{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:24:11Z","timestamp":1743038651010,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030164461"},{"type":"electronic","value":"9783030164478"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-16447-8_10","type":"book-chapter","created":{"date-parts":[[2019,3,30]],"date-time":"2019-03-30T03:04:19Z","timestamp":1553915059000},"page":"95-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detection and Prevention of Bullying on Online Social Networks: The Combination of Textual, Visual and Cognitive"],"prefix":"10.1007","author":[{"given":"Carlos","family":"Silva","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2139-5414","authenticated-orcid":false,"given":"Ricardo","family":"Santos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4395-4483","authenticated-orcid":false,"given":"Ricardo","family":"Barbosa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,31]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Evans, C., Smokowski, P.: Theoretical explanations for bullying in school: how ecological processes propagate perpetration and victimization. University of Kansas, University of North Carolina, USA (2016)","DOI":"10.1007\/s10560-015-0432-2"},{"key":"10_CR2","unstructured":"Dinakar, K., Reichart, R., Lieberman, H.: Modeling the detection of textual cyberbullying. MIT Media Lab, Massachusetts Institute of Technology, Cambridge, USA (2011)"},{"key":"10_CR3","unstructured":"Lightbody, G., Bond, R., Mulvenna, M., Bi, Y., Mulligan, M.: Investigation into the automated detection of image based cyberbullying on social media platforms. School of Computing and Mathematics, University of Ulster, Northern Ireland. Carnbane Business Centre, Newry, Northern Ireland (2014)"},{"key":"10_CR4","volume-title":"Net Children Go Mobile: Final Report","author":"G Mascheroni","year":"2014","unstructured":"Mascheroni, G., Cuman, A.: Net Children Go Mobile: Final Report. Educatt, Milano (2014)"},{"key":"10_CR5","unstructured":"McClowry, R., Miller, M., Mills, G.: Theoretical explanations for bullying in school: what family physicians can do to combat bullying. Department of Family and Community Medicine, Thomas Jefferson University, Philadelphia, USA (2017)"},{"key":"10_CR6","unstructured":"Hee, C., et al.: Automatic detection of cyberbullying in social media text. Ghent University, University of Antwerp, Belgium (2018)"},{"key":"10_CR7","unstructured":"Hardy, R., Norgaard, J.: Reputation in the internet black market: an empirical and theoretical analysis of the Deep Web. J. Inst. Econ. (2017). George Mason University, Virginia, USA"},{"key":"10_CR8","unstructured":"Patchin, J., Hinduja, S.: Digital self-harm among adolescents. University of Wisconsin-Eau Claire, Eau Claire, Wisconsin, USA. Florida Atlantic University, Jupiter, Florida, USA (2017)"},{"key":"10_CR9","unstructured":"The Next Web - \u201cHow Dangerous is Cyberbullying?\u201d. www.thenextweb-com\/contributors\/2017\/10\/04\/how-dangerous-is-cyberbullying . Accessed 31 Oct 2017"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Chatzakou, D., Kourtellis, N., Blackburn, J., Cristofaro, E., Strighini, G., Vakali, A.: Mean birds: detection aggression and bullying on Twitter. In: Proceedings of the 2017 ACM on Web Science Conference, pp. 13\u201322. ACM (2017)","DOI":"10.1145\/3091478.3091487"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Hosseinmardi, H., Mattson, S., Rafiq, R., Han, R., Lv, Q., Mishra, S.: Analyzing labeled cyberbullying incidents on the Instagram social networks. University of Colorado Boulder, Boulder, USA (2015)","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"10_CR12","doi-asserted-by":"publisher","DOI":"10.1145\/2661126.2661133","volume-title":"Cyber Bullying Detection Using Social and Textual Analysis","author":"K Huang","year":"2014","unstructured":"Huang, K., Singh, V., Atrey, P.: Cyber Bullying Detection Using Social and Textual Analysis. ACM, New York (2014)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Zhao, R., Zhou, A., Mao, K.: Automatic detection of cyberbullying on social networks based on bullying features. School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore (2016)","DOI":"10.1145\/2833312.2849567"},{"key":"10_CR14","doi-asserted-by":"publisher","DOI":"10.1145\/3274433","volume-title":"See No Evil, Hear No Evil: Audio-Visual-Textual Cyberbullying Detection","author":"S Soni","year":"2018","unstructured":"Soni, S., Singh, V.: See No Evil, Hear No Evil: Audio-Visual-Textual Cyberbullying Detection. Rutgers University, New Brunswick (2018)"},{"key":"10_CR15","unstructured":"Zhong, H., et al.: Content-driven detection of cyberbullying on the Instagram social network. In: IJCAI, pp. 3952\u20133958 (2016)"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Barbosa, R., Santos, R.: Online social networks as sensors in smart environments. CIICESI, ESTGF, IPP School of Technology and Management of Felgueiras, Felgueiras, Portugal (2016)","DOI":"10.1109\/GIIS.2016.7814950"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Ghavami, S., Asadpour, M., Mahdavi, M.: Facebook user\u2019s like behavior can reveal personality. In: 2015 7th Conference on Information and Technology (IKT), Urmia, pp. 1\u20133 (2015)","DOI":"10.1109\/IKT.2015.7288797"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Intelligent Technologies for Interactive Entertainment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16447-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T21:36:20Z","timestamp":1663191380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-16447-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030164461","9783030164478"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16447-8_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"31 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTETAIN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Technologies for Interactive Entertainment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guimar\u00e3es","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intetain2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.allconferencealert.org\/intetain-2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"confy.eai.eu","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"65% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}