{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:34:31Z","timestamp":1777952071592,"version":"3.51.4"},"reference-count":33,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:00:00Z","timestamp":1769817600000},"content-version":"vor","delay-in-days":30,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.052","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"429-438","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Leveraging Large Language Models for Cyberbullying Prediction and Detection: A Multimodal Approach to Proactive Prevention and Policy Support."],"prefix":"10.1016","volume":"275","author":[{"given":"Usman Javed","family":"Butt","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nicholas","family":"Quinn","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sethuramalingam","family":"Subramaniam","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ammar","family":"Rashid","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"12","key":"10.1016\/j.procs.2026.01.052_bib1","doi-asserted-by":"crossref","first-page":"1222","DOI":"10.1016\/j.childyouth.2009.05.004","article-title":"\u201cOngoing and online: Children and youth\u2019s perceptions of cyber bullying,\u201d","volume":"31","author":"Mishna","year":"2009","journal-title":"Child Youth Serv Rev"},{"issue":"4","key":"10.1016\/j.procs.2026.01.052_bib2","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","article-title":"\u201cCyberbullying: its nature and impact in secondary school pupils.,\u201d","volume":"49","author":"Smith","year":"2008","journal-title":"J Child Psychol Psychiatry"},{"issue":"2","key":"10.1016\/j.procs.2026.01.052_bib3","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1177\/1541204006286288","article-title":"\u201cBullies Move Beyond the Schoolyard: A Preliminary Look at Cyberbullying,\u201d","volume":"4","author":"Patchin","year":"2006","journal-title":"Youth Violence Juv Justice"},{"issue":"2","key":"10.1016\/j.procs.2026.01.052_bib4","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1375\/ajgc.20.2.182","article-title":"\u201cCyberbullying at School: Good Practice and Legal Aspects in the United Kingdom,\u201d","volume":"20","author":"Coyne","year":"2010","journal-title":"Australian Journal of Guidance and Counselling"},{"issue":"1","key":"10.1016\/j.procs.2026.01.052_bib5","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.chb.2012.05.024","article-title":"\u201cThe nature of cyberbullying, and strategies for prevention,\u201d","volume":"29","author":"Slonje","year":"2013","journal-title":"Comput Human Behav"},{"key":"10.1016\/j.procs.2026.01.052_bib6","doi-asserted-by":"crossref","unstructured":"Q. Chen, K. L. Chan, S. Guo, M. Chen, C. K. ming Lo, and P. Ip, \u201cEffectiveness of Digital Health Interventions in Reducing Bullying and Cyberbullying: A Meta-Analysis,\u201d https:\/\/doi.org\/10.1177\/15248380221082090, vol. 24, no. 3, pp. 1986\u20132002, Apr. 2022, doi: 10.1177\/15248380221082090.","DOI":"10.1177\/15248380221082090"},{"key":"10.1016\/j.procs.2026.01.052_bib7","article-title":"\u201cCyberbullying: An overview of research and policy in OECD countries | OECD Education Working Papers | OECD iLibrary.\u201d","volume":"28","year":"2024","journal-title":"Accessed: Jan."},{"key":"10.1016\/j.procs.2026.01.052_bib8","doi-asserted-by":"crossref","unstructured":"Q. Chen, K. L. Chan, S. Guo, M. Chen, C. K. ming Lo, and P. Ip, \u201cEffectiveness of Digital Health Interventions in Reducing Bullying and Cyberbullying: A Meta-Analysis,\u201d https:\/\/doi.org\/10.1177\/15248380221082090, vol. 24, no. 3, pp. 1986\u20132002, 2022, doi: 10.1177\/15248380221082090.","DOI":"10.1177\/15248380221082090"},{"issue":"2","key":"10.1016\/j.procs.2026.01.052_bib9","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.ijchp.2020.03.003","article-title":"\u201cCyberbullying victimization and somatic complaints: A prospective examination of cognitive emotion regulation strategies as mediators,\u201d","volume":"20","author":"Rey","year":"2020","journal-title":"International Journal of Clinical and Health Psychology"},{"key":"10.1016\/j.procs.2026.01.052_bib10","doi-asserted-by":"crossref","unstructured":"I. Tsaousis, \u201cThe relationship of self-esteem to bullying perpetration and peer victimization among schoolchildren and adolescents: A meta-analytic review,\u201d Aggress Violent Behav, vol. 31, Sep. 2016, doi: 10.1016\/j.avb.2016.09.005.","DOI":"10.1016\/j.avb.2016.09.005"},{"issue":"3","key":"10.1016\/j.procs.2026.01.052_bib11","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1002\/pits.22467","article-title":"\u201cThe association between witnessing cyberbullying and depressive symptoms and social anxiety among elementary school students,\u201d","volume":"58","author":"Doumas","year":"2021","journal-title":"Psychol Sch"},{"key":"10.1016\/j.procs.2026.01.052_bib12","article-title":"\u201cBullying at school: Bullying - a definition.\u201d","volume":"10","author":"GOV.UK","year":"2024","journal-title":"Accessed: Apr."},{"issue":"2","key":"10.1016\/j.procs.2026.01.052_bib13","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1080\/17405629.2011.643670","article-title":"\u201cProcesses of cyberbullying, and feelings of remorse by bullies: A pilot study,\u201d","volume":"9","author":"Slonje","year":"2012","journal-title":"European Journal of Developmental Psychology"},{"issue":"2","key":"10.1016\/j.procs.2026.01.052_bib14","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1080\/09649060600973772","article-title":"\u201cCyber-bullying and harassment of teenagers: The legal response,\u201d","volume":"28","author":"Gillespie","year":"2006","journal-title":"Journal of Social Welfare and Family Law"},{"key":"10.1016\/j.procs.2026.01.052_bib15","article-title":"\u201cStalking or Harassment | The Crown Prosecution Service.\u201d","volume":"13","year":"2024","journal-title":"Accessed: Apr."},{"key":"10.1016\/j.procs.2026.01.052_bib16","unstructured":"\u201cPreventing and Tackling Bullying Advice for School Leaders, Staff and Governing Bodies.\u201d"},{"key":"10.1016\/j.procs.2026.01.052_bib17","unstructured":"M. Samara, \u201cthe Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International http:\/\/creativecommons.org\/about\/downloads.\u201d"},{"key":"10.1016\/j.procs.2026.01.052_bib18","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1080\/07421222.2017.1373012","article-title":"\u201cUsing IT Design to Prevent Cyberbullying,\u201d","volume":"34","author":"Lowry","year":"2017","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"10.1016\/j.procs.2026.01.052_bib19","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1080\/07421222.2017.1373012","article-title":"\u201cUsing IT Design to Prevent Cyberbullying,\u201d","volume":"34","author":"Lowry","year":"2017","journal-title":"Journal of Management Information Systems"},{"key":"10.1016\/j.procs.2026.01.052_bib20","doi-asserted-by":"crossref","unstructured":"B. P. Hendry, L. ann M. Hellsten, L. J. McIntyre, and B. R. R. Smith, \u201cRecommendations for cyberbullying prevention and intervention: A Western Canadian perspective from key stakeholders,\u201d Front Psychol, vol. 14, 2023, doi: 10.3389\/fpsyg.2023.1067484.","DOI":"10.3389\/fpsyg.2023.1067484"},{"key":"10.1016\/j.procs.2026.01.052_bib21","doi-asserted-by":"crossref","unstructured":"E. J. Finkel and A. N. Hall, \u201cThe I3 Model: a metatheoretical framework for understanding aggression,\u201d Feb. 01, 2018, Elsevier B.V. doi: 10.1016\/j.copsyc.2017.03.013.","DOI":"10.1016\/j.copsyc.2017.03.013"},{"key":"10.1016\/j.procs.2026.01.052_bib22","doi-asserted-by":"crossref","first-page":"104358","DOI":"10.1016\/j.tate.2023.104358","article-title":"\u201cBarriers, resources, and attitudes towards (cyber-)bullying prevention\/intervention in schools from the perspective of school staff: Results from focus group discussions,\u201d","volume":"135","author":"Lechner","year":"2023","journal-title":"Teach Teach Educ"},{"issue":"4","key":"10.1016\/j.procs.2026.01.052_bib23","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1177\/1362480604046657","article-title":"\u201cRefining control balance theory,\u201d","volume":"8","author":"Tittle","year":"2004","journal-title":"Theor Criminol"},{"issue":"1","key":"10.1016\/j.procs.2026.01.052_bib24","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1080\/15388220903185605","article-title":"\u201cText-Bullying: Associations With Traditional Bullying and Depression Among New Zealand Adolescents,\u201d","volume":"9","author":"Raskauskas","year":"2009","journal-title":"J Sch Violence"},{"key":"10.1016\/j.procs.2026.01.052_bib25","doi-asserted-by":"crossref","unstructured":"S. Agrawal and A. Awekar, \u201cDeep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms,\u201d Jan. 2018, [Online]. Available: http:\/\/arxiv.org\/abs\/1801.06482","DOI":"10.1007\/978-3-319-76941-7_11"},{"key":"10.1016\/j.procs.2026.01.052_bib26","unstructured":"Y. N. Silva, C. Rich, J. Chon, and L. M. Tsosie, \u201cBullyBlocker: An App to Identify Cyberbullying in Facebook *.\u201d"},{"key":"10.1016\/j.procs.2026.01.052_bib27","first-page":"161","article-title":"\u201cDetecting Cyberbullying on Social Networks Using Language Learning Model,\u201d","author":"Vanpech","year":"2024","journal-title":"in KST 2024 - 16th International Conference on Knowledge and Smart Technology, Institute of Electrical and Electronics Engineers Inc."},{"key":"10.1016\/j.procs.2026.01.052_bib28","doi-asserted-by":"crossref","unstructured":"M. Bethany, B. Wherry, N. Vishwamitra, and P. Najafirad, \u201cImage Safeguarding: Reasoning with Conditional Vision Language Model and Obfuscating Unsafe Content Counterfactually,\u201d 2024. [Online]. Available: https:\/\/github.com\/SecureAIAutonomyLab\/ConditionalVLM","DOI":"10.1609\/aaai.v38i2.27835"},{"key":"10.1016\/j.procs.2026.01.052_bib29","doi-asserted-by":"crossref","unstructured":"M. Hamlett, G. Powell, Y. N. Silva, and D. Hall, \u201cA Labeled Dataset for Investigating Cyberbullying Content Patterns in Instagram,\u201d 2022. [Online]. Available: www.aaai.org","DOI":"10.1609\/icwsm.v16i1.19376"},{"key":"10.1016\/j.procs.2026.01.052_bib30","series-title":"\u201cAnalyzing Labeled Cyberbullying Incidents on the Instagram Social Network,\u201d in Social Informatics, T.-Y. Liu, C. N. Scollon, and W. Zhu, Eds.","first-page":"49","author":"Hosseinmardi","year":"2015"},{"key":"10.1016\/j.procs.2026.01.052_bib31","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1145\/3366424.3385771","article-title":"\u201cTemporal Properties of Cyberbullying on Instagram,\u201d","author":"Gupta","year":"2020","journal-title":"in Companion Proceedings of the Web Conference 2020, in WWW \u201820. New York, NY, USA: Association for Computing Machinery"},{"key":"10.1016\/j.procs.2026.01.052_bib32","doi-asserted-by":"crossref","unstructured":"S. Kim, A. Razi, G. Stringhini, P. Wisniewski, and M. De Choudhury, \u201cYou Don\u2019t Know How I Feel: Insider-Outsider Perspective Gaps in Cyberbullying Risk Detection,\u201d 2021. [Online]. Available: www.aaai.org","DOI":"10.1609\/icwsm.v15i1.18061"},{"key":"10.1016\/j.procs.2026.01.052_bib33","unstructured":"G. Team, \u201cGemini: A Family of Highly Capable Multimodal Models,\u201d 2024."}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000529?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000529?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:31:41Z","timestamp":1777894301000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926000529"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":33,"alternative-id":["S1877050926000529"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.052","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Leveraging Large Language Models for Cyberbullying Prediction and Detection: A Multimodal Approach to Proactive Prevention and Policy Support.","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.052","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}