1 |
Salmivalli, C. (2010). Bullying and the peer group: A review. Aggression and Violent Behavior, 15(2), 112-120. https://doi.org/10.1016/j.avb.2009.08.007
DOI
|
2 |
Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., & Vakali, A. (2017, June 25-28). Mean birds: Detecting aggression and bullying on Twitter. In P. Fox, D. McGuinness, & L. Poirer (Eds.), WebSci '17: Proceedings of the 2017 ACM Web Science Conference (pp. 13-22). ACM. https://doi.org/10.1145/3091478.3091487
DOI
|
3 |
Tarmizi, N., Saee, S., & Ibrahim, D. H. A. (2020). Detecting the usage of vulgar words in cyberbully activities from Twitter. International Journal on Advanced Science, Engineering and Information Technology, 10(3), 1117-1122. http://doi.org/10.18517/ijaseit.10.3.10645
DOI
|
4 |
Teh, P. L., Cheng, C., & Chee, W. (2018, March 23-25). Identifying and categorising profane words in hate speech. In A. Gokhale & S. Zhang (Eds.), Proceedings of 2018 the 2nd International Conference on Compute and Data Analysis (pp. 65-69). ACM. https://doi.org/10.1145/3193077.3193078
DOI
|
5 |
Van Hee, C., Jacobs, G., Emmery, C., Desmet, B., Lefever, E., Verhoeven, B., De Pauw, G., Daelemans, W., & Hoste, V. (2018). Automatic detection of cyberbullying in social media text. PLoS One, 13(10), e0203794. https://doi.org/10.1371/journal.pone.0203794
DOI
|
6 |
Al-garadi, M. A., Varathan, K. D., & Ravana, S. D. (2016). Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network. Computers in Human Behavior, 63, 433-443. https://doi.org/10.1016/j.chb.2016.05.051
DOI
|
7 |
Xu, J.-M., Jun, K.-S., Zhu, X., & Bellmore, A. (2012, June 3-8). Learning from bullying traces in social media. In J. Chu-Carroll (Ed.), NAACL HLT '12: Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (pp. 656-666). ACL. https://dl.acm.org/doi/10.5555/2382029.2382139
|
8 |
Zainudin, N. M., Zainal, K. H., Hasbullah, N. A., Wahab, N. A., & Ramli, S. (2016, May 16-17). A review on cyberbullying in Malaysia from digital forensic perspective. ICICTM '16: Proceedings of 1st International Conference on Information and Communication Technology (pp. 246-250). IEEE. https://doi.org/10.1109/ICICTM.2016.7890808
DOI
|
9 |
Zois, D., Kapodistria, A., Yao, M., & Chelmis, C. (2018, April 15-20). Optimal online cyberbullying detection. In M. Hayes & H. Ko (Eds.), Proceedings of 2018 IEEE International Conference on Acoustics, Speech, and Signal Processing (pp. 2017-2021). IEEE. https://doi.org/10.1109/ICASSP.2018.8462092
DOI
|
10 |
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., & Duchesnay, E. (2011). Scikitlearn: Machine learning in Python. The Journal of Machine Learning Research, 12, 2825-2830. https://dl.acm.org/doi/10.5555/1953048.2078195
DOI
|
11 |
Ashktorab, Z., Golbeck, J., Haber, E., & Vitak, J. (2017, June 25-28). Beyond cyberbullying: Self-disclosure, harm and social support on ASKfm. In P. Fox, D. McGuinness, & L. Poirer (Eds.), WebSci '17: Proceedings of the 2017 ACM Web Science Conference (pp. 3-12). ACM. https://doi.org/10.1145/3091478.3091499
DOI
|
12 |
Kontostathis, A., Reynolds, K., Garron, A., & Edwards, L. (2013, May 2-4). Detecting cyberbullying: Query terms and techniques. In H. Davis, H. Halpin, & A. Pentland (Eds.), WebSci '13: Proceedings of the 5th Annual ACM Web Science Conference (pp. 195-204). ACM. https://doi.org/10.1145/2464464.2464499
DOI
|
13 |
Bastiaensens, S., Vandebosch, H., Poels, K., Van Cleemput, K., DeSmet, A., & De Bourdeaudhuij, I. (2014). Cyberbullying on social network sites. An experimental study into bystanders' behavioural intentions to help the victim or reinforce the bully. Computers in Human Behavior, 31, 259-271. https://doi.org/10.1016/j.chb.2013.10.036
DOI
|
14 |
Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210-230. https://doi.org/10.1111/j.1083-6101.2007.00393.x
DOI
|
15 |
Computational Linguistics Research Group. (2019). Bratreader. https://github.com/clips/bratreader
|
16 |
Dinakar, K., Reichart, R., & Lieberman, H. (2011, July 17-21). Modeling the detection of textual cyberbullying. In N. Nicolov & J. G. Shanahan (Eds.), Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media (pp. 11-17). AAAI Press.
|
17 |
Giumetti, G. W., McKibben, E. S., Hatfield, A. L., Schroeder, A. N., & Kowalski, R. M. (2012). Cyber incivility @ work: The new age of interpersonal deviance. Cyberpsychology, Behavior and Social Networking, 15(3), 148-154. https://doi.org/10.1089/cyber.2011.0336
DOI
|
18 |
Muneer, A., & Fati, S. M. (2020). A comparative analysis of machine learning techniques for cyberbullying detection on Twitter. Future Internet, 12(11), 187. https://doi.org/10.3390/fi12110187
DOI
|
19 |
Laboreiro, G., & Oliveira, E. (2014, October 6-8). What we can learn from looking at profanity. In A. Baptista, N. Mamede, S. Candeias, I. Paraboni, T. A. S. Pardo, & M. G. V. Nunes (Eds.), Computational Processing of the Portuguese Language: 11th International Conference, PROPOR 2014. Proceedings (pp. 108-113). Springer. https://doi.org/10.1007/978-3-319-09761-9
DOI
|
20 |
Moxey, N., & Bussey, K. (2020). Styles of bystander intervention in cyberbullying incidents. International Journal of Bullying Prevention, 2(1), 6-15. https://doi.org/10.1007/s42380-019-00039-1
DOI
|
21 |
Nandhini, B. S., & Sheeba, J. I. (2015, March 6-7). Cyberbullying detection and classification using information retrieval algorithm. In S. A. Khadar (Ed.), ICARCSET '15: Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015) (pp. 1-5). ACM. https://doi.org/10.1145/2743065.2743085
DOI
|
22 |
Reynolds, K., Kontostathis, A., & Edwards, L. (2011, December 18-21). Using machine learning to detect cyberbullying. In X. Chen, T. Dillon, H. Ishbuchi, J. Pei, H. Wang, & M. A. Wani (Eds.), Proceedings of the 10th International Conference on Machine Learning and Applications (ICMLA 2011) (pp. 241-244). Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ICMLA.2011.152
DOI
|
23 |
Stenetorp, P., Pyysalo, S., Topic, G., Ohta, T., Ananiadou, S., & Tsujii, J. (2012, April 23-27). BRAT: A web-based tool for NLP-assisted text annotation. Proceedings of the Demonstrations at the 13th Conference of the European Chapter of the Association for Computational Linguistics (pp. 102-107). ACL. https://dl.acm.org/doi/10.5555/2380921.2380942
|
24 |
Salmivalli, C. (1999). Participant role approach to school bullying: Implications for interventions. Journal of Adolescence, 22(4), 453-459. https://doi.org/10.1006/jado.1999.0239
DOI
|
25 |
Hinduja, S., & Patchin, J. W. (2018). Cyberbullying: Identification, prevention, and response. https://cyberbullying.org/Cyberbullying-Identification-Prevention-Response-2018.pdf.
|
26 |
Wang, W., Chen, L., Thirunarayan, K., & Sheth, A. P. (2014, February 15-19). Cursing in English on twitter. In S. Fussell & W.e Lutters (Eds.), CSCW'14: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 415-425). ACM. https://doi.org/10.1145/2531602.2531734
DOI
|
27 |
Salawu, S., He, Y., & Lumsden, J. (2017). Approaches to automated detection of cyberbullying: A survey. IEEE Transactions on Affective Computing, 11(1), 3-24. https://doi.org/10.1109/TAFFC.2017.2761757
DOI
|
28 |
Salmivalli, C., Lagerspetz, K., Bjorkqvist, K., Osterman, K., & Kaukiainen, A. (1996). Bullying as a group process: Participant roles and their relations to social status within the group. Aggressive Behavior, 22(1), 1-15. https://doi.org/10.1002/(SICI)1098-2337(1996)22:1%3C1::AIDAB1%3E3.0.CO;2-T
DOI
|
29 |
Sekharan, S. C., Vadivu, G., & Rao, M. V. (2018). A comprehensive study on sarcasm detection techniques in sentiment analysis. International Journal of Pure and Applied Math ematics, 118(22), 433-442. https://acadpubl.eu/hub/2018-118-22/articles/22a/63.pdf
|
30 |
Sheeba, J. I., Devaneyan, S. P., & Cadiravane, R. (2019). Identification and classification of cyberbully incidents using bystander intervention model. International Journal of Recent Technology and Engineering (IJRTE), 8(2S4), 1-6. https://doi.org/10.35940/ijrte.B1001.0782S419
DOI
|
31 |
Sutton, B. B. (2011). Cyberbullying: An interview with Parry Aftab. https://etcjournal.com/2011/02/17/7299
|
32 |
Talpur, B. A., & O'Sullivan, D. (2020). Cyberbullying severity detection: A machine learning approach. PLoS One, 15(10), e0240924. https://doi.org/10.1371/journal.pone.0240924
DOI
|