{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:25:31Z","timestamp":1770279931278,"version":"3.49.0"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T00:00:00Z","timestamp":1534204800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T00:00:00Z","timestamp":1534204800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1464287"],"award-info":[{"award-number":["1464287"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Soc Sc"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s42001-018-0026-9","type":"journal-article","created":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T07:23:14Z","timestamp":1534231394000},"page":"241-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["On cyberbullying incidents and underlying online social relationships"],"prefix":"10.1007","volume":"1","author":[{"given":"Qianjia","family":"Huang","sequence":"first","affiliation":[]},{"given":"Vivek K.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Pradeep K.","family":"Atrey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,14]]},"reference":[{"issue":"4","key":"26_CR1","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","volume":"49","author":"PK Smith","year":"2008","unstructured":"Smith, P. K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, 49(4), 376\u2013385.","journal-title":"Journal of Child Psychology and Psychiatry"},{"issue":"2","key":"26_CR2","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1080\/01639620701457816","volume":"29","author":"S Hinduja","year":"2008","unstructured":"Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29(2), 129\u2013156.","journal-title":"Deviant Behavior"},{"key":"26_CR3","unstructured":"Cyberbullying Research Center. (2015). Cyberbullying Data. \n                    https:\/\/cyberbullying.org\/2015-data\n                    \n                  . Accessed 21 July 2018."},{"issue":"7","key":"26_CR4","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1001\/archgenpsychiatry.2010.79","volume":"67","author":"A Sourander","year":"2010","unstructured":"Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., et al. (2010). Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study. Archives of General Psychiatry, 67(7), 720\u2013728.","journal-title":"Archives of General Psychiatry"},{"key":"26_CR5","unstructured":"BBC News. (2010). \u2019Bullying\u2019 link to child suicide rate, charity suggests. \n                    https:\/\/www.bbc.co.uk\/news\/10302550\n                    \n                  . Accessed 21 July 2018."},{"issue":"3","key":"26_CR6","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1080\/13811118.2010.494133","volume":"14","author":"S Hinduja","year":"2010","unstructured":"Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of Suicide Research, 14(3), 206\u2013221.","journal-title":"Archives of Suicide Research"},{"issue":"6","key":"26_CR7","doi-asserted-by":"publisher","first-page":"S22","DOI":"10.1016\/j.jadohealth.2007.08.017","volume":"41","author":"RM Kowalski","year":"2007","unstructured":"Kowalski, R. M., & Limber, S. P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41(6), S22\u2013S30.","journal-title":"Journal of Adolescent Health"},{"issue":"4","key":"26_CR8","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1002\/pits.20301","volume":"45","author":"KL Mason","year":"2008","unstructured":"Mason, K. L. (2008). Cyberbullying: A preliminary assessment for school personnel. Psychology in the Schools, 45(4), 323\u2013348.","journal-title":"Psychology in the Schools"},{"issue":"12","key":"26_CR9","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1111\/j.1746-1561.2010.00548.x","volume":"80","author":"JW Patchin","year":"2010","unstructured":"Patchin, J. W., & Hinduja, S. (2010). Cyberbullying and self-esteem. Journal of School Health, 80(12), 614\u2013621.","journal-title":"Journal of School Health"},{"key":"26_CR10","unstructured":"Boyd, D., Marwick, A., Aftab, P., & Koeltl, M. The conundrum of visibility: Youth safety and the internet."},{"issue":"6","key":"26_CR11","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1023\/A:1020811714064","volume":"30","author":"NR Crick","year":"2002","unstructured":"Crick, N. R., & Nelson, D. A. (2002). Relational and physical victimization within friendships: Nobody told me there\u2019d be friends like these. Journal of Abnormal Child Psychology, 30(6), 599\u2013607.","journal-title":"Journal of Abnormal Child Psychology"},{"key":"26_CR12","unstructured":"Huang, Q., Singh, V.\u00a0K., & Atrey, P.\u00a0K. (2014). Cyber bullying detection using social and textual analysis, in: Proceedings of the 3rd International Workshop on Socially-Aware Multimedia, SAM \u201914, ACM, New York, NY, USA, 2014, pp. 3\u20136. 10.1145\/2661126.2661133. \n                    http:\/\/doi.acm.org\/10.1145\/2661126.2661133"},{"key":"26_CR13","unstructured":"Squicciarini, A., Rajtmajer, S., Liu, Y., & Griffin, C. (2015). Identification and characterization of cyberbullying dynamics in an online social network, in: Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, ACM, 2015, pp. 280\u2013285."},{"issue":"1","key":"26_CR14","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s42001-017-0013-6","volume":"1","author":"L Qiu","year":"2018","unstructured":"Qiu, L., Chan, S. H. M., & Chan, D. (2018). Big data in social and psychological science: theoretical and methodological issues. Journal of Computational Social Science, 1(1), 59\u201366.","journal-title":"Journal of Computational Social Science"},{"issue":"2","key":"26_CR15","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1111\/j.1467-9450.2007.00611.x","volume":"49","author":"R Slonje","year":"2008","unstructured":"Slonje, R., & Smith, P. K. (2008). Cyberbullying: Another main type of bullying? Scandinavian Journal of Psychology, 49(2), 147\u2013154.","journal-title":"Scandinavian Journal of Psychology"},{"issue":"3","key":"26_CR16","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.chb.2009.11.014","volume":"26","author":"RS Tokunaga","year":"2010","unstructured":"Tokunaga, R. S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in Human Behavior, 26(3), 277\u2013287.","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"26_CR17","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1111\/j.1468-2958.2012.01442.x","volume":"39","author":"R Festl","year":"2013","unstructured":"Festl, R., & Quandt, T. (2013). Social relations and cyberbullying: The influence of individual and structural attributes on victimization and perpetration via the internet. Human Communication Research, 39(1), 101\u2013126.","journal-title":"Human Communication Research"},{"issue":"1","key":"26_CR18","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.jadohealth.2009.12.007","volume":"47","author":"J Wang","year":"2010","unstructured":"Wang, J., Iannotti, R. J., & Luk, J. W. (2010). Bullying victimization among underweight and overweight us youth: Differential associations for boys and girls. Journal of Adolescent Health, 47(1), 99\u2013101.","journal-title":"Journal of Adolescent Health"},{"issue":"4","key":"26_CR19","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/BF03172807","volume":"12","author":"D Olweus","year":"1997","unstructured":"Olweus, D. (1997). Bully\/victim problems in school: Facts and intervention. European Journal of Psychology of Education, 12(4), 495\u2013510.","journal-title":"European Journal of Psychology of Education"},{"issue":"12","key":"26_CR20","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.1016\/j.childyouth.2009.05.004","volume":"31","author":"F Mishna","year":"2009","unstructured":"Mishna, F., Saini, M., & Solomon, S. (2009). Ongoing and online: Children and youth\u2019s perceptions of cyber bullying. Children and Youth Services Review, 31(12), 1222\u20131228.","journal-title":"Children and Youth Services Review"},{"issue":"3\u20134","key":"26_CR21","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1080\/13632752.2012.704316","volume":"17","author":"M Campbell","year":"2012","unstructured":"Campbell, M., Spears, B., Slee, P., Butler, D., & Kift, S. (2012). Victims perceptions of traditional and cyberbullying, and the psychosocial correlates of their victimisation. Emotional and Behavioural Difficulties, 17(3\u20134), 389\u2013401.","journal-title":"Emotional and Behavioural Difficulties"},{"issue":"2","key":"26_CR22","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s12187-011-9132-4","volume":"5","author":"R Navarro","year":"2012","unstructured":"Navarro, R., Yubero, S., Larra\u00f1aga, E., & Mart\u00ednez, V. (2012). Childrens cyberbullying victimization: associations with social anxiety and social competence in a spanish sample. Child Indicators Research, 5(2), 281\u2013295.","journal-title":"Child Indicators Research"},{"key":"26_CR23","unstructured":"Minkkinen, J. (2013). Associations between school-related factors and depressive symptoms among children: a comparative study, Finland and Norway, School Psychology International. 0143034313511008."},{"issue":"2","key":"26_CR24","doi-asserted-by":"publisher","first-page":"16","DOI":"10.21913\/JSW.v1i2.172","volume":"1","author":"T Beran","year":"2008","unstructured":"Beran, T., & Li, Q. (2008). The relationship between bullying and school bullying. The Journal of Student Wellbeing, 1(2), 16\u201333.","journal-title":"The Journal of Student Wellbeing"},{"issue":"1","key":"26_CR25","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.childyouth.2011.08.032","volume":"34","author":"F Mishna","year":"2012","unstructured":"Mishna, F., Khoury-Kassabri, M., Gadalla, T., & Daciuk, J. (2012). Risk factors for involvement in cyber bullying: Victims, bullies and bully-victims. Children and Youth Services Review, 34(1), 63\u201370.","journal-title":"Children and Youth Services Review"},{"key":"26_CR26","unstructured":"Reynolds, K., Kontostathis, A., & Edwards, L. (2011). Using machine learning to detect cyberbullying, in: Machine Learning and Applications and Workshops (ICMLA), 2011 10th International Conference on, Vol.\u00a02, IEEE, 2011, pp. 241\u2013244."},{"key":"26_CR27","unstructured":"Dinakar, K., Reichart, R., & Lieberman, H. (2011). Modeling the detection of textual cyberbullying., in: The Social Mobile Web."},{"issue":"3","key":"26_CR28","first-page":"18","volume":"2","author":"K Dinakar","year":"2012","unstructured":"Dinakar, K., Jones, B., Havasi, C., Lieberman, H., & Picard, R. (2012). Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiS), 2(3), 18.","journal-title":"ACM Transactions on Interactive Intelligent Systems (TiS)"},{"key":"26_CR29","unstructured":"Dadvar, M. de\u00a0Jong, E., Ordelman, R., & Trieschnigg, R. Improved cyberbullying detection using gender information."},{"key":"26_CR30","unstructured":"Bigelow, J.\u00a0L., Edwards, L., et\u00a0al. (2016). Detecting cyberbullying using latent semantic indexing, in: Proceedings of the First International Workshop on Computational Methods for CyberSafety, ACM, pp. 11\u201314."},{"key":"26_CR31","unstructured":"Zhao, R., & Mao, K. Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder. IEEE Transactions on Affective Computing."},{"key":"26_CR32","unstructured":"Nahar, V., Li, X., & Pang, C. An effective approach for cyberbullying detection, Communications in Information Science and Management Engineering."},{"key":"26_CR33","doi-asserted-by":"crossref","unstructured":"Nahar, V., Unankard, S., Li, X., & Pang, C. (2012). Sentiment analysis for effective detection of cyber bullying. Web Technologies and Applications. Springer, pp. 767\u2013774.","DOI":"10.1007\/978-3-642-29253-8_75"},{"key":"26_CR34","unstructured":"Hosseinmardi, H., Mattson, S.\u00a0A., Rafiq, R.\u00a0I., Han, R., Lv, Q., & Mishra, S. Detection of cyberbullying incidents on the instagram social network. arXiv preprint \n                    arXiv:1503.03909\n                    \n                  ."},{"key":"26_CR35","unstructured":"Hosseinmardi, H., Mattson, S.\u00a0A., Rafiq, R.\u00a0I., Han, R., Lv, Q., & Mishra, S. (2015). Analyzing labeled cyberbullying incidents on the instagram social network, in: International Conference on Social Informatics, Springer, pp. 49\u201366."},{"key":"26_CR36","unstructured":"Hosseinmardi, H., Rafiq, R.\u00a0I.., Han, R, Lv, Q., & Mishra, S. (2016). Prediction of cyberbullying incidents in a media-based social network, in: Advances in Social Networks Analysis and Mining (ASONAM), IEEE\/ACM International Conference on, IEEE, 2016, pp. 186\u2013192."},{"key":"26_CR37","unstructured":"Wulczyn, E., Thain, N., & Dixon, L. (2017). Ex machina: Personal attacks seen at scale, in: Proceedings of the 26th International Conference on World Wide Web, International World Wide Web Conferences Steering Committee, pp. 1391\u20131399."},{"key":"26_CR38","unstructured":"Chu, T., Jue, K., & Wang, M. Comment abuse classification with deep learning."},{"issue":"16","key":"26_CR39","first-page":"10","volume":"7","author":"J-M Xu","year":"2014","unstructured":"Xu, J.-M., Huang, H.-C., Bellmore, A., & Zhu, X. (2014). School bullying in twitter and weibo: a comparative study. Reporter, 7(16), 10\u201314.","journal-title":"Reporter"},{"key":"26_CR40","doi-asserted-by":"crossref","unstructured":"Cortis, K., & Handschuh, S. (2015) Analysis of cyberbullying tweets in trending world events, in: Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business, i-KNOW \u201915, ACM, New York, NY, USA, 2015, pp. 7:1\u20137:8. 10.1145\/2809563.2809605. \n                    http:\/\/doi.acm.org\/10.1145\/2809563.2809605\n                    \n                  .","DOI":"10.1145\/2809563.2809605"},{"key":"26_CR41","unstructured":"Campfield, D.\u00a0C. (2008). Bullying and victimization: Psychosocial characteristics of bullies, victims, and bully\/victims, Graduate Student Theses, Dissertations, and Professional Papers (University of Montana). ProQuest, 2008."},{"issue":"4","key":"26_CR42","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1111\/1467-9450.00040","volume":"38","author":"C Salmivalli","year":"1997","unstructured":"Salmivalli, C., Huttunen, A., & Lagerspetz, K. M. (1997). Peer networks and bullying in schools. Scandinavian Journal of Psychology, 38(4), 305\u2013312.","journal-title":"Scandinavian Journal of Psychology"},{"issue":"2","key":"26_CR43","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1111\/1467-9507.00195","volume":"11","author":"H Xie","year":"2002","unstructured":"Xie, H., Swift, D. J., Cairns, B. D., & Cairns, R. B. (2002). Aggressive behaviors in social interaction and developmental adaptation: A narrative analysis of interpersonal conflicts during early adolescence. Social Development, 11(2), 205\u2013224.","journal-title":"Social Development"},{"issue":"5","key":"26_CR44","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","volume":"88","author":"PM Podsakoff","year":"2003","unstructured":"Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879.","journal-title":"Journal of Applied Psychology"},{"key":"26_CR45","unstructured":"Bless, H., Fiedler, K., & Strack, F. (2004) Social cognition: How individuals construct social reality. Psychology Press."},{"issue":"4","key":"26_CR46","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N Eagle","year":"2006","unstructured":"Eagle, N., & Pentland, A. (2006). Reality mining: sensing complex social systems. Personal and Ubiquitous Computing, 10(4), 255\u2013268.","journal-title":"Personal and Ubiquitous Computing"},{"key":"26_CR47","unstructured":"Singh, V.\u00a0K., & Jain, A. (2017) Toward harmonizing self-reported and logged social data for understanding human behavior, in: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, pp. 2233\u20132238."},{"issue":"7412","key":"26_CR48","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1038\/488448a","volume":"488","author":"J Giles","year":"2012","unstructured":"Giles, J. (2012). Making the links. Nature, 488(7412), 448\u2013450.","journal-title":"Nature"},{"key":"26_CR49","unstructured":"Brighi, A., Melotti, G., Guarini, A., Genta, M. L., Ortega, R., & Mora-Merch\u00e1n, J., et al. (2012). Self-esteem and Loneliness in Relation to Cyberbullying in Three European Countries. Cyberbullying in the Global Playground: Research from International Perspectives (pp. 32\u201356)."},{"key":"26_CR50","doi-asserted-by":"publisher","DOI":"10.4135\/9781412958479","volume-title":"Encyclopedia of Human Relationships","author":"HT Reis","year":"2009","unstructured":"Reis, H. T., & Sprecher, S. (2009). Encyclopedia of Human Relationships (Vol. 1). Thousand Oaks: Sage."},{"key":"26_CR51","doi-asserted-by":"crossref","first-page":"281","DOI":"10.3138\/jcfs.10.3.281","volume":"10","author":"NA Cazenave","year":"1979","unstructured":"Cazenave, N. A., & Straus, M. A. (1979). Race, class, network embeddedness and family violence: A search for potent support systems. Journal of Comparative Family Studies, 10, 281\u2013300.","journal-title":"Journal of Comparative Family Studies"},{"issue":"3","key":"26_CR52","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1111\/j.1083-6101.2008.00409.x","volume":"13","author":"ST Tong","year":"2008","unstructured":"Tong, S. T., Van Der Heide, B., Langwell, L., & Walther, J. B. (2008). Too much of a good thing? the relationship between number of friends and interpersonal impressions on facebook. Journal of Computer-Mediated Communication, 13(3), 531\u2013549.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"26_CR53","doi-asserted-by":"crossref","unstructured":"Raghavan, V., Ver\u00a0Steeg, G., Galstyan, A., & Tartakovsky, A.\u00a0G. (2013) Modeling temporal activity patterns in dynamic social networks, Computational Social Systems, IEEE Transactions on 1.","DOI":"10.1109\/TCSS.2014.2307453"},{"key":"26_CR54","unstructured":"Casey-Cannon, S., Hayward, C., & Gowen, K. (2001) Middle-school girls\u2019 reports of peer victimization: Concerns, consequences, and implications., Professional School Counseling."},{"issue":"5","key":"26_CR55","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1177\/0143034308099201","volume":"29","author":"F Mishna","year":"2008","unstructured":"Mishna, F., Wiener, J., & Pepler, D. (2008). Some of my best friends experiences of bullying within friendships. School Psychology International, 29(5), 549\u2013573.","journal-title":"School Psychology International"},{"issue":"3","key":"26_CR56","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1111\/j.1939-0025.2010.01040.x","volume":"80","author":"F Mishna","year":"2010","unstructured":"Mishna, F., Cook, C., Gadalla, T., Daciuk, J., & Solomon, S. (2010). Cyber bullying behaviors among middle and high school students. American Journal of Orthopsychiatry, 80(3), 362\u2013374.","journal-title":"American Journal of Orthopsychiatry"},{"issue":"3","key":"26_CR57","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0378-8733(03)00009-1","volume":"25","author":"LA Adamic","year":"2003","unstructured":"Adamic, L. A., & Adar, E. (2003). Friends and neighbors on the web. Social Networks, 25(3), 211\u2013230.","journal-title":"Social Networks"},{"key":"26_CR58","unstructured":"Gilbert, G., & Karahalios, K. (2009) Predicting tie strength with social media, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, pp. 211\u2013220."},{"issue":"6","key":"26_CR59","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1037\/0012-1649.16.6.644","volume":"16","author":"D Olweus","year":"1980","unstructured":"Olweus, D. (1980). Familial and temperamental determinants of aggressive behavior in adolescent boys: A causal analysis. Developmental Psychology, 16(6), 644.","journal-title":"Developmental Psychology"},{"issue":"6","key":"26_CR60","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/S0747-5632(03)00040-2","volume":"19","author":"J Morahan-Martin","year":"2003","unstructured":"Morahan-Martin, J., & Schumacher, P. (2003). Loneliness and social uses of the internet. Computers in Human Behavior, 19(6), 659\u2013671.","journal-title":"Computers in Human Behavior"},{"key":"26_CR61","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001","volume-title":"Networks: An introduction","author":"M Newman","year":"2010","unstructured":"Newman, M. (2010). Networks: An introduction. Oxford: Oxford University Press."},{"issue":"3","key":"26_CR62","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s10955-013-0759-z","volume":"152","author":"Y Altshuler","year":"2013","unstructured":"Altshuler, Y., Fire, M., Shmueli, E., Elovici, Y., Bruckstein, A., Pentland, A. S., et al. (2013). The social amplifier reaction of human communities to emergencies. Journal of Statistical Physics, 152(3), 399\u2013418.","journal-title":"Journal of Statistical Physics"},{"issue":"1765","key":"26_CR63","doi-asserted-by":"publisher","first-page":"20131151","DOI":"10.1098\/rspb.2013.1151","volume":"280","author":"T D\u00e1vid-Barrett","year":"2013","unstructured":"D\u00e1vid-Barrett, T., & Dunbar, R. (2013). Processing power limits social group size: Computational evidence for the cognitive costs of sociality. Proceedings of the Royal Society B: Biological Sciences, 280(1765), 20131151.","journal-title":"Proceedings of the Royal Society B: Biological Sciences"},{"key":"26_CR64","unstructured":"Gupte, M., & Eliassi-Rad, T. (2012) Measuring tie strength in implicit social networks, in: Proceedings of the 3rd Annual ACM Web Science Conference, ACM, pp. 109\u2013118."},{"issue":"6","key":"26_CR65","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.appdev.2008.07.002","volume":"29","author":"C Steinfield","year":"2008","unstructured":"Steinfield, C., Ellison, N. B., & Lampe, C. (2008). Social capital, self-esteem, and use of online social network sites: A longitudinal analysis. Journal of Applied Developmental Psychology, 29(6), 434\u2013445.","journal-title":"Journal of Applied Developmental Psychology"},{"issue":"1","key":"26_CR66","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/0037-7856(77)90143-3","volume":"11","author":"KN Walker","year":"1977","unstructured":"Walker, K. N., MacBride, A., & Vachon, M. L. (1977). Social support networks and the crisis of bereavement. Social Science & Medicine, 11(1), 35\u201341.","journal-title":"Social Science & Medicine"},{"issue":"1","key":"26_CR67","first-page":"28","volume":"22","author":"N Lin","year":"1999","unstructured":"Lin, N. (1999). Building a network theory of social capital. Connections, 22(1), 28\u201351.","journal-title":"Connections"},{"issue":"1","key":"26_CR68","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1207\/s15374424jccp3401_3","volume":"34","author":"C Lopez","year":"2005","unstructured":"Lopez, C., & DuBois, D. L. (2005). Peer victimization and rejection: Investigation of an integrative model of effects on emotional, behavioral, and academic adjustment in early adolescence. Journal of Clinical Child and Adolescent Psychology, 34(1), 25\u201336.","journal-title":"Journal of Clinical Child and Adolescent Psychology"},{"key":"26_CR69","unstructured":"Nahar, V., Al-Maskari, S., Li, X., & Pang, C. (2014) Semi-supervised learning for cyberbullying detection in social networks, in: Australasian Database Conference, Springer, pp. 160\u2013171."}],"container-title":["Journal of Computational Social Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42001-018-0026-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-018-0026-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-018-0026-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T10:24:48Z","timestamp":1589451888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42001-018-0026-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,14]]},"references-count":69,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["26"],"URL":"https:\/\/doi.org\/10.1007\/s42001-018-0026-9","relation":{},"ISSN":["2432-2717","2432-2725"],"issn-type":[{"value":"2432-2717","type":"print"},{"value":"2432-2725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,14]]},"assertion":[{"value":"21 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}