{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T06:06:29Z","timestamp":1768284389368,"version":"3.49.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T00:00:00Z","timestamp":1497484800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s13278-017-0445-2","type":"journal-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T21:07:35Z","timestamp":1497560855000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Defining and predicting troll vulnerability in online social media"],"prefix":"10.1007","volume":"7","author":[{"given":"Paraskevas","family":"Tsantarliotis","sequence":"first","affiliation":[]},{"given":"Evaggelia","family":"Pitoura","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3490-1507","authenticated-orcid":false,"given":"Panayiotis","family":"Tsaparas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,15]]},"reference":[{"key":"445_CR1","doi-asserted-by":"crossref","unstructured":"Adler BT, De Alfaro L, Mola-Velasco SM, Rosso P, West AG (2011) Wikipedia vandalism detection: combining natural language, metadata, and reputation features. In: Computational linguistics and intelligent text processing. Springer, Berlin, pp 277\u2013288","DOI":"10.1007\/978-3-642-19437-5_23"},{"key":"445_CR2","unstructured":"Atwood J (2011) Suspension, ban or hellban? \n                        http:\/\/goo.gl\/TxCGi7"},{"key":"445_CR3","unstructured":"Batista GE, Bazzan AL, Monard MC (2003) Balancing training data for automated annotation of keywords: a case study. In: WOB, pp 10\u201318"},{"key":"445_CR4","doi-asserted-by":"crossref","unstructured":"Blackburn J, Kwak H (2014) Stfu noob!: predicting crowdsourced decisions on toxic behavior in online games. In: Proceedings of the 23rd international conference on World wide web. ACM, pp 877\u2013888","DOI":"10.1145\/2566486.2567987"},{"key":"445_CR5","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.paid.2014.01.016","volume":"67","author":"EE Buckels","year":"2014","unstructured":"Buckels EE, Trapnell PD, Paulhus DL (2014) Trolls just want to have fun. Pers Individ Differ 67:97\u2013102","journal-title":"Pers Individ Differ"},{"key":"445_CR6","unstructured":"Cambria E, Chandra P, Sharma A, Hussain A (2010) Do not feel the trolls. In: Proceedings of the 3rd International Workshop on Social Data on the Web. ISWC"},{"key":"445_CR7","unstructured":"Cheng J, Danescu-Niculescu-Mizil C, Leskovec J (2015) Antisocial behavior in online discussion communities. In: Proceedings of ICWSM"},{"key":"445_CR8","doi-asserted-by":"crossref","unstructured":"Chin SC, Street WN, Srinivasan P, Eichmann D (2010) Detecting wikipedia vandalism with active learning and statistical language models. In: Proceedings of the 4th Workshop on Information Credibility, WICOW \u201910, pp 3\u201310","DOI":"10.1145\/1772938.1772942"},{"key":"445_CR9","doi-asserted-by":"crossref","unstructured":"de-la-Pe\u00f1a-Sordo J, Pastor-L\u00f3pez I, Ugarte-Pedrero X, Santos I, Bringas PG (2014) Anomalous user comment detection in social news websites. In: International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914\u2014Bilbao, Spain, June 25th\u201327th, 2014, Proceedings, pp 517\u2013526","DOI":"10.1007\/978-3-319-07995-0_51"},{"key":"445_CR10","first-page":"29","volume":"1996","author":"JS Donath","year":"1999","unstructured":"Donath JS (1999) Identity and deception in the virtual community. Commun Cyberspace 1996:29\u201359","journal-title":"Commun Cyberspace"},{"key":"445_CR11","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1515\/jplr.2010.011","volume":"6","author":"C Hardaker","year":"2010","unstructured":"Hardaker C (2010) Trolling in asynchronous computer-mediated communication: from user discussions to academic definitions. J Politeness Res 6:215\u2013242","journal-title":"J Politeness Res"},{"key":"445_CR12","doi-asserted-by":"crossref","unstructured":"Haveliwala TH (2002) Topic-sensitive pagerank. In: Proceedings of the eleventh international World Wide Web Conference, WWW 2002, May 7\u201311, 2002, Honolulu, Hawaii, pp 517\u2013526","DOI":"10.1145\/511446.511513"},{"key":"445_CR13","doi-asserted-by":"crossref","unstructured":"Jeh G, Widom J (2002) Simrank: a measure of structural-context similarity. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining, July 23\u201326, 2002. Edmonton, Alberta, Canada, pp 538\u2013543","DOI":"10.1145\/775047.775126"},{"key":"445_CR14","unstructured":"Jeong S (2014) Does twitter have a secret weapon for silencing trolls? \n                        http:\/\/goo.gl\/HcuL20"},{"key":"445_CR15","doi-asserted-by":"crossref","unstructured":"Kumar S, Spezzano F, Subrahmanian V (2014) Accurately detecting trolls in slashdot zoo via decluttering. In: 2014 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM). IEEE, pp 188\u2013195","DOI":"10.1109\/ASONAM.2014.6921581"},{"key":"445_CR16","doi-asserted-by":"crossref","unstructured":"Kumar S, Spezzano F, Subrahmanian VS (2015) VEWS: a wikipedia vandal early warning system. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining, pp 607\u2013616","DOI":"10.1145\/2783258.2783367"},{"key":"445_CR17","doi-asserted-by":"crossref","unstructured":"Kunegis J, Lommatzsch A, Bauckhage C (2009) The slashdot zoo: mining a social network with negative edges. In: Proceedings of the 18th international conference on World Wide Web, WWW \u201909, pp 741\u2013750","DOI":"10.1145\/1526709.1526809"},{"key":"445_CR18","doi-asserted-by":"crossref","unstructured":"Lamba H, Malik MM, Pfeffer J (2015) A tempest in a teacup? Analyzing firestorms on twitter. In: Proceedings of the 2015 IEEE\/ACM international conference on advances in social networks analysis and mining, ASONAM, pp 17\u201324","DOI":"10.1145\/2808797.2808828"},{"key":"445_CR19","unstructured":"Lawrence P, Sergey B, Motwani R, Winograd T (1998) The pagerank citation ranking: bringing order to the web. Technical report, Stanford University"},{"key":"445_CR20","unstructured":"Olariu A (2013) Repo for the insults detection challenge on kaggle.com. \n                        https:\/\/github.com\/andreiolariu\/kaggle-insults\/"},{"issue":"12","key":"445_CR21","doi-asserted-by":"crossref","first-page":"2884","DOI":"10.1016\/j.comnet.2012.05.002","volume":"56","author":"FJ Ortega","year":"2012","unstructured":"Ortega FJ, Troyano JA, Cruz FL, Vallejo CG, Enr\u00edquez F (2012) Propagation of trust and distrust for the detection of trolls in a social network. Comput Netw 56(12):2884\u20132895","journal-title":"Comput Netw"},{"key":"445_CR22","doi-asserted-by":"crossref","unstructured":"Potthast M, Stein B, Gerling R (2008) Automatic vandalism detection in wikipedia. In: Advances in information retrieval, 30th European Conference on IR Research, ECIR 2008, Glasgow, UK, March 30\u2013April 3, 2008, pp 663\u2013668","DOI":"10.1007\/978-3-540-78646-7_75"},{"issue":"2","key":"445_CR23","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1002\/asi.21690","volume":"63","author":"SO Sood","year":"2012","unstructured":"Sood SO, Churchill EF, Antin J (2012) Automatic identification of personal insults on social news sites. J Am Soc Inf Sci Technol 63(2):270\u2013285","journal-title":"J Am Soc Inf Sci Technol"},{"issue":"3","key":"445_CR24","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1089\/1094931041291295","volume":"7","author":"J Suler","year":"2004","unstructured":"Suler J (2004) The online disinhibition effect. Cyberpsychol Behavi 7(3):321\u2013326","journal-title":"Cyberpsychol Behavi"},{"key":"445_CR25","doi-asserted-by":"crossref","unstructured":"Tsantarliotis P, Pitoura E, Tsaparas P (2016) Troll vulnerability in online social networks. In: 2016 IEEE\/ACM international conference on advances in social networks analysis and mining, ASONAM 2016, San Francisco, CA, USA, August 18\u201321, 2016, pp 1394\u20131396","DOI":"10.1109\/ASONAM.2016.7752428"},{"key":"445_CR26","doi-asserted-by":"crossref","unstructured":"Wu Z, Aggarwal CC, Sun J (2016) The troll-trust model for ranking in signed networks. In: Proceedings of the ninth ACM international conference on Web search and data mining. ACM, pp 447\u2013456","DOI":"10.1145\/2835776.2835816"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-017-0445-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-017-0445-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-017-0445-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T11:47:21Z","timestamp":1512388041000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-017-0445-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,15]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["445"],"URL":"https:\/\/doi.org\/10.1007\/s13278-017-0445-2","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,15]]},"article-number":"26"}}