{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T07:57:44Z","timestamp":1769759864129,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T00:00:00Z","timestamp":1475107200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T00:00:00Z","timestamp":1475107200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS1528138"],"award-info":[{"award-number":["CNS1528138"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s13278-016-0398-x","type":"journal-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T09:24:09Z","timestamp":1475141049000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Analysis and detection of labeled cyberbullying instances in Vine, a video-based social network"],"prefix":"10.1007","volume":"6","author":[{"given":"Rahat Ibn","family":"Rafiq","sequence":"first","affiliation":[]},{"given":"Homa","family":"Hosseinmardi","sequence":"additional","affiliation":[]},{"given":"Sabrina Arredondo","family":"Mattson","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Han","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Shivakant","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,29]]},"reference":[{"key":"398_CR1","unstructured":"Alski J (2010) Electronic aggression among adolescents: an old house with. In: Youth culture and net culture: online social practices, IGI Global, p 278"},{"key":"398_CR2","unstructured":"Basic Emotions \n                    http:\/\/changingminds.org\/\n                    \n                  . Accessed 24 Apr 2015"},{"key":"398_CR3","unstructured":"Broderick R (2013) 9 Teenage suicides. In: The last year were linked to cyber-bullying on social network Ask.fm. \n                    http:\/\/www.buzzfeed.com\/ryanhatesthis\/a-ninth-teenager-since-last-september\n                    \n                  . Accessed 14 Jan 2014"},{"key":"398_CR4","unstructured":"Cyberbullying Research Center (2013) \n                    http:\/\/cyberbullying.us\n                    \n                  . Accessed Sept 2013"},{"key":"398_CR5","unstructured":"Dadvar M, de Jong FMG, Ordelman RJF, Trieschnigg RB (2012) Improved cyberbullying detection using gender information. In: Proceedings of the 12th Dutch\u2013Belgian information retrieval workshop (DIR 2012), Ghent, pp 23\u201325"},{"key":"398_CR6","doi-asserted-by":"crossref","unstructured":"De Silva LC, Miyasato T, Nakatsu R (1997) Facial emotion recognition using multi-modal information. In: Proceedings of 1997 international conference on information, communications and signal processing, vol 1. IEEE, pp 397\u2013401 ISBN:0-7803-3676-3","DOI":"10.1109\/ICICS.1997.647126"},{"key":"398_CR7","doi-asserted-by":"publisher","unstructured":"Deirdre M (2016) Kelly, cyberbullying and internet safety. In: Handbook of research on the societal impact of digital media. IGI Global, pp 529\u2013559. doi:\n                    10.4018\/978-1-4666-8310-5.ch021","DOI":"10.4018\/978-1-4666-8310-5.ch021"},{"key":"398_CR8","unstructured":"Dinakar K, Reichart R, Lieberman H (2011) Modeling the detection of textual cyberbullying. In: The social mobile web"},{"issue":"3","key":"398_CR9","doi-asserted-by":"publisher","first-page":"18.1","DOI":"10.1145\/2362394.2362400","volume":"2","author":"K Dinakar","year":"2012","unstructured":"Dinakar K, Jones B, Havasi C, Lieberman H, Picard R (2012) Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Trans Interact Intell Syst 2(3):18.1\u201318.30 (ACM)","journal-title":"ACM Trans Interact Intell Syst"},{"issue":"4","key":"398_CR10","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1027\/0044-3409.217.4.182","volume":"217","author":"J Dooley","year":"2009","unstructured":"Dooley J, Alski J, Cross D (2009) Cyberbullying versus face-to-face bullying. Z Psychol 217(4):182\u2013188 (Hogrefe & Huber)","journal-title":"Z Psychol"},{"key":"398_CR11","unstructured":"Gordon S (2014) 4 Apps used for sexting and cyberbullying parents should know about. \n                    http:\/\/bullying.about.com\/od\/Cyberbullying\/fl\/4-Apps-Used-for-Sexting-and-Cyberbullying-Parents-Should-Know-About.htm\n                    \n                  . Accessed 11 June 2014"},{"key":"398_CR12","unstructured":"Hanna Smith suicide fuels calls for action on Ask.fm cyberbullying. \n                    http:\/\/www.cnn.com\/2013\/08\/07\/world\/europe\/uk-social-media-bullying\/\n                    \n                  . Accessed 14 Jan 2014"},{"key":"398_CR13","doi-asserted-by":"crossref","unstructured":"Hinduja S, Patchin JW (2010) Cyberbullying research summary. Cyberbullying and suicide, Cyberbullying Research Center","DOI":"10.1080\/13811118.2010.494133"},{"key":"398_CR14","doi-asserted-by":"crossref","unstructured":"Hosseinmardi H, Ghasemianlangroodi A, Han R, Lv Q, Mishra S (2014a) Towards understanding cyberbullying behavior in a semi-anonymous social network. In: Advances in social networks analysis and mining (ASONAM 2014), pp 244\u2013252","DOI":"10.1109\/ASONAM.2014.6921591"},{"key":"398_CR15","unstructured":"Hosseinmardi H, Rafiq RI, Li S, Yang Z, Han R, Mishra S, Lv Q (2014b) Comparison of common users across instagram and ask.fm to better understand cyberbullying. In: The 7th IEEE international conference on social computing and networking (SocialCom)"},{"key":"398_CR16","unstructured":"Hosseinmardi H, Mattson SA, Rafiq RI, Han R, Lv Q, Mishra S (2015) Detection of cyberbullying incidents on the instagram social network. \n                    arXiv:1503.03909"},{"key":"398_CR17","unstructured":"http:\/\/expandedramblings.com\/index.php\/vine-statistics\/\n                    \n                  . Accessed 12 Mar 2016"},{"key":"398_CR18","doi-asserted-by":"crossref","unstructured":"Huang Q, Singh VK, Atrey PK (2014) Cyber bullying detection using social and textual analysis. In: Proceedings of the 3rd international workshop on socially-aware multimedia. ACM, pp 3\u20136","DOI":"10.1145\/2661126.2661133"},{"issue":"4","key":"398_CR19","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1348\/000709906X171046","volume":"77","author":"SC Hunter","year":"2007","unstructured":"Hunter SC, Boyle J, Warden D (2007) Perceptions and correlates of peer-victimization and bullying. Br J Educ Psychol 77(4):797\u2013810 (Wiley Online Library)","journal-title":"Br J Educ Psychol"},{"key":"398_CR20","doi-asserted-by":"crossref","unstructured":"Kontostathis A, Reynolds K, Garron A, Lynne E (2013) Detecting cyberbullying: query terms and techniques. In: Proceedings of the 5th annual ACM web science conference. ACM, pp 195\u2013204","DOI":"10.1145\/2464464.2464499"},{"key":"398_CR21","volume-title":"Cyberbullying: bullying in the digital age","author":"RM Kowalski","year":"2012","unstructured":"Kowalski RM, Limber SP, Agatston PW (2012) Cyberbullying: bullying in the digital age. Wiley, Hoboken"},{"key":"398_CR22","first-page":"1173","volume":"140","author":"RM Kowalski","year":"2014","unstructured":"Kowalski RM, Giumetti GW, Schroeder AM, Lattanner MR (2014) Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Am Psychol Assoc 140:1173","journal-title":"Am Psychol Assoc"},{"key":"398_CR23","volume-title":"Cyber bullying: a curriculum for grades 6\u201312","author":"SP Limber","year":"2008","unstructured":"Limber SP, Kowalski RM, Agatston PA (2008) Cyber bullying: a curriculum for grades 6\u201312. Hazelden, The Voice Center City"},{"issue":"4","key":"398_CR24","first-page":"320","volume":"217","author":"E Menesini","year":"2009","unstructured":"Menesini E, Nocentini A (2009) Cyberbullying definition and measurement. Some critical considerations. J Psychol 217(4):320\u2013323","journal-title":"J Psychol"},{"issue":"4","key":"398_CR25","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1348\/026151005X82352","volume":"24","author":"CP Monks","year":"2006","unstructured":"Monks CP, Smith PK (2006) Definitions of bullying: age differences in understanding of the term, and the role of experience. Br J Dev Psychol 24(4):801\u2013821 (Wiley Online Library)","journal-title":"Br J Dev Psychol"},{"key":"398_CR26","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/978-3-642-29253-8_75","volume-title":"Web technologies and applications","author":"V Nahar","year":"2012","unstructured":"Nahar V, Unankard S, Li X, Pang C (2012) Sentiment analysis for effective detection of cyber bullying. In: Sheng QZ, Wang G, Jensen CS, Xu G (eds) Web technologies and applications. Springer, Berlin, Heidelberg, pp 767\u2013774"},{"key":"398_CR27","first-page":"238","volume":"3","author":"V Nahar","year":"2013","unstructured":"Nahar V, Li X, Pang C (2013) An effective approach for cyberbullying detection. Commun Inf Sci Manage Eng 3:238","journal-title":"Commun Inf Sci Manage Eng"},{"key":"398_CR28","doi-asserted-by":"crossref","unstructured":"Nahar V, Unankard S, Li X, Pang C (2014) Semi-supervised learning for cyberbullying detection in social networks. In: Proceedings of databases theory and applications: 25th Australasian database conference, ADC 2014, Brisbane, QLD, Australia, 14\u201316 July 2014. Springer, pp 160\u2013171. ISBN 978-3-319-08608-8","DOI":"10.1007\/978-3-319-08608-8_14"},{"key":"398_CR29","doi-asserted-by":"crossref","unstructured":"Nalini K, Sheela LJ (2015) Classification of tweets using text classifier to detect cyber bullying. In: Emerging ICT for bridging the future-proceedings of the 49th annual convention of the computer society of India CSI, vol 2. Springer, pp 637\u2013646","DOI":"10.1007\/978-3-319-13731-5_69"},{"key":"398_CR30","unstructured":"National Crime Prevention Council (2007) Teens and cyberbullying. Executive summary of a report on research conducted for National Crime Prevention Council"},{"key":"398_CR31","unstructured":"Negative Words List form Luis von Ahn\u2019s Research Group. \n                    http:\/\/www.cs.cmu.edu\/~biglou\/resources\/\n                    \n                  . Accessed 14 Jan 2014"},{"key":"398_CR32","volume-title":"Bullying at school: what we know and what we can do","author":"D Olweus","year":"1993","unstructured":"Olweus D (1993) Bullying at school: what we know and what we can do. Blackwell, Oxford"},{"key":"398_CR33","doi-asserted-by":"crossref","DOI":"10.4324\/9780203818312","volume-title":"An update and synthesis of the research, cyberbullying prevention and response: expert perspectives","author":"JW Patchin","year":"2012","unstructured":"Patchin JW, Hinduja S (2012) An update and synthesis of the research, cyberbullying prevention and response: expert perspectives. Routledge, New York"},{"key":"398_CR34","doi-asserted-by":"crossref","unstructured":"Potha N, Maragoudakis M (2014) Cyberbullying detection using time series modeling. In: IEEE international conference on data mining workshop (ICDMW). IEEE, pp 373\u2013382","DOI":"10.1109\/ICDMW.2014.170"},{"issue":"3","key":"398_CR35","first-page":"135","volume":"1","author":"M Ptaszynski","year":"2010","unstructured":"Ptaszynski M, Dybala P, Matsuba T, Masui F, Rzepka R, Araki K, Momouchi Y (2010) In the service of online order tackling cyberbullying with machine learning and affect analysis. Int J Comput Linguist Res 1(3):135\u2013154","journal-title":"Int J Comput Linguist Res"},{"key":"398_CR36","doi-asserted-by":"crossref","unstructured":"Rafiq RI, Hosseinmardi H, Mattson S, Han R, Lv Q, Mishra S (2015) Careful what you share in six seconds: detecting cyberbullying instances in vine. In: IEEE\/ACM international conference on advances in social networks analysis and minin. ACM, pp 617\u2013622","DOI":"10.1145\/2808797.2809381"},{"key":"398_CR37","doi-asserted-by":"crossref","unstructured":"Reynolds K, Kontostathis A, Edwards L (2011) Using machine learning to detect cyberbullying. In: 4th international conference on machine learning and applications, vol 2. IEEE Computer Society, pp 241\u2013244. ISBN:978-0-7695-4607-0","DOI":"10.1109\/ICMLA.2011.152"},{"key":"398_CR38","unstructured":"Sanchez H, Kumar S (2012) Twitter bullying detection. In: NSDI 2012. USENIX Association, p 15"},{"key":"398_CR39","unstructured":"Smith PK, del Barrio C,Tokunaga R (2012) Principles of cyberbullying research. Definitions, measures and methodology, chapter: definitions of bullying and cyberbullying: how useful are the terms? In: Principles of cyberbullying research. Definitions, measures and methodology. Routledge, New York, pp 26\u201340"},{"key":"398_CR40","doi-asserted-by":"crossref","unstructured":"Sun Y, Sebe N, Lew MS, Gevers T (2004) Authentic emotion detection in real-time video. In: Computer vision in human-computer interaction. IEEE","DOI":"10.1007\/978-3-540-24837-8_10"},{"key":"398_CR41","unstructured":"Teens Indicted After Allegedly Taunting Girl Who Hanged Herself. \n                    http:\/\/abcnews.go.com\/Technology\/TheLaw\/teens-charged-bullying-mass-girl-kill\/story?id=10231357,2010\n                    \n                  . Accessed 14 Jan 2014"},{"key":"398_CR42","unstructured":"Xu J, Jun K, Zhu X, Bellmore A (2012) Learning from bullying traces in social media, In: Proceedings of the 2012 conference of the North American chapter of the association for computational linguistics: human language technologies. Association for Computational Linguistics, pp 656\u2013666"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-016-0398-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-016-0398-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-016-0398-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T08:26:39Z","timestamp":1589444799000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-016-0398-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,29]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["398"],"URL":"https:\/\/doi.org\/10.1007\/s13278-016-0398-x","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,29]]},"assertion":[{"value":"19 December 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2016","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2016","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2016","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"88"}}