{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T06:30:43Z","timestamp":1771050643881,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:00:00Z","timestamp":1699228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,6]]},"DOI":"10.1145\/3625007.3627597","type":"proceedings-article","created":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T15:12:42Z","timestamp":1710515562000},"page":"624-630","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Harmful Communication: Detection of Toxic Language and Threats on Swedish"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6553-4319","authenticated-orcid":false,"given":"Amendra","family":"Shrestha","sequence":"first","affiliation":[{"name":"Mind Intelligence Lab, Uppsala, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3724-7504","authenticated-orcid":false,"given":"Lisa","family":"Kaati","sequence":"additional","affiliation":[{"name":"Department of Computer and Systems Sciences, Stockholm University, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9641-6275","authenticated-orcid":false,"given":"Nazar","family":"Akrami","sequence":"additional","affiliation":[{"name":"Department of Psychology, Uppsala University, Uppsala, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1202-6250","authenticated-orcid":false,"given":"Kevin","family":"Linden","sequence":"additional","affiliation":[{"name":"Department of Computer and Systems Sciences, Stockholm University, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7584-2355","authenticated-orcid":false,"given":"Arvin","family":"Moshfegh","sequence":"additional","affiliation":[{"name":"Department of Computer and Systems Sciences, Stockholm University, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2024,3,15]]},"reference":[{"issue":"10","key":"e_1_3_2_1_1_1","first-page":"353","volume":"21","author":"Al-Turaif G.","year":"2021","unstructured":"G. Al-Turaif and F. Fkih. A Review on Threat Detection Approaches in Social Networks. International Journal of Computer Science and Network Security, 21(10):353--361, Oct. 2021.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"e_1_3_2_1_2_1","volume-title":"Overview of Abusive and Threatening Language Detection in Urdu at FIRE","author":"Amjad M.","year":"2021","unstructured":"M. Amjad, A. Zhila, G. Sidorov, A. Labunets, S. Butta, H. I. Amjad, O. Vitman, and A. Gelbukh. Overview of Abusive and Threatening Language Detection in Urdu at FIRE 2021, July 2022."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1145\/3366424.3385778","volume-title":"Group Violent Threats Classification in Online Discussions. In Companion Proceedings of the Web Conference 2020, WWW '20","author":"Ashraf N.","year":"2020","unstructured":"N. Ashraf, R. Mustafa, G. Sidorov, and A. Gelbukh. Individual vs. Group Violent Threats Classification in Online Discussions. In Companion Proceedings of the Web Conference 2020, WWW '20, pages 629--633, New York, NY, USA, Apr. 2020. Association for Computing Machinery."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.09.299"},{"key":"e_1_3_2_1_5_1","first-page":"842","volume-title":"IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","author":"Berglind T.","year":"2019","unstructured":"T. Berglind, B. Pelzer, and L. Kaati. Levels of hate in online environments. In IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 842--847, 2019."},{"key":"e_1_3_2_1_6_1","volume-title":"N\u00e4that och sj\u00e4lvcensur det nya normala","year":"2021","unstructured":"Brottsoffermyndigheten. N\u00e4that och sj\u00e4lvcensur det nya normala. 2021."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"P. Casula A. Anupam and N. Parvin. 'We found no violation!': Twitter's Violent Threats Policy and Toxicity in Online Discourse. C&T '21: Proceedings of the 10th International Conference on Communities & Technologies - Wicked Problems in the Age of Tech pages 151--159 June 2021.","DOI":"10.1145\/3461564.3461589"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the National Academy of Sciences, 119(4)","author":"Choi V. K.","year":"2022","unstructured":"V. K. Choi, S. Shrestha, X. Pan, and M. J. Gelfand. When danger strikes: A linguistic tool for tracking america's collective response to threats. Proceedings of the National Academy of Sciences, 119(4), 2022."},{"key":"e_1_3_2_1_9_1","volume-title":"Abusive and Threatening Language Detection in Urdu using Boosting based and BERT based models: A Comparative Approach","author":"Das M.","year":"2021","unstructured":"M. Das, S. Banerjee, and P. Saha. Abusive and Threatening Language Detection in Urdu using Boosting based and BERT based models: A Comparative Approach. Nov. 2021."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"2020 International Joint Conference on Neural Networks (IJCNN)","author":"De Souza G. A.","year":"2020","unstructured":"G. A. De Souza and M. Da Costa-Abreu. Automatic offensive language detection from twitter data using machine learning and feature selection of metadata. In 2020 International Joint Conference on Neural Networks (IJCNN), pages 1--6, 2020."},{"key":"e_1_3_2_1_12_1","first-page":"4171","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies","author":"Devlin J.","year":"2019","unstructured":"J. Devlin, M. Chang, K. Lee, and K. Toutanova. BERT: pre-training of deep bidirectional transformers for language understanding. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pages 4171--4186. Association for Computational Linguistics, 2019."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"4724","DOI":"10.1109\/BigData47090.2019.9005534","volume-title":"2019 IEEE International Conference on Big Data (Big Data)","author":"Fernquist J.","year":"2019","unstructured":"J. Fernquist, O. Lindholm, L. Kaati, and N. Akrami. A study on the feasibility to detect hate speech in swedish. In 2019 IEEE International Conference on Big Data (Big Data), pages 4724--4729, 2019."},{"issue":"4","key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1080\/07349165.1990.9725688","article-title":"Psychological impacts of toxic exposure in third world countries: An extrapolation","volume":"8","author":"Gibbs M. S.","year":"1990","unstructured":"M. S. Gibbs. Psychological impacts of toxic exposure in third world countries: An extrapolation. Impact Assessment, 8(4):7--18, 1990.","journal-title":"Impact Assessment"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/JISIC.2014.64","volume-title":"Proceedings of the 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC '14","author":"Hammer H. L.","year":"2014","unstructured":"H. L. Hammer. Detecting threats of violence in online discussions using bigrams of important words. In Proceedings of the 2014 IEEE Joint Intelligence and Security Informatics Conference, JISIC '14, page 319, USA, 2014. IEEE Computer Society."},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"THREAT: A Large Annotated Corpus for Detection of Violent Threats. 2019 International Conference on Content-Based Multimedia Indexing (CBMI)","author":"Hammer H. L.","year":"2019","unstructured":"H. L. Hammer, M. A. Riegler, L. Ovrelid, and E. Velldal. THREAT: A Large Annotated Corpus for Detection of Violent Threats. 2019 International Conference on Content-Based Multimedia Indexing (CBMI), pages 1--5, Sept. 2019."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1031"},{"key":"e_1_3_2_1_18_1","volume-title":"Sociala medier. https:\/\/svenskarnaochinternet.se\/rapporter\/svenskarna-och-internet-2022\/sociala-medier\/","year":"2022","unstructured":"Internetstiftelsen. Sociala medier. https:\/\/svenskarnaochinternet.se\/rapporter\/svenskarna-och-internet-2022\/sociala-medier\/, 2022. Accessed: 2023-02-27."},{"key":"e_1_3_2_1_19_1","volume-title":"Monitoring Targeted Hate in Online Environments. Second workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS)","author":"Isbister T.","year":"2018","unstructured":"T. Isbister, M. Sahlgren, L. Kaati, M. Obaidi, and N. Akrami. Monitoring Targeted Hate in Online Environments. Second workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS), 2018."},{"key":"e_1_3_2_1_20_1","volume-title":"European Commission and Directorate-General for Justice and Consumers.","author":"Kaati L.","year":"2021","unstructured":"L. Kaati, K. Cohen, and B. Pelzer. Heroes and Scapegoats: Rightwing Extremism in Digital Environments. European Commission and Directorate-General for Justice and Consumers., 2021."},{"key":"e_1_3_2_1_21_1","volume-title":"K\u00f6nsskillnader i utsatthet f\u00f6r toxiskt spr\u00e5k online. FOI Memo 7741","author":"Kaati L.","year":"2021","unstructured":"L. Kaati, K. Cohen, B. Pelzer, D. Wallgren, A. Akrami, and J. Yourstone. K\u00f6nsskillnader i utsatthet f\u00f6r toxiskt spr\u00e5k online. FOI Memo 7741, Swedish Defence Research Agency, 2021."},{"key":"e_1_3_2_1_22_1","volume-title":"Toxiskt spr\u00e5k i svenska digitala milj\u00f6er. FOI Memo 7740","author":"Kaati L.","year":"2021","unstructured":"L. Kaati, K. Cohen, B. Pelzer, D. Wallgren, A. Akrami, and J. Yourstone. Toxiskt spr\u00e5k i svenska digitala milj\u00f6er. FOI Memo 7740, Swedish Defence Research Agency, 2021."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM55673.2022.10068619"},{"key":"e_1_3_2_1_24_1","volume-title":"On the variance of the adaptive learning rate and beyond. CoRR, abs\/1908.03265","author":"Liu L.","year":"2019","unstructured":"L. Liu, H. Jiang, P. He, W. Chen, X. Liu, J. Gao, and J. Han. On the variance of the adaptive learning rate and beyond. CoRR, abs\/1908.03265, 2019."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41562-022-01460-1","article-title":"A systematic review of worldwide causal and correlational evidence on digital media and democracy","volume":"7","author":"Lorenz-Spreen P.","year":"2022","unstructured":"P. Lorenz-Spreen, L. Oswald, S. Lewandowsky, and R. Hertwig. A systematic review of worldwide causal and correlational evidence on digital media and democracy. Nature Human Behaviour, 7:1--28, 11 2022.","journal-title":"Nature Human Behaviour"},{"key":"e_1_3_2_1_26_1","volume-title":"Playing with words at the national library of sweden - making a swedish BERT","author":"Malmsten M.","year":"2020","unstructured":"M. Malmsten, L. B\u00f6rjeson, and C. Haffenden. Playing with words at the national library of sweden - making a swedish BERT, 2020."},{"key":"e_1_3_2_1_27_1","volume-title":"The School Shooter: A Threat Assessment Perspective","author":"O'Toole M. E.","year":"1999","unstructured":"M. E. O'Toole. The School Shooter: A Threat Assessment Perspective. Federal Bureau of Investigation, Jan. 1999."},{"key":"e_1_3_2_1_28_1","first-page":"4296","volume-title":"ACL","author":"Pavlopoulos J.","year":"2020","unstructured":"J. Pavlopoulos, J. Sorensen, L. Dixon, N. Thain, and I. Androutsopoulos. Toxicity detection: Does context really matter? In D. Jurafsky, J. Chai, N. Schluter, and J. R. Tetreault, editors, ACL, pages 4296--4305. Association for Computational Linguistics, 2020."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587396"},{"key":"e_1_3_2_1_30_1","volume-title":"HateCheck: Functional Tests for Hate Speech Detection Models","author":"R\u00f6ttger P.","year":"2020","unstructured":"P. R\u00f6ttger, B. Vidgen, D. Nguyen, Z. Waseem, H. Margetts, and J. B. Pierrehumbert. HateCheck: Functional Tests for Hate Speech Detection Models. 2020."},{"key":"e_1_3_2_1_31_1","first-page":"208","volume-title":"2022 IEEE 21st International Conference on Cognitive Informatics & Cognitive Computing","author":"Salomon P. O.","year":"2022","unstructured":"P. O. Salomon, Z. Kechaou, and A. Wali. Arabic hate speech detection system based on arabert. In 2022 IEEE 21st International Conference on Cognitive Informatics & Cognitive Computing, pages 208--213, 2022."},{"issue":"1","key":"e_1_3_2_1_32_1","first-page":"74","article-title":"The language of threats. International Journal of Speech","volume":"2","author":"Storey K.","year":"2013","unstructured":"K. Storey. The language of threats. International Journal of Speech, Language and the Law, 2(1):74--80, 2013.","journal-title":"Language and the Law"},{"key":"e_1_3_2_1_33_1","first-page":"141","article-title":"All that glitters is not gold: Transfer-learning for offensive language detection in dutch","volume":"12","author":"Theodoridis D.","year":"2022","unstructured":"D. Theodoridis and T. Caselli. All that glitters is not gold: Transfer-learning for offensive language detection in dutch. Computational Linguistics in the Netherlands Journal, 12:141--164, Dec. 2022.","journal-title":"Computational Linguistics in the Netherlands Journal"},{"key":"e_1_3_2_1_34_1","first-page":"1","volume-title":"2023 International Conference on Advances in Electronics, Communication, Computing and Intelligent Information Systems (ICAECIS)","author":"Titli S. R.","year":"2023","unstructured":"S. R. Titli and S. Paul. Automated bengali abusive text classification: Using deep learning techniques. In 2023 International Conference on Advances in Electronics, Communication, Computing and Intelligent Information Systems (ICAECIS), pages 1--6, 2023."},{"key":"e_1_3_2_1_35_1","volume-title":"5th workshop on Natural Language Processing and Computational Social Science (NLP+CSS) at EMNLP 2022","author":"Touileb S.","year":"2022","unstructured":"S. Touileb and D. Nozza. Measuring harmful representations in scandinavian language models. 5th workshop on Natural Language Processing and Computational Social Science (NLP+CSS) at EMNLP 2022, 2022."},{"key":"e_1_3_2_1_36_1","volume-title":"Learning from the Worst: Dynamically Generated Datasets to Improve Online Hate Detection","author":"Vidgen B.","year":"2020","unstructured":"B. Vidgen, T. Thrush, Z. Waseem, and D. Kiela. Learning from the Worst: Dynamically Generated Datasets to Improve Online Hate Detection. 2020."},{"key":"e_1_3_2_1_37_1","volume-title":"Ethical and social risks of harm from language models. CoRR, abs\/2112.04359","author":"Weidinger L.","year":"2021","unstructured":"L. Weidinger, J. Mellor, M. Rauh, C. Griffin, J. Uesato, P. Huang, M. Cheng, M. Glaese, B. Balle, A. Kasirzadeh, Z. Kenton, S. Brown, W. Hawkins, T. Stepleton, C. Biles, A. Birhane, J. Haas, L. Rimell, L. A. Hendricks, W. Isaac, S. Legassick, G. Irving, and I. Gabriel. Ethical and social risks of harm from language models. CoRR, abs\/2112.04359, 2021."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-0413"},{"key":"e_1_3_2_1_39_1","first-page":"1","volume-title":"2021 IEEE 18th India Council International Conference (INDICON)","author":"Yadav Y.","year":"2021","unstructured":"Y. Yadav, P. Bajaj, R. K. Gupta, and R. Sinha. A Comparative Study of Deep Learning Methods for Hate Speech and Offensive Language Detection in Textual Data. In 2021 IEEE 18th India Council International Conference (INDICON), pages 1--6, Dec. 2021."}],"event":{"name":"ASONAM '23: International Conference on Advances in Social Networks Analysis and Mining","location":"Kusadasi Turkiye","acronym":"ASONAM '23","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"]},"container-title":["Proceedings of the International Conference on Advances in Social Networks Analysis and Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625007.3627597","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3625007.3627597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:50Z","timestamp":1750178810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625007.3627597"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,6]]},"references-count":39,"alternative-id":["10.1145\/3625007.3627597","10.1145\/3625007"],"URL":"https:\/\/doi.org\/10.1145\/3625007.3627597","relation":{},"subject":[],"published":{"date-parts":[[2023,11,6]]},"assertion":[{"value":"2024-03-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}