{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:44:11Z","timestamp":1771026251752,"version":"3.50.1"},"reference-count":91,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1464287"],"award-info":[{"award-number":["1464287"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2018,11]]},"abstract":"<jats:p>Emerging multimedia communication apps are allowing for more natural communication and richer user engagement. At the same time, they can be abused to engage in cyberbullying, which can cause significant psychological harm to those affected. Thus, with the growth in multimodal communication platforms, there is an urgent need to devise multimodal methods for cyberbullying detection and prevention. However, there are no existing approaches that use automated audio and video analysis to complement textual analysis. Based on the analysis of a human-labeled cyberbullying data-set of Vine \"media sessions' (six-second videos, with audio, and corresponding text comments), we report that: 1) multiple audio and visual features are significantly associated with the occurrence of cyberbullying, and 2) audio and video features complement textual features for more accurate and earlier cyberbullying detection. These results pave the way for more effective cyberbullying detection in emerging multimodal (audio, visual, virtual reality) social interaction spaces.<\/jats:p>","DOI":"10.1145\/3274433","type":"journal-article","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T21:21:27Z","timestamp":1541107287000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["See No Evil, Hear No Evil"],"prefix":"10.1145","volume":"2","author":[{"given":"Devin","family":"Soni","sequence":"first","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]},{"given":"Vivek K.","family":"Singh","sequence":"additional","affiliation":[{"name":"Rutgers University, New Brunswick, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,11]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"38","article-title":"Cyberbullying and teens: what YA librarians can do to help","volume":"10","author":"Agosto Denise E","year":"2012","unstructured":"Denise E Agosto, Andrea Forte, and Rathe Magee. 2012. Cyberbullying and teens: what YA librarians can do to help. Young Adult Library Services 10, 2 (2012), 38.","journal-title":"Young Adult Library Services"},{"key":"e_1_2_1_2_1","volume-title":"Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms. arXiv preprint arXiv:1801.06482","author":"Agrawal Sweta","year":"2018","unstructured":"Sweta Agrawal and Amit Awekar. 2018. Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms. arXiv preprint arXiv:1801.06482 (2018)."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.05.036"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Nazanin Andalibi Pinar \u00d6zt\u00fcrk and Andrea Forte. 2017. Sensitive Self-disclosures Responses and Social Support on Instagram: The Case of# Depression.. In CSCW. 1485--1500. 10.1145\/2998181.2998243","DOI":"10.1145\/2998181.2998243"},{"key":"e_1_2_1_5_1","volume-title":"Human aggression. Annual review of psychology 53","author":"Anderson Craig A","year":"2002","unstructured":"Craig A Anderson and Brad J Bushman. 2002. Human aggression. Annual review of psychology 53 (2002)."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858548"},{"key":"e_1_2_1_7_1","unstructured":"Alexandra Balahur. 2013. Sentiment Analysis in Social Media Texts.. In WASSA@ NAACL-HLT. 120--128."},{"key":"e_1_2_1_8_1","volume-title":"Does the association with psychosomatic health problems differ between cyberbullying and traditional bullying? Emotional and behavioural difficulties 17, 3--4","author":"Beckman Linda","year":"2012","unstructured":"Linda Beckman, Curt Hagquist, and Lisa Hellstr\u00f6m. 2012. Does the association with psychosomatic health problems differ between cyberbullying and traditional bullying? Emotional and behavioural difficulties 17, 3--4 (2012), 421--434."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.24"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/17482790903233465"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025985"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026018"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622407.1622416"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998213"},{"key":"e_1_2_1_15_1","volume-title":"https:\/\/www.clarifai.com\/models\/general-image-recognition-model\/ aaa03c23b3724a16a56b629203edc62c {Online","author":"Model General","year":"2017","unstructured":"Clarifai. 2017. General Model. https:\/\/www.clarifai.com\/models\/general-image-recognition-model\/ aaa03c23b3724a16a56b629203edc62c {Online; accessed 29-August-2017 }."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2857070.2857152"},{"key":"e_1_2_1_17_1","volume-title":"Improved cyberbullying detection using gender information","author":"Dadvar M.","unstructured":"M. Dadvar, Franciska M.G. de Jong, Roeland J.F. Ordelman, and Rudolf Berend Trieschnigg. 2012. Improved cyberbullying detection using gender information. Ghent University, 23--25."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675160"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"e_1_2_1_21_1","unstructured":"Karthik Dinakar Roi Reichart and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. In The Social Mobile Web."},{"key":"e_1_2_1_22_1","first-page":"11","article-title":"Modeling the detection of Textual Cyberbullying","volume":"11","author":"Dinakar Karthik","year":"2011","unstructured":"Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. The Social Mobile Web 11, 02 (2011), 11--17.","journal-title":"The Social Mobile Web"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2011.648425"},{"key":"e_1_2_1_24_1","unstructured":"Justin Ellis. 2015. What happened after 7 news sites got rid of reader comments. http:\/\/www.niemanlab.org\/2015\/09\/ what-happened-after-7-news-sites-got-rid-of-reader-comments\/. {Online; accessed 19-Sep-2017}."},{"key":"e_1_2_1_25_1","volume-title":"Theories of cyberbullying. Principles of cyberbullying research: Definitions, measures, and methodology","author":"Espelage Dorothy L","year":"2012","unstructured":"Dorothy L Espelage, Mrinalini A Rao, and Rhonda G Craven. 2012. Theories of cyberbullying. Principles of cyberbullying research: Definitions, measures, and methodology (2012), 49--67."},{"key":"e_1_2_1_26_1","unstructured":"Facebook. {n. d.}. Bullying Prevention Hub. https:\/\/www.facebook.com\/safety\/bullying\/. Accessed: 2018-06--26."},{"key":"e_1_2_1_27_1","volume-title":"https:\/\/www.ffmpeg.org\/ {Online","year":"2017","unstructured":"FFmpeg. 2017. FFmpeg. https:\/\/www.ffmpeg.org\/ {Online; accessed 29-August-2017 }."},{"key":"e_1_2_1_28_1","unstructured":"Figure Eight. 2018. How to Calculate a Confidence Score. https:\/\/success.figure-eight.com\/hc\/en-us\/articles\/ 201855939-How-to-Calculate-a-Confidence-Score Accessed: 2018-03-01."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467--9280.2007.02024.x"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685980"},{"key":"e_1_2_1_31_1","volume-title":"pyAudioAnalysis: An Open-Source Python Library for Audio Signal Analysis. PloS one 10, 12","author":"Giannakopoulos Theodoros","year":"2015","unstructured":"Theodoros Giannakopoulos. 2015. pyAudioAnalysis: An Open-Source Python Library for Audio Signal Analysis. PloS one 10, 12 (2015)."},{"key":"e_1_2_1_32_1","volume-title":"School climate 2.0: Preventing cyberbullying and sexting one classroom at a time","author":"Hinduja Sameer","unstructured":"Sameer Hinduja and Justin W Patchin. 2012. School climate 2.0: Preventing cyberbullying and sexting one classroom at a time. Corwin Press."},{"key":"e_1_2_1_33_1","volume-title":"Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network. In International Conference on Social Informatics. Springer, 49--66","author":"Hosseinmardi Homa","year":"2015","unstructured":"Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015. Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network. In International Conference on Social Informatics. Springer, 49--66."},{"key":"e_1_2_1_34_1","volume-title":"Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra.","author":"Hosseinmardi Homa","year":"2015","unstructured":"Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015. Detection of cyberbullying incidents on the instagram social network. arXiv preprint arXiv:1503.03909 (2015)."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661126.2661133"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 8th International Conference on Weblogs and Social Media, ICWSM","author":"Hutto C.J.","year":"2015","unstructured":"C.J. Hutto and Eric Gilbert. 2015. VADER: A Parsimonious Rule-based Model for Sentiment Analysis of Social Media Text. In Proceedings of the 8th International Conference on Weblogs and Social Media, ICWSM 2014."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.4220100103"},{"key":"e_1_2_1_39_1","volume-title":"Principles of Gestalt psychology","author":"Koffka Kurt","unstructured":"Kurt Koffka. 2013. Principles of Gestalt psychology. Vol. 44. Routledge."},{"key":"e_1_2_1_40_1","unstructured":"Janet Kornblum. 2008. Cyberbullying grows bigger and meaner with photos video. http:\/\/usatoday30.usatoday.com\/ tech\/webguide\/internetlife\/2008-07--14-cyberbullying_N.htm. USA Today (2008)."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3390\/soc4040549"},{"key":"e_1_2_1_42_1","volume-title":"Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological bulletin 140, 4","author":"Kowalski Robin M","year":"2014","unstructured":"Robin M Kowalski, Gary W Giumetti, Amber N Schroeder, and Micah R Lattanner. 2014. Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological bulletin 140, 4 (2014), 1073."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2012.09.018"},{"key":"e_1_2_1_44_1","volume-title":"The limited capacity model of motivated mediated message processing. The SAGE handbook of media processes and effects","author":"Lang Annie","year":"2009","unstructured":"Annie Lang. 2009. The limited capacity model of motivated mediated message processing. The SAGE handbook of media processes and effects (2009), 193--204."},{"key":"e_1_2_1_45_1","volume-title":"Recognize Emotions in Images. https:\/\/www.microsoft.com\/cognitive-services\/en-us\/ emotion-api\/. {Online","author":"Lutkebohle Ingo","year":"2016","unstructured":"Ingo Lutkebohle. 2016. Recognize Emotions in Images. https:\/\/www.microsoft.com\/cognitive-services\/en-us\/ emotion-api\/. {Online; accessed 19-July-2016}."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806607"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260511403749"},{"key":"e_1_2_1_48_1","volume-title":"Can a video game company tame toxic behaviour? Nature 531, 7596","author":"Maher Brendan","year":"2016","unstructured":"Brendan Maher. 2016. Can a video game company tame toxic behaviour? Nature 531, 7596 (2016), 568--571."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2017.8115809"},{"key":"e_1_2_1_50_1","first-page":"126","article-title":"The medium is the message","volume":"123","author":"McLuhan Marshall","year":"1967","unstructured":"Marshall McLuhan and Quentin Fiore. 1967. The medium is the message. New York 123 (1967), 126--128.","journal-title":"New York"},{"key":"e_1_2_1_51_1","unstructured":"FrontGate Media. 2017. A LIST OF 723 BAD WORDS TO BLACKLIST & HOW TO USE FACEBOOK'S MODERATION TOOL. http:\/\/www.frontgatemedia.com\/new\/wp-content\/uploads\/2014\/03\/Terms-to-Block.csv {Online; accessed 29-August-2017 }."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1027\/0044-3409.217.4.230"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0002"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/1386681"},{"key":"e_1_2_1_55_1","first-page":"238","article-title":"An Effective Approach for Cyberbullying Detection","volume":"3","author":"Nahar Vinita","year":"2013","unstructured":"Vinita Nahar, Xue Li, and Chaoyi Pang. 2013. An Effective Approach for Cyberbullying Detection. Communications in Information Science and Management Engineering 3, 5 (2013), 238--247.","journal-title":"Communications in Information Science and Management Engineering"},{"key":"e_1_2_1_56_1","volume-title":"The 11th Australasian Data Mining Conference (AusDM","author":"Nahar Vinita","year":"2013","unstructured":"Vinita Nahar, Xue Li, Chaoyi Pang, and Yang Zhang. 2013. Cyberbullying detection based on text-stream classification. In The 11th Australasian Data Mining Conference (AusDM 2013)."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29253-8_75"},{"key":"e_1_2_1_58_1","unstructured":"National Crime Prevention Council. 2014. Stop bullying before it starts. http:\/\/www.ncpc.org\/resources\/files\/pdf\/ bullying\/cyberbullying.pdf. Accessed: 2017-06--10."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883062"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.invent.2015.03.005"},{"key":"e_1_2_1_61_1","unstructured":"OpenCV. 2017. Reading and Writing Images and Video. http:\/\/docs.opencv.org\/2.4\/modules\/highgui\/doc\/reading_ and_writing_images_and_video.html {Online; accessed 29-August-2017 }."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.05.002"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/2031545"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702534"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_2_1_66_1","volume-title":"Manning","author":"Pennington Jeffrey","year":"2014","unstructured":"Jeffrey Pennington, Richard Socher, and Christopher D. Manning. 2014. GloVe: Global Vectors for Word Representation. In Empirical Methods in Natural Language Processing (EMNLP). 1532--1543. http:\/\/www.aclweb.org\/anthology\/D14--1162"},{"key":"e_1_2_1_67_1","doi-asserted-by":"crossref","unstructured":"T Pradheep JI Sheeba T Yogeshwaran and S Pradeep Devaneyan. 2017. Automatic Multi Model Cyber Bullying Detection from Social Networks. (2017).","DOI":"10.2139\/ssrn.3123710"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809381"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-016-0398-x"},{"key":"e_1_2_1_70_1","volume-title":"Cyberbullying identification using participant-vocabulary consistency. arXiv preprint arXiv:1606.08084","author":"Raisi Elaheh","year":"2016","unstructured":"Elaheh Raisi and Bert Huang. 2016. Cyberbullying identification using participant-vocabulary consistency. arXiv preprint arXiv:1606.08084 (2016)."},{"key":"e_1_2_1_71_1","unstructured":"MIT Technology Review. 2018. Intelligent Machines - Three problems with Facebook's plan to kill hate speech using AI. https:\/\/www.technologyreview.com\/s\/610860\/three-problems-with-facebooks-plan-to-kill-hate-speech-using-ai\/. Accessed: 2018-07-06."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"e_1_2_1_74_1","article-title":"Bullying on the pixel playground: Investigating risk factors of cyberbullying at the intersection of children\u00c3?\u00c2?\u00c2's online-offline social lives. Cyberpsychology","volume":"8","author":"Seiler Steven J","year":"2014","unstructured":"Steven J Seiler and Jordana N Navarro. 2014. Bullying on the pixel playground: Investigating risk factors of cyberbullying at the intersection of children\u00c3?\u00c2?\u00c2's online-offline social lives. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8, 4 (2014).","journal-title":"Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890098"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998279"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053169"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192589"},{"key":"e_1_2_1_79_1","volume-title":"Cyberbullying: Another main type of bullying? Scandinavian journal of psychology 49, 2","author":"Slonje Robert","year":"2008","unstructured":"Robert Slonje and Peter K Smith. 2008. Cyberbullying: Another main type of bullying? Scandinavian journal of psychology 49, 2 (2008), 147--154."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2007.01846.x"},{"key":"e_1_2_1_81_1","volume-title":"An investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyberbullying. Research Brief No. RBX03-06","author":"Smith Peter K","year":"2006","unstructured":"Peter K Smith, Jess Mahdavi, Manuel Carvalho, and Neil Tippett. 2006. An investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyberbullying. Research Brief No. RBX03-06. London: DfES (2006)."},{"key":"e_1_2_1_82_1","volume-title":"Maria Ikonen, Jarna Lindroos, Terhi Luntamo, Merja Koskelainen, Terja Ristkari, and Hans Helenius.","author":"Sourander Andre","year":"2010","unstructured":"Andre Sourander, Anat Brunstein Klomek, Maria Ikonen, Jarna Lindroos, Terhi Luntamo, Merja Koskelainen, Terja Ristkari, and Hans Helenius. 2010. Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study. Archives of general psychiatry 67, 7 (2010), 720--728."},{"key":"e_1_2_1_84_1","unstructured":"USA Today. 2018. Mark Zuckerberg pledges Facebook will put 'people first ' avoid past mistakes. https:\/\/www.usatoday. com\/story\/tech\/news\/2018\/05\/01\/mark-zuckerberg-pledges-facebook-put-people-first-avoid-past-mistakes\/ 564474002\/. Accessed: 2018-07-06."},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"e_1_2_1_86_1","volume-title":"Carnegie Mellon University Sphinx. https:\/\/cmusphinx.github.io\/ {Online","author":"Carnegie Mellon University","year":"2017","unstructured":"Carnegie Mellon University. 2017. Carnegie Mellon University Sphinx. https:\/\/cmusphinx.github.io\/ {Online; accessed 29-August-2017 }."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1080\/15388220802074165"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.5555\/2390374.2390377"},{"key":"e_1_2_1_89_1","volume-title":"Norms of valence, arousal, and dominance for 13,915 English lemmas. Behavior Research Methods 45, 4 (01","author":"Warriner Amy Beth","year":"2013","unstructured":"Amy Beth Warriner, Victor Kuperman, and Marc Brysbaert. 2013. Norms of valence, arousal, and dominance for 13,915 English lemmas. Behavior Research Methods 45, 4 (01 Dec 2013), 1191--1207."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11121-013-0438-y"},{"key":"e_1_2_1_91_1","unstructured":"Youtube. 2016. Harassment and cyberbullying policy. https:\/\/support.google.com\/youtube\/answer\/2802268?hl=en& ref_topic=2803176. Accessed: 2018-06--26."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2849567"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.5555\/3061053.3061172"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274433","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274433","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:36Z","timestamp":1750207476000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274433"}},"subtitle":["Audio-Visual-Textual Cyberbullying Detection"],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":91,"journal-issue":{"issue":"CSCW","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["10.1145\/3274433"],"URL":"https:\/\/doi.org\/10.1145\/3274433","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11]]},"assertion":[{"value":"2018-11-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}