{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T08:20:30Z","timestamp":1773562830367,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T00:00:00Z","timestamp":1574812800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T00:00:00Z","timestamp":1574812800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s00500-019-04550-x","type":"journal-article","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T05:02:53Z","timestamp":1574830973000},"page":"11059-11070","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":64,"title":["Towards Cyberbullying-free social media in smart cities: a unified multi-modal approach"],"prefix":"10.1007","volume":"24","author":[{"given":"Kirti","family":"Kumari","sequence":"first","affiliation":[]},{"given":"Jyoti Prakash","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Yogesh Kumar","family":"Dwivedi","sequence":"additional","affiliation":[]},{"given":"Nripendra Pratap","family":"Rana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,27]]},"reference":[{"key":"4550_CR1","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.chb.2016.05.051","volume":"63","author":"MA Al-garadi","year":"2016","unstructured":"Al-garadi MA, Varathan KD, Ravana SD (2016) Cybercrime detection in online communications: the experimental case of cyberbullying detection in the Twitter network. Comput Hum Behav 63:433\u2013443","journal-title":"Comput Hum Behav"},{"issue":"10","key":"4550_CR2","doi-asserted-by":"publisher","first-page":"3187","DOI":"10.1007\/s00500-017-2989-5","volume":"22","author":"AM Ali","year":"2018","unstructured":"Ali AM, Angelov P (2018) Anomalous behaviour detection based on heterogeneous data and data fusion. Soft Comput 22(10):3187\u20133201","journal-title":"Soft Comput"},{"key":"4550_CR3","doi-asserted-by":"publisher","first-page":"116267","DOI":"10.1109\/ACCESS.2019.2935186","volume":"7","author":"EH Alkhammash","year":"2019","unstructured":"Alkhammash EH, Jussila J, Lytras MD, Visvizi A (2019) Annotation of smart cities Twitter micro-contents for enhanced citizen\u2019s engagement. IEEE Access 7:116267\u2013116276","journal-title":"IEEE Access"},{"key":"4550_CR4","doi-asserted-by":"crossref","unstructured":"Badjatiya P, Gupta S, Gupta M, Varma V (2017) Deep learning for hate speech detection in tweets. In: Proceedings of the 26th international conference on world wide web companion. International world wide web conferences steering committee, pp 759\u2013760","DOI":"10.1145\/3041021.3054223"},{"issue":"4","key":"4550_CR5","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1177\/0013164488484007","volume":"48","author":"KJ Berry","year":"1988","unstructured":"Berry KJ, Mielke PW Jr (1988) A generalization of Cohen\u2019s kappa agreement measure to interval measurement and multiple raters. Educ Psychol Meas 48(4):921\u2013933","journal-title":"Educ Psychol Meas"},{"issue":"2","key":"4550_CR6","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/s10447-017-9286-y","volume":"39","author":"CS Bhat","year":"2017","unstructured":"Bhat CS, Ragan MA, Selvaraj PR, Shultz BJ (2017) Online bullying among high-school students in India. Int J Adv Couns 39(2):112\u2013124","journal-title":"Int J Adv Couns"},{"key":"4550_CR7","doi-asserted-by":"crossref","unstructured":"Bohra A, Vijay D, Singh V, Akhtar SS, Shrivastava M (2018) A dataset of Hindi-English code-mixed social media text for hate speech detection. In: Proceedings of the second workshop on computational modeling of people\u2019s opinions, personality, and emotions in social media, pp 36\u201341","DOI":"10.18653\/v1\/W18-1105"},{"issue":"2","key":"4550_CR8","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1002\/poi3.85","volume":"7","author":"P Burnap","year":"2015","unstructured":"Burnap P, Williams ML (2015) Cyber hate speech on Twitter: an application of machine classification and statistical modeling for policy and decision making. Policy Internet 7(2):223\u2013242","journal-title":"Policy Internet"},{"key":"4550_CR9","doi-asserted-by":"crossref","unstructured":"Chatzakou D, Kourtellis N, Blackburn J, De\u00a0Cristofaro E, Stringhini G, Vakali A (2017) Mean birds: detecting aggression and bullying on Twitter. In: Proceedings of the 2017 ACM on web science conference. ACM, pp 13\u201322","DOI":"10.1145\/3091478.3091487"},{"key":"4550_CR10","doi-asserted-by":"crossref","unstructured":"Chen Y, Zhou Y, Zhu S, Xu H (2012) Detecting offensive language in social media to protect adolescent online safety. In: Privacy, security, risk and trust (PASSAT), 2012 international conference on and 2012 international conference on social computing (SocialCom). IEEE, pp 71\u201380","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"4550_CR11","doi-asserted-by":"crossref","unstructured":"Chen H, Mckeever S, Delany SJ (2017) Harnessing the power of text mining for the detection of abusive content in social media. In: Advances in computational intelligence systems, Springer, New York. pp 187\u2013205","DOI":"10.1007\/978-3-319-46562-3_12"},{"issue":"11","key":"4550_CR12","doi-asserted-by":"publisher","first-page":"2869","DOI":"10.3390\/en11112869","volume":"11","author":"K Chui","year":"2018","unstructured":"Chui K, Lytras M, Visvizi A (2018) Energy sustainability in smart cities: artificial intelligence, smart monitoring, and optimization of energy consumption. Energies 11(11):2869","journal-title":"Energies"},{"key":"4550_CR13","doi-asserted-by":"crossref","unstructured":"Dadvar M, De\u00a0Jong F (2012) Cyberbullying detection: a step toward a safer internet yard. In: Proceedings of the 21st international conference on world wide web. ACM, pp 121\u2013126","DOI":"10.1145\/2187980.2187995"},{"key":"4550_CR14","doi-asserted-by":"crossref","unstructured":"Dadvar M, Trieschnigg D, de\u00a0Jong F (2014) Experts and machines against bullies: A hybrid approach to detect cyberbullies. In: Canadian conference on artificial intelligence, Springer, New York, pp 275\u2013281","DOI":"10.1007\/978-3-319-06483-3_25"},{"key":"4550_CR15","doi-asserted-by":"crossref","unstructured":"Davidson T, Warmsley D, Macy M, Weber I (2017) Automated hate speech detection and the problem of offensive language. arXiv preprint arXiv:1703.04009","DOI":"10.1609\/icwsm.v11i1.14955"},{"issue":"3","key":"4550_CR16","first-page":"18","volume":"2","author":"K Dinakar","year":"2012","unstructured":"Dinakar K, Jones B, Havasi C, Lieberman H, Picard R (2012) Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Trans Interact Intell Syst (TiiS) 2(3):18","journal-title":"ACM Trans Interact Intell Syst (TiiS)"},{"key":"4550_CR17","unstructured":"Hosseinmardi H, Mattson SA, Rafiq RI, Han R, Lv Q, Mishr S (2015) Prediction of cyberbullying incidents on the Instagram social network. arXiv preprint arXiv:1508.06257"},{"key":"4550_CR18","doi-asserted-by":"crossref","unstructured":"Hosseinmardi H, Rafiq RI, Han R, Lv Q, Mishra S (2016) Prediction of cyberbullying incidents in a media-based social network. In: 2016 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 186\u2013192. IEEE","DOI":"10.1109\/ASONAM.2016.7752233"},{"issue":"1","key":"4550_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1037\/a0030309","volume":"3","author":"LM Jones","year":"2013","unstructured":"Jones LM, Mitchell KJ, Finkelhor D (2013) Online harassment in context: trends from three youth internet safety surveys (2000, 2005, 2010). Psychol Violence 3(1):53","journal-title":"Psychol Violence"},{"key":"4550_CR20","unstructured":"Kornblum J (2008) Cyberbullying grows bigger and meaner with photos, video. USA Today, dated July 17, 2008, Retrieved from https:\/\/cybercrimes.wordpress.com\/2008\/07\/17\/cyberbullying-growsbigger-and-meaner-with-photos-video\/"},{"key":"4550_CR21","doi-asserted-by":"crossref","unstructured":"Kumari K, Singh JP, Dwivedi YK, Rana NP (2019) Aggressive social media post detection system containing symbolic images. In: Conference on e-Business, e-Services and e-Society. Springer, New York, pp 415\u2013424","DOI":"10.1007\/978-3-030-29374-1_34"},{"key":"4550_CR22","unstructured":"League AD (2011) Glossary of cyberbullying terms. adl.org, Retrieved from https:\/\/www.sd35.bc.ca\/wp-content\/uploads\/sites\/2\/2015\/05\/glossary_of_cyberbullying_terms.pdf. Accessed 23 Nov 2017"},{"issue":"6","key":"4550_CR23","doi-asserted-by":"publisher","first-page":"1998","DOI":"10.3390\/su10061998","volume":"10","author":"M Lytras","year":"2018","unstructured":"Lytras M, Visvizi A (2018) Who uses smart city services and what to make of it: toward interdisciplinary smart cities research. Sustainability 10(6):1998","journal-title":"Sustainability"},{"issue":"9","key":"4550_CR24","doi-asserted-by":"publisher","first-page":"2974","DOI":"10.3390\/su10092974","volume":"10","author":"M Lytras","year":"2018","unstructured":"Lytras M, Visvizi A, Daniela L, Sarirete A, Ordonez De Pablos P (2018) Social networks research for sustainable smart education. Sustainability 10(9):2974","journal-title":"Sustainability"},{"issue":"5","key":"4550_CR25","first-page":"238","volume":"3","author":"V Nahar","year":"2013","unstructured":"Nahar V, Li X, Pang C (2013) An effective approach for cyberbullying detection. Commun Inf Sci Manag Eng 3(5):238","journal-title":"Commun Inf Sci Manag Eng"},{"issue":"4","key":"4550_CR26","first-page":"100","volume":"15","author":"J Paavola","year":"2016","unstructured":"Paavola J, Helo T, Jalonen H, Sartonen M, Huhtinen A (2016) Understanding the trolling phenomenon: the automated detection of bots and cyborgs in the social media. J Inf Warf 15(4):100\u2013111","journal-title":"J Inf Warf"},{"key":"4550_CR27","doi-asserted-by":"crossref","unstructured":"Pater JA, Miller AD, Mynatt ED (2015) This digital life: a neighborhood-based study of adolescents\u2019 lives online. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems. ACM, pp 2305\u20132314","DOI":"10.1145\/2702123.2702534"},{"key":"4550_CR28","doi-asserted-by":"crossref","unstructured":"Reynolds K, Kontostathis A, Edwards L (2011) Using machine learning to detect cyberbullying. In: 2011 10th international conference on machine learning and applications and workshops (ICMLA), vol.\u00a02, pp 241\u2013244. IEEE","DOI":"10.1109\/ICMLA.2011.152"},{"key":"4550_CR29","first-page":"1","volume":"1","author":"S Salawu","year":"2017","unstructured":"Salawu S, He Y, Lumsden J (2017) Approaches to automated detection of cyberbullying: a survey. IEEE Trans Affect Comput 1:1\u20131","journal-title":"IEEE Trans Affect Comput"},{"key":"4550_CR30","doi-asserted-by":"publisher","DOI":"10.5817\/CP2014-4-6","author":"SJ Seiler","year":"2014","unstructured":"Seiler SJ, Navarro JN (2014) Bullying on the pixel playground: investigating risk factors of cyberbullying at the intersection of children\u2019s online-offline social lives. Cyberpsychology. https:\/\/doi.org\/10.5817\/CP2014-4-6","journal-title":"Cyberpsychology"},{"key":"4550_CR31","doi-asserted-by":"crossref","unstructured":"Singh VK, Ghosh S, Jose C (2017) Toward multimodal cyberbullying detection. In: Proceedings of the 2017 CHI conference extended abstracts on human factors in computing systems. ACM, pp 2090\u20132099","DOI":"10.1145\/3027063.3053169"},{"issue":"24","key":"4550_CR32","doi-asserted-by":"publisher","first-page":"8227","DOI":"10.1007\/s00500-017-2766-5","volume":"22","author":"F Steiner-Correa","year":"2018","unstructured":"Steiner-Correa F, Viedma-del Jesus MI, Lopez-Herrera A (2018) A survey of multilingual human-tagged short message datasets for sentiment analysis tasks. Soft Comput 22(24):8227\u20138242","journal-title":"Soft Comput"},{"issue":"3","key":"4550_CR33","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1007\/s00500-015-1814-2","volume":"21","author":"X Sui","year":"2017","unstructured":"Sui X, Chen Z, Guo L, Wu K, Ma J, Wang G (2017) Social media as sensor in real world: movement trajectory detection with microblog. Soft Comput 21(3):765\u2013779","journal-title":"Soft Comput"},{"key":"4550_CR34","unstructured":"Tommasel A, Rodriguez JM, Godoy D (2018) Textual aggression detection through deep learning. In: Proceedings of the first workshop on trolling, aggression and cyberbullying (TRAC-2018), pp 177\u2013187"},{"issue":"1","key":"4550_CR35","doi-asserted-by":"publisher","first-page":"113","DOI":"10.4018\/IJKSR.2016010108","volume":"7","author":"MJ Torres-Ruiz","year":"2016","unstructured":"Torres-Ruiz MJ, Lytras MD (2016) Urban computing and smart cities applications for the knowledge society. Int J Knowl Soc Res (IJKSR) 7(1):113\u2013119","journal-title":"Int J Knowl Soc Res (IJKSR)"},{"issue":"1","key":"4550_CR36","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.tele.2014.04.002","volume":"32","author":"K Van Royen","year":"2015","unstructured":"Van Royen K, Poels K, Daelemans W, Vandebosch H (2015) Automatic monitoring of cyberbullying on social networking sites: from technological feasibility to desirability. Telemat Inform 32(1):89\u201397","journal-title":"Telemat Inform"},{"key":"4550_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.03.022","author":"A Visvizi","year":"2019","unstructured":"Visvizi A, Jussila J, Lytras MD, Ij\u00e4s M (2019) Tweeting and mining OECD-related microcontent in the post-truth era: a cloud-based app. Comput Human Behav. https:\/\/doi.org\/10.1016\/j.chb.2019.03.022","journal-title":"Comput Human Behav"},{"issue":"2","key":"4550_CR38","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1108\/JSTPM-02-2018-0020","volume":"9","author":"A Visvizi","year":"2018","unstructured":"Visvizi A, Lytras MD (2018) Rescaling and refocusing smart cities research: from mega cities to smart villages. J Sci Technol Policy Manag 9(2):134\u2013145","journal-title":"J Sci Technol Policy Manag"},{"issue":"2","key":"4550_CR39","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1108\/JSTPM-07-2018-079","volume":"9","author":"A Visvizi","year":"2018","unstructured":"Visvizi A, Lytras MD, Damiani E, Mathkour H (2018) Policy making for smart cities: innovation and social inclusive economic growth for sustainability. J Sci Technol Policy Manag 9(2):126\u2013133","journal-title":"J Sci Technol Policy Manag"},{"issue":"1","key":"4550_CR40","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s00500-016-2246-3","volume":"21","author":"L Wang","year":"2017","unstructured":"Wang L, Zhang J, Liu P, Choo K-KR, Huang F (2017) Spectral-spatial multi-feature-based deep learning for hyperspectral remote sensing image classification. Soft Comput 21(1):213\u2013221","journal-title":"Soft Comput"},{"key":"4550_CR41","doi-asserted-by":"crossref","unstructured":"Waseem Z, Hovy D (2016) Hateful symbols or hateful people? Predictive features for hate speech detection on twitter. In: Proceedings of the NAACL student research workshop, pp 88\u201393","DOI":"10.18653\/v1\/N16-2013"},{"key":"4550_CR42","first-page":"1","volume":"2","author":"D Yin","year":"2009","unstructured":"Yin D, Xue Z, Hong L, Davison BD, Kontostathis A, Edwards L (2009) Detection of harassment on web 2.0. Proc Content Anal WEB 2:1\u20137","journal-title":"Proc Content Anal WEB"},{"key":"4550_CR43","first-page":"1","volume":"99","author":"R Zhao","year":"2016","unstructured":"Zhao R, Mao K (2016) Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder. IEEE Trans Affect Comput 99:1\u20131","journal-title":"IEEE Trans Affect Comput"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04550-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-04550-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04550-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T10:59:34Z","timestamp":1695466774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-04550-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,27]]},"references-count":43,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["4550"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-04550-x","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,27]]},"assertion":[{"value":"27 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}