<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">JMIR Form Res</journal-id><journal-id journal-id-type="publisher-id">formative</journal-id><journal-id journal-id-type="index">27</journal-id><journal-title>JMIR Formative Research</journal-title><abbrev-journal-title>JMIR Form Res</abbrev-journal-title><issn pub-type="epub">2561-326X</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v10i1e84391</article-id><article-id pub-id-type="doi">10.2196/84391</article-id><article-categories><subj-group subj-group-type="heading"><subject>Original Paper</subject></subj-group></article-categories><title-group><article-title>Designing Psychologically Grounded Artificial Intelligence for Supporting Bystander-Based Cyberaggression Intervention: Mixed Methods Exploratory Study</article-title></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>Park</surname><given-names>Jinkyung Katie</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Yu</surname><given-names>Pinxuan (Alina)</given-names></name><degrees>PsyM</degrees><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Krishnan</surname><given-names>Vignesh</given-names></name><degrees>MS</degrees><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Li</surname><given-names>Huaye</given-names></name><degrees>MEng</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Reddy</surname><given-names>Linda A</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Singh</surname><given-names>Vivek K</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff4">4</xref></contrib></contrib-group><aff id="aff1"><institution>School of Computing, Clemson University</institution><addr-line>105 Sikes Hall</addr-line><addr-line>Clemson</addr-line><addr-line>SC</addr-line><country>United States</country></aff><aff id="aff2"><institution>Graduate School of Applied and Professional Psychology, Rutgers University</institution><addr-line>New Brunswick</addr-line><addr-line>NJ</addr-line><country>United States</country></aff><aff id="aff3"><institution>Department of Computer Science, Rutgers University</institution><addr-line>New Brunswick</addr-line><addr-line>NJ</addr-line><country>United States</country></aff><aff id="aff4"><institution>School of Communication and Informaiton, Rutgers University</institution><addr-line>New Brunswick</addr-line><addr-line>NJ</addr-line><country>United States</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Schwartz</surname><given-names>Amy</given-names></name></contrib><contrib contrib-type="editor"><name name-style="western"><surname>Balcarras</surname><given-names>Matthew</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Bolpagni</surname><given-names>Marco</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Li</surname><given-names>Yang-Jun</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Jinkyung Katie Park, PhD, School of Computing, Clemson University, 105 Sikes Hall, Clemson, SC, United States, 1 6784466336; <email>jinkyup@clemson.edu</email></corresp></author-notes><pub-date pub-type="collection"><year>2026</year></pub-date><pub-date pub-type="epub"><day>13</day><month>4</month><year>2026</year></pub-date><volume>10</volume><elocation-id>e84391</elocation-id><history><date date-type="received"><day>23</day><month>09</month><year>2025</year></date><date date-type="rev-recd"><day>29</day><month>12</month><year>2025</year></date><date date-type="accepted"><day>22</day><month>01</month><year>2026</year></date></history><copyright-statement>&#x00A9; Jinkyung Katie Park, Pinxuan (Alina) Yu, Vignesh Krishnan, Huaye Li, Linda Reddy, Vivek K Singh. Originally published in JMIR Formative Research (<ext-link ext-link-type="uri" xlink:href="https://formative.jmir.org">https://formative.jmir.org</ext-link>), 13.4.2026. </copyright-statement><copyright-year>2026</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Formative Research, is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://formative.jmir.org">https://formative.jmir.org</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://formative.jmir.org/2026/1/e84391"/><abstract><sec><title>Background</title><p>Cyberaggression poses a growing threat to mental health, contributing to increased distress, reduced self-esteem, and other adverse psychosocial outcomes. Although bystander intervention can mitigate the escalation and impact of cyberaggression, individuals often lack the confidence, strategies, or language to respond effectively in these high-stakes online interactions. Advances in generative artificial intelligence (AI) present a novel opportunity to facilitate digital behavior change by assisting bystanders with contextually appropriate, theory-informed intervention messages that promote safer online environments and support mental well-being.</p></sec><sec><title>Objective</title><p>This mixed methods design study aimed to explore the feasibility of using generative AI to support bystander intervention in cyberaggression on social media. Specifically, we examined whether AI can generate effective responses aligned with established intervention strategies and how these responses are perceived in terms of their potential to de-escalate online harm and foster behavior change.</p></sec><sec sec-type="methods"><title>Methods</title><p>We collected 1000 real-world cyberaggression examples from public social media datasets and generated bystander intervention responses using 3 distinct prompt strategies: a generic policy reminder, a baseline GPT prompt, and a theory-driven GPT prompt (AllyGPT). To evaluate the responses, we conducted computational linguistic analyses to assess their psycholinguistic features and carried out a mixed methods evaluation. Three trained coders rated each message on favorability, conversational impact, and potential to change behavior and later participated in semistructured interviews to reflect on their evaluation process and perceptions of intervention effectiveness.</p></sec><sec sec-type="results"><title>Results</title><p>Linguistic analyses revealed that baseline GPT responses exhibited more emotionally positive and authentic language compared to AllyGPT responses, which showed a more analytical and assertive tone. Policy reminder messages were linguistically rigid and lacked emotional nuance. Human evaluation results showed that AllyGPT responses received the highest effectiveness ratings for low-incivil cyberaggression cases in 2 dimensions (favorability and changing behavior), and baseline GPT works better for mid and high levels for all effectiveness dimensions. For medium- and high-incivility aggressions, baseline GPT responses received the highest ratings across all 3 dimensions of effectiveness (favorability, discussion-shifting potential, and likelihood of changing bullying behavior), followed by AllyGPT, with policy reminders rated lowest. Qualitative feedback further emphasized that baseline GPT responses were perceived as natural and inclusive, while AllyGPT responses, although grounded in psychological theory, were sometimes viewed as overly direct. Policy reminders were considered clear but lacked persuasive impact.</p></sec><sec sec-type="conclusions"><title>Conclusions</title><p>Our work showed that designing effective AI-generated bystander interventions requires a deep sensitivity to platform culture, social context, and user expectations. By combining psychological theory with adaptive, conversational design and ongoing feedback loops, future systems can better support bystanders, delivering interventions that are not only contextually appropriate but also socially resonant and behaviorally impactful. As such, this work serves as a foundation for scalable, human-centered AI systems that promote safer online spaces and users&#x2019; mental well-being.</p></sec></abstract><kwd-group><kwd>cyberaggression</kwd><kwd>bystander intervention</kwd><kwd>generative artificial intelligence</kwd><kwd>AI</kwd><kwd>large language model</kwd><kwd>theory-driven intervention</kwd><kwd>digital well-being</kwd><kwd>mental health</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><sec id="s1-1"><title>Background</title><p>In today&#x2019;s digitized world, cyberaggression has become a critical mental health concern, affecting individuals across age groups and platforms [<xref ref-type="bibr" rid="ref1">1</xref>]. As an umbrella term encompassing behaviors such as cyberbullying, hate speech, and online harassment [<xref ref-type="bibr" rid="ref2">2</xref>], cyberaggression carries substantial emotional and psychological weight [<xref ref-type="bibr" rid="ref3">3</xref>]. Research consistently documents its adverse mental health impacts, including anxiety, depression, social withdrawal, and emotional dysregulation [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref5">5</xref>]. Meta-analyses further show that cybervictimization predicts depression, suicidal ideation, and suicide attempts among youth [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>]. These harms extend beyond adolescence, with adults also facing targeted abuse that undermines dignity, safety, and civic participation [<xref ref-type="bibr" rid="ref8">8</xref>-<xref ref-type="bibr" rid="ref10">10</xref>]. Cyberaggression often co-occurs with offline aggression, amplifying psychological effects [<xref ref-type="bibr" rid="ref11">11</xref>], and perpetrators themselves face risks such as low self-esteem, heightened aggression, and internalizing symptoms [<xref ref-type="bibr" rid="ref12">12</xref>]. Moreover, studies indicate that vulnerable populations, such as those with existing emotional or social difficulties, may experience exacerbated distress when targeted online [<xref ref-type="bibr" rid="ref13">13</xref>].</p><p>Recognizing these harms, scholars have examined strategies to prevent escalation and reduce impact [<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref16">16</xref>]. One promising approach involves bystanders, witnesses to online harassment who can interrupt harmful interactions, defend victims, or report abuse [<xref ref-type="bibr" rid="ref17">17</xref>]. Prior research has shown that online bystander intervention is often enacted through a range of behaviors beyond direct confrontation, including social norm signaling and emotional support for targets [<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref21">21</xref>]. Research has highlighted that bystanders&#x2019; active or passive involvement can substantially influence the course and outcomes of cyberaggression by enabling real-time de-escalation and reinforcing social norms without requiring formal moderation or punitive action [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. Yet, many remain hesitant due to uncertainty, fear of retaliation, or lack of effective language [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]. This work focuses on reducing barriers to action, specifically, uncertainty about how to intervene and a lack of effective language, rather than directly addressing bystanders&#x2019; underlying motivation or risk tolerance. Existing interventions often rely on static templates that fail to adapt to the nuances of diverse incidents [<xref ref-type="bibr" rid="ref26">26</xref>]. Generative artificial intelligence (AI), particularly large language models (LLMs), offers new potential by producing scalable, human-like language for intervention [<xref ref-type="bibr" rid="ref27">27</xref>]. However, few approaches are grounded in psychological theories of helping behavior, limiting their capacity to support intentional and effective action.</p><p>To address these gaps, this study introduces &#x201C;AllyGPT,&#x201D; a theory-driven LLM designed to support online bystander interventions by scaffolding context-sensitive, psychologically grounded response strategies. By integrating psychologically grounded prompt design with the generative capacities of LLMs, we aim to produce context-sensitive, linguistically appropriate responses that empower bystanders to intervene effectively. This approach advances scalable, theory-informed support for safer digital spaces and improved mental well-being.</p></sec><sec id="s1-2"><title>Related Work</title><sec id="s1-2-1"><title>The Role of Bystanders in Cyberaggression Intervention</title><p>Bystanders, those who witness but are not directly involved in cyberaggression, play a pivotal role in disrupting harmful dynamics [<xref ref-type="bibr" rid="ref28">28</xref>]. Their responses vary in tone, target, and intention, ranging from aggressive actions (eg, threats and insults) to prosocial support [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]. Within cyberbullying, where victims often struggle to defend themselves, bystanders are particularly well studied [<xref ref-type="bibr" rid="ref31">31</xref>]. Broadly, bystander interventions are categorized as aggressive, constructive, victim-focused, or constructive bullying-focused; aggressive strategies can escalate conflict [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref32">32</xref>], whereas constructive approaches, such as encouraging apologies, asking perpetrators to stop, or supporting victims with empathy or advice, are more effective in de-escalation [<xref ref-type="bibr" rid="ref33">33</xref>-<xref ref-type="bibr" rid="ref35">35</xref>]. Bystander interventions are uniquely embedded within ongoing interactions. Unlike post hoc moderation or long-term educational approaches, bystanders can intervene as harm emerges, offering immediate support to targets while signaling that aggressive behavior violates community norms [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. This ability to reduce harm in real time and shape collective expectations makes bystander intervention a critical and complementary strategy, particularly in early-stage incidents where formal enforcement is yet to be enacted.</p><p>Large-scale discourse analyses reveal that bystanders use diverse strategies, including callouts, mocking, education, and moderation. For example, Ray et al [<xref ref-type="bibr" rid="ref36">36</xref>] examined over 2 million Twitter and Reddit posts, finding that constructive approaches, such as educating perpetrators and mobilizing support, reduced hate speech and encouraged engagement, while mocking had little effect. Yet, intervention rates remained low, with bystanders active in only one of 6 Twitter threads and under 40% of Reddit discussions. These barriers highlight the need for scalable supports to help bystanders act effectively. Building on this, this study focuses on 5 constructive intervention subtypes, assessing both the linguistic quality (eg, tone and affect) and effectiveness (favorability, discussion shift, and behavior change) of LLM-generated responses.</p></sec><sec id="s1-2-2"><title>The Potential of LLMs in Cyberaggression Bystander Intervention</title><p>LLMs have emerged as powerful tools for mitigating online harms, including cyberaggression [<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. Their capacity to understand and generate human-like language enables novel approaches to detecting harmful content, supporting victims, and fostering prosocial interactions [<xref ref-type="bibr" rid="ref27">27</xref>]. For instance, Islam et al [<xref ref-type="bibr" rid="ref37">37</xref>] proposed an LLM-based cyberbullying detection pipeline combining preprocessing, query generation, and classification for early intervention. Similarly, Vanpech et al [<xref ref-type="bibr" rid="ref38">38</xref>] extended this approach using GPT-4 Vision to analyze images posted on Twitter and classify bullying content. These studies underscore LLMs&#x2019; potential in detection-focused interventions. Beyond detection, LLMs have been applied to bystander support and education. For example, Hedderich et al [<xref ref-type="bibr" rid="ref18">18</xref>] developed an LLM-based chatbot platform for K-12 classrooms, enabling educators to simulate social media interactions and teach bystander strategies. Similarly, Wu et al [<xref ref-type="bibr" rid="ref39">39</xref>] generated personalized persuasive messages aligned with strategies such as comforting, evoking, and scaffolding, showing that LLMs can adapt interventions to users&#x2019; contexts. Collectively, this work demonstrates growing interest in leveraging LLMs for intervention generation.</p><p>However, prior work has largely emphasized detection or educational use cases, leaving open questions about how LLMs can serve as in situ scaffolds for real-time bystander intervention during unfolding incidents of cyberaggression. In addition, prior studies emphasize technical alignment over psychological grounding [<xref ref-type="bibr" rid="ref40">40</xref>]. Without integration of established bystander theories, LLM-generated interventions risk overlooking the cognitive and emotional processes driving real-world decisions. To address this gap, our study examines 5 intervention strategies rooted in bystander theory, using prompt engineering to generate responses that are linguistically appropriate, context aware, and psychologically informed. Therefore, we ask, &#x201C;How can generative AI be designed to provide psychologically grounded, context-sensitive suggestions for bystanders intervening in cyberbullying scenarios?&#x201D;</p></sec></sec><sec id="s1-3"><title>Study Purpose</title><p>The primary goal of this study was to explore the potential of generative AI to support scalable, psychologically grounded bystander intervention responses to cyberbullying. To meet this goal, this study aimed to address 3 objectives:</p><list list-type="bullet"><list-item><p>To design prompt strategies informed by psychological theories of bystander behavior (eg, the 5 bystander intervention responses) for generating constructive, context-sensitive intervention messages using LLMs</p></list-item><list-item><p>To evaluate the quality and effectiveness of AI-generated bystander intervention responses (eg, standard policy reminder, baseline GPT, and theory-driven GPT) across dimensions such as linguistic characteristics, favorability, potential for altering discussion and likelihood of changing aggressive behavior</p></list-item><list-item><p>To generate design guidelines and theoretical insights for building safe, scalable, and psychologically informed AI systems that empower bystanders to intervene in harmful online interactions</p></list-item></list><p>We addressed the following research questions (RQs):</p><list list-type="bullet"><list-item><p>RQ1: How do bystander intervention responses generated by (1) standard policy reminder, (2) baseline GPT, and (3) theory-driven AllyGPT differ in terms of psycholinguistic characteristics (eg, authoritative, emotional tone)?</p></list-item><list-item><p>RQ2: How effective are bystander intervention responses generated by (1) standard policy reminder, (2) baseline GPT, and (3) theory-driven AllyGPT?</p></list-item></list></sec></sec><sec id="s2" sec-type="methods"><title>Methods</title><sec id="s2-1"><title>Study Overview</title><p>We collected publicly available datasets of real-world cyberaggression and developed 3 bystander intervention strategies reflecting varying levels of specificity and psychological framing. Using these strategies, we generated intervention responses. To address RQ1, we analyzed their linguistic and psychological characteristics with the Linguistic Inquiry and Word Count (LIWC) tool, assessing features such as tone, cognitive processes, emotionality, and authenticity. To address RQ2, we conducted a human-centered evaluation in which three trained external coders rated each response on (1) <italic>perceived favorability</italic>, (2) <italic>potential to shift the discussion</italic>, and (3) <italic>likelihood of changing aggressive behavior</italic>. Coders then participated in semistructured interviews to elaborate on their evaluation criteria, preferences, and reflections. Quantitative and qualitative analyses were conducted to compare psycholinguistic features and perceived effectiveness across strategies.</p></sec><sec id="s2-2"><title>Ethical Considerations</title><p>The study was approved by Rutgers University&#x2019;s Institutional Review Board (Study ID: Pro2024001658). All coders provided informed consent prior to participation and were informed of their rights, including the ability to withdraw at any time without penalty. Given the potentially sensitive nature of the materials, coders were informed in advance about the content and provided with contact information for support resources if participation caused discomfort. Interview recordings and transcripts were deidentified prior to analysis, and all study data were stored on an institutional review board&#x2013;approved, secure cloud server with access restricted to authorized research personnel only.</p></sec><sec id="s2-3"><title>Data Collection</title><sec id="s2-3-1"><title>Cyberbullying Dataset</title><p>We collected 1000 cyberaggression examples from the 2 sources [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. Of 1000 cyberaggression examples, 200 were collected from the dataset created by Huang et al [<xref ref-type="bibr" rid="ref40">40</xref>], while 800 were collected from the dataset created by ElSherief et al [<xref ref-type="bibr" rid="ref41">41</xref>].</p></sec><sec id="s2-3-2"><title>Bystander Intervention Strategies</title><sec id="s2-3-2-1"><title>Overview</title><p>We had three bystander intervention strategies: (1) standard policy reminder, (2) baseline GPT, and (3) AllyGPT. Each condition supports different mechanisms that enable bystanders to progress toward intervention. Policy reminders act as normative interventions, signaling collective standards that legitimize action without direct confrontation [<xref ref-type="bibr" rid="ref21">21</xref>]. Baseline GPT responses provide generic intervention scaffolds that reduce barriers to knowing how to act [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref44">44</xref>]. AllyGPT responses are theory-aligned, context-sensitive interventions that scaffold empathy, perspective-taking, or de-escalation to address cognitive and affective barriers to action [<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref47">47</xref>]. Below, we explain how we designed our bystander intervention strategies.</p></sec><sec id="s2-3-2-2"><title>Strategy 1: Standard Policy Reminder</title><p>The following standard policy reminder was taken from the Reddit platform [<xref ref-type="bibr" rid="ref48">48</xref>] , and the same reminder was applied as an intervention message to all cyberbullying examples:</p><disp-quote><p>We do not tolerate the harassment, threatening, or bullying of people on our site; nor do we tolerate communities dedicated to this behavior.</p></disp-quote></sec><sec id="s2-3-2-3"><title>Strategy 2: Baseline GPT</title><p>For the baseline GPT strategy, we used the following prompt to generate bystander intervention responses using the GPT-4o model. The same prompt was used to generate intervention responses for all cyberbullying examples: &#x201C;Generate a bystander intervention response to the comment.&#x201D;</p></sec><sec id="s2-3-2-4"><title>Strategy 3: AllyGPT</title><p>To tailor intervention messages to the specific context of each cyberaggression scenario, we designed a structured prompting framework in which GPT first assessed the level of incivility and direction of aggression. With the 2 dimensions, a decision tree (see below for details) was used to select the appropriate combination of bystander intervention strategies. The same prompt was used with GPT-4o to generate intervention responses for all cyberaggression examples. The full mapping between the aggression context and intervention strategy is detailed below.</p></sec></sec></sec><sec id="s2-4"><title>The Theoretical Ground and Design of AllyGPT</title><sec id="s2-4-1"><title>The 5 Bystander Strategies Designed Based on Theories and/or Empirical Evidence in Psychology</title><p>We implemented 5 theoretically and empirically grounded strategies for prompting LLM-generated bystander intervention responses. Each strategy was derived from psychological literature and operationalized through specific prompts in the form of &#x201C;dos and don&#x2019;ts&#x201D; to guide GPT responses. <xref ref-type="table" rid="table1">Table 1</xref> presents a brief overview of the definition, psychological basis, and prompting guidelines for each bystander intervention (see <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> for full details).</p><table-wrap id="t1" position="float"><label>Table 1.</label><caption><p>Definition, psychological ground, and prompt of the 5 bystander intervention strategies.</p></caption><table id="table1" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Strategy</td><td align="left" valign="bottom">Definition</td><td align="left" valign="bottom">Psychological basis</td><td align="left" valign="bottom">Prompting guidelines</td></tr></thead><tbody><tr><td align="left" valign="top">Calling out the aggressive behavior</td><td align="left" valign="top">Explicitly points out the harm or injustice in the aggressive behavior and may question or ask the perpetrator to stop.</td><td align="left" valign="top">Defended victims report higher self-esteem and less distress than those without defenders [<xref ref-type="bibr" rid="ref49">49</xref>].</td><td align="left" valign="top"><list list-type="bullet"><list-item><p><italic>Do</italic>: Focus on the content of the aggression.</p></list-item><list-item><p><italic>Don&#x2019;t</italic>: Avoid swearing or personal insults.</p></list-item></list></td></tr><tr><td align="left" valign="top">Correcting misinformation</td><td align="left" valign="top">Offers factual corrections using evidence, statistics, or historical context to challenge harmful or misleading claims.</td><td align="left" valign="top">Educative interventions are shown to de-escalate online discourse and create long-term learning moments [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref50">50</xref>].</td><td align="left" valign="top"><list list-type="bullet"><list-item><p><italic>Do</italic>: Focus on facts and the behavior, not the person.</p></list-item><list-item><p><italic>Don&#x2019;t</italic>: Avoid engaging in back-and-forth debate.</p></list-item></list></td></tr><tr><td align="left" valign="top">Validating and expressing empathy</td><td align="left" valign="top">Acknowledges the victim&#x2019;s emotional experience and offers emotional support.</td><td align="left" valign="top">Empathic responses increase self-esteem and coping and mitigate the negative effects of aggression [<xref ref-type="bibr" rid="ref51">51</xref>-<xref ref-type="bibr" rid="ref53">53</xref>].</td><td align="left" valign="top"><list list-type="bullet"><list-item><p><italic>Do</italic>: Validate the victim&#x2019;s specific statements and show care and understanding.</p></list-item><list-item><p><italic>Don&#x2019;</italic>t: Avoid making assumptions or escalating the conflict.</p></list-item></list></td></tr><tr><td align="left" valign="top">Advising disengagement</td><td align="left" valign="top">Encourages the victim to leave the conversation or disengage from the harmful interaction to prioritize their well-being.</td><td align="left" valign="top">Supportive disengagement can improve emotional adjustment and empower the victim without implying blame [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref55">55</xref>].</td><td align="left" valign="top"><list list-type="bullet"><list-item><p><italic>Do</italic>: Empower the victim to prioritize self-care and autonomy.</p></list-item><list-item><p><italic>Don&#x2019;t</italic>: Avoid commands or framing exit as weakness.</p></list-item></list></td></tr><tr><td align="left" valign="top">5.Redirecting the discussion</td><td align="left" valign="top">Shifts the conversation away from the aggression topic to defuse tension and divert attention from the perpetrator.</td><td align="left" valign="top">Topic redirection minimizes exposure to harm and helps de-escalate aggression [<xref ref-type="bibr" rid="ref56">56</xref>].</td><td align="left" valign="top"><list list-type="bullet"><list-item><p><italic>Do</italic>: Introduce a new, unrelated topic to shift attention.</p></list-item><list-item><p><italic>Don&#x2019;t</italic>: Avoid acknowledging or directly responding to the aggressive content.</p></list-item></list></td></tr></tbody></table></table-wrap></sec><sec id="s2-4-2"><title>Decision Tree for Selecting Strategies and Drafting Bystander Intervention Message</title><p>To generate bystander intervention responses, we prompted AllyGPT to first assess each aggressive message based on 2 dimensions: incivility level (low, moderate, or high) and direction (group targeted vs individual targeted). These dimensions are grounded in bystander intervention theory and empirical research on cyberaggression, which identifies severity appraisal and target identifiability as primary determinants of whether and how bystanders intervene. Bystander intervention theory conceptualizes intervention as a sequential process in which individuals must first interpret an event as sufficiently serious to warrant action and to assume responsibility [<xref ref-type="bibr" rid="ref44">44</xref>], while empirical studies show that incident severity strongly predicts intervention likelihood and interacts with empathy and responsibility attribution [<xref ref-type="bibr" rid="ref45">45</xref>]. Direction further shapes responses by influencing emotional salience, perceived responsibility, and social visibility: person-targeted aggression elicits clearer moral judgments and stronger empathic engagement, whereas group-targeted harm more often leads to diffusion of responsibility and reduced effectiveness of individualized responses [<xref ref-type="bibr" rid="ref46">46</xref>]. Prior work also suggests that empathy-focused strategies are more effective in lower-severity contexts, while assertive or confrontational approaches are more appropriate in higher-severity or public settings [<xref ref-type="bibr" rid="ref47">47</xref>]. Together, these insights informed AllyGPT&#x2019;s selection and conditional combination of intervention strategies to generate context-sensitive bystander responses. Below, we present the prompt encoding this decision logic.</p><list list-type="order"><list-item><p>Assess the <italic>incivility level</italic> of the aggressive message:</p><list list-type="alpha-lower"><list-item><p>If the message does not contain profane language such as name-calling, swearing, or threatening content, then the incivility level of the message will be <italic>low</italic>.</p></list-item><list-item><p>If the message contains name-calling, slang, or swearing content but does not include threats of violence or aggression, then the incivility level of the message will be <italic>moderate</italic>.</p></list-item><list-item><p>If the message contains threats, violence, or aggression, then the incivility level of the message will be <italic>high</italic>.</p></list-item></list></list-item><list-item><p>Then assess the <italic>direction</italic> of the bullying:</p><list list-type="alpha-lower"><list-item><p>If the message is more general and not person-specific (eg, vague insults, general hateful comments, and directed at a group but not an individual), then the direction is <italic>group targeted</italic>.</p></list-item><list-item><p>If the message is person-specific and targets an individual (eg, quoting a certain user&#x2019;s ID or name and personal attacks), then the direction is <italic>individual targeted</italic>.</p></list-item></list></list-item><list-item><p>Consider both the incivility level and direction to select and combine the most effective strategies, following the rationale that:</p><list list-type="alpha-lower"><list-item><p>If the message contains low to moderate incivility, consider educational approaches and distract attention; otherwise, prioritize removing the potential victim from further harm by suggesting leaving; and</p></list-item><list-item><p>If aggression is person specific and targets an individual, prioritize emotional support for the victim and removing the victim from further harm by suggesting leaving; otherwise, focus on education for misinformation and distracting attention.</p></list-item></list></list-item><list-item><p>Refer to the following suggestion for bystander intervention is made for different types of cyberaggression statements (<xref ref-type="fig" rid="figure1">Figure 1</xref>).</p></list-item></list><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>Visualized decision tree to generate bystander intervention responses.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="formative_v10i1e84391_fig01.png"/></fig><p>Through the above process, we generated 3 responses for each of the 1000 cyberaggression scenarios, resulting in a total of 3000 bystander responses (1000 per strategy) across the three intervention approaches: (1) standard policy reminder, (2) baseline GPT, and (3) AllyGPT.</p></sec></sec><sec id="s2-5"><title>Evaluation Metrics</title><sec id="s2-5-1"><title>Linguistic Differences</title><p>To evaluate the linguistic differences across bystander intervention responses generated by 3 different strategies, we used the LIWC [<xref ref-type="bibr" rid="ref57">57</xref>] to extract several linguistic features from the bystander responses. The features we extracted in this study included word count (total number of words), words per sentence (average sentence length), analytical thinking (degree of logical and formal thinking), authenticity (extent of honest and genuine expression), positive tone (prevalence of positive emotional language), negative tone (prevalence of negative emotional language), and netspeak (use of internet-specific shorthand and casual online expressions, eg, &#x201C;lol&#x201D; and &#x201C;brb&#x201D;).</p></sec><sec id="s2-5-2"><title>Perceived Effectiveness Measures</title><p>The effectiveness of the bystander intervention messages was evaluated using three variables: (1) <italic>perceived favorability</italic>, (2) <italic>discussion shift</italic>, and (3) <italic>behavior change</italic>. Three trained coders independently rated each bystander intervention response on 3 effectiveness dimensions using a 5-point Likert-type scale (1=strongly disagree and 5=strongly agree). The first dimension, <italic>perceived favorability,</italic> assessed the extent to which a response would likely be viewed positively by other social media users (mean 3.88, SD 0.88). The second dimension, <italic>discussion shift</italic>, evaluated the potential for the response to redirect the conversation toward a more positive, objective, and/or less antagonistic tone (mean 3.95, SD 0.81). The third dimension, <italic>behavior change</italic>, measured the perceived likelihood of the response influencing the bully&#x2019;s or agitator&#x2019;s future online behavior (mean 3.45, SD 0.86).</p><p>Each coder was responsible for evaluating bystander intervention responses associated with all 1000 cyberaggression scenarios, ensuring exposure to all 3 intervention strategies. To achieve this, the intervention responses were divided into 3 batches so that each coder rated one-third of the responses from each strategy. For example, coder 1 evaluated strategy 1 responses from batch 1 (aggressive messages 1&#x2010;333), strategy 2 responses from batch 2 (messages 334&#x2010;666), and strategy 3 responses from batch 3 (messages 667&#x2010;1000; <xref ref-type="table" rid="table2">Table 2</xref>). This approach ensured that each coder rated the effectiveness of intervention responses across all 3 strategies while covering the full set of 1000 cyberaggression examples. <xref ref-type="table" rid="table3">Table 3</xref> presents the example aggressive messages, bystander responses generated from the 3 strategies, and coder ratings of the 3 effectiveness variables.</p><table-wrap id="t2" position="float"><label>Table 2.</label><caption><p>Distribution of coding assignments across 1000 cyberaggression examples, ensuring each coder evaluated responses from all 3 bystander intervention strategies.</p></caption><table id="table2" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Batches</td><td align="left" valign="bottom">Bystander response strategy 1 (n=1000)</td><td align="left" valign="bottom">Bystander response strategy 2 (n=1000)</td><td align="left" valign="bottom">Bystander response strategy 3 (n=3000)</td></tr></thead><tbody><tr><td align="left" valign="top">Batch 1: aggressive messages 1&#x2010;333</td><td align="left" valign="top">Coder 1</td><td align="left" valign="top">Coder 3</td><td align="left" valign="top">Coder 2</td></tr><tr><td align="left" valign="top">Batch 2: aggressive messages 334&#x2010;666</td><td align="left" valign="top">Coder 2</td><td align="left" valign="top">Coder 1</td><td align="left" valign="top">Coder 3</td></tr><tr><td align="left" valign="top">Batch 3: aggressive messages 667&#x2010;1000</td><td align="left" valign="top">Coder 3</td><td align="left" valign="top">Coder 2</td><td align="left" valign="top">Coder 1</td></tr></tbody></table></table-wrap><table-wrap id="t3" position="float"><label>Table 3.</label><caption><p>Example aggressive messages, bystander responses generated by the 3 intervention strategies, and the effectiveness scores rated by the coders (in the order of favorability or discussion shift and behavior change).</p></caption><table id="table3" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Aggressive message and intervention strategies</td><td align="left" valign="bottom">Bystander responses</td><td align="left" valign="bottom">Effectiveness scores</td></tr></thead><tbody><tr><td align="left" valign="top">Why are black fathers and Shaq&#x2019;s free throw attempts the same? They&#x2019;re always missing</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Policy reminder</td><td align="left" valign="top">&#x201C;We do not tolerate harassment, threatening, or bullying of people on our site; nor do we tolerate communities dedicated to this behavior.&#x201D;</td><td align="left" valign="top">4/4/3</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Baseline GPT</td><td align="left" valign="top">&#x201C;It&#x2019;s important to spread positivity and respect in our community. Racist or derogatory jokes are not only offensive but also foster a harmful environment. Let&#x2019;s aim for constructive and respectful interaction instead.&#x201D;</td><td align="left" valign="top">4/4/3</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>AllyGPT</td><td align="left" valign="top">&#x201C;Such stereotyping is decidedly offensive and it&#x2019;s not okay to continue this conversation in a disrespectful manner. To the person affected by this, please know that your value is not determined by such uninformed comments. This conversation is becoming progressively more toxic, and it might be beneficial for you to step away for a while.&#x201D;</td><td align="left" valign="top">5/5/5</td></tr><tr><td align="left" valign="top">mim torse lottttttta ugly white people here . are you mad at the immigrants cuz they sexy</td><td align="left" valign="top"/><td align="left" valign="top"/></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Policy reminder</td><td align="left" valign="top">&#x201C;We do not tolerate harassment, threatening, or bullying of people on our site; nor do we tolerate communities dedicated to this behavior.&#x201D;</td><td align="left" valign="top">4/4/3</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>Baseline GPT</td><td align="left" valign="top">&#x201C;There&#x2019;s definitely room for diverse opinions here, but let&#x2019;s aim to maintain respect for all members and avoid generalizations. Beauty, like attractiveness, is subjective and varies greatly between individuals, cultures, and societies. Let&#x2019;s remember, every ethnicity has its own unique charm and attractiveness. Regarding the immigration issue, it&#x2019;s a complex topic and it&#x2019;s possible to have a meaningful discussion without degrading each other.&#x201D;</td><td align="left" valign="top">5/5/4</td></tr><tr><td align="left" valign="top"><named-content content-type="indent">&#x00A0;&#x00A0;&#x00A0;&#x00A0;</named-content>AllyGPT</td><td align="left" valign="top">&#x201C;The comment you&#x2019;re making is disrespectful and propagates unfounded stereotypes. Instead of focusing on differences, let&#x2019;s embrace our shared humanity. Each person is unique, and beauty is subjective and multi-faceted. In regards to immigration, it&#x2019;s important to remember that people immigrate for diverse reasons, and making assumptions based on their appearance is unhelpful and can spread misinformation.&#x201D;</td><td align="left" valign="top">4/4/4</td></tr></tbody></table></table-wrap><p>Three graduate students in psychology (2 doctoral and one master&#x2019;s) were trained as independent raters. Training involved a structured, multistep process combining group instruction, guided practice, and independent rating. Coders were first introduced to the study purpose, research questions, and their own experiences with social media and cyberaggression. They were then provided with a detailed coding manual containing sample scenarios, example ratings, and rationales for the 3 effectiveness dimensions (favorability, discussion shift, and behavior change).</p><p>As a group, coders practiced rating 3 scenarios, followed by discussion and feedback to build consensus. They next completed independent practice ratings on 3 additional scenarios, which were reviewed and discussed to refine consistency. Coders were also trained on the Qualtrics survey platform, including rating procedures and response scales. To establish intercoder reliability, each independently rated 25 additional scenarios; consensus agreement of 80% or greater was required before proceeding to the full study (1000 scenarios per coder and 3000 total).</p><p>A 1-hour booster session was conducted midway through coding to address procedural questions, clarify operational definitions, and review rating criteria. Coders jointly discussed 2 example responses, examining features linked to higher versus lower ratings across the dimensions. Intercoder agreement was computed using a group consensus method. Individual coder ratings for each of the 25 scenarios and the 3 effectiveness dimensions (perceived favorability, discussion shift, and behavior change) were compared to the group mean ratings. Agreement was considered achieved when coder ratings fell within one point of the group mean. For the 3 effectiveness dimensions, the Krippendorff &#x03B1; was 0.73 for favorability, 0.84 for discussion shift, and 0.89 for behavior change.</p></sec><sec id="s2-5-3"><title>Semistructured Interview</title><p>After completing the survey, each coder participated in a separate semistructured exit interview conducted by 2 researchers. Through the interviews, we explored coders&#x2019; views on the effectiveness of responses generated by the 3 strategies, their overall coding experience, and any questions about the study. To aid recall, coders were reminded of the rating scales and were shown their average scores across the 3 effectiveness dimensions. They also reviewed 2 example aggression scenarios with responses from all strategies: one where baseline GPT outperformed AllyGPT and another where AllyGPT outperformed baseline GPT across all dimensions. Examples were selected to ensure consistent trends across dimensions, randomly sampled from different coding batches, and paired with the corresponding policy reminder. Interviews lasted about 50 minutes, were audio recorded, transcribed, and deidentified. Coders received compensation for their participation.</p></sec></sec><sec id="s2-6"><title>Data Analysis Approach</title><p>For RQ1, we used a set of <italic>t</italic> tests to compare the linguistic characteristics of bystander intervention responses generated by baseline GPT and AllyGPT. An &#x03B1; of .05 was used to determine the statistical significance of the mean difference between the 2 intervention strategies. As all policy reminders consisted of identical messages across all cases, their linguistic features (eg, word count and positive words) exhibited zero variance, and they were excluded from statistical analyses comparing mean differences across strategies. Descriptive statistics for standard policy reminders are reported separately to provide a benchmark, while statistical comparisons were conducted between AllyGPT and baseline GPT, where variation in generated responses allowed for meaningful analysis.</p><p>To address RQ2, we used a set of ANOVA and <italic>t</italic> tests to compare the average perceived effectiveness rating across (1) 3 different bystander intervention strategies, (2) incivility level, and (3) the direction of aggression (individual vs group). An &#x03B1; of .05 was used to determine the statistical significance of the mean difference across the 3 intervention strategies. Next, we conducted a series of robust general linear models using heteroskedasticity-consistent SEs to examine the main and interaction effects of intervention strategy (policy reminder, baseline GPT, and AllyGPT), incivility level (low, moderate, and high), and direction of aggression (group targeted vs individual targeted) on the 3 outcome measures. Pairwise contrasts were conducted to compare strategy conditions, and significant interactions were further probed using simple effects analyses.</p><p>Finally, the interview data were qualitatively analyzed using a thematic analysis approach. A single researcher conducted the primary qualitative analysis using an inductive thematic approach. Transcripts were read iteratively to build familiarity, after which initial codes were generated to capture patterns in participants&#x2019; reflections on response effectiveness, cross-strategy comparisons, and coding challenges. Codes were refined through constant comparison and analytic note-taking, then synthesized into higher-level themes. Identified codes and themes were reviewed with the other authors as an analytic quality check to assess coherence and clarify interpretations. As coding was not independently replicated, no formal intercoder disagreement resolution was used. We refer to individual coders using identifiers (eg, coder 1) when presenting quotes in the qualitative findings.</p></sec></sec><sec id="s3" sec-type="results"><title>Results</title><sec id="s3-1"><title>Descriptive Statistics</title><p>The final dataset consisted of 996 cyberaggression scenarios and their corresponding bystander responses, all of which were evaluated by the 3 human coders. Four (0.04%) scenarios were excluded through listwise deletion due to missing values; given the small number of cases removed (&#x003C;1% of the dataset), this exclusion is unlikely to have biased the results. Among the 996 cyberaggression scenarios, 4.6% (n=46) of the cases were classified as low incivility, 48.3% (n=481) were classified as moderate, and 47.1% (n=469) were classified as high. Regarding the target of bullying, 75.7% (n=754) of the cases were group targeted, while 24.3% (n=242) were individual targeted (<xref ref-type="table" rid="table4">Table 4</xref>). These distributions indicate that the majority of cyberaggression cases in the dataset involved moderate to high levels of incivility and were more often directed at groups rather than individuals. Example responses generated by the 3 bystander intervention strategies by the incivility level and the direction of aggression are shown in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>.</p><table-wrap id="t4" position="float"><label>Table 4.</label><caption><p>The distribution of the cyberbullying example dataset in terms of the level of incivility and the direction of incivility.</p></caption><table id="table4" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Level of incivility</td><td align="left" valign="bottom">Group targeted (n=754, 76%), n (%)</td><td align="left" valign="bottom">Individual targeted (n=242, 24%), n (%)</td><td align="left" valign="bottom">Total (N=996, 100%), n (%)</td></tr></thead><tbody><tr><td align="left" valign="top">Low incivility</td><td align="left" valign="top">34 (3.4)</td><td align="left" valign="top">12 (1.2)</td><td align="left" valign="top">46 (4.6)</td></tr><tr><td align="left" valign="top">Medium incivility</td><td align="left" valign="top">341 (34.2)</td><td align="left" valign="top">140 (14.1)</td><td align="left" valign="top">481 (48.3)</td></tr><tr><td align="left" valign="top">High incivility</td><td align="left" valign="top">379 (38.1)</td><td align="left" valign="top">90 (9)</td><td align="left" valign="top">469 (47.1)</td></tr></tbody></table></table-wrap></sec><sec id="s3-2"><title>RQ1: Linguistic Differences Among the 3 Bystander Intervention Strategies</title><p>To assess linguistic differences across intervention strategies, we conducted independent samples <italic>t</italic> tests comparing messages generated by the baseline GPT and AllyGPT using LIWC 2022 variables. We used fixed-format policy reminders as a linguistic benchmark, which were excluded from <italic>t</italic> tests due to their lack of variability (<xref ref-type="table" rid="table5">Table 5</xref>).</p><table-wrap id="t5" position="float"><label>Table 5.</label><caption><p>Linguistic characteristics of bystander intervention messages generated by the 3 different strategies (policy reminder, baseline GPT, and AllyGPT).</p></caption><table id="table5" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Characteristics</td><td align="left" valign="bottom">Policy reminders, mean</td><td align="left" valign="bottom">Baseline GPT, mean (SD)</td><td align="left" valign="bottom">AllyGPT, mean (SD)</td><td align="left" valign="bottom"><italic>t</italic> test (df)</td><td align="left" valign="bottom"><italic>P</italic> value</td><td align="left" valign="bottom">Direction</td></tr></thead><tbody><tr><td align="left" valign="top">WC<sup><xref ref-type="table-fn" rid="table5fn1">a</xref></sup></td><td align="left" valign="top">25 (0)</td><td align="left" valign="top">65.56 (21.71)</td><td align="left" valign="top">46.61 (11.69)</td><td align="left" valign="top">24.29 (1532.06)</td><td align="char" char="." valign="top">&#x003C;.001</td><td align="left" valign="top">Policy&#x003C;AllyGPT&#x003C;baseline GPT</td></tr><tr><td align="left" valign="top">WPS<sup><xref ref-type="table-fn" rid="table5fn2">b</xref></sup></td><td align="left" valign="top">25 (0)</td><td align="left" valign="top">16.65 (4.12)</td><td align="left" valign="top">13.63 (2.91)</td><td align="left" valign="top">18.89 (1792.75)</td><td align="char" char="." valign="top">&#x003C;.001</td><td align="left" valign="top">Policy&#x003C;AllyGPT&#x003C;baseline GPT</td></tr><tr><td align="left" valign="top">Analytic</td><td align="left" valign="top">28.63 (0)</td><td align="left" valign="top">37.43 (21.66)</td><td align="left" valign="top">44.41 (26.20)</td><td align="left" valign="top">&#x2212;6.49 (1927.67)</td><td align="char" char="." valign="top">&#x003C;.001</td><td align="left" valign="top">Policy&#x003C;baseline GPT&#x003C;Ally GPT</td></tr><tr><td align="left" valign="top">Authentic</td><td align="left" valign="top">85.17 (0)</td><td align="left" valign="top">45.88 (27.81)</td><td align="left" valign="top">33.40 (27.55)</td><td align="left" valign="top">10.07 (1996)</td><td align="char" char="." valign="top">&#x003C;.001</td><td align="left" valign="top">AllyGPT&#x003C;baseline GPT&#x003C;policy</td></tr><tr><td align="left" valign="top">Negative</td><td align="left" valign="top">12 (0)</td><td align="left" valign="top">2.38 (2.34)</td><td align="left" valign="top">4.66 (3.53)</td><td align="left" valign="top">12.68 (1996)</td><td align="char" char="." valign="top">&#x003C;.001</td><td align="left" valign="top">Baseline GPT&#x003C;AllyGPT&#x003C;policy</td></tr><tr><td align="left" valign="top">Positive</td><td align="left" valign="top">0 (0)</td><td align="left" valign="top">6.55 (3.43)</td><td align="left" valign="top">4.65 (3.25)</td><td align="left" valign="top">&#x2212;17.01 (1732.28)</td><td align="char" char="." valign="top">&#x003C;.001</td><td align="left" valign="top">Policy&#x003C;AllyGPT&#x003C;baseline GPT</td></tr><tr><td align="left" valign="top">Netspeak</td><td align="left" valign="top">0 (0)</td><td align="left" valign="top">0.09 (0.51)</td><td align="left" valign="top">0.04 (0.44)</td><td align="left" valign="top">2.43 (1995.29)</td><td align="char" char="." valign="top">.02</td><td align="left" valign="top">Policy&#x003C;AllyGPT&#x003C;baseline GPT</td></tr></tbody></table><table-wrap-foot><fn id="table5fn1"><p><sup>a</sup>WC: word count. </p></fn><fn id="table5fn2"><p><sup>b</sup>WPS: word per sentence.</p></fn></table-wrap-foot></table-wrap><p>All 996 messages produced using policy reminders were identical, yielding a fixed <italic>word count</italic> of 25 and <italic>words per sentence</italic> of 25, with no variability across messages. In contrast, messages generated by the 2 GPT-based strategies demonstrated significantly greater linguistic variation. An independent samples <italic>t</italic> test (Welch) comparing baseline GPT and AllyGPT revealed that bystander intervention responses generated by baseline GPT were significantly longer than those generated by AllyGPT. Similarly, baseline GPT produced messages with a greater mean words per sentence compared to those generated by AllyGPT. Overall, the policy reminder messages were uniform and minimal in length and complexity, while both GPT-based strategies generated more linguistically varied responses. Among the generative approaches, the baseline GPT produced messages that were longer and more syntactically complex than those generated by the AllyGPT strategy.</p><p>For the <italic>analytic thinking</italic> score, baseline GPT messages had significantly lower means compared to AllyGPT, with Welch correction for unequal variances. This means that AllyGPT-generated bystander intervention responses are in a more structured and logical language than the baseline GPT. Both GPT-generated strategies were more analytical than the policy reminders, which scored even lower, reflecting their templated and rigid format. In contrast, <italic>authentic language</italic> was more prevalent in baseline GPT than in AllyGPT responses, assuming equal variances, suggesting that the baseline GPT produced more personally expressive messages. Notably, policy reminders had the highest authenticity score among all strategies, reflecting their formalized stance and declarative tone.</p><p>For <italic>positive emotional tone</italic>, baseline GPT responses scored higher than those from our GPT. Policy reminders, in contrast, scored zero on positive emotion, reflecting their strictly normative stance. Conversely, <italic>negative emotional tone</italic> was more prominent in AllyGPT messages than in baseline GPT, with unequal variances assumed. The policy reminder messages showed the highest negative emotional tone, indicating elevated levels of negative emotion due to their emphasis on prohibition and sanctions. Policy reminders scored much lower, aligning with their strict and emotionally neutral or negative framing. Finally, the use of <italic>netspeak</italic> (eg, online slang) was significantly higher in baseline GPT than in AllyGPT. Policy reminders contained no netspeak, consistent with their formal and standardized tone.</p><p>Together, these findings highlight distinct linguistic signatures of each intervention strategy. Baseline GPT responses tended to be emotionally positive and authentic, while AllyGPT emphasized structured reasoning and a more assertive tone. The fixed policy reminders, although consistent and easily recognizable, lacked emotional nuance and personalization, underscoring the value of generative AI for producing more context-aware and psychologically resonant interventions. <xref ref-type="table" rid="table5">Table 5</xref> presents the mean difference and the direction of the difference in psycholinguistic characteristics across the 3 bystander interventions.</p></sec><sec id="s3-3"><title>RQ2: Perceived Effectiveness of Bystander Interventions</title><sec id="s3-3-1"><title>Quantitative Results</title><sec id="s3-3-1-1"><title>Main Effects of Intervention Strategies on Perceived Effectiveness</title><sec id="s3-3-1-1-1"><title>Perceived Favorability</title><p>A one-way Welch ANOVA was conducted to examine differences in perceived favorability across the 3 intervention strategies: standard policy reminders, baseline GPT-generated responses, and AllyGPT-generated responses. The analysis revealed a significant effect of intervention type on perceived favorability (<italic>P</italic>&#x003C;.001). Post hoc Games-Howell comparisons indicated that all pairwise differences were statistically significant (<italic>P</italic>&#x003C;.005). The mean favorability ratings were highest for the baseline GPT responses, followed by AllyGPT responses and standard policy reminders.</p></sec><sec id="s3-3-1-1-2"><title>Potential for Altering the Discussion</title><p>A one-way Welch ANOVA revealed significant differences in how effective interventions were perceived at shifting discussions. Baseline GPT responses again received the highest ratings, followed by AllyGPT, with policy reminders receiving the lowest ratings (<italic>P</italic>&#x003C;.001). Post hoc comparisons using the Games-Howell correction indicated all comparisons reached statistical significance (<italic>P</italic>&#x003C;.005).</p></sec><sec id="s3-3-1-1-3"><title>Likelihood of Changing Aggressive Behavior</title><p>A one-way Welch ANOVA indicated a statistically significant difference in perceived effectiveness in changing bullying behavior among the 3 intervention types: standard policy reminder, baseline GPT-generated responses, and AllyGPT-generated responses (<italic>P</italic>&#x003C;.001). Post hoc Games-Howell tests revealed that all pairwise differences were statistically significant (<italic>P</italic>&#x003C;.001). <xref ref-type="table" rid="table6">Table 6</xref> summarizes the mean difference and the direction of difference.</p><table-wrap id="t6" position="float"><label>Table 6.</label><caption><p>Three effectiveness variables across the 3 intervention strategies.</p></caption><table id="table6" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom">Policy reminder (n=996), mean (SD)</td><td align="left" valign="bottom">Baseline GPT<break/>(n=996), mean (SD)</td><td align="left" valign="bottom">AllyGPT (n=996), mean (SD)</td><td align="left" valign="bottom" colspan="2">Welch ANOVA</td><td align="left" valign="bottom">Post hoc test</td></tr><tr><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"><italic>F</italic> test (df)</td><td align="left" valign="bottom"><italic>P</italic> value</td><td align="left" valign="bottom"/></tr></thead><tbody><tr><td align="left" valign="top">Favorability</td><td align="left" valign="top">3.50 (0.50)</td><td align="left" valign="top">4.14 (0.99)</td><td align="left" valign="top">3.98 (0.92)</td><td align="left" valign="top">219.28 (2, 1792.02)</td><td align="char" char="." valign="top">&#x003C;.001</td><td align="left" valign="top">Baseline GPT&#x003E;AllyGPT&#x003E;policy reminder</td></tr><tr><td align="left" valign="top">Altering discussion</td><td align="left" valign="top">3.81 (0.39)</td><td align="left" valign="top">4.16 (0.96)</td><td align="left" valign="top">3.89 (0.90)</td><td align="left" valign="top">58.30 (2, 1682.03)</td><td align="char" char="." valign="top">&#x003C;.001</td><td align="left" valign="top">Baseline GPT&#x003E;AllyGPT&#x003E;policy reminder</td></tr><tr><td align="left" valign="top">Changing behavior</td><td align="left" valign="top">3.06 (0.29)</td><td align="left" valign="top">3.83 (1.00)</td><td align="left" valign="top">3.45 (0.91)</td><td align="left" valign="top">328.77 (2, 1542.98)</td><td align="char" char="." valign="top">.001</td><td align="left" valign="top">Baseline GPT&#x003E;AllyGPT&#x003E;policy reminder</td></tr></tbody></table></table-wrap></sec></sec></sec></sec><sec id="s3-4"><title>Main Effects of the Aggression Context on Perceived Effectiveness</title><sec id="s3-4-1"><title>Incivility Level and the Perceived Effectiveness of Bystander Responses</title><p>A one-way ANOVA indicated that there was no statistically significant difference in mean values for perceived favorability, effectiveness in altering the discussion, and effectiveness in changing bullying behavior across intervention messages generated for high-level, medium-level, and low-level aggressive messages (<xref ref-type="table" rid="table7">Table 7</xref>).</p><table-wrap id="t7" position="float"><label>Table 7.</label><caption><p>Three outcome variables by incivility level.</p></caption><table id="table7" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom">Low (n=138), mean (SD)</td><td align="left" valign="bottom">Moderate (n=1443), mean (SD)</td><td align="left" valign="bottom">High (n=1407), mean (SD)</td><td align="left" valign="bottom" colspan="2">ANOVA</td></tr><tr><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"/><td align="left" valign="bottom"><italic>F</italic> test (df)</td><td align="left" valign="bottom"><italic>P</italic> value</td></tr></thead><tbody><tr><td align="left" valign="top">Favorability</td><td align="left" valign="top">3.88 (0.76)</td><td align="left" valign="top">3.88 (0.87)</td><td align="left" valign="top">3.86 (0.89)</td><td align="left" valign="top">0.202 (2, 2985)</td><td align="char" char="." valign="top">.81</td></tr><tr><td align="left" valign="top">Altering discussion</td><td align="left" valign="top">3.94 (0.67)</td><td align="left" valign="top">3.96 (0.81)</td><td align="left" valign="top">3.95 (0.82)</td><td align="left" valign="top">0.09 (2, 2985)</td><td align="char" char="." valign="top">.90</td></tr><tr><td align="left" valign="top">Changing behavior</td><td align="left" valign="top">3.46 (0.73)</td><td align="left" valign="top">3.44 (0.88)</td><td align="left" valign="top">3.45 (0.85)</td><td align="left" valign="top">0.06 (2, 2985)</td><td align="char" char="." valign="top">.93</td></tr></tbody></table></table-wrap></sec><sec id="s3-4-2"><title>Direction of Aggression and the Perceived Effectiveness</title><p>Independent-samples <italic>t</italic> tests revealed significant differences in the perceived effectiveness of intervention messages depending on whether the aggression was group targeted or individual targeted. Responses addressing group-targeted aggression were rated as significantly more favorable than those addressing individual-targeted bullying (<italic>P</italic>&#x003C;.001). Similarly, interventions for group-targeted bullying were seen as more effective in altering discussions than for individual-targeted bullying (<italic>P</italic>&#x003C;.001). Finally, messages addressing group-targeted bullying were rated as more effective in changing bullying behavior than those addressing individual-targeted bullying (<italic>P</italic>=.001; <xref ref-type="table" rid="table8">Table 8</xref>).</p><table-wrap id="t8" position="float"><label>Table 8.</label><caption><p>Three outcome variables by direction of aggression.</p></caption><table id="table8" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom">Group (n=2262), mean (SD)</td><td align="left" valign="bottom">Individual (n=726), mean (SD)</td><td align="left" valign="bottom"><italic>t</italic> test (df)</td><td align="left" valign="bottom"><italic>P</italic> value</td></tr></thead><tbody><tr><td align="left" valign="top">Favorability</td><td align="left" valign="top">3.92 (0.84)</td><td align="left" valign="top">3.74 (0.95)</td><td align="left" valign="top">4.46 (1115.39)</td><td align="char" char="." valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top">Altering discussion</td><td align="left" valign="top">3.99 (0.77)</td><td align="left" valign="top">3.85 (0.90)</td><td align="left" valign="top">3.56 (1090.78)</td><td align="char" char="." valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top">Changing behavior</td><td align="left" valign="top">3.48 (0.83)</td><td align="left" valign="top">3.35 (0.93)</td><td align="left" valign="top">3.20 (1115.36)</td><td align="char" char="." valign="top">.001</td></tr></tbody></table></table-wrap></sec></sec><sec id="s3-5"><title>Interaction Effects of Bystander Intervention and Aggression Context on Perceived Effectiveness</title></sec><sec id="s3-6"><title>Interaction Effects of Bystander Strategy and Incivility Level on the Perceived Effectiveness</title><sec id="s3-6-1"><title>Overview</title><p>We conducted a series of robust general linear models with heteroskedasticity-consistent SEs to examine the main and interaction effects of strategy (standard policy reminder, baseline GPT, and AllyGPT) and incivility level (low, moderate, and high) on 3 outcome measures. Pairwise contrasts were used to compare strategy conditions, and significant interactions were further examined using simple effects analyses. Overall, strategy type mattered more than incivility level. Across all outcomes, GPT-generated responses (both baseline and AllyGPT) were consistently rated higher than policy reminders. Incivility level alone did not significantly influence ratings, and very few strategy &#x00D7;incivility interactions emerged. The only notable exception was that baseline GPT responses were perceived as more effective in changing behavior when paired with moderately incivil messages.</p></sec><sec id="s3-6-2"><title>Perceived Favorability</title><p>There was a significant main effect of strategy type, in which GPT-based responses were rated as more favorable than policy reminders. Incivility level and interaction effects were not significant (<xref ref-type="table" rid="table9">Table 9</xref>).</p><table-wrap id="t9" position="float"><label>Table 9.</label><caption><p>General linear model results for the strategy and incivility level interaction.</p></caption><table id="table9" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom">Main effect of the strategy</td><td align="left" valign="bottom">Main effect of incivility</td><td align="left" valign="bottom">Interaction effect (<italic>B</italic>)</td><td align="left" valign="bottom">Key contrasts (<italic>B</italic>)</td></tr></thead><tbody><tr><td align="left" valign="top">Favorability</td><td align="left" valign="top">GPTs&#x003E;policy (<italic>P</italic>&#x003C;.005)</td><td align="left" valign="top">&#x2014;<sup><xref ref-type="table-fn" rid="table9fn1">a</xref></sup></td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">AllyGPT (+0.48), baseline GPT (+0.41) versus policy</td></tr><tr><td align="left" valign="top">Altering discussion</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">GPT responses are directionally higher</td></tr><tr><td align="left" valign="top">Changing behavior</td><td align="left" valign="top">GPTs&#x003E;policy (<italic>P</italic>&#x003C;.005)</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">Baseline GPT&#x00D7;moderate incivility (+0.30, <italic>P</italic>=.03)</td><td align="left" valign="top">AllyGPT (+0.61), baseline GPT (+0.52) versus Policy</td></tr></tbody></table><table-wrap-foot><fn id="table9fn1"><p><sup>a</sup>Nonsignificant.</p></fn></table-wrap-foot></table-wrap></sec><sec id="s3-6-3"><title>Altering Discussion</title><p>No significant main or interaction effects were observed. Although GPT-based responses were directionally more positive, the differences were not statistically significant.</p></sec><sec id="s3-6-4"><title>Behavior Change</title><p>Both baseline GPT and AllyGPT responses were rated as more effective than policy reminders. A small interaction was observed, with baseline GPT showing an added advantage under moderate incivility.</p><p><xref ref-type="fig" rid="figure2">Figure 2</xref> visualizes the interaction effects of strategy and incivility level on bystander intervention ratings across 3 outcome variables. Although the interaction effect was not statistically significant, exploratory pairwise comparisons indicated a pattern in which AllyGPT responses were rated more favorably and more effective for behavior change than baseline GPT responses at low levels of incivility. These differences were not observed at moderate or high levels of incivility.</p><fig position="float" id="figure2"><label>Figure 2.</label><caption><p>Interaction effects of strategy and incivility level on bystander intervention ratings across 3 outcome variables: favorability, altering discussion, and changing behavior. Mean scores and 95% CIs are plotted for each strategy (red=policy reminder, blue=baseline GPT, and green=AllyGPT) at each incivility level (low, medium, and high).</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="formative_v10i1e84391_fig02.png"/></fig></sec></sec><sec id="s3-7"><title>Interaction Effects of Intervention Strategy and Direction of Aggression</title><sec id="s3-7-1"><title>Perceived Favorability</title><p>GPT-based responses (both baseline and AllyGPT) were rated more favorably than policy reminders. Responses addressing person-targeted aggression were rated less favorably than those addressing group-targeted bullying. No significant interactions were observed (<xref ref-type="table" rid="table10">Table 10</xref>).</p><table-wrap id="t10" position="float"><label>Table 10.</label><caption><p>General linear model results for the strategy and direction of aggression interaction.</p></caption><table id="table10" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Variables</td><td align="left" valign="bottom">Main effect of the strategy</td><td align="left" valign="bottom">Main effect of direction</td><td align="left" valign="bottom">Interaction effect (<italic>B</italic>)</td><td align="left" valign="bottom">Key contrasts (<italic>B</italic>)</td></tr></thead><tbody><tr><td align="left" valign="top">Favorability</td><td align="left" valign="top">GPTs&#x003E;policy (<italic>P</italic>&#x003C;.001)</td><td align="left" valign="top">Person&#x003C;group (<italic>P</italic>&#x003C;.001)</td><td align="left" valign="top">&#x2014;<sup><xref ref-type="table-fn" rid="table10fn1">a</xref></sup></td><td align="left" valign="top">Baseline GPT (+0.63), AllyGPT (+0.51) versus policy</td></tr><tr><td align="left" valign="top">Altering discussion</td><td align="left" valign="top">GPTs&#x003E;policy (<italic>P</italic>&#x003C;.001)</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">Baseline GPT (+0.39), AllyGPT (+0.12) versus policy</td></tr><tr><td align="left" valign="top">Behavior change</td><td align="left" valign="top">GPTs&#x003E;policy (<italic>P</italic>&#x003C;.001)</td><td align="left" valign="top">&#x2014;</td><td align="left" valign="top">AllyGPT&#x00D7;person targeted (&#x2212;0.26, <italic>P</italic>=.001)</td><td align="left" valign="top">Baseline GPT (+0.79), AllyGPT (+0.45) versus policy</td></tr></tbody></table><table-wrap-foot><fn id="table10fn1"><p><sup>a</sup>Nonsignificant.</p></fn></table-wrap-foot></table-wrap></sec><sec id="s3-7-2"><title>Altering Discussion</title><p>Baseline GPT responses were rated as most effective in shifting discussions, followed by AllyGPT, with policy reminders rated lowest. The direction of bullying did not significantly influence ratings. No interaction effect was found.</p></sec><sec id="s3-7-3"><title>Changing Aggressive Behavior</title><p>Both baseline GPT and AllyGPT responses were perceived as more effective than policy reminders. A significant interaction emerged: AllyGPT responses were rated as less effective in changing behavior when applied to person-targeted bullying compared to group-targeted bullying. Other interactions were statistically not significant.</p><p><xref ref-type="fig" rid="figure3">Figure 3</xref> visualizes the interaction effects of strategy type and specificity on 3 outcome variables.</p><fig position="float" id="figure3"><label>Figure 3.</label><caption><p>Interaction effects of strategy type (red=policy reminder, blue=baseline GPT, and green=AllyGPT) and direction (group targeted vs person targeted) on 3 perceived outcomes of bystander intervention messages: favorability, altering discussion, and behavior change, with error bars indicating 95% CIs.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="formative_v10i1e84391_fig03.png"/></fig></sec></sec><sec id="s3-8"><title>Qualitative Insights Into the Perceived Effectiveness of Intervention Strategies</title><sec id="s3-8-1"><title>Perceived Favorability of Intervention Strategies</title><p>The semistructured interviews with the coders provided nuanced perspectives on the perceived effectiveness of 3 different intervention strategies. First, the coders consistently described the standard policy reminder as robotic and impersonal. While these messages were generally viewed as inoffensive and safe, their lack of contextual adaptation made them feel generic. However, coders noted that this very standardization helped prevent the messages from seeming intrusive or out of place within online conversations: &#x201C;It&#x2019;s robotic but doesn&#x2019;t feel like it&#x2019;s coming out of nowhere. It kind of works because it doesn&#x2019;t assume too much&#x201D; (coder 1).</p><p>Baseline GPT responses were received more favorably than policy reminders due to their balance of specificity and neutrality. Coders noted that these responses avoided being too generic while also refraining from making direct or accusatory assumptions about the bully&#x2019;s intent: &#x201C;<italic>They don&#x2019;t first attack the bully. They kind of try to educate the bully. It&#x2019;s not a very aggressive message</italic>&#x201D; (coder 2). The tone of these responses was described as gentle, constructive, and inclusive. One coder appreciated the frequent use of collective language (eg, &#x201C;we&#x201D; and &#x201C;let&#x2019;s&#x201D;), which conveyed a shared commitment to respectful communication within online communities: &#x201C;It&#x2019;s using a lot of &#x2018;we&#x2019; language... and I find that more favorable for viewing&#x201D; (coder 1).</p><p>Coders described the responses generated by the AllyGPT prompting as the most specific, often incorporating detailed psychological framing and references to the nature of the aggression. While this specificity occasionally added persuasive depth and a human-like tone, it also introduced potential drawbacks. In cases where the response identified specific problematic content or implied motive (eg, racial bias), coders noted that such directness might provoke further defensiveness or hostility from bullies: &#x201C;It&#x2019;s kind of diving deeper and assuming the comment writer&#x2019;s thought processes... It feels like there&#x2019;s a little more of an argumentative tone<italic>&#x201D;</italic> (coder 3). Although coders acknowledged that firmer messages could resonate in highly aggressive scenarios, they also emphasized that overt specificity or presumed interpretation could reduce the intervention&#x2019;s acceptability, especially when assumptions do not align with the aggressor&#x2019;s perceived intent.</p></sec><sec id="s3-8-2"><title>Effectiveness of Altering the Discussion in More Positive Ways</title><p>Human coders widely agreed that the GPT-generated responses, particularly those from both baseline GPT and AllyGPT prompts, were generally more effective in shifting conversations toward a more positive and objective tone compared to the standardized policy reminders. While coders acknowledged that the standard policy reminder emphasized the importance of respectful communication, they felt this response &#x201C;points out the need for more objectivity, but doesn&#x2019;t really lead to a positive direction&#x201D; (coder 1). As a result, they did little to steer the conversation in a constructive direction.</p><p>In contrast, coders perceived the baseline GPT responses as more successful in nudging conversations toward civility. These responses not only emphasized objectivity and respectful tone but also offered an alternative path for engagement, such as refocusing the discussion on shared understanding or mutual respect. This dual approach, highlighting a problem while proposing a constructive next step, was particularly appreciated by the coders. They also emphasized that the emotionally neutral and nonconfrontational tone used in these responses helped defuse tension. This approach, in their view, increased the likelihood that others would respond positively.</p><disp-quote><p>It emphasizes that we&#x2019;re all different... it redirects the conversation in a more positive and objective way. [...] Generally, people are more receptive when things are not aggressive or sounding too emotional</p><attrib>Coder 2</attrib></disp-quote><p>Coders noted that the customized responses generated by the AllyGPT model often provided in-depth reasoning for why a comment was harmful while stressing the importance of respectful dialogue and the responsibility of maintaining safe social spaces. However, the more assertive tone and direct confrontation of aggressive behavior raised concerns among coders. Some felt that these responses, while well-intentioned, could come across as accusatory or argumentative, especially if they appeared to infer the perpetrator&#x2019;s motives.</p><disp-quote><p>There&#x2019;s an argumentative tone... <italic>you don&#x2019;t know how the perpetrator is going to respond. [Baseline GPT] feels more like, &#x201C;let&#x2019;s just not talk about this,&#x201D; and that steers the conversation toward a more positive direction</italic>.</p><attrib>Coder 3</attrib></disp-quote><p>A critical insight raised by coders concerned the focus of the intervention. While AllyGPT responses often centered on validating the victim&#x2019;s experience, coders questioned the effectiveness of these responses when they failed to directly engage the perpetrator. One coder stated that, &#x201C;It&#x2019;s taking the focus away from the perpetrator and onto the victim... the conversation can&#x2019;t go more positive if we&#x2019;re not addressing that person&#x201D; (coder 3). In contrast, baseline GPT responses were seen as doing a better job of engaging the perpetrator without provoking defensiveness. These messages reminded the aggressor to be mindful of their language and consider its impact, without making them feel targeted.</p></sec><sec id="s3-8-3"><title>Effectiveness of Changing Aggressive Behavior</title><p>Coders&#x2019; perceptions of the effectiveness of each intervention strategy in changing aggressive behavior largely aligned with their earlier assessments of how well the responses altered the direction of the discussion. Across the board, coders emphasized that effective behavioral change requires directly, yet constructively, engaging the perpetrator in a way that encourages reflection and more respectful communication. Again, standard policy reminders were viewed as having a limited and neutral impact on changing aggressive behavior. While they did set a boundary and signal that harmful behavior was not tolerated, coders noted that these messages &#x201C;didn&#x2019;t suggest a more helpful or adaptive way for the perpetrator to act or speak&#x201D; (coder 1).</p><p>Coders consistently perceived baseline GPT responses as striking an effective balance, being specific enough to address inappropriate behavior yet gentle enough to avoid provoking defensiveness. This balance, they felt, increased the likelihood that bullies would be receptive to the message and consider adjusting their behavior. One of the strengths of the baseline GPT responses, according to the coders, was the way they suggested alternative ways to engage in discussion, such as &#x201C;Let&#x2019;s focus on discussing specific policy points or actions that spark our concern or approval&#x201D; (coder 2), redirecting attention to a shared goal or more constructive conversation topics.</p><p>Coders acknowledged that the responses generated by the AllyGPT model were tailored and direct in highlighting the specific aspects of a comment that were problematic. This directness sometimes added clarity and educational value. However, coders also expressed concern that these responses occasionally made assumptions about the bully&#x2019;s intent or internal beliefs, such as labeling a comment as &#x201C;discriminatory&#x201D; or referring to an &#x201C;insinuation,&#x201D; which could be perceived as confrontational and reduce the effectiveness of the intervention. Instead of encouraging reflection, such responses risked escalating the situation or causing the perpetrator to disengage.</p><disp-quote><p>People are more receptive when they&#x2019;re not directly attacked... we don&#x2019;t know how strong their belief is, maybe they just wanted to post a hateful joke.</p><attrib>Coder 2</attrib></disp-quote><p>Overall, coders emphasized that for an intervention to be effective in promoting behavior change, it should maintain a respectful and nonjudgmental tone, avoid strong assumptions about motivation, and provide a clear, constructive alternative to harmful behavior.</p></sec></sec><sec id="s3-9"><title>Strengths and Limitations of Current Interventions and Recommendations for Designing Effective Bystander Intervention Responses</title><sec id="s3-9-1"><title>Strengths of GPT-Generated Bystander Intervention Messages</title><p>Coders highlighted several strengths of GPT-generated responses compared to standard policy reminders. Most notably, they praised the model&#x2019;s ability to show context awareness and personalization. Rather than offering one-size-fits-all statements, the interventions often reflected the specifics of the bullying scenario. As one coder noted, &#x201C;I was impressed with its ability to focus in on the specific details of what was being said&#x201D; (coder 3).</p><p>Coders also emphasized the conversational and human-like tone. They appreciated language that felt natural and approachable, contrasting sharply with the robotic style of policy reminders: &#x201C;How personable does it sound for that response? That was really important for me&#x201D; (coder 3). Such qualities were seen as enhancing rapport and trust.</p><p>Finally, GPT responses were perceived as more engaging and persuasive, with greater potential to redirect conversations toward civility. Their contextual sensitivity, approachable tone, and constructive framing made them feel better positioned to encourage reflection and behavior change. Overall, coders viewed GPT-generated responses as more relatable and impactful than standardized policy reminders.</p></sec><sec id="s3-9-2"><title>Limitations of GPT Responses and Challenges in Evaluation</title><p>Despite these strengths, coders also identified limitations. A key challenge was the subjectivity of evaluation, with judgments shaped by personal interpretation and uncertainty about real-world impact. To manage this ambiguity, some used policy reminders as a neutral reference point: &#x201C;Policy reminder is also neutral it doesn&#x2019;t add much but sets a benchmark&#x201D; (coder 1).</p><p>Coders also doubted the effectiveness of any response, AI-generated or otherwise, against deeply entrenched or hostile beliefs. As one put it, &#x201C;There&#x2019;s not much that can be done to change someone making a hateful joke&#x201D; (coder 2). Another added, &#x201C;Some people are too inflexible... I don&#x2019;t think any sort of response will change them&#x201D; (coder 3).</p><p>Finally, while GPT often produced contextually appropriate responses, occasional lapses occurred when it misinterpreted situations: &#x201C;There were a few responses where ChatGPT was totally off the mark or got off task&#x201D; (coder 3). These errors underscored the need for refinement to improve accuracy in sensitive contexts.</p></sec><sec id="s3-9-3"><title>Recommendations for Designing Effective Bystander Intervention Responses</title><p>Coders offered thoughtful recommendations for enhancing the design of GPT-generated intervention messages. One key suggestion was to acknowledge both the perpetrator&#x2019;s and the victim&#x2019;s perspectives, particularly in messages that challenge inappropriate behavior. Coders noted that responses were more persuasive and less likely to provoke defensiveness when they began by validating the perpetrator&#x2019;s viewpoint before introducing critique.</p><p>Another recurring recommendation was to use a friendly, conversational tone rather than formal or emotionally charged language. Coders preferred responses that felt approachable and clear, avoiding complex vocabulary or accusatory phrasing: &#x201C;I prefer more casual and natural language&#x2014;nothing too serious or full of big words [...] Starting with friendly language, then pointing out the issue, and ending with a suggestion worked best&#x201D; (coder 1). This approach was seen as helpful in reducing tension and guiding users toward reflection and behavioral change.</p><p>Finally, coders recommended balancing personalization with structural consistency. While they appreciated the human-like and tailored qualities of many GPT responses, they also valued a recognizable format that helped organize the message and ensure clarity. A common preference was for a response structure that included an opening statement, identification of the problematic issue, and a constructive suggestion for alternative behavior. As one coder put it, &#x201C;The customized ones added a personal touch... but I appreciate the consistency of the standard responses too&#x201D; (coder 3).</p><p>Together, our qualitative findings underscore the importance of bystander interventions that are empathetic, conversational, and contextually grounded. Coders consistently rated GPT-generated responses as more effective than policy reminders across all dimensions. Baseline GPT was praised for its balanced tone and gentle redirection, while AllyGPT stood out for clarity and victim-centered framing, although it was sometimes seen as overly direct or assumptive. In contrast, policy reminders were viewed as impersonal and unlikely to shape discussion or behavior. Overall, coders emphasized that effective interventions balance clarity with compassion, avoid excessive emotionality, and offer respectful alternatives (<xref ref-type="table" rid="table11">Table 11</xref>).</p><table-wrap id="t11" position="float"><label>Table 11.</label><caption><p>Summary of comparative analysis of 3 bystander intervention strategies across key effectiveness dimensions.</p></caption><table id="table11" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Dimension</td><td align="left" valign="bottom">Policy reminder</td><td align="left" valign="bottom">Baseline GPT</td><td align="left" valign="bottom">AllyGPT</td></tr></thead><tbody><tr><td align="left" valign="top">Perceived favorability</td><td align="left" valign="top">Impersonal, robotic tone; and neutral but not engaging</td><td align="left" valign="top">Balanced tone, human-like, inclusive (&#x201C;we&#x201D; language); and seen as most favorable</td><td align="left" valign="top">Highly specific and assertive; and sometimes too direct or assumptive for some users</td></tr><tr><td align="left" valign="top">Shifting discussion</td><td align="left" valign="top">Lacks specific direction; and points out the issue but does not offer alternatives</td><td align="left" valign="top">Suggests alternative directions; and redirects conversation constructively</td><td align="left" valign="top">Offers strong moral framing; and effective in serious cases but may feel argumentative</td></tr><tr><td align="left" valign="top">Changing behavior</td><td align="left" valign="top">Low likelihood of impact; and lacks personalized suggestions</td><td align="left" valign="top">Highlights inappropriate behavior gently; and offers behavioral alternatives</td><td align="left" valign="top">Directly addresses aggressors; and may be effective in some cases, but risks pushback</td></tr></tbody></table></table-wrap></sec></sec></sec><sec id="s4" sec-type="discussion"><title>Discussion</title><sec id="s4-1"><title>Principal Findings</title><p>Taken together, our findings highlight clear distinctions in how AI-generated bystander strategies are perceived. Linguistic analyses showed that baseline GPT produced emotionally positive and authentic responses, closely mirroring natural online communication. AllyGPT, in contrast, adopted a more analytical and assertive tone, while policy reminders appeared rigid, impersonal, and lacking nuance. These linguistic styles aligned with evaluations: baseline GPT consistently received the highest ratings across favorability, discussion shift, and behavior change, followed by AllyGPT, with policy reminders rated lowest. Although GPT-based strategies generally outperformed policy reminders, interaction analyses revealed subtle patterns. Incivility level minimally moderated effectiveness; for example, AllyGPT was rated most effective in low-incivility cases for favorability and behavior change, whereas baseline GPT performed better across moderate- and high-incivility contexts. Qualitative insights reinforced these patterns, noting baseline GPT&#x2019;s balanced and inclusive tone, AllyGPT&#x2019;s psychological grounding but occasional bluntness, and policy reminders&#x2019; lack of engagement or persuasiveness.</p></sec><sec id="s4-2"><title>Context Matters: Aggression Direction, Level of Civility, and Response Alignment</title><p>Our findings underscore that while GPT-generated interventions generally outperform standard policy reminders, their effectiveness is highly context-dependent. Responses to individual-targeted bullying were rated differently across all outcome dimensions compared to group-targeted cases, although these main effects were less consistent when interaction terms were considered. This suggests that psychologically grounded interventions may be especially impactful in contexts requiring validation of victims or direct challenges to aggressors.</p><p>This context dependence aligns with the established bystander theory proposed by Latan&#x00E9; and Darley [<xref ref-type="bibr" rid="ref44">44</xref>] that frames intervention as a sequential process of noticing, interpreting, assuming responsibility, knowing how to act, and then intervening. Empirical work by Fredrick et al [<xref ref-type="bibr" rid="ref19">19</xref>] supports this sequential model and highlights the role of empathy and psychological factors. Specifically, in cases of person-targeted bullying, the moral clarity and emotional salience of the situation may better enable bystanders to progress through these steps, particularly steps 2 through 4, leading to more effective intervention. Our results suggest that empathy- and perspective-taking-based responses, as used in AllyGPT, are particularly impactful when the victim is clearly identifiable, and harm is personal.</p><p>Conversely, group-targeted bullying often leads to diffusion of responsibility, whereby bystanders feel less personally obligated to intervene because they assume others will act [<xref ref-type="bibr" rid="ref58">58</xref>]. As harm is spread across multiple individuals, it becomes less clear who to help, thereby reducing the urgency to respond [<xref ref-type="bibr" rid="ref59">59</xref>]. Additionally, the reduced emotional immediacy in group harm diminishes moral clarity and empathetic motivation, weakening the impact of emotionally charged or individualized intervention messages [<xref ref-type="bibr" rid="ref60">60</xref>]. Bystander intervention is more likely when victims are identifiable and emotionally salient, conditions often lacking in group-targeted bullying. Together, these factors reduce the effectiveness of personalized emotional appeals, pointing instead to approaches that emphasize collective responsibility. In these cases, coders favored responses that were casual, concise, and aligned with platform norms, traits more common in baseline GPT messages.</p><p>More broadly, our findings extend earlier work in online incivility and bystander behavior, which has emphasized the role of situational factors, such as severity of incivility, social context, and perceived responsibility in shaping intervention decisions [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref61">61</xref>]. Our results suggest that strategies optimized for one context (eg, group level and low incivility) may not generalize well to another (eg, person-specific high incivility). Thus, an effective AI-driven intervention system must be capable of dynamic adjustment, tailoring tone, content, and framing to the particular features of the incident.</p></sec><sec id="s4-3"><title>Language Matters: Tone, Style, and Social Norm Alignment</title><p>Beyond content and strategy type, the linguistic style of intervention responses shaped their perceived effectiveness. Results from the LIWC analysis and coder feedback showed that tone, informality, emotional expression, and lexical choices played a decisive role in how responses were received. This underscores the need for AI-generated bystander responses to align with the communicative norms of fast-paced platforms such as Reddit or Twitter.</p><p>Baseline GPT responses often used informal, colloquial language, such as slang, abbreviations, or interjections (eg, &#x201C;u,&#x201D; &#x201C;lol,&#x201D; and &#x201C;haha&#x201D;). Although these responses were less grounded in psychological theory, coders described these as more natural and appropriate, suggesting that platform-congruent tone may foster receptivity and reduce defensiveness. This echoes prior work showing that benign, casual objections are often preferred regardless of offense severity [<xref ref-type="bibr" rid="ref62">62</xref>]. As such, bystander responses generated in language that conforms to community or platform norms in a casual tone may help reduce the risk of dismissal or defensiveness.</p><p>In contrast, responses generated by AllyGPT used a more formal, structured, and logically reasoned tone, often referencing social norms or authoritative values (eg, &#x201C;It&#x2019;s important to promote constructive discussion here<italic>&#x201D;</italic>). While this approach was rooted in well-established psychological strategies (eg, validation, perspective-taking, and norm reinforcement), coders sometimes interpreted these messages as overly prescriptive or emotionally distant, particularly in group-targeted bullying scenarios. This suggests that overly formal or didactic language can undermine relatability and emotional resonance, particularly in community-based settings [<xref ref-type="bibr" rid="ref63">63</xref>].</p><p>Interestingly, the LIWC results revealed that AllyGPT exhibited a higher level of negative emotional tone, primarily due to the use of empathic phrases (eg, &#x201C;It&#x2019;s upsetting to see such comments<italic>&#x201D;</italic>). These were designed to validate victims&#x2019; emotional experiences, yet this empathetic tone may have inadvertently signaled greater emotional intensity or confrontation, especially when applied to group-level incidents with less obvious individual harm. This trade-off between emotional support and perceived harshness underscores the delicate balance required in bystander intervention design.</p><p>Additionally, contrary to our initial expectations, message length did not appear to drive perceived effectiveness. Although baseline GPT responses were longer on average, they were still rated more favorably. This suggests clarity, relevance, and stylistic attunement matter more than verbosity, offering a counterpoint to prior findings [<xref ref-type="bibr" rid="ref64">64</xref>]. Taken together, these results highlight critical design implications: linguistic style must be adapted not only to the bullying content but also to the platform and social context in which interventions are deployed.</p></sec><sec id="s4-4"><title>Designing Adaptive and Context-Aware LLM-Based Bystander Interventions</title><p>On the basis of our findings, we provide guidelines to design adaptive and context-aware LLM-based tools to generate bystander responses.</p><list list-type="bullet"><list-item><p><italic>Adapt to platform and social contexts</italic>: design interventions that fit the norms of each platform (eg, Reddit vs TikTok), account for different user roles (eg, bystander vs aggressor), and reflect community guidelines and expectations</p></list-item><list-item><p><italic>Blend theory with natural language</italic>: use psychologically grounded strategies (eg, validation and redirection) but express them in casual, conversational ways that feel authentic to users. Consider hybrid approaches where experts design the structure and AI fills in the style</p></list-item><list-item><p><italic>Balance length and readability</italic>: avoid overly short, templated responses that lack nuance and generate responses with sufficient length to convey empathy and guidance clearly without overwhelming users</p></list-item><list-item><p><italic>Keep messages positive and relatable</italic>: use friendly, familiar language with cues that feel personal and nonjudgmental (eg, &#x201C;just a reminder&#x201D; or &#x201C;hey, let&#x2019;s keep it respectful&#x201D;). Minimize negative emotional framing (eg, accusatory or punitive tones) that can escalate conflict</p></list-item><list-item><p><italic>Learn and improve over time</italic>: build in ways for users to react to or rate AI responses. Use this feedback to continuously refine tone, content, and delivery to match the evolving needs of different online communities</p></list-item></list><p>Taken together, these implications point to practical, deployable intervention designs within existing platforms. With refinements, AllyGPT can be implemented as an assistive layer, rather than a platform-level moderation system, that offers optional, context-sensitive bystander response suggestions at the point of interaction. Similar to AI-powered reply aids [<xref ref-type="bibr" rid="ref65">65</xref>-<xref ref-type="bibr" rid="ref67">67</xref>], it can be integrated directly into platforms (eg, reply scaffolds or pre-post nudges) or deployed via third-party tools such as browser extensions. With its lightweight decision logic and prompt conditioning, AllyGPT can run on existing LLM infrastructures. Future work can examine adoption, platform incentives, and governance considerations for responsible deployment.</p></sec><sec id="s4-5"><title>Limitations and Future Work</title><p>We acknowledge several limitations that inform directions for future research. First, our dataset was drawn from a limited set of online communities and showed imbalances in incivility severity and bullying directionality. This may have constrained the generalizability of our findings. Future work should curate more diverse, representative examples across platforms and contexts, particularly those relevant to vulnerable populations. Second, while we implemented best practices in our coding protocol, each of the 3 raters evaluated 1000 responses, a scale that risks coder fatigue. Future studies should distribute tasks across larger rater pools and incorporate intentional overlap across coding subsets to support reliability calibration and detect potential coder drift or explore adaptive protocols to reduce cognitive burden.</p><p>Third, our evaluation did not include real-world social media users, leaving open questions about how digital bystanders themselves would perceive AI-generated interventions. Engaging users directly through experiments or field studies will be critical to assess both effectiveness and ethical acceptability. Future work might also explore hybrid approaches that combine theoretically grounded templates with dynamically generated content, balancing psychological rigor with personalization and safety. In addition, exploratory contrasts suggested AllyGPT may be more effective than baseline GPT in low-incivility contexts, especially for favorability and behavior change. Although not statistically significant, these patterns highlight promising avenues for further investigation with larger samples or more granular measures.</p><p>Finally, this work does not aim to directly address motivational barriers to bystander intervention, such as fear of retaliation or unwillingness to intervene. Instead, AllyGPT targets a complementary challenge: uncertainty about appropriate language and strategy once bystanders are inclined to act. While lowering cognitive and linguistic barriers may indirectly support action, future work should examine how AI-supported interventions can be combined with mechanisms that more directly address bystander motivation. Despite these limitations, this study presents an important step toward using generative AI to foster prosocial digital behavior. By grounding response generation in psychological theory and evaluating perceived effectiveness, we lay the foundation for future research on human-AI collaboration in digital mental health and online harm mitigation.</p></sec><sec id="s4-6"><title>Conclusions</title><p>This study demonstrates the promise of leveraging generative AI to support bystander intervention in the cyberbullying context, an area closely tied to digital mental health. By systematically comparing baseline GPT responses, theory-informed prompts (AllyGPT), and standard policy reminders, we revealed key differences in perceived effectiveness, linguistic style, and user preferences. Through a mixed-method evaluation, we identified not only the strengths of AI-generated interventions but also their limitations in emotional nuance, contextual fit, and behavioral impact. Our work highlights the potential of psychologically grounded and contextually adaptive AI interventions to reduce the psychological harm associated with cyberbullying. By empowering bystanders to intervene more effectively, our work contributes to the design of scalable, human-centered AI tools that promote safer online environments and users&#x2019; mental well-being.</p></sec></sec></body><back><ack><p>The authors declare the use of generative artificial intelligence (GenAI) in the research and writing process. According to the GAIDeT (Generative Artificial Intelligence Delegation Taxonomy, 2025), the following tasks were delegated to GenAI tools under full human supervision: proofreading and editing. The GenAI tool used was ChatGPT 5.0. Responsibility for the final manuscript lies entirely with the authors. GenAI tools are not listed as authors and do not bear responsibility for the final outcomes.</p></ack><notes><sec><title>Funding</title><p>This work was partially funded by a Rutgers Cyberinfrastructure and AI for Science and Society (CASS) seed grant.</p></sec></notes><fn-group><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">AI</term><def><p>artificial intelligence</p></def></def-item><def-item><term id="abb2">GAIDeT</term><def><p> Generative Artificial Intelligence Delegation Taxonomy</p></def></def-item><def-item><term id="abb3">GenAI</term><def><p>generative artificial intelligence</p></def></def-item><def-item><term id="abb4">HC3</term><def><p>heteroskedasticity-consistent standard errors</p></def></def-item><def-item><term id="abb5">LIWC</term><def><p>Linguistic Inquiry and Word Count</p></def></def-item><def-item><term id="abb6">LLM</term><def><p>large language model</p></def></def-item><def-item><term id="abb7">RQ</term><def><p>research question</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Arif</surname><given-names>A</given-names> </name><name name-style="western"><surname>Qadir</surname><given-names>MA</given-names> </name><name name-style="western"><surname>Martins</surname><given-names>RS</given-names> </name><name name-style="western"><surname>Khuwaja</surname><given-names>HMA</given-names> </name></person-group><article-title>The impact of cyberbullying on mental health outcomes amongst university students: a systematic review</article-title><source>PLOS Ment Health</source><year>2024</year><volume>1</volume><issue>6</issue><fpage>e0000166</fpage><pub-id pub-id-type="doi">10.1371/journal.pmen.0000166</pub-id><pub-id pub-id-type="medline">41661848</pub-id></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Willard</surname><given-names>NE</given-names> </name></person-group><source>Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress</source><year>2007</year><publisher-name>Research Press</publisher-name><pub-id pub-id-type="other">0878225374</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Naslund</surname><given-names>JA</given-names> </name><name name-style="western"><surname>Bondre</surname><given-names>A</given-names> </name><name name-style="western"><surname>Torous</surname><given-names>J</given-names> </name><name name-style="western"><surname>Aschbrenner</surname><given-names>KA</given-names> </name></person-group><article-title>Social media and mental health: benefits, risks, and opportunities for research and practice</article-title><source>J Technol Behav Sci</source><year>2020</year><month>09</month><volume>5</volume><issue>3</issue><fpage>245</fpage><lpage>257</lpage><pub-id pub-id-type="doi">10.1007/s41347-020-00134-x</pub-id><pub-id pub-id-type="medline">33415185</pub-id></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bottino</surname><given-names>SMB</given-names> </name><name name-style="western"><surname>Bottino</surname><given-names>CMC</given-names> </name><name name-style="western"><surname>Regina</surname><given-names>CG</given-names> </name><name name-style="western"><surname>Correia</surname><given-names>AVL</given-names> </name><name name-style="western"><surname>Ribeiro</surname><given-names>WS</given-names> </name></person-group><article-title>Cyberbullying and adolescent mental health: systematic review</article-title><source>Cad Saude Publica</source><year>2015</year><month>03</month><volume>31</volume><issue>3</issue><fpage>463</fpage><lpage>475</lpage><pub-id pub-id-type="doi">10.1590/0102-311x00036114</pub-id><pub-id pub-id-type="medline">25859714</pub-id></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Suzuki</surname><given-names>K</given-names> </name><name name-style="western"><surname>Asaga</surname><given-names>R</given-names> </name><name name-style="western"><surname>Sourander</surname><given-names>A</given-names> </name><name name-style="western"><surname>Hoven</surname><given-names>CW</given-names> </name><name name-style="western"><surname>Mandell</surname><given-names>D</given-names> </name></person-group><article-title>Cyberbullying and adolescent mental health</article-title><source>ijamh</source><year>2012</year><month>03</month><day>1</day><volume>24</volume><issue>1</issue><fpage>27</fpage><lpage>35</lpage><pub-id pub-id-type="doi">10.1515/ijamh.2012.005</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hu</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Bai</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Pan</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Li</surname><given-names>S</given-names> </name></person-group><article-title>Cyberbullying victimization and depression among adolescents: a meta-analysis</article-title><source>Psychiatry Res</source><year>2021</year><month>11</month><volume>305</volume><fpage>114198</fpage><pub-id pub-id-type="doi">10.1016/j.psychres.2021.114198</pub-id><pub-id pub-id-type="medline">34537540</pub-id></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>van Geel</surname><given-names>M</given-names> </name><name name-style="western"><surname>Vedder</surname><given-names>P</given-names> </name><name name-style="western"><surname>Tanilon</surname><given-names>J</given-names> </name></person-group><article-title>Relationship between peer victimization, cyberbullying, and suicide in children and adolescents: a meta-analysis</article-title><source>JAMA Pediatr</source><year>2014</year><month>05</month><volume>168</volume><issue>5</issue><fpage>435</fpage><lpage>442</lpage><pub-id pub-id-type="doi">10.1001/jamapediatrics.2013.4143</pub-id><pub-id pub-id-type="medline">24615300</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ademiluyi</surname><given-names>A</given-names> </name><name name-style="western"><surname>Li</surname><given-names>C</given-names> </name><name name-style="western"><surname>Park</surname><given-names>A</given-names> </name></person-group><article-title>Implications and preventions of cyberbullying and social exclusion in social media: systematic review</article-title><source>JMIR Form Res</source><year>2022</year><month>01</month><day>4</day><volume>6</volume><issue>1</issue><fpage>e30286</fpage><pub-id pub-id-type="doi">10.2196/30286</pub-id><pub-id pub-id-type="medline">34982712</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Liu</surname><given-names>X</given-names> </name><name name-style="western"><surname>Liu</surname><given-names>M</given-names> </name><name name-style="western"><surname>Kang</surname><given-names>X</given-names> </name><name name-style="western"><surname>Han</surname><given-names>N</given-names> </name><name name-style="western"><surname>Liao</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Ren</surname><given-names>Z</given-names> </name></person-group><article-title>More cyberbullying, less happiness, and more injustice&#x2014;psychological changes during the pericyberbullying period: quantitative study based on social media data</article-title><source>J Med Internet Res</source><year>2025</year><volume>27</volume><fpage>e64451</fpage><pub-id pub-id-type="doi">10.2196/64451</pub-id></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kwan</surname><given-names>I</given-names> </name><name name-style="western"><surname>Dickson</surname><given-names>K</given-names> </name><name name-style="western"><surname>Richardson</surname><given-names>M</given-names> </name><etal/></person-group><article-title>Cyberbullying and children and young people&#x2019;s mental health: a systematic map of systematic reviews</article-title><source>Cyberpsychol Behav Soc Netw</source><year>2020</year><month>02</month><volume>23</volume><issue>2</issue><fpage>72</fpage><lpage>82</lpage><pub-id pub-id-type="doi">10.1089/cyber.2019.0370</pub-id><pub-id pub-id-type="medline">31977251</pub-id></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Modecki</surname><given-names>KL</given-names> </name><name name-style="western"><surname>Barber</surname><given-names>BL</given-names> </name><name name-style="western"><surname>Vernon</surname><given-names>L</given-names> </name></person-group><article-title>Mapping developmental precursors of cyber-aggression: trajectories of risk predict perpetration and victimization</article-title><source>J Youth Adolesc</source><year>2013</year><month>05</month><volume>42</volume><issue>5</issue><fpage>651</fpage><lpage>661</lpage><pub-id pub-id-type="doi">10.1007/s10964-012-9887-z</pub-id><pub-id pub-id-type="medline">23242509</pub-id></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Modecki</surname><given-names>KL</given-names> </name><name name-style="western"><surname>Minchin</surname><given-names>J</given-names> </name><name name-style="western"><surname>Harbaugh</surname><given-names>AG</given-names> </name><name name-style="western"><surname>Guerra</surname><given-names>NG</given-names> </name><name name-style="western"><surname>Runions</surname><given-names>KC</given-names> </name></person-group><article-title>Bullying prevalence across contexts: a meta-analysis measuring cyber and traditional bullying</article-title><source>J Adolesc Health</source><year>2014</year><month>11</month><volume>55</volume><issue>5</issue><fpage>602</fpage><lpage>611</lpage><pub-id pub-id-type="doi">10.1016/j.jadohealth.2014.06.007</pub-id><pub-id pub-id-type="medline">25168105</pub-id></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kumar</surname><given-names>VL</given-names> </name><name name-style="western"><surname>Goldstein</surname><given-names>MA</given-names> </name></person-group><article-title>Cyberbullying and adolescents</article-title><source>Curr Pediatr Rep</source><year>2020</year><month>09</month><volume>8</volume><issue>3</issue><fpage>86</fpage><lpage>92</lpage><pub-id pub-id-type="doi">10.1007/s40124-020-00217-6</pub-id><pub-id pub-id-type="medline">33552702</pub-id></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kamaruddin</surname><given-names>IK</given-names> </name><name name-style="western"><surname>Ma&#x2019;rof</surname><given-names>AM</given-names> </name><name name-style="western"><surname>Mohd Nazan</surname><given-names>AIN</given-names> </name><name name-style="western"><surname>Ab Jalil</surname><given-names>H</given-names> </name></person-group><article-title>A systematic review and meta-analysis of interventions to decrease cyberbullying perpetration and victimization: an in-depth analysis within the Asia Pacific region</article-title><source>Front Psychiatry</source><year>2023</year><volume>14</volume><fpage>1014258</fpage><pub-id pub-id-type="doi">10.3389/fpsyt.2023.1014258</pub-id><pub-id pub-id-type="medline">36778634</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Chen</surname><given-names>Q</given-names> </name><name name-style="western"><surname>Chan</surname><given-names>KL</given-names> </name><name name-style="western"><surname>Guo</surname><given-names>S</given-names> </name><name name-style="western"><surname>Chen</surname><given-names>M</given-names> </name><name name-style="western"><surname>Lo</surname><given-names>CKM</given-names> </name><name name-style="western"><surname>Ip</surname><given-names>P</given-names> </name></person-group><article-title>Effectiveness of digital health interventions in reducing bullying and cyberbullying: a meta-analysis</article-title><source>Trauma Violence Abuse</source><year>2023</year><month>07</month><volume>24</volume><issue>3</issue><fpage>1986</fpage><lpage>2002</lpage><pub-id pub-id-type="doi">10.1177/15248380221082090</pub-id><pub-id pub-id-type="medline">35446724</pub-id></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Yosep</surname><given-names>I</given-names> </name><name name-style="western"><surname>Hikmat</surname><given-names>R</given-names> </name><name name-style="western"><surname>Mardhiyah</surname><given-names>A</given-names> </name></person-group><article-title>Nursing intervention for preventing cyberbullying and reducing its negative impact on students: a scoping review</article-title><source>J Multidiscip Healthc</source><year>2023</year><volume>16</volume><fpage>261</fpage><lpage>273</lpage><pub-id pub-id-type="doi">10.2147/JMDH.S400779</pub-id><pub-id pub-id-type="medline">36726483</pub-id></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Brody</surname><given-names>N</given-names> </name><name name-style="western"><surname>Vangelisti</surname><given-names>AL</given-names> </name></person-group><article-title>Bystander intervention in cyberbullying</article-title><source>Commun Monogr</source><year>2016</year><month>01</month><day>2</day><volume>83</volume><issue>1</issue><fpage>94</fpage><lpage>119</lpage><pub-id pub-id-type="doi">10.1080/03637751.2015.1044256</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Hedderich</surname><given-names>MA</given-names> </name><name name-style="western"><surname>Bazarova</surname><given-names>NN</given-names> </name><name name-style="western"><surname>Zou</surname><given-names>W</given-names> </name><name name-style="western"><surname>Shim</surname><given-names>R</given-names> </name><name name-style="western"><surname>Ma</surname><given-names>X</given-names> </name><name name-style="western"><surname>Yang</surname><given-names>Q</given-names> </name></person-group><article-title>A piece of theatre: investigating how teachers design LLM chatbots to assist adolescent cyberbullying education</article-title><year>2024</year><month>05</month><day>11</day><conf-name>CHI &#x2019;24</conf-name><conf-loc>Honolulu HI USA</conf-loc><fpage>1</fpage><lpage>17</lpage><pub-id pub-id-type="doi">10.1145/3613904.3642379</pub-id></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Fredrick</surname><given-names>SS</given-names> </name><name name-style="western"><surname>Jenkins</surname><given-names>LN</given-names> </name><name name-style="western"><surname>Ray</surname><given-names>K</given-names> </name></person-group><article-title>Dimensions of empathy and bystander intervention in bullying in elementary school</article-title><source>J Sch Psychol</source><year>2020</year><month>04</month><volume>79</volume><fpage>31</fpage><lpage>42</lpage><pub-id pub-id-type="doi">10.1016/j.jsp.2020.03.001</pub-id><pub-id pub-id-type="medline">32389247</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>DiFranzo</surname><given-names>D</given-names> </name><name name-style="western"><surname>Taylor</surname><given-names>SH</given-names> </name><name name-style="western"><surname>Kazerooni</surname><given-names>F</given-names> </name><name name-style="western"><surname>Wherry</surname><given-names>OD</given-names> </name><name name-style="western"><surname>Bazarova</surname><given-names>NN</given-names> </name></person-group><article-title>Upstanding by design: bystander intervention in cyberbullying</article-title><year>2018</year><conf-name>Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems</conf-name><conf-date>Apr 21-26, 2018</conf-date><conf-loc>Montreal, QC, Canada</conf-loc><fpage>1</fpage><lpage>12</lpage><pub-id pub-id-type="doi">10.1145/3173574.3173785</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Matias</surname><given-names>JN</given-names> </name></person-group><article-title>Preventing harassment and increasing group participation through social norms in 2,190 online science discussions</article-title><source>Proc Natl Acad Sci U S A</source><year>2019</year><month>05</month><day>14</day><volume>116</volume><issue>20</issue><fpage>9785</fpage><lpage>9789</lpage><pub-id pub-id-type="doi">10.1073/pnas.1813486116</pub-id><pub-id pub-id-type="medline">31036646</pub-id></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bastiaensens</surname><given-names>S</given-names> </name><name name-style="western"><surname>Pabian</surname><given-names>S</given-names> </name><name name-style="western"><surname>Vandebosch</surname><given-names>H</given-names> </name><etal/></person-group><article-title>From normative influence to social pressure: how relevant others affect whether bystanders join in cyberbullying</article-title><source>Soc Dev</source><year>2016</year><month>02</month><volume>25</volume><issue>1</issue><fpage>193</fpage><lpage>211</lpage><pub-id pub-id-type="doi">10.1111/sode.12134</pub-id></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Machackova</surname><given-names>H</given-names> </name><name name-style="western"><surname>Dedkova</surname><given-names>L</given-names> </name><name name-style="western"><surname>Sevcikova</surname><given-names>A</given-names> </name><name name-style="western"><surname>Cerna</surname><given-names>A</given-names> </name></person-group><article-title>Bystanders&#x2019; supportive and passive responses to cyberaggression</article-title><source>J Sch Violence</source><year>2018</year><month>01</month><day>2</day><volume>17</volume><issue>1</issue><fpage>99</fpage><lpage>110</lpage><pub-id pub-id-type="doi">10.1080/15388220.2016.1222499</pub-id></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Davidovic</surname><given-names>A</given-names> </name><name name-style="western"><surname>Talbot</surname><given-names>C</given-names> </name><name name-style="western"><surname>Hamilton-Giachritsis</surname><given-names>C</given-names> </name><name name-style="western"><surname>Joinson</surname><given-names>A</given-names> </name></person-group><article-title>To intervene or not to intervene: young adults&#x2019; views on when and how to intervene in online harassment</article-title><source>J Comput-Mediat Commun</source><year>2023</year><month>08</month><day>4</day><volume>28</volume><issue>5</issue><fpage>zmad027</fpage><pub-id pub-id-type="doi">10.1093/jcmc/zmad027</pub-id></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="thesis"><person-group person-group-type="author"><name name-style="western"><surname>Karasavva</surname><given-names>V</given-names> </name></person-group><article-title>I&#x2019;ll be there for you?: the bystander intervention model and cyber aggression</article-title><publisher-name>University of British Columbia</publisher-name><pub-id pub-id-type="doi">10.5817/CP2024-2-1</pub-id></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Henares-Montiel</surname><given-names>J</given-names> </name><name name-style="western"><surname>Pastor-Moreno</surname><given-names>G</given-names> </name><name name-style="western"><surname>Ram&#x00ED;rez-Saiz</surname><given-names>A</given-names> </name><name name-style="western"><surname>Rodr&#x00ED;guez-G&#x00F3;mez</surname><given-names>M</given-names> </name><name name-style="western"><surname>Ruiz-P&#x00E9;rez</surname><given-names>I</given-names> </name></person-group><article-title>Characteristics and effectiveness of interventions to reduce cyberbullying: a systematic review</article-title><source>Front Public Health</source><year>2023</year><volume>11</volume><fpage>1219727</fpage><pub-id pub-id-type="doi">10.3389/fpubh.2023.1219727</pub-id><pub-id pub-id-type="medline">37711240</pub-id></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Rajeshwari</surname><given-names>BS</given-names> </name><name name-style="western"><surname>Divya</surname><given-names>I</given-names> </name></person-group><article-title>Combating cyberbullying with generative AI: large language models (LLMs) in cyberbullying prevention</article-title><source>Combating Cyberbullying With Generative AI</source><year>2025</year><publisher-name>IGI Global Scientific Publishing</publisher-name><fpage>329</fpage><lpage>364</lpage><pub-id pub-id-type="doi">10.4018/979-8-3373-0543-1.ch012</pub-id></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Moxey</surname><given-names>N</given-names> </name><name name-style="western"><surname>Bussey</surname><given-names>K</given-names> </name></person-group><article-title>Styles of bystander intervention in cyberbullying incidents</article-title><source>Int Journal of Bullying Prevention</source><year>2020</year><month>03</month><volume>2</volume><issue>1</issue><fpage>6</fpage><lpage>15</lpage><pub-id pub-id-type="doi">10.1007/s42380-019-00039-1</pub-id></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pronk</surname><given-names>J</given-names> </name><name name-style="western"><surname>Olthof</surname><given-names>T</given-names> </name><name name-style="western"><surname>Goossens</surname><given-names>FA</given-names> </name><name name-style="western"><surname>Krabbendam</surname><given-names>L</given-names> </name></person-group><article-title>Differences in adolescents&#x2019; motivations for indirect, direct, and hybrid peer defending</article-title><source>Soc Dev</source><year>2019</year><month>05</month><volume>28</volume><issue>2</issue><fpage>414</fpage><lpage>429</lpage><pub-id pub-id-type="doi">10.1111/sode.12348</pub-id><pub-id pub-id-type="medline">31379420</pub-id></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Reijntjes</surname><given-names>A</given-names> </name><name name-style="western"><surname>Vermande</surname><given-names>M</given-names> </name><name name-style="western"><surname>Olthof</surname><given-names>T</given-names> </name><name name-style="western"><surname>Goossens</surname><given-names>FA</given-names> </name><name name-style="western"><surname>Aleva</surname><given-names>L</given-names> </name><name name-style="western"><surname>van der Meulen</surname><given-names>M</given-names> </name></person-group><article-title>Defending victimized peers: opposing the bully, supporting the victim, or both?</article-title><source>Aggress Behav</source><year>2016</year><month>11</month><volume>42</volume><issue>6</issue><fpage>585</fpage><lpage>597</lpage><pub-id pub-id-type="doi">10.1002/ab.21653</pub-id><pub-id pub-id-type="medline">27028845</pub-id></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Smith</surname><given-names>PK</given-names> </name><name name-style="western"><surname>Mahdavi</surname><given-names>J</given-names> </name><name name-style="western"><surname>Carvalho</surname><given-names>M</given-names> </name><name name-style="western"><surname>Fisher</surname><given-names>S</given-names> </name><name name-style="western"><surname>Russell</surname><given-names>S</given-names> </name><name name-style="western"><surname>Tippett</surname><given-names>N</given-names> </name></person-group><article-title>Cyberbullying: its nature and impact in secondary school pupils</article-title><source>J Child Psychol Psychiatry</source><year>2008</year><month>04</month><volume>49</volume><issue>4</issue><fpage>376</fpage><lpage>385</lpage><pub-id pub-id-type="doi">10.1111/j.1469-7610.2007.01846.x</pub-id><pub-id pub-id-type="medline">18363945</pub-id></nlm-citation></ref><ref id="ref32"><label>32</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Datta</surname><given-names>P</given-names> </name><name name-style="western"><surname>Cornell</surname><given-names>D</given-names> </name><name name-style="western"><surname>Huang</surname><given-names>F</given-names> </name></person-group><article-title>Aggressive attitudes and prevalence of bullying bystander behavior in middle school</article-title><source>Psychol Schs</source><year>2016</year><month>09</month><volume>53</volume><issue>8</issue><fpage>804</fpage><lpage>816</lpage><pub-id pub-id-type="doi">10.1002/pits.21944</pub-id></nlm-citation></ref><ref id="ref33"><label>33</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>DeSmet</surname><given-names>A</given-names> </name><name name-style="western"><surname>Veldeman</surname><given-names>C</given-names> </name><name name-style="western"><surname>Poels</surname><given-names>K</given-names> </name><etal/></person-group><article-title>Determinants of self-reported bystander behavior in cyberbullying incidents amongst adolescents</article-title><source>Cyberpsychol Behav Soc Netw</source><year>2014</year><month>04</month><volume>17</volume><issue>4</issue><fpage>207</fpage><lpage>215</lpage><pub-id pub-id-type="doi">10.1089/cyber.2013.0027</pub-id><pub-id pub-id-type="medline">24359305</pub-id></nlm-citation></ref><ref id="ref34"><label>34</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Cassidy</surname><given-names>W</given-names> </name><name name-style="western"><surname>Faucher</surname><given-names>C</given-names> </name><name name-style="western"><surname>Jackson</surname><given-names>M</given-names> </name></person-group><article-title>Cyberbullying among youth: a comprehensive review of current international research and its implications and application to policy and practice</article-title><source>Sch Psychol Int</source><year>2013</year><month>12</month><volume>34</volume><issue>6</issue><fpage>575</fpage><lpage>612</lpage><pub-id pub-id-type="doi">10.1177/0143034313479697</pub-id></nlm-citation></ref><ref id="ref35"><label>35</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>DeSmet</surname><given-names>A</given-names> </name><name name-style="western"><surname>Van Cleemput</surname><given-names>K</given-names> </name><name name-style="western"><surname>Bastiaensens</surname><given-names>S</given-names> </name><etal/></person-group><article-title>Bridging behavior science and gaming theory: using the Intervention Mapping Protocol to design a serious game against cyberbullying</article-title><source>Comput Human Behav</source><year>2016</year><month>03</month><volume>56</volume><fpage>337</fpage><lpage>351</lpage><pub-id pub-id-type="doi">10.1016/j.chb.2015.11.039</pub-id></nlm-citation></ref><ref id="ref36"><label>36</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Ray</surname><given-names>R</given-names> </name><name name-style="western"><surname>Brown</surname><given-names>M</given-names> </name><name name-style="western"><surname>Summers</surname><given-names>E</given-names> </name><name name-style="western"><surname>Elizondo</surname><given-names>S</given-names> </name><name name-style="western"><surname>Powelson</surname><given-names>C</given-names> </name></person-group><article-title>Bystander intervention on social media: examining cyberbullying and reactions to systemic racism</article-title><source>BROOKINGS</source><year>2021</year><access-date>2025-09-15</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.brookings.edu/research/bystander-intervention-on-social-media-examining-cyberbullying-and-reactions-to-systemic-racism/">https://www.brookings.edu/research/bystander-intervention-on-social-media-examining-cyberbullying-and-reactions-to-systemic-racism/</ext-link></comment></nlm-citation></ref><ref id="ref37"><label>37</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Islam</surname><given-names>MS</given-names> </name><name name-style="western"><surname>Sutton</surname><given-names>S</given-names> </name><name name-style="western"><surname>Rafiq</surname><given-names>RI</given-names> </name></person-group><article-title>A generative AI powered approach to cyberbullying detection</article-title><year>2024</year><month>06</month><day>24</day><conf-name>ICISDM 2024</conf-name><conf-date>Jun 24-26, 2024</conf-date><conf-loc>Los Angeles CA USA</conf-loc><fpage>57</fpage><lpage>63</lpage><pub-id pub-id-type="doi">10.1145/3686397.3686407</pub-id></nlm-citation></ref><ref id="ref38"><label>38</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Vanpech</surname><given-names>P</given-names> </name><name name-style="western"><surname>Peerabenjakul</surname><given-names>K</given-names> </name><name name-style="western"><surname>Suriwong</surname><given-names>N</given-names> </name><name name-style="western"><surname>Fugkeaw</surname><given-names>S</given-names> </name></person-group><article-title>Detecting cyberbullying on social networks using language learning model</article-title><year>2024</year><conf-name>2024 16th International Conference on Knowledge and Smart Technology (KST)</conf-name><conf-date>Feb 28 to Mar 2, 2024</conf-date><conf-loc>Krabi, Thailand</conf-loc><fpage>161</fpage><lpage>166</lpage><pub-id pub-id-type="doi">10.1109/KST61284.2024.10499678</pub-id></nlm-citation></ref><ref id="ref39"><label>39</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Wu</surname><given-names>R</given-names> </name><name name-style="western"><surname>Yu</surname><given-names>C</given-names> </name><name name-style="western"><surname>Pan</surname><given-names>X</given-names> </name><etal/></person-group><article-title>MindShift: leveraging large language models for mental-states-based problematic smartphone use intervention</article-title><year>2024</year><month>05</month><day>11</day><conf-name>CHI &#x2019;24</conf-name><conf-date>May 20-25, 2024</conf-date><conf-loc>Honolulu HI USA</conf-loc><fpage>1</fpage><lpage>24</lpage><pub-id pub-id-type="doi">10.1145/3613904.3642790</pub-id></nlm-citation></ref><ref id="ref40"><label>40</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Verma</surname><given-names>K</given-names> </name><name name-style="western"><surname>Adebayo</surname><given-names>KJ</given-names> </name><name name-style="western"><surname>Wagner</surname><given-names>J</given-names> </name><etal/></person-group><article-title>Beyond binary: towards embracing complexities in cyberbullying detection and intervention - a position paper</article-title><year>2024</year><access-date>2025-09-15</access-date><conf-name>Joint International Conference on Computational Linguistics, Language Resources and Evaluation</conf-name><conf-date>May 20-25, 2024</conf-date><conf-loc>Torino, Italy</conf-loc><fpage>2264</fpage><lpage>2284</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://lrec.elra.info/lrec2024/lrec-main">https://lrec.elra.info/lrec2024/lrec-main</ext-link></comment><pub-id pub-id-type="doi">10.63317/4hyzpfm47iwa</pub-id></nlm-citation></ref><ref id="ref41"><label>41</label><nlm-citation citation-type="other"><person-group person-group-type="author"><name name-style="western"><surname>ElSherief</surname><given-names>M</given-names> </name><name name-style="western"><surname>Ziems</surname><given-names>C</given-names> </name><name name-style="western"><surname>Muchlinski</surname><given-names>D</given-names> </name><etal/></person-group><article-title>Latent hatred: a benchmark for understanding implicit hate speech</article-title><source>ArXiv</source><comment>Preprint posted online on 2021</comment><pub-id pub-id-type="doi">10.18653/v1/2021.emnlp-main.29</pub-id></nlm-citation></ref><ref id="ref42"><label>42</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Huang</surname><given-names>Q</given-names> </name><name name-style="western"><surname>Singh</surname><given-names>VK</given-names> </name><name name-style="western"><surname>Atrey</surname><given-names>PK</given-names> </name></person-group><article-title>Cyber bullying detection using social and textual analysis</article-title><year>2014</year><month>11</month><day>7</day><conf-name>MM &#x2019;14</conf-name><conf-loc>Orlando Florida USA</conf-loc><fpage>3</fpage><lpage>6</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://dl.acm.org/doi/proceedings/10.1145/2661126">https://dl.acm.org/doi/proceedings/10.1145/2661126</ext-link></comment><pub-id pub-id-type="doi">10.1145/2661126.2661133</pub-id></nlm-citation></ref><ref id="ref43"><label>43</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>K&#x00E4;rn&#x00E4;</surname><given-names>A</given-names> </name><name name-style="western"><surname>Voeten</surname><given-names>M</given-names> </name><name name-style="western"><surname>Poskiparta</surname><given-names>E</given-names> </name><name name-style="western"><surname>Salmivalli</surname><given-names>C</given-names> </name></person-group><article-title>Vulnerable children in varying classroom contexts: bystanders&#x2019; behaviors moderate the effects of risk factors on victimization</article-title><source>mpq</source><year>2010</year><month>07</month><volume>56</volume><issue>3</issue><fpage>261</fpage><lpage>282</lpage><pub-id pub-id-type="doi">10.1353/mpq.0.0052</pub-id></nlm-citation></ref><ref id="ref44"><label>44</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Latan&#x00E9;</surname><given-names>B</given-names> </name><name name-style="western"><surname>Darley</surname><given-names>JM</given-names> </name></person-group><source>The Unresponsive Bystander: Why Doesn&#x2019;t He Help?</source><year>1970</year><publisher-name>Prentice Hall</publisher-name><pub-id pub-id-type="other">0139386130</pub-id></nlm-citation></ref><ref id="ref45"><label>45</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Huang</surname><given-names>L</given-names> </name><name name-style="western"><surname>Li</surname><given-names>W</given-names> </name><name name-style="western"><surname>Xu</surname><given-names>Z</given-names> </name><etal/></person-group><article-title>The severity of cyberbullying affects bystander intervention among college students: the roles of feelings of responsibility and empathy</article-title><source>Psychol Res Behav Manag</source><year>2023</year><volume>16</volume><fpage>893</fpage><lpage>903</lpage><pub-id pub-id-type="doi">10.2147/PRBM.S397770</pub-id><pub-id pub-id-type="medline">36974038</pub-id></nlm-citation></ref><ref id="ref46"><label>46</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Macaulay</surname><given-names>PJR</given-names> </name><name name-style="western"><surname>Betts</surname><given-names>LR</given-names> </name><name name-style="western"><surname>Stiller</surname><given-names>J</given-names> </name><name name-style="western"><surname>Kellezi</surname><given-names>B</given-names> </name></person-group><article-title>Bystander responses to cyberbullying: the role of perceived severity, publicity, anonymity, type of cyberbullying, and victim response</article-title><source>Comput Human Behav</source><year>2022</year><month>06</month><volume>131</volume><fpage>107238</fpage><pub-id pub-id-type="doi">10.1016/j.chb.2022.107238</pub-id></nlm-citation></ref><ref id="ref47"><label>47</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Schultze&#x2010;Krumbholz</surname><given-names>A</given-names> </name><name name-style="western"><surname>Schultze</surname><given-names>M</given-names> </name><name name-style="western"><surname>Zagorscak</surname><given-names>P</given-names> </name><name name-style="western"><surname>W&#x00F6;lfer</surname><given-names>R</given-names> </name><name name-style="western"><surname>Scheithauer</surname><given-names>H</given-names> </name></person-group><article-title>Feeling cybervictims&#x2019; pain&#x2014;The effect of empathy training on cyberbullying</article-title><source>Aggress Behav</source><year>2016</year><month>03</month><volume>42</volume><issue>2</issue><fpage>147</fpage><lpage>156</lpage><pub-id pub-id-type="doi">10.1002/ab.21613</pub-id></nlm-citation></ref><ref id="ref48"><label>48</label><nlm-citation citation-type="web"><article-title>Do not threaten, harass, or bully</article-title><source>reddit</source><comment><ext-link ext-link-type="uri" xlink:href="https://support.reddithelp.com/hc/en-us/articles/360043071072-Do-not-threaten-harass-or-bully">https://support.reddithelp.com/hc/en-us/articles/360043071072-Do-not-threaten-harass-or-bully</ext-link></comment></nlm-citation></ref><ref id="ref49"><label>49</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sainio</surname><given-names>M</given-names> </name><name name-style="western"><surname>Veenstra</surname><given-names>R</given-names> </name><name name-style="western"><surname>Huitsing</surname><given-names>G</given-names> </name><name name-style="western"><surname>Salmivalli</surname><given-names>C</given-names> </name></person-group><article-title>Victims and their defenders: a dyadic approach</article-title><source>Int J Behav Dev</source><year>2011</year><month>03</month><volume>35</volume><issue>2</issue><fpage>144</fpage><lpage>151</lpage><pub-id pub-id-type="doi">10.1177/0165025410378068</pub-id></nlm-citation></ref><ref id="ref50"><label>50</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Willoughby</surname><given-names>B</given-names> </name><name name-style="western"><surname>Costello</surname><given-names>M</given-names> </name><name name-style="western"><surname>Garcia</surname><given-names>M</given-names> </name><name name-style="western"><surname>Brooks</surname><given-names>L</given-names> </name></person-group><article-title>Speak up at school: how to respond to everyday prejudice, bigotry and stereotypes</article-title><source>Learning for Justice</source><year>2022</year><access-date>2025-09-15</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.learningforjustice.org/sites/default/files/2022-12/LFJ-Speak-Up-at-School-December-2022-Web-12052022.pdf">https://www.learningforjustice.org/sites/default/files/2022-12/LFJ-Speak-Up-at-School-December-2022-Web-12052022.pdf</ext-link></comment></nlm-citation></ref><ref id="ref51"><label>51</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>MacGeorge</surname><given-names>EL</given-names> </name><name name-style="western"><surname>Feng</surname><given-names>B</given-names> </name><name name-style="western"><surname>Burleson</surname><given-names>BR</given-names> </name></person-group><person-group person-group-type="editor"><name name-style="western"><surname>Knapp</surname><given-names>ML</given-names> </name><name name-style="western"><surname>Daly</surname><given-names>JA</given-names> </name></person-group><article-title>Supportive communication</article-title><source>The SAGE Handbook of Interpersonal Communication</source><access-date>2025-09-15</access-date><volume>2011</volume><edition>4</edition><publisher-name>SAGE Publications</publisher-name><fpage>317</fpage><lpage>354</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://books.google.com/books?hl=en&#x0026;lr=&#x0026;id=ZNF1AwAAQBAJ&#x0026;oi=fnd&#x0026;pg=PA317&#x0026;dq=Social+support,+supportive+communication,+and+health&#x0026;ots=rpgb1VrpoH&#x0026;sig=swss7wm6QoJiY3Uf1flRnGupBCU#v=onepage&#x0026;q=Social%20support%2C%20supportive%20communication,%20and%20health&#x0026;f=false">https://books.google.com/books?hl=en&#x0026;lr=&#x0026;id=ZNF1AwAAQBAJ&#x0026;oi=fnd&#x0026;pg=PA317&#x0026;dq=Social+support,+supportive+communication,+and+health&#x0026;ots=rpgb1VrpoH&#x0026;sig=swss7wm6QoJiY3Uf1flRnGupBCU#v=onepage&#x0026;q=Social%20support%2C%20supportive%20communication,%20and%20health&#x0026;f=false</ext-link></comment></nlm-citation></ref><ref id="ref52"><label>52</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Holmstrom</surname><given-names>AJ</given-names> </name><name name-style="western"><surname>Russell</surname><given-names>JC</given-names> </name><name name-style="western"><surname>Clare</surname><given-names>DD</given-names> </name></person-group><article-title>Esteem support messages received during the job search: a test of the CETESM</article-title><source>Commun Monogr</source><year>2013</year><month>06</month><volume>80</volume><issue>2</issue><fpage>220</fpage><lpage>242</lpage><pub-id pub-id-type="doi">10.1080/03637751.2013.775699</pub-id></nlm-citation></ref><ref id="ref53"><label>53</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Rothon</surname><given-names>C</given-names> </name><name name-style="western"><surname>Head</surname><given-names>J</given-names> </name><name name-style="western"><surname>Klineberg</surname><given-names>E</given-names> </name><name name-style="western"><surname>Stansfeld</surname><given-names>S</given-names> </name></person-group><article-title>Can social support protect bullied adolescents from adverse outcomes? A prospective study on the effects of bullying on the educational achievement and mental health of adolescents at secondary schools in East London</article-title><source>J Adolesc</source><year>2011</year><month>06</month><volume>34</volume><issue>3</issue><fpage>579</fpage><lpage>588</lpage><pub-id pub-id-type="doi">10.1016/j.adolescence.2010.02.007</pub-id><pub-id pub-id-type="medline">20637501</pub-id></nlm-citation></ref><ref id="ref54"><label>54</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Tye-Williams</surname><given-names>S</given-names> </name><name name-style="western"><surname>Krone</surname><given-names>KJ</given-names> </name></person-group><article-title>Identifying and re-imagining the paradox of workplace bullying advice</article-title><source>J Appl Commun Res</source><year>2017</year><month>03</month><day>15</day><volume>45</volume><issue>2</issue><fpage>218</fpage><lpage>235</lpage><pub-id pub-id-type="doi">10.1080/00909882.2017.1288291</pub-id></nlm-citation></ref><ref id="ref55"><label>55</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Malecki</surname><given-names>CK</given-names> </name><name name-style="western"><surname>Demaray</surname><given-names>MK</given-names> </name><name name-style="western"><surname>Davidson</surname><given-names>LM</given-names> </name></person-group><article-title>The relationship among social support, victimization, and student adjustment in a predominantly latino sample</article-title><source>J Sch Violence</source><year>2008</year><month>08</month><day>29</day><volume>7</volume><issue>4</issue><fpage>48</fpage><lpage>71</lpage><pub-id pub-id-type="doi">10.1080/15388220801973847</pub-id></nlm-citation></ref><ref id="ref56"><label>56</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Coker</surname><given-names>AL</given-names> </name><name name-style="western"><surname>Bush</surname><given-names>HM</given-names> </name><name name-style="western"><surname>Fisher</surname><given-names>BS</given-names> </name><etal/></person-group><article-title>Multi-college bystander intervention evaluation for violence prevention</article-title><source>Am J Prev Med</source><year>2016</year><month>03</month><volume>50</volume><issue>3</issue><fpage>295</fpage><lpage>302</lpage><pub-id pub-id-type="doi">10.1016/j.amepre.2015.08.034</pub-id><pub-id pub-id-type="medline">26541099</pub-id></nlm-citation></ref><ref id="ref57"><label>57</label><nlm-citation citation-type="report"><person-group person-group-type="author"><name name-style="western"><surname>Boyd</surname><given-names>RL</given-names> </name><name name-style="western"><surname>Ashokkumar</surname><given-names>A</given-names> </name><name name-style="western"><surname>Seraj</surname><given-names>S</given-names> </name><name name-style="western"><surname>Pennebaker</surname><given-names>JW</given-names> </name></person-group><article-title>The development and psychometric properties of LIWC-22</article-title><year>2022</year><access-date>2025-09-15</access-date><volume>10</volume><publisher-name>The University of Texas at Austin</publisher-name><fpage>1</fpage><lpage>47</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://www.liwc.app/static/documents/LIWC-22%20Manual%20-%20Development%20and%20Psychometrics.pdf">https://www.liwc.app/static/documents/LIWC-22%20Manual%20-%20Development%20and%20Psychometrics.pdf</ext-link></comment></nlm-citation></ref><ref id="ref58"><label>58</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Latan?</surname><given-names>B</given-names> </name><name name-style="western"><surname>Nida</surname><given-names>S</given-names> </name></person-group><article-title>Ten years of research on group size and helping</article-title><source>Psychol Bull</source><year>1981</year><volume>89</volume><issue>2</issue><fpage>308</fpage><lpage>324</lpage><pub-id pub-id-type="doi">10.1037//0033-2909.89.2.308</pub-id></nlm-citation></ref><ref id="ref59"><label>59</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Darley</surname><given-names>JM</given-names> </name><name name-style="western"><surname>Latan&#x00E9;</surname><given-names>B</given-names> </name></person-group><article-title>Bystander intervention in emergencies: diffusion of responsibility</article-title><source>J Pers Soc Psychol</source><year>1968</year><month>04</month><volume>8</volume><issue>4</issue><fpage>377</fpage><lpage>383</lpage><pub-id pub-id-type="doi">10.1037/h0025589</pub-id><pub-id pub-id-type="medline">5645600</pub-id></nlm-citation></ref><ref id="ref60"><label>60</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Fischer</surname><given-names>P</given-names> </name><name name-style="western"><surname>Krueger</surname><given-names>JI</given-names> </name><name name-style="western"><surname>Greitemeyer</surname><given-names>T</given-names> </name><etal/></person-group><article-title>The bystander-effect: a meta-analytic review on bystander intervention in dangerous and non-dangerous emergencies</article-title><source>Psychol Bull</source><year>2011</year><month>07</month><volume>137</volume><issue>4</issue><fpage>517</fpage><lpage>537</lpage><pub-id pub-id-type="doi">10.1037/a0023304</pub-id><pub-id pub-id-type="medline">21534650</pub-id></nlm-citation></ref><ref id="ref61"><label>61</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Seering</surname><given-names>J</given-names> </name><name name-style="western"><surname>Wang</surname><given-names>T</given-names> </name><name name-style="western"><surname>Yoon</surname><given-names>J</given-names> </name><name name-style="western"><surname>Kaufman</surname><given-names>G</given-names> </name></person-group><article-title>Moderator engagement and community development in the age of algorithms</article-title><source>New Media &#x0026; Society</source><year>2019</year><month>07</month><volume>21</volume><issue>7</issue><fpage>1417</fpage><lpage>1443</lpage><pub-id pub-id-type="doi">10.1177/1461444818821316</pub-id></nlm-citation></ref><ref id="ref62"><label>62</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zhao</surname><given-names>P</given-names> </name><name name-style="western"><surname>Bazarova</surname><given-names>NN</given-names> </name><name name-style="western"><surname>DiFranzo</surname><given-names>D</given-names> </name><name name-style="western"><surname>Hui</surname><given-names>W</given-names> </name><name name-style="western"><surname>Kizilcec</surname><given-names>RF</given-names> </name><name name-style="western"><surname>Margolin</surname><given-names>D</given-names> </name></person-group><article-title>Standing up to problematic content on social media: which objection strategies draw the audience&#x2019;s approval?</article-title><source>J Comput Mediat Commun</source><year>2023</year><month>11</month><day>8</day><volume>29</volume><issue>1</issue><pub-id pub-id-type="doi">10.1093/jcmc/zmad046</pub-id></nlm-citation></ref><ref id="ref63"><label>63</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Oliveira</surname><given-names>AW</given-names> </name><name name-style="western"><surname>Brown</surname><given-names>AO</given-names> </name><name name-style="western"><surname>Shao</surname><given-names>G</given-names> </name><name name-style="western"><surname>Wenghofer</surname><given-names>A</given-names> </name></person-group><article-title>Integrating public communication into undergraduate science through creative production of audio podcasts</article-title><source>Aust Educ Res</source><year>2025</year><month>12</month><volume>52</volume><issue>6</issue><fpage>3925</fpage><lpage>3954</lpage><pub-id pub-id-type="doi">10.1007/s13384-025-00882-w</pub-id></nlm-citation></ref><ref id="ref64"><label>64</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gligori&#x0107;</surname><given-names>K</given-names> </name><name name-style="western"><surname>Anderson</surname><given-names>A</given-names> </name><name name-style="western"><surname>West</surname><given-names>R</given-names> </name></person-group><article-title>Causal effects of brevity on style and success in social media</article-title><source>Proc ACM Hum-Comput Interact</source><year>2019</year><month>11</month><day>7</day><volume>3</volume><issue>CSCW</issue><fpage>1</fpage><lpage>23</lpage><pub-id pub-id-type="doi">10.1145/3359147</pub-id></nlm-citation></ref><ref id="ref65"><label>65</label><nlm-citation citation-type="web"><person-group person-group-type="author"><collab>Easy-Peasy.AI</collab></person-group><article-title>How to use AI response generators</article-title><source>LinkedIn</source><access-date>2024-03-07</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.linkedin.com/pulse/how-use-ai-response-generators-easy-peasy-ai-xmuqc/">https://www.linkedin.com/pulse/how-use-ai-response-generators-easy-peasy-ai-xmuqc/</ext-link></comment></nlm-citation></ref><ref id="ref66"><label>66</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Masternak</surname><given-names>W</given-names> </name></person-group><article-title>Use reply suggestions</article-title><source>HelpDesk</source><access-date>2025-09-24</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.helpdesk.com/help/use-reply-suggestions/">https://www.helpdesk.com/help/use-reply-suggestions/</ext-link></comment></nlm-citation></ref><ref id="ref67"><label>67</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Dimas</surname><given-names>A</given-names> </name></person-group><article-title>Boost engagement and save time with an AI reply assistant</article-title><source>CoSchedule</source><access-date>2025-07-11</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://coschedule.com/ai-marketing/ai-reply-assistant">https://coschedule.com/ai-marketing/ai-reply-assistant</ext-link></comment></nlm-citation></ref></ref-list><app-group><supplementary-material id="app1"><label>Multimedia Appendix 1</label><p>Details of the 5 bystander intervention strategies grounded in psychological theories.</p><media xlink:href="formative_v10i1e84391_app1.docx" xlink:title="DOCX File, 2198 KB"/></supplementary-material><supplementary-material id="app2"><label>Multimedia Appendix 2</label><p>Example responses generated by the 3 bystander intervention strategies by incivility level and direction of aggression.</p><media xlink:href="formative_v10i1e84391_app2.docx" xlink:title="DOCX File, 27 KB"/></supplementary-material></app-group></back></article>