{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T13:28:31Z","timestamp":1770989311941,"version":"3.50.1"},"reference-count":142,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100007446","name":"King Khalid University","doi-asserted-by":"publisher","award":["R.G.P. 1\/166\/40"],"award-info":[{"award-number":["R.G.P. 1\/166\/40"]}],"id":[{"id":"10.13039\/501100007446","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004386","name":"Universiti Malaya","doi-asserted-by":"publisher","award":["PG035-2016A"],"award-info":[{"award-number":["PG035-2016A"]}],"id":[{"id":"10.13039\/501100004386","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2918354","type":"journal-article","created":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T16:04:23Z","timestamp":1558541063000},"page":"70701-70718","source":"Crossref","is-referenced-by-count":140,"title":["Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges"],"prefix":"10.1109","volume":"7","author":[{"given":"Mohammed Ali","family":"Al-Garadi","sequence":"first","affiliation":[]},{"given":"Mohammad Rashid","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Nawsher","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Ghulam","family":"Murtaza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5196-764X","authenticated-orcid":false,"given":"Henry Friday","family":"Nweke","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9549-2540","authenticated-orcid":false,"given":"Ihsan","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Ghulam","family":"Mujtaba","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3446-4316","authenticated-orcid":false,"given":"Haruna","family":"Chiroma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8198-9265","authenticated-orcid":false,"given":"Hasan Ali","family":"Khattak","sequence":"additional","affiliation":[]},{"given":"Abdullah","family":"Gani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2661126.2661133"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01854-6_43"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13739-6_25"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45252-9_9"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23496-5_13"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s13222-016-0221-x"},{"key":"ref37","first-page":"69","article-title":"Using crowdsourcing to improve profanity detection","author":"sood","year":"2012","journal-title":"Proc AAAI Spring Symp Wisdom of the Crowd"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2187995"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.02.047"},{"key":"ref28","first-page":"42","article-title":"KDD 2017 tutorial: Data-driven approaches towards malicious behavior modeling","volume":"19","author":"jiang","year":"2017","journal-title":"Dimensions"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.016"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42996-0_12"},{"key":"ref20","article-title":"Leading effect of social media for financial fraud disclosure: A text mining based analytics","author":"dong","year":"2016","journal-title":"Proc AMCIS"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.222"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413213"},{"key":"ref24","author":"patchin","year":"2013","journal-title":"Words Wound Delete Cyberbullying and Make Kindness Go Viral"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2184319.2184338"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAT.2014.29"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897928"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3982-4_2"},{"key":"ref25","article-title":"Antisocial behavior in online discussion communities","author":"cheng","year":"2015","journal-title":"Proc 9th Int AAAI Conf Web Social Media"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.2297115"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2014.04.002"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.10.006"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-805394-2.00001-5"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/297672"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.109"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2005.10.005"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1037\/a0035618"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2016.02.024"},{"key":"ref40","author":"kowalski","year":"2012","journal-title":"Cyberbullying bullying in the digital age"},{"key":"ref4","article-title":"Using social media to predict the future: A systematic literature review","author":"phillips","year":"2017","journal-title":"arXiv 1706 06134"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.051"},{"key":"ref6","article-title":"Is social media a gang? Toward a selection, facilitation, or enhancement explanation of cyber violence","author":"peterson","year":"2016","journal-title":"Aggression and Violent Behavior 10"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1201\/b11271-22"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35362-8_7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-012-9867-3"},{"key":"ref7","year":"2012","journal-title":"Huge Rise in Social Media"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321628"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1080\/13811118.2010.494133"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0102145"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2014.949377"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.024"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2011-0054"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2016.111"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2012.09.018"},{"key":"ref43","first-page":"656","article-title":"Learning from bullying traces in social media","author":"xu","year":"2012","journal-title":"Proc Conf North Amer Chapter Assoc Comput Linguistics Hum Lang Technol"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1027\/0044-3409.217.4.182"},{"key":"ref126","author":"smith","year":"1999","journal-title":"The Nature of School Bullying A Cross-National Perspective"},{"key":"ref125","first-page":"1137","article-title":"A study of cross-validation and bootstrap for accuracy estimation and model selection","author":"kohavi","year":"1995","journal-title":"Proc IJCAI"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1002\/9781118548387"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2015.7293405"},{"key":"ref72","first-page":"672","article-title":"Detection and fine-grained classification of cyberbullying events","author":"van hee","year":"2015","journal-title":"Proc Int Conf Recent Adv Natural Lang Process (RANLP)"},{"key":"ref129","year":"2014","journal-title":"From IHML (I Hate My Life) to MOS (Mum Over Shoulder) Why This Guide to Cyber-Bullying Slang May Save Your Child&#x2019;s Life"},{"key":"ref71","first-page":"238","article-title":"An effective approach for cyberbullying detection","volume":"3","author":"nahar","year":"2013","journal-title":"Commun Inf Sci Manage Eng"},{"key":"ref128","article-title":"Is the sample good enough? Comparing data from twitter&#x2019;s streaming API with Twitter&#x2019;s firehose","author":"morstatter","year":"2013","journal-title":"arXiv 1306 5204"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1038\/nrg3920"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1080\/02732173.2012.628560"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219768"},{"key":"ref74","article-title":"Twitter bullying detection","author":"sanchez","year":"2011"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020281327116"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.021"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.09.022"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/2065023.2065035"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1038\/nature14541"},{"key":"ref132","first-page":"439","article-title":"&#x2018;How old do you think I Am?&#x2019; A study of language and age in Twitter","author":"nguyen","year":"2013","journal-title":"Proc Int'l AAAI Conf Weblogs and Social Media"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2347736.2347755"},{"key":"ref136","first-page":"85","article-title":"Text classification and classifiers: A survey","volume":"3","author":"korde","year":"2012","journal-title":"Int Journal Appl Art Intell"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505283"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref137","first-page":"3133","article-title":"Do we need hundreds of classifiers to solve real world classification problems?","volume":"15","author":"fern\u00e1ndez-delgado","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.10.007"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.158"},{"key":"ref62","article-title":"Detection of cyberbullying incidents on the instagram social network","author":"hosseinmardi","year":"2015","journal-title":"arXiv 1503 03909"},{"key":"ref61","first-page":"1","article-title":"Improved cyberbullying detection using gender information","author":"dadvar","year":"2012","journal-title":"Proc 25th Dutch-Belgian Inf Retr Workshop"},{"key":"ref63","first-page":"1289","article-title":"An extensive empirical study of feature selection metrics for text classification","author":"forman","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref64","first-page":"417","article-title":"Thumbs up or thumbs down?: Semantic orientation applied to unsupervised classification of reviews","author":"turney","year":"2002","journal-title":"Proc ACL"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921803"},{"key":"ref65","article-title":"An operational system for detecting and tracking opinions in on-line discussion","author":"tong","year":"2001","journal-title":"Proc Notes ACM SIGIR Workshop Oper Text Classification"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.678878"},{"key":"ref66","first-page":"174","article-title":"Predicting the semantic orientation of adjectives","author":"hatzivassiloglou","year":"1997","journal-title":"Proc 8th Conf Eur Chapter Assoc Comput Linguistics"},{"key":"ref142","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2013.6920758"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2464464.2464499"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.25"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46562-3_12"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aam7032"},{"key":"ref109","first-page":"45","article-title":"Support vector machine active learning with applications to text classification","volume":"2","author":"tong","year":"2001","journal-title":"J Mach Learn Res"},{"key":"ref95","first-page":"11","article-title":"Modeling the detection of textual cyberbullying","author":"dinakar","year":"2011","journal-title":"Proc 5th Int AAAI Conf Weblogs Social Media"},{"key":"ref108","article-title":"A practical guide to support vector classification","author":"hsu","year":"2003"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1080\/03033910.2012.677995"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0026683"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/S0191-8869(02)00218-0"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref92","first-page":"169","article-title":"Psychiatric symptomatology as a predictor of cyberbullying among University Students","volume":"34","author":"ar?cak","year":"2009","journal-title":"European Journal of Research on Education"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585893"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.08.018"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007741"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9450.2007.00611.x"},{"key":"ref103","first-page":"359","article-title":"Correlation-based feature selection for discrete and numeric class machine learning","author":"hall","year":"2000","journal-title":"Proc 17th Int Conf Mach Learn"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00296-0_5"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/130385.130401"},{"key":"ref112","first-page":"1","article-title":"A comparison of event models for naive Bayes text classification","author":"mccallum","year":"1998","journal-title":"Proc AAAI Workshop Learn Text Categorization"},{"key":"ref110","author":"vapnik","year":"2013","journal-title":"The Nature of Statistical Learning Theory"},{"key":"ref98","article-title":"Cyberbullying identification using participant-vocabulary consistency","author":"raisi","year":"2016","journal-title":"arXiv 1606 08084"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809398"},{"key":"ref96","first-page":"1","article-title":"Detection of harassment on Web 2.0","author":"yin","year":"2009","journal-title":"Proceedings of the Content Analysis in the WEB"},{"key":"ref97","first-page":"7","article-title":"Machine learning and affect analysis against cyber-bullying","author":"ptaszynski","year":"2010","journal-title":"Proc 36th AISB'10"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2016.7518887"},{"key":"ref11","first-page":"297","article-title":"Detecting and tracking political abuse in social media","author":"ratkiewicz","year":"2011","journal-title":"Proc 5th Int AAAI Conf Weblogs Social Media"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime.2012.6489521"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i1.2793"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187847"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2011.09.008"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/admsci2020148"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0097807"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/2517312.2517314"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2014.01.004"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"ref84","first-page":"115","article-title":"Mining Indonesian cyber bullying patterns in social networks","volume":"147","author":"margono","year":"2014","journal-title":"Proc 37th Australas Comput Sci Conf"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1890\/07-0539.1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275970"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.052"},{"key":"ref114","first-page":"3","article-title":"The optimality of naive Bayes","volume":"1","author":"zhang","year":"2004","journal-title":"Proc IAAI"},{"key":"ref113","article-title":"The optimality of naive Bayes","author":"zhang","year":"2004"},{"key":"ref116","first-page":"1","article-title":"Don&#x2019;t follow me: Spam detection in Twitter","author":"wang","year":"2010","journal-title":"Proc Int Conf Sec Cryptogr (SECRYPT)"},{"key":"ref80","first-page":"305","article-title":"The tweets they are a-changin&#x2019;: Evolution of twitter users and behavior","author":"liu","year":"2014","journal-title":"Proc of the 5th Int AAAI Conf on Weblogs and Social Media (ICWSM)"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.21"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0114-2"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809341263"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2001.989592"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.08.112"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1006\/jbin.2001.1004"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2849567"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2888600"},{"key":"ref87","author":"anzai","year":"2012","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.03.017"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08720155.pdf?arnumber=8720155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:54:36Z","timestamp":1641988476000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8720155\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":142,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2918354","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}