{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:29:32Z","timestamp":1743110972222,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031512476"},{"type":"electronic","value":"9783031512483"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51248-3_8","type":"book-chapter","created":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T19:02:16Z","timestamp":1722970936000},"page":"149-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cyber Hate Speech Detection and Analysis: An Evidence-Based Forensic Linguistics Approach"],"prefix":"10.1007","author":[{"given":"Rui","family":"Sousa-Silva","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,7]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3218743","volume-title":"Adversarial NLP for social network applications: attacks, defenses, and research directions","author":"I Alsmadi","year":"2023","unstructured":"Alsmadi I, Ahmad K, Nazzal M, Alam F, Al-Fuqaha A, Khreishah A, Algosaibi A (2023) Adversarial NLP for social network applications: attacks, defenses, and research directions. https:\/\/doi.org\/10.1109\/TCSS.2022.3218743"},{"key":"8_CR2","unstructured":"Botelho L (2019) Jo\u00e3o Miguel Tavares preside \u00e0 comiss\u00e3o das comemora\u00e7\u00f5es do 10 de Junho. P\u00fablico. https:\/\/www.publico.pt\/2019\/01\/23\/politica\/noticia\/joao-miguel-tavares-preside-comissao-comemoracoes-10-junho-1859158"},{"key":"8_CR3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813085","volume-title":"Politeness: some universals in language usage","author":"P Brown","year":"1987","unstructured":"Brown P, Levinson SC (1987) Politeness: some universals in language usage. Cambridge University Press, Cambridge"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1075\/aals.5.16but","volume-title":"Dimensions of forensic linguistics","author":"RR Butters","year":"2008","unstructured":"Butters RR (2008) Trademarks and other proprietary terms. In: Gibbons J, Turell MT (eds) Dimensions of forensic linguistics. John Benjamins, Oxford, pp 231\u2013247"},{"key":"8_CR5","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2023.2251976","volume-title":"The devil\u2019s in the details: how countries\u2019 defamation laws can (and can\u2019t) combat hate speech","author":"CR Carlson","year":"2024","unstructured":"Carlson CR, Terry C (2024) The devil\u2019s in the details: how countries\u2019 defamation laws can (and can\u2019t) combat hate speech. https:\/\/doi.org\/10.1080\/17512786.2023.2251976"},{"issue":"4","key":"8_CR6","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1093\/applin\/25.4.431","volume":"24","author":"M Coulthard","year":"2004","unstructured":"Coulthard M (2004) Author identification, idiolect, and linguistic uniqueness. Appl Linguist 24(4):431\u2013447","journal-title":"Appl Linguist"},{"key":"8_CR7","first-page":"523","volume-title":"The Routledge handbook of forensic linguistics","author":"M Coulthard","year":"2021","unstructured":"Coulthard M (2021) Experts and opinions: in my opinion. In: Coulthard M, May A, Sousa-Silva R (eds) The Routledge handbook of forensic linguistics, 2nd edn. Routledge, London, pp 523\u2013538","edition":"2"},{"key":"8_CR8","volume-title":"What are forensic sciences? \u2013 Concepts, scope and future perspectives","author":"M Coulthard","year":"2016","unstructured":"Coulthard M, Sousa-Silva R (2016) Forensic linguistics. In: Dinis-Oliveira RJ, Magalh\u00e3es T (eds) What are forensic sciences? \u2013 Concepts, scope and future perspectives. Pactor, Lisbon"},{"key":"8_CR9","volume-title":"An introduction to forensic linguistics: language in evidence","author":"M Coulthard","year":"2017","unstructured":"Coulthard M, Johnson A, Wright D (2017) An introduction to forensic linguistics: language in evidence. Routledge, London"},{"key":"8_CR10","volume-title":"The Routledge handbook of forensic linguistics","year":"2021","unstructured":"Coulthard M, May A, Sousa-Silva R (eds) (2021) The Routledge handbook of forensic linguistics, 2nd edn. Routledge, London","edition":"2"},{"key":"8_CR11","unstructured":"de Almeida CP (2010) C\u00f3digo Penal. Almedina"},{"key":"8_CR12","unstructured":"European Commission (2016) The EU Code of conduct on countering illegal hate speech online. Brussels"},{"key":"8_CR13","unstructured":"European Court of Human Rights, Council of Europe (2021) European Convention on Human Rights. Strasbourg"},{"key":"8_CR14","volume-title":"Language and power","author":"N Fairclough","year":"1989","unstructured":"Fairclough N (1989) Language and power. Longman, London"},{"key":"8_CR15","unstructured":"Finegan E (2008) Language: its structure and use, 6th inter edn. Wadsworth"},{"key":"8_CR16","volume-title":"Relat\u00f3rio de Atividade","author":"Gabinete Cibercrime","year":"2013","unstructured":"Gabinete Cibercrime (2013) Relat\u00f3rio de Atividade"},{"key":"8_CR17","doi-asserted-by":"publisher","unstructured":"Gracia-Caland\u00edn J, Su\u00e1rez-Montoya L (2023) The eradication of hate speech on social media: a systematic review. https:\/\/doi.org\/10.1108\/JICES-11-2022-0098","DOI":"10.1108\/JICES-11-2022-0098"},{"key":"8_CR35","volume-title":"Black\u2019s law dictionary","author":"BA Garner","year":"2009","unstructured":"Garner BA (2009) Black\u2019s law dictionary, 9th edn. West, St. Paul, MN","edition":"9"},{"key":"8_CR18","first-page":"558","volume-title":"The Routledge handbook of forensic linguistics","author":"T Grant","year":"2021","unstructured":"Grant T (2021) Text messaging forensics\u2014Txt 4n6: idiolect-free authorship analysis? In: Coulthard M, May A, Sousa-Silva R (eds) The Routledge handbook of forensic linguistics, 2nd edn. Routledge, London, pp 558\u2013575","edition":"2"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1163\/9789004368811_003","volume-title":"Speech acts","author":"HP Grice","year":"1975","unstructured":"Grice HP (1975) Logic and conversation. In: Cole P, Morgan JL (eds) Speech acts. Academic Press, New York, pp 41\u201358"},{"key":"8_CR20","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-031-06709-9_4","volume-title":"Artificial intelligence and national security","author":"K Gunton","year":"2022","unstructured":"Gunton K (2022) The use of artificial intelligence in content moderation in countering violent extremism on social media platforms. In: Montasari R (ed) Artificial intelligence and national security. Springer International Publishing, Cham, pp 69\u201379. https:\/\/doi.org\/10.1007\/978-3-031-06709-9_4"},{"key":"8_CR21","volume-title":"An introduction to functional grammar","author":"MAK Halliday","year":"1994","unstructured":"Halliday MAK (1994) An introduction to functional grammar, vol 1, 2nd edn. Edward Arnold, London","edition":"2"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1017\/CBO9780511805080.016","volume-title":"Designing for virtual communities in the service of learning","author":"SC Herring","year":"2004","unstructured":"Herring SC (2004) Computer-mediated discourse analysis: an approach to researching online behavior. In: Barab SA, Kling R, Gray JH (eds) Designing for virtual communities in the service of learning. Cambridge University Press, Cambridge, pp 338\u2013376. Retrieved from http:\/\/ella.slis.indiana.edu\/herring\/cmda.pdf"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-540-85303-9_12","volume-title":"Computational forensics","author":"D Hughes","year":"2008","unstructured":"Hughes D, Rayson P, Walkerdine J, Lee K, Greenwood P, Rashid A et al (2008) Supporting law enforcement in digital communities through natural language analysis. In: Computational forensics. Springer, Heidelberg, pp 122\u2013134. https:\/\/doi.org\/10.1007\/978-3-540-85303-9_12"},{"key":"8_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-5091-1_14","volume-title":"Digital forensic investigation on Ponzi schemes","author":"B Madhavan","year":"2024","unstructured":"Madhavan B, Kalabaskar N (2024) Digital forensic investigation on Ponzi schemes. https:\/\/doi.org\/10.1007\/978-981-99-5091-1_14"},{"key":"8_CR25","doi-asserted-by":"publisher","DOI":"10.4324\/9781003377078-8","volume-title":"Reimagining the current regulatory framework to online hate speech: why making way for alternative methods is paramount for free speech","author":"J McHangama","year":"2023","unstructured":"McHangama J, Alkiviadou N (2023) Reimagining the current regulatory framework to online hate speech: why making way for alternative methods is paramount for free speech. https:\/\/doi.org\/10.4324\/9781003377078-8"},{"key":"8_CR26","doi-asserted-by":"publisher","DOI":"10.1108\/978-1-80043-196-620211010","volume-title":"Freedom for expression or a space of oppression? Social Media and the Female @thlete","author":"J Osborne","year":"2021","unstructured":"Osborne J, Kavanagh E, Litchfield C (2021) Freedom for expression or a space of oppression? Social Media and the Female @thlete. https:\/\/doi.org\/10.1108\/978-1-80043-196-620211010"},{"key":"8_CR27","volume-title":"Language crimes: the use and abuse of language evidence in the courtroom","author":"RW Shuy","year":"1993","unstructured":"Shuy RW (1993) Language crimes: the use and abuse of language evidence in the courtroom. Blackwell, Oxford"},{"issue":"2","key":"8_CR28","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1558\/sll.1998.5.2.87","volume":"5","author":"LM Solan","year":"1998","unstructured":"Solan LM (1998) Linguistic experts as semantic tour guides. Forensic Linguist 5(2):87\u2013106. https:\/\/doi.org\/10.1558\/sll.1998.5.2.87","journal-title":"Forensic Linguist"},{"key":"8_CR29","doi-asserted-by":"publisher","unstructured":"Sousa-Silva R (2022) Fighting the fake: a forensic linguistic analysis to fake news detection. International Journal for the Semiotics of Law - Revue Internationale de S\u00e9miotique Juridique. https:\/\/doi.org\/10.1007\/s11196-022-09901-w","DOI":"10.1007\/s11196-022-09901-w"},{"key":"8_CR30","unstructured":"Sousa-Silva R (2023) Forensic linguistics: the potential of language for law enforcement in the digital age. European Law Enforcement Research Bulletin, Special Conference Edition, 23\u201332"},{"key":"8_CR31","volume-title":"In Proceedings of the 3rd European conference of the International Association of Forensic Linguists on the theme of \u2018Bridging the Gaps between Language and the Law\u2019","author":"MT Turell","year":"2013","unstructured":"Turell MT (2013) Presidential Address. In: In Proceedings of the 3rd European conference of the International Association of Forensic Linguists on the theme of \u2018Bridging the Gaps between Language and the Law\u2019. Universidade do Porto - Faculdade de Letras, Porto"},{"key":"8_CR32","first-page":"1","volume-title":"Crime and the internet","author":"DS Wall","year":"2001","unstructured":"Wall DS (2001) Cybercrimes and the Internet. In: Crime and the internet. Routledge, London, pp 1\u201317"},{"key":"8_CR33","doi-asserted-by":"publisher","unstructured":"Watney MM (2021) Regulation of hate speech on social media: a legal perspective. https:\/\/doi.org\/10.34190\/ESM.21.008","DOI":"10.34190\/ESM.21.008"},{"key":"8_CR34","doi-asserted-by":"publisher","unstructured":"Zhou L, Caines A, Pete I, Hutchings A (2023) Automated hate speech detection and span extraction in underground hacking and extremist forums. https:\/\/doi.org\/10.1017\/S1351324922000262","DOI":"10.1017\/S1351324922000262"}],"container-title":["Law and Visual Jurisprudence","Handbook on Cyber Hate"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51248-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T19:06:30Z","timestamp":1722971190000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51248-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031512476","9783031512483"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51248-3_8","relation":{},"ISSN":["2662-4532","2662-4540"],"issn-type":[{"type":"print","value":"2662-4532"},{"type":"electronic","value":"2662-4540"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"7 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}