{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T18:01:14Z","timestamp":1771524074990,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,5,5]],"date-time":"2012-05-05T00:00:00Z","timestamp":1336176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,5,5]]},"DOI":"10.1145\/2207676.2208610","type":"proceedings-article","created":{"date-parts":[[2012,5,7]],"date-time":"2012-05-07T18:47:53Z","timestamp":1336416473000},"page":"1481-1490","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":77,"title":["Profanity use in online communities"],"prefix":"10.1145","author":[{"given":"Sara","family":"Sood","sequence":"first","affiliation":[{"name":"Pomona College, Claremont, CA, USA"}]},{"given":"Judd","family":"Antin","sequence":"additional","affiliation":[{"name":"Yahoo! Research, Santa Clara, California, United States"}]},{"given":"Elizabeth","family":"Churchill","sequence":"additional","affiliation":[{"name":"Yahoo! Research, Santa Clara, California, United States"}]}],"member":"320","published-online":{"date-parts":[[2012,5,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The New York Times, 2011","author":"Boyd D.","year":"2011","unstructured":"Boyd , D. and Marwick , A . Why Cyberbullying Rhetoric Misses the Mark . The New York Times, 2011 . http:\/\/www.nytimes.com\/ 2011 \/09\/23\/opinion\/whycyberbullying-rhetoric-misses-the-mark.html. Boyd, D. and Marwick, A. Why Cyberbullying Rhetoric Misses the Mark. The New York Times, 2011. http:\/\/www.nytimes.com\/2011\/09\/23\/opinion\/whycyberbullying-rhetoric-misses-the-mark.html."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing","author":"Callison-Burch C.","year":"2009","unstructured":"Callison-Burch , C. Fast , cheap, and creative : evaluating translation quality using Amazon's Mechanical Turk . Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing , ( 2009 ). Callison-Burch, C. Fast, cheap, and creative: evaluating translation quality using Amazon's Mechanical Turk. Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing, (2009)."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of International AAAI Conference on Weblogs and Social Media, Workshop \"Social Mobile Web,\"","author":"Dinakar K.","year":"2011","unstructured":"Dinakar , K. , Reichart , R. , and Lieberman , H . Modeling the Detection of Textual Cyberbullying . Proceedings of International AAAI Conference on Weblogs and Social Media, Workshop \"Social Mobile Web,\" ( 2011 ). Dinakar, K., Reichart, R., and Lieberman, H. Modeling the Detection of Textual Cyberbullying. Proceedings of International AAAI Conference on Weblogs and Social Media, Workshop \"Social Mobile Web,\" (2011)."},{"key":"e_1_3_2_1_4_1","volume-title":"Finding Naked People. European Conference on Computer Vision II","author":"Fleck M. M.","year":"1996","unstructured":"Fleck , M. M. , Forsyth , D. A. , and Bregler , C . Finding Naked People. European Conference on Computer Vision II , ( 1996 ), 592--602. Fleck, M. M., Forsyth, D. A., and Bregler, C. Finding Naked People. European Conference on Computer Vision II, (1996), 592--602."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.34"},{"key":"e_1_3_2_1_6_1","first-page":"7","volume":"291","author":"Haninger K.","year":"2004","unstructured":"Haninger , K. and Thompson , K. M . Content and Ratings of Teen-Rated Video Games. JAMA: The Journal of the American Medical Association 291 , 7 ( 2004 ), 856--865. Haninger, K. and Thompson, K. M. Content and Ratings of Teen-Rated Video Games. JAMA: The Journal of the American Medical Association 291, 7 (2004), 856--865.","journal-title":"Content and Ratings of Teen-Rated Video Games. JAMA: The Journal of the American Medical Association"},{"key":"e_1_3_2_1_7_1","first-page":"4","article-title":"Good clean fun? A content analysis of profanity in video games and its prevalence across game systems and ratings. Cyberpsychology & Behavior: The Impact of the Internet","volume":"12","author":"Ivory J. D.","year":"2009","unstructured":"Ivory , J. D. , Williams , D. , Martins , N. , and Consalvo , M . Good clean fun? A content analysis of profanity in video games and its prevalence across game systems and ratings. Cyberpsychology & Behavior: The Impact of the Internet , Multimedia and Virtual Reality on Behavior and Society 12 , 4 ( 2009 ), 457--460. Ivory, J. D., Williams, D., Martins, N., and Consalvo, M. Good clean fun? A content analysis of profanity in video games and its prevalence across game systems and ratings. Cyberpsychology & Behavior: The Impact of the Internet, Multimedia and Virtual Reality on Behavior and Society 12, 4 (2009), 457--460.","journal-title":"Multimedia and Virtual Reality on Behavior and Society"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/352925.352950"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189740.1189741"},{"key":"e_1_3_2_1_10_1","volume-title":"Machine Learning","author":"Joachims T.","year":"1998","unstructured":"Joachims , T. Text categorization with Support Vector Machines: Learning with many relevant features . In C. N\u00e9dellec and C. Rouveirol, eds., Machine Learning : ECML- Springer-Verlag , Berlin\/ Heidelberg , 1998 , 137--142. Joachims, T. Text categorization with Support Vector Machines: Learning with many relevant features. In C. N\u00e9dellec and C. Rouveirol, eds., Machine Learning: ECML- Springer-Verlag, Berlin\/Heidelberg, 1998, 137--142."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013200319198"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871840.1871853"},{"key":"e_1_3_2_1_13_1","first-page":"8","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"Levenshtein V. I","year":"1966","unstructured":"Levenshtein , V. I . Binary codes capable of correcting deletions, insertions, and reversals . Soviet Physics Doklady 10 , 8 ( 1966 ), 707--710. Levenshtein, V. I. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady 10, 8 (1966), 707--710.","journal-title":"Soviet Physics Doklady"},{"key":"e_1_3_2_1_14_1","first-page":"2","article-title":"Cyberbullying","volume":"27","author":"Li Q","year":"2006","unstructured":"Li , Q . Cyberbullying in Schools. School Psychology International 27 , 2 ( 2006 ), 157 -170. Li, Q. Cyberbullying in Schools. School Psychology International 27, 2 (2006), 157 -170.","journal-title":"Schools. School Psychology International"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1700527.1700681"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2021109.2021119"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401965"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772781"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21690"},{"key":"e_1_3_2_1_20_1","volume-title":"IN PROC. IAAI","author":"Spertus E.","year":"1997","unstructured":"Spertus , E. Smokey : Automatic Recognition of Hostile Messages . IN PROC. IAAI , ( 1997 ), 1058--1065. Spertus, E. Smokey: Automatic Recognition of Hostile Messages. IN PROC. IAAI, (1997), 1058--1065."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979450"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1866795.1866801"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(98)00203-5"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Content Analysis in the WEB 2.0 (CAW2.0) Workshop at WWW2009","author":"Yin D.","year":"2009","unstructured":"Yin , D. , Xue , Z. , Hong , L. , Davison , B. , Kontostathis , A. , and Edwards , L . Detection of Harassment on Web 2.0 . Proceedings of the Content Analysis in the WEB 2.0 (CAW2.0) Workshop at WWW2009 , ( 2009 ). Yin, D., Xue, Z., Hong, L., Davison, B., Kontostathis, A., and Edwards, L. Detection of Harassment on Web 2.0. Proceedings of the Content Analysis in the WEB 2.0 (CAW2.0) Workshop at WWW2009, (2009)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.129"}],"event":{"name":"CHI '12: CHI Conference on Human Factors in Computing Systems","location":"Austin Texas USA","acronym":"CHI '12","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2207676.2208610","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2207676.2208610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:53Z","timestamp":1750236533000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2207676.2208610"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,5]]},"references-count":25,"alternative-id":["10.1145\/2207676.2208610","10.1145\/2207676"],"URL":"https:\/\/doi.org\/10.1145\/2207676.2208610","relation":{},"subject":[],"published":{"date-parts":[[2012,5,5]]},"assertion":[{"value":"2012-05-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}