{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:27Z","timestamp":1750220727910,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T00:00:00Z","timestamp":1589500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,15]]},"DOI":"10.1145\/3404663.3404677","type":"proceedings-article","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T22:10:11Z","timestamp":1594419011000},"page":"144-151","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Parameters to Determine Cyberbullying in Social Networks in the Ecuador"],"prefix":"10.1145","author":[{"given":"Segundo Mois\u00e9s T.","family":"Toapanta","sequence":"first","affiliation":[{"name":"Department of Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Kevin Enrique Yagual","family":"B.","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Luis Enrique Mafla","family":"Gallegos","sequence":"additional","affiliation":[{"name":"National Polytechnic School, Quito, Ecuador"}]}],"member":"320","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947163"},{"key":"e_1_3_2_1_2_1","first-page":"159","volume-title":"Conf. Artif. Intell. AICAI 2019","author":"Kumar D.","year":"2019","unstructured":"D. Kumar and S. Aggarwal , \" Analysis of Women Safety in Indian Cities Using Machine Learning on Tweets,\" Proc. - 2019 Amity Int . Conf. Artif. Intell. AICAI 2019 , pp. 159 -- 162 , 2019 , DOI: 10.1109\/AICAI.2019.8701247. 10.1109\/AICAI.2019.8701247 D. Kumar and S. Aggarwal, \"Analysis of Women Safety in Indian Cities Using Machine Learning on Tweets,\" Proc. - 2019 Amity Int. Conf. Artif. Intell. AICAI 2019, pp. 159--162, 2019, DOI: 10.1109\/AICAI.2019.8701247."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881292"},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Conf. Innov. Eng. Technol. ICIET 2018","author":"Hussain M. G.","year":"2019","unstructured":"M. G. Hussain , T. Al Mahmud , and W. Akthar , \" An Approach to Detect Abusive Bangla Text,\" 2018 Int . Conf. Innov. Eng. Technol. ICIET 2018 , pp. 1 -- 5 , 2019 , DOI: 10.1109\/CIET.2018.8660863. 10.1109\/CIET.2018.8660863 M. G. Hussain, T. Al Mahmud, and W. Akthar, \"An Approach to Detect Abusive Bangla Text,\" 2018 Int. Conf. Innov. Eng. Technol. ICIET 2018, pp. 1--5, 2019, DOI: 10.1109\/CIET.2018.8660863."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"2018 Cyber Resil. Conf. CRC 2018","author":"Huda Sheikh S. N.","year":"2019","unstructured":"S. N. Huda Sheikh Abdullah et al., \"Assessment of Self-Identity among Teens Towards Self-Crime Prevention Program,\" Proc . 2018 Cyber Resil. Conf. CRC 2018 , pp. 1 -- 4 , 2019 , DOI: 10.1109\/CR.2018.8626870. 10.1109\/CR.2018.8626870 S. N. Huda Sheikh Abdullah et al., \"Assessment of Self-Identity among Teens Towards Self-Crime Prevention Program,\" Proc. 2018 Cyber Resil. Conf. CRC 2018, pp. 1--4, 2019, DOI: 10.1109\/CR.2018.8626870."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866525"},{"key":"e_1_3_2_1_7_1","first-page":"270","volume-title":"Conf. Web Intell. WI 2018","author":"Pandey R.","year":"2019","unstructured":"R. Pandey , H. Purohit , B. Stabile , and A. Grant , \" Distributional Semantics Approach to Detect Intent in Twitter Conversations on Sexual Assaults,\" Proc. - 2018 IEEE\/WIC\/ACM Int . Conf. Web Intell. WI 2018 , pp. 270 -- 277 , 2019 , DOI: 10.1109\/WI.2018.00-80. 10.1109\/WI.2018.00-80 R. Pandey, H. Purohit, B. Stabile, and A. Grant, \"Distributional Semantics Approach to Detect Intent in Twitter Conversations on Sexual Assaults,\" Proc. - 2018 IEEE\/WIC\/ACM Int. Conf. Web Intell. WI 2018, pp. 270--277, 2019, DOI: 10.1109\/WI.2018.00-80."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Soc. Natl. Comput. Conf. NCC 2018","author":"Al-Ajlan M. A.","year":"2018","unstructured":"M. A. Al-Ajlan and M. Ykhlef , \" Optimized Twitter Cyberbullying Detection based on Deep Learning,\" 21st Saudi Comput . Soc. Natl. Comput. Conf. NCC 2018 , pp. 1 -- 5 , 2018 , DOI: 10.1109\/NCG.2018.8593146. 10.1109\/NCG.2018.8593146 M. A. Al-Ajlan and M. Ykhlef, \"Optimized Twitter Cyberbullying Detection based on Deep Learning,\" 21st Saudi Comput. Soc. Natl. Comput. Conf. NCC 2018, pp. 1--5, 2018, DOI: 10.1109\/NCG.2018.8593146."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508576"},{"key":"e_1_3_2_1_10_1","first-page":"854","volume-title":"VR 2019 - Proc.","author":"Blackwell L.","year":"2019","unstructured":"L. Blackwell , N. Ellison , N. Elliott-Deflo , and R. Schwartz , \" Harassment in social VR: Implications for design,\" 26th IEEE Conf. Virtual Real. 3D User Interfaces , VR 2019 - Proc. , pp. 854 -- 855 , 2019 , DOI: 10.1109\/VR.2019.8798165. 10.1109\/VR.2019.8798165 L. Blackwell, N. Ellison, N. Elliott-Deflo, and R. Schwartz, \"Harassment in social VR: Implications for design,\" 26th IEEE Conf. Virtual Real. 3D User Interfaces, VR 2019 - Proc., pp. 854--855, 2019, DOI: 10.1109\/VR.2019.8798165."},{"key":"e_1_3_2_1_11_1","first-page":"87","volume-title":"WIE Conf. Electr. Comput. Eng., no. December","author":"Akash S. A.","year":"2017","unstructured":"S. A. Akash , M. Al-Zihad , T. Adhikary , M. A. Razzaque , and A. Sharmin , \" HearMe: A smart mobile application for mitigating women harassment,\" WIECON-ECE 2016 - 2016 IEEE Int . WIE Conf. Electr. Comput. Eng., no. December , pp. 87 -- 90 , 2017 , DOI: 10.1109\/WIECON-ECE.2016.8009093. 10.1109\/WIECON-ECE.2016.8009093 S. A. Akash, M. Al-Zihad, T. Adhikary, M. A. Razzaque, and A. Sharmin, \"HearMe: A smart mobile application for mitigating women harassment,\" WIECON-ECE 2016 - 2016 IEEE Int. WIE Conf. Electr. Comput. Eng., no. December, pp. 87--90, 2017, DOI: 10.1109\/WIECON-ECE.2016.8009093."},{"key":"e_1_3_2_1_12_1","first-page":"845","volume-title":"Comput. Softw. Appl. Conf.","volume":"1","author":"Ahmed N.","year":"2017","unstructured":"N. Ahmed , M. A. Syrus , and A. Chowdhury , \" Simple Group Photo Sharing Using Facesense,\" Proc. - Int . Comput. Softw. Appl. Conf. , vol. 1 , pp. 845 -- 850 , 2017 , DOI: 10.1109\/COMPSAC.2017.212. 10.1109\/COMPSAC.2017.212 N. Ahmed, M. A. Syrus, and A. Chowdhury, \"Simple Group Photo Sharing Using Facesense,\" Proc. - Int. Comput. Softw. Appl. Conf., vol. 1, pp. 845--850, 2017, DOI: 10.1109\/COMPSAC.2017.212."},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Conf. Emerg. Technol. ICET 2018","author":"Abbasi S.","year":"2019","unstructured":"S. Abbasi , A. Naseem , A. Shamim , and M. A. Qureshi , \" An empirical investigation of motives, nature and online sources of cyberbullying,\" 2018 14th Int . Conf. Emerg. Technol. ICET 2018 , pp. 1 -- 6 , 2019 , DOI: 10.1109\/ICET.2018.8603617. 10.1109\/ICET.2018.8603617 S. Abbasi, A. Naseem, A. Shamim, and M. A. Qureshi, \"An empirical investigation of motives, nature and online sources of cyberbullying,\" 2018 14th Int. Conf. Emerg. Technol. ICET 2018, pp. 1--6, 2019, DOI: 10.1109\/ICET.2018.8603617."},{"key":"e_1_3_2_1_14_1","first-page":"1","article-title":"Codigo Organico Integral Penal","author":"del Ecuador Rep\u00fablica","year":"2018","unstructured":"Rep\u00fablica del Ecuador , \" Codigo Organico Integral Penal ,\" Noticias , p. 1 , 2018 . Rep\u00fablica del Ecuador, \"Codigo Organico Integral Penal,\" Noticias, p. 1, 2018.","journal-title":"Noticias"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/Anti-Cybercrime.2017.7905273"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2017.0121"},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"Conf. Cybercrime Comput. Forensic, ICCCF 2016","author":"Cartwright B. E.","year":"2016","unstructured":"B. E. Cartwright , \"Cyberbullying and cyber law,\" 2016 IEEE Int . Conf. Cybercrime Comput. Forensic, ICCCF 2016 , pp. 1 -- 7 , 2016 , DOI: 10.1109\/ICCCF.2016.7740430. 10.1109\/ICCCF.2016.7740430 B. E. Cartwright, \"Cyberbullying and cyber law,\" 2016 IEEE Int. Conf. Cybercrime Comput. Forensic, ICCCF 2016, pp. 1--7, 2016, DOI: 10.1109\/ICCCF.2016.7740430."},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"Conf. Pattern Anal. Intell. Syst.","author":"Marwa T.","year":"2018","unstructured":"T. Marwa , O. Salima , and M. Souham , \" Deep learning for online harassment detection in tweets,\" Proc. - PAIS 2018 Int . Conf. Pattern Anal. Intell. Syst. , pp. 1 -- 5 , 2018 , DOI: 10.1109\/PAIS.2018.8598530. 10.1109\/PAIS.2018.8598530 T. Marwa, O. Salima, and M. Souham, \"Deep learning for online harassment detection in tweets,\" Proc. - PAIS 2018 Int. Conf. Pattern Anal. Intell. Syst., pp. 1--5, 2018, DOI: 10.1109\/PAIS.2018.8598530."},{"key":"e_1_3_2_1_19_1","volume-title":"IEEE Int. Conf. Acoust. Speech Signal Process. - Proc.","volume":"2021","author":"Zois D. S.","year":"2018","unstructured":"D. S. Zois , A. Kapodistria , M. Yao , and C. Chelmis , \" Optimal Online Cyberbullying Detection,\" ICASSP , IEEE Int. Conf. Acoust. Speech Signal Process. - Proc. , vol. 2018-April, pp. 2017-- 2021 , 2018 , DOI: 10.1109\/ICASSP.2018.8462092. 10.1109\/ICASSP.2018.8462092 D. S. Zois, A. Kapodistria, M. Yao, and C. Chelmis, \"Optimal Online Cyberbullying Detection,\" ICASSP, IEEE Int. Conf. Acoust. Speech Signal Process. - Proc., vol. 2018-April, pp. 2017--2021, 2018, DOI: 10.1109\/ICASSP.2018.8462092."},{"key":"e_1_3_2_1_20_1","first-page":"218","volume-title":"Conf. Intell. Secur. Informatics, ISI 2019","author":"Yan P.","year":"2019","unstructured":"P. Yan , L. Li , W. Chen , and D. Zeng , \" Quantum-inspired density matrix encoder for sexual harassment personal stories classification,\" 2019 IEEE Int . Conf. Intell. Secur. Informatics, ISI 2019 , pp. 218 -- 220 , 2019 , DOI: 10.1109\/ISI.2019.8823281. 10.1109\/ISI.2019.8823281 P. Yan, L. Li, W. Chen, and D. Zeng, \"Quantum-inspired density matrix encoder for sexual harassment personal stories classification,\" 2019 IEEE Int. Conf. Intell. Secur. Informatics, ISI 2019, pp. 218--220, 2019, DOI: 10.1109\/ISI.2019.8823281."},{"key":"e_1_3_2_1_21_1","first-page":"479","volume-title":"2018 IEEE\/ACM Int. Conf. Adv. Soc. Networks Anal. Mining, ASONAM 2018","author":"Raisi E.","year":"2018","unstructured":"E. Raisi and B. Huang , \" Weakly supervised cyberbullying detection using co-trained ensembles of embedding models,\" Proc . 2018 IEEE\/ACM Int. Conf. Adv. Soc. Networks Anal. Mining, ASONAM 2018 , pp. 479 -- 486 , 2018 , DOI: 10.1109\/ASONAM.2018.8508240. 10.1109\/ASONAM.2018.8508240 E. Raisi and B. Huang, \"Weakly supervised cyberbullying detection using co-trained ensembles of embedding models,\" Proc. 2018 IEEE\/ACM Int. Conf. Adv. Soc. Networks Anal. Mining, ASONAM 2018, pp. 479--486, 2018, DOI: 10.1109\/ASONAM.2018.8508240."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0077-0_6"},{"key":"e_1_3_2_1_23_1","first-page":"2019","article-title":"Cryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City","author":"Toapanta R.","year":"2019","unstructured":"R. Toapanta , Reina, F. G. Mendoza , and E. Mafla , \" Cryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City ,\" SmartCom 2019 , no. January, 2019 , DOI: 10.1007 \/ 978-981-32-9343-4_36 R. Toapanta, Reina, F. G. Mendoza, and E. Mafla, \"Cryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City,\" SmartCom2019, no. January, 2019, DOI: 10.1007 \/ 978-981-32-9343-4_36","journal-title":"SmartCom"},{"key":"e_1_3_2_1_24_1","unstructured":"ecuadorencifras.gob.ec \"Encuesta nacional de relaciones familiares y violencia de genero \" 2011.  ecuadorencifras.gob.ec \"Encuesta nacional de relaciones familiares y violencia de genero \" 2011."}],"event":{"name":"ICISDM 2020: 2020 the 4th International Conference on Information System and Data Mining","acronym":"ICISDM 2020","location":"Hawaii HI USA"},"container-title":["Proceedings of the 2020 the 4th International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404677","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404663.3404677","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:18Z","timestamp":1750199898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404677"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,15]]},"references-count":24,"alternative-id":["10.1145\/3404663.3404677","10.1145\/3404663"],"URL":"https:\/\/doi.org\/10.1145\/3404663.3404677","relation":{},"subject":[],"published":{"date-parts":[[2020,5,15]]},"assertion":[{"value":"2020-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}