{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T01:58:41Z","timestamp":1774144721787,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T00:00:00Z","timestamp":1367452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["916152"],"award-info":[{"award-number":["916152"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,2]]},"DOI":"10.1145\/2464464.2464499","type":"proceedings-article","created":{"date-parts":[[2013,7,16]],"date-time":"2013-07-16T14:06:58Z","timestamp":1373983618000},"page":"195-204","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":87,"title":["Detecting cyberbullying"],"prefix":"10.1145","author":[{"given":"April","family":"Kontostathis","sequence":"first","affiliation":[{"name":"Ursinus College, Collegeville PA"}]},{"given":"Kelly","family":"Reynolds","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem PA"}]},{"given":"Andy","family":"Garron","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD"}]},{"given":"Lynne","family":"Edwards","sequence":"additional","affiliation":[{"name":"Ursinus College, Collegeville PA"}]}],"member":"320","published-online":{"date-parts":[[2013,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1796408"},{"key":"e_1_3_2_1_2_1","volume-title":"irlba","author":"Baglama J.","year":"2011","unstructured":"Baglama, J. and L. Reichel (2011). irlba. http:\/\/illposed.net\/irlba.html"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1137\/1037127"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1775059.1775062"},{"key":"e_1_3_2_1_6_1","volume-title":"Modeling the Detection of Textual Cyberbullying. Thesis","author":"Dinakar R.","year":"2011","unstructured":"Dinakar, K; Reichart, R.; Lieberman, H. (2011). Modeling the Detection of Textual Cyberbullying. Thesis. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.213"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2004.11.007"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415150305"},{"key":"e_1_3_2_1_10_1","first-page":"103","volume-title":"Proceedings of the Tenth Text Retrieval Conference (TREC-10)","author":"Ogilvie P.","year":"2002","unstructured":"Ogilvie, P. and J. Callan (2002). Experiments Using the Lemur Toolkit, In Proceedings of the Tenth Text Retrieval Conference (TREC-10), pages 103--108"},{"key":"e_1_3_2_1_11_1","volume-title":"Bullies move beyond the schoolyard","author":"Patchin J.","year":"2006","unstructured":"Patchin, J. and S. Hinduja. (2006). Bullies move beyond the schoolyard; a preliminary look at cyberbullying. Youth violence and juvenile justice. 4:2, 148--16"},{"key":"e_1_3_2_1_12_1","volume-title":"July). PC Magazine Online","author":"Magazine","year":"2011","unstructured":"PC Magazine. (2011). Study: A Quarter of Parents Say Their Child Involved in Cyberbullying.(2011, July). PC Magazine Online. Academic OneFile. Web."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/539927"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1396222"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2382029.2382139"},{"key":"e_1_3_2_1_18_1","volume-title":"Detection of Harassment on Web 2.0 in CAW 2.0 '09: Proceedings of the 1st Content Analysis in Web 2.0 Workshop","author":"Yin Z.","year":"2009","unstructured":"Yin, Z. Xue, L. Hong, B. D. Davison, A. Kontostathis, and L. Edwards. (2009). Detection of Harassment on Web 2.0 in CAW 2.0 '09: Proceedings of the 1st Content Analysis in Web 2.0 Workshop, Madrid, Spain."}],"event":{"name":"WebSci '13: Web Science 2013","location":"Paris France","acronym":"WebSci '13","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 5th Annual ACM Web Science Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2464464.2464499","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2464464.2464499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T01:41:20Z","timestamp":1774143680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2464464.2464499"}},"subtitle":["query terms and techniques"],"short-title":[],"issued":{"date-parts":[[2013,5,2]]},"references-count":18,"alternative-id":["10.1145\/2464464.2464499","10.1145\/2464464"],"URL":"https:\/\/doi.org\/10.1145\/2464464.2464499","relation":{},"subject":[],"published":{"date-parts":[[2013,5,2]]},"assertion":[{"value":"2013-05-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}