<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>How do we counter dangerous speech in Italy?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vittoria Tonini</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Simona Frenda</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco Antonio Stranisci</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viviana Patti</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Computer Science Department, University of Turin</institution>
          ,
          <addr-line>Torino</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Interaction Lab, Heriot-Watt University</institution>
          ,
          <addr-line>Edinburgh, Scotland</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>aequa-tech</institution>
          ,
          <addr-line>Torino</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The phenomenon of online dangerous speech is a growing challenge and various organisations try to prevent its spread answering promptly to hateful messages online. In this context, we propose a new dataset of activists' and users' comments on Facebook reacting to specific news headlines: AmnestyCounterHS. Taking into account the literature on counterspeech, we defined a new schema of annotation and applied it to our dataset, in order to examine the most used counter-narrative strategies in Italy. This research aims to support the future development of automatic counterspeech generation. This paper presents also a comparative analysis of our dataset with other two datasets in Italian (Counter-TWIT and multilingual CONAN) containing dangerous speech and counter narratives. Through this analysis, we will understand how the environment (artificial vs. ecological) and the topics of discussions online influence the nature of counter narratives. Our findings highlight the predominance of negative sentiment and emotions, the varying presence of stereotypes, and the strategic diferences in counter narratives across datasets.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Counter narrative</kwd>
        <kwd>Linguistic analysis</kwd>
        <kwd>Abusive language</kwd>
        <kwd>Italian language</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction and Background</title>
      <p>
        a very important role. On DS detection, the literature
is vast [4, 5] and covers various nuances of DS [
        <xref ref-type="bibr" rid="ref2 ref4">6, 7</xref>
        ],
Recently, the attention about dangerous speech (DS) on- diferent types of manifestation (i.e., explicit and implicit,
line has increased in diferent sectors, ranging from ini- [
        <xref ref-type="bibr" rid="ref56 ref58 ref6">8</xref>
        ]) and co-occurrences with other psychological and
tiatives for monitoring the DS’ spread in particular in linguistic phenomena, like stereotypes [9] and sarcasm
Italy (e.g., by VOX1, or by researchers like Capozzi et al. [
        <xref ref-type="bibr" rid="ref40">10</xref>
        ]. Regarding works on countering DS, some studies
[
        <xref ref-type="bibr" rid="ref47">1</xref>
        ]) to prevent the escalation of DS online using meth- focused on imitating the operators of Non-Governmental
ods of detection and removal of dangerous contents (e.g., Organizations (NGO) in their intervention in online
disfollowing the policies of social platforms). Moreover, spe- cussions, or selecting the most suitable responses from a
cific actions of countering DS online like the Amnesty database [11] or creating generative models able to reply
Task Force on Hate Speech2, that reassembles specialized automatically to hateful content using counter narratives
activists who actively intervene writing counterspeech, (CN) avoiding hallucinations [12]. The development of
were promoted3 in response to potential or efective dan- NLU and NLG models are mainly based on data-driven
gerous speech or news on various topics. In this context, approaches, that imply the creation of a specific dataset
the new techniques of Natural Language Understanding to detect DS or generate adequate CN. According to the
(NLU) and Natural Language Generation (NLG) can play survey by Bonaldi et al. [2], in literature, the available
datasets in languages diferent from English are very few.
      </p>
      <p>CLiC-it 2024 – Tenth Italian Conference on Computational Linguistics, Among them, currently, only two datasets contain Italian
4 – 6 December 2024, Pisa, Italy texts: CONAN [13] and Counter-TWIT [14].
* Corresponding author. The creation environment of CONAN is artificial (i.e.,
$ vittoria.tonini@edu.unito.it (V. Tonini); activists have been asked to write CN to specific
hatesmi marocnoa.s.tfrraennidsac@i@aaeeqquuaa--tetecchh.c.coomm(S(M.F.rAe.nSdtar)a;nisci); ful comments) and the one of Counter-TWIT is entirely
viviana.patti@unito.it (V. Patti) ecological (i.e., collection of tweets written by users). In
0000-0002-6215-3374 (S. Frenda); 0000-0001-9337-7250 this scenario, in our work we propose a new dataset,
(M. A. Stranisci); 0000-0001-5991-370X (V. Patti) AmnestyCounterHS, that diferently from the existing
©At2tr0i2b4utCioonpy4r.0igIhnttefornratthioisnpaalp(CerCbByYit4s.0a)u.thors. Use permitted under Creative Commons License ones, reflects the real action of activists online. Indeed,
1phattgpe:/v/wiswitewd.voonxjduirlyitt2i0.i2t/4la)-nuova-mappa-dellintolleranza-7/ (web- our dataset, compiled from Facebook, includes
interac2https://www.amnesty.it/entra-in-azione/task-force-attivismo/ tions guided by the Amnesty Task Force on Hate Speech
(webpage visited on july 2024) (HS), representing an ecological and spontaneous
con3As reported in Bonaldi et al. [2], the terms ‘counterspeech’ and text. Here, the intervention of counterspeech is guided
‘counter narratives’ are used interchangeably in Natural Language by Amnesty International activists who decided to
intertPirvoecaecsstiionngsfiealdim(NedLPa)t, raenfudtbinogthhcaatne sbpeeceocnhstihderoreudghasth“cooumghmtufunlicaan-d vene under certain posts potentially dangerous spread
cogent reasons, and true and fact-bound arguments” [3]. by online newspapers or users (e.g., verbal attacks to
women, immigrants, and so on). Counter-TWIT7 dataset is made up of 624 pairs of</p>
      <p>Moreover, inspired by existing strategy taxonomies tweets and their replies. Data were collected in an
eco[15, 13, 14], we mapped a more complete taxonomy in- logical environment using keywords to take texts from
clusive of both existing and new strategies found in our profiles of activists, organisations, or pages especially
dedataset. This new resource allows us to analyze the used voted to calling out common instances of discrimination.
strategies of CN in the Italian language across diferent In this data we encounter both DS(16) and CN(81), but
types of messages and contexts ( CONAN, Counter-TWIT, they are not DS/CN pairs such as in CONAN, but rather
AmnestyCounterHS). By comparing these datasets, we consist of tweets and their replies.
propose to examine: 1) which strategy of CN is the most 2) Tweet: "In Italia spesso funziona cosi: La vittima diventa
used in the diferent contexts and discussions online; 2) automaticamente il colpevole."8
which the diferences are in terms of sentiments, emo- Reply: "Nelle violenze in particolare"9
tions, and the presence of stereotypes, between poten- AmnestyCounterHS is a collection of posts and relative
tially dangerous messages posted online and the coun- comments gathered from Facebook. The data collection
terspeech produced by activists/users in all the datasets. strategy was driven by the work of the Amnesty Task</p>
      <p>The importance of understanding how these strate- Force on HS, a group of activists that produce CN against
gies of CN are used relies on the need to raise social discriminatory contents spread by online newspapers and
awareness about real events, the necessity to be correctly users. During the task force, the activists identified some
informed about facts (avoiding fake news), as well as to posts containing news headlines that probably convey
be conscious of the consequences of dangerous speech or incite hate speech and assigned them a topic based on
in the target groups [16]. the specific target of the news headline. Among the
various topics covered in the dataset are: women, migrants,
2. Datasets LGBTQIA+, solidarity, and environmental issues. During
their activities they built a database of hateful contents
In this section, we describe existing dataset of CN in against which they got activate between 2020 and 2023.
Italian (CONAN and Counter-TWIT), and the creation of Starting from this database, we collected all the news
AmnestyCounterHS. headlines detected by activists in the March 2020, 2021,
CONAN4 is a multilingual and expert-based dataset of 2022, and 2023. Then we gathered and anonymized all
DS/CN pairs in English, French and Italian, focused on the comments in reply to them, for a total of 39,582 users’
Islamophobia. The original dataset consists of 4078 pairs comments and 2,010 activists’ comments. For our work,
over the 3 languages. The dataset has been augmented we used only 10,670 users’ comments selected from users
through translation (from Italian/French to English) and who replied at least 5 times. This approach allowed us
paraphrasing, which brought the total number of pairs to to focus on users with more interactions. Table 1 reports
14.988. The dataset was created by Chung et al. [13] in an the information of all corpora. This enabled us to obtain
artificial environment and consists of expert-based data. three collections of text: i. a set of news headlines that
The DS/CN pairs were collected through niche sourcing incite the use of dangerous speech; ii. a set of comments
from three diferent NGOs in the United Kingdom, France, written by activists replying to users or written directly
and Italy. Consequently, both the responses and the dan- under post; iii. a set of comments written by users
replygerous speech content are expert-based, composed by ing to activists or other users, or written directly under
operators specifically trained to counteract online dan- posts. Table 2 shows the number of comments written
gerous speech. For this paper we considered only the by users and activists per type of interaction.
Italian pairs, which are 3,213 in total. Here is an example 3) Headline: "Migranti, riprendono gli sbarchi. E il coronavirus
of a pair from the CONAN dataset: ora avanza in Africa"10
1) DS: "Noi li ospitiamo nel nostro paese, forniamo un aiuto Comment: "salve, legga l’articolo per favore, non sono ripresi
economico e loro ci uccidono: sono da considerarsi più gli sbarchi, in realtà stanno diminuendo
costantesimili agli animali che alle persone."5 mente, non si preoccupi....è "il Giornale" che fa gli
CN: "I criminali sono in tutti i popoli e di tutte le religioni, per scherzoni"11
fortuna una minoranza, non si deve mai generalizzare.</p>
      <p>Lei è italiano quindi mafioso?" 6
4https://github.com/marcoguerini/CONAN
5"We host them in out country, provide them an economic aid, and
they kill us: they should be considered more like animals than
humans."
6"Criminals exist among all people and religions, fortunately as a
minority, one should never generalise. You are italian, so are you a
mafioso?"</p>
      <sec id="sec-1-1">
        <title>7https://github.com/pierpaologofredo/Counter-TWIT/blob/main/</title>
        <p>Readme.md
8"In Italy it often works like this: the victim becomes guilty."
9"Particularly in cases of violence"
10"Migrants, the landings resume. Coronavirus is now spreading in</p>
        <p>Africa"
11"Hi, please read the article, landings did not resumed, in fact they
are decreasing, don’t worry ... "il Giornale" is playing tricks"
Dataset
CONAN [13]
Counter-TWIT [14]
AmnestyCounterHS</p>
      </sec>
      <sec id="sec-1-2">
        <title>1. Determine if the text is written in a formal or</title>
        <p>
          informal style[
          <xref ref-type="bibr" rid="ref28">17</xref>
          ]. This helps understand the
most used style of language for both DS and CN.
2. Identify if the comment is supporting another and Humour strategy in case of humoristic, ironic or
DS or a CN comment. This layer distinguishes sarcastic statements (further descriptions and examples
between direct DS or CN and comments that sup- of CN strategies are presented in Appendix B). We have
port them. created this mapping, based on the annotation schemes
3. Identify if the comment contains DS and specify from the existing resources in Italian [13, 14], as shown
if it is explicit or implicit. This is important in Table 3. We cross-referenced the strategies from both
because implicit DS can sometimes be hard for schemes and added the Suggestion category. By using
machines to recognise [
          <xref ref-type="bibr" rid="ref56 ref58 ref6">8</xref>
          ]. this strategy, the writer suggests actions to the attacker
4. Identify if the comment is a CN and which to encourage them to rethink their views. Here are some
counter narrative strategy has been used. This examples of texts where we can see this strategy: "Legga
helps us to identify the most frequently used l’articolo per favore"14 or "Vada a consultare i documenti
strategies of CN. storici che parlano di loro e verifichi cosa hanno fatto" 15.
        </p>
        <p>Looking at the comments, we noticed that some of
them are ofensive and impolite but not dangerous
towards certain categories. They reflect the intensity of
discussions on specific topics, displaying hostility
towards the interlocutor rather than targeting specific
categories. For instance:</p>
      </sec>
      <sec id="sec-1-3">
        <title>We have identified nine possible CN strategies: Infor</title>
        <p>mative that is a comment with a statement that seeks
to debunk or fact-check the claims made by the attacker,
Alternative when alternatives to the statement made by
the attacker are proposed, Suggestion, Explicitation
in the case of a comment that explicitly clarifies
something that was implicit in the DS comment, Question
made to cause reflections in the writer of the DS
comment, Denouncing and explaining when the writer
explains why things said by the perpetrator are not
acceptable, Positive in the case of a polite comment,
Hostile when the writer uses aggressive tone and words,
12The guidelines and the dataset have been released in https://github.</p>
        <p>com/aequa-tech/external-resources.
13You can see some examples of the various annotation layers in
Table 7 in Appendix A.
4) Comment: "come scusa, forse non è consapevole di essere
lei stessa non saper utilizzare la punteggiatura,
continui pure fare figure di merda, i commenti
sono pubblici"16
14"Read the article, please"
15"Go consult the historical documents about them and verify what
they have done"
16"Excuse me, perhaps you are not aware that you yourself do not
know how to use punctuation, keep making an ass of yourself,
comments are public"</p>
        <sec id="sec-1-3-1">
          <title>5) Comment: "Ormai mi limito a ridere, rispondere a certi com</title>
          <p>menti è un insulto verso noi stessi"17</p>
          <p>Another interesting observation regards the presence
of negative stereotypes that in various cases have been
identified as implicit dangerous speech:</p>
        </sec>
        <sec id="sec-1-3-2">
          <title>6) Comment: "un figlio che sia campione di moto o una figlia</title>
          <p>che faccia la ballerina"18
7) Comment: "Non chiede di sbarcare...ordina di sbarcare il che
è diverso. Loro decidono dove sbarcare e quando
sbarcare altrimenti speronano"19</p>
        </sec>
      </sec>
      <sec id="sec-1-4">
        <title>These examples illustrate how stereotypes and implicit</title>
        <p>biases are embedded in the discourse, often
contributing to the perpetuation of harmful stereotypes. This is
one of the reasons why we decided to do an analysis of
stereotypes in our comparative analysis.</p>
        <p>
          Finally, we noticed that various comments are featured
with irony. Irony is frequently used to convey dangerous
or ofensive sentiments in a less direct manner [
          <xref ref-type="bibr" rid="ref40">10</xref>
          ]:
Label
Style
Presence of CN
Presence of DS
Support
Question
Informative
Positive
Hostile
Denouncing and Explaining
Humour
Explicitation
Alternative
Suggestion
Explicit DS
Implicit DS
8) Headline: "Il Giornale Pescara, magrebino aggredisce e Afective : to determine which sentiment and emotion
deruba 63enne fuori dal supermercato"20 feature the intervention of who wrote CN (activists or
Comment: "Adesso vediamo di dargli anche la medaglia sto other users) respect to other messages.
        </p>
        <p>disgraziato"21 Stereotype: to understand if not only user comments
Annotation and inter-annotator agreement The anno- contained stereotypes but also if activists or non-activists
tation has been carried out for 307 comments by two an- who wrote CN somehow contributed to spreading them.
notators with linguistics background using the LabelStu- Strategies: to identify the most used strategies in CN
dio platform (Figure 2 in Appendix C). The Cohen’s kappa depending on the context and topic of discussion online.
was computed to examine the inter-annotator agreement
for all labels obtaining the results shown in Table 4. The 3.1. Afective Analysis
highest results were obtained for the counter-narrative The afective analysis (Figure 1) has been performed
au(0.66) and dangerous speech (0.62) labels. For counter- tomatically, detecting sentiment (positive, negative and
narrative strategies, the easiest to identify was Ques- neutral) and emotions (joy, sadness, fear, and anger)
tion, followed by Positive, and Informative. There inferring labels from the following fine-tuned models
were some dificulties related to the Support label. For available on the HuggingFace hub:
lxyuan/distilbertinstance, the sentence: "nessun problema, si boicotta la base-multilingual-cased-sentiments-student for
sentiDisney."22 was annotated as dangerous speech support by ment, and Taraassss/sentiment_analysis_IT for emotion.
one annotator, while the other one did not consider it as In order to compare sentiment and emotions identified in
such. It would be helpful to provide further information potential dangerous speech and CN, we selected: 3,213
about this label in the annotation scheme. DS and 3,213 CN from CONAN; 543 tweets and 81 replies
annotated as CN from Counter-TWIT; 10,670 users’
com3. Comparative Analysis ments and 2,010 activists’ comments from
AmnestyCounterHS23.</p>
        <p>In order to investigate the diferences in terms of sen- As can be clearly seen from the sentiment analysis
timents, emotions, and the presence of stereotypes, be- graphs, both in the message datasets and in the counter
tween potentially dangerous messages posted online and narrative datasets, there is a predominance of negative
the counterspeech produced by activists/users in all the polarity. Regarding emotions, anger is the most
prevadatasets, we performed three diferent types of analysis. lent emotion. Therefore, we observed this notable trend,
despite the diferent origins of the datasets. However,
it is important to point out that anger is not always a
purely negative sentiment. While it often reflects strong
emotions associated with dissatisfaction or conflict, it
17"Nowadays, I just limit myself to laughing, answering certain</p>
        <p>comments is an insult to ourselves"
18"a son who is a motorcycle champion or a daughter who is a dancer"
19"They don’t ask to land...They order to land, which is diferent.</p>
        <p>They decide where and when to land, otherwise they ram"
20"Maghrebian assaults and robs 63-year-old outside the supermar- 23The assumption that these texts from activists are
counterket" narratives is based on the way the data was collected
(activist21"Now let’s also give this miserable a medal" comment): the data collection strategy was influenced by the
22"No problem, we’ll boycott Disney." methodology established by the Amnesty Task Force on HS.
(a) Sentiment distribution in messages
(b) Sentiment distribution in CN
(c) Emotion distribution in messages
(d) Emotion distribution in CN
3.2. Analysis of Stereotype
Like in previous analysis, the presence of stereotypes
(see Table 5) has been performed automatically, inferring
can also highlight important debates and drive positive labels from the fine-tuned model
aequa-tech/stereotypechange, such as in the following example: "un po’ di ver- it available on the HuggingFace hub. The set of examined
gogna per un commento fuori luogo come il suo davanti data is the same of afective analysis.
a tanto dolore, no?"24. The comment, despite containing Dataset Type of text % stereotype
a provocation, aims to be constructive because it tries to CONAN DS 85.6%
spark a reaction in the user’s thinking. In many cases, CONAN CN 47.5%
anger can be a powerful force for tackling issues and Counter-TWIT Tweet 12.2%
making progress. So, the anger seen in these datasets AmCnoeustnytCero-TuWnteITrHS Users’RCeopmlyments 2197..66%%
might not just show the seriousness of the issue but also AmnestyCounterHS Activists’ Comments 20.4%
the possibility for meaningful discussion and action.</p>
        <p>For AmnestyCounterHS, we also wanted to carry out Table 5
a sentiment analysis by dividing the comments based Percentage of presence of stereotypes.
on the year of publication to see if the sentiment of the
users who wrote various comments, and thus interacted
more with the activists, changed over time. We expected
their behaviour could become more positive after several
interactions with activists. Unfortunately, we did not
observe significant changes over the years, as can be
seen in the figures provided in Appendix D).</p>
        <p>In Table 5, we can see that in the CONAN dataset,
dangerous speech messages may be more likely to contain
stereotypes, while responses often serve oppositions to
stereotypes present in the original messages. This pattern
is not the same in Counter-TWIT and
AmnestyCounterHS. Indeed, these two datasets, containing data
extracted from ecological environments (respectively,
Twitter and Facebook), reflect the spontaneous interaction
between users and activists, where the activists
themselves can explicitly mention stereotypes to oppose them
or may be contributing to the creation or amplification
of stereotypes.
24"a little shame for a comment out of place like yours in the face of
so much pain, no?"</p>
        <p>Dataset
CONAN
CounterTWIT
Amnesty
CounterHS</p>
        <p>Denouncing
Informative Alternative Suggestion Explicitation Question and
ex</p>
        <p>plaining
48.3% - - - 16.1% 22.7%
- 6.3% - 8.4% -
34.8%
6.7%
4.3%
4.4%
11.2%
19.8%</p>
        <p>Positive</p>
        <p>Hostile</p>
        <p>Humour
3.3. Analysis of CN Strategies</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>4. Discussion and Conclusion</title>
      <p>The third type of analysis focuses on the various types of In this paper, we examine the strategy of CN used in
varicounter narrative strategies used across all three datasets. ous contexts, looking at their characteristics and typology
Firstly, we had to map the strategy types to our guidelines, across diferent datasets in Italian: CONAN,
Counteradapting the strategy labels from the diferent datasets TWIT, and AmnestyCounterHS. Thanks to this
comparto match the labels in our dataset (see Table 3). Secondly, ative analysis, we noticed that diferent environments
we examined the distribution of strategies across datasets and topics afect the type of strategy used by activists or
considering the type of environment (ecological, artifi- users who want to counter DS [18].
cial) and the diferent topics. One of the main points that we want to underline is</p>
      <p>In an artificial context such as that of the CONAN the importance of the conversational context [19, 20, 21,
dataset, the most commonly used strategy is informa- 22]. In our dataset, AmnestyCounterHS, the annotators
tive. This prevalence is expected because, in controlled showed dificulties to understand the position of the
auenvironments, there is often a focus on providing factual thor of the message, without the entire conversational
information and raising awareness to counteract misin- thread. For instance, let us consider this comment
writformation efectively. This is also the most used strategy ten under some news about COVID-19: "Infatti.
Ampiain our dataset, where CN were written by activists. In an mente dimostrato"26. Without the full conversation, it is
ecological context like that of the Counter-TWIT dataset, challenging to determine whether this comment is
supthe most frequently used category is hostile. This is un- porting or contradicting an argument about COVID-19.
derstandable, as real-world interactions often involve Similarly, let us take a look at the comment: "Grande
argomore emotional and aggressive responses, reflecting mentazione, scuola di Demostene? #posailfiasco" 27 written
the more spontaneous and less regulated nature of on- under this newstitle: "Un milione di profughi sono
ostagline discourse. The use of this CN strategy is interesting, gio di Erdogan"28. We can clearly see that the comment is
because usually it is not suggested to use it. Despite this, ironic, but we cannot understand its stance on
integrait can happen that ones get irritated when facing dan- tion. For this reason, future developments in automatic
gerous speech. The hostile strategy can be considered counterspeech generation should focus on incorporating
somewhat the opposite of positive, which instead repre- comprehensive conversational threads to enhance
accusents a very polite attitude. Moreover, we wanted to see racy and relevance. This approach will be fundamental
also which the most used strategies were according to to create efective AI-driven counter-narrative systems.
the topic. Analysing our dataset we obtained that for the
topics LGBTI, migrants and solidarity, the most frequent
strategy was informative. For the topic "women", the 5. Ethical Statement and
most used strategy was alternative, while for the topic Limitation
"environment", the prevalent strategy was denouncing
and explaining. The data in the corpus was collected from public pages</p>
      <p>We also conducted a manual analysis of the corpus to and has been anonymised. IDs were created by us, and
understand if there were any interactions between users the links from which the comments were taken have been
and activists that proved more efective than others. In removed, therefore it is not possible to trace the
origiparticular, we observed that an activist who employed the nal comments. Moreover, in the released version, the
Polite strategy in some comments managed to engage identities of the annotators are not revealed. An ethical
quite well with a user. An example of a comment written concern is related to the characteristics of the annotators
by the activist is: "interessante. Mi permetta, senza
polemica, di puntualizzare alcune inesattezze che ha riportato,
forse nella velocità"25
a few inaccuracies you mentioned, perhaps due to haste."
26"Indeed. It’s been extensively demonstrated"
27"Great argument, is it from the school of Demosthenes? #giveitup"
25"Interesting. Allow me, without being argumentative, to point out 28"One million of refuges are hostage to Erdogan"</p>
    </sec>
    <sec id="sec-3">
      <title>Acknowledgments</title>
      <sec id="sec-3-1">
        <title>Thanks to Dr. Martina Rosola and all the activists of</title>
        <p>Amnesty Task Force on HS for supporting us in the
collection and creation of the AmnestyCounterHS dataset.
participating in data annotation. Data were annotated by
two young Italian females with a background in
linguistics. The limited diversity among annotators may narrow
the variety of perspectives included, and their personal
biases could influence the data annotation process.
Layers
Formal style
Informal style
Dangerous speech support
Counterspeech support
Explicit dangerous speech
Implicit dangerous speech
Informative strategy of CN</p>
        <p>Suggestion strategy of CN</p>
        <p>Examples
Comment: "salve, comprendo la sua polemica, ma non sono arrivati qui per "essere un peso",
sono migranti, chi arriva dalla Libia, chi dalla Nigeria, [...]"29
Comment: "stai tergiversando, situazioni diverse, qui si parla di omosessuali, completamente
diverso dai giochi con talco e tutto il resto che hai citato. Ognuno però può fare quello che
vuole non sono problemi miei. Ciao buona giornata"30
Comment: "avrà tanti morti sulla coscienza, oltre ai nostri anche i migranti, dovete chiudere i
porti"31
News title: "Disney, la carica dei 101 generi: "Entro il 2022 la metà dei personaggi sarà Lgbt"32
Comment: "idealmente potrebbe essere vero che per una piena inclusione non ci dovrebbe
essere bisogno di dare etichette, ma ognuno dovrebbe essere libero di essere chi è e amare chi
vuole liberamente. Ma conviene con me che nelle società di [...]"33
News title: "Il Giornale Pescara, magrebino aggredisce e deruba 63enne fuori dal
supermercato"34 Comment: "Adesso vediamo di dargli anche la medaglia sto disgraziato"35
Comment: "Il suo desiderio da padre era quello di avere un figlio che giocasse rugby, come tanti
che sperano di aver un figlio che sia campione di moto o una figlia che faccia la ballerina."36
Comment: "guardi che gli unici due sbarchi di Marzo sono stati subito controllati e messi in
quarantena preventiva, non ci sono stati altri sbarchi tutto il mese, c’è eccome lo spazio per
gestire questi pochi arrivati. Prima di accusare il prossimo[...]"37
Comment: "Mi perdoni, ma anziché ironizzare sugli altri o sentirsi addirittura più accorti degli
altri, perché non cercare di argomentare il proprio pensiero? [...]"38
a more detailed description of facts. Example:
"Non gigante buono, ma femminicida"40</p>
      </sec>
      <sec id="sec-3-2">
        <title>3. Suggestion: the writer suggests actions to the</title>
        <p>attacker to encourage them to rethink their views.
Example: "Le consiglio di leggere degli articoli
sull’argomento"41
4. Explicitation: the writer explicitates/reveals
what was implicit in the statement made by the
attacker. Example: “Stanno equiparando la pedofilia
all’omosessualità”42
5. Question: questions that would challenge the
speaker’s chain of reasoning and compel them to
either answer convincingly or recant their
original remark. Example: “Si potrebbe almeno
riportare qualche fatto prima di trarre queste
conclusioni?”43 Indirect questions should be annotated
too. Example: “mi dia qualche link che riporti
esempi concreti di quanto aferma” 44
6. Denouncing and explaining: when you convey
the impression that the opinions put forth by the
hate speaker are not acceptable and you try to
explain to the user why. Example: “C’è un grosso
errore di fondo in quanto scritto nell’introduzione
40"Not a good giant, but a femicide"
41"I suggest you to read some papers on the topic"
42"They are equating pedophilia with homosexuality"
43"Could you at least present some facts before drawing these
conclusions?"
44"Please provide some links that present concrete examples of what
you’re claiming"
di questo articolo. Rendere l’interruzione di
gravidanza un diritto garantito dall’assistenza sanitaria
pubblica non significa che lo Stato imponga
alcunché.”45</p>
      </sec>
      <sec id="sec-3-3">
        <title>7. Positive: a courteous, polite, and civil statement.</title>
        <p>Example: “Insegnare ai bambini che ci sono tanti
modi diferenti per essere felici e che i loro
sentimenti valgono è una cosa su cui concordo
totalmente.”46
8. Hostile: the user expresses hostility,
aggressiveness towards the initial content, using insults or
aggressive words. Example: “Bisogna davvero
essere degli stupidi idioti retrogradi a credere alla
negatività sull’Islam.”47</p>
      </sec>
      <sec id="sec-3-4">
        <title>9. Humour: a strategy of counterspeech with an</title>
        <p>humoristic, ironic, sarcastic intent whether
positive or negative. Example: "E meno male che era
buono. Se era cattivo che faceva, se la magnava?"48
It is possible to identify more than a single counterspeech
strategy in a single comment.
45"There’s a big mistake in what’s written in the introduction of this
article. Making abortion a right guaranteed by public healthcare
does not mean that the state is imposing anything."
46"Teaching children that there are many diferent ways to be happy
and that their feelings matter is something I completely agree
with."
47"One must truly be a stupid, backward idiot to believe the negativity
about Islam."
48"Good thing he was nice. If he had been bad, what would he have
done, eat her?"</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>C. Annotation Platform</title>
    </sec>
    <sec id="sec-5">
      <title>D. Afective Analysis</title>
    </sec>
    <sec id="sec-6">
      <title>AmnestyCounterHS</title>
      <p>(a) Sentiment distribution of users replying to activists.
(b) Emotion distribution of users replying to activists.
(c) Sentiment distribution of users replying to users.
(d) Emotion distribution of users replying to users.
(e) Sentiment distribution of users replying to posts.
(f) Emotion distribution of users replying to posts.
(a) Sentiment distribution of activists replying to users.
(b) Emotion distribution of activists replying to users.
(c) Sentiment distribution of activists replying to posts.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          2018. URL: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2263</volume>
          /paper010.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Fortuna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nunes</surname>
          </string-name>
          , A survey on automatic de-
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>Surveys</source>
          <volume>51</volume>
          (
          <year>2018</year>
          )
          <volume>85</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>85</lpage>
          :
          <fpage>30</fpage>
          . URL: https://doi.org/
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Poletto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Basile</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sanguinetti</surname>
          </string-name>
          , C. Bosco,
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <source>Resources and Evaluation</source>
          <volume>55</volume>
          (
          <year>2021</year>
          )
          <fpage>477</fpage>
          -
          <lpage>523</lpage>
          . URL:
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>T.</given-names>
            <surname>Caselli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Basile</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mitrović</surname>
          </string-name>
          , I. Kartoziya,
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          language, in
          <source>: Proceedings of the 12th Language</source>
          [1]
          <string-name>
            <given-names>A. T. E.</given-names>
            <surname>Capozzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Basile</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Musto</surname>
          </string-name>
          , M. Polig- Resources and Evaluation Conference, European
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>G.</given-names>
            <surname>Rufo</surname>
          </string-name>
          , G. Semeraro,
          <string-name>
            <given-names>M.</given-names>
            <surname>Stranisci</surname>
          </string-name>
          , Computa- 2020, pp.
          <fpage>6193</fpage>
          -
          <lpage>6202</lpage>
          . URL: https://aclanthology.org/
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>tional linguistics against hate</article-title>
          : Hate speech de-
          <source>2020.lrec-1</source>
          .
          <fpage>760</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <article-title>tection and visualization on social media in the [9</article-title>
          ]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sanguinetti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Comandini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. D.</given-names>
            <surname>Nuovo</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>igli</surname>
          </string-name>
          , G. Semeraro (Eds.),
          <source>Proceedings of the Sixth I. Russo, Haspeede</source>
          <volume>2</volume>
          @ EVALITA2020: Overview
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Italian</surname>
          </string-name>
          <article-title>Conference on Computational Linguistics, of the EVALITA 2020 hate speech detection task,</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Bari</surname>
          </string-name>
          , Italy,
          <source>November 13-15</source>
          ,
          <year>2019</year>
          , volume
          <volume>2481</volume>
          of in: V.
          <string-name>
            <surname>Basile</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Croce</surname>
            ,
            <given-names>M. D.</given-names>
          </string-name>
          <string-name>
            <surname>Maro</surname>
          </string-name>
          , L. C. Passaro
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>CEUR Workshop Proceedings, CEUR-WS</source>
          ,
          <year>2019</year>
          . URL: (Eds.),
          <source>Proceedings of the Seventh Evaluation</source>
          Cam-
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2481</volume>
          /paper14.pdf .
          <source>paign of Natural Language Processing and Speech</source>
          [2]
          <string-name>
            <given-names>H.</given-names>
            <surname>Bonaldi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.-L.</given-names>
            <surname>Chung</surname>
          </string-name>
          , G. Abercrombie, Tools for Italian.
          <source>Final Workshop (EVALITA</source>
          <year>2020</year>
          ),
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Guerini</surname>
          </string-name>
          ,
          <article-title>NLP for counterspeech against Online event</article-title>
          ,
          <year>December 17th</year>
          ,
          <year>2020</year>
          , volume
          <volume>2765</volume>
          of
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <article-title>hate: A survey and how-to guide</article-title>
          , in: K. Duh, CEUR Workshop Proceedings, CEUR-WS,
          <year>2020</year>
          . URL:
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <given-names>H.</given-names>
            <surname>Gomez</surname>
          </string-name>
          , S. Bethard (Eds.), Findings of the http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2765</volume>
          /paper162.pdf .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Association</surname>
            for Computational Linguistics: NAACL [10]
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Frenda</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Patti</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Rosso</surname>
          </string-name>
          , When sarcasm hurts:
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          2024,
          <article-title>Association for Computational Linguistics, Irony-aware models for abusive language detec-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <given-names>Mexico</given-names>
            <surname>City</surname>
          </string-name>
          , Mexico,
          <year>2024</year>
          , pp.
          <fpage>3480</fpage>
          -
          <lpage>3499</lpage>
          . URL: tion, in: A.
          <string-name>
            <surname>Arampatzis</surname>
          </string-name>
          , E. Kanoulas, T. Tsikrika,
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          https://aclanthology.org/
          <year>2024</year>
          .findings-naacl.221.
          <string-name>
            <given-names>S.</given-names>
            <surname>Vrochidis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Giachanou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Aliannejadi</surname>
          </string-name>
          , [3]
          <string-name>
            <given-names>C.</given-names>
            <surname>Schieb</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Preuss</surname>
          </string-name>
          ,
          <article-title>Governing hate speech by M. Vlachos</article-title>
          , G. Faggioli, N. Ferro (Eds.), Experimen-
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <article-title>means of counterspeech on facebook, in: 66th ICA tal IR Meets Multilinguality</article-title>
          , Multimodality, and
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          annual conference, at Fukuoka, Japan,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>Interaction</lpage>
          , Springer Nature Switzerland, Cham,
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          23.
          <year>2023</year>
          , pp.
          <fpage>34</fpage>
          -
          <lpage>47</lpage>
          . [4]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Waseem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Davidson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Warmsley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. Weber</given-names>
            , Un- [11]
            <surname>Y.-L. Chung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. Sinem</given-names>
            <surname>Tekiroğlu</surname>
          </string-name>
          , S. Tonelli,
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <source>Workshop on Abusive Language Online</source>
          , Associa- cial
          <source>Networks and Media</source>
          <volume>24</volume>
          (
          <year>2021</year>
          )
          <fpage>100150</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <surname>Canada</surname>
          </string-name>
          ,
          <year>2017</year>
          , pp.
          <fpage>78</fpage>
          -
          <lpage>84</lpage>
          . URL: https://aclanthology. article/pii/S246869642100032X. doi:https:
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          org/W17-3012. //doi.org/10.1016/j.osnem.
          <year>2021</year>
          .
          <volume>100150</volume>
          . [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Bosco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Dell'Orletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Poletto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sanguinetti</surname>
          </string-name>
          , [12]
          <string-name>
            <surname>Y.-L. Chung</surname>
            ,
            <given-names>S. S.</given-names>
          </string-name>
          <string-name>
            <surname>Tekiroğlu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Guerini</surname>
          </string-name>
          , To-
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Tesconi</surname>
          </string-name>
          ,
          <article-title>Overview of the EVALITA 2018 hate wards knowledge-grounded counter narrative gen-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <article-title>Evaluation Campaign of Natural Language Process- for Computational Linguistics: ACL-IJCNLP</article-title>
          <year>2021</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <source>(EVALITA</source>
          <year>2018</year>
          )
          <article-title>co-located with the Fifth Italian line</article-title>
          ,
          <year>2021</year>
          , pp.
          <fpage>899</fpage>
          -
          <lpage>914</lpage>
          . URL: https://aclanthology.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <string-name>
            <surname>Conference on Computational</surname>
          </string-name>
          <article-title>Linguistics (CLiC-it org/2021</article-title>
          .findings-acl.
          <volume>79</volume>
          . doi:
          <volume>10</volume>
          .18653/v1/
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <year>2018</year>
          ), Turin, Italy,
          <source>December 12-13</source>
          ,
          <year>2018</year>
          , volume findings-acl.
          <volume>79</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          2263 of CEUR Workshop Proceedings, CEUR-WS, [13]
          <string-name>
            <surname>Y.-L. Chung</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Kuzmenko</surname>
            ,
            <given-names>S. S.</given-names>
          </string-name>
          <string-name>
            <surname>Tekiroglu</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Guerini</surname>
          </string-name>
          , CONAN - COunter NArratives doi:10.18653/v1/
          <year>2022</year>
          .naacl-main.
          <volume>433</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <article-title>through nichesourcing: a multilingual dataset of</article-title>
          [20]
          <string-name>
            <given-names>B.</given-names>
            <surname>Vidgen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Margetts</surname>
          </string-name>
          , P. Rossini,
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <article-title>of the 57th Annual Meeting of the Association for moyer, D. Hakkani-Tur, I. Beltagy, S</article-title>
          . Bethard,
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          <string-name>
            <surname>putational Linguistics</surname>
          </string-name>
          , Florence, Italy,
          <year>2019</year>
          , pp.
          <source>Proceedings of the 2021 Conference of the</source>
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          2819-
          <fpage>2829</fpage>
          . URL: https://aclanthology.org/P19-1271. North American Chapter of the Association
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          <source>doi:10</source>
          .18653/v1/
          <fpage>P19</fpage>
          -1271. for Computational Linguistics: Human Lan[14]
          <string-name>
            <given-names>P.</given-names>
            <surname>Gofredo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Basile</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Cepollaro</surname>
          </string-name>
          , V. Patti, guage Technologies, Association for Computa-
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <string-name>
            <surname>Counter-TWIT</surname>
          </string-name>
          :
          <article-title>An Italian corpus for online coun-</article-title>
          tional
          <string-name>
            <surname>Linguistics</surname>
          </string-name>
          , Online,
          <year>2021</year>
          , pp.
          <fpage>2289</fpage>
          -
          <lpage>2303</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <article-title>terspeech in ecological contexts</article-title>
          , in: K. Narang, URL: https://aclanthology.org/
          <year>2021</year>
          .naacl-main.
          <volume>182</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Mostafazadeh Davani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Mathias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Vidgen</surname>
          </string-name>
          , doi:10.18653/v1/
          <year>2021</year>
          .naacl-main.
          <volume>182</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          <string-name>
            <given-names>Z.</given-names>
            <surname>Talat</surname>
          </string-name>
          (Eds.),
          <source>Proceedings of the Sixth Work</source>
          <volume>-</volume>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Albanyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hassan</surname>
          </string-name>
          , E. Blanco, Finding
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          <string-name>
            <surname>Washington</surname>
          </string-name>
          (Hybrid),
          <year>2022</year>
          , pp.
          <fpage>57</fpage>
          -
          <lpage>66</lpage>
          . URL: https: K. Bali (Eds.),
          <source>Proceedings of the 2023 Conference</source>
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          //aclanthology.org/
          <year>2022</year>
          .woah-
          <volume>1</volume>
          .6. doi:
          <volume>10</volume>
          .18653/ on Empirical Methods in Natural Language Pro-
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          v1/
          <year>2022</year>
          .woah-
          <volume>1</volume>
          .6. cessing, Association for Computational Linguis[15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Benesch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ruths</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. P.</given-names>
            <surname>Dillon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. M.</given-names>
            <surname>Saleem</surname>
          </string-name>
          , tics, Singapore,
          <year>2023</year>
          , pp.
          <fpage>13862</fpage>
          -
          <lpage>13876</lpage>
          . URL: https:
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            <surname>Wright</surname>
          </string-name>
          , Counterspeech on twitter: A field //aclanthology.org/
          <year>2023</year>
          .emnlp-main.
          <volume>855</volume>
          . doi:10.
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          <string-name>
            <surname>study</surname>
          </string-name>
          ,
          <source>Dangerous Speech Project. Available</source>
          <volume>18653</volume>
          /v1/
          <year>2023</year>
          .emnlp-main.
          <volume>855</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          at: https://dangerousspeech.org/counterspeech- [22]
          <string-name>
            <given-names>P.</given-names>
            <surname>Möhle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Orlikowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Cimiano</surname>
          </string-name>
          , Just collect,
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          <string-name>
            <surname>ontwitter-</surname>
          </string-name>
          a-field- study/.
          <source>(</source>
          <year>2016</year>
          )
          <fpage>1</fpage>
          -
          <lpage>39</lpage>
          . don't filter:
          <article-title>Noisy labels do not improve counter</article-title>
          [16]
          <string-name>
            <surname>W.-C. Hwang</surname>
            ,
            <given-names>S. Goto,</given-names>
          </string-name>
          <article-title>The impact of perceived speech collection for languages without annotated</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          <string-name>
            <surname>American</surname>
          </string-name>
          and Latino college students, Cultural Di- crombie, M. Guerini (Eds.),
          <source>Proceedings of the 1st</source>
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          <source>versity and Ethnic Minority Psychology</source>
          <volume>14</volume>
          (
          <year>2008</year>
          ) Workshop on CounterSpeech for Online Abuse
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          326-
          <fpage>335</fpage>
          . URL: https://pubmed.ncbi.nlm.nih.gov/ (CS4OA), Association for Computational Linguis-
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          <volume>18954168</volume>
          /. tics, Prague, Czechia,
          <year>2023</year>
          , pp.
          <fpage>44</fpage>
          -
          <lpage>61</lpage>
          . URL: https: [17]
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Sheikha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Inkpen</surname>
          </string-name>
          , Learning to clas- //aclanthology.org/
          <year>2023</year>
          .cs4oa-
          <fpage>1</fpage>
          .4.
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          <source>ogy 8</source>
          (
          <year>2012</year>
          ). URL: https://journals.colorado.edu/ A. Dataset details
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          index.php/lilt/article/view/1305. doi:
          <volume>10</volume>
          .33011/
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          <source>lilt.v8i.1305</source>
          .
          <article-title>Table 7 shows annotated examples extracted from our</article-title>
          [18]
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Tekiroğlu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.-L.</given-names>
            <surname>Chung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Guerini</surname>
          </string-name>
          , Generat- dataset.
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          <article-title>58th Annual Meeting of the Association for Com-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          <string-name>
            <surname>putational Linguistics</surname>
          </string-name>
          ,
          <article-title>Association for Computa- 1. Informative: the writer writes a statement that</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          <string-name>
            <surname>tional Linguistics</surname>
          </string-name>
          , Online,
          <year>2020</year>
          , pp.
          <fpage>1177</fpage>
          -
          <lpage>1190</lpage>
          . URL:
          <article-title>seeks to debunk or fact-check the claims made</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          https://aclanthology.org/
          <year>2020</year>
          .acl-main.
          <volume>110</volume>
          . doi:10.
          <article-title>by the attacker</article-title>
          . Example: “Minoranze etniche è
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>
          <volume>18653</volume>
          /v1/
          <year>2020</year>
          .
          <article-title>acl-main.110. un termine usato in un contesto specifico</article-title>
          , qui ad [19]
          <string-name>
            <given-names>X.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Blanco</surname>
          </string-name>
          , L. Hong,
          <article-title>Hate speech esempio, nel Regno Unito, le persone provenienti da</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          <article-title>and counter speech detection: Conversational questi paesi sono minoranze”39</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref65">
        <mixed-citation>
          <string-name>
            <surname>C. de Marnefe</surname>
            ,
            <given-names>I. V.</given-names>
          </string-name>
          <string-name>
            <surname>Meza Ruiz</surname>
          </string-name>
          (Eds.), Pro- 2. Alternative:
          <article-title>the writer proposes alternatives to</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref66">
        <mixed-citation>
          <article-title>ceedings of the 2022 Conference of the North the statement made by the attacker</article-title>
          and proposes
        </mixed-citation>
      </ref>
      <ref id="ref67">
        <mixed-citation>
          <article-title>putational Linguistics: Human Language Tech- gesting a more “correct” point of view and giving nologies, Association for Computational Linguis- 39"Ethnic minorities' is a term used in a specific context</article-title>
          . For examtics, Seattle, United States,
          <year>2022</year>
          , pp.
          <fpage>5918</fpage>
          -
          <lpage>5930</lpage>
          .
          <article-title>ple, here in the United Kingdom, people from these countries are URL: https://aclanthology</article-title>
          .org/
          <year>2022</year>
          .naacl-main.
          <source>433. considered minorities."</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>