{"id":"https://openalex.org/W7139961411","doi":"https://doi.org/10.1016/j.procs.2026.01.052","title":"Leveraging Large Language Models for Cyberbullying Prediction and Detection: A Multimodal Approach to Proactive Prevention and Policy Support.","display_name":"Leveraging Large Language Models for Cyberbullying Prediction and Detection: A Multimodal Approach to Proactive Prevention and Policy Support.","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7139961411","doi":"https://doi.org/10.1016/j.procs.2026.01.052"},"language":"en","primary_location":{"id":"doi:10.1016/j.procs.2026.01.052","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.052","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1016/j.procs.2026.01.052","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121933517","display_name":"Usman Javed Butt","orcid":null},"institutions":[{"id":"https://openalex.org/I182000528","display_name":"Ajman University","ror":"https://ror.org/01j1rma10","country_code":"AE","type":"education","lineage":["https://openalex.org/I182000528"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Usman Javed Butt","raw_affiliation_strings":["College of Engineering and Information Technology, Ajman University, UAE"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Information Technology, Ajman University, UAE","institution_ids":["https://openalex.org/I182000528"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130245125","display_name":"Nicholas Quinn","orcid":null},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nicholas Quinn","raw_affiliation_strings":["Department of Computer and Information Sciences, Northumbria University, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, UK","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049325838","display_name":"Sethuramalingam Subramaniam","orcid":null},"institutions":[{"id":"https://openalex.org/I193260172","display_name":"British University in Dubai","ror":"https://ror.org/00mc18523","country_code":"AE","type":"education","lineage":["https://openalex.org/I193260172"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Sethuramalingam Subramaniam","raw_affiliation_strings":["Faculty of Engineering and IT, The British University in Dubai, UAE"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and IT, The British University in Dubai, UAE","institution_ids":["https://openalex.org/I193260172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5130214087","display_name":"Ammar Rashid","orcid":null},"institutions":[{"id":"https://openalex.org/I182000528","display_name":"Ajman University","ror":"https://ror.org/01j1rma10","country_code":"AE","type":"education","lineage":["https://openalex.org/I182000528"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ammar Rashid","raw_affiliation_strings":["College of Engineering and Information Technology, Ajman University, UAE"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Information Technology, Ajman University, UAE","institution_ids":["https://openalex.org/I182000528"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5121933517"],"corresponding_institution_ids":["https://openalex.org/I182000528"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.93635769,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"275","issue":null,"first_page":"429","last_page":"438"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.8930000066757202,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.8930000066757202,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.015399999916553497,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10485","display_name":"Bullying, Victimization, and Aggression","score":0.011500000022351742,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.43779999017715454},{"id":"https://openalex.org/keywords/proactivity","display_name":"Proactivity","score":0.3359000086784363},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.2669000029563904}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8949999809265137},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.43779999017715454},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.43549999594688416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37209999561309814},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3693000078201294},{"id":"https://openalex.org/C142944206","wikidata":"https://www.wikidata.org/wiki/Q1786137","display_name":"Proactivity","level":2,"score":0.3359000086784363},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.31470000743865967},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.26809999346733093},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2669000029563904},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.26260000467300415},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25940001010894775}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.procs.2026.01.052","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.052","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.procs.2026.01.052","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.052","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.690613865852356,"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W2011860744","https://openalex.org/W2016527577","https://openalex.org/W2034285746","https://openalex.org/W2113519640","https://openalex.org/W2125036394","https://openalex.org/W2142423963","https://openalex.org/W2152126085","https://openalex.org/W2155054087","https://openalex.org/W2172034546","https://openalex.org/W2523430484","https://openalex.org/W2607040908","https://openalex.org/W2735363254","https://openalex.org/W2962797668","https://openalex.org/W3022084519","https://openalex.org/W3026610307","https://openalex.org/W3112704828","https://openalex.org/W3173731808","https://openalex.org/W4224220714","https://openalex.org/W4312587455","https://openalex.org/W4323363784","https://openalex.org/W4387206398","https://openalex.org/W4393150258"],"related_works":[],"abstract_inverted_index":{"Cyberbullying":[0],"(CB)":[1],"continues":[2],"to":[3,22,110],"outpace":[4],"effective":[5],"prevention,":[6],"intervention":[7],"and":[8,31,39,52,61,66,80,101,113],"aftercare":[9],"measures":[10],"posing":[11],"a":[12,41,107],"growing":[13],"public":[14],"health":[15],"concern":[16],"as":[17],"digital":[18],"systems":[19],"become":[20],"central":[21],"youth":[23],"life.":[24],"Persistent":[25],"definitional":[26],"ambiguities":[27],"hinder":[28],"evidence-based":[29],"research":[30],"policy":[32,112],"development.":[33],"This":[34],"study":[35],"reviews":[36],"these":[37],"challenges":[38],"explores":[40],"technical":[42],"solution":[43],"using":[44],"Large":[45],"Language":[46],"Models":[47],"(LLMSs)":[48],"for":[49,64],"CB":[50,103],"detection":[51,75],"prediction.":[53],"Leveraging":[54],"Google":[55],"Gemini":[56],"model,":[57],"experiments":[58],"evaluated":[59],"text":[60],"image-based":[62],"datasets":[63],"sentiments":[65],"behavioral":[67],"analysis.":[68],"LLM":[69],"achieved":[70],"82%":[71],"balanced":[72],"accuracy":[73],"in":[74,82],"through":[76],"zero":[77],"shot":[78],"learning":[79],"77.8%":[81],"multimodal":[83],"prediction,":[84],"marking":[85],"the":[86],"first":[87],"known":[88],"exploration":[89],"of":[90],"this":[91],"capability.":[92],"Findings":[93],"suggest":[94],"that":[95],"LLMs":[96],"can":[97],"enable":[98],"flexible,":[99],"scalable":[100],"proactive":[102],"prevention":[104],"strategies,":[105],"offering":[106],"promising":[108],"complement":[109],"existing":[111],"educational":[114],"approaches.":[115]},"counts_by_year":[],"updated_date":"2026-03-22T06:25:25.174409","created_date":"2026-03-21T00:00:00"}
