{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:46:42Z","timestamp":1759333602808,"version":"3.41.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319920122"},{"type":"electronic","value":"9783319920139"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92013-9_14","type":"book-chapter","created":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T12:57:09Z","timestamp":1526561829000},"page":"174-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Child Abuse and Domestic Abuse: Content and Feature Analysis from Social Media Disclosures"],"prefix":"10.1007","author":[{"given":"Sudha","family":"Subramani","sequence":"first","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Md Rafiqul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Anwaar","family":"Ulhaq","sequence":"additional","affiliation":[]},{"given":"Manjula","family":"O\u2019Connor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,18]]},"reference":[{"key":"14_CR1","unstructured":"World Health Organization: understanding and addressing violence against women: sexual violence (2012)"},{"key":"14_CR2","unstructured":"World Health Organization: global and regional estimates of violence against women: prevalence and health effects of intimate partner violence and non-partner sexual violence. World Health Organization (2013)"},{"issue":"5","key":"14_CR3","doi-asserted-by":"publisher","first-page":"374","DOI":"10.3928\/00485713-20050501-02","volume":"35","author":"BA Kolk Van der","year":"2017","unstructured":"Van der Kolk, B.A.: This issue: child abuse & victimization. Psychiatr. Ann. 35(5), 374\u2013378 (2017)","journal-title":"Psychiatr. Ann."},{"issue":"1","key":"14_CR4","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1037\/0033-2909.99.1.66","volume":"99","author":"A Browne","year":"1986","unstructured":"Browne, A., Finkelhor, D.: Impact of child sexual abuse: a review of the research. Psychol. bull. 99(1), 66 (1986)","journal-title":"Psychol. bull."},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Wang, J., Cong, G., Zhao, W.X., Li, X.: Mining user intents in Twitter: a semi-supervised approach to inferring intent categories for tweets. In: AAAI, pp. 318\u2013324 (2015)","DOI":"10.1609\/aaai.v29i1.9196"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Gupta, V., Varshney, D., Jhamtani, H., Kedia, D., Karwa, S.: Identifying purchase intent from social posts. In: ICWSM (2014)","DOI":"10.1609\/icwsm.v8i1.14505"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Turner, R.J., Brown, R.L.: Social support and mental health. In: A Handbook for the Study of Mental Health: Social Contexts, Theories, and Systems, vol. 2, pp. 200\u2013212 (2010)","DOI":"10.1017\/CBO9780511984945.014"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"O\u2019Connor, B., Balasubramanyan, R., Routledge, B.R., Smith, N.A., et al.: From tweets to polls: Linking text sentiment to public opinion time series. In: ICWSM, vol. 11, pp. 122\u2013129 (2010)","DOI":"10.1609\/icwsm.v4i1.14031"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes Twitter users: real-time event detection by social sensors. In: Proceedings of the 19th International Conference on World Wide Web, pp. 851\u2013860. ACM (2010)","DOI":"10.1145\/1772690.1772777"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"39","DOI":"10.4269\/ajtmh.2012.11-0597","volume":"86","author":"R Chunara","year":"2012","unstructured":"Chunara, R., Andrews, J.R., Brownstein, J.S.: Social and news media enable estimation of epidemiological patterns early in the 2010 Haitian cholera outbreak. Am. J. Trop. Med. Hyg. 86(1), 39\u201345 (2012)","journal-title":"Am. J. Trop. Med. Hyg."},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"e647","DOI":"10.7717\/peerj.647","volume":"2","author":"NJ Reavley","year":"2014","unstructured":"Reavley, N.J., Pilkington, P.D.: Use of Twitter to monitor attitudes toward depression and schizophrenia: an exploratory study. PeerJ 2, e647 (2014)","journal-title":"PeerJ"},{"issue":"4","key":"14_CR12","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1177\/1460458214525615","volume":"21","author":"B Mart\u00ednez-P\u00e9rez","year":"2015","unstructured":"Mart\u00ednez-P\u00e9rez, B., de la Torre-D\u00edez, I., Bargiela-Fl\u00f3rez, B., L\u00f3pez-Coronado, M., Rodrigues, J.J.: Content analysis of neurodegenerative and mental diseases social groups. Health Inform. J. 21(4), 267\u2013283 (2015)","journal-title":"Health Inform. J."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Andalibi, N., \u00d6zt\u00fcrk, P., Forte, A.: Sensitive self-disclosures, responses, and social support on Instagram: the case of# depression. In: CSCW, pp. 1485\u20131500 (2017)","DOI":"10.1145\/2998181.2998243"},{"issue":"C","key":"14_CR14","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.ins.2015.05.040","volume":"318","author":"H Wang","year":"2015","unstructured":"Wang, H., Jiang, X., Kambourakis, G.: Special issue on security, privacy and trust in network-based big data. Inf. Sci. Int. J. 318(C), 48\u201350 (2015)","journal-title":"Inf. Sci. Int. J."},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.jnca.2015.12.016","volume":"64","author":"Y Qin","year":"2016","unstructured":"Qin, Y., Sheng, Q.Z., Falkner, N.J., Dustdar, S., Wang, H., Vasilakos, A.V.: When things matter: a survey on data-centric internet of things. J. Netw. Comput. Appl. 64, 137\u2013153 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"14_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11280-017-0490-9","volume":"21","author":"H Wang","year":"2017","unstructured":"Wang, H., Zhang, Z., Taleb, T.: Special issue on security and privacy of IoT. World Wide Web 21(1), 1\u20136 (2017)","journal-title":"World Wide Web"},{"issue":"4","key":"14_CR17","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1093\/comjnl\/bxr028","volume":"55","author":"X Sun","year":"2012","unstructured":"Sun, X., Wang, H., Li, J., Zhang, Y.: Satisfying privacy requirements before data anonymization. Comput. J. 55(4), 422\u2013437 (2012)","journal-title":"Comput. J."},{"issue":"1","key":"14_CR18","first-page":"6","volume":"3","author":"J Li","year":"2008","unstructured":"Li, J., Wang, H., Jin, H., Yong, J.: Current developments of k-anonymous data releasing. Electron. J. Health Inform. 3(1), 6 (2008)","journal-title":"Electron. J. Health Inform."},{"issue":"3","key":"14_CR19","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TKDE.2005.35","volume":"17","author":"H Wang","year":"2005","unstructured":"Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425\u2013436 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Wang, H., Sun, L.: Trust-involved access control in collaborative open social networks. In: 2010 4th International Conference on Network and System Security (NSS), pp. 239\u2013246. IEEE (2010)","DOI":"10.1109\/NSS.2010.13"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Schrading, N., Alm, C.O., Ptucha, R., Homan, C.: # WhyiStayed, # WhyiLeft: microblogging to make sense of domestic abuse. In: Proceedings of the 2015 Conference of the North American Chapter of the Association for Computational Linguistics, pp. 1281\u20131286. Human Language Technologies (2015)","DOI":"10.3115\/v1\/N15-1139"},{"key":"14_CR22","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/j.eswa.2017.06.035","volume":"88","author":"C Amrit","year":"2017","unstructured":"Amrit, C., Paauw, T., Aly, R., Lavric, M.: Identifying child abuse through text mining and machine learning. Expert Syst. Appl. 88, 402\u2013418 (2017)","journal-title":"Expert Syst. Appl."},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Andalibi, N., Haimson, O.L., De Choudhury, M., Forte, A.: Understanding social media disclosures of sexual abuse through the lenses of support seeking and anonymity. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 3906\u20133918. ACM (2016)","DOI":"10.1145\/2858036.2858096"},{"issue":"3","key":"14_CR24","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1109\/TAFFC.2014.2315623","volume":"5","author":"T Nguyen","year":"2014","unstructured":"Nguyen, T., Phung, D., Dao, B., Venkatesh, S., Berk, M.: Affective and content analysis of online depression communities. IEEE Trans. Affect. Comput. 5(3), 217\u2013226 (2014)","journal-title":"IEEE Trans. Affect. Comput."},{"key":"14_CR25","unstructured":"Pennebaker, J.W., Boyd, R.L., Jordan, K., Blackburn, K.: The development and psychometric properties of liwc2015. Technical report (2015)"},{"issue":"3","key":"14_CR26","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1080\/1369118X.2011.641993","volume":"15","author":"A Markham","year":"2012","unstructured":"Markham, A.: Fabrication as ethical practice: qualitative inquiry in ambiguous internet contexts. Inf. Commun. Soc. 15(3), 334\u2013353 (2012)","journal-title":"Inf. Commun. Soc."},{"issue":"3","key":"14_CR27","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"issue":"1","key":"14_CR28","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81\u2013106 (1986)","journal-title":"Mach. Learn."},{"key":"14_CR29","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45357-1_9","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"E-HS Han","year":"2001","unstructured":"Han, E.-H.S., Karypis, G., Kumar, V.: Text categorization using weight adjusted k-nearest neighbor classification. In: Cheung, D., Williams, G.J., Li, Q. (eds.) PAKDD 2001. LNCS (LNAI), vol. 2035, pp. 53\u201365. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45357-1_9"}],"container-title":["Lecture Notes in Computer Science","Databases Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92013-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T16:04:54Z","timestamp":1751645094000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92013-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319920122","9783319920139"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92013-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}