966 research outputs found

    Cyberbullying Detection System with Multiple Server Configurations

    Get PDF
    Due to the proliferation of online networking, friendships and relationships - social communications have reached a whole new level. As a result of this scenario, there is an increasing evidence that social applications are frequently used for bullying. State-of-the-art studies in cyberbullying detection have mainly focused on the content of the conversations while largely ignoring the users involved in cyberbullying. To encounter this problem, we have designed a distributed cyberbullying detection system that will detect bullying messages and drop them before they are sent to the intended receiver. A prototype has been created using the principles of NLP, Machine Learning and Distributed Systems. Preliminary studies conducted with it, indicate a strong promise of our approach

    Multilingual Cyberbullying Detection System

    Get PDF
    Indiana University-Purdue University Indianapolis (IUPUI)Since the use of social media has evolved, the ability of its users to bully others has increased. One of the prevalent forms of bullying is Cyberbullying, which occurs on the social media sites such as Facebook©, WhatsApp©, and Twitter©. The past decade has witnessed a growth in cyberbullying – is a form of bullying that occurs virtually by the use of electronic devices, such as messaging, e-mail, online gaming, social media, or through images or mails sent to a mobile. This bullying is not only limited to English language and occurs in other languages. Hence, it is of the utmost importance to detect cyberbullying in multiple languages. Since current approaches to identify cyberbullying are mostly focused on English language texts, this thesis proposes a new approach (called Multilingual Cyberbullying Detection System) for the detection of cyberbullying in multiple languages (English, Hindi, and Marathi). It uses two techniques, namely, Machine Learning-based and Lexicon-based, to classify the input data as bullying or non-bullying. The aim of this research is to not only detect cyberbullying but also provide a distributed infrastructure to detect bullying. We have developed multiple prototypes (standalone, collaborative, and cloud-based) and carried out experiments with them to detect cyberbullying on different datasets from multiple languages. The outcomes of our experiments show that the machine-learning model outperforms the lexicon-based model in all the languages. In addition, the results of our experiments show that collaboration techniques can help to improve the accuracy of a poor-performing node in the system. Finally, we show that the cloud-based configurations performed better than the local configurations

    Cyberbullying Detection on Twitter Using Natural Language Processing and Machine Learning Techniques

    Get PDF
    People use social media to engage and debate themes ranging from entertainment to sports to politics and many others. The use of social media has also resulted in an increase in cyberbullying, which is occurring at an alarming pace. Many cyberbullying messages may be found in the comment sections of many social media platforms, including Twitter, YouTube, and others. Cyberbullying has the ability to cause stress and mental distress, which should be detected early and avoid being published on social media platforms. In this study, we provide a system for detecting cyberbullying messages in English using natural language processing (NLP) and machine learning approaches. On Twitter, a total of 16851 tweets were gathered. The dataset was applied to an NLP approach to find the most offensive terms associated with cyberbullying. Based on our NLP results, it was clear that cyberbullying happens and must be addressed as soon as possible. The dataset was also utilized to train the random forest (RF) and support vector machine (SVM) algorithms. Random forest surpassed support vector machine, which attained an accuracy of 90.5%, with 98.5%. With careful attention to data preparation, where missing and outlier values are dealt beforehand, the high percentage of the model is obtained. This method facilitates the analysis of the available data at the expense of the study's statistical power and ultimately the validity of its findings. Additionally, it aids in producing a significant bias in the outcomes and increases the effectiveness of the data. The Root mean square error and mean square error were used to analyse the results. In comparison to the support vector machine, the random forest earned the best error score. Our findings may be utilized by agencies and groups to educate individuals about the proper use of social media in order to avoid cyberbullying

    Cyberbullying Detection on Social Network Services

    Get PDF
    Social networks such as Facebook or Twitter promote the communication between people but they also lead to some excessive uses on the Internet such as cyberbullying for malicious users. In addition, the accessibility of the social network also allows cyberbullying to occur at anytime and evoke more harm from other users’ dissemination. This study collects cyberbullying cases in Twitter and attempts to establish an auto-detection model of cyberbullying tweets base on the text, readability, sentiment score, and other user information to predict the tweets with harassment and ridicule cyberbullying tweets. The novelty of this study is using the readability analysis that has not been considered in past studies to reflect the author\u27s education level, age, and social status. Three data mining techniques, k-nearest neighbors, support vector machine, and decision tree are used in this study to detect the cyberbullying tweets and select the best performance model for cyberbullying prediction

    A Systematic Literature Review on Cyberbullying in Social Media: Taxonomy, Detection Approaches, Datasets, And Future Research Directions

    Get PDF
    In the area of Natural Language Processing, sentiment analysis, also called opinion mining, aims to extract human thoughts, beliefs, and perceptions from unstructured texts. In the light of social media's rapid growth and the influx of individual comments, reviews and feedback, it has evolved as an attractive, challenging research area. It is one of the most common problems in social media to find toxic textual content.  Anonymity and concealment of identity are common on the Internet for people coming from a wide range of diversity of cultures and beliefs. Having freedom of speech, anonymity, and inadequate social media regulations make cyber toxic environment and cyberbullying significant issues, which require a system of automatic detection and prevention. As far as this is concerned, diverse research is taking place based on different approaches and languages, but a comprehensive analysis to examine them from all angles is lacking. This systematic literature review is therefore conducted with the aim of surveying the research and studies done to date on classification of  cyberbullying based in textual modality by the research community. It states the definition, , taxonomy, properties, outcome of cyberbullying, roles in cyberbullying  along with other forms of bullying and different offensive behavior in social media. This article also shows the latest popular benchmark datasets on cyberbullying, along with their number of classes (Binary/Multiple), reviewing the state-of-the-art methods to detect cyberbullying and abusive content on social media and discuss the factors that drive offenders to indulge in offensive activity, preventive actions to avoid online toxicity, and various cyber laws in different countries. Finally, we identify and discuss the challenges, solutions, additionally future research directions that serve as a reference to overcome cyberbullying in social media

    Towards the design of a platform for abuse detection in OSNs using multimedial data analysis

    Get PDF
    Online social networks (OSNs) are becoming increasingly popular every day. The vast amount of data created by users and their actions yields interesting opportunities, both socially and economically. Unfortunately, these online communities are prone to abuse and inappropriate behaviour such as cyber bullying. For victims, this kind of behaviour can lead to depression and other severe problems. However, due to the huge amount of users and data it is impossible to manually check all content posted on the social network. We propose a pluggable architecture with reusable components, able to quickly detect harmful content. The platform uses text-, image-, audio- and video-based analysis modules to detect inappropriate content or high risk behaviour. Domain services aggregate this data and flag user profiles if necessary. Social network moderators need only check the validity of the flagged profiles. This paper reports upon key requirements of the platform, the architectural components and important challenges

    Integrated-system to minimizing cyber harassment in kingdom of Saudi Arabia (KSA)

    Get PDF
    The proposed system framework consists two main databases: Lexicon dictionary and Summarized previous cases, by depending on Sentiment analysis and N-Gram algorithms to match the terms and documents. In the first branch, the judge opens the cyber case and therefore the system will highlight the technical terms automatically. Furthermore, the technical terms matched with Lexicon dictionary will be highlighted. After that, the judge opens the highlighted terms (as links), and description page will be appeared. The description page contains details about the technical terms (definitions, explanations, examples, etc). On the other side, the second branch aims to retrieve the related legal cases (from the database) judged by courts in UK and KSA. The related cases are the most closed cases to the current legal case by inserting keywords based on the current case. The judge benefits from these cases through the judgment issued to give the fair judgment. N-gram algorithm is used to find the related cases because it has smart approach to expect the most closed document and texts. The system provides the judge with laws used in issuing the judgment in KSA and UK courts

    A review on deep-learning-based cyberbullying detection

    Get PDF
    Bullying is described as an undesirable behavior by others that harms an individual physically, mentally, or socially. Cyberbullying is a virtual form (e.g., textual or image) of bullying or harassment, also known as online bullying. Cyberbullying detection is a pressing need in today’s world, as the prevalence of cyberbullying is continually growing, resulting in mental health issues. Conventional machine learning models were previously used to identify cyberbullying. However, current research demonstrates that deep learning surpasses traditional machine learning algorithms in identifying cyberbullying for several reasons, including handling extensive data, efficiently classifying text and images, extracting features automatically through hidden layers, and many others. This paper reviews the existing surveys and identifies the gaps in those studies. We also present a deep-learning-based defense ecosystem for cyberbullying detection, including data representation techniques and different deep-learning-based models and frameworks. We have critically analyzed the existing DL-based cyberbullying detection techniques and identified their significant contributions and the future research directions they have presented. We have also summarized the datasets being used, including the DL architecture being used and the tasks that are accomplished for each dataset. Finally, several challenges faced by the existing researchers and the open issues to be addressed in the future have been presented
    • …
    corecore