{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T19:15:52Z","timestamp":1772046952727,"version":"3.50.1"},"publisher-location":"New York, New York, USA","reference-count":29,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"H2020-MSCA-RISE of the European Union","award":["691025"],"award-info":[{"award-number":["691025"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1145\/3041021.3053890","type":"proceedings-article","created":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T18:39:25Z","timestamp":1515695965000},"page":"1285-1290","source":"Crossref","is-referenced-by-count":60,"title":["Measuring #GamerGate"],"prefix":"10.1145","author":[{"given":"Despoina","family":"Chatzakou","sequence":"first","affiliation":[{"name":"Aristotle University of Thessaloniki, Thessaloniki, Greece"}]},{"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Athena","family":"Vakali","sequence":"additional","affiliation":[{"name":"Aristotle University of Thessaloniki, Thessaloniki, Greece"}]}],"member":"320","reference":[{"key":"key-10.1145\/3041021.3053890-1","unstructured":"Anonymous. \"i dated zoe quinn\". 4chan. https:\/\/archive.is\/qrS5Q."},{"key":"key-10.1145\/3041021.3053890-2","unstructured":"Anonymous. Zoe Quinn, prominent SJW and indie developer is a liar and a slut. 4chan. https:\/\/archive.is\/QIjm3."},{"key":"key-10.1145\/3041021.3053890-3","unstructured":"D. Chatzakou, N. Kourtellis, J. Blackburn, E. D. Cristofaro, G. Stringhini, and A. Vakali. Mean Birds: Detecting Aggression and Bullying on Twitter. arXiv preprint, arXiv:1702.06877, 2017."},{"key":"key-10.1145\/3041021.3053890-4","doi-asserted-by":"crossref","unstructured":"D. Chatzakou, V. A. Koutsonikola, A. Vakali, and K. Kafetsios. Micro-blogging content analysis via emotionally-driven clustering. In ACII, 2013.","DOI":"10.1109\/ACII.2013.68"},{"key":"key-10.1145\/3041021.3053890-5","doi-asserted-by":"crossref","unstructured":"C. Chen, J. Zhang, X. Chen, Y. Xiang, and W. Zhou. 6 million spam tweets: A large ground truth for timely Twitter spam detection. In IEEE ICC, 2015.","DOI":"10.1109\/ICC.2015.7249453"},{"key":"key-10.1145\/3041021.3053890-6","doi-asserted-by":"crossref","unstructured":"Y. Chen, Y. Zhou, S. Zhu, and H. Xu. Detecting Offensive Language in Social Media to Protect Adolescent Online Safety. In PASSAT and SocialCom, 2012.","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"key-10.1145\/3041021.3053890-7","doi-asserted-by":"crossref","unstructured":"K. Dinakar, R. Reichart, and H. Lieberman. Modeling the detection of textual cyberbullying. The Social Mobile Web, 11, 2011.","DOI":"10.1609\/icwsm.v5i3.14209"},{"key":"key-10.1145\/3041021.3053890-8","doi-asserted-by":"crossref","unstructured":"N. Djuric, J. Zhou, R. Morris, M. Grbovic, V. Radosavljevic, and N. Bhamidipati. Hate Speech Detection with Comment Embeddings. In WWW, 2015.","DOI":"10.1145\/2740908.2742760"},{"key":"key-10.1145\/3041021.3053890-9","doi-asserted-by":"crossref","unstructured":"M. Giatsoglou, D. Chatzakou, N. Shah, A. Beutel, C. Faloutsos, and A. Vakali. Nd-sync: Detecting synchronized fraud activities. In Advances in Knowledge Discovery and Data Mining, 19th Pacific-Asia Conference, 2015.","DOI":"10.1007\/978-3-319-18032-8_16"},{"key":"key-10.1145\/3041021.3053890-10","unstructured":"A. Go, R. Bhayani, and L. Huang. Twitter sentiment classification using distant supervision. Processing, 2009."},{"key":"key-10.1145\/3041021.3053890-11","doi-asserted-by":"crossref","unstructured":"J. Guberman and L. Hemphill. Challenges in modifying existing scales for detecting harassment in individual tweets. In System Sciences, 2017.","DOI":"10.24251\/HICSS.2017.267"},{"key":"key-10.1145\/3041021.3053890-12","unstructured":"A. Hern. Feminist critics of video games facing threats in 'gamergate' campaign. The Guardian, Oct 2014. https:\/\/www.theguardian.com\/technology\/2014\/oct\/23\/felicia-days-public-details-online-gamergate."},{"key":"key-10.1145\/3041021.3053890-13","unstructured":"G. E. Hine, J. Onaolapo, E. De Cristofaro, N. Kourtellis, I. Leontiadis, R. Samaras, G. Stringhini, and J. Blackburn. A longitudinal measurement study of 4chan's politically incorrect forum and its effect on the web. arXiv preprint arXiv:1610.03452, 2016."},{"key":"key-10.1145\/3041021.3053890-14","doi-asserted-by":"crossref","unstructured":"H. Hosseinmardi, R. Han, Q. Lv, S. Mishra, and A. Ghasemianlangroodi. Towards understanding cyberbullying behavior in a semi-anonymous social network. In IEEE\/ACM ASONAM, 2014.","DOI":"10.1109\/ASONAM.2014.6921591"},{"key":"key-10.1145\/3041021.3053890-15","doi-asserted-by":"crossref","unstructured":"H. Hosseinmardi, S. A. Mattson, R. I. Rafiq, R. Han, Q. Lv, and S. Mishra. Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network. In SocInfo, 2015.","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"key-10.1145\/3041021.3053890-16","doi-asserted-by":"crossref","unstructured":"I. Kayes, N. Kourtellis, D. Quercia, A. Iamnitchi, and F. Bonchi. The Social World of Content Abusers in Community Question Answering. In WWW, 2015.","DOI":"10.1145\/2736277.2741674"},{"key":"key-10.1145\/3041021.3053890-17","doi-asserted-by":"crossref","unstructured":"A. Massanari.#gamergate and the fappening: How reddit's algorithm, governance, and culture support toxic technocultures. New Media &#38; Society, 2015.","DOI":"10.1177\/1461444815608807"},{"key":"key-10.1145\/3041021.3053890-18","doi-asserted-by":"crossref","unstructured":"T. E. Mortensen. Anger, fear, and games. Games and Culture, 2016.","DOI":"10.1177\/1555412016640408"},{"key":"key-10.1145\/3041021.3053890-19","doi-asserted-by":"crossref","unstructured":"G. Navarro. A Guided Tour to Approximate String Matching. ACM Comput. Surv., 33(1), 2001.","DOI":"10.1145\/375360.375365"},{"key":"key-10.1145\/3041021.3053890-20","doi-asserted-by":"crossref","unstructured":"C. Nobata, J. Tetreault, A. Thomas, Y. Mehdad, and Y. Chang. Abusive Language Detection in Online User Content. In WWW, 2016.","DOI":"10.1145\/2872427.2883062"},{"key":"key-10.1145\/3041021.3053890-21","unstructured":"Pham, Sherisse. Twitter tries new measures in crackdown on harassment. CNNtech, February 2017. http:\/\/money.cnn.com\/2017\/02\/07\/technology\/twitter-combat-harassment-features\/."},{"key":"key-10.1145\/3041021.3053890-22","unstructured":"Twitter trolls are now abusing the company's bottom line. http:\/\/www.salon.com\/2016\/10\/19\/twitter-trolls-are-now-abusing-the-companys-bottom-line\/, 2016."},{"key":"key-10.1145\/3041021.3053890-23","unstructured":"H. Sanchez and S. Kumar. Twitter bullying detection. ser. NSDI, 12, 2011."},{"key":"key-10.1145\/3041021.3053890-24","doi-asserted-by":"crossref","unstructured":"G. Stringhini, C. Kruegel, and G. Vigna. Detecting spammers on social networks. In ACSAC, 2010.","DOI":"10.1145\/1920261.1920263"},{"key":"key-10.1145\/3041021.3053890-25","unstructured":"A. Sulleyman. Twitter temporarily limiting users for abusive behaviour. Independent, February 2017. https:\/\/www.theguardian.com\/technology\/2014\/oct\/23\/felicia-days-public-details-online-gamergate."},{"key":"key-10.1145\/3041021.3053890-26","unstructured":"The Guardian. Did trolls cost Twitter 3.5bn and its sale? https:\/\/www.theguardian.com\/technology\/2016\/oct\/18\/did-trolls-cost-twitter-35bn, 2016."},{"key":"key-10.1145\/3041021.3053890-27","unstructured":"C. Van Hee, E. Lefever, B. Verhoeven, J. Mennes, B. Desmet, G. De Pauw, W. Daelemans, and V. Hoste. Automatic detection and prevention of cyberbullying. In Human and Social Analytics, 2015."},{"key":"key-10.1145\/3041021.3053890-28","unstructured":"A. H. Wang. Don't follow me: Spam detection in Twitter. In SECRYPT, 2010."},{"key":"key-10.1145\/3041021.3053890-29","unstructured":"N. Wingfield. Feminist critics of video games facing threats in 'gamergate' campaign. New York Times, Oct 2014. https:\/\/www.nytimes.com\/2014\/10\/16\/technology\/gamergate-women-video-game-threats-anita-sarkeesian.html."}],"event":{"name":"the 26th International Conference","location":"Perth, Australia","acronym":"WWW '17 Companion","number":"26","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"start":{"date-parts":[[2017,4,3]]},"end":{"date-parts":[[2017,4,7]]}},"container-title":["Proceedings of the 26th International Conference on World Wide Web Companion - WWW '17 Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041021.3053890","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3053890&ftid=1865280&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:18Z","timestamp":1750215798000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3041021.3053890"}},"subtitle":["A Tale of Hate, Sexism, and Bullying"],"proceedings-subject":"World Wide Web Companion","short-title":[],"issued":{"date-parts":[[2017]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1145\/3041021.3053890","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}