Author:
Singh Swaranjit,Thapar Vivek,Bagga Sachin
Reference19 articles.
1. Social media? Get serious! Understanding the functional building blocks of social media.;Kietzmann;Bus. Horiz.,2011
2. Hamiza Wan Ali, W.N., Mohd, M. and Fauzi, F. (2018). “Cyberbullying Detection: An Overview.” In 2018 Cyber Resilience Conference (CRC) pp 1–3. IEEE.
3. Ting, I.-H., Liou, W.S., Liberona, D., Wang, S.-L. and Bermudez, G.M.T. (2017). “Towards the detection of cyberbullying based on social network mining techniques.” In 2017 International Conference on Behavioral, Economic, Socio-cultural Computing (BESC) pp 1–2. IEEE.
4. Khattar, A., Dabas, K., Gupta, K., Chopra, S. and Kumaraguru, P. White or Blue, the Whale gets its Vengeance: A Social Media Analysis of the Blue Whale Challenge.
5. Sakuma, A. “momo-challenge-hoax-explained.” Mar 3, 2019. Available at https://www.vox.com/2019/3/3/18248783/momo-challenge-hoax-explained.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Technology Intelligence: Geothermal Energy;Future‐Oriented Technology Assessment;2024-09-06
2. Unravelling the Nexus: Cyberbullying, Sleep Quality, and Sleep-Related Impairments on Digital Platforms Among Young Adults;International Journal of Social Inquiry;2024-08-31
3. Prediction of Cyberbullying Attacks on Twitter Data using ANN and NLP;2024 3rd International Conference for Innovation in Technology (INOCON);2024-03-01
4. Explainable AI Method for Cyber bullying Detection;2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC);2022-12-02
5. Machine Learning Methods to Identify Aggressive Behavior in Social Media;Emerging Technologies in Data Mining and Information Security;2022-09-16