{"id":"https://openalex.org/W4390188286","doi":"https://doi.org/10.1109/iit59782.2023.10366468","title":"Utilization of Artificial Intelligence for Social Media and Gaming Moderation","display_name":"Utilization of Artificial Intelligence for Social Media and Gaming Moderation","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390188286","doi":"https://doi.org/10.1109/iit59782.2023.10366468"},"language":"en","primary_location":{"id":"doi:10.1109/iit59782.2023.10366468","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iit59782.2023.10366468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Innovations in Information Technology (IIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011612304","display_name":"Heba Saleous","orcid":"https://orcid.org/0000-0003-4210-1697"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Heba Saleous","raw_affiliation_strings":["United Arab Emirates University,Department of Information Systems &#x0026; Security,Al Ain,United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"United Arab Emirates University,Department of Information Systems &#x0026; Security,Al Ain,United Arab Emirates","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004683453","display_name":"Marton Gergely","orcid":"https://orcid.org/0000-0001-5449-2248"},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Marton Gergely","raw_affiliation_strings":["United Arab Emirates University,Department of Information Systems &#x0026; Security,Al Ain,United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"United Arab Emirates University,Department of Information Systems &#x0026; Security,Al Ain,United Arab Emirates","institution_ids":["https://openalex.org/I201726411"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028978354","display_name":"Khaled Shuaib","orcid":null},"institutions":[{"id":"https://openalex.org/I201726411","display_name":"United Arab Emirates University","ror":"https://ror.org/01km6p862","country_code":"AE","type":"education","lineage":["https://openalex.org/I201726411"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Khaled Shuaib","raw_affiliation_strings":["United Arab Emirates University,Department of Information Systems &#x0026; Security,Al Ain,United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"United Arab Emirates University,Department of Information Systems &#x0026; Security,Al Ain,United Arab Emirates","institution_ids":["https://openalex.org/I201726411"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011612304"],"corresponding_institution_ids":["https://openalex.org/I201726411"],"apc_list":null,"apc_paid":null,"fwci":0.3491,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67567826,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"246","last_page":"251"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9735000133514404,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9649999737739563,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7677327394485474},{"id":"https://openalex.org/keywords/moderation","display_name":"Moderation","score":0.669152021408081},{"id":"https://openalex.org/keywords/entertainment","display_name":"Entertainment","score":0.61427241563797},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5852323770523071},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.5813590288162231},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.55323326587677},{"id":"https://openalex.org/keywords/entertainment-industry","display_name":"Entertainment industry","score":0.5189594626426697},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.47310566902160645},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.45314037799835205},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.4254886507987976},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.41294601559638977},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.39219677448272705},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.34633421897888184},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3215007781982422},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.31567150354385376},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.14389535784721375}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7677327394485474},{"id":"https://openalex.org/C93225998","wikidata":"https://www.wikidata.org/wiki/Q1941972","display_name":"Moderation","level":2,"score":0.669152021408081},{"id":"https://openalex.org/C512170562","wikidata":"https://www.wikidata.org/wiki/Q173799","display_name":"Entertainment","level":2,"score":0.61427241563797},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5852323770523071},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.5813590288162231},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.55323326587677},{"id":"https://openalex.org/C2985708247","wikidata":"https://www.wikidata.org/wiki/Q173799","display_name":"Entertainment industry","level":3,"score":0.5189594626426697},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.47310566902160645},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.45314037799835205},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.4254886507987976},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.41294601559638977},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.39219677448272705},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.34633421897888184},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3215007781982422},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.31567150354385376},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.14389535784721375},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iit59782.2023.10366468","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iit59782.2023.10366468","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Innovations in Information Technology (IIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W4205941964"],"related_works":["https://openalex.org/W2380636257","https://openalex.org/W3021794682","https://openalex.org/W2153470424","https://openalex.org/W2362084051","https://openalex.org/W2317673827","https://openalex.org/W2749121061","https://openalex.org/W2898918333","https://openalex.org/W1717474147","https://openalex.org/W2514454614","https://openalex.org/W4388813356"],"abstract_inverted_index":{"As":[0],"the":[1,14,37,74,119,153],"world":[2],"continues":[3],"to":[4,9,43,57,60,72,99],"evolve,":[5],"technology":[6],"has":[7],"proven":[8],"be":[10],"a":[11,44,116,128,133,139,149],"necessity":[12],"in":[13,81,111,157],"lives":[15],"of":[16,46,51,77,146,155],"everyone.":[17],"Evolving":[18],"beyond":[19],"professional":[20],"use,":[21],"cyberspace":[22],"is":[23],"now":[24],"populated":[25],"by":[26],"online":[27,39,82],"communities":[28],"being":[29],"used":[30],"for":[31,152],"communication,":[32],"learning,":[33],"and":[34,49,79,92,102,106,138],"entertainment.":[35],"However,":[36],"increased":[38],"presence":[40],"exposes":[41],"users":[42],"variety":[45],"cultures,":[47],"personalities,":[48],"levels":[50],"maturity.":[52],"Some":[53],"may":[54,65],"also":[55],"seek":[56],"cause":[58],"harm":[59],"others":[61],"through":[62],"cyberbullying":[63],"or":[64],"display":[66],"toxic":[67],"behaviors.":[68],"This":[69],"research":[70],"aims":[71],"tackle":[73],"growing":[75],"problem":[76],"toxicity":[78],"harassment":[80],"environments.":[83],"The":[84,108,144],"proposed":[85],"solution":[86],"will":[87],"utilize":[88],"Artificial":[89],"Intelligence":[90],"(AI),":[91],"more":[93],"specifically":[94,114],"Natural":[95],"Language":[96],"Processing":[97],"(NLP),":[98],"moderate":[100],"communication":[101],"detect":[103],"malicious":[104],"language":[105],"behavior.":[107],"efforts":[109],"shared":[110],"this":[112],"paper":[113],"present":[115],"work-in-progress.":[117],"For":[118],"time":[120],"being,":[121],"two":[122],"models":[123],"have":[124],"been":[125],"tested":[126],"with":[127,159],"single":[129],"dataset":[130],"from":[131],"Twitter:":[132],"Convolutional":[134],"Neural":[135,141],"Network":[136,142],"(CNN)":[137],"Recurrent":[140],"(RNN).":[143],"results":[145],"experimentation":[147],"show":[148],"promising":[150],"start":[151],"use":[154],"NLP":[156],"moderation":[158],"an":[160,164],"83%":[161],"accuracy":[162],"using":[163],"RNN.":[165]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
