Us and them: identifying cyber hate on Twitter across multiple protected characteristics
暂无分享,去创建一个
[1] M. Nicole Warehime,et al. Soul of Society: A Focus on the Lives of Children & Youth , 2014 .
[2] Ying Chen,et al. Detecting Offensive Language in Social Media to Protect Adolescent Online Safety , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[3] A. Downs. Up and Down with Ecology--The Issue Attention Cycle , 1972 .
[4] Peter Burnap,et al. Policing cyber-neighbourhoods: tension monitoring and social media networks , 2013 .
[5] ThelwallMike,et al. Sentiment strength detection in short informal text , 2010 .
[6] Laura Leets,et al. Responses to Internet Hate Sites: Is Speech Too Free in Cyberspace? , 2001 .
[7] Mike Thelwall,et al. Data mining emotion in social network communication: Gender differences in MySpace , 2010, J. Assoc. Inf. Sci. Technol..
[8] Alan F. Smeaton,et al. Classifying racist texts using a support vector machine , 2004, SIGIR '04.
[9] Nick Pendar,et al. Toward Spotting the Pedophile Telling victim from predator in text chats , 2007, International Conference on Semantic Computing (ICSC 2007).
[10] Matthew Leighton Williams,et al. Cyber Hate Speech on Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making , 2015 .
[11] Dolf Trieschnigg,et al. Expert knowledge for automatic detection of bullies in social networks , 2013 .
[12] Priscilla Marie Meddaugh,et al. Hate Speech or “Reasonable Racism?” The Other in Stormfront , 2009 .
[13] Henry Lieberman,et al. Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying , 2012, TIIS.
[14] Jasmin Tregidga,et al. Hate Crime Victimization in Wales Psychological and Physical Impacts Across Seven Hate Crime Victim Types , 2014 .
[15] Christopher D. Manning,et al. Generating Typed Dependency Parses from Phrase Structure Parses , 2006, LREC.
[16] Vincent A. Knight,et al. Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack , 2014, Social Network Analysis and Mining.
[17] Neil Chakraborti,et al. The veil under attack , 2012 .
[18] Ryan D. King,et al. HIGH TIMES FOR HATE CRIMES: EXPLAINING THE TEMPORAL CLUSTERING OF HATE‐MOTIVATED OFFENDING , 2013 .
[19] Kate Eichhorn,et al. Re-in/citing linguistic injuries: speech acts, cyberhate, and the spatial and temporal character of networked environments , 2001 .
[20] Mike Thelwall,et al. Sentiment in short strength detection informal text , 2010 .
[21] M. Williams,et al. Cyber-hate on social media in the aftermath of Woolwich , 2015 .
[22] Adam Michael Edwards,et al. Detecting tension in online communities with computational Twitter analysis , 2015 .
[23] James Hawdon,et al. Exposure to Online Hate among Young Social Media Users , 2014 .
[24] K. Aas,et al. Policing Humanitarian Borderlands: Frontex, Human Rights and the Precariousness of Life , 2015 .
[25] Barbara Perry,et al. Cyberhate: the globalization of hate , 2009 .
[26] Ruth Wodak,et al. DISCOURSE AND RACISM: European Perspectives , 1999 .
[27] Graeme Hirst,et al. Interpreting Anaphoric Shell Nouns using Antecedents of Cataphoric Shell Nouns as Training Data , 2013, EMNLP.