Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. A. M. Kaplan and M. Haenlein, “Users of the world, unite thechallenges and opportunities of social media,” Business horizons,vol. 53, no. 1, pp. 59–68, 2010.
    2. R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and M. R.Lattanner, “Bullying in the digital age: A critical review and metaanalysisof cyber bullying research among youth.” 2014
    3. M. Ybarra, “Trends in technology-based sexual and nonsexualaggression over time and linkages to nontechnology aggression,”National Summit on Interpersonal Violence and Abuse Across the Lifespan: Forging a Shared Agenda, 2010.
    4. B. K. Biggs, J. M. Nelson, and M. L. Sampilo, “Peer relations inthe anxiety–depression link: Test of a mediation model,” Anxiety,Stress, & Coping, vol. 23, no. 4, pp. 431– 447, 2010
    5. S. R. Jimerson, S. M. Swearer, and D. L. Espelage, Handbook ofbullying in schools: An international perspective. Routledge/Taylor& Francis Group, 2010.
    6. G. Gini and T. Pozzoli, “Association between bullying and psychosomaticproblems: A meta-analysis,” Pediatrics, vol. 123, no. 3,pp. 1059–1065, 2009.
    7. A. Kontostathis, L. Edwards, and A. Leatherman, “Text miningand cybercrime,” Text Mining: Applications and Theory. John Wiley& Sons, Ltd, Chichester, UK, 2010.
    8. J.-M. Xu, K.-S. Jun, X. Zhu, and A. Bellmore, “Learning frombullying traces in social media,” in Proceedings of the 2012 conferenceof the North American chapter of the association for computational linguistics: Human language technologies. Association for ComputationalLinguistics, 2012, pp. 656–666.
    9. Q. Huang, V. K. Singh, and P. K. Atrey, “Cyber bullying detectionusing social and textual analysis,” in Proceeding of the 3rd Internation InternationalWorkshop on SociallyAware Multimedia. ACM, 2014, pp.3–6.
    10. D. Yin, Z. Xue, L. Hong, B. D. Davison, A. Kontostathis, and L. Edwards, “Detection of harassment on web 2.0,” Proceedings of the Content Analysis in the WEB, vol. 2, pp. 1–7, 2009.
    11. K. Dinakar, R. Reichart, and H. Lieberman, “Modeling the detection of textual cyber bullying.” in The Social Mobile Web, 2011.
    12. V. Nahar, X. Li, and C. Pang, “An effective approach for cyber bullying detection,” Communications in Information Science and Management Engineering, 2012
    13. M. Dadvar, F. de Jong, R. Ordelman, and R. Trieschnigg, “Improved cyber bullying detection using gender information,” in Proceedings of the 12th -DutchBelgian Information Retrieval Workshop (DIR2012). Ghent, Belgium: ACM, 2012.

Recent Article