{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T04:59:55Z","timestamp":1775365195022,"version":"3.50.1"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tcss.2024.3359010","type":"journal-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T23:59:52Z","timestamp":1707868792000},"page":"4354-4366","source":"Crossref","is-referenced-by-count":11,"title":["User-Centric Modeling of Online Hate Through the Lens of Psycholinguistic Patterns and Behaviors in Social Media"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6854-3822","authenticated-orcid":false,"given":"Zeinab","family":"Noorian","sequence":"first","affiliation":[{"name":"Ted Rogers School of Information Management, Toronto Metropolitan University, Toronto, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5583-3008","authenticated-orcid":false,"given":"Amira","family":"Ghenai","sequence":"additional","affiliation":[{"name":"Ted Rogers School of Information Management, Toronto Metropolitan University, Toronto, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2776-0184","authenticated-orcid":false,"given":"Hadiseh","family":"Moradisani","sequence":"additional","affiliation":[{"name":"School of Engineering, University of Guelph, Guelph, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2102-9190","authenticated-orcid":false,"given":"Fattane","family":"Zarrinkalam","sequence":"additional","affiliation":[{"name":"School of Engineering, University of Guelph, Guelph, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4749-758X","authenticated-orcid":false,"given":"Soroush Zamani","family":"Alavijeh","sequence":"additional","affiliation":[{"name":"Department of Computing and Software, McMaster University, Hamilton, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326032"},{"key":"ref2","first-page":"86","article-title":"Hate me, hate me not: Hate speech detection on Facebook","volume-title":"Proc. Italian Conf. CyberSecurity","author":"Del Vigna","year":"2017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450024"},{"key":"ref4","article-title":"Coronavirus racism: Canadas top doctor blasts \u2018stigmatizing comments\u2019 on social media","volume-title":"CTV News","author":"Flanagan","year":"2020"},{"key":"ref5","article-title":"Sinophobia: How a virus reveals the many ways China is feared","volume-title":"GBBBC News, Feb","author":"Wong","year":"2020"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-020-09502-8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2019.90208"},{"key":"ref8","first-page":"186","article-title":"Meta AI at Arabic hate speech 2022: MultiTask learning with self-correction for hate speech classification","volume-title":"Proc. Eur. Lang. Resour. Assoc.","author":"AlKhamissi","year":"2022"},{"key":"ref9","first-page":"1772","article-title":"Profiling hate speech spreaders on Twitter task at PAN 2021","volume-title":"Proc. Conf. Labs Eval. Forum","author":"Rangel","year":"2021"},{"key":"ref10","article-title":"Author profiling for hate speech detection","author":"Mishra","year":"2019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-emnlp.398"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15057"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326034"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3415163"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19319"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2020.2996401"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0243300"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15028"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0221152"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.26615\/978-954-452-072-4_161"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51328-3_19"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2023.3240098"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5104"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.13053\/cys-24-3-3478"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.alw-1.19"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA51294.2020.00165"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00050"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-2019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-13643-6_12"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3487351.3488324"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106663"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412698"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3274327"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.102890"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X09351676"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-023-00437-1"},{"key":"ref38","article-title":"The readability of tweets and their geographic correlation with education","author":"Davenport","year":"2014"},{"key":"ref39","first-page":"19","article-title":"Readability of twitter tweets for second language learners","volume-title":"Proc. 17th Annu. Workshop Australas. Lang. Technol. Assoc.","author":"Jacob","year":"2019"},{"key":"ref40","article-title":"DistilBERT, a distilled version of BERT: Smaller, faster, cheaper and lighter","author":"Sanh","year":"2020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1404"},{"key":"ref42","article-title":"Bertopic: Neural topic modeling with a class-based TF-IDF procedure","author":"Grootendorst","year":"2022"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3389\/fsoc.2022.886498"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.4102\/sajip.v29i1.88"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1038\/srep04761"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-psych-122414-033600"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21416"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1177\/0013164494054002009"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1411678112"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3371158.3371172"},{"key":"ref51","first-page":"1837","article-title":"Unified and multilingual author profiling for detecting haters","volume-title":"Proc. CLEF","author":"Schlicht","year":"2021"},{"key":"ref52","first-page":"2193","article-title":"Profiling hate speech spreaders on Twitter: SVM vs. Bi-LSTM","volume-title":"Proc. CLEF","author":"Vogel","year":"2021"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2021.101960"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2209310.2209312"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/IISA56318.2022.9904386"},{"key":"ref56","article-title":"Social media use in 2018","author":"Smith","year":"2018"},{"key":"ref57","article-title":"Social media use in 2021","author":"Atske","year":"2021"},{"key":"ref58","article-title":"Algorithmic bias detection and mitigation: Best practices and policies to reduce consumer harms","volume":"2","author":"Lee","year":"2019"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/10557215\/10433527.pdf?arnumber=10433527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T19:01:16Z","timestamp":1750100476000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10433527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":58,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2024.3359010","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"value":"2329-924X","type":"electronic"},{"value":"2373-7476","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}