參考文獻 |
Abaido, G. M. (2020). Cyberbullying on social media platforms among university students in the United Arab Emirates. International Journal of Adolescence and Youth, 25(1), 407-420.
Alonso, C. & Romero, E. (2017). Aggressors and victims in bullying and cyberbullying: A study of personality profiles using the Five-Factor model. The Spanish Journal of Psychology, 20, 1-14.
Azucar, D., Marengo, D., & Settanni, M. (2018). Predicting the Big 5 personality traits from digital footprints on social media: A Meta-Analysis. Personality and Individual Differences, 124, 150-159.
Badjatiya, P., Gupta, S., Gupta, M., & Varma, V. (2017). Deep Learning for Hate Speech Detection in Tweets. Proceedings of the 26th International Conference on World Wide Web Companion, 759-760.
Balaji, A. J., Ram, D. H., & Nair, B. B. (2018). Applicability of Deep Learning models for stock price forecasting: An empirical study on BANKEX data. Procedia Computer Science, 143, 947-953.
Balakrishnan, V., Khan, S., Fernandez, T., & Arabnia, H. R. (2019). Cyberbullying detection on Twitter using Big Five and dark triad features. Personality and Individual Differences, 141, 252-257.
Barrick, M. R. & Mount, M. K. (1991). The Big Five personality dimensions and job performance: A Meta-Analysis. Personnel Psychology, 44(1), 1-26.
Bekkar, M., Djemaa, H., & Alitouche, T.A. (2013). Evaluation measures for models assessment over imbalanced datasets. Journal of Information Engineering and Applications, 3, 27-38.
Berry, M. W. & Kogan, J. (2010). Text Mining applications and theory. Chichester, SXW: John Wiley & Sons.
Bishop, C. (2007). Pattern recognition and Machine Learning. Journal of Electronic Imaging, 16(4), 049901.
Chatzakou, D., Kourtellis, N., Blackburn, J., Cristofaro, E. D., Stringhini, G., & Vakali, A. (2017). Mean Birds: Detecting aggression and bullying on Twitter. Proceedings of the 2017 ACM on Web Science Conference, 13-22.
Chen, P. L., Cheng, Y. C., & Chen, K. (2018). Analysis of social media data: An introduction to the characteristics and chronological process. New York, NY: Springer.
Ching, C. M., Church, A. T., Katigbak, M. S., Reyes, J. A. S., Tanaka-Matsumi, J., Takaoka, S., …Ortiz, F. A. (2014). The manifestation of traits in everyday behavior and affect: A five-culture study. Journal of Research in Personality, 48, 1-16.
Coloroso, B. (2004). The bully, the bullied, and the bystander: From preschool to high school: How parents and teachers can help break the cycle of violence. New York, NY: Quill.
Dinakar, K., Reichart, R., & Lieberman, H. (2011). Modeling the Detection of Textual Cyberbullying. Proceedings of the International AAAI Conference on Web and Social Media, 5(1), 11-17.
EIBolock, A. (2018). Defining character computing from the perspective of computer science and psychology. In proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, 567-572.
Eichie, J. O., Oyedum, O. D., Ajewole, M. O., & Aibinu, A. M. (2017). Artificial neural network model for the determination of GSM Rxlevel from atmospheric parameters. Engineering Science and Technology, An International Journal, 20(2), 795-804.
Fegenbush, B. S. & Olivier, D. F. (2009). Cyberbullying: A literature review. In Annual Meeting of the Louisiana Education Research Association, 1-70.
Festl, R. & Quandt, T. (2013). Social relations and cyberbullying: The influence of individual and structural attributes on victimization and perpetration via the internet. Human Communication Research, 39, 101-126.
Gao, Y., González, V. A., & Yiu, T. W. (2019). The effectiveness of traditional tools and Computer-Aided technologies for health and safety training in the construction sector: A systematic review. Computers & Education, 138(1), 101-115.
Heaton, J. (2017). Deep Learning. Genetic Programming and Evolvable Machines, 19, 305-307.
Heinrich, K., Zschech, P., Janiesch, C. & Bonin, M. (2021). Process data properties matter: Introducing gated Convolutional Neural Networks (GCNN) and Key-Value-Predict Attention Networks (KVP) for next event prediction with Deep Learning. Decision Support Systems, 143, 1-14.
Hinduja, S. & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of Suicide Research, 14(3), 206-221.
Horn, E. K., Bartak, A., Meerman, A. M., Rossum, B. V., Ziegler, U. M., Thunnissen, M., …Verheul, R. (2014). Effectiveness of Psychotherapy in personality disorders not otherwise specified: A comparison of different treatment modalities. Clinical Psychology & Psychotherapy, 22(5), 426-442.
Hosseinmardi, H., Mattson, S. A., Rafiq, R. I., Han, R., Lv, Q., & Mishra, S. (2015). Analyzing labeled cyberbullying incidents on the Instagram social network. Lecture Notes in Computer Science Social Informatics, 9471, 49-66.
Huang, Y. & Su, S. (2018). Motives for Instagram use and topics of interest among young adults. Future Internet, 10(8), 77-88.
Islam, M. M., Uddin, M. A., Islam, L., Akter, A., Sharmin, S., & Acharjee, U. K. (2020). Cyberbullying detection on social networks using Machine Learning approaches. 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), 1-6.
Kircaburun, K. & Griffiths, M. D. (2018). Problematic Instagram use: The role of perceived feeling of presence and escapism. International Journal of Mental Health and Addiction, 17(4), 909-921.
Kircaburun, K. & Griffiths, M. D. (2019). Instagram addiction and the Big Five of personality: The mediating role of self-liking. Journal of Behavioral Addictions, 7(1), 158-170.
Kohavi, R. (1995). A study of cross-validation and bootstrap for accuracy estimation and model selection. Proceedings of the 14th international joint conference on Artificial intelligence, 14(2), 1137-1145.
Kop, M., Read, P., & Walker, B. R. (2019). Pseudocommando mass murderers: A Big Five personality profile using Psycholinguistics. Current Psychology, 40(6), 3015-3023.
Kosinski, M., Matz, S. C., Gosling, S. D., Popov, V., & Stillwell, D. (2015). Facebook as a research tool for the social sciences: Opportunities, challenges, ethical considerations, and practical guidelines. The American Psychologist, 70(6), 543-556.
Li, T. B. (2005). Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research, 32(3), 265-277.
Lim, W. L., Ho, C. C., & Ting, C. (2020). Sentiment analysis by fusing text and location features of geo-tagged tweets. IEEE Access, 8, 181014-181027.
Lounsbury, J. W. (2002). Book review: The Big Five personality factors: The Psycholexical approach to personality. Journal of Psychoeducational Assessment, 20(3), 309-311.
Lyu, C., Chen, B., Ren, Y., & Ji, D. (2017). Long Short-Term Memory RNN for biomedical named entity recognition. BMC Bioinformatics, 18(1), 462-472.
Mairesse, F., & Walker, M. (2006). Words Mark the Nerds: Computational Models of Personality Recognition through Language. Proceedings of the Annual Meeting of the Cognitive Science Society, 28, 543-548.
McCrae, R. R. & John, O. P. (1992). An introduction to the five-factor model and its applications. Journal of Personality, 60(2), 175-215.
Méndez, I., Jorquera, A. B., Ruiz-Esteban, C., Martínez-Ramón, J. P., & Fernández-Sogorb, A. (2019). Emotional Intelligence, bullying, and cyberbullying in adolescents. International Journal of Environmental Research and Public Health, 16(23), 4837-4845.
Mitchell, K. J., Ybarra, M., & Finkelhor, D. (2007). The relative importance of online victimization in understanding depression, delinquency, and substance use. Child Maltreatment, 12(4), 314-324.
Mitsopoulou, E. & Giovazolias, T. (2015). Personality traits, empathy and bullying behavior: A Meta-Analytic approach. Aggression and Violent Behavior, 21, 61-72.
Mohanraj, M., Jayaraj, S., & Muraleedharan, C. (2015). Applications of artificial neural networks for thermal analysis of heat exchangers - A review. International Journal of Thermal Sciences, 90, 150-172.
Monks, C. P., Robinson, S., & Worlidge, P. (2012). The emergence of cyberbullying: A survey of primary school pupils’ perceptions and experiences. School Psychology International, 33(5), 477-491.
Montag, C., Duke, É, & Markowetz, A. (2016). Toward
Psychoinformatics: Computer science meets psychology. Computational and Mathematical Methods in Medicine, 2016, 1-10.
Olweus, D. (2005). Bullying at school: What we know and what we can do. Malden, MA: Blackwell.
Olweus, D. (2013). School bullying: Development and some important challenges. Annual Review of Clinical Psychology, 9, 751-780.
Peng, S., Yang, M., Wang, F., Li, X., Wen, Z., & Liu, L. (2021). Insurance assistant: An intelligent platform for video insurance assessment. Companion Proceedings of the Web Conference 2021, 667-668.
Pennington, J., Socher, R., & Manning, C.D. (2014). GloVe : Global Vectors for Word Representation. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), 1532-1543.
Privitera, C. & Campbell, M. A. (2009). Cyberbullying: The new face of workplace bullying? CyberPsychology & Behavior, 12(4), 395-400.
Roy, A., Sun, J., Mahoney, R., Alonzi, L., Adams, S., & Beling, P. (2018). Deep Learning detecting fraud in credit card transactions. 2018 Systems and Information Engineering Design Symposium (SIEDS), 1, 129-134.
Schnabel, T., Labutov, I., Mimno, D. M., & Joachims, T. (2015). Evaluation methods for unsupervised word embeddings. In Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, 298-307.
Shariff, S. (2008). Cyberbullying: Issues and solutions for the school, the classroom and the home. Oxfordshire, UK: Routledge.
Shrestha, Y. R., Krishna, V., & Krogh, G. V. (2020). Augmenting organizational decision-making with Deep Learning algorithms: Principles, promises, and challenges. Journal of Business Research, 123, 588-603.
Tani, F., Greenman, P. S., Schneider, B. H., & Fregoso, M. (2003). Bullying and the Big Five. School Psychology International, 24(2), 131-146.
Vandebosch, H. & Cleemput, K. V. (2008). Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior, 11(4), 499-503.
Willard, N. E. (2007). Cyberbullying and cyberthreats: Responding to the challenge of online social aggression, threats, and distress. Research Press, 141-153.
Zhang, L., Wang, S., & Liu, B. (2018). Deep learning for sentiment analysis: A survey. WIREs Data Mining and Knowledge Discovery, 8(4), 1-25.
Zhou, Y., Zheng, W., & Gao, X. (2019). The relationship between the Big Five and cyberbullying among college students: The mediating effect of moral disengagement. Current Psychology, 38(5), 1162-1173.
Banerjee, P. (2019). Data Preprocessing Project - Imbalanced Classes Problem. Retrieved November 8, 2020, from: https://github.com/pb111/Data-Preprocessing-Project-Imbalanced-Classes-Problem
Ferrario, A. & Naegelin, M. (2020). The Art of Natural Language Processing: Classical, Modern and Contemporary Approaches to Text Document Classification. Retrieved March 20, 2021, from: 10.2139/ssrn.3547887
Indianja, S. & Patchin, J. (2005). Cyberbullying Research Center. Retrieved December 8, 2020, from: https://cyberbullying.org/
Nwankpa, C., Ijomah, W., Gachagan, A., & Marshall, S. (2020). Activation Functions: Comparison of trends in practice and research for Deep Learning. Retrieved December 22, 2020, from: https://arxiv.org/pdf/1811.03378.pdf
Perrin, A. & Anderson, M. (2019). Share of U.S. Adults using Social Media, including Facebook, is mostly Unchanged since 2018. Retrieved December 15, 2020, from: https://www.pewresearch.org/fact-tank/2019/04/10/share-of-u-s-adults-using-social-media-including-facebook-is-mostly-unchanged-since-2018/
Schilling, F. (2016). The effect of Batch Normalization on Deep Convolutional Neural Networks. Retrieved May 15, 2020, from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-191222
Trolley, B, Hanel, C., & Shields, L. (2006). Demystifying & deescalating cyber bullying in the schools: A resource guide for counselors, educators and parents. Retrieved January 14, 2021, from: https://assets.booklocker.com/pdfs/2631s.pdf
Zhu, Y., Wu, S., Marsiglia, F. F., Wu, Q., & Chen, Q. (2021). Adaptation and validation of the European cyberbullying intervention project questionnaire with and for Chinese adolescents. Retrieved June 15, 2020, from: https://doi.org/10.1111/hsc.13466 |