{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T23:35:48Z","timestamp":1744500948602,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031063909"},{"type":"electronic","value":"9783031063916"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06391-6_72","type":"book-chapter","created":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T23:05:23Z","timestamp":1655334323000},"page":"581-588","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Elicitation of\u00a0Requirements for\u00a0a\u00a0NLP-Model Store for\u00a0Abusive Language Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7887-0223","authenticated-orcid":false,"given":"Kilian","family":"M\u00fcller","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,16]]},"reference":[{"issue":"1","key":"72_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1080\/07421222.1990.11517884","volume":"7","author":"R Agarwal","year":"1990","unstructured":"Agarwal, R., Tanniru, M.R.: Knowledge acquisition using structured interviewing: an empirical investigation. J. Manag. Inf. Syst. 7(1), 123\u2013140 (1990)","journal-title":"J. Manag. Inf. Syst."},{"key":"72_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-319-14977-6_47","volume-title":"Distributed Computing and Internet Technology","author":"S Agarwal","year":"2015","unstructured":"Agarwal, S., Sureka, A.: Using KNN and SVM based one-class classifier for detecting online radicalization on Twitter. In: Natarajan, R., Barua, G., Patra, M.R. (eds.) ICDCIT 2015. LNCS, vol. 8956, pp. 431\u2013442. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-14977-6_47"},{"unstructured":"Assenmacher, D., Niemann, M., M\u00fcller, K., Seiler, M., Riehle, D.M., Trautmann, H.: RP-mod & RP-crowd: moderator- and crowd-annotated German news comment datasets. In: Thirty-Fifth Conference on Neural Information Processing Systems Datasets and Benchmarks Track (Round 2) (2021)","key":"72_CR3"},{"doi-asserted-by":"crossref","unstructured":"Badjatiya, P., Gupta, S., Gupta, M., Varma, V.: Deep learning for hate speech detection in tweets. In: Proceedings of the 26th International Conference on World Wide Web Companion, pp. 759\u2013760 (2017)","key":"72_CR4","DOI":"10.1145\/3041021.3054223"},{"key":"72_CR5","first-page":"1","volume":"2014","author":"J Bartlett","year":"2014","unstructured":"Bartlett, J., Reffin, J., Rumball, N., Williamson, S.: Anti-social media. Demos 2014, 1\u201351 (2014)","journal-title":"Demos"},{"issue":"1","key":"72_CR6","first-page":"41","volume":"53","author":"H Bloch-Wehba","year":"2020","unstructured":"Bloch-Wehba, H.: Automation in moderation. Cornell Int. Law J. 53(1), 41\u201396 (2020)","journal-title":"Cornell Int. Law J."},{"issue":"4","key":"72_CR7","doi-asserted-by":"publisher","first-page":"58","DOI":"10.17645\/mac.v6i4.1493","volume":"6","author":"S Boberg","year":"2018","unstructured":"Boberg, S., Schatto-Eckrodt, T., Frischlich, L., Quandt, T.: The moral gatekeeper? Moderation and deletion of user-generated content in a leading news forum. Media Commun. 6(4), 58\u201369 (2018)","journal-title":"Media Commun."},{"doi-asserted-by":"crossref","unstructured":"Djuric, N., Zhou, J., Morris, R., Grbovic, M., Radosavljevic, V., Bhamidipati, N.: Hate speech detection with comment embeddings. In: Proceedings of the 24th International Conference on World Wide Web, pp. 29\u201330 (2015)","key":"72_CR8","DOI":"10.1145\/2740908.2742760"},{"issue":"4","key":"72_CR9","doi-asserted-by":"publisher","first-page":"215","DOI":"10.14257\/ijmue.2015.10.4.21","volume":"10","author":"ND Gitari","year":"2015","unstructured":"Gitari, N.D., Zuping, Z., Damien, H., Long, J.: A lexicon-based approach for hate speech detection. Int. J. Multimedia Ubiquitous Eng. 10(4), 215\u2013230 (2015)","journal-title":"Int. J. Multimedia Ubiquitous Eng."},{"issue":"1","key":"72_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2053951719897945","volume":"7","author":"R Gorwa","year":"2020","unstructured":"Gorwa, R., Binns, R., Katzenbach, C.: Algorithmic content moderation: Technical and political challenges in the automation of platform governance. Big Data Soc. 7(1), 1\u201315 (2020)","journal-title":"Big Data Soc."},{"issue":"2","key":"72_CR11","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s00766-012-0163-2","volume":"19","author":"I Hadar","year":"2012","unstructured":"Hadar, I., Soffer, P., Kenzi, K.: The role of domain knowledge in requirements elicitation via interviews: an exploratory study. Requirements Eng. 19(2), 143\u2013159 (2012). https:\/\/doi.org\/10.1007\/s00766-012-0163-2","journal-title":"Requirements Eng."},{"doi-asserted-by":"publisher","unstructured":"Hevner, A., Chatterjee, S.: Design science research in information systems. In: Hevner, A., Chatterjee, S. (eds.) Design Research in Information Systems, pp. 9\u201322. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-1-4419-5653-8_2","key":"72_CR12","DOI":"10.1007\/978-1-4419-5653-8_2"},{"unstructured":"der Justiz, B.: Gesetz zur verbesserung der rechtsdurchsetzung in sozialen netzwerken (netzwerkdurchsetzungsgesetz - netzdg) (2017). https:\/\/www.gesetze-im-internet.de\/netzdg\/BJNR335210017.html","key":"72_CR13"},{"doi-asserted-by":"crossref","unstructured":"Loosen, W., et al.: Making sense of user comments: identifying journalists\u2019 requirements for a comment analysis framework. Stud. Commun. Media 6(4), 333\u2013364 (2017)","key":"72_CR14","DOI":"10.5771\/2192-4007-2017-4-333"},{"unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, pp. 4768\u20134777 (2017)","key":"72_CR15"},{"doi-asserted-by":"crossref","unstructured":"Mondal, M., Silva, L.A., Benevenuto, F.: A measurement study of hate speech in social media. In: Dolong, P., Vojtas, P. (eds.) Proceedings of the 28th ACM Conference on Hypertext and Social Media. HT 2017, pp. 85\u201394. ACM, Prague (2017)","key":"72_CR16","DOI":"10.1145\/3078714.3078723"},{"key":"72_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-030-87031-7_8","volume-title":"Disinformation in Open Online Media","author":"M Niemann","year":"2021","unstructured":"Niemann, M., M\u00fcller, K., Kelm, C., Assenmacher, D., Becker, J.: The German comment landscape. In: Bright, J., Giachanou, A., Spaiser, V., Spezzano, F., George, A., Pavliuc, A. (eds.) MISDOOM 2021. LNCS, vol. 12887, pp. 112\u2013127. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-87031-7_8"},{"doi-asserted-by":"crossref","unstructured":"Nobata, C., Tetreault, J., Thomas, A., Mehdad, Y., Chang, Y.: Abusive language detection in online user content. In: Proceedings of the 25th International Conference on World Wide Web. WWW 2016, pp. 145\u2013153. ACM Press, Montreal (2016)","key":"72_CR18","DOI":"10.1145\/2872427.2883062"},{"doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: \u201cWhy should i trust you?\u201d Explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144 (2016)","key":"72_CR19","DOI":"10.1145\/2939672.2939778"},{"issue":"6","key":"72_CR20","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1177\/1461444819875990","volume":"22","author":"M Ruckenstein","year":"2020","unstructured":"Ruckenstein, M., Turunen, L.L.M.: Re-humanizing the platform: content moderators and the logic of care. New Media Soc. 22(6), 1026\u20131042 (2020)","journal-title":"New Media Soc."},{"doi-asserted-by":"crossref","unstructured":"Salminen, J., Veronesi, F., Almerekhi, H., Jung, S.G., Jansen, B.J.: Online hate interpretation varies by country, but more by individual: a statistical analysis using crowdsourced ratings. In: Proceedings of 5th International Conference Social Networks and Analysis Management and Security. SNAMS 2018, pp. 88\u201394. IEEE, Valencia (2018)","key":"72_CR21","DOI":"10.1109\/SNAMS.2018.8554954"},{"doi-asserted-by":"publisher","unstructured":"Ting, I.H., Chi, H.M., Wu, J.S., Wang, S.L.: An approach for hate groups detection in Facebook. In: Uden, L., Wang, L., Hong, TP., Yang, HC., Ting, IH. (eds.) The 3rd International Workshop on Intelligent Data Analysis and Management, pp. 101\u2013106. Springer, Dordrecht (2013). https:\/\/doi.org\/10.1007\/978-94-007-7293-9_11","key":"72_CR22","DOI":"10.1007\/978-94-007-7293-9_11"},{"issue":"1","key":"72_CR23","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1057\/ejis.2014.36","volume":"25","author":"J Venable","year":"2016","unstructured":"Venable, J., Pries-Heje, J., Baskerville, R.: Feds: a framework for evaluation in design science research. Eur. J. Inf. Syst. 25(1), 77\u201389 (2016)","journal-title":"Eur. J. Inf. Syst."},{"unstructured":"Warner, W., Hirschberg, J.: Detecting hate speech on the world wide web. In: Proceedings of the Second Workshop on Language in Social Media, pp. 19\u201326 (2012)","key":"72_CR24"},{"doi-asserted-by":"crossref","unstructured":"Wulczyn, E., Thain, N., Dixon, L.: Ex machina: personal attacks seen at scale. In: Proceedings of the 26th International Conference on World Wide Web, pp. 1391\u20131399 (2017)","key":"72_CR25","DOI":"10.1145\/3038912.3052591"},{"issue":"1","key":"72_CR26","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MS.2020.2975159","volume":"38","author":"M Xiu","year":"2020","unstructured":"Xiu, M., Jiang, Z.M.J., Adams, B.: An exploratory study of machine learning model stores. IEEE Softw. 38(1), 114\u2013122 (2020)","journal-title":"IEEE Softw."},{"doi-asserted-by":"publisher","unstructured":"Zowghi, D., Coulin, C.: Requirements elicitation: a survey of techniques, approaches, and tools. In: Aurum, A., Wohlin, C. (eds.) Engineering and Managing Software Requirements, pp. 19\u201346. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/3-540-28244-0_2","key":"72_CR27","DOI":"10.1007\/3-540-28244-0_2"}],"container-title":["Communications in Computer and Information Science","HCI International 2022 Posters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06391-6_72","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T06:16:35Z","timestamp":1670566595000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06391-6_72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031063909","9783031063916"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06391-6_72","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2022.hci.international\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}