{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T11:20:59Z","timestamp":1768735259919,"version":"3.49.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1109\/asonam49781.2020.9381310","type":"proceedings-article","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T16:17:37Z","timestamp":1616602657000},"page":"166-173","source":"Crossref","is-referenced-by-count":6,"title":["\u201cVideo Unavailable\u201d: Analysis and Prediction of Deleted and Moderated YouTube Videos"],"prefix":"10.1109","author":[{"given":"Maram","family":"Kurdi","sequence":"first","affiliation":[]},{"given":"Nuha","family":"Albadi","sequence":"additional","affiliation":[]},{"given":"Shivakant","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935925"},{"key":"ref32","author":"rosenfeld","year":"2018","journal-title":"Shooter allegedly targeted youtube hq because she &#x2018;hated&#x2019; the company for blocking her videos"},{"key":"ref31","article-title":"Building lexicon for sentiment analysis from massive collection of html documents","author":"kaji","year":"0","journal-title":"Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning"},{"key":"ref30","author":"petrovic","year":"2013","journal-title":"I wish i didn't say that! analyzing and predicting deleted messages in twitter"},{"key":"ref34","year":"2019","journal-title":"Report inappropriate content"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818773059"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3359294"},{"key":"ref12","first-page":"697","article-title":"An examination of regret in bullying tweets","author":"xu","year":"0","journal-title":"Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078841"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3359265"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441878"},{"key":"ref16","article-title":"Characterizing deleted tweets and their authors","author":"bhattacharya","year":"0","journal-title":"ICWSM"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858248"},{"key":"ref18","year":"2019","journal-title":"Youtube community guidelines enforcement"},{"key":"ref19","author":"dry","year":"2016","journal-title":"Youtube creators cry censorship as &#x2018;inappropriate&#x2019; content is no longer monetizable on the platform"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2010.01384.x"},{"key":"ref4","author":"bickert","year":"2018","journal-title":"Publishing our internal enforcement guidelines and expanding our appeals process"},{"key":"ref27","first-page":"659","article-title":"Leave a comment! an in-depth analysis of user comments on youtube","volume":"42","author":"schultes","year":"2013","journal-title":"Wirtschaftsinformatik"},{"key":"ref3","year":"2018","journal-title":"Evolving our twitter transparency report expanded data and insights"},{"key":"ref6","article-title":"Automated hate speech detection and the problem of offensive language","author":"davidson","year":"0","journal-title":"ICWSM"},{"key":"ref29","article-title":"Vader: A parsimonious rule-based model for sentiment analysis of social media text","author":"hutto","year":"0","journal-title":"ICWSM"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3274433"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508247"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-019-0587-5"},{"key":"ref2","first-page":"81","article-title":"Four smart ways to run online communities","volume":"41","author":"williams","year":"2000","journal-title":"MIT Sloan Management Review"},{"key":"ref9","first-page":"1","article-title":"Hateful people or hateful bots? detection and characterization of bots spreading religious hatred in arabic social media","volume":"3","author":"albadi","year":"0","journal-title":"Proc ACM SIG Computer-Human Interaction"},{"key":"ref1","first-page":"596","article-title":"Online communities: focusing on sociability and usability","author":"preece","year":"2003","journal-title":"Handbook of Human-Computer Interaction"},{"key":"ref20","author":"coldewey","year":"2018","journal-title":"Police say shooter's anger over youtube policies appears to be the motive"},{"key":"ref22","article-title":"Facebook, youth and privacy in networked publics","author":"tufekci","year":"0","journal-title":"ICWSM"},{"key":"ref21","author":"crossfield","year":"2019","journal-title":"The hidden consequences of moderating social media's dark side"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2695439"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883052"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3201064.3201081"},{"key":"ref25","author":"papadamou","year":"0","journal-title":"Disturbed youtube for kids Characterizing and detecting inappropriate videos targeting young children"}],"event":{"name":"2020 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","location":"The Hague, Netherlands","start":{"date-parts":[[2020,12,7]]},"end":{"date-parts":[[2020,12,10]]}},"container-title":["2020 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9381192\/9381291\/09381310.pdf?arnumber=9381310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:39:16Z","timestamp":1656329956000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9381310\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/asonam49781.2020.9381310","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]}}}