{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:03:10Z","timestamp":1743066190923,"version":"3.40.3"},"publisher-location":"Cham","reference-count":73,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030396268"},{"type":"electronic","value":"9783030396275"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-39627-5_6","type":"book-chapter","created":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T02:02:40Z","timestamp":1580263360000},"page":"59-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["What Is Abusive Language?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5691-0746","authenticated-orcid":false,"given":"Marco","family":"Niemann","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5071-2589","authenticated-orcid":false,"given":"Dennis M.","family":"Riehle","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6020-5540","authenticated-orcid":false,"given":"Jens","family":"Brunk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5690-439X","authenticated-orcid":false,"given":"J\u00f6rg","family":"Becker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,29]]},"reference":[{"key":"6_CR1","unstructured":"Abel, A., Meyer, C.M.: The dynamics outside the paper: user contributions to online dictionaries. In: Proceedings of the 3rd eLex Conference \u2018Electronic Lexicography in the 21st Century: Thinking Outside the Paper\u2019, pp. 179\u2013194. eLex, Tallinn (2013)"},{"issue":"2\u20133","key":"6_CR2","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1207\/S15327051HCI1523_5","volume":"15","author":"MS Ackerman","year":"2000","unstructured":"Ackerman, M.S.: The intellectual challenge of CSCW: the gap between social requirements and technical feasibility. Hum. Comput. Interact. 15(2\u20133), 179\u2013203 (2000)","journal-title":"Hum. Comput. Interact."},{"key":"6_CR3","first-page":"287","volume-title":"Advances in Intelligent Systems and Computing","author":"May Al Sohibani","year":"2015","unstructured":"Al Sohibani, M., Al Osaimi, N., Al Ehaidib, R., Al Muhanna, S., Dahanayake, A.: Factors that influence the quality of crowdsourcing. In: New Trends Database Information Systems II: Selected Papers 18th East European Conference on Advances in Databases and Information Systems and Associated Satellite Events, ADBIS 2014, Ohrid, Macedonia, pp. 287\u2013300 (2015)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-319-91947-8_6","volume-title":"Natural Language Processing and Information Systems","author":"M Anzovino","year":"2018","unstructured":"Anzovino, M., Fersini, E., Rosso, P.: Automatic identification and classification of misogynistic language on Twitter. In: Silberztein, M., Atigui, F., Kornyshova, E., M\u00e9tais, E., Meziane, F. (eds.) NLDB 2018. LNCS, vol. 10859, pp. 57\u201364. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91947-8_6"},{"key":"6_CR5","unstructured":"Association of Computational Linguistics: ALW1: 1st Workshop on Abusive Language Online (2017). https:\/\/sites.google.com\/site\/abusivelanguage workshop2017\/home"},{"key":"6_CR6","unstructured":"Association of Computational Linguistics: ALW2: 2nd Workshop on Abusive Language Online (2018). https:\/\/sites.google.com\/view\/alw2018"},{"key":"6_CR7","unstructured":"Association of Computational Linguistics: ALW3: 3rd Workshop on Abusive Language Online (2019). https:\/\/sites.google.com\/view\/alw3\/home"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Badjatiya, P., Gupta, S., Gupta, M., Varma, V.: Deep learning for hate speech detection in Tweet. In: Proceedings 26th International Conference World Wide Web Companion, WWW 2017 Companion, pp. 759\u2013760. International World Wide Web Conferences Steering Committee, Perth, Australia (2017)","DOI":"10.1145\/3041021.3054223"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/978-3-319-73706-5_15","volume-title":"Language Technologies for the Challenges of the Digital Age","author":"P Bourgonje","year":"2018","unstructured":"Bourgonje, P., Moreno-Schneider, J., Srivastava, A., Rehm, G.: Automatic classification of abusive language and personal attacks in various forms of online communication. In: Rehm, G., Declerck, T. (eds.) GSCL 2017. LNCS (LNAI), vol. 10713, pp. 180\u2013191. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-73706-5_15"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Bretschneider, U., W\u00f6hner, T., Peters, R.: Detecting online harassment in social networks. In: Proceedings International Conference on Information Systems - Building a Better World Through Information Systems, ICIS 2014, pp. 1\u201314. Association for Information Systems, Auckland, New Zealand (2014)","DOI":"10.1007\/978-3-662-45708-5_1"},{"key":"6_CR11","unstructured":"vom Brocke, J., Simons, A., Niehaves, B., Riemer, K., Plattfaut, R., Cleven, A.: Reconstructing the giant: on the importance of rigour in documenting the literature search process. In: Proceedings 17th European Conference on Information Systems, ECIS 2009, Verona, Italy, pp. 2206\u20132217 (2009)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Brunk, J., Mattern, J., Riehle, D.M.: Effect of transparency and trust on acceptance of automatic online comment moderation systems. In: Proceedings 21st IEEE Conference on Business Informatics, CBI 2019. IEEE, Moscow, Russia (2019)","DOI":"10.1109\/CBI.2019.00056"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Brunk, J., Niemann, M., Riehle, D.M.: Can analytics as a service save the media industry? - The case of online comment moderation. In: Proceedings 21st IEEE Conference on Business Informatics, CBI 2019. IEEE, Moscow (2019)","DOI":"10.1109\/CBI.2019.00061"},{"issue":"1","key":"6_CR14","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1140\/epjds\/s13688-016-0072-6","volume":"5","author":"P Burnap","year":"2016","unstructured":"Burnap, P., Williams, M.L.: Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Sci. 5(1), 11 (2016)","journal-title":"EPJ Data Sci."},{"key":"6_CR15","unstructured":"Cambridge University Press: abusive (2017). http:\/\/dictionary.cambridge.org\/dictionary\/english\/abusive"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zhou, Y., Zhu, S., Xu, H.: Detecting offensive language in social media to protect adolescent online safety. In: Proceedings 2012 ASE\/IEEE International Conference on Social Computing, 2012 ASE\/IEEE International Conference on Privacy, Security, Risk and Trust, Amsterdam, Netherlands, pp. 71\u201380 (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"6_CR17","unstructured":"Collins: abusive definition and meaning (2017). https:\/\/www.collinsdictionary.com\/dictionary\/english\/abusive"},{"issue":"1","key":"6_CR18","first-page":"104","volume":"1","author":"HM Cooper","year":"1988","unstructured":"Cooper, H.M.: Organizing knowledge syntheses: a taxonomy of literature reviews. Knowl. Soc. 1(1), 104\u2013126 (1988)","journal-title":"Knowl. Soc."},{"key":"6_CR19","unstructured":"Council of Europe: Recommendation No. R (97) 20 of the Committee of Ministers to Member States on \u201cHate Speech\u201d (1997)"},{"key":"6_CR20","unstructured":"Council of Europe: Recommendation No. R (97) 21 of the Committee of Ministers to Member States on the Media and the Promotion of a Culture of Tolerance (1997)"},{"key":"6_CR21","unstructured":"Council of Europe: European Convention on Human Rights (2010)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Davidson, T., Warmsley, D., Macy, M., Weber, I.: Automated hate speech detection and the problem of offensive language. In: Eleventh International AAAI Conference on Web and Social Media, Montreal, Canada (2017)","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"6_CR23","unstructured":"Del Vigna, F., Cimino, A., Dell\u2019Orletta, F., Petrocchi, M., Tesconi, M.: Hate me, hate me not: hate speech detection on Facebook. In: 1st Italian Conference on Cybersecurity, Venice, Italy (2017)"},{"key":"6_CR24","unstructured":"European Commission: Applying EU law (2017). https:\/\/ec.europa.eu\/info\/law\/law-making-process\/overview-law-making-process\/applying-eu-law_en"},{"key":"6_CR25","unstructured":"European Commission against Racism and Intolerance: ECRI General Policy Recommendation No. 1 on Combating Racism, Xenophobia, Antisemitism and Intolerance (1996)"},{"key":"6_CR26","unstructured":"European Commission against Racism and Intolerance: ECRI General Policy Recommendation No. 2 on Specialised Bodies to Combat Racism, Xenophobia, Antisemitism and Intolerance at National Level (1997)"},{"key":"6_CR27","unstructured":"European Commission against Racism and Intolerance: ECRI General Policy Recommendation No. 6 on Combating the Dissemination of Racist, Xenophobic and Antisemitic Material via the Internet (2000)"},{"key":"6_CR28","unstructured":"European Commission against Racism and Intolerance: ECRI General Policy Recommendation No. 7 on National Legislation to Combat Racism and Racial Discrimination (2002)"},{"key":"6_CR29","unstructured":"European Commission against Racism and Intolerance: ECRI General Policy Recommendation No. 15 on Combating Hate Speech (2015)"},{"key":"6_CR30","unstructured":"European Union: Council directive 2000\/43\/EC of 29 June 2000 implementing the principle of equal treatment between persons irrespective of racial or ethnic origin. Off. J. Eur. Communities L 180, 22\u201326 (2000)"},{"key":"6_CR31","unstructured":"European Union: The charter of fundamental rights of the European union. Off. J. Eur. Communities C 364, 1\u201322 (2000)"},{"key":"6_CR32","unstructured":"European Union: Treaty of Lisbon - amending the Treaty on European Union and the Treaty establishing the European community. Off. J. Eur. Union C 306, 1\u2013271 (2007)"},{"key":"6_CR33","unstructured":"European Union: Council framework decision 2008\/913\/JHA of 28 November 2008 on combating certain forms and expressions of racism and xenophobia by means of criminal law. Off. J. Eur. Union L 328, 55\u201358 (2008)"},{"key":"6_CR34","unstructured":"European Union: Consolidated version of the treaty on the functioning of the European union. Off. J. Eur. Union C 326, 47\u2013390 (2012)"},{"key":"6_CR35","unstructured":"Faiola, A.: Germany springs to action over hate speech against migrants (2016). https:\/\/www.washingtonpost.com\/world\/europe\/germany-springs-to-action-over-hate-speech-against-migrants\/2016\/01\/06\/6031218e-b315-11e5-8abc-d09392edc612_story.html?utm_term=.737b4d4453d3"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Fi\u0161er, D., Erjavec, T., Ljube\u0161i\u0107, N.: Legal framework, dataset and annotation schema for socially unacceptable online discourse practices in Slovene. In: Proceedings First Workshop on Abusive Language Online, Vancouver, Canada, pp. 46\u201351 (2017)","DOI":"10.18653\/v1\/W17-3007"},{"issue":"4","key":"6_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3232676","volume":"51","author":"P Fortuna","year":"2018","unstructured":"Fortuna, P., Nunes, S.: A survey on automatic detection of hate speech in text. ACM Comput. Surv. 51(4), 1\u201330 (2018)","journal-title":"ACM Comput. Surv."},{"key":"6_CR38","unstructured":"Gardiner, B., Mansfield, M., Anderson, I., Holder, J., Louter, D., Ulmanu, M.: The dark side of Guardian comments (2016). https:\/\/www.theguardian.com\/technology\/2016\/apr\/12\/the-dark-side-of-guardian-comments"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Gilbert, E., Lampe, C., Leavitt, A., Lo, K., Yarosh, L.: Conceptualizing, creating, & controlling constructive and controversial comments. In: Companion 2017 ACM Conference Computer Supported Cooperative Work, Social Computing, Portland, OR, USA, pp. 425\u2013430 (2017)","DOI":"10.1145\/3022198.3022663"},{"key":"6_CR40","unstructured":"Gillespie, T.: The scale is just unfathomable (2018). https:\/\/logicmag.io\/04-the-scale-is-just-unfathomable\/"},{"issue":"5","key":"6_CR41","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/2.291294","volume":"27","author":"J Grudin","year":"1994","unstructured":"Grudin, J.: Computer-supported cooperative work: history and focus. Computer 27(5), 19\u201326 (1994)","journal-title":"Computer"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Guberman, J., Hemphill, L.: Challenges in modifying existing scales for detecting harassment in individual Tweets. In: Proceedings 50th Hawaii International Conference System Sciences, HICSS 2017, pp. 2203\u20132212. Association for Information Systems, Waikoloa Village, Hawaii, USA (2017)","DOI":"10.24251\/HICSS.2017.267"},{"key":"6_CR43","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-319-52569-3_15","volume-title":"Industrial Networks and Intelligent Systems","author":"HL Hammer","year":"2017","unstructured":"Hammer, H.L.: Automatic detection of hateful comments in online discussion. In: Maglaras, L.A., Janicke, H., Jones, K. (eds.) INISCOM 2016. LNICST, vol. 188, pp. 164\u2013173. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52569-3_15"},{"issue":"1\u20133","key":"6_CR44","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1016\/0167-2789(90)90087-6","volume":"42","author":"S Harnad","year":"1990","unstructured":"Harnad, S.: The symbol grounding problem. Physica D 42(1\u20133), 335\u2013346 (1990)","journal-title":"Physica D"},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"Harnad, S.: Symbol-grounding problem. In: Encyclopedia of Cognitive Science, vol. 42, pp. 335\u2013346. Wiley, Chichester (2006)","DOI":"10.1016\/0167-2789(90)90087-6"},{"issue":"2","key":"6_CR46","first-page":"267","volume":"4","author":"T Jay","year":"2008","unstructured":"Jay, T., Janschewitz, K.: The pragmatics of swearing. J. Politeness Res. Lang. Behav. Cult. 4(2), 267\u2013288 (2008)","journal-title":"J. Politeness Res. Lang. Behav. Cult."},{"key":"6_CR47","unstructured":"K\u00f6ffer, S., Riehle, D.M., H\u00f6henberger, S., Becker, J.: Discussing the value of automatic hate speech detection in online debates. In: Drews, P., Funk, B., Niemeyer, P., Xie, L. (eds.) MKWI 2018, L\u00fcneburg, Germany (2018)"},{"key":"6_CR48","unstructured":"Macmillan Publishers Limited: abusive (adjective) definition and synonyms (2017). http:\/\/www.macmillandictionary.com\/dictionary\/british\/abusive"},{"key":"6_CR49","unstructured":"Merriam-Webster: Abusive (2017). https:\/\/www.merriam-webster.com\/dictionary\/abusive"},{"key":"6_CR50","doi-asserted-by":"crossref","unstructured":"Niemann, M.: Abusiveness is non-binary: five shades of gray in German online news-comments. In: Proceedings 21st IEEE Conference Business Informatics, CBI 2019. IEEE, Moscow, Russia (2019)","DOI":"10.1109\/CBI.2019.00009"},{"key":"6_CR51","doi-asserted-by":"crossref","unstructured":"Nobata, C., Tetreault, J., Thomas, A., Mehdad, Y., Chang, Y.: Abusive language detection in online user content. In: Proceedings 25th International Conference World Wide Web, pp. 145\u2013153, Montreal, Canada (2016)","DOI":"10.1145\/2872427.2883062"},{"key":"6_CR52","unstructured":"Oxford University Press: Abusive (2017). https:\/\/en.oxforddictionaries.com\/definition\/abusive"},{"key":"6_CR53","unstructured":"Parliamentary Assembly: Recommendation 1805 (2007): Blasphemy, religious insults and hate speech against persons on grounds of their religion (2007)"},{"key":"6_CR54","doi-asserted-by":"crossref","unstructured":"Pater, J.A., Kim, M.K., Mynatt, E.D., Fiesler, C.: Characterizations of online harassment: comparing policies across social media platforms. In: Proceedings 19th International Conference Supporting Group Work, GROUP 2016, pp. 369\u2013374. ACM Press, Sanibel Island, Florida, USA (2016)","DOI":"10.1145\/2957276.2957297"},{"key":"6_CR55","unstructured":"Pearson: Abusive (2017). http:\/\/www.ldoceonline.com\/dictionary\/abusive"},{"key":"6_CR56","doi-asserted-by":"crossref","unstructured":"Poletto, F., Stranisci, M., Sanguinetti, M., Patti, V., Bosco, C.: Hate speech annotation: analysis of an Italian Twitter corpus. In: 4th Italian Conference on Computational Linguistics, CLiC-it 2017, vol. 2006, pp. 1\u20136. CEUR-WS (2017)","DOI":"10.4000\/books.aaccademia.2448"},{"issue":"4","key":"6_CR57","first-page":"1369","volume":"18","author":"P Ravlu\u0161evi\u010dius","year":"2011","unstructured":"Ravlu\u0161evi\u010dius, P.: The enforcement of the primacy of the European Union law-legal doctrine and practice. Jurisprudence 18(4), 1369\u20131388 (2011)","journal-title":"Jurisprudence"},{"key":"6_CR58","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-13059-5_5","volume-title":"Advances in Artificial Intelligence","author":"AH Razavi","year":"2010","unstructured":"Razavi, A.H., Inkpen, D., Uritsky, S., Matwin, S.: Offensive language detection using multi-level classification. In: Farzindar, A., Ke\u0161elj, V. (eds.) AI 2010. LNCS (LNAI), vol. 6085, pp. 16\u201327. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13059-5_5"},{"key":"6_CR59","unstructured":"Ross, B., Rist, M., Carbonell, G., Cabrera, B., Kurowsky, N., Wojatzki, M.: Measuring the reliability of hate speech annotations: the case of the European refugee crisis. In: Proceedings 3rd Workshop on Natural Language Processing for Computer-Mediated Communication, Bochum, Germany, pp. 6\u20139 (2016)"},{"key":"6_CR60","first-page":"532","volume-title":"Neural Information Processing","author":"Suin Seo","year":"2017","unstructured":"Seo, S., Cho, S.B.: Offensive sentence classification using character-level CNN and transfer learning with fake sentences. In: Liu, D., Xie, S., Li, Y., Zhao, D., El-Alfy, E.S. (eds.) International Conference on Neural Information Processing, pp. 532\u2013539. Springer, Cham (2017)"},{"key":"6_CR61","unstructured":"Solon, O.: Underpaid and overburdened: the life of a Facebook moderator (2017). https:\/\/www.theguardian.com\/news\/2017\/may\/25\/facebook-moderator-underpaid-overburdened-extreme-content"},{"key":"6_CR62","unstructured":"Sood, S.O., Antin, J., Churchill, E.F.: Using crowdsourcing to improve profanity detection. In: AAAI Spring Symposium Series, Palo Alto, CA, USA, pp. 69\u201374 (2012)"},{"issue":"2","key":"6_CR63","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1002\/asi.21690","volume":"63","author":"SO Sood","year":"2012","unstructured":"Sood, S.O., Churchill, E.F., Antin, J.: Automatic identification of personal insults on social news sites. J. Am. Soc. Inf. Sci. Technol. 63(2), 270\u2013285 (2012)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"6_CR64","doi-asserted-by":"crossref","unstructured":"\u0160vec, A., Pikuliak, M., \u0160imko, M., Bielikov\u00e1, M.: Improving moderation of online discussions via interpretable neural models. In: Proceedings Second Workshop on Abusive Language Online, ALW2, Brussels, Belgium (2018)","DOI":"10.18653\/v1\/W18-5108"},{"key":"6_CR65","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-319-70232-2_23","volume-title":"Digital Libraries: Data, Information, and Knowledge for Digital Lives","author":"S Tuarob","year":"2017","unstructured":"Tuarob, S., Mitrpanont, J.L.: Automatic discovery of abusive thai language usages in social networks. In: Choemprayong, S., Crestani, F., Cunningham, S.J. (eds.) ICADL 2017. LNCS, vol. 10647, pp. 267\u2013278. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70232-2_23"},{"key":"6_CR66","unstructured":"Warner, W., Hirschberg, J.: Detecting hate speech on the world wide web. In: Proceedings Second Workshop on Language in Social Media, Montreal, Canada, pp. 19\u201326 (2012)"},{"key":"6_CR67","doi-asserted-by":"crossref","unstructured":"Waseem, Z.: Are you a racist or Am I seeing things? Annotator influence on hate speech detection on Twitter. In: Proceedings First Workshop on NLP and Computational Social Science, Austin, Texas, USA, pp. 138\u2013142 (2016)","DOI":"10.18653\/v1\/W16-5618"},{"key":"6_CR68","doi-asserted-by":"crossref","unstructured":"Waseem, Z., Davidson, T., Warmsley, D., Weber, I.: Understanding abuse: a typology of abusive language detection subtasks. In: Proceedings First Workshop Abusive Language Online, Vancouver, Canada, pp. 78\u201384 (2017)","DOI":"10.18653\/v1\/W17-3012"},{"key":"6_CR69","doi-asserted-by":"crossref","unstructured":"Waseem, Z., Hovy, D.: Hateful symbols or hateful people? Predictive features for hate speech detection on Twitter. In: Proceedings NAACL Student Research Workshop, Stroudsburg, PA, USA, pp. 88\u201393 (2016)","DOI":"10.18653\/v1\/N16-2013"},{"key":"6_CR70","doi-asserted-by":"crossref","first-page":"13825","DOI":"10.1109\/ACCESS.2018.2806394","volume":"6","author":"H Watanabe","year":"2018","unstructured":"Watanabe, H., Bouazizi, M., Ohtsuki, T.: Hate speech on Twitter: a pragmatic approach to collect hateful and offensive expressions and perform hate speech detection. IEEE Access 6, 13825\u201313835 (2018)","journal-title":"IEEE Access"},{"key":"6_CR71","unstructured":"Webster, J., Watson, R.T.: Analyzing the past to prepare for the future: writing a literature review. MIS Q. 26(2), xiii\u2013xxiii (2002)"},{"issue":"4","key":"6_CR72","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s41060-017-0088-4","volume":"6","author":"H Yenala","year":"2018","unstructured":"Yenala, H., Jhanwar, A., Chinnakotla, M.K., Goyal, J.: Deep learning for detecting inappropriate content in text. Int. J. Data Sci. Anal. 6(4), 273\u2013286 (2018)","journal-title":"Int. J. Data Sci. Anal."},{"key":"6_CR73","unstructured":"Yin, D., Xue, Z., Hong, L., Davison, B.D., Kontostathis, A., Edwards, L.: Detection of harassment on Web 2.0. In: Proceedings Content Analysis WEB, CAW2.0, Madrid, Spain, pp. 1\u20137 (2009)"}],"container-title":["Lecture Notes in Computer Science","Disinformation in Open Online Media"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-39627-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T21:06:40Z","timestamp":1695676000000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-39627-5_6"}},"subtitle":["Integrating Different Views on Abusive Language for Machine Learning"],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030396268","9783030396275"],"references-count":73,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-39627-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MISDOOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Multidisciplinary International Symposium on Disinformation in Open Online Media","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hamburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"misdoom2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.misdoom.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}