{"created":"2021-03-01T06:01:12.789842+00:00","id":8891,"links":{},"metadata":{"_buckets":{"deposit":"2ec27aa5-01c2-4e5a-b180-0294d5227d73"},"_deposit":{"id":"8891","owners":[],"pid":{"revision_id":0,"type":"depid","value":"8891"},"status":"published"},"_oai":{"id":"oai:kitami-it.repo.nii.ac.jp:00008891","sets":["1:87"]},"author_link":["90365","90366","90367","90368","11617","90370","90371","90372","90352","304"],"control_number":"8891","item_1646810750418":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_3_biblio_info_186":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2019","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"8","bibliographicPageEnd":"1127","bibliographicPageStart":"1075","bibliographicVolumeNumber":"20","bibliographic_titles":[{"bibliographic_title":"Journal of the Association for Information Systems","bibliographic_titleLang":"en"}]}]},"item_3_description_184":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Cyberbullying, or humiliating people using the Internet, has existed almost since the beginning of Internet communication.The relatively recent introduction of smartphones and tablet computers has caused cyberbullying to evolve into a serious social problem. In Japan, members of a parent-teacher association (PTA)attempted to address the problem by scanning the Internet for cyber bullying entries. To help these PTA members and other interested parties confront this difficult task we propose a novel method for automatic detection of malicious Internet content. This method is based on a combinatorial approach resembling brute-force search algorithms, but applied in language classification. The method extracts sophisticated patterns from sentences and uses them in classification. The experiments performed on actual cyberbullying data reveal an advantage of our method vis-à-visprevious methods. Next, we implemented the method into an application for Android smartphones to automatically detect possible harmful content in messages. The method performed well in the Android environment, but still needs to be optimized for time efficiency in order to be used in practice","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_3_full_name_183":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"90352","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"9000006924461","nameIdentifierScheme":"CiNii ID","nameIdentifierURI":"http://ci.nii.ac.jp/nrid/9000006924461"},{"nameIdentifier":"60711504","nameIdentifierScheme":"KAKEN - 研究者検索","nameIdentifierURI":"https://nrid.nii.ac.jp/ja/nrid/1000060711504/"}],"names":[{"name":"プタシンスキ, ミハウ","nameLang":"ja"}]},{"nameIdentifiers":[{"nameIdentifier":"304","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"80324549","nameIdentifierScheme":"KAKEN - 研究者検索","nameIdentifierURI":"https://nrid.nii.ac.jp/ja/nrid/1000080324549/"}],"names":[{"name":"桝井, 文人","nameLang":"ja"}]}]},"item_3_publisher_212":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Association for Information Systems"}]},"item_3_relation_191":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.17705/1jais.00562","subitem_relation_type_select":"DOI"}}]},"item_3_rights_192":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"c 2019by the Association for Information Systems. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit orcommercial advantage and that copies bear this notice and full citation on the first page. Copyright for components of this work owned by others than the Association for Information Systems must be honored. Abstracting with creditis permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists requires prior specific permission and/or fee. Request permission to publish from: AIS Administrative Office, P.O. Box 2712 Atlanta, GA, 30301-2712 Attn: Reprints or via email from publications@aisnet.org."}]},"item_3_select_195":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_select_item":"publisher"}]},"item_3_source_id_187":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1536-9323","subitem_source_identifier_type":"EISSN"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Ptaszynski, Michal","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Lempa, Pawel","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masui, Fumito","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kimura, Yasutomo","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Rzepka, Rafal","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Araki, Kenji","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Wroczynski, Michal","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Leliwa, Gniewosz","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-01-17"}],"displaytype":"detail","filename":"Journal of the Association for Information Systems (2019) 20(8), 1075-1128.pdf","filesize":[{"value":"2.2 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"Journal of the Association for Information Systems (2019) 20(8), 1075-1128","objectType":"fulltext","url":"https://kitami-it.repo.nii.ac.jp/record/8891/files/Journal of the Association for Information Systems (2019) 20(8), 1075-1128.pdf"},"version_id":"bca93e41-15c1-47a7-acb4-19c8d653f759"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Automatic Cyberbullying Detection","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Natural Language Processing","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Language Combinatorics","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Brute-Force Sentence Pattern Extortion from Harmful Messages for Cyberbullying Detection","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Brute-Force Sentence Pattern Extortion from Harmful Messages for Cyberbullying Detection","subitem_title_language":"en"}]},"item_type_id":"3","owner":"1","path":["87"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2020-01-17"},"publish_date":"2020-01-17","publish_status":"0","recid":"8891","relation_version_is_last":true,"title":["Brute-Force Sentence Pattern Extortion from Harmful Messages for Cyberbullying Detection"],"weko_creator_id":"1","weko_shared_id":3},"updated":"2022-12-13T02:23:39.353534+00:00"}