{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T23:40:49Z","timestamp":1771890049142,"version":"3.50.1"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031236174","type":"print"},{"value":"9783031236181","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-23618-1_13","type":"book-chapter","created":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T07:05:49Z","timestamp":1675062349000},"page":"197-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Intelligently Detecting Information Online-Weaponisation Trends (IDIOT)"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8686-1121","authenticated-orcid":false,"given":"Fawzia Zehra","family":"Kara-Isitt","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8918-3365","authenticated-orcid":false,"given":"Stephen","family":"Swift","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5105-3506","authenticated-orcid":false,"given":"Allan","family":"Tucker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"283","DOI":"10.19101\/IJACR.PID90","volume":"9","author":"IS Ahmad","year":"2019","unstructured":"Ahmad, I.S., Bakar, A.A., Yaakub, M.R.: A review of feature selection in sentiment analysis using information gain and domain specific ontology. Int. J. Adv. Comput. Res. 9, 283\u2013292 (2019)","journal-title":"Int. J. Adv. Comput. Res."},{"key":"13_CR2","unstructured":"Allahyari, M., et al.: A brief survey of text mining: classification, clustering and extraction techniques (2017)"},{"issue":"4","key":"13_CR3","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s10982-017-9297-1","volume":"36","author":"A Brown","year":"2017","unstructured":"Brown, A.: What is hate speech? Part 1: the myth of hate. Law Philos. 36(4), 419\u2013468 (2017)","journal-title":"Law Philos."},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Caselli, T., Basile, V., Mitrovic, J., Granitzer, M.: HateBERT: retraining BERT for abusive language detection in English. arXiv:2010.12472 (2021)","DOI":"10.18653\/v1\/2021.woah-1.3"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.patrec.2020.03.011","volume":"133","author":"Y Celik","year":"2020","unstructured":"Celik, Y., Talo, M., Yildirim, O., Karabatak, M., Acharya, U.: Automated invasive ductal carcinoma detection based using deep transfer learning with whole-slide images. Pattern Recogn. Lett. 133, 232\u2013239 (2020)","journal-title":"Pattern Recogn. Lett."},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Chen, Y., Skiena, S.: Building sentiment lexicons for all major languages. In: Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, ACL 2014, pp. 383\u2013389. Association for Computational Linguistics (ACL) (2014)","DOI":"10.3115\/v1\/P14-2063"},{"key":"13_CR7","unstructured":"Commission for Countering Extremism: Statistical summary of responses from our call for evidence (2019)"},{"issue":"1","key":"13_CR8","first-page":"2063","volume":"13","author":"T De Smedt","year":"2012","unstructured":"De Smedt, T., Daelemans, W.: Pattern for Python. J. Mach. Learn. Res. 13(1), 2063\u20132067 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"13_CR9","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Google, K. T.: Language, A.I.: BERT: pre-training of deep bidirectional transformers for language understanding (2019). https:\/\/github.com\/tensorflow\/tensor2tensor"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1111\/j.1467-923X.2006.00763.x","volume":"77","author":"R Eatwell","year":"2006","unstructured":"Eatwell, R.: Community cohesion and cumulative extremism in contemporary Britain. Polit. Q. 77, 204\u2013216 (2006)","journal-title":"Polit. Q."},{"key":"13_CR11","first-page":"19","volume":"126","author":"A El-Halees","year":"2015","unstructured":"El-Halees, A., Elyezj, N.: Investigating crimes using text mining and network analysis. Int. J. Comput. Appl. 126, 19\u201325 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Feldman, R., Dagan, I.: Knowledge Discovery in Textual databases (KDT) (1995)","DOI":"10.1049\/ic:19950112"},{"issue":"3","key":"13_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102524","volume":"58","author":"P Fortuna","year":"2021","unstructured":"Fortuna, P., Soler-Company, J., Wanner, L.: How well do hate speech, toxicity, abusive and offensive language classification models generalize across datasets? Inf. Process. Manage. 58(3), 102524 (2021)","journal-title":"Inf. Process. Manage."},{"key":"13_CR14","unstructured":"Hatebase | The sentinel project (2013). https:\/\/thesentinelproject.org\/project\/Hatebase\/"},{"key":"13_CR15","unstructured":"HateLab research featured on ITV news special report \u2013 HateLab (2020). https:\/\/hatelab.net\/2020\/03\/03\/Hatelab-Research-Featured-On-ITV-News-Special-Report\/"},{"key":"13_CR16","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-981-15-6168-9_27","volume-title":"Computational Linguistics","author":"VA Ho","year":"2020","unstructured":"Ho, V.A., et al.: Emotion recognition for vietnamese social media text. In: Nguyen, L.-M., Phan, X.-H., Hasida, K., Tojo, S. (eds.) PACLING 2019. CCIS, vol. 1215, pp. 319\u2013333. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-6168-9_27"},{"issue":"2","key":"13_CR17","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s40708-016-0042-6","volume":"3","author":"A Holzinger","year":"2016","unstructured":"Holzinger, A.: Interactive machine learning or health informatics: when do we need the human-in-the-loop? Brain Inf. 3(2), 119\u2013131 (2016)","journal-title":"Brain Inf."},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Hutto, C.J., Gilbert, E.: \u201cVader: a parsimonious rule-based model for sentiment analysis of social media text. In: Proceedings of the 8th International Conference on Weblogs and Social Media, ICWSM 2014, pp. 216\u2013225 (2014)","DOI":"10.1609\/icwsm.v8i1.14550"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Karan, M., Snajder, J.: Cross-domain detection of abusive language online. In: Proceedings of the 2nd Workshop on Abusive Language Online (ALW2), pp. 132\u2013137. Association For Computational Linguistics, Brussels (2018)","DOI":"10.18653\/v1\/W18-5117"},{"key":"13_CR20","unstructured":"Kooth. https:\/\/www.kooth.com\/. Accessed 01 Aug 2022"},{"issue":"1","key":"13_CR21","doi-asserted-by":"crossref","first-page":"e5107","DOI":"10.1002\/cpe.5107","volume":"32","author":"A Kumar","year":"2020","unstructured":"Kumar, A., Jaiswal, A.: Systematic literature review of sentiment analysis on Twitter using soft computing techniques. Concurrency Comput. Pract. Experience 32(1), e5107 (2020)","journal-title":"Concurrency Comput. Pract. Experience"},{"key":"13_CR22","doi-asserted-by":"publisher","first-page":"15349","DOI":"10.1007\/s11042-019-7346-5","volume":"79","author":"A Kumar","year":"2020","unstructured":"Kumar, A., Garg, G.: Systematic literature review on context-based sentiment analysis in social multimedia. Multimed. Tools Appl. 79, 15349\u201315380 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"13_CR23","unstructured":"Loria, S.: TextBlob documentation. Release 0.15, 2 (2018)"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Manning, C.D., Surdeanu, M., Bauer, J., Finkel, J., Bethard, S.J., Mcclosky, D.: The stanford CoreNLP natural language processing toolkit (2014)","DOI":"10.3115\/v1\/P14-5010"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"M\u00fcller, K., Schwarz, C.: Fanning the flames of hate: social media and hate crime. Elsevier (2017)","DOI":"10.2139\/ssrn.3082972"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Olteanu, A., Castillo, C., Boy, J., Varshney, K.R.: The effect of extremist violence on hateful speech online (2018)","DOI":"10.1609\/icwsm.v12i1.15040"},{"key":"13_CR27","unstructured":"Online Harms Paper. https:\/\/Www.Gov.Uk\/Government\/Consultations\/Online-Harms-White-Paper\/Online-Harms-White-Paper. Accessed 01 Aug 2022"},{"key":"13_CR28","first-page":"1","volume":"13","author":"M Ortu","year":"2020","unstructured":"Ortu, M., Conversano, C., Marchesi, M., Tonelli, R., Counsell, S., Destefanis, G.: Describing software developers affectiveness through Markov chain models. Electron. J. Appl. Stat. Anal. 13, 1\u201335 (2020)","journal-title":"Electron. J. Appl. Stat. Anal."},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Paul, D., Li, F., Teja, M.K., Yu, X., Frost, R.: Compass: spatio temporal sentiment analysis of US election what twitter says! In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1585\u20131594. Association for Computing Machinery (2017)","DOI":"10.1145\/3097983.3098053"},{"key":"13_CR30","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"13_CR31","unstructured":"Priegue, L.B.: Intro to Stanford\u2019s CoreNLP for Pythoners, CoreNLP_Tutorial. Github Repository (2020). https:\/\/Github.Com\/Laurabravopriegue\/Corenlp_Tutorial, https:\/\/Towardsdatascience.Com\/Intro-To-Stanfords-Corenlp-And-Java-For-Python-Programmers-C2586215aab6"},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"Qi, P., Dozat, T., Zhang, Y., Manning, C.D.: Universal dependency parsing from scratch. In: Proceedings of the CoNLL 2018 Shared Task: Multilingual Parsing from Raw Text to Universal Dependencies, pp. 160\u2013170 (2018)","DOI":"10.18653\/v1\/K18-2016"},{"key":"13_CR33","unstructured":"Research: Detox\/Data Release - Meta.wikimedia.org. https:\/\/Meta.Wikimedia.Org\/Wiki\/Research:Detox\/Data_Release"},{"key":"13_CR34","doi-asserted-by":"crossref","unstructured":"Reynders, D.: 6th Evaluation of the Code of Conduct (2021)","DOI":"10.1080\/14432471.2021.1935747"},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"R\u00f6ttger, P., Vidgen, B., Nguyen, D., Waseem, Z., Margetts, H., Pierrehumbert, J.B.: Hatecheck: functional tests for hate speech detection models. arXiv preprint arXiv:2012.15606 (2020)","DOI":"10.18653\/v1\/2021.acl-long.4"},{"key":"13_CR36","unstructured":"Sanh, V., Debut, L., Chaumond, J., Wolf, T.: DistilBERT, a distilled version of BERT: smaller, faster, cheaper and lighter (2020). https:\/\/github.com\/huggingface\/transformers"},{"key":"13_CR37","doi-asserted-by":"crossref","first-page":"8","DOI":"10.33633\/jais.v5i1.3807","volume":"5","author":"R Sarno","year":"2020","unstructured":"Sarno, R., Fatihah, C., Faisal, E.: Aspect based sentiment analysis: a systematic literature review. J. Appl. Intell. Syst. 5, 8\u201322 (2020)","journal-title":"J. Appl. Intell. Syst."},{"issue":"2","key":"13_CR38","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1521\/suli.2010.40.2.146","volume":"40","author":"A Shah","year":"2010","unstructured":"Shah, A.: The relationship between general population suicide rates and the internet: a cross-national study. Suicide Life-Threat. Behav. 40(2), 146\u2013150 (2010)","journal-title":"Suicide Life-Threat. Behav."},{"key":"13_CR39","doi-asserted-by":"crossref","unstructured":"Tong, L., et al.: Cost-sensitive boosting pruning trees for depression detection on Twitter. IEEE Trans. Affective Comput. (2022)","DOI":"10.1109\/TAFFC.2022.3145634"},{"key":"13_CR40","doi-asserted-by":"crossref","unstructured":"Vidgen, B., Harris, A., Nguyen, D., Tromble, R., Hale, S., Margetts, H.: Challenges and frontiers in abusive content detection, pp. 80\u201393 (2019)","DOI":"10.18653\/v1\/W19-3509"},{"key":"13_CR41","doi-asserted-by":"crossref","unstructured":"Vidgen, B., et al.: Introducing CAD: the contextual abuse dataset. In: Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 2289\u20132303. Association for Computational Linguistics (2021)","DOI":"10.18653\/v1\/2021.naacl-main.182"},{"key":"13_CR42","doi-asserted-by":"publisher","first-page":"5731","DOI":"10.1007\/s10462-022-10144-1","volume":"55","author":"M Wankhade","year":"2022","unstructured":"Wankhade, M., Rao, A.C.S., Kulkarni, C.: A survey on sentiment analysis methods, applications, and challenges. Artif. Intell. Rev. 55, 5731\u20135780 (2022). https:\/\/doi.org\/10.1007\/s10462-022-10144-1","journal-title":"Artif. Intell. Rev."},{"key":"13_CR43","doi-asserted-by":"crossref","unstructured":"Waseem, Z., Davidson, T., Warmsley, D., Weber, I.: Understanding abuse: a typology of abusive language detection subtasks (2017)","DOI":"10.18653\/v1\/W17-3012"},{"key":"13_CR44","doi-asserted-by":"publisher","unstructured":"Wulczyn, E., Thain, N., Dixon, L.: Wikipedia Detox. Figshare (2017). https:\/\/doi.org\/10.6084\/M9.Figshare.4054689","DOI":"10.6084\/M9.Figshare.4054689"},{"key":"13_CR45","doi-asserted-by":"crossref","unstructured":"Wulczyn, E., Thain, N., Dixon, L.: Ex machina: personal attacks seen at scale. In: Proceedings of the 26th International Conference on World Wide Web, WWW 2017, pp. 1391\u20131399 (2016)","DOI":"10.1145\/3038912.3052591"},{"key":"13_CR46","unstructured":"Xiao, H. (2018). https:\/\/github.com\/hanxiao\/bert-as-service"},{"key":"13_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/Access.2014.2362522","volume":"2","author":"L Xu","year":"2014","unstructured":"Xu, L., Jiang, C., Wang, J., Yuan, J., Ren, Y.: Information security in big data: privacy and data mining. IEEE Access 2, 1\u201328 (2014). https:\/\/doi.org\/10.1109\/Access.2014.2362522","journal-title":"IEEE Access"}],"container-title":["Communications in Computer and Information Science","Machine Learning and Principles and Practice of Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-23618-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T06:47:32Z","timestamp":1728802052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-23618-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031236174","9783031236181"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-23618-1_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenoble","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2022.ecmlpkdd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1060","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"236","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17 demo track papers have been accepted from 28 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}