{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:00:23Z","timestamp":1776114023197,"version":"3.50.1"},"reference-count":172,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T00:00:00Z","timestamp":1666051200000},"content-version":"vor","delay-in-days":370,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIP-1827700"],"award-info":[{"award-number":["IIP-1827700"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,10,13]]},"abstract":"<jats:p>Cyberbullying is a growing problem across social media platforms, inflicting short and long-lasting effects on victims. To mitigate this problem, research has looked into building automated systems, powered by machine learning, to detect cyberbullying incidents, or the involved actors like victims and perpetrators. In the past, systematic reviews have examined the approaches within this growing body of work, but with a focus on the computational aspects of the technical innovation, feature engineering, or performance optimization, without centering around the roles, beliefs, desires, or expectations of humans. In this paper, we present a human-centered systematic literature review of the past 10 years of research on automated cyberbullying detection. We analyzed 56 papers based on a three-prong human-centeredness algorithm design framework - spanning theoretical, participatory, and speculative design. We found that the past literature fell short of incorporating human-centeredness across multiple aspects, ranging from defining cyberbullying, establishing the ground truth in data annotation, evaluating the performance of the detection models, to speculating the usage and users of the models, including potential harms and negative consequences. Given the sensitivities of the cyberbullying experience and the deep ramifications cyberbullying incidents bear on the involved actors, we discuss takeaways on how incorporating human-centeredness in future research can aid with developing detection systems that are more practical, useful, and tuned to the diverse needs and contexts of the stakeholders.<\/jats:p>","DOI":"10.1145\/3476066","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T02:46:19Z","timestamp":1634611579000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":62,"title":["A Human-Centered Systematic Literature Review of Cyberbullying Detection Algorithms"],"prefix":"10.1145","volume":"5","author":[{"given":"Seunghyun","family":"Kim","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Afsaneh","family":"Razi","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Munmun","family":"De Choudhury","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,18]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3284751.3284761"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3991\/ijep.v10i4.14219"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2020.104814"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918354"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.051"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigMM50055.2020.00032"},{"key":"e_1_2_1_7_1","volume-title":"William R Cannon, Suvranu De, Salvador Dura-Bernal, Krishna Garikipati, George Karniadakis, William W Lytton","author":"Alber Mark","year":"2019","unstructured":"Mark Alber, Adrian Buganza Tepole, William R Cannon, Suvranu De, Salvador Dura-Bernal, Krishna Garikipati, George Karniadakis, William W Lytton, Paris Perdikaris, Linda Petzold, et al. 2019. Integrating machine learning and multiscale modeling-perspectives, challenges, and opportunities in the biological, biomedical, and behavioral sciences. NPJ digital medicine, Vol. 2, 1 (2019), 1--11."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v35i4.2513"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/14626268.2013.767276"},{"key":"e_1_2_1_10_1","volume-title":"Cyberbullying: a cross-cultural perspective. Emotional and behavioural difficulties","author":"Baek Jieun","year":"2014","unstructured":"Jieun Baek and Lyndal M Bullock. 2014. Cyberbullying: a cross-cultural perspective. Emotional and behavioural difficulties, Vol. 19, 2 (2014), 226--238."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022022113504622"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/casp.2137"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951717718854"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00041"},{"key":"e_1_2_1_15_1","volume-title":"Science","volume":"366","author":"Benjamin Ruha","year":"2019","unstructured":"Ruha Benjamin. 2019. Assessing risk, automating racism. Science, Vol. 366, 6464 (2019), 421--422."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3002137.3002144"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--75417--8_17"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.678878"},{"key":"e_1_2_1_19_1","volume-title":"Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice. School psychology international","author":"Cassidy Wanda","year":"2013","unstructured":"Wanda Cassidy, Chantal Faucher, and Margaret Jackson. 2013. Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice. School psychology international, Vol. 34, 6 (2013), 575--612."},{"key":"e_1_2_1_20_1","unstructured":"Pew Research Center. 2018. A Majority of Teens Have Experienced Some Form of Cyberbullying. https:\/\/www.pewresearch.org\/internet\/2018\/09\/27\/a-majority-of-teens-have-experienced-some-form-of-cyberbullying\/"},{"key":"e_1_2_1_21_1","volume-title":"Christy MK Cheung, and Zach WY Lee","author":"Chan Tommy KH","year":"2020","unstructured":"Tommy KH Chan, Christy MK Cheung, and Zach WY Lee. 2020. Cyberbullying on Social Networking Sites: A Literature Review and Future Research Directions. Information & Management (2020), 103411."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359249"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091487"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054211"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343484"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2015.7275970"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3316503"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.27"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291037"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2555805"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801211436167"},{"key":"e_1_2_1_32_1","volume-title":"Social change and crime rate trends: A routine activity approach. American sociological review","author":"Cohen Lawrence E","year":"1979","unstructured":"Lawrence E Cohen and Marcus Felson. 1979. Social change and crime rate trends: A routine activity approach. American sociological review (1979), 588--608."},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Maral Dadvar Franciska De Jong Roeland and Ordelman Dolf Trieschnigg. 2012a. Improved Cyberbullying Detection Using Gender Information. Technical Report. http:\/\/www.noswearing.com\/dictionary","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2187995"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the Twelfth Dutch-Belgian Information Retrieval Workshop (DIR","author":"Dadvar Maral","year":"2012","unstructured":"Maral Dadvar, FMG de Jong, Roeland Ordelman, and Dolf Trieschnigg. 2012b. Improved cyberbullying detection using gender information. In Proceedings of the Twelfth Dutch-Belgian Information Retrieval Workshop (DIR 2012). University of Ghent."},{"key":"e_1_2_1_36_1","unstructured":"Maral Dadvar Dolf Trieschnigg and Franciska De Jong. 2013a. Expert knowledge for automatic detection of bullies in social networks. Technical Report. 57--64 pages."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319-06483--3_25"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--36973--5_62"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488416"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--71249--9_4"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W19--3504"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2014.952657"},{"key":"e_1_2_1_43_1","volume-title":"Young people's conceptualizations of the nature of cyberbullying: A systematic review and synthesis of qualitative research. Aggression and violent behavior","author":"Dennehy Rebecca","year":"2020","unstructured":"Rebecca Dennehy, Sarah Meaney, Kieran A Walsh, Carol Sinnott, Mary Cronin, and Ella Arensman. 2020. Young people's conceptualizations of the nature of cyberbullying: A systematic review and synthesis of qualitative research. Aggression and violent behavior, Vol. 51 (2020), 101379."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7899672"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362394.2362400"},{"key":"e_1_2_1_46_1","volume-title":"AAAI Workshop - Technical Report","volume":"02","author":"Dinakar Karthik","year":"2011","unstructured":"Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of textual cyberbullying. In AAAI Workshop - Technical Report, Vol. WS-11-02. 11--17. www.aaai.org"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278729"},{"key":"e_1_2_1_48_1","volume-title":"Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608","author":"Doshi-Velez Finale","year":"2017","unstructured":"Finale Doshi-Velez and Been Kim. 2017. Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608 (2017)."},{"key":"e_1_2_1_49_1","volume-title":"Cyberbullying in social networking sites: An adolescent victim's perspective. Computers in human behavior","author":"Dredge Rebecca","year":"2014","unstructured":"Rebecca Dredge, John Gleeson, and Xochitl De la Piedad Garcia. 2014a. Cyberbullying in social networking sites: An adolescent victim's perspective. Computers in human behavior, Vol. 36 (2014), 13--20."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.07.035"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3145472"},{"key":"e_1_2_1_52_1","volume-title":"Speculative everything: design, fiction, and social dreaming","author":"Dunne Anthony","unstructured":"Anthony Dunne and Fiona Raby. 2013. Speculative everything: design, fiction, and social dreaming .MIT press."},{"key":"e_1_2_1_53_1","volume-title":"Gilles Jacobs, Cynthia Van Hee, Els Lefever, Bart Desmet, V\u00e9ronique Hoste, and Walter Daelemans.","author":"Emmery Chris","year":"2020","unstructured":"Chris Emmery, Ben Verhoeven, Guy De Pauw, Gilles Jacobs, Cynthia Van Hee, Els Lefever, Bart Desmet, V\u00e9ronique Hoste, and Walter Daelemans. 2020. Current limitations in cyberbullying detection: On evaluation criteria, reproducibility, and data scarcity. Language Resources and Evaluation (2020), 1--37."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300364"},{"key":"e_1_2_1_55_1","volume-title":"Research on school bullying and victimization: What have we learned and where do we go from here? School psychology review","author":"Espelage Dorothy L","year":"2003","unstructured":"Dorothy L Espelage and Susan M Swearer. 2003. Research on school bullying and victimization: What have we learned and where do we go from here? School psychology review, Vol. 32, 3 (2003), 365--383."},{"key":"e_1_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Rebecca Fiebrink and Marco Gillies. 2018. Introduction to the special issue on human-centered machine learning.","DOI":"10.1145\/3205942"},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 567--580","author":"Fiesler Casey","year":"2017","unstructured":"Casey Fiesler, Michaelanne Dye, Jessica L Feuston, Chaya Hiruncharoenvate, Clayton J Hutto, Shannon Morrison, Parisa Khanipour Roshan, Umashanthi Pavalanathan, Amy S Bruckman, Munmun De Choudhury, et al. 2017. What (or who) is public? Privacy settings and social media content sharing. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 567--580."},{"key":"e_1_2_1_58_1","volume-title":"Bullying victimisation and risk of self harm in early adolescence: longitudinal cohort study. bmj","author":"Fisher Helen L","year":"2012","unstructured":"Helen L Fisher, Terrie E Moffitt, Renate M Houts, Daniel W Belsky, Louise Arseneault, and Avshalom Caspi. 2012. Bullying victimisation and risk of self harm in early adolescence: longitudinal cohort study. bmj, Vol. 344 (2012), e2683."},{"key":"e_1_2_1_59_1","first-page":"42","article-title":"Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying","volume":"24","author":"Gal\u00e1n-Garc'ia Patxi","year":"2016","unstructured":"Patxi Gal\u00e1n-Garc'ia, Jos\u00e9 Gaviria de la Puerta, Carlos Laorden G\u00f3mez, Igor Santos, and Pablo Garc'ia Bringas. 2016. Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying. Logic Journal of the IGPL, Vol. 24, 1 (2016), 42--53.","journal-title":"Logic Journal of the IGPL"},{"key":"e_1_2_1_60_1","volume-title":"Cyberbullying Detection with Fairness Constraints. arXiv preprint arXiv:2005.06625","author":"Gencoglu Oguzhan","year":"2020","unstructured":"Oguzhan Gencoglu. 2020. Cyberbullying Detection with Fairness Constraints. arXiv preprint arXiv:2005.06625 (2020)."},{"key":"e_1_2_1_61_1","volume-title":"USA","volume":"1","author":"Gibson James J","year":"1977","unstructured":"James J Gibson. 1977. The theory of affordances. Hilldale, USA, Vol. 1, 2 (1977)."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCOMS.2018.8463326"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781444316568.wiem02057"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2014.11.013"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2019.0100587"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372826"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-3999(00)00230-0"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1021\/ci0342472"},{"key":"e_1_2_1_69_1","volume-title":"It's time to do something: Mitigating the negative impacts of computing through a change to the peer review process. ACM Future of Computing Blog","author":"Hecht Brent","year":"2018","unstructured":"Brent Hecht, Lauren Wilcox, Jeffrey P Bigham, Johannes Sch\u00f6ning, Ehsan Hoque, Jason Ernst, Yonatan Bisk, Lana Yarosh, Bushra Amjam, and Cathy Wu. 2018. It's time to do something: Mitigating the negative impacts of computing through a change to the peer review process. ACM Future of Computing Blog (2018)."},{"key":"e_1_2_1_70_1","volume-title":"School law enforcement and cyberbullying. Cyberbullying prevention and response: Expert perspectives","author":"Hinduja Sameer","year":"2012","unstructured":"Sameer Hinduja and Justin W Patchin. 2012. School law enforcement and cyberbullying. Cyberbullying prevention and response: Expert perspectives (2012), 161--184."},{"key":"e_1_2_1_71_1","volume-title":"Cyberbullying: Causes, effects, and remedies. Journal of Educational Administration","author":"Hoff Dianne L","year":"2009","unstructured":"Dianne L Hoff and Sidney N Mitchell. 2009. Cyberbullying: Causes, effects, and remedies. Journal of Educational Administration (2009)."},{"key":"e_1_2_1_72_1","volume-title":"Science","volume":"355","author":"Hofman Jake M","year":"2017","unstructured":"Jake M Hofman, Amit Sharma, and Duncan J Watts. 2017. Prediction and explanation in social systems. Science, Vol. 355, 6324 (2017), 486--488."},{"key":"e_1_2_1_73_1","volume-title":"Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra.","author":"Hosseinmardi Homa","year":"2015","unstructured":"Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015. Detection of Cyberbullying Incidents on the Instagram Social Network. MobiSys (3 2015), 2014. http:\/\/arxiv.org\/abs\/1503.03909"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661126.2661133"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287600"},{"key":"e_1_2_1_76_1","volume-title":"Measurement and fairness. arXiv preprint arXiv:1912.05511","author":"Jacobs Abigail Z","year":"2019","unstructured":"Abigail Z Jacobs and Hanna Wallach. 2019. Measurement and fairness. arXiv preprint arXiv:1912.05511 (2019)."},{"key":"e_1_2_1_77_1","volume-title":"Guest Editors","author":"Jaimes Alejandro","year":"2007","unstructured":"Alejandro Jaimes, Daniel Gatica-Perez, Nicu Sebe, and Thomas S Huang. 2007. Guest Editors' Introduction: Human-Centered Computing--Toward a Human Revolution. Computer, Vol. 40, 5 (2007), 30--34."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372829"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19--1357"},{"key":"e_1_2_1_80_1","volume-title":"Know How I Feel: Insider-Outsider Perspective Gaps in Cyberbullying Risk Detection. In Proceedings of the International AAAI Conference on Web and Social Media .","author":"Kim Seunghyun","unstructured":"Seunghyun Kim, Afsaneh Razi, Gianluca Stringhini, Pamela Wisniewski, and Munmun De Choudhury. noop3002forthcoming. You Don't Know How I Feel: Insider-Outsider Perspective Gaps in Cyberbullying Risk Detection. In Proceedings of the International AAAI Conference on Web and Social Media ."},{"key":"e_1_2_1_81_1","unstructured":"Barbara Kitchenham and Stuart Charters. 2007. Guidelines for performing systematic literature reviews in software engineering. (2007)."},{"key":"e_1_2_1_82_1","volume-title":"Logistic regression","author":"Kleinbaum David G","unstructured":"David G Kleinbaum, K Dietz, M Gail, Mitchel Klein, and Mitchell Klein. 2002. Logistic regression .Springer."},{"key":"e_1_2_1_83_1","volume-title":"Cyberbullying detection using web content mining. In 2014 22nd Telecommunications Forum Telfor (TELFOR)","author":"Ana Kovavc","unstructured":"Ana Kovavc evi\u0107. 2014. Cyberbullying detection using web content mining. In 2014 22nd Telecommunications Forum Telfor (TELFOR). IEEE, 939--942."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7234-z"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1080\/02796015.2007.12087931"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaac.2013.03.012"},{"key":"e_1_2_1_87_1","volume-title":"Just world research and the attribution process: Looking back and ahead. Psychological bulletin","author":"Lerner Melvin J","year":"1978","unstructured":"Melvin J Lerner and Dale T Miller. 1978. Just world research and the attribution process: Looking back and ahead. Psychological bulletin, Vol. 85, 5 (1978), 1030."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1080\/00131880802309333"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3011141.3011182"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0671"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICONIC.2018.8601278"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2015.7293405"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/PAIS.2018.8598530"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0040"},{"key":"e_1_2_1_95_1","volume-title":"A Qualitative Exploration of College Students' Perceptions of Cyberbullying. TechTrends","author":"Meter Diana J","year":"2021","unstructured":"Diana J Meter, Ross Budziszewski, Abigail Phillips, and Troy E Beckert. 2021. A Qualitative Exploration of College Students' Perceptions of Cyberbullying. TechTrends (2021), 1--9."},{"key":"e_1_2_1_96_1","volume-title":"Cyberbullying Knows No Borders","author":"Miller Jerold D","year":"2009","unstructured":"Jerold D Miller and Shirley M Hufstedler. 2009. Cyberbullying Knows No Borders. Australian Teacher Education Association (2009)."},{"key":"e_1_2_1_97_1","first-page":"22","article-title":"Social media companies' cyberbullying policies","volume":"10","author":"Milosevic Tijana","year":"2016","unstructured":"Tijana Milosevic. 2016. Social media companies' cyberbullying policies. International Journal of Communication, Vol. 10 (2016), 22.","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287596"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1080\/14639220500090604"},{"key":"e_1_2_1_100_1","volume-title":"The Oxford handbook of affective computing","author":"Morris R","unstructured":"R Morris, Daniel McDuff, and R Calvo. 2014. Crowdsourcing techniques for affective computing. In The Oxford handbook of affective computing. Oxford Univ. Press, 384--394."},{"key":"e_1_2_1_101_1","volume-title":"Interrogating Data Science. In Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing. 467--473","author":"Muller Michael","year":"2020","unstructured":"Michael Muller, Cecilia Aragon, Shion Guha, Marina Kogan, Gina Neff, Cathrine Seidelin, Katie Shilton, and Anissa Tanweer. 2020. Interrogating Data Science. In Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing. 467--473."},{"key":"e_1_2_1_102_1","volume-title":"Participatory design: The third space in human-computer interaction. The human-computer interaction handbook: Fundamentals, evolving technologies, and emerging applications","author":"Muller Michael J","year":"2012","unstructured":"Michael J Muller and Allison Druin. 2012. Participatory design: The third space in human-computer interaction. The human-computer interaction handbook: Fundamentals, evolving technologies, and emerging applications (2012), 1125--1154."},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi12110187"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1080\/0013188032000086154"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2013.6920758"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319-08608--8_14"},{"key":"e_1_2_1_107_1","volume-title":"Conferences in Research and Practice in Information Technology Series","volume":"146","author":"Nahar Vinita","year":"2013","unstructured":"Vinita Nahar, Xue Li, Chaoyi Pang, and Yang Zhang. 2013. Cyberbullying Detection based on text-stream classification. In Conferences in Research and Practice in Information Technology Series, Vol. 146. 49--58. http:\/\/www.noswearing.com\/"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--29253--8_75"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--13731--5_69"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i28\/93825"},{"key":"e_1_2_1_111_1","volume-title":"Current perspectives: the impact of cyberbullying on adolescent health. Adolescent health, medicine and therapeutics","author":"Nixon Charisse L","year":"2014","unstructured":"Charisse L Nixon. 2014. Current perspectives: the impact of cyberbullying on adolescent health. Adolescent health, medicine and therapeutics, Vol. 5 (2014), 143."},{"key":"e_1_2_1_112_1","volume-title":"What is a support vector machine? Nature biotechnology","author":"Noble William S","year":"2006","unstructured":"William S Noble. 2006. What is a support vector machine? Nature biotechnology, Vol. 24, 12 (2006), 1565--1567."},{"key":"e_1_2_1_113_1","doi-asserted-by":"crossref","unstructured":"Chitu Okoli and Kira Schabram. 2010. A guide to conducting a systematic literature review of information systems research. (2010).","DOI":"10.2139\/ssrn.1954824"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0272-6963(98)00020-5"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2019.00013"},{"key":"e_1_2_1_116_1","volume-title":"Aggressive behavior","author":"Olweus Dan","unstructured":"Dan Olweus. 1994. Bullying at school. In Aggressive behavior. Springer, 97--130."},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1080\/01431160412331269698"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18--1302"},{"key":"e_1_2_1_119_1","volume-title":"Toxicity Detection: Does Context Really Matter? arXiv preprint arXiv:2006.00998","author":"Pavlopoulos John","year":"2020","unstructured":"John Pavlopoulos, Jeffrey Sorensen, Lucas Dixon, Nithum Thain, and Ion Androutsopoulos. 2020. Toxicity Detection: Does Context Really Matter? arXiv preprint arXiv:2006.00998 (2020)."},{"key":"e_1_2_1_120_1","volume-title":"Linguistic inquiry and word count: LIWC","author":"Pennebaker James W","year":"2001","unstructured":"James W Pennebaker, Martha E Francis, and Roger J Booth. 2001. Linguistic inquiry and word count: LIWC 2001. Mahway: Lawrence Erlbaum Associates, Vol. 71, 2001 (2001), 2001."},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2014.170"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300294"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167317"},{"key":"e_1_2_1_124_1","volume-title":"Cyberbullying Identification Using Participant-Vocabulary Consistency. (6","author":"Raisi Elaheh","year":"2016","unstructured":"Elaheh Raisi and Bert Huang. 2016. Cyberbullying Identification Using Participant-Vocabulary Consistency. (6 2016). http:\/\/arxiv.org\/abs\/1606.08084"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110049"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34980-6_32"},{"key":"e_1_2_1_127_1","volume-title":"Emerging Perspectives in Human-Centered Machine Learning. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. 1--8.","author":"Ramos Gonzalo","year":"2019","unstructured":"Gonzalo Ramos, Jina Suh, Soroush Ghorashi, Christopher Meek, Richard Banks, Saleema Amershi, Rebecca Fiebrink, Alison Smith-Renner, and Gagan Bansal. 2019. Emerging Perspectives in Human-Centered Machine Learning. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. 1--8."},{"key":"e_1_2_1_128_1","volume-title":"Towards user design? On the shift from object to user as the subject of design. Design studies","author":"Redstr\u00f6m Johan","year":"2006","unstructured":"Johan Redstr\u00f6m. 2006. Towards user design? On the shift from object to user as the subject of design. Design studies, Vol. 27, 2 (2006), 123--139."},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2011.152"},{"key":"e_1_2_1_130_1","volume-title":"IJCAI 2001 workshop on empirical methods in artificial intelligence","volume":"3","author":"Irina","unstructured":"Irina Rish et al. 2001. An empirical study of the naive Bayes classifier. In IJCAI 2001 workshop on empirical methods in artificial intelligence, Vol. 3. 41--46."},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/KST.2017.7886127"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.12.021"},{"key":"e_1_2_1_133_1","volume-title":"Science","volume":"346","author":"Ruths Derek","year":"2014","unstructured":"Derek Ruths and J\u00fcrgen Pfeffer. 2014. Social media for large studies of behavior. Science, Vol. 346, 6213 (2014), 1063--1064."},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326032"},{"key":"e_1_2_1_135_1","volume-title":"Approaches to automated detection of cyberbullying: A survey","author":"Salawu Semiu","year":"2017","unstructured":"Semiu Salawu, Yulan He, and Joanna Lumsden. 2017. Approaches to automated detection of cyberbullying: A survey. IEEE Transactions on Affective Computing (2017)."},{"key":"e_1_2_1_136_1","volume-title":"Fairness Considered Harmful: On the Non-portability of Fair-ML in India. arXiv preprint arXiv:2012.03659","author":"Sambasivan Nithya","year":"2020","unstructured":"Nithya Sambasivan, Erin Arnesen, Ben Hutchinson, and Vinodkumar Prabhakaran. 2020. Fairness Considered Harmful: On the Non-portability of Fair-ML in India. arXiv preprint arXiv:2012.03659 (2020)."},{"key":"e_1_2_1_137_1","unstructured":"Huascar Sanchez and Shreyas Kumar. [n.d.]. Twitter Bullying Detection. Technical Report. https:\/\/www.researchgate.net\/publication\/267823748"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2322358"},{"key":"e_1_2_1_139_1","first-page":"86","article-title":"A Framework for Automatic Detection and Prevention of Cyberbullying in Social Media","volume":"5","author":"Prof Shruthi","year":"2017","unstructured":"Shruthi and Prof Mangala C. 2017. A Framework for Automatic Detection and Prevention of Cyberbullying in Social Media. International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, 6 (2017), 86--90. www.ijircce.com","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"key":"e_1_2_1_140_1","volume-title":"Social dominance: An intergroup theory of social hierarchy and oppression","author":"Sidanius Jim","unstructured":"Jim Sidanius and Felicia Pratto. 2001. Social dominance: An intergroup theory of social hierarchy and oppression .Cambridge University Press."},{"key":"e_1_2_1_141_1","volume-title":"The measurement of independent and interdependent self-construals. Personality and social psychology bulletin","author":"Singelis Theodore M","year":"1994","unstructured":"Theodore M Singelis. 1994. The measurement of independent and interdependent self-construals. Personality and social psychology bulletin, Vol. 20, 5 (1994), 580--591."},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053169"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3342949"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752342"},{"key":"e_1_2_1_145_1","volume-title":"The nature of cyberbullying, and strategies for prevention. Computers in human behavior","author":"Slonje Robert","year":"2013","unstructured":"Robert Slonje, Peter K Smith, and Ann Fris\u00e9n. 2013. The nature of cyberbullying, and strategies for prevention. Computers in human behavior, Vol. 29, 1 (2013), 26--32."},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469--7610.2007.01846.x"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809398"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1145\/2743065.2743085"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.03.085"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2015.7489220"},{"key":"e_1_2_1_151_1","volume-title":"A framework for understanding unintended consequences of machine learning. ArXiv","author":"Suresh Harini","year":"2019","unstructured":"Harini Suresh and John V Guttag. 2019. A framework for understanding unintended consequences of machine learning. ArXiv, Vol. abs\/1901.10002 (2019)."},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290838"},{"key":"e_1_2_1_153_1","volume-title":"Integrating traditional bullying and cyberbullying: challenges of definition and measurement in adolescents--a review. Educational psychology review","author":"Thomas Hannah J","year":"2015","unstructured":"Hannah J Thomas, Jason P Connor, and James G Scott. 2015. Integrating traditional bullying and cyberbullying: challenges of definition and measurement in adolescents--a review. Educational psychology review, Vol. 27, 1 (2015), 135--152."},{"key":"e_1_2_1_154_1","volume-title":"Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in human behavior","author":"Tokunaga Robert S","year":"2010","unstructured":"Robert S Tokunaga. 2010. Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in human behavior, Vol. 26, 3 (2010), 277--287."},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508294"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--13647--9_21"},{"key":"e_1_2_1_157_1","volume-title":"\u201chelping,\u201d\u201cjoining","author":"Cleemput Katrien Van","year":"2014","unstructured":"Katrien Van Cleemput, Heidi Vandebosch, and Sara Pabian. 2014. Personal characteristics and contextual factors that determine \u201chelping,\u201d\u201cjoining in,\u201d and \u201cdoing nothing\u201d when witnessing cyberbullying. Aggressive behavior, Vol. 40, 5 (2014), 383--396."},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0203794"},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2014.04.002"},{"key":"e_1_2_1_160_1","volume-title":"Proceedings of 29th International Conference on Machine Learning.","volume":"1","author":"Wagstaff Kiri","year":"2012","unstructured":"Kiri Wagstaff. 2012. Machine Learning that Matters. Proceedings of 29th International Conference on Machine Learning., Vol. 1 (06 2012)."},{"key":"e_1_2_1_161_1","volume-title":"ALONE: A Dataset for Toxic Behavior Among Adolescents on Twitter. In International Conference on Social Informatics. Springer, 427--439","author":"Wijesiriwardene Thilini","year":"2020","unstructured":"Thilini Wijesiriwardene, Hale Inan, Ugur Kursuncu, Manas Gaur, Valerie L Shalin, Krishnaprasad Thirunarayan, Amit Sheth, and I Budak Arpinar. 2020. ALONE: A Dataset for Toxic Behavior Among Adolescents on Twitter. In International Conference on Social Informatics. Springer, 427--439."},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.2012.02542.x"},{"key":"e_1_2_1_163_1","volume-title":"New Directions in Third Wave Human-Computer Interaction","author":"Wong Richmond Y","unstructured":"Richmond Y Wong and Vera Khovanskaya. 2018. Speculative Design in HCI: From Corporate Imaginations to Critical Orientations. In New Directions in Third Wave Human-Computer Interaction: Volume 2-Methodologies. Springer, 175--202."},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3314196"},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508329"},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313462"},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1109\/icmla.2016.0132"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAFFC.2016.2531682"},{"key":"e_1_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2849567"},{"key":"e_1_2_1_170_1","volume-title":"Sarah Michele Rajtmajer, Christopher Griffin, David J Miller, and Cornelia Caragea.","author":"Zhong Haoti","year":"2016","unstructured":"Haoti Zhong, Hao Li, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Christopher Griffin, David J Miller, and Cornelia Caragea. 2016. Content-Driven Detection of Cyberbullying on the Instagram Social Network.. In IJCAI. 3952--3958."},{"key":"e_1_2_1_171_1","volume-title":"Flexible Inference for Cyberbully Incident Detection. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 356--371","author":"Zhong Haoti","year":"2018","unstructured":"Haoti Zhong, David J Miller, and Anna Squicciarini. 2018. Flexible Inference for Cyberbully Incident Detection. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 356--371."},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10802-012-9678-8"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3476066","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3476066","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3476066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T05:06:02Z","timestamp":1752469562000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3476066"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":172,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2021,10,13]]}},"alternative-id":["10.1145\/3476066"],"URL":"https:\/\/doi.org\/10.1145\/3476066","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,13]]},"assertion":[{"value":"2021-10-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}