{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:10:34Z","timestamp":1775837434439,"version":"3.50.1"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319274324","type":"print"},{"value":"9783319274331","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27433-1_4","type":"book-chapter","created":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T06:41:02Z","timestamp":1448952062000},"page":"49-66","source":"Crossref","is-referenced-by-count":171,"title":["Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network"],"prefix":"10.1007","author":[{"given":"Homa","family":"Hosseinmardi","sequence":"first","affiliation":[]},{"given":"Sabrina Arredondo","family":"Mattson","sequence":"additional","affiliation":[]},{"given":"Rahat","family":"Ibn Rafiq","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Han","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Shivakant","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,2]]},"reference":[{"key":"4_CR1","unstructured":"National Crime Prevention Council: National Crime Prevention Council (2011). http:\/\/en.wikipedia.org\/wiki\/Cyberbullying (accessed July 6, 2011)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Kowalski, R.M., Giumetti, G.W., Schroeder, A.N., Lattanner, M.R.: Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth (2014)","DOI":"10.1037\/a0035618"},{"key":"4_CR3","unstructured":"McNamee, D.: Cyberbullying \u2019causes suicidal thoughts in kids more than traditional bullying (2014). http:\/\/www.medicalnewstoday.com\/articles\/273788.php (accessed May 31, 2015)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Hinduja, S., Patchin, J.W.: Cyberbullying research summary, cyberbullying and suicide (2010)","DOI":"10.1080\/13811118.2010.494133"},{"key":"4_CR5","first-page":"320","volume":"217","author":"E Menesini","year":"2009","unstructured":"Menesini, E., Nocentini, A.: Cyberbullying definition and measurement. some critical considerations. Journal of Psychology 217, 320\u2013323 (2009)","journal-title":"Journal of Psychology"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.tele.2014.04.002","volume":"32","author":"K Royen Van","year":"2015","unstructured":"Van Royen, K., Poels, K., Daelemans, W., Vandebosch, H.: Automatic monitoring of cyberbullying on social networking sites: From technological feasibility to desirability. Telematics and Informatics 32, 89\u201397 (2015)","journal-title":"Telematics and Informatics"},{"key":"4_CR7","unstructured":"Strickland, A.: Bullying by peers has effects later in life (2015). http:\/\/www.cnn.com\/2015\/05\/08\/health\/bullying-mental-health-effects\/index.html (accessed May 2015)"},{"key":"4_CR8","unstructured":"cbcNews: Jessica Logan - Victims of bullying (2008). http:\/\/www.cbsnews.com\/pictures\/victims-of-bullying\/11\/ (accessed May 31, 2015)"},{"key":"4_CR9","unstructured":"NoBullying.com: The top six cyberbullying case ever (2015). http:\/\/nobullying.com\/six-unforgettable-cyber-bullying-cases\/ (accessed May 31, 2015)"},{"key":"4_CR10","unstructured":"Kowalski, R.M., Limber, S., Limber, S.P., Agatston, P.W.: Cyberbullying: Bullying in the digital age. John Wiley & Sons (2012)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Patchin, J.W., Hinduja, S.: An update and synthesis of the research. Cyberbullying prevention and response: Expert perspectives, p. 13 (2012)","DOI":"10.4324\/9780203818312"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1348\/000709906X171046","volume":"77","author":"SC Hunter","year":"2007","unstructured":"Hunter, S.C., Boyle, J.M., Warden, D.: Perceptions and correlates of peer-victimization and bullying. British Journal of Educational Psychology 77, 797\u2013810 (2007)","journal-title":"British Journal of Educational Psychology"},{"key":"4_CR13","unstructured":"Olweus, D.: Bullying at school: What we know and what we can do. Blackwell (1993)"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1146\/annurev-clinpsy-050212-185516","volume":"9","author":"D Olweus","year":"2013","unstructured":"Olweus, D.: School bullying: Development and some important challenges. Annual Review of Clinical Psychology 9, 751\u2013780 (2013)","journal-title":"Annual Review of Clinical Psychology"},{"key":"4_CR15","unstructured":"Smith, P.K., del Barrio, C., Tokunaga, R.: Definitions of bullying and cyberbullying: how useful are the terms? routledge. In: Principles of Cyberbullying Research. Definitions, Measures and Methodology (2012)"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1027\/0044-3409.217.4.182","volume":"217","author":"JJ Dooley","year":"2009","unstructured":"Dooley, J.J., Py\u017calski, J., Cross, D.: Cyberbullying versus face-to-face bullying. Zeitschrift f\u00fcr Psychologie\/Journal of Psychology 217, 182\u2013188 (2009)","journal-title":"Zeitschrift f\u00fcr Psychologie\/Journal of Psychology"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1348\/026151005X82352","volume":"24","author":"CP Monks","year":"2006","unstructured":"Monks, C.P., Smith, P.K.: Definitions of bullying: Age differences in understanding of the term, and the role of experience. British Journal of Developmental Psychology 24, 801\u2013821 (2006)","journal-title":"British Journal of Developmental Psychology"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Py\u017calski, J.: Electronic aggression among adolescents: An old house with. Youth culture and net culture: Online social practices, p. 278 (2010)","DOI":"10.4018\/978-1-60960-209-3.ch016"},{"key":"4_CR19","volume-title":"Cyber bullying: A curriculum for grades 6\u201312","author":"SP Limber","year":"2008","unstructured":"Limber, S.P., Kowalski, R.M., Agatston, P.A.: Cyber bullying: A curriculum for grades 6\u201312. Hazelden, Center City (2008)"},{"key":"4_CR20","unstructured":"Ditch the Label Anti Bullying Charity: The annual cyberbullying survey 2013 (2013). http:\/\/www.ditchthelabel.org\/annual-cyber-bullying-survey-cyber-bullying-statistics\/"},{"key":"4_CR21","unstructured":"Hinduja, S.: Cyberbullying on Instagram (2013)"},{"key":"4_CR22","unstructured":"Ptaszynski, M., Dybala, P., Matsuba, T., Masui, F., Rzepka, R., Araki, K., Momouchi, Y.: In the service of online order tackling cyberbullying with machine learning and affect analysis (2010)"},{"key":"4_CR23","unstructured":"Dadvar, M., de Jong, F.M.G., Ordelman, R.J.F., Trieschnigg, R.B.: Improved cyberbullying detection using gender information. In: Proceedings of the Twelfth Dutch-Belgian Information Retrieval Workshop (DIR 2012), Ghent, Belgium, pp. 23\u201325. University of Ghent, Ghent (2012)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Reynolds, K., Kontostathis, A., Edwards, L.: Using machine learning to detect cyberbullying. In: Fourth International Conference on Machine Learning and Applications, vol. 2, pp. 241\u2013244 (2011)","DOI":"10.1109\/ICMLA.2011.152"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"18:1","DOI":"10.1145\/2362394.2362400","volume":"2","author":"K Dinakar","year":"2012","unstructured":"Dinakar, K., Jones, B., Havasi, C., Lieberman, H., Picard, R.: Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Trans. Interact. Intell. Syst. 2, 18:1\u201318:30 (2012)","journal-title":"ACM Trans. Interact. Intell. Syst."},{"key":"4_CR26","unstructured":"Sanchez, H., Kumar, S.: Twitter bullying detection. In: NSDI 2012, Berkeley, CA, USA, p. 15. USENIX Association (2012)"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Kontostathis, A., Reynolds, K., Garron, A., Edwards, L.: Detecting cyberbullying: query terms and techniques. In: Proceedings of the 5th Annual ACM Web Science Conference, pp. 195\u2013204. ACM (2013)","DOI":"10.1145\/2464464.2464499"},{"key":"4_CR28","unstructured":"Xu, J.M., Jun, K.S., Zhu, X., Bellmore, A.: Learning from bullying traces in social media. In: Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 656\u2013666. Association for Computational Linguistics (2012)"},{"key":"4_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/978-3-319-08608-8_14","volume-title":"Databases Theory and Applications","author":"V Nahar","year":"2014","unstructured":"Nahar, V., Al-Maskari, S., Li, X., Pang, C.: Semi-supervised learning for cyberbullying detection in social networks. In: Wang, H., Sharaf, M.A. (eds.) ADC 2014. LNCS, vol. 8506, pp. 160\u2013171. Springer, Heidelberg (2014)"},{"key":"4_CR30","unstructured":"Nahar, V., Li, X., Pang, C.: An effective approach for cyberbullying detection. In: Communications in Information Science and Management Engineering, CISME 2013 (2013)"},{"key":"4_CR31","unstructured":"Dinakar, K., Reichart, R., Lieberman, H.: Modeling the detection of textual cyberbullying. In: The Social Mobile Web (2011)"},{"key":"4_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/978-3-642-29253-8_75","volume-title":"Web Technologies and Applications","author":"V Nahar","year":"2012","unstructured":"Nahar, V., Unankard, S., Li, X., Pang, C.: Sentiment analysis for effective detection of cyber bullying. In: Sheng, Q.Z., Wang, G., Jensen, C.S., Xu, G. (eds.) APWeb 2012. LNCS, vol. 7235, pp. 767\u2013774. Springer, Heidelberg (2012)"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Sood, S., Antin, J., Churchill, E.: Profanity use in online communities. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1481\u20131490. ACM (2012)","DOI":"10.1145\/2207676.2208610"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Nandhini, B., Sheeba, J.: Cyberbullying detection and classification using information retrieval algorithm. In: Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015), p. 20. ACM (2015)","DOI":"10.1145\/2743065.2743085"},{"key":"4_CR35","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.procs.2015.03.085","volume":"45","author":"BS Nandhini","year":"2015","unstructured":"Nandhini, B.S., Sheeba, J.: Online social network bullying detection using intelligence techniques. Procedia Computer Science 45, 485\u2013492 (2015)","journal-title":"Procedia Computer Science"},{"key":"4_CR36","series-title":"Advances in Intelligent Systems and Computing","first-page":"637","volume-title":"Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2","author":"K Nalini","year":"2014","unstructured":"Nalini, K., Sheela, L.J.: Classification of tweets using text classifier to detect cyber bullying. In: Satapathy, S.C., Govardhan, A., Raju, K.S., Mandal, J.K. (eds.) Emerging ICT for Bridging the Future - Volume 2. AISC, vol. 338, pp. 637\u2013645. Springer, Heidelberg (2014)"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Huang, Q., Singh, V.K., Atrey, P.K.: Cyber bullying detection using social and textual analysis. In: Proceedings of the 3rd International Workshop on Socially-Aware Multimedia, pp. 3\u20136. ACM (2014)","DOI":"10.1145\/2661126.2661133"},{"key":"4_CR38","doi-asserted-by":"crossref","unstructured":"Potha, N., Maragoudakis, M.: Cyberbullying detection using time series modeling. In: 2014 IEEE International Conference on Data Mining Workshop (ICDMW), pp. 373\u2013382. IEEE (2014)","DOI":"10.1109\/ICDMW.2014.170"},{"key":"4_CR39","unstructured":"Kansara, K.B., Shekokar, N.M.: A framework for cyberbullying detection in social network (2015)"},{"key":"4_CR40","unstructured":"Hosseinmardi, H., Rafiq, R.I., Li, S., Yang, Z., Han, R., Mishra, S., Lv, Q.: Comparison of common users across Instagram and Ask.fm to better understand cyberbullying. In: The 7th IEEE International Conference on Social Computing and Networking (SocialCom) (2014)"},{"key":"4_CR41","doi-asserted-by":"crossref","unstructured":"Hosseinmardi, H., Ghasemianlangroodi, A., Han, R., Lv, Q., Mishra, S.: Towards understanding cyberbullying behavior in a semi-anonymous social network. In: Advances in Social Networks Analysis and Mining (ASONAM 2014), pp. 244\u2013252 (2014)","DOI":"10.1109\/ASONAM.2014.6921591"},{"key":"4_CR42","doi-asserted-by":"crossref","unstructured":"Weilenmann, A., Hillman, T., Jungselius, B.: Instagram at the museum: communicating the museum experience through social photo sharing. In: Proc. of the SIGCHI Conf. on Human Factors in Computing Systems, CHI 2013, pp. 1843\u20131852 (2013)","DOI":"10.1145\/2470654.2466243"},{"key":"4_CR43","doi-asserted-by":"crossref","unstructured":"Silva, T.H., de Melo, P.O.S.V., Almeida, J.M., Salles, J., Loureiro, A.A.F.: A picture of Instagram is worth more than a thousand words: workload characterization and application. In: DCOSS, pp. 123\u2013132. IEEE (2013)","DOI":"10.1109\/DCOSS.2013.59"},{"key":"4_CR44","doi-asserted-by":"crossref","unstructured":"Hu, Y., Manikonda, L., Kambhampati, S.: What we instagram: a first analysis of instagram photo content and user types. In: Proc. of the 8th International AAAI Conference on Weblogs and Social Media (ICWSM 2014) (2014)","DOI":"10.1609\/icwsm.v8i1.14578"},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Araujo, C.S., Correa, L.P.D., da Silva, A.P.C., Prates, R.O., Meira Jr., W.: It is not just a picture: revealing some user practices in instagram. In: 2014 9th Latin American Web Congress (LA-WEB), pp. 19\u201323. IEEE (2014)","DOI":"10.1109\/LAWeb.2014.12"},{"key":"4_CR46","unstructured":"NoSwearing.com: (Bad word list and swear filter) (accessed November 10, 2014)"},{"key":"4_CR47","unstructured":"von Ahn\u2019s Research Group, L.: Negative words list form. Luis von Ahn\u2019s Research Group (2014)"},{"key":"4_CR48","volume-title":"Linguistic Inquiry and Word Count","author":"JM Pennebaker","year":"2001","unstructured":"Pennebaker, J.M., Francis, M.E., Booth, R.J.: Linguistic Inquiry and Word Count. Lawerence Erlbaum Associates, Mahwah (2001)"},{"key":"4_CR49","unstructured":"De Choudhury, M., Gamon, M., Counts, S., Horvitz, E.: Predicting depression via social media. In: International AAAI Conference on Weblogs and Social Media, Boston, MA (2013)"}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27433-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T01:06:29Z","timestamp":1692147989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27433-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319274324","9783319274331"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27433-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}