iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3078714.3078721
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:19:36Z","timestamp":1732036776672,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T00:00:00Z","timestamp":1499126400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union's H2020-MSCA-RISE grant ENCASE","award":["691025"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,4]]},"DOI":"10.1145\/3078714.3078721","type":"proceedings-article","created":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T12:30:41Z","timestamp":1498653041000},"page":"65-74","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Hate is not Binary"],"prefix":"10.1145","author":[{"given":"Despoina","family":"Chatzakou","sequence":"first","affiliation":[{"name":"Aristotle University of Thessaloniki, Thessaloniki, Greece"}]},{"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"Athena","family":"Vakali","sequence":"additional","affiliation":[{"name":"Aristotle University of Thessaloniki, Thessaloniki, Greece"}]}],"member":"320","published-online":{"date-parts":[[2017,7,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"About suspended accounts 2017. goo.gl\/byStB8. (2017). About suspended accounts 2017. goo.gl\/byStB8. (2017)."},{"volume":"6","volume-title":"CEAS","year":"2010","author":"Benevenuto Fabricio","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091487"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3053890"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACII.2013.68"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Chao Chen Jun Zhang Xiao Chen Yang Xiang and Wanle Zhou. 2015. 6 million spam tweets: A large ground truth for timely Twitter spam detection. In IEEE ICC. Chao Chen Jun Zhang Xiao Chen Yang Xiang and Wanle Zhou. 2015. 6 million spam tweets: A large ground truth for timely Twitter spam detection. In IEEE ICC.","DOI":"10.1109\/ICC.2015.7249453"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Maral Dadvar Dolf Trieschnigg and Franciska Jong. 2014. Experts and machines against bullies: A hybrid approach to detect cyberbullies. In Canadian AI. Maral Dadvar Dolf Trieschnigg and Franciska Jong. 2014. Experts and machines against bullies: A hybrid approach to detect cyberbullies. In Canadian AI.","DOI":"10.1007\/978-3-319-06483-3_25"},{"key":"e_1_3_2_1_9_1","unstructured":"Karthik Dinakar Roi Reichart and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. The Social Mobile Web 11 (2011). Karthik Dinakar Roi Reichart and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. The Social Mobile Web 11 (2011)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742760"},{"key":"e_1_3_2_1_11_1","unstructured":"Paul Ekman Wallace V. Friesen and Phoebe Ellsworth. 1982. What emotion categories or dimensions can observers judge from facial behavior? Emotion in the human face (1982). Paul Ekman Wallace V. Friesen and Phoebe Ellsworth. 1982. What emotion categories or dimensions can observers judge from facial behavior? Emotion in the human face (1982)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.014"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Joshua Guberman and Libby Hemphill. 2017. Challenges in Modifying Existing Scales for Detecting Harassment in Individual Tweets. In System Sciences. Joshua Guberman and Libby Hemphill. 2017. Challenges in Modifying Existing Scales for Detecting Harassment in Individual Tweets. In System Sciences.","DOI":"10.24251\/HICSS.2017.267"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1561\/2000000034"},{"key":"e_1_3_2_1_15_1","unstructured":"Hatebase database. 2017. (2017). https:\/\/www.hatebase.org\/. Hatebase database. 2017. (2017). https:\/\/www.hatebase.org\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Gabriel Emile Hine Jeremiah Onaolapo Emiliano De Cristofaro Nicolas Kourtel- lis Ilias Leontiadis Riginos Samaras Gianluca Stringhini and Jeremy Blackburn. 2017. Kek Cucks and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web. In ICWSM . Gabriel Emile Hine Jeremiah Onaolapo Emiliano De Cristofaro Nicolas Kourtel- lis Ilias Leontiadis Riginos Samaras Gianluca Stringhini and Jeremy Blackburn. 2017. Kek Cucks and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web. In ICWSM ."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Homa Hosseinmardi Richard Han Qin Lv Shivakant Mishra and Amir Ghasemi- anlangroodi. 2014. Towards understanding cyberbullying behavior in a semi- anonymous social network. In IEEE\/ACM ASONAM . Homa Hosseinmardi Richard Han Qin Lv Shivakant Mishra and Amir Ghasemi- anlangroodi. 2014. Towards understanding cyberbullying behavior in a semi- anonymous social network. In IEEE\/ACM ASONAM .","DOI":"10.1109\/ASONAM.2014.6921591"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Homa Hosseinmardi Sabrina Arredondo Mattson Rahat Ibn Rafiq Richard Han Qin Lv and Shivakant Mishra. 2015. Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network. In SocInfo. Homa Hosseinmardi Sabrina Arredondo Mattson Rahat Ibn Rafiq Richard Han Qin Lv and Shivakant Mishra. 2015. Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network. In SocInfo.","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741674"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702529"},{"volume":"1","volume-title":"Mathematical Statistics and Probability","year":"1967","author":"MacQueen James","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Adrienne Massanari. 2015. #Gamergate and The Fappening: How Reddit's algorithm governance and culture support toxic technocultures. New Media & Society (2015). Adrienne Massanari. 2015. #Gamergate and The Fappening: How Reddit's algorithm governance and culture support toxic technocultures. New Media & Society (2015).","DOI":"10.1177\/1461444815608807"},{"key":"e_1_3_2_1_23_1","unstructured":"Torill Elvira Mortensen. 2016. Anger Fear and Games. Games and Culture (2016). Torill Elvira Mortensen. 2016. Anger Fear and Games. Games and Culture (2016)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883062"},{"key":"e_1_3_2_1_26_1","unstructured":"Pham Sherisse. 2017. Twitter tries new measures in crackdown on harassment. CNNtech. (7 February 2017). goo.gl\/nMi4ZQ. Pham Sherisse. 2017. Twitter tries new measures in crackdown on harassment. CNNtech. (7 February 2017). goo.gl\/nMi4ZQ."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Lior Rokach and Oded Maimon. 2014. Data mining with decision trees: theory and applications. Lior Rokach and Oded Maimon. 2014. Data mining with decision trees: theory and applications.","DOI":"10.1142\/9097"},{"key":"e_1_3_2_1_28_1","unstructured":"Rozsa Matthew 2016. Twitter trolls are now abusing the company's bottom line. goo.gl\/Kb514G. (20 Oct 2016). Rozsa Matthew 2016. Twitter trolls are now abusing the company's bottom line. goo.gl\/Kb514G. (20 Oct 2016)."},{"key":"e_1_3_2_1_29_1","unstructured":"Huascar Sanchez and Shreyas Kumar. 2011. Twitter bullying detection. NSDI. Huascar Sanchez and Shreyas Kumar. 2011. Twitter bullying detection. NSDI."},{"key":"e_1_3_2_1_30_1","unstructured":"SentiStrength. 2010. https:\/\/goo.gl\/FlpUYU. (2010). SentiStrength. 2010. https:\/\/goo.gl\/FlpUYU. (2010)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_32_1","unstructured":"Aatif Sulleyman. 2017. Twitter temporarily limiting users for abusive behaviour. Independent. (16 February 2017). goo.gl\/yf JrZn. Aatif Sulleyman. 2017. Twitter temporarily limiting users for abusive behaviour. Independent. (16 February 2017). goo.gl\/yf JrZn."},{"key":"e_1_3_2_1_33_1","unstructured":"The Guardian. 2016. Did trolls cost Twitter 3.5bn and its sale? goo.gl\/73h7jX. (18 Oct 2016). The Guardian. 2016. Did trolls cost Twitter 3.5bn and its sale? goo.gl\/73h7jX. (18 Oct 2016)."},{"key":"e_1_3_2_1_34_1","unstructured":"Twitter Streaming API. 2017. goo.gl\/OLhKsR. (2017). Twitter Streaming API. 2017. goo.gl\/OLhKsR. (2017)."},{"key":"e_1_3_2_1_35_1","unstructured":"Cynthia Van Hee Els Lefever Ben Verhoeven Julie Mennes Bart Desmet Guy De Pauw Walter Daelemans and V\u00e9ronique Hoste. 2015. Automatic detection and prevention of cyberbullying. In HUSO. 13--18. Cynthia Van Hee Els Lefever Ben Verhoeven Julie Mennes Bart Desmet Guy De Pauw Walter Daelemans and V\u00e9ronique Hoste. 2015. Automatic detection and prevention of cyberbullying. In HUSO. 13--18."},{"volume-title":"SECRYPT","author":"Wang Alex Hai","key":"e_1_3_2_1_36_1"}],"event":{"name":"HT'17: 28th Conference on Hypertext and Social Media","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Prague Czech Republic","acronym":"HT'17"},"container-title":["Proceedings of the 28th ACM Conference on Hypertext and Social Media"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078714.3078721","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T02:14:56Z","timestamp":1673489696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078714.3078721"}},"subtitle":["Studying Abusive Behavior of #GamerGate on Twitter"],"short-title":[],"issued":{"date-parts":[[2017,7,4]]},"references-count":36,"alternative-id":["10.1145\/3078714.3078721","10.1145\/3078714"],"URL":"https:\/\/doi.org\/10.1145\/3078714.3078721","relation":{},"subject":[],"published":{"date-parts":[[2017,7,4]]},"assertion":[{"value":"2017-07-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}