{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:23:44Z","timestamp":1766067824826,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,9]]},"DOI":"10.1109\/icit58056.2023.10225847","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:26:12Z","timestamp":1693329972000},"page":"220-225","source":"Crossref","is-referenced-by-count":7,"title":["Revolutionizing Cyberbullying Prevention: A Cutting-Edge Natural Language Processing-Based Approach"],"prefix":"10.1109","author":[{"given":"Tarek","family":"Kanan","sequence":"first","affiliation":[{"name":"Alzaytoonah University of Jordan,Department of artificial intelligence,Amman,Jordan"}]},{"given":"Samar","family":"Hendawi","sequence":"additional","affiliation":[{"name":"Alzaytoonah University of Jordan,Department of Computer Science,Amman,Jordan"}]},{"given":"Shadi","family":"AlZu'bi","sequence":"additional","affiliation":[{"name":"Alzaytoonah University of Jordan,Department of Computer Science,Amman,Jordan"}]},{"given":"Mohammed","family":"Elbes","sequence":"additional","affiliation":[{"name":"Alzaytoonah University of Jordan,Department of Computer Science,Amman,Jordan"}]},{"given":"Ala","family":"Mughaid","sequence":"additional","affiliation":[{"name":"The Hashemite University,FAC of Prince Al-Hussien bin Abdullah for IT,Department of Information Technology,Zarqa,Jordan"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.procs.2016.02.019","article-title":"On privacy and security in social media - a comprehensive study","volume":"78","author":"kumar","year":"2016","journal-title":"Procedia Computer Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.005"},{"key":"ref23","first-page":"587","article-title":"Ensuring cybersecurity while leveraging social media as a data source for internet of things applications","author":"hendawi","year":"2023","journal-title":"Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2885990.2885998"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.05.038"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30075-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"ref22","first-page":"1","author":"alzu'bi","year":"2022","journal-title":"Transfer learning enabled cad system for monkey pox classification"},{"key":"ref10","first-page":"1553","article-title":"Online social networks: Threats and solutions","volume":"15","author":"fire","year":"2013","journal-title":"IEEE Communications Surveys & Tutorials"},{"journal-title":"The Data Indexing for Cyber Threat Resources","article-title":"IEEE","year":"2016","key":"ref21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3343038"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/jcp2010001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.063"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/fi11030073"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.007"},{"key":"ref18","first-page":"97","article-title":"The weaponization of social media: Spear phishing and cyberattacks on democracy","volume":"70","author":"bossetta","year":"2018","journal-title":"Journal of International Affairs"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.05.024"},{"journal-title":"Social Media A New Vector for Cyber Attack","article-title":"IEEE","year":"2016","key":"ref7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1706\/1\/012142"},{"journal-title":"Emerging Social Media Threats Technology and Policy Perspectives","article-title":"EWI","year":"2011","key":"ref4"},{"journal-title":"Analysis and Impact of Cyber Threats on OnlineSocial Networks","article-title":"IEEE","year":"2016","key":"ref3"},{"key":"ref6","article-title":"Sustainable development: A semantics-aware trends for movies recommendation system using modern nlp","volume":"14","author":"alzu'bi","year":"2022","journal-title":"International Journal of Advances in Soft Computing & Its Applications"},{"key":"ref5","first-page":"125","article-title":"Social media security risks, cyber threats and risks prevention and mitigation techniques","volume":"4","author":"kumar","year":"2018","journal-title":"International Journal of Advance Research in Computer Science and Management"}],"event":{"name":"2023 International Conference on Information Technology (ICIT)","start":{"date-parts":[[2023,8,9]]},"location":"Amman, Jordan","end":{"date-parts":[[2023,8,10]]}},"container-title":["2023 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10225686\/10225751\/10225847.pdf?arnumber=10225847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:43:44Z","timestamp":1695059024000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10225847\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icit58056.2023.10225847","relation":{},"subject":[],"published":{"date-parts":[[2023,8,9]]}}}