{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T23:28:19Z","timestamp":1775086099049,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T00:00:00Z","timestamp":1586131200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T00:00:00Z","timestamp":1586131200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"crossref","award":["570515-181099"],"award-info":[{"award-number":["570515-181099"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100009011","name":"Ontario Centres of Excellence","doi-asserted-by":"publisher","award":["24543"],"award-info":[{"award-number":["24543"]}],"id":[{"id":"10.13039\/100009011","id-type":"DOI","asserted-by":"publisher"}]},{"name":"VISR Inc."}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Lang Resources &amp; Evaluation"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s10579-020-09488-3","type":"journal-article","created":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T10:02:46Z","timestamp":1586167366000},"page":"851-874","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["A multi-platform dataset for detecting cyberbullying in social media"],"prefix":"10.1007","volume":"54","author":[{"given":"David","family":"Van Bruwaene","sequence":"first","affiliation":[]},{"given":"Qianjia","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Diana","family":"Inkpen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,6]]},"reference":[{"key":"9488_CR1","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.chb.2016.05.051","volume":"63","author":"MA Al-garadi","year":"2016","unstructured":"Al-garadi, M. A., Varathan, K. D., & Ravana, S. D. (2016). Cybercrime detection in online communications: The experimental case of cyberbullying detection in the twitter network. Computers in Human Behavior, 63, 433\u2013443.","journal-title":"Computers in Human Behavior"},{"key":"9488_CR2","unstructured":"Ashktorab, Z., Kumar, S., De, S., & Golbeck, J. (2014). \u201cianon: Leveraging social network big data to mitigate behavioral symptoms of cyberbullying,\u201d iConference 2014 (Social Media Expo)."},{"issue":"3\u20134","key":"9488_CR3","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1080\/13632752.2012.704228","volume":"17","author":"L Beckman","year":"2012","unstructured":"Beckman, L., Hagquist, C., & Hellstr\u00f6m, L. (2012). Does the association with psychosomatic health problems differ between cyberbullying and traditional bullying? Emotional and Behavioural Difficulties, 17(3\u20134), 421\u2013434.","journal-title":"Emotional and Behavioural Difficulties"},{"key":"9488_CR4","unstructured":"Bigelow, J.L., Edwards, L. et\u00a0al., (2016). \u201cDetecting cyberbullying using latent semantic indexing,\u201d in Proceedings of the First International Workshop on Computational Methods for CyberSafety, pp.\u00a011\u201314, ACM."},{"key":"9488_CR5","unstructured":"Chawla, N.V. (2009). \u201cData mining for imbalanced datasets: An overview,\u201d in Data mining and knowledge discovery handbook, pp.\u00a0875\u2013886, Springer."},{"key":"9488_CR6","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). Smote: Synthetic minority over-sampling technique. Journal of Artificial Intelligence Research, 16, 321\u2013357.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"9488_CR7","unstructured":"Chu, T., Jue, K., & Wang, M. (2016) \u201cComment abuse classification with deep learning.\u201d"},{"key":"9488_CR8","doi-asserted-by":"crossref","unstructured":"Dadvar, M., de\u00a0Jong, F.M., Ordelman, R., & Trieschnigg, R. (2012). \u201cImproved cyberbullying detection using gender information,\u201d.","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"9488_CR9","unstructured":"Dadvar, M., Trieschnigg, D., & de\u00a0Jong, F. (2014). \u201cExperts and machines against bullies: A hybrid approach to detect cyberbullies,\u201d in Canadian Conference on Artificial Intelligence, pp.\u00a0275\u2013281, Springer."},{"key":"9488_CR10","doi-asserted-by":"crossref","unstructured":"Dadvar, M., Trieschnigg, D., Ordelman, R., & de\u00a0Jong, F. (2013). \u201cImproving cyberbullying detection with user context.,\u201d in ECIR, pp.\u00a0693\u2013696, Springer.","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"9488_CR11","unstructured":"Dinakar, K., Reichart, R., & Lieberman, H. (2011). \u201cModeling the detection of textual cyberbullying.,\u201d. The Social Mobile Web, 11(02)."},{"issue":"3","key":"9488_CR12","first-page":"18","volume":"2","author":"K Dinakar","year":"2012","unstructured":"Dinakar, K., Jones, B., Havasi, C., Lieberman, H., & Picard, R. (2012). Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiiS), 2(3), 18.","journal-title":"ACM Transactions on Interactive Intelligent Systems (TiiS)"},{"key":"9488_CR13","unstructured":"Hosseinmardi, H., Mattson, S.A., Rafiq, R.I., Han, R., Lv, Q., & Mishra, S. (2015). \u201cDetection of cyberbullying incidents on the instagram social network,\u201d arXiv preprint arXiv:1503.03909."},{"key":"9488_CR14","unstructured":"Huang, Q., Singh, V.K., & Atrey, P.K. (2014). \u201cCyber bullying detection using social and textual analysis,\u201d in Proceedings of the 3rd International Workshop on Socially-Aware Multimedia, pp.\u00a03\u20136, ACM."},{"key":"9488_CR15","unstructured":"Husseini\u00a0Orabi, A., Husseini\u00a0Orabi, M., Huang, Q., Inkpen, D., Van\u00a0Bruwaene, & D. Aug. (2018) \u201cCyber-aggression detection using cross segment-and-concatenate multi-task learning from text,\u201d in Proceedings of the First Workshop on Trolling, Aggression and Cyberbullying (TRAC-2018), (Santa Fe, New Mexico, USA), pp.\u00a0159\u2013165, Association for Computational Linguistics."},{"key":"9488_CR16","unstructured":"Kontostathis, A., Reynolds, K., Garron, A., & Edwards, L. (2013). \u201cDetecting cyberbullying: query terms and techniques,\u201d in Proceedings of the 5th annual acm web science conference, pp.\u00a0195\u2013204, ACM."},{"issue":"6","key":"9488_CR17","doi-asserted-by":"publisher","first-page":"S22","DOI":"10.1016\/j.jadohealth.2007.08.017","volume":"41","author":"RM Kowalski","year":"2007","unstructured":"Kowalski, R. M., & Limber, S. P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41(6), S22\u2013S30.","journal-title":"Journal of Adolescent Health"},{"key":"9488_CR18","unstructured":"Nahar, V., Unankard, S., Li, X., & Pang, C. (2012). \u201cSentiment analysis for effective detection of cyber bullying,\u201d in Asia-Pacific Web Conference, pp.\u00a0767\u2013774, Springer."},{"issue":"5","key":"9488_CR19","first-page":"238","volume":"3","author":"V Nahar","year":"2013","unstructured":"Nahar, V., Li, X., & Pang, C. (2013). An effective approach for cyberbullying detection. Communications in Information Science and Management Engineering, 3(5), 238.","journal-title":"Communications in Information Science and Management Engineering"},{"key":"9488_CR20","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.procs.2015.03.085","volume":"45","author":"BS Nandhini","year":"2015","unstructured":"Nandhini, B. S., & Sheeba, J. (2015). Online social network bullying detection using intelligence techniques. Procedia Computer Science, 45, 485\u2013492.","journal-title":"Procedia Computer Science"},{"key":"9488_CR21","unstructured":"Raisi, E., & Huang, B. (2016). \u201cCyberbullying identification using participant-vocabulary consistency,\u201d arXiv preprint arXiv:1606.08084."},{"key":"9488_CR22","unstructured":"Reynolds, K., Kontostathis, A., & Edwards, L. (2011). \u201cUsing machine learning to detect cyberbullying,\u201d in 2011 10th International Conference on Machine learning and applications and workshops (ICMLA), 2, pp.\u00a0241\u2013244, IEEE."},{"key":"9488_CR23","unstructured":"Singh, V.K., Ghosh, S., & Jose, C. (2017). \u201cToward multimodal cyberbullying detection,\u201d in Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp.\u00a02090\u20132099, ACM."},{"key":"9488_CR24","unstructured":"Singh, V.K., Huang, Q., & Atrey, P.K. (2016). \u201cCyberbullying detection using probabilistic socio-textual information fusion,\u201d in Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE\/ACM International Conference on, pp.\u00a0884\u2013887, IEEE."},{"key":"9488_CR25","unstructured":"Sintaha, M., Satter, S.B., Zawad, N., Swarnaker, C., & Hassan, A. (2016). Cyberbullying detection using sentiment analysis in social media. PhD thesis, BRAC University."},{"issue":"4","key":"9488_CR26","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","volume":"49","author":"PK Smith","year":"2008","unstructured":"Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49(4), 376\u2013385.","journal-title":"Journal of Child Psychology and Psychiatry"},{"issue":"7","key":"9488_CR27","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1001\/archgenpsychiatry.2010.79","volume":"67","author":"A Sourander","year":"2010","unstructured":"Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., et al. (2010). Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study. Archives of General Psychiatry, 67(7), 720\u2013728.","journal-title":"Archives of General Psychiatry"},{"key":"9488_CR28","unstructured":"Squicciarini, A., Rajtmajer, S., Liu, Y., & Griffin, C. (2015). \u201cIdentification and characterization of cyberbullying dynamics in an online social network,\u201d in Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, pp.\u00a0280\u2013285, ACM."},{"issue":"3","key":"9488_CR29","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.chb.2009.11.014","volume":"26","author":"RS Tokunaga","year":"2010","unstructured":"Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277\u2013287.","journal-title":"Computers in Human Behavior"},{"key":"9488_CR30","unstructured":"Wulczyn, E., Thain, N., & Dixon, L. (2017). \u201cEx machina: Personal attacks seen at scale,\u201d in Proceedings of the 26th International Conference on World Wide Web, pp.\u00a01391\u20131399, International World Wide Web Conferences Steering Committee."},{"key":"9488_CR31","unstructured":"Xu, J.-M., Jun, K.-S., Zhu, X., & Bellmore, A. (2012). \u201cLearning from bullying traces in social media,\u201d in Proceedings of the 2012 conference of the North American chapter of the association for computational linguistics: Human language technologies, pp.\u00a0656\u2013666, Association for Computational Linguistics."},{"key":"9488_CR32","first-page":"1","volume":"2","author":"D Yin","year":"2009","unstructured":"Yin, D., Xue, Z., Hong, L., Davison, B. D., Kontostathis, A., & Edwards, L. (2009). Detection of harassment on web 2.0. Proceedings of the Content Analysis in the WEB, 2, 1\u20137.","journal-title":"Proceedings of the Content Analysis in the WEB"},{"key":"9488_CR33","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/TAFFC.2016.2531682","volume":"8","author":"R Zhao","year":"2016","unstructured":"Zhao, R., & Mao, K. (2016). Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder. IEEE Transactions on Affective Computing, 8, 328\u2013339.","journal-title":"IEEE Transactions on Affective Computing"},{"key":"9488_CR34","unstructured":"Zhong, H., Li, H., Squicciarini, A.C., Rajtmajer, S.M., Griffin, C., Miller, D.J., & Caragea, C. (2016).\u201cContent-driven detection of cyberbullying on the instagram social network.,\u201d in IJCAI, pp.\u00a03952\u20133958."}],"container-title":["Language Resources and Evaluation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10579-020-09488-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10579-020-09488-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10579-020-09488-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T23:16:24Z","timestamp":1617664584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10579-020-09488-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,6]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["9488"],"URL":"https:\/\/doi.org\/10.1007\/s10579-020-09488-3","relation":{},"ISSN":["1574-020X","1574-0218"],"issn-type":[{"value":"1574-020X","type":"print"},{"value":"1574-0218","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,6]]},"assertion":[{"value":"6 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}