{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:46:11Z","timestamp":1770273971256,"version":"3.49.0"},"reference-count":110,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2018,11]]},"abstract":"<jats:p>In Twitter, there is a rising trend in abusive behavior which often leads to incivility. This trend is affecting users mentally and as a result they tend to leave Twitter and other such social networking sites thus depleting the active user base. In this paper, we study factors associated with incivility. We observe that the act of incivility is highly correlated with the opinion differences between the account holder (i.e., the user writing the incivil tweet) and the target (i.e., the user for whom the incivil tweet is meant for or targeted), toward a named entity. We introduce a character level CNN model and incorporate the entity-specific sentiment information for efficient incivility detection which significantly outperforms multiple baseline methods achieving an impressive accuracy of 93.3% (4.9% improvement over the best baseline). In a post-hoc analysis, we also study the behavioral aspects of the targets and account holders and try to understand the reasons behind the incivility incidents. Interestingly, we observe that there are strong signals of repetitions in incivil behavior. In particular, we find that there are a significant fraction of account holders who act as repeat offenders - attacking the targets even more than 10 times. Similarly, there are also targets who get targeted multiple times. In general, the targets are found to have higher reputation scores than the account holders.<\/jats:p>","DOI":"10.1145\/3274386","type":"journal-article","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T21:21:27Z","timestamp":1541107287000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Opinion Conflicts"],"prefix":"10.1145","volume":"2","author":[{"given":"Suman Kalyan","family":"Maity","sequence":"first","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"given":"Aishik","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"McGill University, Montreal, PQ, Canada"}]},{"given":"Pawan","family":"Goyal","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur, Kharagpur, West Bengal, India"}]},{"given":"Animesh","family":"Mukherjee","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Kharagpur, Kharagpur, West Bengal, India"}]}],"member":"320","published-online":{"date-parts":[[2018,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-2905"},{"key":"e_1_2_1_2_1","volume-title":"Life stress, anger and anxiety, and delinquency: An empirical test of general strain theory. Journal of Health and Social Behavior","author":"Aseltine Robert H","year":"2000","unstructured":"Robert H Aseltine Jr, Susan Gore, and Jennifer Gordon. 2000. Life stress, anger and anxiety, and delinquency: An empirical test of general strain theory. Journal of Health and Social Behavior (2000), 256--275."},{"key":"e_1_2_1_3_1","article-title":"Moral panic and alternative identity construction in Usenet","volume":"7","author":"Baker Paul","year":"2001","unstructured":"Paul Baker. 2001. Moral panic and alternative identity construction in Usenet. Journal of Computer-Mediated Communication , Vol. 7, 1 (2001), JCMC711.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Kaspar Beelen Evangelos Kanoulas and Bob van de Velde. 2017. Detecting Controversies in Online News Media (SIGIR '17). 1069--1072. 10.1145\/3077136.3080723","DOI":"10.1145\/3077136.3080723"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"e_1_2_1_6_1","volume-title":"Cyberbullying on the rise","author":"Biancheri Annabella","year":"2016","unstructured":"Annabella Biancheri. 2017. Cyberbullying on the rise; social media to blame. http:\/\/lobbyobserver.org\/lobbyo\/2016\/11\/cyberbullying-on-the-rise-due-to-recent-technological-advances\/. (2017). {Online}."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2011.648988"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134659"},{"key":"e_1_2_1_9_1","unstructured":"BlogXilla. 2013. 8 Of The Most Cyberbullied Celebrities On The Web (LIST). https:\/\/globalgrind.cassiuslife.com\/1969918\/8-most-cyberbullied-celebrities-web-social-media-list\/. (2013). {Online}."},{"key":"e_1_2_1_10_1","unstructured":"Bouke Bommerson. 2015. Machine learning to classify bullying messages on twitter. . https:\/\/www.authorea.com\/users\/40545\/articles\/46776\/_show_article . (2015)."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2584525"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022427897034003001"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2655713.2655714"},{"key":"e_1_2_1_14_1","volume-title":"Trolls just want to have fun. Personality and individual Differences","author":"Buckels Erin E","year":"2014","unstructured":"Erin E Buckels, Paul D Trapnell, and Delroy L Paulhus. 2014. Trolls just want to have fun. Personality and individual Differences , Vol. 67 (2014), 97--102."},{"key":"e_1_2_1_15_1","volume-title":"Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls. Female crime victims: Reality reconsidered","author":"Burgess-Proctor Amanda","year":"2009","unstructured":"Amanda Burgess-Proctor, Justin W Patchin, and Sameer Hinduja. 2009. Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls. Female crime victims: Reality reconsidered (2009), 153--175."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1375\/ajgc.15.1.68"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2007.00242.x"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078714.3078721"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091487"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3053890"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106456"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998213"},{"key":"e_1_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Justin Cheng Cristian Danescu-Niculescu-Mizil and Jure Leskovec. 2014. How community feedback shapes user behavior. In ICWSM .","DOI":"10.1609\/icwsm.v8i1.14518"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1196\/annals.1385.022"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.55.090902.142015"},{"key":"e_1_2_1_27_1","unstructured":"Dan Claredon. 2017. 11 Celebrities Cyberbullied Off Social Media: Ed Sheeran Normani Kordei & More. http:\/\/www.wetpaint.com\/cyberbullied-celebrities-twitter-1507798\/. (2017). {Online}."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/soc5020245"},{"key":"e_1_2_1_29_1","volume-title":"RJF Ordelman, and RB Trieschnigg.","author":"Dadvar Maral","year":"2012","unstructured":"Maral Dadvar, Franciska MG de Jong, RJF Ordelman, and RB Trieschnigg. 2012. Improved cyberbullying detection using gender information. (2012)."},{"key":"e_1_2_1_30_1","unstructured":"Noelle Devoe. 2016. 8 Celebrities Who Have Quit Social Media. https:\/\/www.seventeen.com\/celebrity\/news\/a42328\/celebrities-who-have-quit-social-media\/. (2016). {Online}."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"e_1_2_1_32_1","volume-title":"The Social Mobile Web","volume":"11","author":"Dinakar Karthik","year":"2011","unstructured":"Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. The Social Mobile Web , Vol. 11, 02 (2011)."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742760"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-2009"},{"key":"e_1_2_1_35_1","volume-title":"William Yang Wang, and Elizabeth Belding","author":"ElSherief Mai","year":"2018","unstructured":"Mai ElSherief, Vivek Kulkarni, Dana Nguyen, William Yang Wang, and Elizabeth Belding. 2018a. Hate Lingo: A Target-based Linguistic Analysis of Hate Speech in Social Media. In ICWSM ."},{"key":"e_1_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Mai ElSherief Shirin Nilizadeh Dana Nguyen Giovanni Vigna and Elizabeth Belding. 2018b. Peer to Peer Hate: Hate Speech Instigators and Their Targets. In ICWSM .","DOI":"10.1609\/icwsm.v12i1.15038"},{"key":"e_1_2_1_37_1","unstructured":"Nels Ericson. 2001. Addressing the problem of juvenile bullying .US Department of Justice Office of Justice Programs Office of Juvenile Justice and Delinquency Prevention Washington DC."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.3115\/1219840.1219885"},{"key":"e_1_2_1_39_1","volume-title":"Online Victimization: A Report on the Nation's Youth.","author":"Finkelhor David","year":"2000","unstructured":"David Finkelhor, Kimberly J Mitchell, and Janis Wolak. 2000. Online Victimization: A Report on the Nation's Youth. (2000)."},{"key":"e_1_2_1_40_1","unstructured":"Sharon Florentine. 2016. Twitter needs to stop the harassment. https:\/\/www.cio.com\/article\/3098441\/leadership-management\/twitter-needs-to-stop-the-harassment-leslie-jones.html . (2016). {Online}."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786451.2786459"},{"key":"e_1_2_1_42_1","volume-title":"Cyber-aggression: Definition and concept of cyberbullying. J. of psychologists and counsellors in schools","author":"Grigg Dorothy Wunmi","year":"2010","unstructured":"Dorothy Wunmi Grigg. 2010. Cyber-aggression: Definition and concept of cyberbullying. J. of psychologists and counsellors in schools , Vol. 20, 2 (2010), 143--156."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818052.2869107"},{"key":"e_1_2_1_44_1","unstructured":"Umair Haque. 2016. The Reason Twitter's Losing Active Users. https:\/\/hbr.org\/2016\/02\/the-reason-twitters-losing-active-users . (2016). {Online}."},{"key":"e_1_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Claire Hardaker. 2010. Trolling in asynchronous computer-mediated communication: From user discussions to academic definitions. (2010).","DOI":"10.1515\/jplr.2010.011"},{"key":"e_1_2_1_46_1","volume-title":"Searching for safety online: Managing\" trolling\" in a feminist forum. The information society","author":"Herring Susan","year":"2002","unstructured":"Susan Herring, Kirk Job-Sluder, Rebecca Scheckler, and Sasha Barab. 2002. Searching for safety online: Managing\" trolling\" in a feminist forum. The information society , Vol. 18, 5 (2002), 371--384."},{"key":"e_1_2_1_47_1","unstructured":"S Hinduja and JW Patchin. 2012. School climate 2.0: Reducing teen technology misuse by reshaping the environment. (2012)."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1300\/J202v06n03_06"},{"key":"e_1_2_1_49_1","volume-title":"Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant behavior","author":"Hinduja Sameer","year":"2008","unstructured":"Sameer Hinduja and Justin W Patchin. 2008. Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant behavior , Vol. 29, 2 (2008), 129--156."},{"key":"e_1_2_1_50_1","volume-title":"cyberbullying, and suicide. Archives of suicide research","author":"Hinduja Sameer","year":"2010","unstructured":"Sameer Hinduja and Justin W Patchin. 2010. Bullying, cyberbullying, and suicide. Archives of suicide research , Vol. 14, 3 (2010), 206--221."},{"key":"e_1_2_1_51_1","volume-title":"Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying","author":"Hinduja Sameer","unstructured":"Sameer Hinduja and Justin W Patchin. 2015. Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying (2nd edition) .Thousand Oaks, CA: Sage Publications.","edition":"2"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_2_1_53_1","volume-title":"Deceiving Google's Perspective API Built for Detecting Toxic Comments. arXiv preprint arXiv:1702.08138","author":"Hosseini Hossein","year":"2017","unstructured":"Hossein Hosseini, Sreeram Kannan, Baosen Zhang, and Radha Poovendran. 2017. Deceiving Google's Perspective API Built for Detecting Toxic Comments. arXiv preprint arXiv:1702.08138 (2017)."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/3191835.3191884"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud.2014.87"},{"key":"e_1_2_1_56_1","volume-title":"Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishr.","author":"Hosseinmardi Homa","year":"2015","unstructured":"Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishr. 2015b. Prediction of Cyberbullying Incidents on the Instagram Social Network. arXiv preprint arXiv:1508.06257 (2015)."},{"key":"e_1_2_1_57_1","volume-title":"Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra.","author":"Hosseinmardi Homa","year":"2015","unstructured":"Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015a. Detection of cyberbullying incidents on the instagram social network. arXiv preprint arXiv:1503.03909 (2015)."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1978.43.3.721"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2008.00335.x"},{"key":"e_1_2_1_60_1","volume-title":"How the Internet Has Changed Bullying. https:\/\/www.newyorker.com\/science\/maria-konnikova\/how-the-internet-has-changed-bullying . (2015). {Online","author":"Konnikova Maria","unstructured":"Maria Konnikova. 2015. How the Internet Has Changed Bullying. https:\/\/www.newyorker.com\/science\/maria-konnikova\/how-the-internet-has-changed-bullying . (2015). {Online; The New Yorker}."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2464464.2464499"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.08.017"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/2378740"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702529"},{"key":"e_1_2_1_65_1","unstructured":"Amanda Lenhart. 2007. Cyberbullying and online teens. (2007)."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/1224812.1225103"},{"key":"e_1_2_1_67_1","volume-title":"mbox","author":"Marwick Alice E","year":"2011","unstructured":"Alice E Marwick et almbox. 2011. The drama! Teen conflict, gossip, and bullying in networked publics. (2011)."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815608807"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0047-2352(99)00041-0"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0047-2352(97)00085-8"},{"key":"e_1_2_1_71_1","unstructured":"David McNamee. 2016. Cyberbullying 'causes suicidal thoughts in kids more than traditional bullying'. https:\/\/www.medicalnewstoday.com\/articles\/273788.php . (2016). {Online}."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-3638"},{"key":"e_1_2_1_73_1","first-page":"230","article-title":"Cyberbullying definition and measurement: Some critical considerations","volume":"217","author":"Menesini Ersilia","year":"2009","unstructured":"Ersilia Menesini and Annalaura Nocentini. 2009. Cyberbullying definition and measurement: Some critical considerations. Journal of Psychology , Vol. 217, 4 (2009), 230--232.","journal-title":"Journal of Psychology"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1939-0025.2010.01040.x"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29253-8_75"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.285.16.2094"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883062"},{"key":"e_1_2_1_78_1","volume-title":"Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth violence and juvenile justice","author":"Patchin Justin W","year":"2006","unstructured":"Justin W Patchin and Sameer Hinduja. 2006. Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth violence and juvenile justice , Vol. 4, 2 (2006), 148--169."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1177\/0044118X10366951"},{"key":"e_1_2_1_80_1","volume-title":"An update and synthesis of the research. Cyberbullying prevention and response: Expert perspectives","author":"Patchin Justin W","year":"2012","unstructured":"Justin W Patchin and Sameer Hinduja. 2012. An update and synthesis of the research. Cyberbullying prevention and response: Expert perspectives (2012), 13."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1117"},{"key":"e_1_2_1_82_1","volume-title":"Linguistic inquiry and word count: LIWC","author":"Pennebaker James W","year":"2001","unstructured":"James W Pennebaker, Martha E Francis, and Roger J Booth. 2001. Linguistic inquiry and word count: LIWC 2001. Mahway: Lawrence Erlbaum Associates , Vol. 71 (2001), 2001."},{"key":"e_1_2_1_83_1","first-page":"7","article-title":"Play with Bad Words: A Content Analysis of Profanity in Video Games","volume":"1","author":"Phan Quang Anh","year":"2017","unstructured":"Quang Anh Phan and Vanessa Tan. 2017. Play with Bad Words: A Content Analysis of Profanity in Video Games. Acta Ludica-International Journal of Game Studies , Vol. 1, 1 (2017), 7--30.","journal-title":"Acta Ludica-International Journal of Game Studies"},{"key":"e_1_2_1_84_1","unstructured":"Team Rawhide. 2017. Teen Cyberbullying and Social Media Use on the Rise {INFOGRAPHIC}. http:\/\/www.rawhide.org\/blog\/wellness\/teen-cyberbullying-and-social-media-use-on-the-rise\/. (2017). {Online}."},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","unstructured":"Alan Ritter Sam Clark Mausam and Oren Etzioni. 2011. Named Entity Recognition in Tweets: An Experimental Study. In EMNLP .","DOI":"10.5555\/2145432.2145595"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","unstructured":"Alan Ritter Mausam Oren Etzioni and Sam Clark. 2012. Open Domain Event Extraction from Twitter. In KDD . 10.1145\/2339530.2339704","DOI":"10.1145\/2339530.2339704"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W17-3010"},{"key":"e_1_2_1_89_1","first-page":"15","article-title":"Twitter bullying detection. ser","volume":"12","author":"Sanchez Huascar","year":"2011","unstructured":"Huascar Sanchez and Shreyas Kumar. 2011. Twitter bullying detection. ser. NSDI , Vol. 12 (2011), 15--15.","journal-title":"NSDI"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.2105\/AJPH.2011.300308"},{"key":"e_1_2_1_91_1","first-page":"735","article-title":"Bullying and victimization: Prevalence and relationship to gender, grade level, ethnicity, self-esteem, and depression","volume":"38","author":"Seals Dorothy","year":"2003","unstructured":"Dorothy Seals and Jerry Young. 2003. Bullying and victimization: Prevalence and relationship to gender, grade level, ethnicity, self-esteem, and depression. Adolescence , Vol. 38, 152 (2003), 735.","journal-title":"Adolescence"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551510365390"},{"key":"e_1_2_1_93_1","unstructured":"Leandro Ara\u00fajo Silva Mainack Mondal Denzil Correa Fabr'icio Benevenuto and Ingmar Weber. 2016. Analyzing the Targets of Hate in Online Social Media.. In ICWSM. 687--690."},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","unstructured":"Vivek K Singh Marie L Radford Qianjia Huang and Susan Furrer. 2017. \" They basically like destroyed the school one day\": On Newer App Features and Cyberbullying in Schools.. In CSCW. 1210--1216. 10.1145\/2998181.2998279","DOI":"10.1145\/2998181.2998279"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"e_1_2_1_96_1","volume-title":"Effective LSTMs for Target-Dependent Sentiment Classification. arXiv preprint arXiv:1512.01100","author":"Tang Duyu","year":"2015","unstructured":"Duyu Tang, Bing Qin, Xiaocheng Feng, and Ting Liu. 2015. Effective LSTMs for Target-Dependent Sentiment Classification. arXiv preprint arXiv:1512.01100 (2015)."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"e_1_2_1_98_1","volume-title":"International Conference on Human and Social Analytics (HUSO","author":"Hee Cynthia Van","year":"2015","unstructured":"Cynthia Van Hee, Els Lefever, Ben Verhoeven, Julie Mennes, Bart Desmet, Guy De Pauw, Walter Daelemans, and V\u00e9ronique Hoste. 2015. Automatic detection and prevention of cyberbullying. In International Conference on Human and Social Analytics (HUSO 2015). IARIA, 13--18."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0042"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2009.03.021"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1086\/599250"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.08.018"},{"key":"e_1_2_1_103_1","doi-asserted-by":"crossref","DOI":"10.5040\/9798400662003","volume-title":"Sex Speech, Free Speech.","author":"Wolfson Nicholas","year":"1997","unstructured":"Nicholas Wolfson. 1997. Hate Speech, Sex Speech, Free Speech. (1997)."},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.5555\/2382029.2382139"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2011.12.031"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2004.03.007"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.03.005"},{"key":"e_1_2_1_108_1","first-page":"1","article-title":"Detection of harassment on web 2.0","volume":"2","author":"Yin Dawei","year":"2009","unstructured":"Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D Davison, April Kontostathis, and Lynne Edwards. 2009. Detection of harassment on web 2.0. Proc. of the Content Analysis in the WEB , Vol. 2 (2009), 1--7.","journal-title":"Proc. of the Content Analysis in the WEB"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","unstructured":"Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In NIPS . 649--657.","DOI":"10.5555\/2969239.2969312"},{"key":"e_1_2_1_110_1","unstructured":"Haoti Zhong Hao Li Anna Squicciarini Sarah Rajtmajer Christopher Griffin David Miller and Cornelia Caragea. 2016. Content-Driven Detection of Cyberbullying on the Instagram Social Network. (2016)."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274386","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:35Z","timestamp":1750207475000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274386"}},"subtitle":["An Effective Route to Detect Incivility in Twitter"],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":110,"journal-issue":{"issue":"CSCW","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["10.1145\/3274386"],"URL":"https:\/\/doi.org\/10.1145\/3274386","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11]]},"assertion":[{"value":"2018-11-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}