{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:02:52Z","timestamp":1764687772077,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s13278-018-0517-y","type":"journal-article","created":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T10:23:53Z","timestamp":1527848633000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Weakly supervised cyberbullying detection with participant-vocabulary consistency"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7153-5905","authenticated-orcid":false,"given":"Elaheh","family":"Raisi","sequence":"first","affiliation":[]},{"given":"Bert","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,1]]},"reference":[{"key":"517_CR1","doi-asserted-by":"crossref","unstructured":"Ashktorab Z, Vitak J (2016) Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. in Proceedings of the CHI conference on human factors in computing systems, pp 3895\u20133905","DOI":"10.1145\/2858036.2858548"},{"key":"517_CR2","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.chb.2014.11.052","volume":"44","author":"A Bellmore","year":"2015","unstructured":"Bellmore A, Calvin AJ, Xu J-M, Zhu X (2015) The five W\u2019s of bullying on Twitter: who, what, why, where, and when. Comput Hum Behav 44:305\u2013314","journal-title":"Comput Hum Behav"},{"key":"517_CR3","doi-asserted-by":"crossref","unstructured":"Bifet A, Frank E (2010) Sentiment knowledge discovery in Twitter streaming data. In: International conference on discovery science, pp 1\u201315","DOI":"10.1007\/978-3-642-16184-1_1"},{"key":"517_CR4","volume-title":"It\u2019s complicated","author":"D Boyd","year":"2014","unstructured":"Boyd D (2014) It\u2019s complicated. Yale University Press, New Haven"},{"key":"517_CR6","doi-asserted-by":"crossref","unstructured":"Chatzakou D, Kourtellis N, Blackburn J, Cristofaro ED, Stringhini G, Vakali A (2017a) Mean birds: detecting aggression and bullying on twitter. In: Proceedings of the 2017 ACM on web science conference, June 2017","DOI":"10.1145\/3091478.3091487"},{"key":"517_CR7","doi-asserted-by":"crossref","unstructured":"Chatzakou D, Kourtellis N, Blackburn J, Cristofaro ED, Stringhini G, Vakali A (2017b) Measuring #gamergate: a tale of hate, sexism, and bullying. In: Proceedings of the 26th international conference on world wide web companion, pp 1285\u20131290","DOI":"10.1145\/3041021.3053890"},{"key":"517_CR5","doi-asserted-by":"crossref","unstructured":"Chatzakou D, Kourtellis N, Blackburn J, Cristofaro ED, Stringhini G, Vakili A (2017c) Hate is not binary: studying abusive behavior of #gamergate on twitter. In: Proceedings of the 28th ACM conference on hypertext and social media, July 2017","DOI":"10.1145\/3078714.3078721"},{"key":"517_CR8","doi-asserted-by":"publisher","unstructured":"Chatzakou D, Kourtellis N, Blackburn J, De\u00a0Cristofaro E, Stringhini G, Vakali A (2017) Detecting aggressors and bullies on Twitter. In: Proceedings of the 26th international conference on World Wide Web companion, ser. WWW \u201917 Companion, pp 767\u2013768. [Online]. https:\/\/doi.org\/10.1145\/3041021.3054211","DOI":"10.1145\/3041021.3054211"},{"key":"517_CR9","doi-asserted-by":"publisher","unstructured":"Chelmis C, Zois D, Yao M (2018) Mining patterns of cyberbullying on Twitter. In: 2017 ieee international conference on data mining workshops (ICDMW), vol 00, pp 126\u2013133. https:\/\/doi.org\/10.1109\/ICDMW.2017.22","DOI":"10.1109\/ICDMW.2017.22"},{"key":"517_CR10","unstructured":"Cheng J, Danescu-Niculescu-Mizil C, Leskovec J (2015) Antisocial behavior in online discussion communities. In: Proceedings of ICWSM, June 2017, pp 61\u201370"},{"key":"517_CR11","doi-asserted-by":"crossref","unstructured":"Chen Y, Zhou Y, Zhu S, Xu H (2012) Detecting offensive language in social media to protect adolescent online safety. In: International conference on social computing, pp 71\u201380","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"issue":"2","key":"517_CR12","doi-asserted-by":"publisher","first-page":"245","DOI":"10.3390\/soc5020245","volume":"5","author":"L Corcoran","year":"2015","unstructured":"Corcoran L, Guckin CM, Prentice G (2015) Cyberbullying or cyber aggression? A review of existing definitions of cyber-based peer-to-peer aggression. Societies 5(2):245\u2013255","journal-title":"Societies"},{"key":"517_CR13","unstructured":"Dadvar M, de\u00a0Jong F, Ordelman R, Trieschnigg D (2012) Improved cyberbullying detection using gender information. In: Dutch\u2013Belgian information retrieval workshop, February 2012, pp 23\u201325"},{"key":"517_CR14","doi-asserted-by":"crossref","unstructured":"Davidson T, Warmsley D, Macy MW, Weber I (2017) Automated hate speech detection and the problem of offensive language. CoRR arXiv:abs\/1703.04009","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"517_CR15","unstructured":"Dinakar K, Reichart R, Lieberman H (2011) Modeling the detection of textual cyberbullying. In: ICWSM workshop on social mobile web"},{"key":"517_CR16","unstructured":"ditchthelabel.org (2013) The annual cyberbullying survey. http:\/\/www.ditchthelabel.org\/ . Accessed 25 Sept 2013"},{"key":"517_CR17","doi-asserted-by":"crossref","unstructured":"Djuric N, Zhou J, Morris R, Grbovic M, Radosavljevic V, Bhamidipati N (2015) Hate speech detection with comment embeddings. In: International conference on World Wide Web, pp 29\u201330","DOI":"10.1145\/2740908.2742760"},{"key":"517_CR18","first-page":"29","volume":"1996","author":"JS Donath","year":"1999","unstructured":"Donath JS (1999) Identity and deception in the virtual community. Commun Cybersp 1996:29\u201359","journal-title":"Commun Cybersp"},{"key":"517_CR19","first-page":"35","volume":"3","author":"N Dordolo","year":"2014","unstructured":"Dordolo N (2014) The role of power imbalance in cyberbullying. Inkblot Undergrad J Psychol 3:35\u201341","journal-title":"Inkblot Undergrad J Psychol"},{"key":"517_CR20","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1086\/449217","volume":"17","author":"DP Farrington","year":"1993","unstructured":"Farrington DP (1993) Understanding and preventing bullying. Crime Justice 17:381\u2013458","journal-title":"Crime Justice"},{"key":"517_CR21","first-page":"187","volume":"14","author":"SC Herring","year":"2002","unstructured":"Herring SC (2002) Cyber violence: recognizing and resisting abuse in online environments. Asian Women 14:187\u2013212","journal-title":"Asian Women"},{"key":"517_CR22","doi-asserted-by":"crossref","unstructured":"Hosseinmardi H, Ghasemianlangroodi A, Han R, Lv Q, Mishra S (2014) Towards understanding cyberbullying behavior in a semi-anonymous social network. In: IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), August 2014, pp 244\u2013252","DOI":"10.1109\/ASONAM.2014.6921591"},{"key":"517_CR23","unstructured":"Hosseinmardi H, Li S, Yang Z, Lv Q, Rafiq RI, Han R, Mishra S (2014) A comparison of common users across Instagram and Ask.fm to better understand cyberbullying. In: IEEE International confercne on big data and cloud computing"},{"key":"517_CR24","doi-asserted-by":"crossref","unstructured":"Hosseinmardi H, Mattson SA, Rafiq RI, Han R, Lv Q, Mishra S (2015) Analyzing labeled cyberbullying incidents on the Instagram social network. In: Intarnational confercne on social informatics, pp 49\u201366","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"517_CR25","doi-asserted-by":"crossref","unstructured":"Hosseinmardi H, Mattson SA, Rafiq RI, Han R, Lv Q, Mishra S (2015) Detection of cyberbullying incidents on the Instagram social network. In: Association for the advancement of artificial intelligence","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"517_CR26","doi-asserted-by":"crossref","unstructured":"Huang Q, Singh VK (2014) Cyber bullying detection using social and textual analysis. In: Proceedings of the international workshop on socially-aware multimedia, pp 3\u20136","DOI":"10.1145\/2661126.2661133"},{"key":"517_CR27","volume-title":"Cyberbullying: bullying in the digital age","author":"RM Kowalski","year":"2012","unstructured":"Kowalski RM, Limber SP, Agatston PW (2012) Cyberbullying: bullying in the digital age. Wiley, New York"},{"key":"517_CR28","doi-asserted-by":"crossref","unstructured":"Lavrenko V, Croft WB (2001) Relevance based language models. In: Proceedings of the international ACM SIGIR conference on research and development in information retrieval, pp 120\u2013127","DOI":"10.1145\/383952.383972"},{"key":"517_CR29","doi-asserted-by":"crossref","unstructured":"Mahendiran A, Wang W, Arredondo J, Huang B, Getoor L, Mares D, Ramakrishnan N (2014) Discovering evolving political vocabulary in social media. In: International conference on behavioral, economic, and socio-cultural computing","DOI":"10.1109\/BESC.2014.7059504"},{"key":"517_CR30","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to information retrieval","author":"CD Manning","year":"2008","unstructured":"Manning CD, Raghavan P, Sch\u00fctze H (2008) Introduction to information retrieval. Cambridge University Press, Cambridge"},{"key":"517_CR31","unstructured":"Margono H, Yi X, Raikundalia GK (2014) Mining Indonesian cyber bullying patterns in social networks. Proceedings of the Australasian computer science conference, January 2014, vol 147"},{"issue":"5","key":"517_CR32","first-page":"362","volume":"15","author":"K Massoudi","year":"2011","unstructured":"Massoudi K, Tsagkias M, de Rijke M, Weerkamp W (2011) Incorporating query expansion and quality indicators in searching microblog posts. Proc Eur Conf Adv Inf Retr 15(5):362\u2013367","journal-title":"Proc Eur Conf Adv Inf Retr"},{"issue":"3","key":"517_CR33","doi-asserted-by":"publisher","first-page":"103","DOI":"10.2753\/JEC1086-4415150305","volume":"15","author":"I McGhee","year":"2011","unstructured":"McGhee I, Bayzick J, Kontostathis A, Edwards L, McBride A, Jakubowski E (2011) Learning to identify internet sexual predation. Int J Electron Commerce 15(3):103\u2013122","journal-title":"Int J Electron Commerce"},{"issue":"5","key":"517_CR34","first-page":"238","volume":"3","author":"V Nahar","year":"2013","unstructured":"Nahar V, Li X, Pang C (2013) An effective approach for cyberbullying detection. Commun Inf Sci Manag Eng 3(5):238\u2013247","journal-title":"Commun Inf Sci Manag Eng"},{"key":"517_CR35","doi-asserted-by":"crossref","unstructured":"Nobata C, Tetreault J, Thomas A, Mehdad Y, Chang Y (2016) Abusive language detection in online user content. InL Proceedings of the international confercne on World Wide Web, pp 145\u2013153","DOI":"10.1145\/2872427.2883062"},{"key":"517_CR36","unstructured":"noswearing.com (2016) List of swear words and curse words. http:\/\/www.noswearing.com\/dictionary . Accessed Jan 2016"},{"key":"517_CR37","doi-asserted-by":"publisher","DOI":"10.4324\/9780203818312","volume-title":"Cyberbullying prevention and response: expert perspectives","author":"JW Patchin","year":"2012","unstructured":"Patchin JW, Hinduja S (2012) Cyberbullying prevention and response: expert perspectives. Routledge, New York"},{"key":"517_CR38","unstructured":"Patton DU, McKeown K, Rambow O, Macbeth J (2016) Using natural language processing and qualitative analysis to intervene in gang violence. arXiv preprint arXiv:1609.08779"},{"key":"517_CR39","volume-title":"Linguistic inquiry and word count: LIWC","author":"JW Pennebaker","year":"2001","unstructured":"Pennebaker JW, Francis ME, Booth RJ (2001) Linguistic inquiry and word count: LIWC. Lawrence Erlbaum Associates, Mahway"},{"key":"517_CR40","unstructured":"Ptaszynski M, Dybala P, Matsuba T, Masui F, Rzepka R, Araki K (2010) Machine learning and affect analysis against cyber-bullying. In: Linguistic and cognitive approaches to dialog agents symposium, pp 7\u201316"},{"key":"517_CR41","unstructured":"Raisi E, Huang B (2016) Cyberbullying identification using participant-vocabulary consistency. In: Proceedings of 2016 ICML workshop on #Data4Good: machine learning in social good applications"},{"key":"517_CR42","doi-asserted-by":"crossref","unstructured":"Raisi E, Huang B (2017) Cyberbullying detection with weakly supervised machine learning. In: Proceedings of the IEEE\/acm international conference on social networks analysis and mining","DOI":"10.1145\/3110025.3110049"},{"key":"517_CR43","doi-asserted-by":"crossref","unstructured":"Ramakrishnan N, Butler P, Self N, Khandpur R, Saraf P, Wang W, Cadena J, Vullikanti A, Korkmaz G, Kuhlman C, Marathe A, Zhao L, Ting H, Huang B, Srinivasan A, Trinh K, Getoor L, Katz G, Doyle A, Ackermann C, Zavorin I, Ford J, Summers K, Fayed Y, Arredondo J, Gupta D, Mares D (2014) Beating the news\u2019 with EMBERS: forecasting civil unrest using open source indicators. In: ACM SIGKDD conference on knowledge discovery and data mining, pp 1799\u20131808","DOI":"10.1145\/2623330.2623373"},{"key":"517_CR44","doi-asserted-by":"crossref","unstructured":"Reynolds K, Kontostathis A, Edwards L (2011) Using machine learning to detect cyberbullying. In: International conference on machine learning and applications and workshops (ICMLA), vol 2, pp 241\u2013244","DOI":"10.1109\/ICMLA.2011.152"},{"key":"517_CR45","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1177\/0165551510365390","volume":"36","author":"P Shachaf","year":"2010","unstructured":"Shachaf P, Ha N (2010) Beyond vandalism: wikipedia trolls. J Inf Sci 36:357\u2013370","journal-title":"J Inf Sci"},{"key":"517_CR46","doi-asserted-by":"crossref","unstructured":"Silva TH, de\u00a0Melo PO, Almeida JM, Salles J, Loureiro AA (2013) A picture of Instagram is worth more than a thousand words: workload characterization and application. In: DCOSS, pp 123\u2013132","DOI":"10.1109\/DCOSS.2013.59"},{"key":"517_CR47","doi-asserted-by":"publisher","unstructured":"Singh VK, Huang Q, Atrey PK (2016) Cyberbullying detection using probabilistic socio-textual information fusion. In: 2016 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), August 2016, pp 884\u2013887. [Online]. https:\/\/doi.org\/10.1109\/ASONAM.2016.7752342","DOI":"10.1109\/ASONAM.2016.7752342"},{"issue":"4","key":"517_CR48","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","volume":"49","author":"PK Smith","year":"2008","unstructured":"Smith PK, Mahdavi J, Carvalho M, Fisher S, Russell S, Tippett N (2008) Cyberbullying: its nature and impact in secondary school pupils. J Child Psychol Psychiatry 49(4):376\u2013385","journal-title":"J Child Psychol Psychiatry"},{"key":"517_CR49","doi-asserted-by":"crossref","unstructured":"Tahmasbi N, Rastegari E (2018) A socio-contextual approach in automated detection of cyberbullying. In: Proceedings of the 51st Hawaii international conference on system sciences, pp 2151\u20132160","DOI":"10.24251\/HICSS.2018.269"},{"issue":"3","key":"517_CR50","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.chb.2009.11.014","volume":"26","author":"RS Tokunaga","year":"2010","unstructured":"Tokunaga RS (2010) Following you home from school: a critical review and synthesis of research on cyberbullying victimization. Comput Hum Behav 26(3):277\u2013287","journal-title":"Comput Hum Behav"},{"key":"517_CR51","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.jadohealth.2009.03.021","volume":"45","author":"J Wang","year":"2009","unstructured":"Wang J, Iannotti RJ, Nansel TR (2009) School bullying among US adolescents: physical, verbal, relational and cyber. J Adolesc Health 45:368\u2013375","journal-title":"J Adolesc Health"},{"key":"517_CR52","unstructured":"Warner W, Hirschberg J (2012) Detecting hate speech on the world wide web. In: Workshop on language in social media, pp 19\u201326"},{"issue":"1","key":"517_CR53","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/0013188930350101","volume":"35","author":"I Whitney","year":"1993","unstructured":"Whitney I, Smith PK (1993) A survey of the nature and extent of bullying in junior\/middle and secondary schools. Educ Res 35(1):3\u201325","journal-title":"Educ Res"},{"key":"517_CR54","unstructured":"Yin D, Xue Z, Hong L, Davison BD, Kontostathis A, Edwards L (2009) Detection of harassment on Web 2.0. In: Proceedings of the content analysis in the WEB 2.0 (CAW2.0) workshop at WWW2009, pp 1\u20137"},{"key":"517_CR55","unstructured":"Zois D-S, Kapodistria A, Yao M, Chelmis C (2018) Optimal online cyberbullying detection. In: 2018 IEEE international conference on acoustics, speech and signal processing. IEEE SigPort [Online]. http:\/\/sigport.org\/2499"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-018-0517-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-018-0517-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-018-0517-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T23:07:55Z","timestamp":1693696075000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-018-0517-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,1]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["517"],"URL":"https:\/\/doi.org\/10.1007\/s13278-018-0517-y","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"type":"print","value":"1869-5450"},{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2018,6,1]]},"assertion":[{"value":"21 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"38"}}