{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:02:56Z","timestamp":1742940176543,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319525686"},{"type":"electronic","value":"9783319525693"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52569-3_15","type":"book-chapter","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T01:06:24Z","timestamp":1484701584000},"page":"164-173","source":"Crossref","is-referenced-by-count":11,"title":["Automatic Detection of Hateful Comments in Online Discussion"],"prefix":"10.1007","author":[{"given":"Hugo Lewi","family":"Hammer","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,1,19]]},"reference":[{"key":"15_CR1","unstructured":"Fekete, L.: Pedlars of hate: the violent impact of the European far Right. Institute of Race Relations (2013). http:\/\/www.irr.org.uk\/wp-content\/uploads\/2012\/06\/PedlarsofHate.pdf . Accessed 12 Mar 2016"},{"key":"15_CR2","unstructured":"Wilson, R., Hainsworth, P.: Far-right Parties and discourse in Europe: a challenge for our times. European network against racism (2013). http:\/\/cms.horus.be\/files\/99935\/MediaArchive\/publications\/20060_Publication_Far_right_EN_LR.pdf . Accessed 12 Mar 2016"},{"key":"15_CR3","unstructured":"Goodwin, M., Ramalingam, V., Briggs, R.: The new radical right: violent and non-violent movements in Europe. Institute for Strategic Dialogue (2013). http:\/\/www.strategicdialogue.org\/ISD%20Far%20Right%20Feb2012.pdf . Accessed 12 Mar 2016"},{"key":"15_CR4","unstructured":"Bartlett, J., Birdwell, J., Littler, M.: The rise of populism in Europe can be traced through online behaviour... Demos, (2013). http:\/\/www.demos.co.uk\/files\/Demos_OSIPOP_Book-web_03.pdf?1320601634 . Accessed 12 Mar 2016"},{"key":"15_CR5","unstructured":"Str\u00f8mmen, \u00d8.: The Dark Net. On Right-Wing Extremism, Counter-Jihadism and Terror in Europe. Cappelen Damm, Oslo (2012)"},{"key":"15_CR6","unstructured":"Sunde, I.M.: Preventing radicalization and violent extremism on the Internet (Norwegian). The Norwegian Police University College 2013:1 (2013)"},{"key":"15_CR7","unstructured":"UnitedNations: International Covenant on Civil and Political Rights (2014). http:\/\/www.ohchr.org\/en\/professionalinterest\/pages\/ccpr.aspx . Accessed 12 Mar 2016"},{"key":"15_CR8","unstructured":"TheTimesOfIndia: Akbaruddin Owaisi arrested in hate speech case (2014). http:\/\/articles.timesofindia.indiatimes.com\/2013-01-08\/india\/36216031_1_nirmal-rural-police-akbaruddin-owaisi-police-stations . Accessed 12 Mar 2016"},{"key":"15_CR9","unstructured":"Skjetne, O.L., Hustadnes, H.: Ubaydullah Hussain is accused of violent threats (norwegian) (2014). http:\/\/www.dagbladet.no\/2013\/11\/20\/nyheter\/ubaydullah_hussain\/innenriks\/islamisme\/trusler\/30429704\/ . Accessed 12 Mar 2016"},{"key":"15_CR10","unstructured":"Euronews: Neo-Nazi and black metal star Varg Vikernes arrested in France (2013). http:\/\/www.euronews.com\/2013\/07\/16\/neo-nazi-and-black-metal-star-varg-vikernes-arrested-in-france-\/ . Accessed 12 Mar 2016"},{"key":"15_CR11","unstructured":"Valaker, O., Holte, M.A.: Bergen blogger arrested (norwegian) (2012). http:\/\/www.bt.no\/nyheter\/lokalt\/Bergens-blogger-pagrepet-2732162.html . Accessed 12 Mar 2016"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Hammer, H.L.: Detecting threats of violence in online discussions using bigrams of important words. In: Intelligence and Security Informatics Conference (JISIC), p. 319 (2014)","DOI":"10.1109\/JISIC.2014.64"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Dinakar, K., Reichart, R., Lieberman, H.: Modeling the detection of textual cyberbullying. In: The Social Mobile Web, pp. 11\u201317 (2011)","DOI":"10.1609\/icwsm.v5i3.14209"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-37256-8_16","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"N Oostdijk","year":"2013","unstructured":"Oostdijk, N., Halteren, H.: N-gram-based recognition of threatening tweets. In: Gelbukh, A. (ed.) CICLing 2013. LNCS, vol. 7817, pp. 183\u2013196. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-37256-8_16"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Oostdijk, N., van Halteren, H.: Shallow parsing for recognizing threats in Dutch tweets. In: Proceedings of the 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 1034\u20131041. ACM (2013)","DOI":"10.1145\/2492517.2500271"},{"key":"15_CR16","unstructured":"Warner, W., Hirschberg, J.: Detecting hate speech on the world wide web. In: Proceedings of the Second Workshop on Language in Social Media, pp. 19\u201326. Association for Computational Linguistics (2012)"},{"issue":"1","key":"15_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v033.i01","volume":"33","author":"J Friedman","year":"2010","unstructured":"Friedman, J., Hastie, T., Tibshirani, R.: Regularization paths for generalized linear models via coordinate descent. J. Stat. Softw. 33(1), 1\u201322 (2010)","journal-title":"J. Stat. Softw."},{"issue":"14","key":"15_CR18","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1198\/004017007000000245","volume":"49","author":"A Genkin","year":"2007","unstructured":"Genkin, A., Lewis, D.D., Madigan, D.: Large-scale bayesian logistic regression for text categorization. Technometrics 49(14), 291\u2013304 (2007)","journal-title":"Technometrics"},{"key":"15_CR19","unstructured":"R Core Team, R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna (2013)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Fekete, L.: The Muslim conspiracy theory and the Oslo massacre. Technical Report 53(3), pp. 30\u201347. Institute of Race Relations (2011)","DOI":"10.1177\/0306396811425984"},{"key":"15_CR21","volume-title":"Applied Multivariate Statistical Analysis","author":"R Johnson","year":"1998","unstructured":"Johnson, R., Wichern, D.: Applied Multivariate Statistical Analysis. Prentece Hall, Upper Saddle River (1998)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Industrial Networks and Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52569-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T20:09:51Z","timestamp":1692648591000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52569-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319525686","9783319525693"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52569-3_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}