{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:53:23Z","timestamp":1742928803866,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031785474"},{"type":"electronic","value":"9783031785481"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78548-1_26","type":"book-chapter","created":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T19:05:03Z","timestamp":1737659103000},"page":"355-370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Identifying Cyberbullying Roles in\u00a0Social Media"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8590-8811","authenticated-orcid":false,"given":"Manuel","family":"Sandoval","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3368-6024","authenticated-orcid":false,"given":"Mohammed","family":"Abuhamad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9328-1481","authenticated-orcid":false,"given":"Patrick","family":"Furman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4731-1789","authenticated-orcid":false,"given":"Mujtaba","family":"Nazari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2450-3596","authenticated-orcid":false,"given":"Deborah L.","family":"Hall","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1852-1683","authenticated-orcid":false,"given":"Yasin N.","family":"Silva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,24]]},"reference":[{"issue":"4","key":"26_CR1","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1080\/0144929X.2014.983979","volume":"34","author":"S Bastiaensens","year":"2015","unstructured":"Bastiaensens, S., Vandebosch, H., Poels, K., Van Cleemput, K., DeSmet, A., De Bourdeaudhuij, I.: \u2018Can i afford to help?\u2019 how affordances of communication modalities guide bystanders\u2019 helping intentions towards harassment on social network sites. Behav. Inf. Technol. 34(4), 425\u2013435 (2015)","journal-title":"Behav. Inf. Technol."},{"key":"26_CR2","doi-asserted-by":"publisher","unstructured":"Cheng, L., Guo, R., Silva, Y., Hall, D., Liu, H.: Hierarchical attention networks for cyberbullying detection on the instagram social network. In: Proceedings of the 2019 SIAM International Conference on Data Mining (SDM), pp. 235\u2013243. Society for Industrial and Applied Mathematics (2019). https:\/\/doi.org\/10.1137\/1.9781611975673.27","DOI":"10.1137\/1.9781611975673.27"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, L., Guo, R., Silva, Y.N., Hall, D., Liu, H.: Modeling temporal patterns of cyberbullying detection with hierarchical attention networks. ACM\/IMS Trans. Data Sci. 2(2) (2021)","DOI":"10.1145\/3441141"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, L., Li, J., Silva, Y., Hall, D., Liu, H.: PI-bully: personalized cyberbullying detection with peer influence. In: Electronic Proceedings of IJCAI 2019, pp. 5829\u20135835 (2019)","DOI":"10.24963\/ijcai.2019\/808"},{"key":"26_CR5","unstructured":"Dadvar, M., de Jong, F., Ordelman, R., Trieschnigg, R.: Improved cyberbullying detection using gender information. In: Proceedings of the Twelfth Dutch-Belgian Information Retrieval Workshop (DIR 2012), pp. 23\u201325. Ghent University, Belgium (2012)"},{"key":"26_CR6","unstructured":"Dadvar, M., Eckert, K.: Cyberbullying detection in social networks using deep learning based models; a reproducibility study. arXiv preprint arXiv:1812.08046 (2018)"},{"key":"26_CR7","doi-asserted-by":"publisher","unstructured":"Dang, J., Liu, L.: Me and others around: the roles of personal and social norms in Chinese adolescent bystanders\u2019 responses toward cyberbullying. J. Interpersonal Violence 37(9-10), NP6329\u2013NP6354 (2022). https:\/\/doi.org\/10.1177\/0886260520967128. pMID: 33073678","DOI":"10.1177\/0886260520967128"},{"key":"26_CR8","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding (2019)"},{"key":"26_CR9","doi-asserted-by":"publisher","unstructured":"Hamlett, M., Powell, G., Silva, Y.N., Hall, D.: A labeled dataset for investigating cyberbullying content patterns in instagram. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 16, no. 1, pp. 1251\u20131258 (2022). https:\/\/doi.org\/10.1609\/icwsm.v16i1.19376","DOI":"10.1609\/icwsm.v16i1.19376"},{"key":"26_CR10","doi-asserted-by":"publisher","unstructured":"He, H., Bai, Y., Garcia, E.A., Li, S.: Adasyn: adaptive synthetic sampling approach for imbalanced learning. In: 2008 IEEE International Joint Conference on Neural Networks (IEEE World Congress on Computational Intelligence), pp. 1322\u20131328 (2008). https:\/\/doi.org\/10.1109\/IJCNN.2008.4633969","DOI":"10.1109\/IJCNN.2008.4633969"},{"issue":"2","key":"26_CR11","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1017\/S135132492000056X","volume":"28","author":"G Jacobs","year":"2022","unstructured":"Jacobs, G., Van Hee, C., Hoste, V.: Automatic classification of participant roles in cyberbullying: can we detect victims, bullies, and bystanders in social media text? Nat. Lang. Eng. 28(2), 141\u2013166 (2022)","journal-title":"Nat. Lang. Eng."},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Loureiro, D., Barbieri, F., Neves, L., Anke, L.E., Camacho-Collados, J.: Timelms: diachronic language models from twitter (2022)","DOI":"10.18653\/v1\/2022.acl-demo.25"},{"issue":"4","key":"26_CR13","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1177\/0044118X211053356","volume":"55","author":"I Orue","year":"2023","unstructured":"Orue, I., Fern\u00e1ndez-Gonz\u00e1lez, L., Machimbarrena, J.M., Gonz\u00e1lez-Cabrera, J., Calvete, E.: Bidirectional relationships between cyberbystanders\u2019 roles, cyberbullying perpetration, and justification of violence. Youth Soc. 55(4), 611\u2013629 (2023). https:\/\/doi.org\/10.1177\/0044118X211053356","journal-title":"Youth Soc."},{"key":"26_CR14","unstructured":"Radford, A., Wu, J., Child, R., Luan, D., Amodei, D., Sutskever, I.: Language models are unsupervised multitask learners (2019)"},{"key":"26_CR15","unstructured":"Raffel, C., et al.: Exploring the limits of transfer learning with a unified text-to-text transformer (2023)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Rathnayake, G., Atapattu, T., Herath, M., Zhang, G., Falkner, K.: Enhancing the identification of cyberbullying through participant roles. In: Proceedings of the Fourth Workshop on Online Abuse and Harms, pp. 89\u201394. Association for Computational Linguistics (2020)","DOI":"10.18653\/v1\/2020.alw-1.11"},{"issue":"4","key":"26_CR17","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1080\/00405841.2014.947222","volume":"53","author":"C Salmivalli","year":"2014","unstructured":"Salmivalli, C.: Participant roles in bullying: how can peer bystanders be utilized in interventions? Theory Into Pract. 53(4), 286\u2013292 (2014)","journal-title":"Theory Into Pract."},{"issue":"1","key":"26_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/(SICI)1098-2337(1996)22:1<1::AID-AB1>3.0.CO;2-T","volume":"22","author":"C Salmivalli","year":"1996","unstructured":"Salmivalli, C., Lagerspetz, K., Bj\u00f6rkqvist, K., \u00d6sterman, K., Kaukiainen, A.: Bullying as a group process: participant roles and their relations to social status within the group. Aggressive Behav. 22(1), 1\u201315 (1996)","journal-title":"Aggressive Behav."},{"key":"26_CR19","unstructured":"Sanh, V., Debut, L., Chaumond, J., Wolf, T.: Distilbert, a distilled version of bert: smaller, faster, cheaper and lighter (2020)"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Singh, V.K., Ghosh, S., Jose, C.: Toward multimodal cyberbullying detection. In: Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2090\u20132099. Association for Computing Machinery (2017)","DOI":"10.1145\/3027063.3053169"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Teng, T.H., Varathan, K.D.: Cyberbullying detection in social networks: a comparison between machine learning and transfer learning approaches. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3275130"},{"issue":"10","key":"26_CR22","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0203794","volume":"13","author":"C Van Hee","year":"2018","unstructured":"Van Hee, C., et al.: Automatic detection of cyberbullying in social media text. PLoS ONE 13(10), e0203794 (2018)","journal-title":"PLoS ONE"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Wang, K., Xiong, Q., Wu, C., Gao, M., Yu, Y.: Multi-modal cyberbullying detection on social networks. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138 (2020)","DOI":"10.1109\/IJCNN48605.2020.9206663"},{"key":"26_CR24","unstructured":"Xu, J.M., Jun, K.S., Zhu, X., Bellmore, A.: Learning from bullying traces in social media. In: Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 656\u2013666. NAACL HLT 2012. Association for Computational Linguistics, USA (2012)"},{"key":"26_CR25","unstructured":"Ziems, C., Vigfusson, Y., Morstatter, F.: Aggressive, repetitive, intentional, visible, and imbalanced: Refining representations for cyberbullying classification. CoRR abs\/2004.01820 (2020). https:\/\/arxiv.org\/abs\/2004.01820"}],"container-title":["Lecture Notes in Computer Science","Social Networks Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78548-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T19:05:21Z","timestamp":1737659121000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78548-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031785474","9783031785481"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78548-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASONAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Social Networks Analysis and Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rende","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asonam-12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asonam.cpsc.ucalgary.ca\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}