Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "N18-1036",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T13:49:44.924980Z"
},
"title": "Before Name-calling: Dynamics and Triggers of Ad Hominem Fallacies in Web Argumentation",
"authors": [
{
"first": "Ivan",
"middle": [],
"last": "Habernal",
"suffix": "",
"affiliation": {
"laboratory": "Ubiquitous Knowledge Processing Lab (UKP) and Research Training Group AIPHES",
"institution": "Technische Universit\u00e4t Darmstadt",
"location": {
"country": "Germany"
}
},
"email": ""
},
{
"first": "Henning",
"middle": [],
"last": "Wachsmuth",
"suffix": "",
"affiliation": {},
"email": ""
},
{
"first": "Iryna",
"middle": [],
"last": "Gurevych",
"suffix": "",
"affiliation": {
"laboratory": "Ubiquitous Knowledge Processing Lab (UKP) and Research Training Group AIPHES",
"institution": "Technische Universit\u00e4t Darmstadt",
"location": {
"country": "Germany"
}
},
"email": ""
},
{
"first": "Benno",
"middle": [],
"last": "Stein",
"suffix": "",
"affiliation": {},
"email": ""
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "Arguing without committing a fallacy is one of the main requirements of an ideal debate. But even when debating rules are strictly enforced and fallacious arguments punished, arguers often lapse into attacking the opponent by an ad hominem argument. As existing research lacks solid empirical investigation of the typology of ad hominem arguments as well as their potential causes, this paper fills this gap by (1) performing several large-scale annotation studies, (2) experimenting with various neural architectures and validating our working hypotheses, such as controversy or reasonableness, and (3) providing linguistic insights into triggers of ad hominem using explainable neural network architectures.",
"pdf_parse": {
"paper_id": "N18-1036",
"_pdf_hash": "",
"abstract": [
{
"text": "Arguing without committing a fallacy is one of the main requirements of an ideal debate. But even when debating rules are strictly enforced and fallacious arguments punished, arguers often lapse into attacking the opponent by an ad hominem argument. As existing research lacks solid empirical investigation of the typology of ad hominem arguments as well as their potential causes, this paper fills this gap by (1) performing several large-scale annotation studies, (2) experimenting with various neural architectures and validating our working hypotheses, such as controversy or reasonableness, and (3) providing linguistic insights into triggers of ad hominem using explainable neural network architectures.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "Human reasoning is lazy and biased but it perfectly serves its purpose in the argumentative context (Mercier and Sperber, 2017) . When challenged by genuine back-and-forth argumentation, humans do better in both generating and evaluating arguments (Mercier and Sperber, 2011) . The dialogical perspective on argumentation has been reflected in argumentation theory prominently by the pragma-dialectic model of argumentation (van Eemeren and Grootendorst, 1992) . Not only sketches this theory an ideal normative model of argumentation but also distinguishes the wrong argumentative moves, fallacies (van Eemeren and Grootendorst, 1987) . Among the plethora of prototypical fallacies, notwithstanding the controversy of most taxonomies (Boudry et al., 2015) , ad hominem argument is perhaps the most famous one. Arguing against the person is considered faulty, yet is prevalent in online and offline discourse. 1 1 According to 'Godwin's law' known from the internet pop-culture (https://en.wikipedia.org/wiki/ Although the ad hominem fallacy has been known since Aristotle, surprisingly there are very few empirical works investigating its properties. While Sahlane (2012) analyzed ad hominem and other fallacies in several hundred newspaper editorials, others usually only rely on few examples, as observed by de Wijze (2002) . As Macagno (2013) concludes, ad hominem arguments should be considered as multifaceted and complex strategies, involving not a simple argument, but several combined tactics. However, such research, to the best of our knowledge, does not exist. Very little is known not only about the feasibility of ad hominem theories in practical applications (the NLP perspective) but also about the dynamics and triggers of ad hominem (the theoretical counterpart).",
"cite_spans": [
{
"start": 100,
"end": 127,
"text": "(Mercier and Sperber, 2017)",
"ref_id": "BIBREF31"
},
{
"start": 248,
"end": 275,
"text": "(Mercier and Sperber, 2011)",
"ref_id": "BIBREF29"
},
{
"start": 424,
"end": 460,
"text": "(van Eemeren and Grootendorst, 1992)",
"ref_id": "BIBREF45"
},
{
"start": 599,
"end": 635,
"text": "(van Eemeren and Grootendorst, 1987)",
"ref_id": "BIBREF43"
},
{
"start": 735,
"end": 756,
"text": "(Boudry et al., 2015)",
"ref_id": "BIBREF5"
},
{
"start": 1158,
"end": 1172,
"text": "Sahlane (2012)",
"ref_id": "BIBREF34"
},
{
"start": 1314,
"end": 1326,
"text": "Wijze (2002)",
"ref_id": "BIBREF8"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "This paper investigates the research gap at three levels of increasing discourse complexity: ad hominem in isolation, direct ad hominem without dialogical exchange, and ad hominem in large inter-personal discourse context. We asked the following research questions. First, what qualitative and quantative properties do ad hominem arguments have in Web debates and how does that reflect the common theoretical view (RQ1)? Second, how much of the debate context do we need for recognizing ad hominem by humans and machine learning systems (RQ2)? And finally, what are the actual triggers of ad hominem arguments and can we predict whether the discussion is going to end up with one (RQ3)?",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "We tackle these questions by leveraging Webbased argumentation data (Change my View on Reddit), performing several large-scale annotation studies, and creating a new dataset. We experiment with various neural architectures and ex-Godwin's_law), if a discussion goes on long enough, sooner or later someone will compare someone or something to Adolf Hitler. trapolate the trained models to validate our working hypotheses. Furthermore, we propose a list of potential linguistic and rhetorical triggers of ad hominem based on interpreting parameters of trained neural models. 2 This article thus presents the first NLP work on multi-faceted ad hominem fallacies in genuine dialogical argumentation. We also release the data and the source code to the research community. 3",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "The prevalent view on argumentation emphasizes its pragmatic goals, such as persuasion and groupbased deliberation (van Eemeren et al., 2014) , although numerous works have dealt with argument as product, that is, treating a single argument and its properties in isolation (Toulmin, 1958; ). Yet the social role of argumentation and its alleged responsibility for the very skill of human reasoning explained from the evolutionary perspective (Mercier and Sperber, 2017) provide convincing reasons to treat argumentation as an inherently dialogical tool. The observation that some arguments are in fact 'deceptions in disguise' was made already by Aristotle (Aristotle and Kennedy (translator), 1991), for which the term fallacy has been adopted. Leaving the controversial typology of fallacies aside (Hamblin, 1970; van Eemeren and Grootendorst, 1987; Boudry et al., 2015) , the ad hominem argument is addressed in most theories. Ad hominem argumentation relies on the strategy of attacking the opponent and some feature of the opponent's character instead of the counterarguments (Tindale, 2007) . With few exceptions, the following five sub-types of ad hominem are prevalent in the literature: abusive ad hominem (a pure attack on the character of the opponent), tu quoque ad hominem (essentially analogous to the \"He did it first\" defense of a three-year-old in a sandbox), circumstantial ad hominem (the \"practice what you preach\" attack and accusation of hypocrisy), bias ad hominem (the attacked opponent has a hidden agenda), and guilt by association (associating the opponent with somebody with a low credibility) (Schiappa and Nordin, 2 An attempt to address the plea for thinking about problems, cognitive science, and the details of human language (Manning, 2015).",
"cite_spans": [
{
"start": 115,
"end": 141,
"text": "(van Eemeren et al., 2014)",
"ref_id": "BIBREF42"
},
{
"start": 273,
"end": 288,
"text": "(Toulmin, 1958;",
"ref_id": "BIBREF41"
},
{
"start": 442,
"end": 469,
"text": "(Mercier and Sperber, 2017)",
"ref_id": "BIBREF31"
},
{
"start": 800,
"end": 815,
"text": "(Hamblin, 1970;",
"ref_id": null
},
{
"start": 816,
"end": 851,
"text": "van Eemeren and Grootendorst, 1987;",
"ref_id": "BIBREF43"
},
{
"start": 852,
"end": 872,
"text": "Boudry et al., 2015)",
"ref_id": "BIBREF5"
},
{
"start": 1081,
"end": 1096,
"text": "(Tindale, 2007)",
"ref_id": "BIBREF40"
},
{
"start": 1622,
"end": 1643,
"text": "(Schiappa and Nordin,",
"ref_id": null
},
{
"start": 1644,
"end": 1645,
"text": "2",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Theoretical background and related work",
"sec_num": "2"
},
{
"text": "3 https://github.com/UKPLab/ naacl2018-before-name-calling-habernal-et-al 2013; Macagno, 2013; Walton, 2007; Hansen, 2017; Woods, 2008) . We omit examples here as these provided in theoretical works or textbooks are usually artificial, as already criticized by (de Wijze, 2002) or (Boudry et al., 2015) .",
"cite_spans": [
{
"start": 74,
"end": 79,
"text": "2013;",
"ref_id": "BIBREF25"
},
{
"start": 80,
"end": 94,
"text": "Macagno, 2013;",
"ref_id": "BIBREF25"
},
{
"start": 95,
"end": 108,
"text": "Walton, 2007;",
"ref_id": "BIBREF47"
},
{
"start": 109,
"end": 122,
"text": "Hansen, 2017;",
"ref_id": null
},
{
"start": 123,
"end": 135,
"text": "Woods, 2008)",
"ref_id": "BIBREF49"
},
{
"start": 261,
"end": 277,
"text": "(de Wijze, 2002)",
"ref_id": "BIBREF8"
},
{
"start": 281,
"end": 302,
"text": "(Boudry et al., 2015)",
"ref_id": "BIBREF5"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Theoretical background and related work",
"sec_num": "2"
},
{
"text": "The topic of fallacies, which might be considered as sub-topic of argumentation quality, has recently been investigated also in the NLP field. Existing works are, however, limited to the monological view (Wachsmuth et al., 2017; Habernal and Gurevych, 2016b,a; Stab and Gurevych, 2017) or they focus primarily on learning fallacy recognition by humans (Habernal et al., , 2018a . Another related NLP sub-field includes abusive language and personal attacks in general. Wulczyn et al. (2017) investigated whether or not Wikipedia talk page comments are personal attacks and annotated 38k instances resulting in a highly skewed distribution (only 0.9% were actual attacks). Regarding the participants' perspective, Jain et al. (2014) examined principal roles in 80 discussions from the Wikipedia: Article for Deletion pages (focusing on stubbornness or ignoredness, among others) and found several typical roles, including 'rebels', 'voices', or 'idiots'. In contrast to our data under investigation (Change My View debates), Wikipedia talk pages do not adhere to strict argumentation rules with manual moderation and have a different pragmatic purpose.",
"cite_spans": [
{
"start": 204,
"end": 228,
"text": "(Wachsmuth et al., 2017;",
"ref_id": "BIBREF46"
},
{
"start": 229,
"end": 260,
"text": "Habernal and Gurevych, 2016b,a;",
"ref_id": null
},
{
"start": 261,
"end": 285,
"text": "Stab and Gurevych, 2017)",
"ref_id": "BIBREF38"
},
{
"start": 352,
"end": 377,
"text": "(Habernal et al., , 2018a",
"ref_id": "BIBREF16"
},
{
"start": 469,
"end": 490,
"text": "Wulczyn et al. (2017)",
"ref_id": "BIBREF51"
},
{
"start": 713,
"end": 731,
"text": "Jain et al. (2014)",
"ref_id": "BIBREF21"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Theoretical background and related work",
"sec_num": "2"
},
{
"text": "Reddit as a source platform has also been used in other relevant works. Saleem et al. (2016) detected hateful speech on Reddit by exploiting particular sub-communities to automatically obtain training data. Wang et al. (2016) experimented with an unsupervised neural model to cluster social roles on sub-reddits dedicated to computer games. Zhang et al. (2017) proposed a set of nine comment-level dialogue act categories and annotated 9k threads with 100k comments and built a CRF classifier for dialogue act labeling. Unlike these works which were not related to argumentation, Tan et al. (2016) examined persuasion strategies on Change My View using word overlap features. In contrast to our work, they focused solely on the successful strategies with delta-awarded posts. Using the same dataset, Musi (2017) recently studied concession in argumentation.",
"cite_spans": [
{
"start": 207,
"end": 225,
"text": "Wang et al. (2016)",
"ref_id": "BIBREF48"
},
{
"start": 341,
"end": 360,
"text": "Zhang et al. (2017)",
"ref_id": "BIBREF52"
},
{
"start": 580,
"end": 597,
"text": "Tan et al. (2016)",
"ref_id": "BIBREF39"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Theoretical background and related work",
"sec_num": "2"
},
{
"text": "Change My View (CMV) is an online 'place to post an opinion you accept [...] in an effort to un-derstand other perspectives on the issue', in other words an online platform for 'good-faith' argumentation hosted on Reddit. 4 A user posts a submission (also called original post(er); OP) and other participants provide arguments to change the OP's view, forming a typical tree-form Web discussion. A special feature of CMV is that the OP acknowledges convincing arguments by giving a delta point (\u2206). Unlike the vast majority of internet discussion forums, CMV enforces obeying strict rules (such as no 'low effort' posts, or accusing of being unwilling to change view) whose violation results into deleting the comment by moderators. These formal requirements of an ideal debate with the notion of violating rules correspond to incorrect moves in critical discussion in the normative pragma-dialectic theory (van Eemeren and Grootendorst, 1987) . Thus, violating the rule of 'not being rude or hostile' is equivalent to committing ad hominem fallacy. For our experiments, we scraped, in cooperation with Reddit, the complete CMV including the content of the deleted comments so we could fully reconstruct the fallacious discussions, relying on the rule violation labels provided by the moderators. The dataset contains \u2248 2M posts in 32k submissions, forming 780k unique threads.",
"cite_spans": [
{
"start": 71,
"end": 76,
"text": "[...]",
"ref_id": null
},
{
"start": 222,
"end": 223,
"text": "4",
"ref_id": null
},
{
"start": 907,
"end": 943,
"text": "(van Eemeren and Grootendorst, 1987)",
"ref_id": "BIBREF43"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Data",
"sec_num": "3"
},
{
"text": "We will set up the stage for further experiments by providing several quantitative statistics we performed on the dataset. Only 0.2% posts in CMV are ad hominem arguments. This contrasts with a typical online discussion: Coe et al. (2014) found 19.5% of comments under online news articles to be incivil. Most threads contain only a single ad hominem argument (3,396 threads; there are 3,866 ad hominem arguments in total in CMV); only 35 threads contain more than three ad hominem arguments. In 48.6% of threads containing a single ad hominem, the ad hominem argument is the very last comment. This corresponds to the popular belief that if one is out of arguments, they start attacking and the discussion is over. This trend is also shown in Figure 1 which displays the relative position of the first ad hominem argument in a thread. Replying to ad hominem with another ad hominem happens only in 15% of the cases; this speaks for the attempts of CMV participants to keep up with the standards of a rather rational discussion.",
"cite_spans": [
{
"start": 221,
"end": 238,
"text": "Coe et al. (2014)",
"ref_id": "BIBREF7"
}
],
"ref_spans": [
{
"start": 744,
"end": 752,
"text": "Figure 1",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Data",
"sec_num": "3"
},
{
"text": "Regarding ad hominem authors, about 66% of 4 https://www.reddit.com/r/changemyview/ them start attacking 'out of blue', without any previous interaction in the thread. On the other hand, 11% ad hominem authors write at least one 'normal' argument in the thread (we found one outlier who committed ad hominem after writing 57 normal arguments in the thread). Only in 20% cases, the ad hominem thread is an interplay between the original poster and another participant. It means that there are usually more people involved in an ad hominem thread. Unfortunately, sometimes the OP herself also commits ad hominem (12%). We also investigated the relation between the presence of ad hominem arguments and the submission topic. While most submissions are accompanied by only one or two ad hominem arguments (75% of submissions), there are also extremes with over 50 ad hominem arguments. Manual analysis revealed that these extremes deal with religion, sexuality/gender, U.S. politics (mostly Trump), racism in the U.S., and veganism. We will elaborate on that later in Section 4.2.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Data",
"sec_num": "3"
},
{
"text": "The experimental part is divided into three parts according to the increasing level of discourse complexity. We first experiment with ad hominem in isolation in section 4.1, then with direct ad hominem replies to original posts without dialogical exchange in section 4.2, and finally with ad hominem in a larger inter-personal discourse context in section 4.3.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Experiments",
"sec_num": "4"
},
{
"text": "The first experimental set-up examines ad hominem arguments in Change my view regardless of its dialogical context.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Ad hominem without context in CMV",
"sec_num": "4.1"
},
{
"text": "Ad hominem arguments labeled by the CMV moderators come with no warranty. To verify their reliability, we conducted the following annotation studies. First, we needed to estimate parameters of crowdsourcing and its reliability. We sampled 100 random arguments from CMV without context: positive candidates were the reported ad hominem arguments, whereas negative candidates were sampled from comments that either violate other argumentation rules or have a delta label. To ensure the maximal content similarity of these two groups, for each positive instance the semantically closest negative instance was selected. 5 We then experimented with different numbers of Amazon Mechanical Turk workers and various thresholds of the MACE gold label estimator (Hovy et al., 2013) ; comparing two groups of six workers each and 0.9 threshold yielded almost perfect interannotator agreement (0.79 Cohen's \u03ba). We then used this setting (six workers, 0.9 MACE threshold) to annotate another 452 random arguments sampled in the same way as above.",
"cite_spans": [
{
"start": 616,
"end": 617,
"text": "5",
"ref_id": null
},
{
"start": 752,
"end": 771,
"text": "(Hovy et al., 2013)",
"ref_id": "BIBREF20"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Data verification",
"sec_num": "4.1.1"
},
{
"text": "Crowdsourced 'gold' labels were then compared to the original CMV labels (balanced binary task: positive instances (ad hominem) and negative instances) reaching accuracy of 0.878. This means that the ad hominem labels from CMV moderators are quite reliable. Manual error analysis of disagreements revealed 11 missing ad hominem labels. These were not spotted by the moderators but were annotated as such by crowd workers.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Data verification",
"sec_num": "4.1.1"
},
{
"text": "We sampled a larger balanced set of positive instances (ad hominem) and negative instances using the same methodology as in section 4.1.1, resulting in 7,242 instances, and casted the task of recognition of ad hominem arguments as a binary supervised task. We trained two neural classifiers, namely a 2-stacked bi-directional LSTM network (Graves and Schmidhuber, 2005) , and a convolutional network (Kim, 2014) , and evaluated them using 10-fold cross validation. Throughout the paper we use pre-trained word2vec word embeddings (Mikolov et al., 2013 Table 1 : Prediction of ad hominem arguments rameters are described in the source codes (link provided in section 1). As results in Table 1 show, the task of recognizing ad hominem arguments is feasible and almost achieves the human upper bound performance.",
"cite_spans": [
{
"start": 339,
"end": 369,
"text": "(Graves and Schmidhuber, 2005)",
"ref_id": "BIBREF9"
},
{
"start": 400,
"end": 411,
"text": "(Kim, 2014)",
"ref_id": "BIBREF22"
},
{
"start": 530,
"end": 551,
"text": "(Mikolov et al., 2013",
"ref_id": "BIBREF32"
}
],
"ref_spans": [
{
"start": 552,
"end": 559,
"text": "Table 1",
"ref_id": null
},
{
"start": 684,
"end": 691,
"text": "Table 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Recognizing ad hominem arguments",
"sec_num": "4.1.2"
},
{
"text": "While binary classification of ad hominem as presented above might be sufficient for the purpose of red-flagging arguments, theories provide us with a much finer granularity (recall the typology in section 2). To validate whether this typology is empirically relevant, we executed an annotation experiment to classify ad hominem arguments into the provided five types (plus 'other' if none applies). We sampled 200 ad hominem arguments from threads in which interlocution happens only between two persons and which end up with ad hominem. The Mechanical Turk workers were shown this last ad hominem argument as well as the preceding one. Each instance was annotated by 16 workers to achieve a stable distribution of labels as suggested by Aroyo and Welty (2015) . While 41% arguments were categorized as abusive, other categories (tu quoque, circumstantial, and guilt by association) were found to be rather ambiguous with very subtle differences.",
"cite_spans": [
{
"start": 739,
"end": 761,
"text": "Aroyo and Welty (2015)",
"ref_id": "BIBREF1"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Typology of ad hominem",
"sec_num": "4.1.3"
},
{
"text": "In particular, we observed a very low percentage agreement on these categories and a label distribution spiked around two or more categories. After a manual inspection we concluded that (1) the theoretical typology does not account for longer ad hominem arguments that mix up different attacks and that (2) there are actual phenomena in ad hominem arguments not covered by theoretical categories. These observations reflect those of Macagno (2013, p. 399) about ad hominem moves as multifaceted strategies. We thus propose a list of phenomena typical to ad hominem arguments in CMV based on our empirical study. For this purpose, we follow up with another annotation experiment on 400 arguments, with seven workers per instance. 6 The goal was to annotate a text span which made the argument an ad hominem; a single argument could contain several spans. We estimated the gold spans using MACE and performed a manual post-analysis by designing a typology of causes of ad hominem together with their frequency of occurrence. The results and examples are summarized in Table 2 .",
"cite_spans": [
{
"start": 729,
"end": 730,
"text": "6",
"ref_id": null
}
],
"ref_spans": [
{
"start": 1066,
"end": 1073,
"text": "Table 2",
"ref_id": "TABREF1"
}
],
"eq_spans": [],
"section": "Typology of ad hominem",
"sec_num": "4.1.3"
},
{
"text": "The data verification annotation study (section 4.1.1) has two direct consequences. First, the high \u03ba score (0.79) answers RQ2: for recognizing ad hominem argument, no previous context is necessary. Second, we still found 5% overlooked ad hominem arguments in CMV thus a moderationfacilitating tool might come handy; this can be served by the well-performing CNN model (0.810 accuracy; section 4.1.2).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.1.4"
},
{
"text": "The existing theoretical typology of ad hominem arguments, as presented for example in most textbooks, provides only a very simplified view. On the one hand, some of the categories which we found in the empirical labeling study (section 4.1.3) do map to their corresponding counterparts (such as the vulgar insults). On the other hand, some ad hominem insults typical to online argumentation (illiteracy insults, condescension) are not present in studies on ad hominem. Hence, we claim that any potential typology of ad hominem arguments should be multinomial rather than categorical, as we found multiple different spans in a single argument.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.1.4"
},
{
"text": "In the following section, we increase the complexity of the studied discourse by taking the original post into account.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Triggers of first level ad hominem",
"sec_num": "4.2"
},
{
"text": "We already showed that ad hominem arguments are usually preceded by a discussion between the interlocutors. However, 897 submissions (original posts; OPs) have at least one intermediate ad hominem (in other words, the original post is directly attacked). We were thus interested in what triggers these first-level ad hominem arguments. We hypothesize two causes: (1) the controversy of the OP, similarly to some related works on news comments (Coe et al., 2014) and (2) the reasonableness of the OP (whether the topic is reasonable to argue about). We model both features on a three-point scale, namely controversy: 1 = 'not re-ally controversial', 2 = 'somehow controversial', 3 = 'very controversial' and reasonableness: 1 = 'quite stupid', 2 = 'neutral', 3 = 'quite reasonable'. 7 We sampled two groups of OPs: those which had some ad hominem arguments in any of its threads but no delta (ad hominem group) and those without ad hominem but some deltas (Delta group). In total, 1,800 balanced instances were annotated by five workers and the resulting value was averaged for each item. 8 Statistical analysis of the annotated 1,800 OPs revealed that ad hominem arguments are associated with more controversial OPs (mean controversy 1.23) while delta-awarded arguments with less controversial OPs (mean controversy 1.06; K-S test; 9 statistics 0.13, P-value: 7.97 \u00d7 10 \u22127 ). On the other hand, reasonableness does not seem to play such a role. The difference between ad hominem in reasonable OPs (mean 1.20) and delta in reasonable OPs (mean 1.11) is not that statistically strong; (K-S test statistics: 0.07, P-value: 0.02).",
"cite_spans": [
{
"start": 443,
"end": 461,
"text": "(Coe et al., 2014)",
"ref_id": "BIBREF7"
},
{
"start": 782,
"end": 783,
"text": "7",
"ref_id": null
},
{
"start": 1088,
"end": 1089,
"text": "8",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Annotation study",
"sec_num": "4.2.1"
},
{
"text": "We further built a regression model for predicting controversy and reasonableness of the OPs. Along with Bi-LSTM and CNN networks (same models as in 4.1.2) we also developed a neural model that integrates CNN with topic distribution (CNN+LDA). The motivation for a topicincorporating model was based on our earlier observations presented in section 3. In particular, we trained an LDA topic model (k = 50) (Blei et al., 2003) on the heldout OPs and during training/testing, we merged the estimated topic distribution vector with the output layer after convolution and pooling. We performed 10-fold cross validation on the 1,800 annotated OPs and got reasonable performance for controversy prediction (\u03c1 7 Examples of not really controversial: \"I Don't Think Monty Python is Funny\", very controversial: \"Blacks are generally intellectual inferior to the other major races\", quite stupid: \"Burritos are better than sandwiches\", and quite reasonable: \"Nations whose leadership is based upon religion are fundamentally backwards\".",
"cite_spans": [
{
"start": 406,
"end": 425,
"text": "(Blei et al., 2003)",
"ref_id": "BIBREF4"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Regression model for predicting controversy and reasonableness",
"sec_num": "4.2.2"
},
{
"text": "8 A pilot crowd sourcing annotation with 5 + 5 workers showed a fair reliability for controversy (Spearman's \u03c1 0.804) and medium reliability for reasonableness (Spearman's \u03c1 0.646).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Regression model for predicting controversy and reasonableness",
"sec_num": "4.2.2"
},
{
"text": "9 Kolmogorov-Smirnov (K-S) test is a non-parametric test without any assumptions about the underlying probability distribution. Type (%) Example spans Vulgar insult 31.3 \"Your just an asshole\", \"you dumb fuck\", etc. Illiteracy insult 13.0 \"Reading comprehension is your friend\", \"If you can't grasp the concept, I can't help you\" Condescension 6.5 \"little buddy\", \"sir\", \"boy\", \"Again, how old are you?\" Ridiculing and sarcasm 6.5 \"Thank you so much for all your pretentious explanations\", \"Can you also use Google?\" 'Idiot'-insults 6.5 \"Ever have discussions with narcissistic idiots on the internet? They are so tiring\" Accusation of stupidity 4.3 \"You have no capability to understand why\", \"You're obviously just Nobody with enough brains to operate a computer could possibly believe something this stupid\" Lack of argumentation skills 4.3 \"You're making the claims, it's your job to prove it. Don't you know how debating works?\", \"You're trash at debating.\" Accusation of trolling 3.9 \"You're just a dishonest troll\", \"You're using troll tactics\" Accusation of ignorance 3.5 \"Please dont waste peoples time pretending to know what you're talking about\", \"Do you even know what you're saying?\" \"You didn't read what I wrote\" 3.0 \"Read what I posted before acting like a pompous ass\", \"Did you even read this?\" \"What you say is idiotic\" 2.6 \"To say that people intrinsically understand portion size is idiotic.\", \"Your second paragraph is fairly idiotic\" Accusation of lying 2.6 \"Possible lie any harder?\", \"You are just a liar.\" \"You don't face the facts and ignore the obvious\" 1.7 \"Willful ignorance is not something I can combat\", \"How can you explain that? You can't because it will hurt your feelings to face reality\" Accusation of ad hominem or other fallacies 1.7 \"You started with a fallacy and then deflected.\", \"You still refuse to acknowledge that you used a strawman argument against me\" Other 8.3 \"Wow. Someone sounds like a bit of an anti-semite\", \"You're too dishonest to actually quote the verse because you know it's bullshit\" 0.569) and medium performance for reasonableness prediction (\u03c1 0.385), respectively; both using the CNN+LDA model (see Table 3 ).",
"cite_spans": [],
"ref_spans": [
{
"start": 2167,
"end": 2174,
"text": "Table 3",
"ref_id": "TABREF2"
}
],
"eq_spans": [],
"section": "Regression model for predicting controversy and reasonableness",
"sec_num": "4.2.2"
},
{
"text": "We then used the trained model and extrapolated on all held-out OPs (1,267 ad hominem and 10,861 delta OPs, respectively). The analysis again showed that ad hominem arguments tend to be found under more controversial OPs whereas delta arguments in the less controversial ones (K-S test statistics: 0.14, P-value: 1 \u00d7 10 \u221218 ). For reasonableness, the rather low performance of the predictor does not allow us draw any conclusions on the extrapolated data.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Regression model for predicting controversy and reasonableness",
"sec_num": "4.2.2"
},
{
"text": "Controversy of the original post is immediately heating up the debate participants and correlates with a higher number of direct ad hominem responses. This corresponds to observations made in comments in newswire where 'weightier' topics tended to stir incivility (Coe et al., 2014) . On the other hand, 'stupidity' (or 'reasonableness') does not seem to play any significant role. The CNN+LDA model for predicting controversy (\u03c1 0.569) might come handy for signaling potentially 'heated' discussions.",
"cite_spans": [
{
"start": 264,
"end": 282,
"text": "(Coe et al., 2014)",
"ref_id": "BIBREF7"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.2.3"
},
{
"text": "In this section, we focus on the dialogical aspect of CMV debates and dynamics of ad hominem fallacies. Although ad hominem arguments appear in many forms (Section 4.1.3), we treat all ad hominem arguments equal in the following experiments.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Before calling names",
"sec_num": "4.3"
},
{
"text": "So far we explored what makes an ad hominem argument and whether debated topic influences the number of intermediate attacks. However, possible causes of the argumentative dynamics that ends up with an ad hominem argument remain an open question, which has been addressed in neither argumentation theory nor in cognitive psychology, to the best of our knowledge. We thus cast an explanation of triggers and dynamics of ad hominem discussions as a supervised machine learning problem and draw theoretical insights by a retrospective interpretation of the learned models.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Data sampling",
"sec_num": "4.3.1"
},
{
"text": "We sample positive instances by taking three contextual arguments preceding the ad hominem argument from threads which are an interplay between two persons. Negative samples are drawn similarly from threads in which the argument is awarded with \u2206 as shown in Figure 2 . 10 Each instance consists of the three concatenated arguments delimited by a special OOV token. This resulted in 2,582 balanced training instances.",
"cite_spans": [],
"ref_spans": [
{
"start": 259,
"end": 267,
"text": "Figure 2",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "Data sampling",
"sec_num": "4.3.1"
},
{
"text": "The alleged lack of interpretability of neural networks has motivated several lines of approaches, such as layer-wise relevance propagation (Arras et al., 2017) or representation erasure (Li et al., 2016) , both on sentiment analysis. As our task at hand deals with multi-party discourse that presumably involves temporal relations important for the learned representation, we opted for a state-of-theart self-attentive LSTM model. In particular, we re-implemented the Structured Self-Attentive Embedding Neural Network (SSAE-NN) (Lin et al., 2017) which learns an embedding matrix representation of the input using attention weights. To make the attention even more interpretable, we replaced the final non-linear MLP layers with a single linear classifier (softmax). By summing over one dimension of the attention embedding matrix, each word from the input sequence gets associated with a single attention weight that gives us insights into the classifier's 'features' (still indirectly, as the true representation is a matrix; see the original paper). 11 The learning objective is to recognize whether the thread ends up in an ad hominem argument or a delta point. We trained the model in 10-fold cross-validation and although our goal is not to achieve the best performance but rather to gain insight, we also tested a CNN model (accuracy 0.7095) which performed slightly worse than the SSAE-NN model (accuracy 0.7208).",
"cite_spans": [
{
"start": 140,
"end": 160,
"text": "(Arras et al., 2017)",
"ref_id": "BIBREF3"
},
{
"start": 187,
"end": 204,
"text": "(Li et al., 2016)",
"ref_id": "BIBREF23"
},
{
"start": 530,
"end": 548,
"text": "(Lin et al., 2017)",
"ref_id": "BIBREF24"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Neural models",
"sec_num": "4.3.2"
},
{
"text": "During testing the model, we projected attention weights to the original texts as heat maps and manually analyzed 191 true positives (ad hominem threads recognized correctly), as well as 77 false positives (ad hominem threads misclassified as delta) and 84 false negatives (delta as ad hominem), in total about 120k tokens. The full output is available in the supplementary materials, we use IDs as a reference in the following text.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.3.3"
},
{
"text": "In the following analysis, we solely relied on the weights of words or phrases learned by the attention model, see an example in Figure 3 . Based on our observations, we summarize several linguistic and argumentative phenomena with examples most likely responsible for ad hominem threads in Table 4 .",
"cite_spans": [],
"ref_spans": [
{
"start": 129,
"end": 137,
"text": "Figure 3",
"ref_id": null
},
{
"start": 291,
"end": 298,
"text": "Table 4",
"ref_id": null
}
],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.3.3"
},
{
"text": "The identified phenomena have few interesting properties in common. First, they all are topic-independent rhetorical devices (except for the loaded keywords at the bottom). Second, many of them deal with meta-level argumentation, i.e., arguing about argumentation (such as missing support or fallacy accusations). Third, most of them do not contain profanity (in contrast to the actual ad hominem arguments of which a third are vulgar insults; cf. Table 2 ). And finally, all of them should be easy to avoid.",
"cite_spans": [],
"ref_spans": [
{
"start": 448,
"end": 455,
"text": "Table 2",
"ref_id": "TABREF1"
}
],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.3.3"
},
{
"text": "Misleading 'features' False positives revealed properties that misled the network to classify delta threads as ad hominem threads.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.3.3"
},
{
"text": "\u2022 These include topic words (such as racism, blacks, slave, abortion) which reflects the implicit bias in the data.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.3.3"
},
{
"text": "\u2022 Actual interest mixed with indifference in Figure 3 : An example of reconstructed word weight heat map extracted from the attention matrix for a thread which ends up in ad hominem; three previous arguments are shown (see Figure 2 for sampling details).",
"cite_spans": [],
"ref_spans": [
{
"start": 45,
"end": 53,
"text": "Figure 3",
"ref_id": null
},
{
"start": 223,
"end": 231,
"text": "Figure 2",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.3.3"
},
{
"text": "Phenomena Examples Introducing vulgar intensifiers or interrogatives 388(-1) \"Where the fuck is your idea to ...\", 712(-2) \"no shortage of fucking gun\", 1277(-1) \"This is fucking CMV\", 428(-2) \"I'm fucking trans!\", 2018(-2) \"an arrogant fuck\", 1277(-2) \"What the fuck are you smoking?\" Direct imperatives 1003(-3) \"You should get more mad about it\", 857(-2) \"You need to do a lot better than that.\", 233(-2) \"So now delete your post\", 749(-1) \"google this fact as well\", 1276(-1) \"Just look back at the reasons why ...\" Accusing of believing in or using propaganda 522(-1) \"It's right wing propaganda?\", 1003(-1) \"If you're not outraged, you're not paying attention to our propaganda that says the opposite of literally thousands of published research articles\" Accusation of fallacies or bad argumentation practice 238(-3) \"your snide remarks and poor argumentation skills\", 1117(-2) \"you're circle jerking A vs. B\", 263(-3) \"You're grasping at straws\", 78(-3) \"You sure like changing words and statements to make your argument appear more cogent, don't you?\", 210(-1) \"Your arguments range from ... to ...\", 1085(-3) \"It's only a fallacy\", 144(-1) \"You haven't presented any evidence or argument that disagrees with anything I've said.\", 587(-3) \"If only you wouldn't rely on fallacious arguments\" Reinterpreting opponent's positions 982(-1) \"The fact that you obviously think ... reveals ...\", 982(-2) \"What makes you think I see myself ... ?\", 1060(-3) \"That kind of thinking is ...\", 760(-1) \"If I'm understanding you correctly\", 405(-1) \"... deluded yourself into believing factually incorrect things\" 587(-1) \"You're making an assumption on what I believe, then attacking your assumption of what my belief is without me even telling you anything.\" Accusation of not reading the other party's arguments 586(-1) \"... me without even reading my ...\", 240(-1) \"You are just reading it wrong.\", 310(-1) \"Oh, you're not actually reading my ...\"",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.3.3"
},
{
"text": "Pointing at missing or unsupported evidence and facts 1238(-2) \"unsupported bullshit as before\", 1121(-3) \"you can't chose your facts\", 931(-1) \"If that's your only argument ...\", 486(-2) \"unsubstantiated statement\", 486(-1) \"unsupported claims\", 71(-2) \"factually correct\", 915(-1) \"But for the sake of argument, your points are pitifully ..\", 388(-3) \"Please provide statistics ... It's silly to debate statistics without actual numbers.\" UPPERCASE 1238(-3) \"NO ONE CLAIMED THAT ... ARE NOT ... AGAINST ...\" Sarcasm 78(-2) \"But I'm sure you know best\", 310(-1) \"Have a nice day.\", 1276(-1) \"Good luck with that\" Mentions of trolling 701(-2) \"Then you are giving trolls the victory then?\" Loaded keywords Nazi, rape, racist Table 4 : Phenomena resulting into ad hominem learned by the SSAE-NN model. The first number is the instance ID (available in the supplementary material), the minus number in parentheses is the position of the argument before the ad hominem.",
"cite_spans": [],
"ref_spans": [
{
"start": 725,
"end": 732,
"text": "Table 4",
"ref_id": null
}
],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.3.3"
},
{
"text": "sarcasm is also problematic (185(-2) \"That's a very interesting ...\").",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.3.3"
},
{
"text": "\u2022 Another problematic phenomena is also expressed disagreement (678(-2) \"overheated rhetoric\", 203(-2) \"But I suppose this argument is ...\", 230(-2) \"But I don't think it's quite ...\", 938(-1) \"I disagree too, however ...\").",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.3.3"
},
{
"text": "False negatives were caused basically by presence of many 'informative' content words (980 unemployment, quarterly publication, inflation data, 474 actual publications, this experiment, biological ailments, medical doctorate, 1214 graduate degree, education, health insurance) and misinterpreted sarcasm (285(-1) \"Also this is a cute analogy\").",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and interpretation",
"sec_num": "4.3.3"
},
{
"text": "In this article, we investigated ad hominem argumentation on three levels of discourse complexity. We looked into qualitative and quantative properties of ad hominem arguments, crowdsourced labeled data, experimented with models for prediction (0.810 accuracy; 4.1.2), and proposed an updated typology of ad hominem properties (4.1.3). We then looked into the dynamics of argumentation to examine the relation between the quality of the original post and immediate ad hominem arguments (4.2). Finally, we exploited the learned representation of Self-Attentive Embedding Neural Network to search for features triggering ad hominem in one-to-one discussions. We found several categories of rhetorical devices as well as misleading features (4.3.3).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "5"
},
{
"text": "There are several points that deserve further investigation.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "5"
},
{
"text": "First, we have ignored metainformation of the debate participants, such as their overall activity (i.e., whether they are spammers or trolls). Second, the proposed typology of ad hominem causes has not yet been post-verified empirically. Third, we expect that personality traits of the participants (BIG5) may also play a significant role in the argumentative exchange. We leave these points for future work.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "5"
},
{
"text": "We believe that our findings will help gain better understanding of, and hopefully keep restraining from, ad hominem fallacies in good-faith discussions.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "5"
},
{
"text": "Similarity was computed using a cosine similarity of average embedding vectors multiplied by the argument length difference to minimize length-related artifacts. The sample was balanced with roughly 50% positive and 50% negative instances.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Here we decided on seven workers per item by relying on other span annotation experiments done in a similar setup(Habernal et al., 2018b).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "To ensure as much content similarity as possible, we used the same similarity sampling as in section 4.1.1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "We also experimented with regularizing the attention matrix as the authors proposed, but it resulted in worse performance.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
}
],
"back_matter": [
{
"text": "This work has been supported by the ArguAna Project GU 798/20-1 (DFG), and by the DFGfunded research training group \"Adaptive Preparation of Information form Heterogeneous Sources\" (AIPHES, GRK 1994/1).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Acknowledgments",
"sec_num": null
}
],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "On Rhetoric: A Theory of Civil Discourse",
"authors": [
{
"first": "Aristotle",
"middle": [],
"last": "",
"suffix": ""
},
{
"first": "George",
"middle": [],
"last": "Kennedy",
"suffix": ""
}
],
"year": 1991,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Aristotle and George Kennedy (translator). 1991. On Rhetoric: A Theory of Civil Discourse. Oxford Uni- versity Press, USA.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "Truth is a lie: Crowd truth and the seven myths of human annotation",
"authors": [
{
"first": "Lora",
"middle": [],
"last": "Aroyo",
"suffix": ""
},
{
"first": "Chris",
"middle": [],
"last": "Welty",
"suffix": ""
}
],
"year": 2015,
"venue": "AI Magazine",
"volume": "36",
"issue": "1",
"pages": "15--24",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Lora Aroyo and Chris Welty. 2015. Truth is a lie: Crowd truth and the seven myths of human annotation. AI Magazine 36(1):15-24.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "Explaining Recurrent Neural Network Predictions in Sentiment Analysis",
"authors": [
{
"first": "Leila",
"middle": [],
"last": "Arras",
"suffix": ""
},
{
"first": "Gr\u00e9goire",
"middle": [],
"last": "Montavon",
"suffix": ""
},
{
"first": "Klaus-Robert",
"middle": [],
"last": "M\u00fcller",
"suffix": ""
},
{
"first": "Wojciech",
"middle": [],
"last": "Samek",
"suffix": ""
}
],
"year": 2017,
"venue": "Proceedings of the 8th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis",
"volume": "",
"issue": "",
"pages": "159--168",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Leila Arras, Gr\u00e9goire Montavon, Klaus-Robert M\u00fcller, and Wojciech Samek. 2017. Explaining Recurrent Neural Network Predictions in Sentiment Analysis. In Proceedings of the 8th Workshop on Computa- tional Approaches to Subjectivity, Sentiment and So- cial Media Analysis. Association for Computational Linguistics, Copenhagen, Denmark, pages 159-168. http://www.aclweb.org/anthology/W17-5221.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "Latent dirichlet allocation",
"authors": [
{
"first": "David",
"middle": [
"M"
],
"last": "Blei",
"suffix": ""
},
{
"first": "Andrew",
"middle": [
"Y"
],
"last": "Ng",
"suffix": ""
},
{
"first": "Michael",
"middle": [
"I"
],
"last": "Jordan",
"suffix": ""
}
],
"year": 2003,
"venue": "Journal of Machine Learning Research",
"volume": "3",
"issue": "",
"pages": "993--1022",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "David M. Blei, Andrew Y. Ng, and Michael I. Jor- dan. 2003. Latent dirichlet allocation. Jour- nal of Machine Learning Research 3:993-1022. http://dl.acm.org/citation.cfm?id=944919.944937.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "The Fake, the Flimsy, and the Fallacious: Demarcating Arguments in Real Life",
"authors": [
{
"first": "Maarten",
"middle": [],
"last": "Boudry",
"suffix": ""
},
{
"first": "Fabio",
"middle": [],
"last": "Paglieri",
"suffix": ""
},
{
"first": "Massimo",
"middle": [],
"last": "Pigliucci",
"suffix": ""
}
],
"year": 2015,
"venue": "Argumentation",
"volume": "29",
"issue": "4",
"pages": "431--456",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Maarten Boudry, Fabio Paglieri, and Massimo Pigliucci. 2015. The Fake, the Flimsy, and the Fallacious: Demarcating Arguments in Real Life. Argumentation 29(4):431-456.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "Online and Uncivil? Patterns and Determinants of Incivility in Newspaper Website Comments",
"authors": [
{
"first": "Kevin",
"middle": [],
"last": "Coe",
"suffix": ""
},
{
"first": "Kate",
"middle": [],
"last": "Kenski",
"suffix": ""
},
{
"first": "Stephen",
"middle": [
"A"
],
"last": "Rains",
"suffix": ""
}
],
"year": 2014,
"venue": "Journal of Communication",
"volume": "64",
"issue": "4",
"pages": "658--679",
"other_ids": {
"DOI": [
"10.1111/jcom.12104"
]
},
"num": null,
"urls": [],
"raw_text": "Kevin Coe, Kate Kenski, and Stephen A. Rains. 2014. Online and Uncivil? Patterns and Deter- minants of Incivility in Newspaper Website Com- ments. Journal of Communication 64(4):658-679. https://doi.org/10.1111/jcom.12104.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "Relevance and Character: Problems with Teaching the \"Ad Hominem",
"authors": [
{
"first": "Wijze",
"middle": [],
"last": "Stephen De",
"suffix": ""
}
],
"year": 2002,
"venue": "Fallacy. Educational Philosophy and Theory",
"volume": "35",
"issue": "1",
"pages": "31--56",
"other_ids": {
"DOI": [
"10.1111/1469-5812.00004"
]
},
"num": null,
"urls": [],
"raw_text": "Stephen de Wijze. 2002. Complexity, Relevance and Character: Problems with Teaching the \"Ad Hominem\" Fallacy. Educational Philosophy and Theory 35(1):31-56. https://doi.org/10.1111/1469- 5812.00004.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "Framewise phoneme classification with bidirectional LSTM and other neural network architectures",
"authors": [
{
"first": "Alex",
"middle": [],
"last": "Graves",
"suffix": ""
},
{
"first": "J\u00fcrgen",
"middle": [],
"last": "Schmidhuber",
"suffix": ""
}
],
"year": 2005,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Alex Graves and J\u00fcrgen Schmidhuber. 2005. Framewise phoneme classification with bidi- rectional LSTM and other neural network ar- chitectures.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "What makes a convincing argument? Empirical analysis and detecting attributes of convincingness in Web argumentation",
"authors": [
{
"first": "Ivan",
"middle": [],
"last": "Habernal",
"suffix": ""
},
{
"first": "Iryna",
"middle": [],
"last": "Gurevych",
"suffix": ""
}
],
"year": 2016,
"venue": "Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "1214--1223",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ivan Habernal and Iryna Gurevych. 2016a. What makes a convincing argument? Empirical anal- ysis and detecting attributes of convincingness in Web argumentation. In Proceedings of the 2016 Conference on Empirical Methods in Natu- ral Language Processing. Association for Computa- tional Linguistics, Austin, Texas, pages 1214-1223. http://aclweb.org/anthology/D16-1129.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "Which argument is more convincing? Analyzing and predicting convincingness of Web arguments using bidirectional LSTM",
"authors": [
{
"first": "Ivan",
"middle": [],
"last": "Habernal",
"suffix": ""
},
{
"first": "Iryna",
"middle": [],
"last": "Gurevych",
"suffix": ""
}
],
"year": 2016,
"venue": "Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics",
"volume": "1",
"issue": "",
"pages": "1589--1599",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ivan Habernal and Iryna Gurevych. 2016b. Which ar- gument is more convincing? Analyzing and predict- ing convincingness of Web arguments using bidirec- tional LSTM. In Proceedings of the 54th Annual Meeting of the Association for Computational Lin- guistics (Volume 1: Long Papers). Association for Computational Linguistics, Berlin, Germany, pages 1589-1599. http://www.aclweb.org/anthology/P16- 1150.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "Argumentation Mining in User-Generated Web Discourse",
"authors": [
{
"first": "Ivan",
"middle": [],
"last": "Habernal",
"suffix": ""
},
{
"first": "Iryna",
"middle": [],
"last": "Gurevych",
"suffix": ""
}
],
"year": 2017,
"venue": "Computational Linguistics",
"volume": "43",
"issue": "1",
"pages": "125--179",
"other_ids": {
"DOI": [
"10.1162/COLIa00276"
]
},
"num": null,
"urls": [],
"raw_text": "Ivan Habernal and Iryna Gurevych. 2017. Argu- mentation Mining in User-Generated Web Dis- course. Computational Linguistics 43(1):125-179. https://doi.org/10.1162/COLI a 00276.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Argotario: Computational Argumentation Meets Serious Games",
"authors": [
{
"first": "Ivan",
"middle": [],
"last": "Habernal",
"suffix": ""
},
{
"first": "Raffael",
"middle": [],
"last": "Hannemann",
"suffix": ""
},
{
"first": "Christian",
"middle": [],
"last": "Pollak",
"suffix": ""
},
{
"first": "Christopher",
"middle": [],
"last": "Klamm",
"suffix": ""
},
{
"first": "Patrick",
"middle": [],
"last": "Pauli",
"suffix": ""
},
{
"first": "Iryna",
"middle": [],
"last": "Gurevych",
"suffix": ""
}
],
"year": 2017,
"venue": "Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing: System Demonstrations",
"volume": "",
"issue": "",
"pages": "7--12",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ivan Habernal, Raffael Hannemann, Christian Pol- lak, Christopher Klamm, Patrick Pauli, and Iryna Gurevych. 2017. Argotario: Computational Ar- gumentation Meets Serious Games. In Pro- ceedings of the 2017 Conference on Empirical Methods in Natural Language Processing: Sys- tem Demonstrations. Association for Computational Linguistics, Copenhagen, Denmark, pages 7-12. http://www.aclweb.org/anthology/D17-2002.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "Adapting Serious Game for Fallacious Argumentation to German: Pitfalls, Insights, and Best Practices",
"authors": [
{
"first": "Ivan",
"middle": [],
"last": "Habernal",
"suffix": ""
},
{
"first": "Patrick",
"middle": [],
"last": "Pauli",
"suffix": ""
},
{
"first": "Iryna",
"middle": [],
"last": "Gurevych",
"suffix": ""
}
],
"year": 2018,
"venue": "Proceedings of the Eleventh International Conference on Language Resources and Evaluation (LREC 2018). European Language Resources Association (ELRA)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ivan Habernal, Patrick Pauli, and Iryna Gurevych. 2018a. Adapting Serious Game for Fallacious Ar- gumentation to German: Pitfalls, Insights, and Best Practices. In Proceedings of the Eleventh Interna- tional Conference on Language Resources and Eval- uation (LREC 2018). European Language Resources Association (ELRA), Miyazaki, Japan, page (to ap- pear).",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "The Argument Reasoning Comprehension Task: Identification and Reconstruction of Implicit Warrants",
"authors": [
{
"first": "Ivan",
"middle": [],
"last": "Habernal",
"suffix": ""
},
{
"first": "Henning",
"middle": [],
"last": "Wachsmuth",
"suffix": ""
},
{
"first": "Iryna",
"middle": [],
"last": "Gurevych",
"suffix": ""
},
{
"first": "Benno",
"middle": [],
"last": "Stein",
"suffix": ""
}
],
"year": 2018,
"venue": "Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ivan Habernal, Henning Wachsmuth, Iryna Gurevych, and Benno Stein. 2018b. The Argument Reason- ing Comprehension Task: Identification and Recon- struction of Implicit Warrants. In Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Hu- man Language Technologies. Association for Com- putational Linguistics, New Orleans, LA, page (to appear). https://arxiv.org/abs/1708.01425.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "Learning whom to trust with MACE",
"authors": [
{
"first": "Dirk",
"middle": [],
"last": "Hovy",
"suffix": ""
},
{
"first": "Taylor",
"middle": [],
"last": "Berg-Kirkpatrick",
"suffix": ""
},
{
"first": "Ashish",
"middle": [],
"last": "Vaswani",
"suffix": ""
},
{
"first": "Eduard",
"middle": [],
"last": "Hovy",
"suffix": ""
}
],
"year": 2013,
"venue": "Proceedings of NAACL-HLT 2013. Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "1120--1130",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Dirk Hovy, Taylor Berg-Kirkpatrick, Ashish Vaswani, and Eduard Hovy. 2013. Learning whom to trust with MACE. In Proceedings of NAACL- HLT 2013. Association for Computational Lin- guistics, Atlanta, Georgia, pages 1120-1130. http://www.aclweb.org/anthology/N13-1132.",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "A Corpus of Participant Roles in Contentious Discussions",
"authors": [
{
"first": "Siddharth",
"middle": [],
"last": "Jain",
"suffix": ""
},
{
"first": "Archna",
"middle": [],
"last": "Bhatia",
"suffix": ""
},
{
"first": "Angelique",
"middle": [],
"last": "Rein",
"suffix": ""
},
{
"first": "Eduard",
"middle": [],
"last": "Hovy",
"suffix": ""
}
],
"year": 2014,
"venue": "Proceedings of the Ninth International Conference on Language Resources and Evaluation (LREC'14). European Language Resources Association (ELRA)",
"volume": "",
"issue": "",
"pages": "1751--1756",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Siddharth Jain, Archna Bhatia, Angelique Rein, and Eduard Hovy. 2014. A Corpus of Participant Roles in Contentious Discussions. In Proceedings of the Ninth International Conference on Language Re- sources and Evaluation (LREC'14). European Lan- guage Resources Association (ELRA), Reykjavik, Iceland, pages 1751-1756.",
"links": null
},
"BIBREF22": {
"ref_id": "b22",
"title": "Convolutional neural networks for sentence classification",
"authors": [
{
"first": "Yoon",
"middle": [],
"last": "Kim",
"suffix": ""
}
],
"year": 2014,
"venue": "Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP). Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "1746--1751",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Yoon Kim. 2014. Convolutional neural networks for sentence classification. In Proceedings of the 2014 Conference on Empirical Methods in Natural Lan- guage Processing (EMNLP). Association for Com- putational Linguistics, Doha, Qatar, pages 1746- 1751. http://www.aclweb.org/anthology/D14-1181.",
"links": null
},
"BIBREF23": {
"ref_id": "b23",
"title": "Understanding Neural Networks through Representation Erasure",
"authors": [
{
"first": "Jiwei",
"middle": [],
"last": "Li",
"suffix": ""
},
{
"first": "Will",
"middle": [],
"last": "Monroe",
"suffix": ""
},
{
"first": "Dan",
"middle": [],
"last": "Jurafsky",
"suffix": ""
}
],
"year": 2016,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Jiwei Li, Will Monroe, and Dan Jurafsky. 2016. Understanding Neural Networks through Representation Erasure. In arXiv preprint.",
"links": null
},
"BIBREF24": {
"ref_id": "b24",
"title": "A Structured Self-attentive Sentence Embedding",
"authors": [
{
"first": "Zhouhan",
"middle": [],
"last": "Lin",
"suffix": ""
},
{
"first": "Minwei",
"middle": [],
"last": "Feng",
"suffix": ""
},
{
"first": "Cicero",
"middle": [],
"last": "Nogueira",
"suffix": ""
},
{
"first": "Mo",
"middle": [],
"last": "Santos",
"suffix": ""
},
{
"first": "Bing",
"middle": [],
"last": "Yu",
"suffix": ""
},
{
"first": "Bowen",
"middle": [],
"last": "Xiang",
"suffix": ""
},
{
"first": "Yoshua",
"middle": [],
"last": "Zhou",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Bengio",
"suffix": ""
}
],
"year": 2017,
"venue": "Proceedings of the 5th International Conference on Learning Representations (ICLR)",
"volume": "",
"issue": "",
"pages": "1--15",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Zhouhan Lin, Minwei Feng, Cicero Nogueira dos Santos, Mo Yu, Bing Xiang, Bowen Zhou, and Yoshua Bengio. 2017. A Structured Self-attentive Sentence Embedding. In Proceedings of the 5th International Conference on Learning Repre- sentations (ICLR). Toulon, France, pages 1-15. http://arxiv.org/abs/1703.03130.",
"links": null
},
"BIBREF25": {
"ref_id": "b25",
"title": "Strategies of character attack",
"authors": [
{
"first": "",
"middle": [],
"last": "Fabrizio Macagno",
"suffix": ""
}
],
"year": 2013,
"venue": "Argumentation",
"volume": "27",
"issue": "4",
"pages": "369--401",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Fabrizio Macagno. 2013. Strategies of char- acter attack. Argumentation 27(4):369-401.",
"links": null
},
"BIBREF27": {
"ref_id": "b27",
"title": "Computational Linguistics and Deep Learning",
"authors": [
{
"first": "D",
"middle": [],
"last": "Christopher",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Manning",
"suffix": ""
}
],
"year": 2015,
"venue": "Computational Linguistics",
"volume": "41",
"issue": "4",
"pages": "701--707",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Christopher D. Manning. 2015. Compu- tational Linguistics and Deep Learning. Computational Linguistics 41(4):701-707.",
"links": null
},
"BIBREF29": {
"ref_id": "b29",
"title": "Why do humans reason? Arguments for an argumentative theory",
"authors": [
{
"first": "Hugo",
"middle": [],
"last": "Mercier",
"suffix": ""
},
{
"first": "Dan",
"middle": [],
"last": "Sperber",
"suffix": ""
}
],
"year": 2011,
"venue": "The Behavioral and Brain Sciences",
"volume": "34",
"issue": "2",
"pages": "57--74",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Hugo Mercier and Dan Sperber. 2011. Why do humans reason? Arguments for an argu- mentative theory. The Behavioral and Brain Sciences 34(2):57-74; discussion 74-111.",
"links": null
},
"BIBREF31": {
"ref_id": "b31",
"title": "The Enigma of Reason",
"authors": [
{
"first": "Hugo",
"middle": [],
"last": "Mercier",
"suffix": ""
},
{
"first": "Dan",
"middle": [],
"last": "Sperber",
"suffix": ""
}
],
"year": 2017,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Hugo Mercier and Dan Sperber. 2017. The Enigma of Reason. Harvard University Press, Cambridge, MA, USA.",
"links": null
},
"BIBREF32": {
"ref_id": "b32",
"title": "Distributed representations of words and phrases and their compositionality",
"authors": [
{
"first": "Tomas",
"middle": [],
"last": "Mikolov",
"suffix": ""
},
{
"first": "Ilya",
"middle": [],
"last": "Sutskever",
"suffix": ""
},
{
"first": "Kai",
"middle": [],
"last": "Chen",
"suffix": ""
},
{
"first": "Greg",
"middle": [
"S"
],
"last": "Corrado",
"suffix": ""
},
{
"first": "Jeff",
"middle": [],
"last": "Dean",
"suffix": ""
}
],
"year": 2013,
"venue": "Advances in Neural Information Processing Systems",
"volume": "26",
"issue": "",
"pages": "3111--3119",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Cor- rado, and Jeff Dean. 2013. Distributed representa- tions of words and phrases and their composition- ality. In C. J. C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Q. Weinberger, editors, Ad- vances in Neural Information Processing Systems 26, Curran Associates, Inc., pages 3111-3119.",
"links": null
},
"BIBREF33": {
"ref_id": "b33",
"title": "How did you change my view? A corpus-based study of concessions' argumentative role",
"authors": [
{
"first": "Elena",
"middle": [],
"last": "Musi",
"suffix": ""
}
],
"year": 2017,
"venue": "Discourse Studies page",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {
"DOI": [
"10.1177/1461445617734955"
]
},
"num": null,
"urls": [],
"raw_text": "Elena Musi. 2017. How did you change my view? A corpus-based study of concessions' argumen- tative role. Discourse Studies page (in press). https://doi.org/10.1177/1461445617734955.",
"links": null
},
"BIBREF34": {
"ref_id": "b34",
"title": "Argumentation and fallacy in the justification of the",
"authors": [
{
"first": "Ahmed",
"middle": [],
"last": "Sahlane",
"suffix": ""
}
],
"year": 2003,
"venue": "War on Iraq. Argumentation",
"volume": "26",
"issue": "4",
"pages": "459--488",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ahmed Sahlane. 2012. Argumentation and fal- lacy in the justification of the 2003 War on Iraq. Argumentation 26(4):459-488.",
"links": null
},
"BIBREF36": {
"ref_id": "b36",
"title": "A Web of Hate: Tackling Hateful Speech in Online Social Spaces",
"authors": [
{
"first": "Mohammad",
"middle": [],
"last": "Haji",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Saleem",
"suffix": ""
},
{
"first": "P",
"middle": [],
"last": "Kelly",
"suffix": ""
},
{
"first": "Susan",
"middle": [],
"last": "Dillon",
"suffix": ""
},
{
"first": "Derek",
"middle": [],
"last": "Benesch",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Ruths",
"suffix": ""
}
],
"year": 2016,
"venue": "Proceedings of the First Workshop on Text Analytics for Cybersecurity and Online Safety",
"volume": "",
"issue": "",
"pages": "1--9",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Haji Mohammad Saleem, Kelly P Dillon, Susan Be- nesch, and Derek Ruths. 2016. A Web of Hate: Tackling Hateful Speech in Online Social Spaces. In Guy De Pauw, Ben Verhoeven, Bart Desmet, and Els Lefever, editors, Proceedings of the First Work- shop on Text Analytics for Cybersecurity and Online Safety. European Language Resources Association (ELRA), Portoro\u017e, Slovenia, pages 1-9.",
"links": null
},
"BIBREF37": {
"ref_id": "b37",
"title": "Argumentation: Keeping Faith with Reason",
"authors": [
{
"first": "Edward",
"middle": [],
"last": "Schiappa",
"suffix": ""
},
{
"first": "John",
"middle": [
"P"
],
"last": "Nordin",
"suffix": ""
}
],
"year": 2013,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Edward Schiappa and John P. Nordin. 2013. Argumen- tation: Keeping Faith with Reason. Pearson UK, 1st edition.",
"links": null
},
"BIBREF38": {
"ref_id": "b38",
"title": "Recognizing Insufficiently Supported Arguments in Argumentative Essays",
"authors": [
{
"first": "Christian",
"middle": [],
"last": "Stab",
"suffix": ""
},
{
"first": "Iryna",
"middle": [],
"last": "Gurevych",
"suffix": ""
}
],
"year": 2017,
"venue": "Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "980--990",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Christian Stab and Iryna Gurevych. 2017. Recognizing Insufficiently Supported Arguments in Argumenta- tive Essays. In Proceedings of the 15th Confer- ence of the European Chapter of the Association for Computational Linguistics (EACL 2017). Associa- tion for Computational Linguistics, pages 980-990. http://www.aclweb.org/anthology/E17-1092.",
"links": null
},
"BIBREF39": {
"ref_id": "b39",
"title": "Winning Arguments: Interaction Dynamics and Persuasion Strategies in Good-faith Online Discussions",
"authors": [
{
"first": "Chenhao",
"middle": [],
"last": "Tan",
"suffix": ""
},
{
"first": "Vlad",
"middle": [],
"last": "Niculae",
"suffix": ""
},
{
"first": "Cristian",
"middle": [],
"last": "Danescu-Niculescu-Mizil",
"suffix": ""
},
{
"first": "Lillian",
"middle": [],
"last": "Lee",
"suffix": ""
}
],
"year": 2016,
"venue": "Proceedings of the 25th International Conference on World Wide Web",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Chenhao Tan, Vlad Niculae, Cristian Danescu- Niculescu-Mizil, and Lillian Lee. 2016. Winning Arguments: Interaction Dynamics and Persuasion Strategies in Good-faith Online Discussions. In Pro- ceedings of the 25th International Conference on World Wide Web. ACM, Montreal, CA, page (to ap- pear). http://arxiv.org/abs/1602.01103.",
"links": null
},
"BIBREF40": {
"ref_id": "b40",
"title": "Fallacies and Argument Appraisal",
"authors": [
{
"first": "Christopher",
"middle": [
"W"
],
"last": "Tindale",
"suffix": ""
}
],
"year": 2007,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Christopher W. Tindale. 2007. Fallacies and Argument Appraisal. Cambridge University Press, New York, NY, USA, critical reasoning and argumentation edi- tion.",
"links": null
},
"BIBREF41": {
"ref_id": "b41",
"title": "The Uses of Argument",
"authors": [
{
"first": "Stephen",
"middle": [
"E"
],
"last": "Toulmin",
"suffix": ""
}
],
"year": 1958,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Stephen E. Toulmin. 1958. The Uses of Argument. Cambridge University Press.",
"links": null
},
"BIBREF42": {
"ref_id": "b42",
"title": "Handbook of Argumentation Theory",
"authors": [
{
"first": "H",
"middle": [],
"last": "Frans",
"suffix": ""
},
{
"first": "Bart",
"middle": [],
"last": "Van Eemeren",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Garssen",
"suffix": ""
},
{
"first": "C",
"middle": [
"W"
],
"last": "Erik",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Krabbe",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Francisca Snoeck",
"suffix": ""
},
{
"first": "Bart",
"middle": [],
"last": "Henkemans",
"suffix": ""
},
{
"first": "Jean",
"middle": [
"H M"
],
"last": "Verheij",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Wagemans",
"suffix": ""
}
],
"year": 2014,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Frans H. van Eemeren, Bart Garssen, Erik C. W. Krabbe, A. Francisca Snoeck Henkemans, Bart Verheij, and Jean H. M. Wagemans. 2014. Handbook of Argumentation Theory. Springer, Berlin/Heidelberg.",
"links": null
},
"BIBREF43": {
"ref_id": "b43",
"title": "Fallacies in pragma-dialectical perspective",
"authors": [
{
"first": "H",
"middle": [],
"last": "Frans",
"suffix": ""
},
{
"first": "Rob",
"middle": [],
"last": "Van Eemeren",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Grootendorst",
"suffix": ""
}
],
"year": 1987,
"venue": "Argumentation",
"volume": "1",
"issue": "3",
"pages": "283--301",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Frans H. van Eemeren and Rob Grootendorst. 1987. Fallacies in pragma-dialectical per- spective. Argumentation 1(3):283-301.",
"links": null
},
"BIBREF45": {
"ref_id": "b45",
"title": "Argumentation, communication, and fallacies: a pragma-dialectical perspective",
"authors": [
{
"first": "H",
"middle": [],
"last": "Frans",
"suffix": ""
},
{
"first": "Rob",
"middle": [],
"last": "Van Eemeren",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Grootendorst",
"suffix": ""
}
],
"year": 1992,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Frans H. van Eemeren and Rob Grootendorst. 1992. Argumentation, communication, and fallacies: a pragma-dialectical perspective. Lawrence Erlbaum Associates, Inc.",
"links": null
},
"BIBREF46": {
"ref_id": "b46",
"title": "Argumentation Quality Assessment: Theory vs. Practice",
"authors": [
{
"first": "Henning",
"middle": [],
"last": "Wachsmuth",
"suffix": ""
},
{
"first": "Nona",
"middle": [],
"last": "Naderi",
"suffix": ""
},
{
"first": "Ivan",
"middle": [],
"last": "Habernal",
"suffix": ""
},
{
"first": "Yufang",
"middle": [],
"last": "Hou",
"suffix": ""
},
{
"first": "Graeme",
"middle": [],
"last": "Hirst",
"suffix": ""
},
{
"first": "Iryna",
"middle": [],
"last": "Gurevych",
"suffix": ""
},
{
"first": "Benno",
"middle": [],
"last": "Stein",
"suffix": ""
}
],
"year": 2017,
"venue": "Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics",
"volume": "2",
"issue": "",
"pages": "250--255",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Henning Wachsmuth, Nona Naderi, Ivan Haber- nal, Yufang Hou, Graeme Hirst, Iryna Gurevych, and Benno Stein. 2017. Argumentation Qual- ity Assessment: Theory vs. Practice. In Pro- ceedings of the 55th Annual Meeting of the As- sociation for Computational Linguistics (Volume 2: Short Papers). Association for Computational Linguistics, Vancouver, Canada, pages 250-255. http://aclweb.org/anthology/P17-2039.",
"links": null
},
"BIBREF47": {
"ref_id": "b47",
"title": "Media Argumentation: Dialect, Persuasion and Rhetoric",
"authors": [
{
"first": "Douglas",
"middle": [],
"last": "Walton",
"suffix": ""
}
],
"year": 2007,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Douglas Walton. 2007. Media Argumentation: Di- alect, Persuasion and Rhetoric. Cambridge Univer- sity Press.",
"links": null
},
"BIBREF48": {
"ref_id": "b48",
"title": "Learning Linguistic Descriptors of User Roles in Online Communities",
"authors": [
{
"first": "Alex",
"middle": [],
"last": "Wang",
"suffix": ""
},
{
"first": "William",
"middle": [
"L"
],
"last": "Hamilton",
"suffix": ""
},
{
"first": "Jure",
"middle": [],
"last": "Leskovec",
"suffix": ""
}
],
"year": 2016,
"venue": "Proceedings of 2016 EMNLP Workshop on Natural Language Processing and Computational Social Science. Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "76--85",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Alex Wang, William L. Hamilton, and Jure Leskovec. 2016. Learning Linguistic Descriptors of User Roles in Online Communities. In Proceedings of 2016 EMNLP Workshop on Natural Language Pro- cessing and Computational Social Science. Associ- ation for Computational Linguistics, Austin, Texas, pages 76-85.",
"links": null
},
"BIBREF49": {
"ref_id": "b49",
"title": "Lightening up on the Ad Hominem",
"authors": [
{
"first": "John",
"middle": [],
"last": "Woods",
"suffix": ""
}
],
"year": 2008,
"venue": "Informal Logic",
"volume": "27",
"issue": "1",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "John Woods. 2008. Lightening up on the Ad Hominem. Informal Logic 27(1):109.",
"links": null
},
"BIBREF51": {
"ref_id": "b51",
"title": "Ex Machina: Personal Attacks Seen at Scale",
"authors": [
{
"first": "Ellery",
"middle": [],
"last": "Wulczyn",
"suffix": ""
},
{
"first": "Nithum",
"middle": [],
"last": "Thain",
"suffix": ""
},
{
"first": "Lucas",
"middle": [],
"last": "Dixon",
"suffix": ""
}
],
"year": 2017,
"venue": "Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee",
"volume": "",
"issue": "",
"pages": "1391--1399",
"other_ids": {
"DOI": [
"10.1145/3038912.3052591"
]
},
"num": null,
"urls": [],
"raw_text": "Ellery Wulczyn, Nithum Thain, and Lucas Dixon. 2017. Ex Machina: Personal Attacks Seen at Scale. In Proceedings of the 26th Inter- national Conference on World Wide Web. Inter- national World Wide Web Conferences Steering Committee, Perth, Australia, pages 1391-1399. https://doi.org/10.1145/3038912.3052591.",
"links": null
},
"BIBREF52": {
"ref_id": "b52",
"title": "Characterizing Online Discussion Using Coarse Discourse Sequences",
"authors": [
{
"first": "Amy",
"middle": [],
"last": "Zhang",
"suffix": ""
},
{
"first": "Bryan",
"middle": [],
"last": "Culbertson",
"suffix": ""
},
{
"first": "Praveen",
"middle": [],
"last": "Paritosh",
"suffix": ""
}
],
"year": 2017,
"venue": "Proceedings of the Eleventh International AAAI Conference on Web and Social Media",
"volume": "",
"issue": "",
"pages": "357--366",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Amy Zhang, Bryan Culbertson, and Praveen Pari- tosh. 2017. Characterizing Online Discussion Us- ing Coarse Discourse Sequences. In Proceedings of the Eleventh International AAAI Conference on Web and Social Media (ICWSM 2017). AAAI Press, Montreal, Canada, pages 357-366.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"uris": null,
"type_str": "figure",
"num": null,
"text": "'No discussion after ad hominem.' Distribution of the number of comments before the first ad hominem is committed proportional to the thread length."
},
"FIGREF1": {
"uris": null,
"type_str": "figure",
"num": null,
"text": "Sampling instances for learning triggers of ad hominem."
},
"TABREF0": {
"html": null,
"text": "). Detailed hyperpa-",
"num": null,
"type_str": "table",
"content": "<table><tr><td>Model Human upper bound estimate 2 Stacked Bi-LSTM CNN</td><td>Accuracy 0.878 0.782 0.810</td></tr></table>"
},
"TABREF1": {
"html": null,
"text": "What makes an argument ad hominem: results of the empirical study of labeling spans in 400 ad hominem arguments.",
"num": null,
"type_str": "table",
"content": "<table><tr><td>Controversy (Spearman's \u03c1) Human upper bounds 0.804 Bi-LSTM 0.539 CNN 0.559 CNN-LDA 0.569 Reasonableness (Spearman's \u03c1) Human upper bounds 0.646 Bi-LSTM 0.332 CNN 0.320 CNN-LDA 0.385</td></tr></table>"
},
"TABREF2": {
"html": null,
"text": "Results of predicting controversy and reasonableness of the original post.",
"num": null,
"type_str": "table",
"content": "<table/>"
},
"TABREF3": {
"html": null,
"text": "587 ah t1 cm7djx3 (OOV comment begin) If only you would n't rely on [ fallacious ] ( http : OOV ) [ arguments ] ( http : OOV ) to make your point. So no , I do n't realize how stupid and naive I am. All I 've realized is that you are n't actually prepared to have an actual discussion . (OOV comment begin) What god do you believe in ? And it 's not a fallacy when it 's very comparable to the most popular gods . (OOV comment begin) You 're making an assumption on what I believe , then attacking your assumption of what my belief is without me even telling you anything. OOV It is a OOV It 's the comparison itself that is OOV If they were n't comparable at all , then it 'd be impossible to commit the OOV You can compare apples to oranges , but the moment you use your fingernails to peel an apple you look like an idiot .",
"num": null,
"type_str": "table",
"content": "<table/>"
}
}
}
}