{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:32:09Z","timestamp":1726043529033},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030306038"},{"type":"electronic","value":"9783030306045"}],"license":[{"start":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T00:00:00Z","timestamp":1567641600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-30604-5_23","type":"book-chapter","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T06:13:03Z","timestamp":1567577583000},"page":"253-262","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Recognition of Antisocial Behavior in Online Discussions"],"prefix":"10.1007","author":[{"given":"Krist\u00edna","family":"Machov\u00e1","sequence":"first","affiliation":[]},{"given":"Dominik","family":"Koles\u00e1r","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,5]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Kumar, S., West, \u0158., Leskovec, J.: Disinformation on the web. In: Proceedings of the 25th International on Word Wide Web \u2013 WWW16. Association for Computing Machinery, pp. 591\u2013602. ACM, Montreal (2016)","DOI":"10.1145\/2872427.2883085"},{"key":"23_CR2","unstructured":"Lessne, X., Hermalkar, X.: Student Reports of Bullying and Cyber-Bullying: Results from the 2011 School Crime Supplement to the National Crime Victimization Survey, Web Tables, NCES 2013-329. http:\/\/nces.ed.gov\/ . Accessed 25 May 2019"},{"key":"23_CR3","unstructured":"March, E.: \u2018Don\u2019t feed the trolls\u2019 really is good advice \u2013 here\u2019s the\u00a0evidence. https:\/\/theconversation.com\/dont-feed-the-trolls-really-is-good-advice-heres-the-evidence-63657 . Accessed 25 May 2019"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Wang, S.E., Garcia-Molina, H.: Disinformation Techniques for Entity resolution. In: Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, New York, USA, pp. 715\u2013720 (2013)","DOI":"10.1145\/2505515.2505636"},{"key":"23_CR5","unstructured":"\u0158imn\u00e1\u010d, M.: Detection of a disinformation content \u2013 case study Novi\u010dok in CR. In: Proceedings of the Conference Data a znalosti & WIKT 2018, Brno, Vysok\u00e9 u\u010den\u00ed technick\u00e9, pp. 65\u201369 (2018)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Dematis, I., Karapistoli, E., Vakali, A.: Fake review detection via exploitation os spam indicators and reviewer behaviour characteristics. In: Proceedings of the 44th International Conference on Current Trends in Theory and Practice of Computer Science beyond Frontiers - SOFSEM 2018. Lecture Notes in Computer Science, Krems an der Donau, pp. 1\u201314. Springer, Heidelberg (2018)","DOI":"10.1007\/978-3-319-73117-9_41"},{"issue":"3","key":"23_CR7","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1147\/rd.33.0210","volume":"3","author":"AL Samuel","year":"1959","unstructured":"Samuel, A.L.: Some studies in machine learning using the game of checkers. IBM J. Res. Dev. 3(3), 210\u2013229 (1959)","journal-title":"IBM J. Res. Dev."},{"key":"23_CR8","unstructured":"Russell, S.J., Norvig, P.: Artificial Intelligence. A Modern Approach, 3rd edn. Prentice Hall, Pearson Education, New Jersey (2010). ISBN-13 978-0-13-604259-4"},{"issue":"4","key":"23_CR9","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1016\/j.eswa.2004.12.023","volume":"28","author":"S Tan","year":"2005","unstructured":"Tan, S.: Neighbor-weighted K-nearest neighbor for unbalanced text corpus. Expert Syst. Appl. 28(4), 667\u2013671 (2005)","journal-title":"Expert Syst. Appl."},{"key":"23_CR10","unstructured":"Cunningham, P., Delany, S.J.: k-Neighbour classifiers. Technical report, pp. 1\u201317, Dublin (2007)"},{"issue":"1","key":"23_CR11","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.1016\/j.eswa.2011.08.040","volume":"30","author":"S Jiang","year":"2012","unstructured":"Jiang, S., et al.: An improved k-nearest neighbor algorithm for text categorization. Expert Syst. Appl. 30(1), 1503\u20131509 (2012)","journal-title":"Expert Syst. Appl."},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Pang, B., Lee, L., Vaithyanathan, S.: Thumbs up? Sentiment classification using machine learning techniques. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP), Philadelphia, pp. 79\u201386 (2002)","DOI":"10.3115\/1118693.1118704"},{"issue":"1","key":"23_CR13","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1038\/nbt0908-1011","volume":"26","author":"C Kingsford","year":"2008","unstructured":"Kingsford, C., Salzberg, S.L.: What are decision trees? Nat. Biotechnol. 26(1), 1011\u20131013 (2008)","journal-title":"Nat. Biotechnol."},{"key":"23_CR14","unstructured":"Orphanos, G., et al.: Decision Trees and NLP: A Case Study in POS Tagging. Academia, pp. 1\u20137 (1999)"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Magerman, D.M., et al.: Statistical decision-tree models for parsing. In: Proceeding ACL 1995 Proceedings of the 33rd Annual Meeting on Association for Computational Linguistics, pp. 276\u2013283 (1995)","DOI":"10.3115\/981658.981695"},{"issue":"2","key":"23_CR16","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1111\/j.2517-6161.1958.tb00292.x","volume":"20","author":"DR Cox","year":"1958","unstructured":"Cox, D.R.: The regression analysis of binary sequences. J. R. Stat. Soc. 20(2), 215\u2013242 (1958)","journal-title":"J. R. Stat. Soc."},{"key":"23_CR17","unstructured":"Zhang, J., et al.: Modified logistic regression: an approximation to SVM and its applications in large-scale text categorization. In: Proceedings of the Twentieth International Conference on Machine Learning, Washington DC, pp. 888\u2013895 (2003)"},{"issue":"2","key":"23_CR18","first-page":"125","volume":"2","author":"A Ben-Hur","year":"2001","unstructured":"Ben-Hur, A., et al.: Support vector clustering. J. Mach. Learn. Res. 2(2), 125\u2013137 (2001)","journal-title":"J. Mach. Learn. Res."},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Wulczyn, E., Thain, N., Dixon, L.: Ex machina: personal attacks seen at scale. In: Proceedings of the International World Wide Web Conference (WWW 2017), Perth, Australia, 3\u20137 April 2017, pp. 1391\u20131399 (2017)","DOI":"10.1145\/3038912.3052591"},{"key":"23_CR20","unstructured":"Hosted by Kaggle.com, Toxic Comment Classification Challenge. https:\/\/www.kaggle.com\/c\/jigsaw-toxic-comment-classification-challenge . Accessed 26 May 2019"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"\u0160vec, A., Pikuliak, M., \u0160imko, M., Bielikov\u00e1, M.: Improving moderation of online discussions via interpretable neural models. FIIT Slovak University of Technology, Bratislava, Slovakia, pp. 1\u20136 (2018)","DOI":"10.18653\/v1\/W18-5108"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Chandrasekharan, E., Samory, M., Srinivasan, A., Gilbert, E.: The bag of communities: identifying abusive behavior online with preexisting internet data. In: Proceedings of the CHI Conference on Human Factors in Computing Systems, pp. 3175\u20133187. ACM (2017)","DOI":"10.1145\/3025453.3026018"},{"key":"23_CR23","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-319-77116-8_31","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"Filippos Karolos Ventirozos","year":"2018","unstructured":"Ventirozos, F.K., Varlamis, I., Tsatsaronis, G.: Detecting aggressive behavior in discussion threads using text mining. In: CICLing 2017. LNCS, vol. 10762, pp. 420\u2013431. Springer, Cham (2018)"},{"key":"23_CR24","unstructured":"Seah, C.W., et al.: Troll detection by domain-adapting sentiment analysis. In: Proceedings of the 18th International Conference on Information Fusion Washington, DC, pp. 792\u2013799 (2015). 978-0-9824-4386-6\/15\/$31.00 \u00a92015 IEEE"},{"key":"23_CR25","unstructured":"Mutlu, B., et al.: Identifying trolls and determining terror awareness level in social networks using a scalable framework. In: Proceedings of IEEE International Conference on Big Data, pp. 1792\u20131798 (2016). 978-1-4673-9005-7\/16\/$31.00 \u00a92016 IEEE"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Saeed, H.H., Shahzad, K., Kamiran, F.: Overlapping toxic sentiment classification using deep neural architectures. In: Proceedings of IEEE International Conference on Data Mining Workshops (ICDMW), pp. 1361\u20131366 (2018). 2375-9259\/18\/$31.00 \u00a92018 IEEE","DOI":"10.1109\/ICDMW.2018.00193"},{"key":"23_CR27","unstructured":"Saif, M.A., et al.: classification of online toxic comments using the logistic regression and neural networks models. In: Proceedings of the 44th International Conference on Applications of Mathematics in Engineering and Economics, pp. 1\u20135. AIP Publishing (2018). 978-0-7354-1774-8\/$30.00"},{"issue":"11","key":"23_CR28","doi-asserted-by":"publisher","first-page":"2707","DOI":"10.1109\/TIFS.2018.2825958","volume":"13","author":"Mohd Fazil","year":"2018","unstructured":"Fazil, M., Abulaish, M.: A hybrid approach for detecting automated spammers in Twitter. IEEE Trans. Inf. Forensics Secur. 13, 1556\u20136013 (2018)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"23_CR29","doi-asserted-by":"publisher","first-page":"27","DOI":"10.15546\/aeei-2018-0013","volume":"18","author":"Martin MIKULA","year":"2018","unstructured":"Mikula, M., Machov\u00e1, K.: Combined approach for sentiment analysis in Slovak using a dictionary annotated by particle swarm optimization. In: Acta Elektrotechnica et Informatica, vol. 18, no. 2, pp. 27\u201334 (2018). ISSN 1335\u20138243","journal-title":"Acta Electrotechnica et Informatica"}],"container-title":["Advances in Intelligent Systems and Computing","Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology \u2013 ISAT 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30604-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T22:50:50Z","timestamp":1721688650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30604-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,5]]},"ISBN":["9783030306038","9783030306045"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30604-5_23","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,9,5]]},"assertion":[{"value":"5 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Architecture and Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wroc\u0142aw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isat2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isat.pwr.edu.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}