{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:08:23Z","timestamp":1743070103467,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319590622"},{"type":"electronic","value":"9783319590639"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59063-9_28","type":"book-chapter","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T15:47:16Z","timestamp":1495813636000},"page":"315-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Bullying-Severity Identifier Framework Based on Machine Learning and Fuzzy Logic"],"prefix":"10.1007","author":[{"given":"Carmen R.","family":"Sedano","sequence":"first","affiliation":[]},{"given":"Edson L.","family":"Ursini","sequence":"additional","affiliation":[]},{"given":"Paulo S.","family":"Martins","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,27]]},"reference":[{"key":"28_CR1","unstructured":"Tusinski, K.: The Causes and Consequences of Bullying (2008)"},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.jadohealth.2006.10.005","volume":"40","author":"NS Bauer","year":"2007","unstructured":"Bauer, N.S., Lozano, P., Rivara, F.P.: The effectiveness of the olweus bullying prevention program in public middle schools: a controlled trial. J. Adolesc. Health 40, 266\u2013274 (2007)","journal-title":"J. Adolesc. Health"},{"key":"28_CR3","unstructured":"Barton, E.A.: The bully, victim, and witness relationship defined. In: Bully Prevention: Tips and Strategies for School Leaders and Classroom Teachers, pp. 1\u201318 (2006)"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Lopes Neto, A.A.: Bullying: comportamento agressivo entre estudantes. J. Pediatr. (Rio. J.) 81, 164\u2013172 (2005)","DOI":"10.2223\/JPED.1403"},{"key":"28_CR5","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1111\/j.1746-1561.2003.tb03599.x","volume":"73","author":"JA Dake","year":"2003","unstructured":"Dake, J.A., Price, J.H., Telljohann, S.K.: The nature and extent of bullying at school. J. Sch. Health 73, 173\u2013180 (2003)","journal-title":"J. Sch. Health"},{"key":"28_CR6","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1016\/j.avb.2014.07.004","volume":"19","author":"CBR Evans","year":"2014","unstructured":"Evans, C.B.R., Fraser, M.W., Cotter, K.L.: The effectiveness of school-based bullying prevention programs: a systematic review. Aggress. Violent Behav. 19, 532\u2013544 (2014)","journal-title":"Aggress. Violent Behav."},{"key":"28_CR7","unstructured":"Cantillon, P., Hutchinson, L., Wood, D.: Social and Emotional Learning and Bullying Prevention (2009). Accessed. http:\/\/casel.org\/wp-content\/uploads\/2016\/01\/3_SEL_and_Bullying_Prevention_2009.pdf"},{"key":"28_CR8","first-page":"235","volume":"25","author":"DC Rettew","year":"2016","unstructured":"Rettew, D.C., Pawlowski, S.: Bullying. Child Adolesc. Psychiatr. Clin. N. Am. 25, 235\u2013242 (2016)","journal-title":"Psychiatr. Clin. N. Am."},{"key":"28_CR9","unstructured":"Bullying Prevention Advisory Group: Bullying prevention and response: A guide for Schools (2015). Accessed. (http:\/\/www.education.govt.nz\/assets\/Documents\/School\/Bullying-prevention\/MOEBullyingGuide2015Web.pdf)"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Mancilla-Caceres, J.F., Pu, W., Amir, E., Espelage, D.: A computer-in-the-loop approach for detecting bullies in the classroom. In: Proceedings of the 5th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, pp. 139\u2013146 (2012)","DOI":"10.1007\/978-3-642-29047-3_17"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Xu, J.-M., Zhu, X., Bellmore, A.: Fast learning for sentiment analysis on bullying. In: Proceedings of the First International Workshop Issues Sentim. Discov. Opin. Min., WISDOM 2012, pp. 1\u20136 (2012)","DOI":"10.1145\/2346676.2346686"},{"key":"28_CR12","unstructured":"Xu, J.: Understanding and Fighting Bullying with Machine Learning (2015)"},{"key":"28_CR13","unstructured":"Xu, J., Jun, K., Zhu, X., Bellmore, A.: Learning from bullying traces in social media. In: Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 656\u2013666 (2012)"},{"key":"28_CR14","first-page":"12","volume":"60","author":"D Olweus","year":"2003","unstructured":"Olweus, D.: A profile of bullying at school. Educ. Leadersh. 60, 12\u201317 (2003)","journal-title":"Educ. Leadersh."},{"key":"28_CR15","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1080\/15564880500498945","volume":"1","author":"CN Dulmus","year":"2006","unstructured":"Dulmus, C.N., Sowers, K.M., Theriot, M.T.: Prevalence and bullying experiences of victims and victims who become bullies (bully-victims) at rural schools. Vict. Offender. 1, 15\u201331 (2006)","journal-title":"Vict. Offender."},{"key":"28_CR16","unstructured":"California Department of Education: Bullying at School (2003)"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Perez, V.: Perception of severity, empathy, and disposition to intervene in physical, verbal, and relational bullying among teachers from 5 to 8 grade. In: Psykhe (Santiago), pp. 25\u201337 (2011) (in Spanish)","DOI":"10.4067\/S0718-22282011000200003"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Lazer, D., Pentland, A., Adamic, L., Aral, S., Barabasi, A.L., Brewer, D., Christakis, N., Contractor, N., Fowler, J., Gutmann, M., Jebara, T., King, G., Macy, M., Roy, D., Al, Vanstyne, M.: Life in the network: the coming age of computational social science. Science 323(80), 721\u2013723 (2009)","DOI":"10.1126\/science.1167742"},{"key":"28_CR19","unstructured":"Eisenstein, J., O\u2019Connor, B., Smith, N.A., Xing, E.P.: A latent variable model for geographic lexical variation. In: Proceedings of the 2010 Conference Empirical Methods for Natural Language Processing, pp. 1277\u20131287 (2010)"},{"key":"28_CR20","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1177\/0165551515602847","volume":"41","author":"O Ajao","year":"2015","unstructured":"Ajao, O., Hong, J., Liu, W.: A survey of location inference techniques on Twitter. J. Inf. Sci. 41, 855\u2013864 (2015)","journal-title":"J. Inf. Sci."},{"key":"28_CR21","unstructured":"Ritter, A., Clark, S., Etzioni, O.: Named entity recognition in tweets: an experimental study. In: Conference Empirical Methods for Natural Language Processing, pp. 1524\u20131534 (2011)"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Nalini, K., Sheela, L.J.: Classification of tweets using text classifier to detect cyber bullying. In: Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI, vol. 2, pp. 637\u2013645 (2015)","DOI":"10.1007\/978-3-319-13731-5_69"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Kontostathis, A., Reynolds, K., Garron, A., Edwards, L.: Detecting cyberbullying: query terms and techniques. In: Proceedings of the 5th Annual ACM Web Science Conference on WebSci 2013, pp. 195\u2013204. ACM, New York (2013)","DOI":"10.1145\/2464464.2464499"},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Dinakar, K., Reichart, R., Lieberman, H.: Modeling the detection of textual cyberbullying. Assoc. Adv. Artif. Intell., 11\u201317 (2011)","DOI":"10.1609\/icwsm.v5i3.14209"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Parime, S., Suri, V.: Cyberbullying detection and prevention: data mining and psychological perspective. In: 2014 International Conference on Circuit, Power and Computing Technologies, ICCPCT 2014, pp. 1541\u20131547 (2014)","DOI":"10.1109\/ICCPCT.2014.7054943"},{"key":"28_CR26","unstructured":"Arthur Patch, J.: Detecting Bullying on Twitter using Emotion Lexicons (2015)"},{"key":"28_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35781-0","volume-title":"Introduction to Fuzzy Logic Using MATLAB","author":"SN Sivanandam","year":"2007","unstructured":"Sivanandam, S.N., Sumathi, S., Deepa, S.N.: Introduction to Fuzzy Logic Using MATLAB. Springer, Heidelberg (2007)"},{"key":"28_CR28","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/91.705501","volume":"6","author":"MR Emami","year":"1998","unstructured":"Emami, M.R., Trksen, I.B., Goldenberg, A.A.: Development of a systematic methodology of fuzzy logic modeling. IEEE Trans. Fuzzy Syst. 6, 346\u2013361 (1998)","journal-title":"IEEE Trans. Fuzzy Syst."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59063-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T11:17:19Z","timestamp":1709810239000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59063-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319590622","9783319590639"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59063-9_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"27 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Soft Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zakopane","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 June 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaisc2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}