706 research outputs found

    Smart Cyber Victimization Discovery on Twitter

    Full text link
    [EN] The advancement of technologies, the promotion of smart-phones, and social networking have led to a high tendency among users to spend more time online interacting with each other via the available technologies. This is because they help overcome physical limitations and save time and energy by doing everything online. The rapid growth in this tendency has created the need for extra protection, by creating new rules and policies. However, sometimes users interrupt these rules and policies through unethical behavior. For example, bullying on social media platforms is a type of cyber victimization that can cause serious harm to individuals, leading to suicide. A firm step towards protecting the cyber society from victimization is to detect the topics that trigger the feeling of being a victim. In this paper, the focus is on Twitter, but it can be expanded to other platforms. The proposed method discovers cyber victimization by detecting the type of behavior leading to them being a victim. It consists of a text classification model, that is trained with a collected dataset of the official news since 2000, about suicide, self-harm, and cyberbullying. Results show that LinearSVC performs slightly better with an accuracy of 96%.This research has been supported by the project "Intelligent and sustainable mobility supported by multi-agent systems and edge computing (InEDGE-Mobility): Towards Sustainable Intelligent Mobility: Blockchain-based framework for IoT Security", Reference: RTI2018-095390-B-C31/32/33, financed by the Spanish Ministry of Science, Innovation and Universities (MCIU), the State Research Agency (AEI) and the European Regional Development Fund (FEDER).Shoeibi, N.; Shoeibi, N.; Julian, V.; Ossowski, S.; González Arrieta, A.; Chamoso, P. (2021). Smart Cyber Victimization Discovery on Twitter. Springer. 289-299. https://doi.org/10.1007/978-3-030-78901-5_2528929

    Natural Language Processing for Cyberbullying Detection

    Get PDF
    With the development of digital technologies and the popularity of social media, cyberbullying has become a serious public health concern that can lead to increased risk of mental and behavioral health issues or even suicide. Artificial intelligence like machine learning opens a lot of possibilities to combat cyberbullying, e.g. automatic cyberbullying detection. Most recent research focuses on improving performance by developing complex models that demand more resources and time to run. The research uses publicly available datasets without carefully evaluating their feasibility and limitations. This study uses natural language processing (NLP) to evaluate the model performance and examine the difference between fine-grained classification and binary classification as well as assess the feasibility and quality of the publicly available dataset. The results show that simple classifier can also achieve similar performance as that of more complex models if appropriate preprocessing is used, and the publicly available dataset may have limitations and quality issues that researchers should consider when using the data

    Applications of Artificial Intelligence and Graphy Theory to Cyberbullying

    Get PDF
    Cyberbullying is an ongoing and devastating issue in today\u27s online social media. Abusive users engage in cyber-harassment by utilizing social media to send posts, private messages, tweets, or pictures to innocent social media users. Detecting and preventing cases of cyberbullying is crucial. In this work, I analyze multiple machine learning, deep learning, and graph analysis algorithms and explore their applicability and performance in pursuit of a robust system for detecting cyberbullying. First, I evaluate the performance of the machine learning algorithms Support Vector Machine, NaĂŻve Bayes, Random Forest, Decision Tree, and Logistic Regression. This yielded positive results and obtained upwards of 86% accuracy. Further enhancements were achieved using Evolutionary Algorithms, improving the overall results of the machine learning models. Deep Learning algorithms was the next experiment in which efficiency was monitored in terms of training time and performance. Next, analysis of Recurrent Neural Networks and Hierarchical Attention Networks was conducted, achieving 82% accuracy. The final research project used graph analysis to explore the relation among different social media users, and analyze the connectivity and communities of users who were discovered to have posted offensive messages

    Relationship Between Personality Patterns and Harmfulness : Analysis and Prediction Based on Sentence Embedding

    Get PDF
    This paper hypothesizes that harmful utterances need to be judged in the context of whole sentences, and the authors extract features of harmful expressions using a general-purpose language model. Based on the extracted features, the authors propose a method to predict the presence or absence of harmful categories. In addition, the authors believe that it is possible to analyze users who incite others by combining this method with research on analyzing the personality of the speaker from statements on social networking sites. The results confirmed that the proposed method can judge the possibility of harmful comments with higher accuracy than simple dictionary-based models or models using a distributed representation of words. The relationship between personality patterns and harmful expressions was also confirmed by an analysis based on a harmful judgment model

    Aggressive, Repetitive, Intentional, Visible, and Imbalanced: Refining Representations for Cyberbullying Classification

    Full text link
    Cyberbullying is a pervasive problem in online communities. To identify cyberbullying cases in large-scale social networks, content moderators depend on machine learning classifiers for automatic cyberbullying detection. However, existing models remain unfit for real-world applications, largely due to a shortage of publicly available training data and a lack of standard criteria for assigning ground truth labels. In this study, we address the need for reliable data using an original annotation framework. Inspired by social sciences research into bullying behavior, we characterize the nuanced problem of cyberbullying using five explicit factors to represent its social and linguistic aspects. We model this behavior using social network and language-based features, which improve classifier performance. These results demonstrate the importance of representing and modeling cyberbullying as a social phenomenon.Comment: 12 pages, 5 figures, 22 tables, Accepted to the 14th International AAAI Conference on Web and Social Media, ICWSM'2

    Cyberbullying Detection on Social Network Services

    Get PDF
    Social networks such as Facebook or Twitter promote the communication between people but they also lead to some excessive uses on the Internet such as cyberbullying for malicious users. In addition, the accessibility of the social network also allows cyberbullying to occur at anytime and evoke more harm from other users’ dissemination. This study collects cyberbullying cases in Twitter and attempts to establish an auto-detection model of cyberbullying tweets base on the text, readability, sentiment score, and other user information to predict the tweets with harassment and ridicule cyberbullying tweets. The novelty of this study is using the readability analysis that has not been considered in past studies to reflect the author\u27s education level, age, and social status. Three data mining techniques, k-nearest neighbors, support vector machine, and decision tree are used in this study to detect the cyberbullying tweets and select the best performance model for cyberbullying prediction

    A Survey on Cybercrime Using Social Media

    Get PDF
    There is growing interest in automating crime detection and prevention for large populations as a result of the increased usage of social media for victimization and criminal activities. This area is frequently researched due to its potential for enabling criminals to reach a large audience. While several studies have investigated specific crimes on social media, a comprehensive review paper that examines all types of social media crimes, their similarities, and detection methods is still lacking. The identification of similarities among crimes and detection methods can facilitate knowledge and data transfer across domains. The goal of this study is to collect a library of social media crimes and establish their connections using a crime taxonomy. The survey also identifies publicly accessible datasets and offers areas for additional study in this area

    Approaches to automated detection of cyberbullying:A Survey

    Get PDF
    Research into cyberbullying detection has increased in recent years, due in part to the proliferation of cyberbullying across social media and its detrimental effect on young people. A growing body of work is emerging on automated approaches to cyberbullying detection. These approaches utilise machine learning and natural language processing techniques to identify the characteristics of a cyberbullying exchange and automatically detect cyberbullying by matching textual data to the identified traits. In this paper, we present a systematic review of published research (as identified via Scopus, ACM and IEEE Xplore bibliographic databases) on cyberbullying detection approaches. On the basis of our extensive literature review, we categorise existing approaches into 4 main classes, namely; supervised learning, lexicon based, rule based and mixed-initiative approaches. Supervised learning-based approaches typically use classifiers such as SVM and Naïve Bayes to develop predictive models for cyberbullying detection. Lexicon based systems utilise word lists and use the presence of words within the lists to detect cyberbullying. Rules-based approaches match text to predefined rules to identify bullying and mixed-initiatives approaches combine human-based reasoning with one or more of the aforementioned approaches. We found lack of quality representative labelled datasets and non-holistic consideration of cyberbullying by researchers when developing detection systems are two key challenges facing cyberbullying detection research. This paper essentially maps out the state-of-the-art in cyberbullying detection research and serves as a resource for researchers to determine where to best direct their future research efforts in this field

    Challenges in Modifying Existing Scales for Detecting Harassment in Individual Tweets

    Get PDF
    In an effort to create new sociotechnical tools to combat online harassment, we developed a scale to detect and measure verbal violence within individual tweets. Unfortunately, we found that the scale, based on scales effective at detecting harassment offline, was unreliable for tweets. Here, we begin with information about the development and validation of our scale, then discuss the scale’s shortcomings for detecting harassment in tweets, and explore what we can learn from this scale’s failures. We explore how rarity, context, and individual coder’s differences create challenges for detecting verbal violence in individual tweets. We also examine differences in on- and offline harassment that limit the utility of existing harassment measures for online contexts. We close with a discussion of potential avenues for future work in automated harassment detection
    • …
    corecore