{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:06:00Z","timestamp":1767773160609,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T00:00:00Z","timestamp":1663027200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T00:00:00Z","timestamp":1663027200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,13]]},"DOI":"10.1109\/iicaiet55139.2022.9936821","type":"proceedings-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T20:44:15Z","timestamp":1668026655000},"page":"1-5","source":"Crossref","is-referenced-by-count":8,"title":["Comparing Zero-Shot Text Classification and Rule-Based Matching in Identifying Cyberbullying Behaviors on Social Media"],"prefix":"10.1109","author":[{"given":"Wei Jiek","family":"Chong","sequence":"first","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]},{"given":"Hui Na","family":"Chua","sequence":"additional","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]},{"given":"May Fen","family":"Gan","sequence":"additional","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5120-5_53"},{"key":"ref30","article-title":"Using Word2Vec-LDA-Word mover fistance for vomparing the patterns of information seeking and sharing during the COVID-19 pandemic","author":"chan","year":"2022","journal-title":"Presented at the IEEE 7th International Conference for Convergence in Technology (I2CT)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v5i3.14209"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.374"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"40","DOI":"10.31436\/jisdt.v1i2.111","article-title":"Cyberbullying in E-learning platform: An exploratory study through text mining analytics","volume":"1","author":"kartiwi","year":"2019","journal-title":"Journal of Information Systems and Digital Technologies"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST47167.2019.9032956"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2743065.2743085"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.11.022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/0470018860.s00078"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-014-0549-4"},{"key":"ref18","first-page":"161","article-title":"Natural language processing","volume":"6","author":"jain","year":"2018","journal-title":"International Journal of Computational Engineering Science"},{"journal-title":"Encyclopedia of Library and Information Science","year":"0","author":"liddy","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1093\/pch\/19.10.527"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106411"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2019.0100587"},{"journal-title":"Natural language processing for information extraction","year":"2018","author":"singh","key":"ref27"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.22"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7899672"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IICAIET51634.2021.9573878"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.20429\/ger.2020.170201"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1192\/1\/012029"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/23736992.2019.1599721"},{"journal-title":"Number of social media users worldwide from 2018 to 2022 with forecasts from 2023 to 2027","year":"0","author":"dixon","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.5815\/ijisa.2019.11.05"},{"key":"ref20","first-page":"201","article-title":"A text mining research based on LDA topic modelling","author":"tong","year":"2022","journal-title":"International Conference on Computer Science and Information Technology"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/eStream.2019.8732167"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.20537\/2076-7633-2012-4-4-693-706"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/info10040150"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32381-3_16"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2021.104108"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1177\/0165551509360123"}],"event":{"name":"2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)","start":{"date-parts":[[2022,9,13]]},"location":"Kota Kinabalu, Malaysia","end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9936688\/9936734\/09936821.pdf?arnumber=9936821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T21:03:44Z","timestamp":1728335024000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9936821\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,13]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iicaiet55139.2022.9936821","relation":{},"subject":[],"published":{"date-parts":[[2022,9,13]]}}}