{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T21:37:24Z","timestamp":1726177044973},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031170904"},{"type":"electronic","value":"9783031170911"}],"license":[{"start":{"date-parts":[[2022,10,15]],"date-time":"2022-10-15T00:00:00Z","timestamp":1665792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,10,15]],"date-time":"2022-10-15T00:00:00Z","timestamp":1665792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-17091-1_45","type":"book-chapter","created":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T07:32:56Z","timestamp":1665732776000},"page":"446-455","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Personality Traits of Twitter Bullies Using Deep Learning"],"prefix":"10.1007","author":[{"given":"Alaa","family":"Hesham","sequence":"first","affiliation":[]},{"given":"Abeer","family":"Hamdy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,15]]},"reference":[{"key":"45_CR1","doi-asserted-by":"crossref","unstructured":"Chun J, Lee J, Kim J, Lee S (2020) An international systematic review of cyberbullying measurements. Comput Hum Behav 113:106485","DOI":"10.1016\/j.chb.2020.106485"},{"key":"45_CR2","unstructured":"Hinduja S, Patchin JW (2020) Cyberbullying identification, prevention, and response. Cyberbullying research centre (cyberbullying.org)"},{"issue":"3","key":"45_CR3","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1111\/j.1753-9137.2012.01127.x","volume":"5","author":"E Ryalls","year":"2012","unstructured":"Ryalls E (2012) Demonizing \u201cmean girls\u201d in the news: was phoebe prince \u201cbullied to death?\u201d Commun Cult Crit 5(3):463\u2013481","journal-title":"Commun Cult Crit"},{"key":"45_CR4","unstructured":"Lim AGY The big five personality traits. Personality theories"},{"key":"45_CR5","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A, Bengio Y (2016) Deep learning, vol 1. MIT Press, Cambridge"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Hamdy A, Ezzat G (2020) Deep mining of open source software bug repositories. Int J Comput Appl 1\u20139","DOI":"10.4018\/IJOSSP.2020040101"},{"key":"45_CR7","unstructured":"Hamdy A, Tazy M (2020) Deep hybrid features for code smells detection. J Theor Appl Inf Technol 98(14)"},{"key":"45_CR8","doi-asserted-by":"crossref","unstructured":"Hamdy A, Ezzat G (2021) Deep embedding of open source software bug repositories for severity prediction. In: Research and evidence in software engineering","DOI":"10.1201\/9781003168393-10"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Alonso C, Romero E (December 2017) Aggressors and victims in bullying and cyberbullying: a study of personality profiles using the five-factor model. Span J Psychol 20:E76","DOI":"10.1017\/sjp.2017.73"},{"issue":"5","key":"45_CR10","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1007\/s12144-018-0005-6","volume":"38","author":"Y Zhou","year":"2018","unstructured":"Zhou Y, Zheng W, Gao X (2018) The relationship between the big five and cyberbullying among college students: the mediating effect of moral disengagement. Curr Psychol 38(5):1162\u20131173. https:\/\/doi.org\/10.1007\/s12144-018-0005-6","journal-title":"Curr Psychol"},{"key":"45_CR11","first-page":"129","volume":"49","author":"S \u00c7elik","year":"2012","unstructured":"\u00c7elik S, Atak H, Erguzen A (2012) The effect of personality on cyberbullying among university students in Turkey. Egitim Arastirmalari Eurasian J Educ Res 49:129\u2013150","journal-title":"Egitim Arastirmalari Eurasian J Educ Res"},{"key":"45_CR12","doi-asserted-by":"publisher","unstructured":"Balakrishnan V, Khan S, Fernandez, T, Arabnia HR (2019) Cyberbullying detection on Twitter using big five and dark triad features. Personal Individ Differ 141:252\u2013257. ISSN 0191-8869. https:\/\/doi.org\/10.1016\/j.paid.2019.01.024","DOI":"10.1016\/j.paid.2019.01.024"},{"key":"45_CR13","doi-asserted-by":"publisher","unstructured":"Majumder N, Poria S, Gelbukh A, Cambria E (2017) Deep learning-based document modeling for personality detection from text.\u00a0IEEE Intell Syst 32(2):74\u201379. https:\/\/doi.org\/10.1109\/MIS.2017.23","DOI":"10.1109\/MIS.2017.23"},{"key":"45_CR14","unstructured":"Kazameini A, Fatehi S, Mehta Y, Eetemadi, S, Cambria E (2020): Personality trait detection using bagged SVM over BERT word embedding ensembles. ArXiv"},{"key":"45_CR15","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1142\/S0218194019500311","volume":"29","author":"A Hamdy","year":"2019","unstructured":"Hamdy A, El-laithy A (2019) SMOTE and feature selection for more effective bug severity prediction. Int J Software Eng Knowl Eng 29:897\u2013919","journal-title":"Int J Software Eng Knowl Eng"},{"key":"45_CR16","doi-asserted-by":"publisher","unstructured":"Hamdy A, El-Laithy A (2020) Semantic categorization of software bug repositories for severity assignment automation. In: Jarzabek S, Poniszewska-Mara\u0144da A, Madeyski L (eds.) Integrating research and practice in software engineering. SCI, vol 851. Springer, Cham, pp 15\u201330. https:\/\/doi.org\/10.1007\/978-3-030-26574-8_2","DOI":"10.1007\/978-3-030-26574-8_2"},{"key":"45_CR17","doi-asserted-by":"crossref","unstructured":"Hamdy A, Elsayed M (2018) Topic modelling for automatic selection of software design patterns. In: ICGDA 2018","DOI":"10.1145\/3220228.3220263"},{"key":"45_CR18","unstructured":"Hamdy A, Elsayed M (2018) Towards more accurate automatic recommendation of software design patterns. J Theor Appl Inf Technol 5069\u20135079"},{"key":"45_CR19","doi-asserted-by":"crossref","unstructured":"Hamdy A, Elsayed M (2018) Automatic recommendation of software design patterns: text retrieval approach. J Softw 13, 260\u2013268","DOI":"10.17706\/jsw.13.4.260-268"},{"issue":"2","key":"45_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJOSSP.2020040101","volume":"11","author":"A Hamdy","year":"2020","unstructured":"Hamdy A, El-Laithy A (2020) Multi-Feature approach for Bug severity assignment. Int J Open Sour Softw Proces 11(2):1\u201315","journal-title":"Int J Open Sour Softw Proces"},{"key":"45_CR21","doi-asserted-by":"crossref","unstructured":"Hutto CJ, Gilbert EE (June 2014) VADER: a parsimonious rule-based model for sentiment analysis of social media text. In: Eighth international conference on weblogs and social media (ICWSM-14), Ann Arbor, MI","DOI":"10.1609\/icwsm.v8i1.14550"},{"key":"45_CR22","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J (2013). Distributed representations of words and phrases and their compositionality. ArXiv, abs\/1310.4546"},{"key":"45_CR23","doi-asserted-by":"crossref","unstructured":"Pennington, J, Socher R (2014) Manning CD GloVe: global vectors for word representation. Standford university","DOI":"10.3115\/v1\/D14-1162"},{"key":"45_CR24","doi-asserted-by":"crossref","unstructured":"Pennebaker JW, King LA.: Linguistic styles: language use as an individual difference. J Personal Soc Psych 77(6):1999, pp. 1296\u20131312","DOI":"10.1037\/0022-3514.77.6.1296"}],"container-title":["Lecture Notes in Networks and Systems","Artificial Intelligence and Online Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17091-1_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T05:27:41Z","timestamp":1678253261000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17091-1_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,15]]},"ISBN":["9783031170904","9783031170911"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17091-1_45","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022,10,15]]},"assertion":[{"value":"15 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"REV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Remote Engineering and Virtual Instrumentation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":": British University Egypt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 February 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"REV-2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}