{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T10:03:17Z","timestamp":1743156197268,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319984421"},{"type":"electronic","value":"9783319984438"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98443-8_18","type":"book-chapter","created":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T11:55:15Z","timestamp":1533642915000},"page":"192-205","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Computational Analysis of Bullying Behavior in the Social Media Era"],"prefix":"10.1007","author":[{"given":"Fakhra","family":"Jabeen","sequence":"first","affiliation":[]},{"given":"Jan","family":"Treur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,8]]},"reference":[{"unstructured":"Myburgh, J.-E.: Examining the Relationships between Aggression, Bullying, and Cyberbullying among University Students in Saskatchewan. Diss. (2017)","key":"18_CR1"},{"issue":"3","key":"18_CR2","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.soscij.2017.03.004","volume":"54","author":"J Chapin","year":"2017","unstructured":"Chapin, J., Coleman, G.: The cycle of cyberbullying: some experience required. Soc. Sci. J. 54(3), 314\u2013318 (2017)","journal-title":"Soc. Sci. J."},{"unstructured":"Ryan v. Mesa unified school district, No. 2: 14-cv-01145 JWS (D. Ariz. July 20, 2016)","key":"18_CR3"},{"unstructured":"Diperna v. The chicago school of professional psychology, No. 14-cv-57 (N.D. Ill. Nov. 28, 2016)","key":"18_CR4"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-44501-4_5","volume-title":"Cybercrime, Organized Crime, and Societal Responses","author":"V Bajovic","year":"2017","unstructured":"Bajovic, V.: Criminal proceedings in cyberspace: the challenge of digital era. In: Viano, E.C. (ed.) Cybercrime, Organized Crime, and Societal Responses, pp. 87\u2013101. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-44501-4_5"},{"unstructured":"Nuccitelli, M.: Cyber bullying tactics. In: Forensic Examiner, Springfield, vol. 21, no. 3, pp. 24\u201327 (2012)","key":"18_CR6"},{"unstructured":"https:\/\/www.ipredator.co\/michael-nuccitelli\/. Accessed 19 Jan 2017","key":"18_CR7"},{"unstructured":"https:\/\/cyberbullying.org\/new-national-bullying-cyberbullying-data. Accessed 11 Dec 2017","key":"18_CR8"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.chb.2015.04.048","volume":"51","author":"A Tsitsika","year":"2015","unstructured":"Tsitsika, A., et al.: Cyberbullying victimization prevalence and associations with internalizing and externalizing problems among adolescents in six European countries. Comput. Hum. Behav. 51, 1\u20137 (2015)","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"18_CR10","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1080\/15388220.2017.1376208","volume":"17","author":"K Bosworth","year":"2018","unstructured":"Bosworth, K., et al.: The impact of lead-ership involvement in enhancing high school climate and reducing bullying: an exploratory study. J. Sch. Violence 17(3), 354\u2013366 (2018)","journal-title":"J. Sch. Violence"},{"unstructured":"Holmes, R.: Eradicating Cyber Bullying: Through Online Training, Reporting & Tracking System. AuthorHouse (2017)","key":"18_CR11"},{"unstructured":"Finkelhor, D., Mitchell, K., Wolak, J.: Online victimisation: a report on the nation\u2019s youth. National Center for Missing & Exploited Children. www.unh.edu\/ccrc\/YouthInternetinfopage.html. Accessed 7 Feb 2007","key":"18_CR12"},{"issue":"3","key":"18_CR13","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1080\/13811118.2010.494133","volume":"14","author":"S Hinduja","year":"2010","unstructured":"Hinduja, S., Patchin, J.W.: Bullying, cyberbullying, and suicide. Arch. Suicide Res. 14(3), 206\u2013221 (2010)","journal-title":"Arch. Suicide Res."},{"issue":"11","key":"18_CR14","doi-asserted-by":"publisher","first-page":"2994","DOI":"10.1016\/j.neuropsychologia.2011.06.024","volume":"49","author":"J Decety","year":"2011","unstructured":"Decety, J., Porges, E.C.: Imagining being the agent of actions that carry different moral consequences: an fMRI study. Neuropsychologia 49(11), 2994\u20133001 (2011)","journal-title":"Neuropsychologia"},{"issue":"6","key":"18_CR15","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1016\/j.neuron.2010.03.003","volume":"65","author":"L Young","year":"2010","unstructured":"Young, L., et al.: Damage to ventromedial prefrontal cortex impairs judgment of harmful intent. Neuron 65(6), 845\u2013851 (2010)","journal-title":"Neuron"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1001\/archgenpsychiatry.2011.61","volume":"68","author":"B Schiffer","year":"2011","unstructured":"Schiffer, B., et al.: Disentangling structural brain alterations associated with violent behavior from those associated with substance use disorders. Arch. Gen. Psychiatry 68, 1039\u20131049 (2011)","journal-title":"Arch. Gen. Psychiatry"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.jcrimjus.2017.07.007","volume":"56","author":"RC Meldrum","year":"2017","unstructured":"Meldrum, R.C., et al.: Brain activity, low self-control, and delinquency: an fMRI study of at-risk adolescents. J. Crim. Justice 56, 107\u2013117 (2017)","journal-title":"J. Crim. Justice"},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0166-4328(99)00172-2","volume":"109","author":"MP Laakso","year":"2000","unstructured":"Laakso, M.P., et al.: A volumetric MRI study of the hippocampus in type 1 and 2 alcoholism. Behav. Brain Res. 109, 177\u2013186 (2000)","journal-title":"Behav. Brain Res."},{"key":"18_CR19","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1111\/j.1532-7795.2005.00095.x","volume":"15","author":"N Eisenberg","year":"2005","unstructured":"Eisenberg, N.: Age changes in prosocial responding and moral reasoning in adolescence and early adulthood. J. Res. Adolesc. 15, 235\u2013260 (2005)","journal-title":"J. Res. Adolesc."},{"key":"18_CR20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511805851","volume-title":"Empathy and Moral Development","author":"ML Hoffman","year":"2000","unstructured":"Hoffman, M.L.: Empathy and Moral Development. Cambridge University Press, New York (2000)"},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/S0925-4927(02)00005-7","volume":"114","author":"MP Laakso","year":"2002","unstructured":"Laakso, M.P., Gunning-Dixon, F., Vaurio, O., Repo-Tiihonen, E., Soininen, H., Tiihonen, J.: Prefrontal volumes in habitually violent subjects with antisocial personality disorder and type 2 alcoholism. Psychiatry Res. Neuroimaging 114, 95\u2013102 (2002)","journal-title":"Psychiatry Res. Neuroimaging"},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.pscychresns.2010.12.013","volume":"193","author":"M Boccardi","year":"2011","unstructured":"Boccardi, M., et al.: Cortex and amygdala morphology in psychopathy. Psychiatry Res. Neuroimaging 193, 85\u201392 (2011)","journal-title":"Psychiatry Res. Neuroimaging"},{"issue":"2","key":"18_CR23","first-page":"7","volume":"3","author":"E Ild\u0131r\u0131m","year":"2017","unstructured":"Ild\u0131r\u0131m, E., \u00c7al\u0131c\u0131, C., Erdo\u011fan, B.: Psychological correlates of cyberbullying and cyber-victimization. Int. J. Hum. Behav. Sci. 3(2), 7\u201321 (2017)","journal-title":"Int. J. Hum. Behav. Sci."},{"issue":"1","key":"18_CR24","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1002\/casp.2137","volume":"23","author":"J Barli\u0144ska","year":"2013","unstructured":"Barli\u0144ska, J., Szuster, A., Winiewski, M.: Cyberbullying among adolescent bystanders: Role of the communication medium, form of violence, and empathy. J. Community Appl. Soc. Psych. 23(1), 37\u201351 (2013)","journal-title":"J. Community Appl. Soc. Psych."},{"issue":"1","key":"18_CR25","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.adolescence.2010.02.001","volume":"34","author":"D Jolliffe","year":"2011","unstructured":"Jolliffe, D., Farrington, D.F.: Is low empathy related to bullying after controlling for individual and social background variables? J. Adolesc. 34(1), 59\u201371 (2011)","journal-title":"J. Adolesc."},{"doi-asserted-by":"crossref","unstructured":"Shultz, E., Heilman, R., Hart, K.J.: Cyber-bullying: an exploration of bystander behavior and motivation. Cyberpsychol. J. Psychosoc. Res. Cyberspace 8(4), Article 3 (2014)","key":"18_CR26","DOI":"10.5817\/CP2014-4-3"},{"key":"18_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45213-5","volume-title":"Network-Oriented Modeling","author":"J Treur","year":"2016","unstructured":"Treur, J.: Network-Oriented Modeling. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45213-5"},{"key":"18_CR28","volume-title":"Self Comes to Mind: Constructing the Conscious Brain","author":"AR Damasio","year":"2010","unstructured":"Damasio, A.R.: Self Comes to Mind: Constructing the Conscious Brain. Pantheon Books, New York (2010)"},{"key":"18_CR29","first-page":"39","volume":"19","author":"T Bosse","year":"2012","unstructured":"Bosse, T., et al.: A computational model for dynamics of desiring and feeling. Cogn. Syst. Res. 19, 39\u201361 (2012)","journal-title":"Cogn. Syst. Res."},{"key":"18_CR30","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1207\/S15327957PSPR0401_6","volume":"4","author":"K McKenna","year":"2000","unstructured":"McKenna, K., Bargh, J.: Plan 9 from cyberspace: the implications of the Internet for personality and social psychology. Pers. Soc. Psychol. Rev. 4, 57\u201375 (2000)","journal-title":"Pers. Soc. Psychol. Rev."},{"issue":"1","key":"18_CR31","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/BF00940812","volume":"45","author":"V \u010cern\u00fd","year":"1985","unstructured":"\u010cern\u00fd, V.: Thermodynamical approach to the traveling salesman problem: an efficient simulation algorithm. J. Optim. Theory Appl. 45(1), 41\u201351 (1985)","journal-title":"J. Optim. Theory Appl."},{"issue":"4","key":"18_CR32","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1037\/pne0000069","volume":"9","author":"EJ Santana","year":"2016","unstructured":"Santana, E.J.: The brain of the psychopath: a systematic review of structural neuroimaging studies. Psychol. Neurosci. 9(4), 420 (2016)","journal-title":"Psychol. Neurosci."},{"doi-asserted-by":"crossref","unstructured":"Pohl, K., Rupp, C.: Requirements Engineering Fundamentals (Rocky Nook, 2011)","key":"18_CR33","DOI":"10.1007\/978-3-642-12578-2_20"},{"issue":"4598","key":"18_CR34","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1126\/science.220.4598.671","volume":"220","author":"S Kirkpatrick","year":"1983","unstructured":"Kirkpatrick, S., Gelatt Jr., C., Vecchi, M.: Optimization by simulated annealing. Science 220(4598), 671\u2013680 (1983)","journal-title":"Science"},{"unstructured":"Ferber, J., Gutknecht, O., Jonker, C.M., M\u00fcller, J.P., Treur, J.: Organization models and behavioural requirements specification for multi-agent systems. In: Demazeau, Y., Garijo, F. (eds.) Proceedings of MAAMAW 2001 (2001)","key":"18_CR35"},{"issue":"1","key":"18_CR36","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1214\/ss\/1177011077","volume":"8","author":"D Bertsimas","year":"1993","unstructured":"Bertsimas, D., Tsitsiklis, J.: Simulated annealing. Stat. Sci. 8(1), 10\u201315 (1993)","journal-title":"Stat. Sci."},{"key":"18_CR37","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/978-3-319-60045-1_36","volume-title":"Advances in Artificial Intelligence: From Theory to Practice","author":"JS Mollee","year":"2017","unstructured":"Mollee, J.S., Ara\u00fajo, E.F.M., Klein, M.C.A.: Exploring parameter tuning for analysis and optimization of a computational model. In: Benferhat, S., Tabia, K., Ali, M. (eds.) IEA\/AIE 2017. LNCS (LNAI), vol. 10351, pp. 341\u2013352. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60045-1_36"},{"issue":"5479","key":"18_CR38","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1126\/science.289.5479.591","volume":"289","author":"RJ Davidson","year":"2000","unstructured":"Davidson, R.J., Putnam, K.M., Larson, C.L.: Dysfunction in the neural circuitry of emotion regulation\u2013a possible prelude to violence. Science 289(5479), 591\u2013594 (2000)","journal-title":"Science"},{"issue":"1","key":"18_CR39","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.concog.2006.12.004","volume":"17","author":"J Moore","year":"2008","unstructured":"Moore, J., Haggard, P.: Awareness of action: inference and prediction. Conscious. Cogn. 17(1), 136\u2013144 (2008). p. 142","journal-title":"Conscious. Cogn."}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98443-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:50:02Z","timestamp":1710348602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-98443-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319984421","9783319984438"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98443-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"8 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bristol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccci2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}