{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:19:57Z","timestamp":1775261997985,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T00:00:00Z","timestamp":1605657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,18]]},"DOI":"10.1145\/3424954.3424960","type":"proceedings-article","created":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T19:47:00Z","timestamp":1610480820000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis"],"prefix":"10.1145","author":[{"given":"Sayar","family":"Karmakar","sequence":"first","affiliation":[{"name":"University of Florida"}]},{"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"Indiana University &amp; University of Denver"}]}],"member":"320","published-online":{"date-parts":[[2021,1,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCBPL.2015100103"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818052.2874346"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858548"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.05.014"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-013-9937-1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordjournals.pan.a004869"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809563.2809605"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543163"},{"key":"e_1_3_2_1_9_1","volume-title":"Privacy Preserving Policy Model Framework. Available at SSRN 3427634","author":"Das Sanchari","year":"2019"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293578.3293589"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097286.3097316"},{"key":"e_1_3_2_1_12_1","volume-title":"16th Annual Social Informatics Research Symposium (ASIS&T)","author":"Das Sancahri","year":"2020"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Anneliese Depoux Sam Martin Emilie Karafillakis Raman Preet Annelies Wilder-Smith and Heidi Larson. 2020. The Pandemic of Social Media Panic Travels Faster than the COVID-19 Outbreak.  Anneliese Depoux Sam Martin Emilie Karafillakis Raman Preet Annelies Wilder-Smith and Heidi Larson. 2020. The Pandemic of Social Media Panic Travels Faster than the COVID-19 Outbreak.","DOI":"10.1093\/jtm\/taaa031"},{"key":"e_1_3_2_1_14_1","unstructured":"Jayati Dev Sanchari Das and Linda Jean Camp. 2018. Privacy Practices Preferences and Compunctions: WhatsApp Users in India.. In HAISA. 135--146.  Jayati Dev Sanchari Das and Linda Jean Camp. 2018. Privacy Practices Preferences and Compunctions: WhatsApp Users in India.. In HAISA. 135--146."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173785"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.026"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1086\/449217"},{"key":"e_1_3_2_1_19_1","volume-title":"Online Victimization: A Report on the Nation's Youth.","author":"Finkelhor David","year":"2000"},{"key":"e_1_3_2_1_21_1","unstructured":"Sayar Karmakar Stefan Richter and Wei Biao Wu. 2020+. Simultaneous inference for time-varying models. In revision https:\/\/sayarkarmakar.github.io\/publications\/sayar1.pdf (2020+).  Sayar Karmakar Stefan Richter and Wei Biao Wu. 2020+. Simultaneous inference for time-varying models. In revision https:\/\/sayarkarmakar.github.io\/publications\/sayar1.pdf (2020+)."},{"key":"e_1_3_2_1_22_1","volume-title":"Bayesian modelling of time-varying conditional heteroscedasticity. arXiv preprint arXiv:2009.06007","author":"Karmakar Sayar","year":"2020"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/josh.12290"},{"key":"e_1_3_2_1_24_1","volume-title":"Effects of Social Grooming on Incivility in COVID-19. Cyberpsychology, Behavior, and Social Networking","author":"Kim Bumsoo","year":"2020"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2378740"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2955129.2955138"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739042"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2015.7293405"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/pits.20301"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134711"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174097"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2017.01.04"},{"key":"e_1_3_2_1_33_1","first-page":"22","article-title":"Social Media Companies","volume":"10","author":"Milosevic Tijana","year":"2016","journal-title":"Cyberbullying Policies. International Journal of Communication"},{"key":"e_1_3_2_1_34_1","volume-title":"Protecting Children Online? Cyberbullying Policies of Social Media Companies","author":"Milosevic Tijana"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078714.3078723"},{"key":"e_1_3_2_1_36_1","first-page":"129","article-title":"Cyberbullying: Labels, behaviours and definition in three European countries","volume":"20","author":"Nocentini Annalaura","year":"2010","journal-title":"Journal of Psychologists and Counsellors in Schools"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300698"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIACT.2018.8350758"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2010.00548.x"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957297"},{"key":"e_1_3_2_1_41_1","volume-title":"Bayesian semiparametric time varying model for count data to study the spread of the COVID-19 cases. arXiv preprint arXiv:2004.02281","author":"Roy Arkaprava","year":"2020"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/sjos.12159"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998279"},{"key":"e_1_3_2_1_44_1","article-title":"Cyberbullying in Adolescent Victims","volume":"5","author":"\u0160l\u00e9glov\u00e1 Veronika","year":"2011","journal-title":"Perception and Coping. Cyberpsychology: Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9450.2007.00611.x"},{"key":"e_1_3_2_1_46_1","volume-title":"An Investigation into Cyberbullying, its Forms, Awareness and Impact, and the Relationship Between Age and Gender in Cyberbullying. Research Brief No. RBX03--06","author":"Smith Peter K","year":"2006"},{"key":"e_1_3_2_1_47_1","volume-title":"Cyberbullying victimization and behaviors among girls: Applying research findings in the field. Journal of Social Sciences","author":"Snell Patricia A","year":"2010"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1037\/ppm0000047"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1080\/15388220.2014.949377"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Brenda K Wiederhold. 2020. Social Media Use During Social Distancing.  Brenda K Wiederhold. 2020. Social Media Use During Social Distancing.","DOI":"10.1089\/cyber.2020.29181.bkw"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858317"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2007.09.004"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2004.00328.x"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2006-0815"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/75.4.621"}],"event":{"name":"EICC 2020: European Interdisciplinary Cybersecurity Conference","location":"Rennes France","acronym":"EICC 2020"},"container-title":["Proceedings of the European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424954.3424960","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3424954.3424960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:09Z","timestamp":1750197729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424954.3424960"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,18]]},"references-count":54,"alternative-id":["10.1145\/3424954.3424960","10.1145\/3424954"],"URL":"https:\/\/doi.org\/10.1145\/3424954.3424960","relation":{},"subject":[],"published":{"date-parts":[[2020,11,18]]},"assertion":[{"value":"2021-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}