{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:22:31Z","timestamp":1774966951684,"version":"3.50.1"},"reference-count":83,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Research Center for Psychological Science of the Faculty of Psychology"},{"name":"University of Lisbon","award":["PTDC\/MHC\/PED\/3297\/2014"],"award-info":[{"award-number":["PTDC\/MHC\/PED\/3297\/2014"]}]},{"name":"University of Lisbon","award":["PTDC\/PSI-GER\/1918\/2020"],"award-info":[{"award-number":["PTDC\/PSI-GER\/1918\/2020"]}]},{"name":"University of Lisbon","award":["UIDB\/04527\/2020"],"award-info":[{"award-number":["UIDB\/04527\/2020"]}]},{"name":"University of Lisbon","award":["UIDP\/04527\/2020"],"award-info":[{"award-number":["UIDP\/04527\/2020"]}]},{"name":"Portuguese National funds through INESC-ID","award":["UIDB\/50021\/2020"],"award-info":[{"award-number":["UIDB\/50021\/2020"]}]},{"name":"Portuguese National funds through INESC-ID","award":["UI\/BD\/154561\/2022"],"award-info":[{"award-number":["UI\/BD\/154561\/2022"]}]},{"name":"Portuguese Recovery and Resilience Plan","award":["C645008882-00000055"],"award-info":[{"award-number":["C645008882-00000055"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Affective Comput."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/taffc.2024.3518587","type":"journal-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T14:26:00Z","timestamp":1734359160000},"page":"1473-1487","source":"Crossref","is-referenced-by-count":1,"title":["Towards Cyberbullying Detection: Building, Benchmarking and Longitudinal Analysis of Aggressiveness and Conflicts\/Attacks Datasets From Twitter"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8679-4566","authenticated-orcid":false,"given":"Paula","family":"Ferreira","sequence":"first","affiliation":[{"name":"CICPSI, Faculdade de Psicologia, Universidade de Lisboa, Alameda da Universidade, Lisboa, Portugal"}]},{"given":"N\u00e1dia","family":"Pereira","sequence":"additional","affiliation":[{"name":"CICPSI, Faculdade de Psicologia, Universidade de Lisboa, Alameda da Universidade, Lisboa, Portugal"}]},{"given":"Hugo","family":"Rosa","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto de Engenharia de Sistemas e Computadores, Investiga&#x00E7;&#x00E3;o e Desenvolvimento em Lisboa, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3941-1387","authenticated-orcid":false,"given":"Sofia","family":"Oliveira","sequence":"additional","affiliation":[{"name":"Iscte&#x2013;Instituto Universit&#x00E1;rio de Lisboa, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2456-5028","authenticated-orcid":false,"given":"Lu\u00edsa","family":"Coheur","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto de Engenharia de Sistemas e Computadores, Investiga&#x00E7;&#x00E3;o e Desenvolvimento em Lisboa, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1421-0995","authenticated-orcid":false,"given":"Sofia","family":"Francisco","sequence":"additional","affiliation":[{"name":"Lus&#x00F3;fona University&#x002F;HEI-Lab: Digital Human-Environment Interaction Lab, Lisboa, Portugal"}]},{"given":"Sidclay","family":"Souza","sequence":"additional","affiliation":[{"name":"Faculdad de Ci&#x00EA;ncias de la Salud, Universidad Cat&#x00F3;lica del Maule, Maule, Chile"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2058-693X","authenticated-orcid":false,"given":"Ricardo","family":"Ribeiro","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto de Engenharia de Sistemas e Computadores, Investiga&#x00E7;&#x00E3;o e Desenvolvimento em Lisboa, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0005-8299","authenticated-orcid":false,"given":"Jo\u00e3o P.","family":"Carvalho","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto de Engenharia de Sistemas e Computadores, Investiga&#x00E7;&#x00E3;o e Desenvolvimento em Lisboa, Lisboa, Portugal"}]},{"given":"Paula","family":"Paulino","sequence":"additional","affiliation":[{"name":"CICPSI, Faculdade de Psicologia, Universidade de Lisboa, Alameda da Universidade, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5874-6313","authenticated-orcid":false,"given":"Isabel","family":"Trancoso","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto de Engenharia de Sistemas e Computadores, Investiga&#x00E7;&#x00E3;o e Desenvolvimento em Lisboa, Lisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3652-5573","authenticated-orcid":false,"given":"Ana Margarida","family":"Veiga-Sim\u00e3o","sequence":"additional","affiliation":[{"name":"CICPSI, Faculdade de Psicologia, Universidade de Lisboa, Alameda da Universidade, Lisboa, Portugal"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/n19-1144"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.01.022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.09.040"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5093\/psed2021a11"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.10.045"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-021-09852-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/1541204006286288"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2009.08.007"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.02.016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818784870"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/01463373.2013.860906"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S19-2007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W19-3510"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-1101"},{"key":"ref17","first-page":"19","article-title":"Detecting hate speech on the world wide web","volume-title":"Proc. 2nd Workshop Lang. Social Media, Assoc. Comput. Linguistics","author":"Warner"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3232676"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.14991"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.396"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3098979"},{"key":"ref23","first-page":"161","article-title":"Conflict, aggression, and cyberbul-lying","volume-title":"Social Psychology: How Other People Influence our Thoughts and Actions","author":"Karwoski","year":"2017"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1177\/0143831x09336557"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/02678370701705810"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-015-2563-y"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.psi.2015.12.002"},{"key":"ref28","first-page":"2798","article-title":"An Italian Twitter corpus of hate speech against immigrants","volume-title":"Proc. 11th Int. Conf. Lang. Resour. Eval.","author":"Sanguinetti"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/taffc.2017.2761757"},{"key":"ref30","first-page":"1","article-title":"Detecting the presence of cyberbullying using computer soft-ware","volume-title":"Proc. 3rd Annu. ACM Web Sci. Conf.","author":"Bayzick"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/asonam.2016.7752233"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2016.07.002"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016910408"},{"key":"ref34","first-page":"672","article-title":"Detection and fine-grained classification of cyberbullying events","volume-title":"Proc. Int. Conf. Recent Adv. Natural Lang. Process.","author":"Van Hee"},{"key":"ref35","first-page":"23","article-title":"Improved cyberbullying detection using gender information","volume-title":"Proc. 12th Dutch-Belg. IR Workshop","author":"Dadvar"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2661126.2661133"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/eit.2015.7293405"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/icmla.2011.152"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/taffc.2016.2531682"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2849567"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-acl.80"},{"key":"ref42","first-page":"49","article-title":"Cyberbullying detection based on text-stream classification","volume-title":"Proc. 11th Australas. Data Mining Conf.","author":"Nahar"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091487"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.051"},{"key":"ref45","volume-title":"The Annual Bullying Survey 2017","year":"2017"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.07.050"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/icacci.2015.7275970"},{"key":"ref48","first-page":"238","article-title":"An effective approach for cyberbullying detection","volume":"3","author":"Nahar","year":"2014","journal-title":"Commun. Inf. Sci. Manage. Eng."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/fuzz-ieee.2018.8491557"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2018.8489211"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/asonam.2016.7752342"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09823-4_45"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007733"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-020-09509-1"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.4000\/books.aaccademia.3085"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/w18-5107"},{"key":"ref58","first-page":"89","article-title":"Results of the poleval 2019 shared task 6: First dataset and open shared task for automatic cyberbullying detection in Polish Twitter","volume-title":"Proc. PolEval Workshop","author":"Ptaszynski"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-emnlp.242"},{"key":"ref60","first-page":"867","article-title":"CyberAgressionAdo-v1: A dataset of annotated online aggressions in French collected through a role-playing game","volume-title":"Proc. Lang. Resour. Eval. Conf.","author":"Ollagnier"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-020-09502-8"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102524"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1080\/03075079.2017.1307818"},{"key":"ref64","first-page":"143","article-title":"Family and school: Perspectives on the use of technology and security","volume":"5","author":"Veiga-Sim\u00e3o","year":"2017","journal-title":"Revista de Estud. e Investigaci\u00f3n en Psicolog\u00eda y Educaci\u00f3n"},{"key":"ref65","first-page":"313","article-title":"Content analysis and narrative analysis","volume-title":"Handbook of Research Methods in Social and Personality Psychology","author":"Smith","year":"2000"},{"key":"ref66","first-page":"301","article-title":"A t\u00e9cnica de an\u00e1lise de conte\u00fado","volume-title":"Manual de Investiga\u00e7\u00e3o Qualitativa em Educa\u00e7\u00e3o","author":"Amado","year":"2014"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"ref68","first-page":"275","article-title":"Expanding a database of Portuguese tweets","volume":"38","author":"Brogueira","year":"2014","journal-title":"Open Access Ser. Inform."},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.08.001"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1196\/annals.1385.022"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2012.682358"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1002\/ab.21440"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61377-8_28"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"key":"ref77","article-title":"Aggression-annotated corpus of Hindi-English code-mixed data","author":"Kumar","year":"2018"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.4324\/9780203084601"},{"key":"ref79","first-page":"6193","article-title":"I Feel Offended, Don\u2019t Be Abusive! Implicit\/Explicit Messages in Offensive and Abusive Language","volume-title":"Proc. 12th Lang. Resour. Eval. Conf.","author":"Caselli"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195152968.001.0001"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.4324\/9780203861554-17"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.4324\/9780203701249"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K16-1017"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/p17-2036"}],"container-title":["IEEE Transactions on Affective Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/5165369\/11152495\/10804011.pdf?arnumber=10804011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T05:18:31Z","timestamp":1757135911000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10804011\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":83,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/taffc.2024.3518587","relation":{},"ISSN":["1949-3045","2371-9850"],"issn-type":[{"value":"1949-3045","type":"electronic"},{"value":"2371-9850","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}