{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:34Z","timestamp":1750221154380,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":21,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3184558.3191594","type":"proceedings-article","created":{"date-parts":[[2018,4,18]],"date-time":"2018-04-18T18:04:25Z","timestamp":1524074665000},"page":"1465-1468","source":"Crossref","is-referenced-by-count":5,"title":["Do Violent People Smile"],"prefix":"10.1145","author":[{"given":"Mauro","family":"Coletto","sequence":"first","affiliation":[{"name":"Ca' Foscari University, Venice, Italy"}]},{"given":"Claudio","family":"Lucchese","sequence":"additional","affiliation":[{"name":"Ca' Foscari University, Venice, Italy"}]},{"given":"Salvatore","family":"Orlando","sequence":"additional","affiliation":[{"name":"Ca' Foscari University, Venice, Italy"}]}],"member":"320","reference":[{"doi-asserted-by":"crossref","unstructured":"Mohammed Ali Al-garadi, Kasturi Dewi Varathan, and Sri Devi Ravana. 2016. Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network. Computers in Human Behavior 63(2016), 433--443.","key":"key-10.1145\/3184558.3191594-1","DOI":"10.1016\/j.chb.2016.05.051"},{"doi-asserted-by":"crossref","unstructured":"Saeideh Bakhshi, David A Shamma, and Eric Gilbert. 2014. Faces engage us: Photos with faces attract more likes and comments on instagram. In ACM Human factors in computing systems. 965--974.","key":"key-10.1145\/3184558.3191594-2","DOI":"10.1145\/2556288.2557403"},{"unstructured":"Alessandro Bessi, Mauro Coletto, George Alexandru Davidescu, Antonio Scala, Guido Caldarelli, and Walter Quattrociocchi. 2015. Science vs conspiracy: Collective narratives in the age of misinformation. PloS one 10, 2 (2015), e0118093.","key":"key-10.1145\/3184558.3191594-3"},{"doi-asserted-by":"crossref","unstructured":"Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Detecting Aggressors and Bullies on Twitter. In Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 767--768.","key":"key-10.1145\/3184558.3191594-4","DOI":"10.1145\/3041021.3054211"},{"doi-asserted-by":"crossref","unstructured":"Mauro Coletto, Claudio Lucchese, Cristina Ioana Muntean, Franco Maria Nardini, Andrea Esuli, Chiara Renso, and Raffaele Perego. 2016. Sentiment-enhanced Multidimensional Analysis of Online Social Networks: Perception of the Mediterranean Refugees Crisis. In ASONAM 2016.","key":"key-10.1145\/3184558.3191594-5","DOI":"10.1109\/ASONAM.2016.7752401"},{"unstructured":"M Coletto, C Lucchese, S Orlando, and R Perego. 2015. Electoral Predictions with Twitter: a Machine-Learning approach. In IIR 2015, Cagliari, Italy.","key":"key-10.1145\/3184558.3191594-6"},{"doi-asserted-by":"crossref","unstructured":"Maral Dadvar, Dolf Trieschnigg, Roeland Ordelman, and Franciska de Jong. 2013. Improving cyberbullying detection with user context. In European Conference on Information Retrieval. Springer, 693--696.","key":"key-10.1145\/3184558.3191594-7","DOI":"10.1007\/978-3-642-36973-5_62"},{"doi-asserted-by":"crossref","unstructured":"Thomas Davidson, Dana Warmsley, Michael Macy, and Ingmar Weber. 2017. Automated Hate Speech Detection and the Problem of Offensive Language. ICWSM 2017 (2017).","key":"key-10.1145\/3184558.3191594-8","DOI":"10.1609\/icwsm.v11i1.14955"},{"doi-asserted-by":"crossref","unstructured":"Julia Deeb-Swihart, Christopher Polack, Eric Gilbert, and Irfan A Essa. 2017. Selfie-Presentation in Everyday Life: A Large-Scale Characterization of Selfie Contexts on Instagram. In ICWSM. 42--51.","key":"key-10.1145\/3184558.3191594-9","DOI":"10.1609\/icwsm.v11i1.14896"},{"unstructured":"Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. The Social Mobile Web 11, 02 (2011).","key":"key-10.1145\/3184558.3191594-10"},{"doi-asserted-by":"crossref","unstructured":"Qianjia Huang, Vivek Kumar Singh, and Pradeep Kumar Atrey. 2014. Cyber Bullying Detection Using Social and Textual Analysis. In Intl. Workshop on SociallyAware Multimedia, ACM SAM 2014. 3--6.","key":"key-10.1145\/3184558.3191594-11","DOI":"10.1145\/2661126.2661133"},{"doi-asserted-by":"crossref","unstructured":"Vasileios Lampos, Tijl De Bie, and Nello Cristianini. 2010. Flu detector-tracking epidemics on Twitter. In Machine Learning and Knowledge Discovery in Databases. Springer, 599--602.","key":"key-10.1145\/3184558.3191594-12","DOI":"10.1007\/978-3-642-15939-8_42"},{"unstructured":"Parma Nand, Rivindu Perera, and Abhijeet Kasture. [n. d.]. --How Bullying is this Message--: A Psychometric Thermometer for Bullying. ([n. d.]).","key":"key-10.1145\/3184558.3191594-13"},{"doi-asserted-by":"crossref","unstructured":"Desmond Upton Patton, Robert D Eschmann, and Dirk A Butler. 2013. Internet banging: New trends in social media, gang violence, masculinity and hip hop. Computers in Human Behavior 29, 5 (2013), A54--A59.","key":"key-10.1145\/3184558.3191594-14","DOI":"10.1016\/j.chb.2012.12.035"},{"doi-asserted-by":"crossref","unstructured":"Anna Schmidt and Michael Wiegand. 2017. A Survey on Hate Speech Detection using Natural Language Processing. SocialNLP 2017 (2017).","key":"key-10.1145\/3184558.3191594-15","DOI":"10.18653\/v1\/W17-1101"},{"doi-asserted-by":"crossref","unstructured":"Vivek K Singh, Qianjia Huang, and Pradeep K Atrey. [n. d.]. Cyberbullying detection using probabilistic socio-textual information fusion. In IEEE\/ACM ASOMAN 2016. 884--887.","key":"key-10.1145\/3184558.3191594-16","DOI":"10.1109\/ASONAM.2016.7752342"},{"doi-asserted-by":"crossref","unstructured":"A Squicciarini, S Rajtmajer, Y Liu, and Christopher Griffin. 2015. Identification and characterization of cyberbullying dynamics in an online social network. In IEEE\/ACM ASOMAN 2015. 280--285.","key":"key-10.1145\/3184558.3191594-17","DOI":"10.1145\/2808797.2809398"},{"unstructured":"Wenbo Wang, Lu Chen, Krishnaprasad Thirunarayan, and Amit P Sheth. 2014. Cursing in english on twitter. In ACM conf. on Computer supported cooperative work &#38; social computing. ACM, 415--425.","key":"key-10.1145\/3184558.3191594-18"},{"unstructured":"Quanzeng You, Dar&#237;o Garc&#237;a-Garc&#237;a, Mahohar Paluri, Jiebo Luo, and Jungseock Joo. 2017. Cultural Diffusion and Trends in Facebook Photographs. ICWSM 2017 (2017).","key":"key-10.1145\/3184558.3191594-19"},{"doi-asserted-by":"crossref","unstructured":"Changtao Zhong, Hau-wen Chan, Dmytro Karamshu, Dongwon Lee, and Nishanth Sastry. 2017. Wearing Many (Social) Hats: How Different are Your Different Social Network Personae ICWSM 2017 (2017).","key":"key-10.1145\/3184558.3191594-20","DOI":"10.1609\/icwsm.v11i1.14897"},{"unstructured":"Erjin Zhou, Zhimin Cao, and Qi Yin. 2015. Naive-deep face recognition: Touching the limit of LFW benchmark or not arXiv preprint arXiv:1501.04690 (2015).015).","key":"key-10.1145\/3184558.3191594-21"}],"event":{"number":"2018","sponsor":["IW3C2, International World Wide Web Conference Committee","SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"acronym":"WWW '18","name":"Companion of the The Web Conference 2018","start":{"date-parts":[[2018,4,23]]},"location":"Lyon, France","end":{"date-parts":[[2018,4,27]]}},"container-title":["Companion of the The Web Conference 2018 on The Web Conference 2018 - WWW '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3184558.3191594","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3191594&ftid=1958388&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:31Z","timestamp":1750208911000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3184558.3191594"}},"subtitle":["Social Media Analysis of their Profile Pictures"],"proceedings-subject":"The Web Conference 2018","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1145\/3184558.3191594","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}