iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/3569551.3569555
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:06:19Z","timestamp":1730325979341,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,20]]},"DOI":"10.1145\/3569551.3569555","type":"proceedings-article","created":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T14:24:07Z","timestamp":1670509447000},"page":"12-22","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Citadel: An Automated Abuse Detection System to Detect And Prevent Abusive Behaviors over Emails"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0001-0212","authenticated-orcid":false,"given":"Ishita","family":"Haque","sequence":"first","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Bangladesh"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0753-7858","authenticated-orcid":false,"given":"Rudaiba","family":"Adnin","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Bangladesh"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2485-548X","authenticated-orcid":false,"given":"Sadia","family":"Afroz","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Bangladesh"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1359-9257","authenticated-orcid":false,"given":"Faria","family":"Huq","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Bangladesh"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8667-3649","authenticated-orcid":false,"given":"Sazan","family":"Mahbub","sequence":"additional","affiliation":[{"name":"The University of Maryland, College Park, United States"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7572-9750","authenticated-orcid":false,"given":"Sami","family":"Azam","sequence":"additional","affiliation":[{"name":"Charles Darwin University, Australia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8159-6114","authenticated-orcid":false,"given":"A. B. M. Alim Al","family":"Islam","sequence":"additional","affiliation":[{"name":"Bangladesh University of Engineering and Technology, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2022,12,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Toxic Comment Classification Challenge. https:\/\/www.kaggle.com\/c\/jigsaw-toxic-comment-classification-challenge. 2017. Toxic Comment Classification Challenge. https:\/\/www.kaggle.com\/c\/jigsaw-toxic-comment-classification-challenge."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Tune (experimental). https:\/\/chrome.google.com\/webstore\/detail\/tune-experimental\/gdfknffdmmjakmlikbpdngpcpbbfhbnp?hl=en\/. 2019. Tune (experimental). https:\/\/chrome.google.com\/webstore\/detail\/tune-experimental\/gdfknffdmmjakmlikbpdngpcpbbfhbnp?hl=en\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Daniel\u00a0Etcovitch Andrew\u00a0Arsht. 2018. The Human Cost of Online Content Moderation. https:\/\/jolt.law.harvard.edu\/digest\/the-human-cost-of-online-content-moderation\/. Daniel\u00a0Etcovitch Andrew\u00a0Arsht. 2018. The Human Cost of Online Content Moderation. https:\/\/jolt.law.harvard.edu\/digest\/the-human-cost-of-online-content-moderation\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Jennifer Beckett. 2018. We need to talk about the mental health of content moderators. https:\/\/theconversation.com\/we-need-to-talk-about-the-mental-health-of-content-moderators-103830. Jennifer Beckett. 2018. We need to talk about the mental health of content moderators. https:\/\/theconversation.com\/we-need-to-talk-about-the-mental-health-of-content-moderators-103830."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/1079063213509411"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359276"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026018"},{"key":"e_1_3_2_1_8_1","unstructured":"J. Clement. 2020. Number of e-mail users worldwide 2017-2024. https:\/\/www.statista.com\/statistics\/255080\/number-of-e-mail-users-worldwide\/statisticContainer. J. Clement. 2020. Number of e-mail users worldwide 2017-2024. https:\/\/www.statista.com\/statistics\/255080\/number-of-e-mail-users-worldwide\/statisticContainer."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2187995"},{"key":"e_1_3_2_1_10_1","unstructured":"Maeve Duggan. 2014. Online Harassment. https:\/\/www.pewresearch.org\/internet\/2007\/06\/27\/cyberbullying\/. Maeve Duggan. 2014. Online Harassment. https:\/\/www.pewresearch.org\/internet\/2007\/06\/27\/cyberbullying\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Maeve Duggan. 2017. Online Harassment. https:\/\/www.pewresearch.org\/internet\/2017\/07\/11\/online-harassment-2017\/. Maeve Duggan. 2017. Online Harassment. https:\/\/www.pewresearch.org\/internet\/2017\/07\/11\/online-harassment-2017\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Jeanne\u00a0Whalen Elizabeth\u00a0Dwoskin and Regine Cabato. 2019. Content moderators at YouTube Facebook and Twitter see the worst of the web \u2014 and suffer silently. https:\/\/www.washingtonpost.com\/technology\/2019\/07\/25\/social-media-companies-are-outsourcing-their-dirty-work-philippines-generation-workers-is-paying-price\/. Jeanne\u00a0Whalen Elizabeth\u00a0Dwoskin and Regine Cabato. 2019. Content moderators at YouTube Facebook and Twitter see the worst of the web \u2014 and suffer silently. https:\/\/www.washingtonpost.com\/technology\/2019\/07\/25\/social-media-companies-are-outsourcing-their-dirty-work-philippines-generation-workers-is-paying-price\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Facebook. 2020. Facebook Report something. https:\/\/www.facebook.com\/help\/263149623790594\/. Facebook. 2020. Facebook Report something. https:\/\/www.facebook.com\/help\/263149623790594\/."},{"key":"e_1_3_2_1_14_1","unstructured":"FaceBook. 2020. Facebook Terms and Policies. https:\/\/www.facebook.com\/communitystandards\/. FaceBook. 2020. Facebook Terms and Policies. https:\/\/www.facebook.com\/communitystandards\/."},{"volume-title":"1 in 3 Americans Suffered Severe Online Harassment","year":"2018","author":"ALYSSA FOOTE.","key":"e_1_3_2_1_15_1","unstructured":"ALYSSA FOOTE. 2019. 1 in 3 Americans Suffered Severe Online Harassment in 2018 . https:\/\/www.wired.com\/story\/severe-online-harassment-2018-adl-survey\/. ALYSSA FOOTE. 2019. 1 in 3 Americans Suffered Severe Online Harassment in 2018. https:\/\/www.wired.com\/story\/severe-online-harassment-2018-adl-survey\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Tarleton Gillespie. 2018. Custodians of the internet: Platforms content moderation and the hidden decisions that shape social media. 1\u2013288 pages. Tarleton Gillespie. 2018. Custodians of the internet: Platforms content moderation and the hidden decisions that shape social media. 1\u2013288 pages.","DOI":"10.12987\/9780300235029"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491371.3491374"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45002-1_12"},{"volume-title":"Long short-term memory. Neural computation 9, 8","year":"1997","author":"Hochreiter Sepp","key":"e_1_3_2_1_19_1","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long short-term memory. Neural computation 9, 8 ( 1997 ), 1735\u20131780. Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735\u20131780."},{"key":"e_1_3_2_1_20_1","unstructured":"Rachael Krishna. 2018. Tumblr Launched An Algorithm To Flag Porn And So Far It\u2019s Just Caused Chaos. https:\/\/www.buzzfeednews.com\/article\/krishrach\/tumblr-porn-algorithm-ban\/. Rachael Krishna. 2018. Tumblr Launched An Algorithm To Flag Porn And So Far It\u2019s Just Caused Chaos. https:\/\/www.buzzfeednews.com\/article\/krishrach\/tumblr-porn-algorithm-ban\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.4018\/jthi.2013040104"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985761"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_24_1","unstructured":"AMANDA LENHART. 2007. Cyberbullying. https:\/\/www.pewresearch.org\/internet\/2007\/06\/27\/cyberbullying\/. AMANDA LENHART. 2007. Cyberbullying. https:\/\/www.pewresearch.org\/internet\/2007\/06\/27\/cyberbullying\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174160"},{"key":"e_1_3_2_1_26_1","unstructured":"Casey\u00a0Newton Nitasha\u00a0Tiku. 2015. Twitter CEO: \u2019We suck at dealing with abuse. https:\/\/www.theverge.com\/2015\/2\/4\/7982099\/twitter-ceo-sent-memo-taking-personal-responsibility-for-the. Casey\u00a0Newton Nitasha\u00a0Tiku. 2015. Twitter CEO: \u2019We suck at dealing with abuse. https:\/\/www.theverge.com\/2015\/2\/4\/7982099\/twitter-ceo-sent-memo-taking-personal-responsibility-for-the."},{"key":"e_1_3_2_1_27_1","first-page":"640","article-title":"Cyberstalking: An exploratory study of students at a mid-Atlantic university","volume":"10","author":"Paullet L","year":"2009","unstructured":"Karen\u00a0 L Paullet , Daniel\u00a0 R Rota , and Thomas\u00a0 T Swan . 2009 . Cyberstalking: An exploratory study of students at a mid-Atlantic university . Issues in Information Systems 10 , 2 (2009), 640 \u2013 649 . Karen\u00a0L Paullet, Daniel\u00a0R Rota, and Thomas\u00a0T Swan. 2009. Cyberstalking: An exploratory study of students at a mid-Atlantic university. Issues in Information Systems 10, 2 (2009), 640\u2013649.","journal-title":"Issues in Information Systems"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.18794"},{"key":"e_1_3_2_1_29_1","unstructured":"Benjamin Plakett. 2018. Unpaid and abused: Moderators speak out against Reddi. https:\/\/www.engadget.com\/2018-08-31-reddit-moderators-speak-out.html?guccounter=1\/. Benjamin Plakett. 2018. Unpaid and abused: Moderators speak out against Reddi. https:\/\/www.engadget.com\/2018-08-31-reddit-moderators-speak-out.html?guccounter=1\/."},{"key":"e_1_3_2_1_30_1","unstructured":"New\u00a0Zealand Police. 2020. Someone has been sending me offensive emails or threatening \/ harassing me over the internet. What should I do?https:\/\/www.police.govt.nz\/faq\/someone-has-been-sending-me-offensive-emails-or-threatening\u2013harassing-me-over-the-internet.-what-should-i-do. New\u00a0Zealand Police. 2020. Someone has been sending me offensive emails or threatening \/ harassing me over the internet. What should I do?https:\/\/www.police.govt.nz\/faq\/someone-has-been-sending-me-offensive-emails-or-threatening\u2013harassing-me-over-the-internet.-what-should-i-do."},{"key":"e_1_3_2_1_31_1","unstructured":"Twitter\u00a0Public Policy. 2018. Evolving our Twitter Transparency Report: expanded data and insights. https:\/\/blog.twitter.com\/official\/en_us\/topics\/company\/2018\/evolving-our-twitter-transparency-report.html. Twitter\u00a0Public Policy. 2018. Evolving our Twitter Transparency Report: expanded data and insights. https:\/\/blog.twitter.com\/official\/en_us\/topics\/company\/2018\/evolving-our-twitter-transparency-report.html."},{"volume-title":"T\u030ehey Don\u2019t Leave Us Alone Anywhere We GoG\u030eender and Digital Abuse in South Asia. In proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1\u201314","year":"2019","author":"Sambasivan Nithya","key":"e_1_3_2_1_32_1","unstructured":"Nithya Sambasivan , Amna Batool , Nova Ahmed , Tara Matthews , Kurt Thomas , Laura\u00a0Sanely Gayt\u00e1n-Lugo , David Nemer , Elie Bursztein , Elizabeth Churchill , and Sunny Consolvo . 2019 . T\u030ehey Don\u2019t Leave Us Alone Anywhere We GoG\u030eender and Digital Abuse in South Asia. In proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1\u201314 . Nithya Sambasivan, Amna Batool, Nova Ahmed, Tara Matthews, Kurt Thomas, Laura\u00a0Sanely Gayt\u00e1n-Lugo, David Nemer, Elie Bursztein, Elizabeth Churchill, and Sunny Consolvo. 2019. T\u030ehey Don\u2019t Leave Us Alone Anywhere We GoG\u030eender and Digital Abuse in South Asia. In proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1\u201314."},{"volume-title":"Going Deeper With Convolutions. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","year":"2015","author":"Szegedy Christian","key":"e_1_3_2_1_33_1","unstructured":"Christian Szegedy , Wei Liu , Yangqing Jia , Pierre Sermanet , Scott Reed , Dragomir Anguelov , Dumitru Erhan , Vincent Vanhoucke , and Andrew Rabinovich . 2015 . Going Deeper With Convolutions. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2015. Going Deeper With Convolutions. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_34_1","unstructured":"Inc Twitter. 2020. Report abusive behavio. https:\/\/help.twitter.com\/en\/safety-and-security\/report-abusive-behavior. Inc Twitter. 2020. Report abusive behavio. https:\/\/help.twitter.com\/en\/safety-and-security\/report-abusive-behavior."},{"key":"e_1_3_2_1_35_1","unstructured":"Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Advances in neural information processing systems. 649\u2013657. Xiang Zhang Junbo Zhao and Yann LeCun. 2015. Character-level convolutional networks for text classification. In Advances in neural information processing systems. 649\u2013657."}],"event":{"name":"9th NSysS 2022: 2022 9th International Conference on Networking, Systems and Security","acronym":"9th NSysS 2022","location":"Cox's Bazar Bangladesh"},"container-title":["Proceedings of the 9th International Conference on Networking, Systems and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3569551.3569555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T02:44:07Z","timestamp":1701398647000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569551.3569555"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,20]]},"references-count":35,"alternative-id":["10.1145\/3569551.3569555","10.1145\/3569551"],"URL":"https:\/\/doi.org\/10.1145\/3569551.3569555","relation":{},"subject":[],"published":{"date-parts":[[2022,12,20]]},"assertion":[{"value":"2022-12-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}