{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:23:33Z","timestamp":1732040613712},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.1145\/3447535.3462637","type":"proceedings-article","created":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T19:32:12Z","timestamp":1624390332000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["Understanding the Effect of Deplatforming on Social Networks"],"prefix":"10.1145","author":[{"given":"Shiza","family":"Ali","sequence":"first","affiliation":[{"name":"Boston University, USA"}]},{"given":"Mohammad Hammas","family":"Saeed","sequence":"additional","affiliation":[{"name":"Boston University, USA"}]},{"given":"Esraa","family":"Aldreabi","sequence":"additional","affiliation":[{"name":"Binghamton University, USA"}]},{"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[{"name":"Binghamton University, USA"}]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[{"name":"University College London, United Kingdom"}]},{"given":"Savvas","family":"Zannettou","sequence":"additional","affiliation":[{"name":"Max Planck Institute, Saarbr\u00fccken, Germany"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Boston University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,22]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Malicious accounts: Dark of the social networks. Journal of Network and Computer Applications 79","author":"Adewole Kayode\u00a0Sakariyah","year":"2017","unstructured":"Kayode\u00a0Sakariyah Adewole , Nor\u00a0Badrul Anuar , Amirrudin Kamsin , Kasturi\u00a0Dewi Varathan , and Syed\u00a0Abdul Razak . 2017. Malicious accounts: Dark of the social networks. Journal of Network and Computer Applications 79 ( 2017 ). Kayode\u00a0Sakariyah Adewole, Nor\u00a0Badrul Anuar, Amirrudin Kamsin, Kasturi\u00a0Dewi Varathan, and Syed\u00a0Abdul Razak. 2017. Malicious accounts: Dark of the social networks. Journal of Network and Computer Applications 79 (2017)."},{"key":"e_1_3_2_2_2_1","unstructured":"ADL. 2019. When Twitter Bans Extremists GAB Puts Out the Welcome Mat. https:\/\/www.adl.org\/blog\/when-twitter-bans-extremists-gab-puts-out-the-welcome-mat. ADL. 2019. When Twitter Bans Extremists GAB Puts Out the Welcome Mat. https:\/\/www.adl.org\/blog\/when-twitter-bans-extremists-gab-puts-out-the-welcome-mat."},{"key":"e_1_3_2_2_3_1","unstructured":"ADL. 2020. Gab and 8chan: Home to Terrorist Plots Hiding in Plain Sight. https:\/\/www.adl.org\/resources\/reports\/gab-and-8chan-home-to-terrorist-plots-hiding-in-plain-sight. ADL. 2020. Gab and 8chan: Home to Terrorist Plots Hiding in Plain Sight. https:\/\/www.adl.org\/resources\/reports\/gab-and-8chan-home-to-terrorist-plots-hiding-in-plain-sight."},{"key":"e_1_3_2_2_4_1","unstructured":"Max Aliapoulios Emmi Bevensee Jeremy Blackburn Emiliano De\u00a0Cristofaro Gianluca Stringhini and Savvas Zannettou. 2021. An Early Look at the Parler Online Social Network. arXiv preprint arXiv:2101.03820(2021). Max Aliapoulios Emmi Bevensee Jeremy Blackburn Emiliano De\u00a0Cristofaro Gianluca Stringhini and Savvas Zannettou. 2021. An Early Look at the Parler Online Social Network. arXiv preprint arXiv:2101.03820(2021)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Wafa Alorainy Pete Burnap Han Liu Amir Javed and Matthew\u00a0L Williams. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. In ICMLC. Wafa Alorainy Pete Burnap Han Liu Amir Javed and Matthew\u00a0L Williams. 2018. Suspended accounts: A source of Tweets with disgust and anger emotions for augmenting hate speech data sample. In ICMLC.","DOI":"10.1109\/ICMLC.2018.8527001"},{"key":"e_1_3_2_2_6_1","volume-title":"Deep Learning for Hate Speech Detection in Tweets. ArXiv:1706.00188","author":"Badjatiya Pinkesh","year":"2017","unstructured":"Pinkesh Badjatiya , Shashank Gupta , Manish Gupta , and Vasudeva Varma . 2017. Deep Learning for Hate Speech Detection in Tweets. ArXiv:1706.00188 ( 2017 ). Pinkesh Badjatiya, Shashank Gupta, Manish Gupta, and Vasudeva Varma. 2017. Deep Learning for Hate Speech Detection in Tweets. ArXiv:1706.00188 (2017)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Jason Baumgartner Savvas Zannettou Brian Keegan Megan Squire and Jeremy Blackburn. 2020. The Pushshift Reddit Dataset. In ICWSM. Jason Baumgartner Savvas Zannettou Brian Keegan Megan Squire and Jeremy Blackburn. 2020. The Pushshift Reddit Dataset. In ICWSM.","DOI":"10.1609\/icwsm.v14i1.7347"},{"key":"e_1_3_2_2_8_1","volume-title":"Random forests. Machine Learning 45, 1","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman . 2001. Random forests. Machine Learning 45, 1 ( 2001 ). Leo Breiman. 2001. Random forests. Machine Learning 45, 1 (2001)."},{"key":"e_1_3_2_2_9_1","volume-title":"Cyber Hate Speech on Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making. Policy & Internet 7, 2","author":"Burnap Pete","year":"2015","unstructured":"Pete Burnap and Matthew\u00a0 L. Williams . 2015. Cyber Hate Speech on Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making. Policy & Internet 7, 2 ( 2015 ). arXiv:https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/poi3.85 Pete Burnap and Matthew\u00a0L. Williams. 2015. Cyber Hate Speech on Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making. Policy & Internet 7, 2 (2015). arXiv:https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/poi3.85"},{"key":"e_1_3_2_2_10_1","unstructured":"Sissi Cao. 2019. Google\u2019s AI Hate Speech Detector Has a \u2018Black Twitter\u2019 Problem: Study | Observer. https:\/\/observer.com\/2019\/08\/google-ai-hate-speech-detector-black-racial-bias-twitter-study\/ Sissi Cao. 2019. Google\u2019s AI Hate Speech Detector Has a \u2018Black Twitter\u2019 Problem: Study | Observer. https:\/\/observer.com\/2019\/08\/google-ai-hate-speech-detector-black-racial-bias-twitter-study\/"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134666"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Despoina Chatzakou Nicolas Kourtellis Jeremy Blackburn Emiliano De\u00a0Cristofaro Gianluca Stringhini and Athena Vakali. 2017. Mean birds: Detecting aggression and bullying on twitter. In ACM WebSci. Despoina Chatzakou Nicolas Kourtellis Jeremy Blackburn Emiliano De\u00a0Cristofaro Gianluca Stringhini and Athena Vakali. 2017. Mean birds: Detecting aggression and bullying on twitter. In ACM WebSci.","DOI":"10.1145\/3091478.3091487"},{"key":"e_1_3_2_2_13_1","unstructured":"Devin Coldewey. 2019. Racial bias observed in hate speech detection algorithm from Google | TechCrunch. https:\/\/techcrunch.com\/2019\/08\/14\/racial-bias-observed-in-hate-speech-detection-algorithm-from-google\/ Devin Coldewey. 2019. Racial bias observed in hate speech detection algorithm from Google | TechCrunch. https:\/\/techcrunch.com\/2019\/08\/14\/racial-bias-observed-in-hate-speech-detection-algorithm-from-google\/"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Thomas Davidson Dana Warmsley Michael Macy and Ingmar Weber. 2017. Automated Hate Speech Detection and the Problem of Offensive Language. In ICWSM. Thomas Davidson Dana Warmsley Michael Macy and Ingmar Weber. 2017. Automated Hate Speech Detection and the Problem of Offensive Language. In ICWSM.","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Emiliano De\u00a0Cristofaro Arik Friedman Guillaume Jourjon Mohamed\u00a0Ali Kaafar and M\u00a0Zubair Shafiq. 2014. Paying for likes? understanding facebook like fraud using honeypots. In ACM IMC. Emiliano De\u00a0Cristofaro Arik Friedman Guillaume Jourjon Mohamed\u00a0Ali Kaafar and M\u00a0Zubair Shafiq. 2014. Paying for likes? understanding facebook like fraud using honeypots. In ACM IMC.","DOI":"10.1145\/2663716.2663729"},{"key":"e_1_3_2_2_16_1","unstructured":"Pablo Delgado. 2019. How El Pa\u00eds used AI to make their comments section less toxic. https:\/\/blog.google\/outreach-initiatives\/google-news-initiative\/how-el-pais-used-ai-make-their-comments-section-less-toxic\/. Pablo Delgado. 2019. How El Pa\u00eds used AI to make their comments section less toxic. https:\/\/blog.google\/outreach-initiatives\/google-news-initiative\/how-el-pais-used-ai-make-their-comments-section-less-toxic\/."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Zhenyun Deng Xiaoshu Zhu Debo Cheng Ming Zong and Shichao Zhang. 2016. Efficient kNN classification algorithm for big data. Neurocomputing 195(2016). Zhenyun Deng Xiaoshu Zhu Debo Cheng Ming Zong and Shichao Zhang. 2016. Efficient kNN classification algorithm for big data. Neurocomputing 195(2016).","DOI":"10.1016\/j.neucom.2015.08.112"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Nemanja Djuric Jing Zhou Robin Morris Mihajlo Grbovic Vladan Radosavljevic and Narayan Bhamidipati. 2015. Hate speech detection with comment embeddings. In WWW Companion. Nemanja Djuric Jing Zhou Robin Morris Mihajlo Grbovic Vladan Radosavljevic and Narayan Bhamidipati. 2015. Hate speech detection with comment embeddings. In WWW Companion.","DOI":"10.1145\/2740908.2742760"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"Mai ElSherief Shirin Nilizadeh Dana Nguyen Giovanni Vigna and Elizabeth Belding. 2018. Peer to peer hate: Hate speech instigators and their targets. In ICWSM. Mai ElSherief Shirin Nilizadeh Dana Nguyen Giovanni Vigna and Elizabeth Belding. 2018. Peer to peer hate: Hate speech instigators and their targets. In ICWSM.","DOI":"10.1609\/icwsm.v12i1.15038"},{"key":"e_1_3_2_2_20_1","unstructured":"David Gilbert. 2019. Here\u2019s How Big Far Right Social Network Gab Has Actually Gotten. https:\/\/www.vice.com\/en_uk\/article\/pa7dwg\/heres-how-big-far-right-social-network-gab-has-actually-become. David Gilbert. 2019. Here\u2019s How Big Far Right Social Network Gab Has Actually Gotten. https:\/\/www.vice.com\/en_uk\/article\/pa7dwg\/heres-how-big-far-right-social-network-gab-has-actually-become."},{"key":"e_1_3_2_2_21_1","unstructured":"Google. 2020. Perspective API. https:\/\/www.perspectiveapi.com. Google. 2020. Perspective API. https:\/\/www.perspectiveapi.com."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Chris Grier Kurt Thomas Vern Paxson and Michael Zhang. 2010. @spam: the underground on 140 characters or less. In ACM CCS. Chris Grier Kurt Thomas Vern Paxson and Michael Zhang. 2010. @spam: the underground on 140 characters or less. In ACM CCS.","DOI":"10.1145\/1866307.1866311"},{"key":"e_1_3_2_2_23_1","volume-title":"To Act or React? Investigating Proactive Strategies For Online Community Moderation. arXiv:1906.11932","author":"Habib Hussam","year":"2019","unstructured":"Hussam Habib , Maaz\u00a0Bin Musa , Fareed Zaffar , and Rishab Nithyanand . 2019. To Act or React? Investigating Proactive Strategies For Online Community Moderation. arXiv:1906.11932 ( 2019 ). arXiv:1906.11932v1 Hussam Habib, Maaz\u00a0Bin Musa, Fareed Zaffar, and Rishab Nithyanand. 2019. To Act or React? Investigating Proactive Strategies For Online Community Moderation. arXiv:1906.11932 (2019). arXiv:1906.11932v1"},{"key":"e_1_3_2_2_24_1","volume-title":"International journal of developmental science 12, 1-2","author":"Hassan Ghayda","year":"2018","unstructured":"Ghayda Hassan , S\u00e9bastien Brouillette-Alarie , S\u00e9raphin Alava , Divina Frau-Meigs , Lysiane Lavoie , Arber Fetiu , Wynnpaul Varela , Evgueni Borokhovski , Vivek Venkatesh , C\u00e9cile Rousseau , 2018. Exposure to extremist online content could lead to violent radicalization: A systematic review of empirical evidence . International journal of developmental science 12, 1-2 ( 2018 ), 71\u201388. Ghayda Hassan, S\u00e9bastien Brouillette-Alarie, S\u00e9raphin Alava, Divina Frau-Meigs, Lysiane Lavoie, Arber Fetiu, Wynnpaul Varela, Evgueni Borokhovski, Vivek Venkatesh, C\u00e9cile Rousseau, 2018. Exposure to extremist online content could lead to violent radicalization: A systematic review of empirical evidence. International journal of developmental science 12, 1-2 (2018), 71\u201388."},{"key":"e_1_3_2_2_25_1","volume-title":"Deceiving Google\u2019s Perspective API Built for Detecting Toxic Comments. arXiv:1702.08138","author":"Hosseini Hossein","year":"2017","unstructured":"Hossein Hosseini , Sreeram Kannan , Baosen Zhang , and Radha Poovendran . 2017. Deceiving Google\u2019s Perspective API Built for Detecting Toxic Comments. arXiv:1702.08138 ( 2017 ). Hossein Hosseini, Sreeram Kannan, Baosen Zhang, and Radha Poovendran. 2017. Deceiving Google\u2019s Perspective API Built for Detecting Toxic Comments. arXiv:1702.08138 (2017)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_12"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359294"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1386\/jdtv.8.3.403_1"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Imrul Kayes Nicolas Kourtellis Daniele Quercia Adriana Iamnitchi and Francesco Bonchi. 2015. The Social World of Content Abusers in Community Question Answering. In WWW. Imrul Kayes Nicolas Kourtellis Daniele Quercia Adriana Iamnitchi and Francesco Bonchi. 2015. The Social World of Content Abusers in Community Question Answering. In WWW.","DOI":"10.1145\/2736277.2741674"},{"key":"e_1_3_2_2_30_1","unstructured":"Mohammed Korayem and David\u00a0J Crandall. 2013. De-Anonymizing Users Across Heterogeneous Social Computing Platforms.. In ICWSM. Mohammed Korayem and David\u00a0J Crandall. 2013. De-Anonymizing Users Across Heterogeneous Social Computing Platforms.. In ICWSM."},{"key":"e_1_3_2_2_31_1","volume-title":"Note on Cohen\u2019s Kappa. Psychological Reports 65, 1","author":"Kvalseth O.","year":"1989","unstructured":"Tarald\u00a0 O. Kvalseth . 1989. Note on Cohen\u2019s Kappa. Psychological Reports 65, 1 ( 1989 ). arXiv:https:\/\/doi.org\/10.2466\/pr0.1989.65.1.223 Tarald\u00a0O. Kvalseth. 1989. Note on Cohen\u2019s Kappa. Psychological Reports 65, 1 (1989). arXiv:https:\/\/doi.org\/10.2466\/pr0.1989.65.1.223"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Enrico Mariconti Jeremiah Onaolapo Syed Ahmad Nicolas Nikiforou Manuel Egele Nick Nikiforakis and Gianluca Stringhini. 2017. What\u2019s in a Name?: Understanding Profile Name Reuse on Twitter. In WWW. Enrico Mariconti Jeremiah Onaolapo Syed Ahmad Nicolas Nikiforou Manuel Egele Nick Nikiforakis and Gianluca Stringhini. 2017. What\u2019s in a Name?: Understanding Profile Name Reuse on Twitter. In WWW.","DOI":"10.1145\/3038912.3052589"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Binny Mathew Ritam Dutt Pawan Goyal and Animesh Mukherjee. 2019. Spread of Hate Speech in Online Social Media. In ACM WebSci. Binny Mathew Ritam Dutt Pawan Goyal and Animesh Mukherjee. 2019. Spread of Hate Speech in Online Social Media. In ACM WebSci.","DOI":"10.1145\/3292522.3326034"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Binny Mathew Punyajoy Saha Hardik Tharad Subham Rajgaria Prajwal Singhania Suman\u00a0Kalyan Maity Pawan Goyal and Animesh Mukherje. 2019. Thou shalt not hate: Countering Online Hate Speech. In ICWSM. Binny Mathew Punyajoy Saha Hardik Tharad Subham Rajgaria Prajwal Singhania Suman\u00a0Kalyan Maity Pawan Goyal and Animesh Mukherje. 2019. Thou shalt not hate: Countering Online Hate Speech. In ICWSM.","DOI":"10.1609\/icwsm.v13i01.3237"},{"key":"e_1_3_2_2_35_1","unstructured":"Ryan McGrath. 2020. Twython. https:\/\/twython.readthedocs.io\/en\/latest\/. Ryan McGrath. 2020. Twython. https:\/\/twython.readthedocs.io\/en\/latest\/."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Mainack Mondal Leandro Silva and Fabr\u00edcio Benevenuto. 2017. A Measurement Study of Hate Speech in Social Media. In WWW. Mainack Mondal Leandro Silva and Fabr\u00edcio Benevenuto. 2017. A Measurement Study of Hate Speech in Social Media. In WWW.","DOI":"10.1145\/3078714.3078723"},{"key":"e_1_3_2_2_37_1","unstructured":"Jack Morse. 2020. Gab Chat \u2019likely\u2019 to be used by white extremists according to police. https:\/\/mashable.com\/article\/law-enforcement-documents-violent-white-extremists-encrypted-gab-chat\/?europe=true. Jack Morse. 2020. Gab Chat \u2019likely\u2019 to be used by white extremists according to police. https:\/\/mashable.com\/article\/law-enforcement-documents-violent-white-extremists-encrypted-gab-chat\/?europe=true."},{"key":"e_1_3_2_2_38_1","volume-title":"Proceedigns of the Tenth International AAAI Conference on Web and Social Media(ICWSM).","author":"Newell Edward","year":"2016","unstructured":"Edward Newell , David Jurgens , Haji\u00a0Mohammad Saleem , Hardik Vala , Jad Sassine , Caitrin Armstrong , and Derek Ruths . 2016 . User Migration in Online Social Networks: A Case Study on Reddit During a Period of Community Unrest . In Proceedigns of the Tenth International AAAI Conference on Web and Social Media(ICWSM). Edward Newell, David Jurgens, Haji\u00a0Mohammad Saleem, Hardik Vala, Jad Sassine, Caitrin Armstrong, and Derek Ruths. 2016. User Migration in Online Social Networks: A Case Study on Reddit During a Period of Community Unrest. In Proceedigns of the Tenth International AAAI Conference on Web and Social Media(ICWSM)."},{"key":"e_1_3_2_2_39_1","first-page":"6","volume-title":"Proceedings of the international multiconference of engineers and computer scientists 1","author":"Niwattanakul Suphakit","year":"2013","unstructured":"Suphakit Niwattanakul , Jatsada Singthongchai , Ekkachai Naenudorn , and Supachanun Wanapu . 2013 . Using of Jaccard coefficient for keywords similarity . Proceedings of the international multiconference of engineers and computer scientists 1 , 6 (2013). Suphakit Niwattanakul, Jatsada Singthongchai, Ekkachai Naenudorn, and Supachanun Wanapu. 2013. Using of Jaccard coefficient for keywords similarity. Proceedings of the international multiconference of engineers and computer scientists 1, 6 (2013)."},{"key":"e_1_3_2_2_40_1","unstructured":"Antonis Papasavva Jeremy Blackburn Gianluca Stringhini Savvas Zannettou and Emiliano De\u00a0Cristofaro. 2020. \u201dIs it a Qoincidence?\u201d: A First Step Towards Understanding and Characterizing the QAnon Movement on Voat. co. arXiv preprint arXiv:2009.04885(2020). Antonis Papasavva Jeremy Blackburn Gianluca Stringhini Savvas Zannettou and Emiliano De\u00a0Cristofaro. 2020. \u201dIs it a Qoincidence?\u201d: A First Step Towards Understanding and Characterizing the QAnon Movement on Voat. co. arXiv preprint arXiv:2009.04885(2020)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"Rohan\u00a0DW Perera Sruthy Anand KP Subbalakshmi and R Chandramouli. 2010. Twitter analytics: Architecture tools and analysis. In Milcom. Rohan\u00a0DW Perera Sruthy Anand KP Subbalakshmi and R Chandramouli. 2010. Twitter analytics: Architecture tools and analysis. In Milcom.","DOI":"10.1109\/MILCOM.2010.5680493"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_1"},{"key":"e_1_3_2_2_43_1","unstructured":"Helen\u00a0Christy Powell and Bennett Clifford. 2019. De-platforming and the Online Extremist\u2019s Dilemma. https:\/\/www.lawfareblog.com\/de-platforming-and-online-extremists-dilemma. Helen\u00a0Christy Powell and Bennett Clifford. 2019. De-platforming and the Online Extremist\u2019s Dilemma. https:\/\/www.lawfareblog.com\/de-platforming-and-online-extremists-dilemma."},{"key":"e_1_3_2_2_44_1","unstructured":"Pushshift. 2020. Reddit Statistics. pushshift.io. Pushshift. 2020. Reddit Statistics. pushshift.io."},{"key":"e_1_3_2_2_45_1","unstructured":"Pushshift. 2020. Search Twitter Users and Discover Interesting Accounts. https:\/\/pushshift.io\/twitter-user-search\/. Pushshift. 2020. Search Twitter Users and Discover Interesting Accounts. https:\/\/pushshift.io\/twitter-user-search\/."},{"key":"e_1_3_2_2_46_1","unstructured":"Adam\u00a0K. Raymond. 2018. What We Know About Robert Bowers Alleged Pittsburgh Synagogue Shooter. https:\/\/nymag.com\/intelligencer\/2018\/10\/what-we-know-about-robert-bowers-alleged-synagogue-shooter.html. Adam\u00a0K. Raymond. 2018. What We Know About Robert Bowers Alleged Pittsburgh Synagogue Shooter. https:\/\/nymag.com\/intelligencer\/2018\/10\/what-we-know-about-robert-bowers-alleged-synagogue-shooter.html."},{"key":"e_1_3_2_2_47_1","unstructured":"Manoel Ribeiro Shagun Jhaver Savvas Zannettou Jeremy Blackburn Emiliano De\u00a0Cristofaro Gianluca Stringhini and Robert West. 2020. Does Platform Migration Compromise Content Moderation? Manoel Ribeiro Shagun Jhaver Savvas Zannettou Jeremy Blackburn Emiliano De\u00a0Cristofaro Gianluca Stringhini and Robert West. 2020. Does Platform Migration Compromise Content Moderation?"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"David Robinson Ziqi Zhang and Jonathan Tepper. 2018. Hate Speech Detection on Twitter: Feature Engineering v.s. Feature Selection. In ESWC Satellite Events. David Robinson Ziqi Zhang and Jonathan Tepper. 2018. Hate Speech Detection on Twitter: Feature Engineering v.s. Feature Selection. In ESWC Satellite Events.","DOI":"10.1007\/978-3-319-98192-5_9"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1177\/0267323120922066"},{"key":"e_1_3_2_2_50_1","unstructured":"Greer Ryan. 2020. Weighing the Value and Risks of Deplatforming. https:\/\/gnet-research.org\/2020\/05\/11\/weighing-the-value-and-risks-of-deplatforming\/. Greer Ryan. 2020. Weighing the Value and Risks of Deplatforming. https:\/\/gnet-research.org\/2020\/05\/11\/weighing-the-value-and-risks-of-deplatforming\/."},{"key":"e_1_3_2_2_51_1","unstructured":"Elizabeth Schumacher. 2018. Far-right social network Gab struggles after Pittsburgh attack. https:\/\/www.dw.com\/en\/far-right-social-network-gab-struggles-after-pittsburgh-attack\/a-46065847. Elizabeth Schumacher. 2018. Far-right social network Gab struggles after Pittsburgh attack. https:\/\/www.dw.com\/en\/far-right-social-network-gab-struggles-after-pittsburgh-attack\/a-46065847."},{"key":"e_1_3_2_2_52_1","volume-title":"Analyzing the targets of hate in online social media. arXiv:1603.07709","author":"Silva Leandro","year":"2016","unstructured":"Leandro Silva , Mainack Mondal , Denzil Correa , Fabr\u00edcio Benevenuto , and Ingmar Weber . 2016. Analyzing the targets of hate in online social media. arXiv:1603.07709 ( 2016 ). Leandro Silva, Mainack Mondal, Denzil Correa, Fabr\u00edcio Benevenuto, and Ingmar Weber. 2016. Analyzing the targets of hate in online social media. arXiv:1603.07709 (2016)."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609621"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGE.1977.6498972"},{"key":"e_1_3_2_2_56_1","volume-title":"2020 IEEE 14th International Conference on Semantic Computing (ICSC). 375\u2013380","author":"Swartz M.","unstructured":"M. Swartz and A. Crooks . 2020. Comparison of Emoji Use in Names, Profiles, and Tweets . In 2020 IEEE 14th International Conference on Semantic Computing (ICSC). 375\u2013380 . M. Swartz and A. Crooks. 2020. Comparison of Emoji Use in Names, Profiles, and Tweets. In 2020 IEEE 14th International Conference on Semantic Computing (ICSC). 375\u2013380."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"crossref","unstructured":"Kurt Thomas Chris Grier Dawn Song and Vern Paxson. 2011. Suspended accounts in retrospect: an analysis of twitter spam. In ACM IMC. Kurt Thomas Chris Grier Dawn Song and Vern Paxson. 2011. Suspended accounts in retrospect: an analysis of twitter spam. In ACM IMC.","DOI":"10.1145\/2068816.2068840"},{"key":"e_1_3_2_2_58_1","unstructured":"Twitter. 2020. Help with locked or limited account. Twitter. 2020. Help with locked or limited account."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"crossref","unstructured":"Svitlana Volkova and Eric Bell. 2017. Identifying Effective Signals to Predict Deleted and Suspended Accounts on Twitter Across Languages. In ICWSM. Svitlana Volkova and Eric Bell. 2017. Identifying Effective Signals to Predict Deleted and Suspended Accounts on Twitter Across Languages. In ICWSM.","DOI":"10.1609\/icwsm.v11i1.14874"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68783-4_16"},{"key":"e_1_3_2_2_61_1","volume-title":"Predictive Features for Hate Speech Detection on Twitter. In NAACL Student Research Workshop.","author":"Waseem Zeerak","year":"2016","unstructured":"Zeerak Waseem and Dirk Hovy . 2016 . Hateful Symbols or Hateful People? Predictive Features for Hate Speech Detection on Twitter. In NAACL Student Research Workshop. Zeerak Waseem and Dirk Hovy. 2016. Hateful Symbols or Hateful People? Predictive Features for Hate Speech Detection on Twitter. In NAACL Student Research Workshop."},{"key":"e_1_3_2_2_62_1","unstructured":"Wayback Machine. 2020. Wayback Machine APIs \u2013 Internet Archive. https:\/\/archive.org\/help\/wayback_api.php. Wayback Machine. 2020. Wayback Machine APIs \u2013 Internet Archive. https:\/\/archive.org\/help\/wayback_api.php."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380256"},{"key":"e_1_3_2_2_64_1","unstructured":"Wired. 2020. The wheels are falling off the alt-right\u2019s version of the internet. https:\/\/www.wired.co.uk\/article\/alt-right-internet-is-a-ghost-town-gab-voat-wrongthink. Wired. 2020. The wheels are falling off the alt-right\u2019s version of the internet. https:\/\/www.wired.co.uk\/article\/alt-right-internet-is-a-ghost-town-gab-voat-wrongthink."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"crossref","unstructured":"Savvas Zannettou Barry Bradlyn Emiliano De\u00a0Cristofaro Haewoon Kwak Michael Sirivianos Gianluca Stringini and Jeremy Blackburn. 2018. What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber. In WWW Companion. Savvas Zannettou Barry Bradlyn Emiliano De\u00a0Cristofaro Haewoon Kwak Michael Sirivianos Gianluca Stringini and Jeremy Blackburn. 2018. What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber. In WWW Companion.","DOI":"10.1145\/3184558.3191531"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"crossref","unstructured":"Savvas Zannettou Mai ElSherief Elizabeth Belding Shirin Nilizadeh and Gianluca Stringhini. 2020. Measuring and Characterizing Hate Speech on News Websites. In ACM WebSci. Savvas Zannettou Mai ElSherief Elizabeth Belding Shirin Nilizadeh and Gianluca Stringhini. 2020. Measuring and Characterizing Hate Speech on News Websites. In ACM WebSci.","DOI":"10.1145\/3394231.3397902"}],"event":{"name":"WebSci '21: WebSci '21 13th ACM Web Science Conference 2021","location":"Virtual Event United Kingdom","acronym":"WebSci '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["13th ACM Web Science Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447535.3462637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T01:01:28Z","timestamp":1672966888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447535.3462637"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":66,"alternative-id":["10.1145\/3447535.3462637","10.1145\/3447535"],"URL":"https:\/\/doi.org\/10.1145\/3447535.3462637","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"2021-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}