemic","volume":"75","author":"Mohammed","year":"2021","journal-title":"Int. J. Clin. Pract."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"e8342","DOI":"10.2196\/jmir.8342","article-title":"Peer-based social media features in behavior change interventions: Systematic review","volume":"20","author":"Elaheebocus","year":"2018","journal-title":"J. Med. Internet Res."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1111\/jcal.12433","article-title":"Persuasive social features that promote knowledge sharing among tertiary students on social networking sites: An empirical study","volume":"36","author":"Wiafe","year":"2020","journal-title":"J. Comput. Assist. Learn."},{"key":"ref_42","unstructured":"(2024, December 30). Introducing ChatGPT. Available online: https:\/\/openai.com\/index\/chatgpt\/."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Bang, Y., Cahyawijaya, S., Lee, N., Dai, W., Su, D., Wilie, B., Lovenia, H., Ji, Z., Yu, T., and Chung, W. (2023). A multitask, multilingual, multimodal evaluation of chatgpt on reasoning, hallucination, and interactivity. arXiv.","DOI":"10.18653\/v1\/2023.ijcnlp-main.45"},{"key":"ref_44","unstructured":"Guo, B., Zhang, X., Wang, Z., Jiang, M., Nie, J., Ding, Y., Yue, J., and Wu, Y. (2023). How close is chatgpt to human experts? comparison corpus, evaluation, and detection. arXiv."},{"key":"ref_45","unstructured":"Zhao, W.X., Zhou, K., Li, J., Tang, T., Wang, X., Hou, Y., Min, Y., Zhang, B., Zhang, J., and Dong, Z. (2023). A survey of large language models. arXiv."},{"key":"ref_46","unstructured":"Chiu, K.L., Collins, A., and Alexander, R. (2021). Detecting hate speech with gpt-3. arXiv."},{"key":"ref_47","first-page":"1","article-title":"\u201cHOT\u201d ChatGPT: The promise of ChatGPT in detecting and discriminating hateful, offensive, and toxic comments on social media","volume":"18","author":"Li","year":"2024","journal-title":"ACM Trans. Web"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"He, X., Zannettou, S., Shen, Y., and Zhang, Y. (2024, January 20\u201322). You only prompt once: On the capabilities of prompt learning on large language models to tackle toxic content. Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP54263.2024.00061"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Zannettou, S., Finkelstein, J., Bradlyn, B., and Blackburn, J. (2020, January 3\u20136). A quantitative approach to understanding online antisemitism. Proceedings of the International AAAI Conference on Web and Social Media, Buffalo, NY, USA.","DOI":"10.1609\/icwsm.v14i1.7343"},{"key":"ref_50","unstructured":"Warner, W., and Hirschberg, J. (2012, January 7). Detecting hate speech on the world wide web. Proceedings of the Second Workshop on Language in Social Media, Montreal, QC, Canada."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Sambasivan, N., Batool, A., Ahmed, N., Matthews, T., Thomas, K., Gayt\u00e1n-Lugo, L.S., Nemer, D., Bursztein, E., Churchill, E., and Consolvo, S. (2019, January 4\u20139). \u201cThey Don\u2019t Leave Us Alone Anywhere We Go\u201d Gender and Digital Abuse in South Asia. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow, Scotland, UK.","DOI":"10.1145\/3290605.3300232"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Kwak, H., Blackburn, J., and Han, S. (2015, January 18\u201323). Exploring cyberbullying and other toxic behavior in team competition online games. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul, Republic of Korea.","DOI":"10.1145\/2702123.2702529"},{"key":"ref_53","unstructured":"Cheng, J., Danescu-Niculescu-Mizil, C., and Leskovec, J. (2015, January 26\u201329). Antisocial behavior in online discussion communities. Proceedings of the International AAAI Conference on Web and Social Media, Oxford, UK."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Thomas, K., Akhawe, D., Bailey, M., Boneh, D., Bursztein, E., Consolvo, S., Dell, N., Durumeric, Z., Kelley, P.G., and Kumar, D. (2021, January 24\u201327). Sok: Hate, harassment, and the changing landscape of online abuse. Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP40001.2021.00028"},{"key":"ref_55","first-page":"1","article-title":"Addressing cyber harassment: An overview of hate crimes in cyberspace","volume":"6","author":"Citron","year":"2014","journal-title":"Case W. Res. JL Tech. Internet"},{"key":"ref_56","unstructured":"Khali, L. (2019). Identifying cyber hate: Overview of online hate speech policies &finding possible measures to counter hate speech on internet. J. Media Stud., 31, Available online: http:\/\/111.68.103.26\/\/journals\/index.php\/jms\/article\/view\/1925."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3324997","article-title":"\u201cThe enemy among us\u201d detecting cyber hate speech with threats-based othering language embeddings","volume":"13","author":"Alorainy","year":"2019","journal-title":"ACM Trans. Web (TWEB)"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Casula, C., and Tonelli, S. (2023, January 2\u20136). Generation-Based Data Augmentation for Offensive Language Detection: Is It Worth It?. Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, Dubrovnik, Croatia.","DOI":"10.18653\/v1\/2023.eacl-main.244"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Liu, Q., Wu, X., Zhao, X., Zhu, Y., Xu, D., Tian, F., and Zheng, Y. (2024, January 14\u201318). When MOE Meets LLMs: Parameter Efficient Fine-tuning for Multi-task Medical Applications. Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, Washington, DC, USA.","DOI":"10.1145\/3626772.3657722"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Adaji, I., and Adisa, M. (2022, January 4\u20137). A review of the use of persuasive technologies to influence sustainable behaviour. Proceedings of the Adjunct Proceedings of the 30th ACM Conference on User Modeling, Adaptation and Personalization, Barcelona, Spain.","DOI":"10.1145\/3511047.3537653"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Oinas-Kukkonen, H., and Harjumaa, M. (2018). Persuasive systems design: Key issues, process model and system features 1. Routledge Handbook of Policy Design, Routledge.","DOI":"10.4324\/9781351252928-6"},{"key":"ref_62","unstructured":"Jain, A. (2021). Impact of Digitalization and Artificial Intelligence as Causes and Enablers of Organizational Change, Nottingham University Business School."},{"key":"ref_63","first-page":"684","article-title":"An Inspection of Learning Management Systems on Persuasiveness of Interfaces and Persuasive Design: A Case in a Higher Learning Institution","volume":"13","author":"Ahmad","year":"2022","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Bergram, K., Djokovic, M., Bezen\u00e7on, V., and Holzer, A. (May, January 29). The digital landscape of nudging: A systematic literature review of empirical research on digital nudges. Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA.","DOI":"10.1145\/3491102.3517638"},{"key":"ref_65","first-page":"354","article-title":"Combating misinformation in the age of llms: Opportunities and challenges","volume":"45","author":"Chen","year":"2023","journal-title":"AI Mag."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Oyebode, O., Alqahtani, F., and Orji, R. (2022, January 29\u201331). Exploring for possible effect of persuasive strategy implementation choices: Towards tailoring persuasive technologies. Proceedings of the International Conference on Persuasive Technology, Virtual Event.","DOI":"10.1007\/978-3-030-98438-0_12"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"e23968","DOI":"10.2196\/23968","article-title":"Need for cognition among users of self-monitoring systems for physical activity: Survey study","volume":"5","author":"Halttu","year":"2021","journal-title":"JMIR Form. Res."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1016\/0749-5978(91)90022-L","article-title":"Social Cognitive Theory of Self-Regulation","volume":"50","author":"Bandura","year":"1991","journal-title":"Organ. Behav. Hum. Decis. Processes"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/52.391832","article-title":"Case studies for method and tool evaluation","volume":"12","author":"Kitchenham","year":"1995","journal-title":"IEEE Softw."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., and Wessl\u00e9n, A. (2012). Experimentation in Software Engineering, Springer.","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"111544","DOI":"10.1016\/j.knosys.2024.111544","article-title":"Prompt for extraction: Multiple templates choice model for event extraction","volume":"289","author":"Peng","year":"2024","journal-title":"Knowl.-Based Syst."},{"key":"ref_72","unstructured":"Ziegler, A., and Berryman, J. (2023). A developer\u2019s guide to prompt engineering and LLMs. GitHub Blog., 17, Available online: https:\/\/github.blog\/ai-and-ml\/generative-ai\/prompt-engineering-guide-generative-ai-llms\/."},{"key":"ref_73","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI Blog"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Li, Y. (2023). A practical survey on zero-shot prompt design for in-context learning. arXiv.","DOI":"10.26615\/978-954-452-092-2_069"},{"key":"ref_75","unstructured":"MacNeil, S., Tran, A., Kim, J., Huang, Z., Bernstein, S., and Mogil, D. (2023). Prompt middleware: Mapping prompts for large language models to UI affordances. arXiv."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Feng, Y., Li, L., Xiang, Y., and Qin, X. (2023, January 12\u201315). PromptCL: Improving event representation via prompt template and contrastive learning. Proceedings of the CCF International Conference on Natural Language Processing and Chinese Computing, Foshan, China.","DOI":"10.1007\/978-3-031-44693-1_21"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1093\/ortho\/30.3.245","article-title":"How to\u2026 Write and analyse a questionnaire","volume":"30","author":"Williams","year":"2003","journal-title":"J. Orthod."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Davidson, T., Warmsley, D., Macy, M., and Weber, I. (2017, January 15\u201318). Automated hate speech detection and the problem of offensive language. Proceedings of the International AAAI Conference on Web and Social Media, Montreal, QC, Canada.","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"ref_79","first-page":"4349","article-title":"Auditing algorithms: Research methods for detecting discrimination on internet platforms","volume":"22","author":"Sandvig","year":"2014","journal-title":"Data Discrim. Convert. Crit. Concerns Into Product. Inq."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Gillespie, T. (2018). Custodians of the Internet: Platforms, Content Moder Ation, and the Hidden Decisions That Shape Social Media, Yale University Press.","DOI":"10.12987\/9780300235029"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., and Guestrin, C. (2016, January 13\u201317). \u201cWhy should i trust you?\u201d Explaining the predictions of any classifier. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA.","DOI":"10.1145\/2939672.2939778"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3134666","article-title":"You can\u2019t stay here: The efficacy of reddit\u2019s 2015 ban examined through hate speech","volume":"1","author":"Chandrasekharan","year":"2017","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1089\/1094931041291295","article-title":"The online disinhibition effect","volume":"7","author":"Suler","year":"2004","journal-title":"Cyberpsychol. Behav."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Schmidt, A., and Wiegand, M. (2017, January 3\u20134). A survey on hate speech detection using natural language processing. Proceedings of the Fifth International Workshop on Natural Language Processing for Social Media, Valencia, Spain.","DOI":"10.18653\/v1\/W17-1101"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1007\/s00146-021-01301-1","article-title":"Excavating AI: The politics of images in machine learning training sets","volume":"36","author":"Crawford","year":"2021","journal-title":"Ai Soc."},{"key":"ref_86","doi-asserted-by":"crossref","unstructured":"Roberts, S.T. (2019). Behind the Screen: Content Moderation in the Shadows of Social Media, Yale University Press.","DOI":"10.12987\/9780300245318"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/5\/173\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:26:27Z","timestamp":1760030787000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/5\/173"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":86,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["computers14050173"],"URL":"https:\/\/doi.org\/10.3390\/computers14050173","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,2]]}}}