{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,26]],"date-time":"2025-04-26T05:29:44Z","timestamp":1745645384481,"version":"3.28.2"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10724405","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Illuminating the Interconnected Complexity of Cyberbullying Intentions within the Holistic Social Media Ecosystem"],"prefix":"10.1109","author":[{"given":"Bejgum","family":"Shraya","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Chennai,Tamil Nadu,India"}]},{"given":"Hari Charan Reddy","family":"Dopathi","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Chennai,Tamil Nadu,India"}]},{"given":"Balachandra","family":"Pattanaik","sequence":"additional","affiliation":[{"name":"Wallaga University, Africa,Department of Electrical and Computer Engineering,Nekemte,Ethiopia"}]},{"given":"G","family":"Anitha","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department of Computer Science and Engineering,Chennai,Tamil Nadu,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"105283","DOI":"10.1016\/j.engappai.2022.105283","article-title":"Identification of cyber harassment and intention of target users on social media platforms","volume":"115","author":"Abarna","year":"2022","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01308-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2014.12.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115001"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.paid.2019.01.024","article-title":"Cyberbullying detection on twitter using Big Five and Dark Triad features","volume":"141","author":"Balakrishnan","year":"2019","journal-title":"Personality and Individual Differences"},{"key":"ref6","first-page":"103740","article-title":"A Multi-Agent System for guiding users in on-line social environments","volume":"94","author":"Aguado","year":"2020"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"101138","DOI":"10.1016\/j.csl.2020.101138","article-title":"Part-of-speech tagging for Arabic tweets using CRF and Bi-LSTM","volume":"65","author":"AlKhwiter","year":"2021","journal-title":"Computer Speech & Language"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114762"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2012.08.010"},{"key":"ref10","first-page":"103 541","article-title":"When the Timeline Meets the Pipeline: A Survey on Automated Cyberbullying Detection","volume":"9","author":"Elsafoury","year":"2021"},{"issue":"1","key":"ref11","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TAFFC.2017.2761757","article-title":"Approaches to Automated Detection of Cyberbullying: A Survey","volume":"11","author":"Salawu","year":"2020","journal-title":"IEEE Trans. Affective Comput."},{"key":"ref12","first-page":"92 715","article-title":"Cyberbullying Behaviour: A Study of Undergraduate University Students","volume":"9","author":"Shaikh","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015669"},{"issue":"1","key":"ref14","doi-asserted-by":"crossref","first-page":"70 701","DOI":"10.1109\/ACCESS.2019.2918354","article-title":"Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges","volume":"7","author":"Al-Garadi","year":"2019","journal-title":"IEEE Access"},{"issue":"2","key":"ref15","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1109\/TCSS.2021.3049232","article-title":"BullyNet: Unmasking Cyberbullies on Social Networks","volume":"8","author":"Srinath","year":"2021","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"1","key":"ref16","doi-asserted-by":"crossref","first-page":"e03218","DOI":"10.1016\/j.heliyon.2020.e03218","article-title":"Applying artificial intelligence to explore sexual cyberbullying behaviour","volume":"6","author":"Sa\u2019nchez-Medina","year":"2020","journal-title":"Heliyon"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"107186","DOI":"10.1016\/j.compeleceng.2021.107186","article-title":"Automatic detection of cyberbullying using multi-feature based artificial intelligence with deep decision tree classification","volume":"92","author":"Yuvaraj","year":"2021","journal-title":"Computers & Electrical Engineering"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0203794"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.avb.2018.01.001","article-title":"Social responsibility on the Internet: Addressing the challenge of cyberbullying","volume":"39","author":"Cohen-Almagor","year":"2018","journal-title":"Aggression and Violent Behavior"},{"key":"ref20","first-page":"1","article-title":"Unveiling the Intricacies of Cyber Harassment Intentions on Social Media Platforms","volume-title":"2024 3rd International Conference for Innovation in Technology (INOCON).","author":"Shraya"},{"key":"ref21","first-page":"1","article-title":"Predicting the Deaths rate of COVID-19 Using Big Data Analytics and Machine Learning","volume-title":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT).","author":"Laxmikant"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2024,6,24]]},"location":"Kamand, India","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10724405.pdf?arnumber=10724405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T22:39:06Z","timestamp":1732660746000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10724405\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10724405","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}