{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:58:24Z","timestamp":1742950704421,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030687861"},{"type":"electronic","value":"9783030687878"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68787-8_48","type":"book-chapter","created":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T17:55:55Z","timestamp":1613843755000},"page":"672-682","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Survey About the Cyberbullying Problem on Social Media by Using Machine Learning Approaches"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8176-6950","authenticated-orcid":false,"given":"Carlo","family":"Sansone","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4033-3777","authenticated-orcid":false,"given":"Giancarlo","family":"Sperl\u00ed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,2,21]]},"reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Balakrishnan, V., Khan, S., Arabnia, H.R.: Improving cyberbullying detection using Twitter users\u2019 psychological features and machine learning. Comput. Secur. 101710 (2020)","DOI":"10.1016\/j.cose.2019.101710"},{"key":"48_CR2","unstructured":"Calvo-Morata, A., Rotaru, D.C., Alonso-Fern\u00e1ndez, C., Freire, M., Mart\u00ednez-Ortiz, I., Fern\u00e1ndez-Manj\u00f3n, B.: Validation of a cyberbullying serious game using game analytics. IEEE Trans. Learn. Technol. (2018)"},{"issue":"3","key":"48_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3343484","volume":"13","author":"D Chatzakou","year":"2019","unstructured":"Chatzakou, D., et al.: Detecting cyberbullying and cyberaggression in social media. ACM Trans. Web (TWEB) 13(3), 1\u201351 (2019)","journal-title":"ACM Trans. Web (TWEB)"},{"key":"48_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, L., Guo, R., Silva, Y., Hall, D., Liu, H.: Hierarchical attention networks for cyberbullying detection on the Instagram social network. In: Proceedings of the 2019 SIAM International Conference on Data Mining, pp. 235\u2013243. SIAM (2019)","DOI":"10.1137\/1.9781611975673.27"},{"key":"48_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, L., Li, J., Silva, Y.N., Hall, D.L., Liu, H.: XBully: cyberbullying detection within a multi-modal context. In: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, pp. 339\u2013347 (2019)","DOI":"10.1145\/3289600.3291037"},{"key":"48_CR6","doi-asserted-by":"publisher","unstructured":"Di Capua, M., Di Nardo, E., Petrosino, A.: Unsupervised cyber bullying detection in social networks. In: 2016 23rd International Conference on Pattern Recognition (ICPR), pp. 432\u2013437, December 2016. https:\/\/doi.org\/10.1109\/ICPR.2016.7899672","DOI":"10.1109\/ICPR.2016.7899672"},{"issue":"3","key":"48_CR7","first-page":"18","volume":"2","author":"K Dinakar","year":"2012","unstructured":"Dinakar, K., Jones, B., Havasi, C., Lieberman, H., Picard, R.: Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Trans. Interact. Intell. Syst. (TiiS) 2(3), 18 (2012)","journal-title":"ACM Trans. Interact. Intell. Syst. (TiiS)"},{"key":"48_CR8","doi-asserted-by":"crossref","unstructured":"Farag, N., El-Seoud, S.A., McKee, G., Hassan, G.: Bullying hurts: a survey on non-supervised techniques for cyber-bullying detection. In: Proceedings of the 2019 8th International Conference on Software and Information Engineering, pp. 85\u201390 (2019)","DOI":"10.1145\/3328833.3328869"},{"key":"48_CR9","doi-asserted-by":"crossref","unstructured":"Farley, S., Coyne, I., D\u2019Cruz, P.: Cyberbullying at work: understanding the influence of technology (2018)","DOI":"10.1007\/978-981-10-5334-4_8-1"},{"key":"48_CR10","doi-asserted-by":"crossref","unstructured":"Hosseinmardi, H., Ghasemianlangroodi, A., Han, R., Lv, Q., Mishra, S.: Towards understanding cyberbullying behavior in a semi-anonymous social network. In: 2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), pp. 244\u2013252. IEEE (2014)","DOI":"10.1109\/ASONAM.2014.6921591"},{"key":"48_CR11","unstructured":"Hosseinmardi, H., et al.: A comparison of common users across Instagram and Ask.fm to better understand cyberbullying. In: 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, pp. 355\u2013362. IEEE (2014)"},{"key":"48_CR12","doi-asserted-by":"crossref","unstructured":"Hosseinmardi, H., Mattson, S.A., Rafiq, R.I., Han, R., Lv, Q., Mishra, S.: Detection of cyberbullying incidents on the Instagram social network. In: Association for the Advancement of Artificial Intelligence (2015)","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"48_CR13","doi-asserted-by":"crossref","unstructured":"Hosseinmardi, H., Rafiq, R.I., Han, R., Lv, Q., Mishra, S.: Prediction of cyberbullying incidents in a media-based social network. In: 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 186\u2013192. IEEE (2016)","DOI":"10.1109\/ASONAM.2016.7752233"},{"issue":"9","key":"48_CR14","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1111\/j.1746-1561.2008.00335.x","volume":"78","author":"J Juvonen","year":"2008","unstructured":"Juvonen, J., Gross, E.F.: Extending the school grounds?-bullying experiences in cyberspace. J. Sch. Health 78(9), 496\u2013505 (2008)","journal-title":"J. Sch. Health"},{"issue":"1","key":"48_CR15","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1027\/1864-1105.21.1.25","volume":"21","author":"C Katzer","year":"2009","unstructured":"Katzer, C., Fetchenhauer, D., Belschak, F.: Cyberbullying: who are the victims? A comparison of victimization in internet chatrooms and victimization in school. J. Media Psychol. 21(1), 25\u201336 (2009)","journal-title":"J. Media Psychol."},{"issue":"1","key":"48_CR16","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1080\/00224545.2017.1302402","volume":"158","author":"RM Kowalski","year":"2018","unstructured":"Kowalski, R.M., Toth, A., Morgan, M.: Bullying and cyberbullying in adulthood and the workplace. J. Soc. Psychol. 158(1), 64\u201381 (2018)","journal-title":"J. Soc. Psychol."},{"issue":"4","key":"48_CR17","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MC.2019.2898720","volume":"52","author":"N Kshetri","year":"2019","unstructured":"Kshetri, N., Voas, J.: Thoughts on cyberbullying. Computer 52(4), 64\u201368 (2019)","journal-title":"Computer"},{"issue":"17","key":"48_CR18","doi-asserted-by":"publisher","first-page":"23973","DOI":"10.1007\/s11042-019-7234-z","volume":"78","author":"A Kumar","year":"2019","unstructured":"Kumar, A., Sachdeva, N.: Cyberbullying detection on social multimedia using soft computing techniques: a meta-analysis. Multimed. Tools Appl. 78(17), 23973\u201324010 (2019). https:\/\/doi.org\/10.1007\/s11042-019-7234-z","journal-title":"Multimed. Tools Appl."},{"key":"48_CR19","doi-asserted-by":"crossref","unstructured":"Kumari, K., Singh, J.P., Dwivedi, Y.K., Rana, N.P.: Towards cyberbullying-free social media in smart cities: a unified multi-modal approach. Soft Comput. 1\u201312 (2019)","DOI":"10.1007\/s00500-019-04550-x"},{"issue":"4","key":"48_CR20","doi-asserted-by":"publisher","first-page":"1777","DOI":"10.1016\/j.chb.2005.10.005","volume":"23","author":"Q Li","year":"2007","unstructured":"Li, Q.: New bottle but old wine: a research of cyberbullying in schools. Comput. Hum. Behav. 23(4), 1777\u20131791 (2007)","journal-title":"Comput. Hum. Behav."},{"key":"48_CR21","unstructured":"Newall, M.: Cyberbullying: A Global Advisor Survey. Ipsos (2018)"},{"issue":"2","key":"48_CR22","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1177\/1541204006286288","volume":"4","author":"JW Patchin","year":"2006","unstructured":"Patchin, J.W., Hinduja, S.: Bullies move beyond the schoolyard: a preliminary look at cyberbullying. Youth Violence Juvenile Justice 4(2), 148\u2013169 (2006)","journal-title":"Youth Violence Juvenile Justice"},{"key":"48_CR23","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-319-23983-5_27","volume-title":"Engineering Applications of Neural Networks","author":"N Potha","year":"2015","unstructured":"Potha, N., Maragoudakis, M.: Time series forecasting in cyberbullying data. In: Iliadis, L., Jayne, C. (eds.) EANN 2015. CCIS, vol. 517, pp. 289\u2013303. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23983-5_27"},{"key":"48_CR24","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.knosys.2015.12.021","volume":"96","author":"N Potha","year":"2016","unstructured":"Potha, N., Maragoudakis, M., Lyras, D.: A biology-inspired, data mining framework for extracting patterns in sexual cyberbullying data. Knowl.-Based Syst. 96, 134\u2013155 (2016)","journal-title":"Knowl.-Based Syst."},{"key":"48_CR25","doi-asserted-by":"crossref","unstructured":"Raisi, E., Huang, B.: Cyberbullying detection with weakly supervised machine learning. In: Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, pp. 409\u2013416 (2017)","DOI":"10.1145\/3110025.3110049"},{"key":"48_CR26","doi-asserted-by":"crossref","unstructured":"Raisi, E., Huang, B.: Weakly supervised cyberbullying detection using co-trained ensembles of embedding models. In: 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 479\u2013486. IEEE (2018)","DOI":"10.1109\/ASONAM.2018.8508240"},{"key":"48_CR27","doi-asserted-by":"publisher","unstructured":"Rosa, H., Matos, D., Ribeiro, R., Coheur, L., Carvalho, J.P.: A \u201cdeeper\u201d look at detecting cyberbullying in social networks. In: 2018 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138, July 2018. https:\/\/doi.org\/10.1109\/IJCNN.2018.8489211","DOI":"10.1109\/IJCNN.2018.8489211"},{"key":"48_CR28","unstructured":"Salawu, S., He, Y., Lumsden, J.: Approaches to automated detection of cyberbullying: a survey. IEEE Trans. Affect. Comput. (2017)"},{"issue":"9","key":"48_CR29","doi-asserted-by":"publisher","first-page":"e73791","DOI":"10.1371\/journal.pone.0073791","volume":"8","author":"HA Schwartz","year":"2013","unstructured":"Schwartz, H.A., et al.: Personality, gender, and age in the language of social media: the open-vocabulary approach. PLoS ONE 8(9), e73791 (2013)","journal-title":"PLoS ONE"},{"key":"48_CR30","doi-asserted-by":"crossref","unstructured":"Singh, V.K., Hofenbitzer, C.: Fairness across network positions in cyberbullying detection algorithms. In: Proceedings of the 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 557\u2013559 (2019)","DOI":"10.1145\/3341161.3342949"},{"key":"48_CR31","doi-asserted-by":"crossref","unstructured":"Squicciarini, A., Rajtmajer, S., Liu, Y., Griffin, C.: Identification and characterization of cyberbullying dynamics in an online social network. In: Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, pp. 280\u2013285 (2015)","DOI":"10.1145\/2808797.2809398"},{"key":"48_CR32","doi-asserted-by":"crossref","unstructured":"Tomkins, S., Getoor, L., Chen, Y., Zhang, Y.: A socio-linguistic model for cyberbullying detection. In: 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 53\u201360. IEEE (2018)","DOI":"10.1109\/ASONAM.2018.8508294"},{"key":"48_CR33","doi-asserted-by":"publisher","unstructured":"Yao, M., Chelmis, C., Zois, D.: Cyberbullying detection on Instagram with optimal online feature selection. In: 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 401\u2013408, August 2018. https:\/\/doi.org\/10.1109\/ASONAM.2018.8508329","DOI":"10.1109\/ASONAM.2018.8508329"},{"key":"48_CR34","doi-asserted-by":"crossref","unstructured":"Yao, M., Chelmis, C., Zois, D.S.: Cyberbullying ends here: towards robust detection of cyberbullying in social media. In: The World Wide Web Conference, pp. 3427\u20133433 (2019)","DOI":"10.1145\/3308558.3313462"},{"issue":"3","key":"48_CR35","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/TAFFC.2016.2531682","volume":"8","author":"R Zhao","year":"2016","unstructured":"Zhao, R., Mao, K.: Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder. IEEE Trans. Affect. Comput. 8(3), 328\u2013339 (2016)","journal-title":"IEEE Trans. Affect. Comput."},{"key":"48_CR36","doi-asserted-by":"crossref","unstructured":"Zhong, H., et al.: Content-driven detection of cyberbullying on the Instagram social network. In: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, pp. 3952\u20133958 (2016)","DOI":"10.24963\/ijcai.2017\/552"},{"key":"48_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.avb.2015.10.001","volume":"23","author":"I Zych","year":"2015","unstructured":"Zych, I., Ortega-Ruiz, R., Del Rey, R.: Systematic review of theoretical studies on bullying and cyberbullying: facts, knowledge, prevention, and intervention. Aggress. Violent Behav. 23, 1\u201321 (2015)","journal-title":"Aggress. Violent Behav."}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition. ICPR International Workshops and Challenges"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68787-8_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T15:15:47Z","timestamp":1724512547000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68787-8_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030687861","9783030687878"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68787-8_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"21 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 January 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 January 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ICPR2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icpr2020.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}