<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Artificial intelligence tools in the ongoing fight against bullying and cyberbullying: a multidisciplinary approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Giulia Orrù</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vincenzo Gattulli</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Guido Colaiacovo</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefano Marrone</string-name>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giovanni Puglisi</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lucia Sarcinella</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Grazia Terrone</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Donatella Curtotti</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Donato Impedovo</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gian Luca Marcialis</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Carlo Sansone</string-name>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Tor Vergata University</institution>
          ,
          <addr-line>Via Columbia 1, 00133 Roma</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Bari</institution>
          ,
          <addr-line>Via Edorado Orabona 4, 70121, Bari</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Cagliari</institution>
          ,
          <addr-line>piazza d'Armi, 09123, Cagliari</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>University of Foggia</institution>
          ,
          <addr-line>Via Antonio Gramsci 89, 71122 Foggia</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>University of Naples Federico II</institution>
          ,
          <addr-line>Via Claudio 21, 80125 Naples</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The problem of bullying and cyberbullying is growing and is a phenomenon that negatively influences our society: for this reason, it requires advanced solutions aimed at prevention. Starting from a previous project called BullyBuster which paved the way for the application of artificial intelligence (AI) in this area, exploiting interdisciplinary skills to develop algorithms capable of identifying and mitigating bullying behaviours, in this paper, we present the follow-up, called BullyBuster 2 (BB2). BB2 aims to broaden the spectrum of intervention to include adult populations, reflecting the universal nature of bullying across all age demographics. Furthermore, it updates and improves the original project's methodologies with new psychological insights and broader AI applications, ensuring a more inclusive anti-bullying strategy. Furthermore, BB2 aims to form a large research consortium to set a new standard for interdisciplinary collaborations in preventive and response strategies against such social challenges.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;bullying</kwd>
        <kwd>detection</kwd>
        <kwd>cyberbullying</kwd>
        <kwd>artificial intelligence</kwd>
        <kwd>interdisciplinarity</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>bullying in both physical and virtual contexts and for
this reason it has been included in the Global Top 100 list
The worrying rise in bullying and cyberbullying in re- of AI projects addressing the 17 United Nations
Stratecent years has brought attention to the urgent need for gic Development Goals by the International Research
eficient prevention measures and solutions [ 1]. In fact, Center for Artificial Intelligence under the auspices of
such violent behaviours not only compromise individual UNESCO1.
feelings of security and dignity, but they also have signif- This paper introduces “BullyBuster 2 – the
ongoicant psychological efects that may reverberate across ing fight against bullying and cyberbullying with the
society. Bullying has changed throughout time and is help of artificial intelligence for the human wellbeing”
now prevalent in a variety of adult demographics and project (BB2, hereinafter), the follow-up to the
Bullysettings, which has made it clear that creative and flexible Buster project. Funded by the European Union -
NextGensolutions are required. erationEU and within the PRIN 2022 PNRR, it again
in</p>
      <p>
        In this context, the “BullyBuster - A framework for volves four multidisciplinary research groups belonging
bullying and cyberbullying action detection by computer to four universities in Southern Italy (University of Bari
vision and artificial intelligence methods and algorithms” Aldo Moro, University of Cagliari, University of Foggia,
project [2](BB1 in the following) was proposed: funded University of Naples Federico II) with the aim of
combinunder the tender relating to Projects of Relevant National ing artificial intelligence, technology, law and psychology
Interest (PRIN) in 2017 and recently concluded, it marked skills to develop a comprehensive framework.
a pioneering efort by interdisciplinary teams from four BB2’s goal is to advance bullying and cyberbullying
universities in Southern Italy to tackle this threat through detection capabilities by incorporating advanced models
cutting-edge artificial intelligence tools [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. This initia- that take into account a broader range of victim profiles
tive sought to combine psychological insights with tech- and refining its detection algorithms to accommodate
nological advances to create tools capable of identifying new forms of interpersonal aggression and IT misconduct.
BB2 also aims to broaden the objectives of the previous
      </p>
      <p>1https://ircai.org/top100/entry/bullybuster-a-framework-forbullying-and-cyberbullying-action-detection-by-computer-visionand-artificial-intelligence-methods-and-algorithms/</p>
      <sec id="sec-1-1">
        <title>2.1. Legal, juridical and psychological aspects</title>
      </sec>
      <sec id="sec-1-2">
        <title>2.2. Multimedia contents artifacts</title>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. The BullyBuster framework</title>
      <sec id="sec-2-1">
        <title>In this section, we explore the key elements of Bully</title>
        <p>Buster’s architectural framework (Fig. 2), which includes
the tools created in BB1 as well as the enhancements
planned for BB2. The architecture of the system is
structured into five primary modules: (1) a manipulated
multimedia content detection module, to combat the spread
of malicious and fake multimedia content, as deepfakes;
(2) a physical violence detection module, to monitor and
identify potential bullying incidents in the physical
domain; (3) a stress detection module, able to assesses the
emotional state of individuals by analyzing the timing
and rhythm of keystrokes and other behavioral
biometrics; (4) a verbal abuse detection module, focused on
the analysis of textual communications to detect verbal
signs of bullying or cyberbullying; (5) a internet
addiction detection module, to detect psychological malaise by
automatic behavioral analyses. When combined, these
components provide a complete system that is suited to
address the complex problem of bullying in both
physical and digital scenarios. In order to address the critical
issues of privacy and data protection, this solutions have
been examined from a legal and juridical perspective.
Below, we describe the individual modules of the
BullyBuster framework.</p>
        <p>
          The term "deepfake" refers to any way of creating fake
multimedia material representing one or more
individuals [
          <xref ref-type="bibr" rid="ref10">6</xref>
          ]. The modification may specifically target the
individual’s identity, speech, or expression. Although
this technology is of considerable appeal to some sectors
of society, such as the film and video game industries, the
harmful applications are vast and particularly concerning.
In fact, deepfakes may position a person in non-real
humiliating or compromising situations, such as scenes of
sex or violence, or force her/him to say something she/he
never said. Deepfake can thus be used to insult, stalk,
propagate revenge pornography, and abuse or cyberbully
someone. In BB1, we exploited the complementarity of
several individual video deepfake detectors with
appropriate fusion rules to increase the generalization ability
of modern deepfake detection systems [
          <xref ref-type="bibr" rid="ref12">7</xref>
          ]. The goal of
BB2 is to extend the deepfake video detection
capabilities and add voice cloning detection to make multimedia
content analysis complete.
        </p>
        <sec id="sec-2-1-1">
          <title>2.3. Anomaly detection of events</title>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>The battle against bullying may be greatly aided by hav</title>
        <p>
          ing a visual understanding of human behaviour through
video analysis. Behavioural "indicators," whether in the
form of victimisation or bullying, might include
physical aggression, seclusion, or other physical patterns like
encircling. In BB1, systems have been created that can
use one or more surveillance cameras to monitor groups [
          <xref ref-type="bibr" rid="ref11 ref19 ref2">10</xref>
          ]. The goal was to develop a system that
automatiof people who are not individually identifiable [
          <xref ref-type="bibr" rid="ref14">8</xref>
          ]. The cally identified aggressive behaviour in texts, especially
data is then processed to report "anomalous" events like in Italian-language comments. To do this, the language
violent or panicked episodes based on behavioural mod- patterns used in aggressive comments were analyzed,
els that have been suitably codified. In BB2, the crowd noting the frequent use of vulgar and negative language,
analytics model will specialize in bullying contexts by insults, and ofensive words. In addition, many of these
generating synthetic data: obtaining contextualised train- comments began with "no/not," which is used to
contraing data proved to be a challenge during the creation of dict or deny a statement. Based on these observations,
the crowd analyzer in BB1, made worse by the start of several features were developed for feature engineering,
the COVID-19 epidemic, which made it impossible to including the number of negative words, the number of
mimic actual bullying scenarios. In addition, a substan- "no/not," use of capitalisation, positive/negative comment
tial amount of video is needed for deep-learning models. weight calculated with WordNet and SentiWordNet, use
In BB2, we aim to generate a suficient amount of data of the second person, presence of threats and bullying
and to include the typical behaviours of bullies and vic- terms [
          <xref ref-type="bibr" rid="ref11 ref19 ref2">10</xref>
          ]. These features were used to create several
tims, highlighted in the psychological analysis, through dictionaries of terms and a dataset of aggressive and
nonthe synthetic creation of this data. aggressive comments. Several shallow learning models
were tested to evaluate the efectiveness of these features
2.4. Verbale abuse models in detecting verbal aggression [
          <xref ref-type="bibr" rid="ref11 ref19 ref2">10</xref>
          ].
In the context of the BB2 project, this phenomenon
Cyberbullying is a widespread phenomenon involving can also be analysed by considering diferent age groups,
the use of digital technologies to perpetrate aggressive especially the preponderance of adults. Adults may
rebehavior, threats, or harassment toward other individu- ceive significant criticism, fueling a cycle of online
negals. This bullying occurs primarily through online plat- ativity and conflict that can also be reflected in real life.
forms, such as social media, instant messaging, and fo- BB2 aims to address this problem by implementing and
rums. It can take many forms, including name-calling, improving existing text models, with particular
attendefamation, social exclusion, and disclosure of private tion to the users’ ages. While BB1 primarily addressed
information. Cyberbullying can have serious emotional, adolescents, BB2 includes an analysis of adult language,
psychological, and social consequences on victims and recognizing that verbal aggression and communication
poses a significant challenge for parents, educators, and dynamics are not limited exclusively to the younger
genmental health professionals in ensuring a safe and re- eration. BB2’s approach is based on analyzing textual
spectful online environment for all users. One of the dynamics found in social media comments, examining
most predominant vectors is textual language [
          <xref ref-type="bibr" rid="ref17">9</xref>
          ]. how diferent users interact and communicate. This
ap
        </p>
        <p>In the BB1 project, UNIBA focused on identifying ver- proach allows for the identification of common linguistic
bal aggression, a crucial aspect of cyberbullying that pri- and behavioral patterns. The categories used are
simimarily involves texts and comments on online platforms
larly taken by assigning the label of cyberaggression or
non-cyberaggression. Through this in-depth analysis,
BB2 aims to provide users, social platforms, and mental
health professionals with a better understanding of how
verbal aggression occurs online and the factors that
inlfuence it. This can enable the development of targeted
interventions to prevent and address cyberbullying,
improve online safety, and promote a healthier and more
respectful virtual environment for all users.</p>
        <p>
          The text also fits within the framework of the
Behavioral Biometrics approach, in which touch-related
features, called Touch Dynamics, are extracted along with
textual output. This could be a starting point for future
work [
          <xref ref-type="bibr" rid="ref21">11</xref>
          ].
        </p>
        <sec id="sec-2-2-1">
          <title>2.5. Stress detection 2.6. Digital devices addiction</title>
          <p>Examining data from mobile devices has emerged as a
prominent approach for understanding individuals’
behavior in today’s digital era [17]. However, the
abundance of features on these devices, such as web browsing,
online gaming, digital photography, GPS navigation, and
various social applications, can easily engage users’
attention, potentially causing significant distractions from
real-world activities. Unfortunately, excessive
engagement with these features can lead to various health
issues, particularly psychological challenges, such as lack
of self-control, withdrawal symptoms, sleep disruptions,
social isolation, depression, and dificulties in
maintaining focus. Additionally, users may display symptoms of
irritability, restlessness, stress, and mood fluctuations. In
response to these concerns, the goal of BB2 is to introduce
an innovative module aimed at assessing individuals from
a psychological standpoint, based on their interactions
with diferent features of their mobile devices.</p>
        </sec>
      </sec>
      <sec id="sec-2-3">
        <title>Biometrics involves the utilization of body measurements</title>
        <p>
          and statistical analysis to extract and quantify human
characteristics [
          <xref ref-type="bibr" rid="ref13 ref23">12</xref>
          ]. Initially utilized for user
authentication and identification purposes [ 13], , this technology is
now increasingly utilized across various domains, includ- 3. The interdisciplinary laboratory
ing entertainment and personalized user experiences [14].
        </p>
        <p>Within the field of biometrics, there exist two distinct cat- Based on the results of the completed BB1 project and the
egories of approaches: i) Physiological biometrics, which ongoing BB2 project, an interlaboratory group named
involves the direct measurement of physical attributes "BullyBuster" is being formed with the goal of attracting
such as facial features, fingerprints, iris patterns, reti- membership and engagement from individuals who are
nal structures, and vocal characteristics; ii) Behavioral particularly interested in solving the issue of bullying and
biometrics, which focuses on capturing specific human cyberbullying. The interdisciplinary laboratory brings
tobehaviors such as handwriting, typing, or speaking. gether specialists from various fields to develop strategies</p>
        <p>Among various forms of behavioral biometrics, for analyzing bullying and cyberbullying behaviours,
exkeystroke dynamics has emerged as a highly eficient tending beyond just school-aged individuals. This team
and economical technique, easily deployable using read- includes: (1) experts in information security, computer
ily available hardware. In recent years, it has seen in- vision, and artificial intelligence, to create and propose
creased utilization for user authentication, analyzing the innovative models and methods to be implemented in
habitual rhythm patterns exhibited while typing on both appropriate demonstration products; (2) psychologists,
physical and virtual keyboards [15]. to understand the behaviour patterns of individual
in</p>
        <p>
          In the context of combating cyberbullying, we employ volved in bullying events; (3) sociologists, to contribute
keystroke dynamics for user emotion recognition. The by examining the efects of bullying and aggressive
beaim is to exploit its potential as a cost-efective and widely haviours in social media and other environments; (4)
juaccessible method for emotion recognition, requiring ridical and legal professionals, to explore new legislation
only a standard keyboard as hardware [
          <xref ref-type="bibr" rid="ref33">16</xref>
          ]. Furthermore, that can address (cyber)bullying, enabling both
preventasince a keystroke recorder can be implemented as hard- tive and punitive technological solutions; (5) economists
ware or software, with the latter being inconspicuous, and healthcare professionals, to assess the financial and
individuals using the keyboard must be made aware of health impacts of (cyber)bullying, whether stemming
the monitoring process. In BB2, keystroke dynamics will from the attacks themselves or from the origins of such
be examined in real-world settings, considering both key- behaviours. The laboratory aims to create a genuine
supboard inputs and tapping habits to characterize a subject port system and reference services for preventing and
based on their mobile device usage behavior. Addition- fighting bullying.
ally, this analysis can incorporate touch dynamics on
mobile devices.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4. Conclusions</title>
      <sec id="sec-3-1">
        <title>Bullying and cyberbullying are significant societal issues that have an adverse impact on people and communities.</title>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgments</title>
      <sec id="sec-4-1">
        <title>This work is supported by the European Union – Next</title>
        <p>Generation EU under the PRIN 2022 PNRR project
“BullyBuster 2 – the ongoing fight against bullying and
cyberbullying with the help of artificial intelligence for the
human wellbeing” (CUP: P2022K39K8).</p>
      </sec>
      <sec id="sec-4-2">
        <title>The BullyBuster (BB) framework, developed during two</title>
        <p>projects funded under the tender relating to Projects of
Relevant National Interest (PRIN), one completed and
the other ongoing, combines advanced computer vision,
artificial intelligence technology, legal aspects and
psychology concepts with a multidisciplinary approach to
provide a holistic response to these prevalent problems.
In this paper, we present the development objectives of
the BullyBuster framework, which include the
improvement of tools for the detection of bullying and
cyberbullying, the extension of its application to include a target of
adults and the creation of an interdisciplinary reference
laboratory.
tional states through keystroke dynamics, in:
Proceedings of the 3rd International Conference on
Deep Learning Theory and Applications - Volume
1: DeLTA„ INSTICC, SciTePress, 2022, pp. 207–214.
doi:10.5220/0011367300003277.
[17] F. S. Rahayu, L. E. Nugroho, R. Ferdiana, D. B.
Setyohadi, Research trend on the use of it in digital
addiction: An investigation using a systematic
literature review, Future Internet 12 (2020) 174.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>URL: https://www.mdpi.com/2078-2489/14/8/430.</mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>doi:10</source>
          .3390/info14080430.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G.</given-names>
            <surname>Orrù</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Galli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gattulli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gravina</surname>
          </string-name>
          , S. Mar-
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <source>WORKSHOP PROCEEDINGS</source>
          , volume
          <volume>3486</volume>
          , CEUR-
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>WS</given-names>
            <surname>Team</surname>
          </string-name>
          ,
          <string-name>
            <surname>Redaktion Sun</surname>
            <given-names>SITE</given-names>
          </string-name>
          ,
          <year>2023</year>
          , pp.
          <fpage>189</fpage>
          -
          <lpage>194</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Wiertsema</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Vrijen</surname>
          </string-name>
          , R. van der Ploeg, M. Sentse,
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>of Adolescence</source>
          <volume>95</volume>
          (
          <year>2023</year>
          )
          <fpage>34</fpage>
          -
          <lpage>55</lpage>
          . doi:
          <volume>10</volume>
          .1002/jad.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M. O.</given-names>
            <surname>Mantovani</surname>
          </string-name>
          ,
          <source>Profili penali del cyberbullismo:</source>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <source>la l. 71 del 2017</source>
          ,
          <article-title>Indice penale (</article-title>
          <year>2018</year>
          )
          <fpage>475</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Rana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Nobi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Murali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Sung</surname>
          </string-name>
          , Deep-
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <source>access 10</source>
          (
          <year>2022</year>
          )
          <fpage>25494</fpage>
          -
          <lpage>25513</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Concas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>La Cava</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Orrù</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Cuccu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>Sciences</source>
          <volume>12</volume>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .3390/app12157365.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Orrù</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ghiani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pintor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. L.</given-names>
            <surname>Marcialis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Roli</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>descriptor, in: 2020 25th International Conference</mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>on Pattern</surname>
          </string-name>
          <article-title>Recognition (ICPR)</article-title>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>4642</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Joksimovic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. S.</given-names>
            <surname>Baker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ocumpaugh</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. M. L.</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <source>shop on abusive language online</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Gattulli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          , L. Sarcinella,
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <article-title>on social networks (</article-title>
          <year>2022</year>
          )
          <fpage>644</fpage>
          -
          <lpage>651</lpage>
          . doi:
          <volume>10</volume>
          .5220/
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V.</given-names>
            <surname>Gattulli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Volpe</surname>
          </string-name>
          , Touch
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <article-title>tication via smartphone</article-title>
          ,
          <source>Scientific Reports</source>
          <volume>13</volume>
          (
          <year>2023</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Teh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. B. J.</given-names>
            <surname>Teoh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yue</surname>
          </string-name>
          , et al.,
          <source>A survey</source>
          [1]
          <string-name>
            <given-names>P. K.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mahdavi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Carvalho</surname>
          </string-name>
          , S. Fisher, of keystroke dynamics biometrics, The Scientific
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Russell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Tippett</surname>
          </string-name>
          , Cyberbullying: its na-
          <source>World Journal</source>
          <year>2013</year>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <article-title>ture and impact in secondary school pupils</article-title>
          , [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Hong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pankanti</surname>
          </string-name>
          , Biometric identifica-
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <article-title>Journal of Child Psychology and Psychiatry tion</article-title>
          ,
          <source>Communications of the ACM</source>
          <volume>43</volume>
          (
          <year>2000</year>
          )
          <fpage>90</fpage>
          -
          <lpage>98</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <volume>49</volume>
          (
          <year>2008</year>
          )
          <fpage>376</fpage>
          -
          <lpage>385</lpage>
          . doi:https://doi.org/10. [14]
          <string-name>
            <given-names>R. L.</given-names>
            <surname>Mandryk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. E.</given-names>
            <surname>Nacke</surname>
          </string-name>
          , Biometrics in gaming
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <article-title>and entertainment technologies, in: Biometrics in a [2] 1G1. 11O/rjrù</article-title>
          .,
          <year>14A69</year>
          .-
          <fpage>G7a6l1li0</fpage>
          , .
          <year>2V0</year>
          .
          <year>07G</year>
          .
          <year>a0tt1u8ll4i</year>
          ,
          <fpage>6</fpage>
          .Mx..
          <string-name>
            <surname>Gravina</surname>
          </string-name>
          , Data Driven World, Chapman and Hall/CRC,
          <year>2016</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Micheletto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Marrone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Nocerino</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Pro- pp.
          <fpage>215</fpage>
          -
          <lpage>248</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <surname>caccino</surname>
            , G. Terrone,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Curtotti</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Impedovo</surname>
            ,
            <given-names>G. L.</given-names>
          </string-name>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Karnan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Akila</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Krishnaraj</surname>
          </string-name>
          , Biometric per-
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <article-title>gies for the detection of (cyber)bullying actions: review</article-title>
          ,
          <source>Applied soft computing 11</source>
          (
          <year>2011</year>
          )
          <fpage>1565</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <article-title>The bullybuster project</article-title>
          ,
          <source>Information</source>
          <volume>14</volume>
          (
          <year>2023</year>
          ).
          <fpage>1573</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Marrone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Sansone</surname>
          </string-name>
          , Identifying users'
          <fpage>emo</fpage>
          -
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>