9 research outputs found

    Deteksi Komentar Cyberbullying Pada YouTube Dengan Metode Convolutional Neural Network – Long Short-Term Memory Network (CNN-LSTM)

    Get PDF
    Pada era digital seperti sekarang cyberbullying kerapkali terjadi di berbagai belahan dunia termasuk di Indonesia, hal ini dapat terjadi pada siapa saja dan dimana saja terutama media sosial seperti YouTube melalui fitur komentar semua pengguna yang memiliki akun dapat dengan mudah terlibat cyberbullying hanya melalui berbalas komentar. Penelitian ini bertujuan untuk melakukan deteksi adanya cyberbullying melalui pengumpulan serta pengklasifikasian komentar negatif video pada kanal YouTube dengan konten tertentu berbasis bahasa Indonesia (serta bahasa-bahasa daerah tertentu, seperti Jawa dan Surabaya) melalui metode deep-learning Convolutional Neural Network – Long Short-Term Memory Network (CNN-LSTM). Dataset komentar yang dipakai dalam penelitian dikumpulkan dengan menggunakan Application Program Interface (API) yang telah disediakan oleh Youtube secara gratis dan berbatas kuota secara kumulatif. Terkumpul data komentar total sebanyak 26.918 komentar dengan perincian 9.834 komentar terklasifikasi cyberbullying dan 17.084 komentar terklasifikasi sebagai bukan cyberbullying. Setelah dataset dipakai dalam proses training pada model CNN-LSTM dan menghasilkan sebuah model dengan nilai F1-score sebesar 0,84, model tersebut dipakai dalam sebuah API sederhana yang menerima input beberapa kalimat yang akan dideteksi konten cyberbullying dan menghasilkan output berupa JSON yang berisi hasil klasifikasi dari setiap kalimat yang akan dideteksi

    ROBUST SEARCH ENGINE TO IMPROVE THE SOCIAL SECURITY ISSUE

    Get PDF
    Cyber-bullying refers to the anonymous calling of any harassment that occurs through the web, mobiles, and other remote devices. Cyber-bullying takes the help of communication technologies to intentionally distort others through hostile behavior such as sending text messages and posting un-sensible or ugly comments on the Internet. The main definition of this phenomenon is derived from the concept of bullying. In this paper, current review of efforts in cyberbullying detection using web content mining techniques is presented [15].The proposed system effectively overcomes the drawbacks of existing. Also our main contribution is providing a robust search engine that improves the search pattern as well improves the social security issues. Also robust feature extraction improves the accuracy in detecting cyberbully

    AN EFFECTIVE SYSTEM TO IMPROVE THE CYBERBULLYING

    Get PDF
    The rapid growth of social networking is supplementing the progression of cyberbullying activities. Most of the individuals involved in these activities belong to the younger generations,   especially teenagers, who in the worst scenario are at more risk of suicidal attempts. This propose an effective approach to detect cyberbullying messages from social media through a SVM classifier algorithm. This present ranking algorithm to access highest visited link and also provide age verification before access the particular social media. The experiments show effectiveness of our approach

    Multimodal cyberbullying detection using capsule network with dynamic routing and deep convolutional neural network

    Get PDF
    Cyberbullying is the use of information technology networks by individuals’ to humiliate, tease, embarrass, taunt, defame and disparage a target without any face-to-face contact. Social media is the 'virtual playground' used by bullies with the upsurge of social networking sites such as Facebook, Instagram, YouTube and Twitter. It is critical to implement models and systems for automatic detection and resolution of bullying content available online as the ramifications can lead to a societal epidemic. This paper presents a deep neural model for cyberbullying detection in three different modalities of social data, namely textual, visual and info-graphic (text embedded along with an image). The all-in-one architecture, CapsNet–ConvNet, consists of a capsule network (CapsNet) deep neural network with dynamic routing for predicting the textual bullying content and a convolution neural network (ConvNet) for predicting the visual bullying content. The info-graphic content is discretized by separating text from the image using Google Lens of Google Photos app. The perceptron-based decision-level late fusion strategy for multimodal learning is used to dynamically combine the predictions of discrete modalities and output the final category as bullying or non-bullying type. Experimental evaluation is done on a mix-modal dataset which contains 10,000 comments and posts scrapped from YouTube, Instagram and Twitter. The proposed model achieves a superlative performance with the AUC–ROC of 0.98

    Cyberbullying detection: Current trends and future directions

    Get PDF
    As we see the rapid growth of Web 2.0; online social networks-OSNs and online communications which provides platforms to connect each other all over the world and express the opinion and interests. Online users are generating big amount of data every day. As result, OSNs are providing opportunities for cybercrime and cyberbullying activities. Cyberbullying is online harassing, humiliating or insulting an online user through sending text messages of threatening or harassing using online tool of communication. This research paper provides the comprehensive overview of cyberbullying that occurs usually on OSNs websites and provides current approaches to tackle cyberbullying on OSNs. It also highlights the issues and challenges in cyberbullying detection system and outline the future direction for research in this area. The topic discussed in this paper start with introduction of OSNs, cyberbullying, types of cyberbullying, and data accessibility is reviewed. Lastly, issues and challenges concerning cyberbullying detection are highlighted

    Automatic Detection of Cyberbullying in Social Media Text

    Get PDF
    While social media offer great communication opportunities, they also increase the vulnerability of young people to threatening situations online. Recent studies report that cyberbullying constitutes a growing problem among youngsters. Successful prevention depends on the adequate detection of potentially harmful messages and the information overload on the Web requires intelligent systems to identify potential risks automatically. The focus of this paper is on automatic cyberbullying detection in social media text by modelling posts written by bullies, victims, and bystanders of online bullying. We describe the collection and fine-grained annotation of a training corpus for English and Dutch and perform a series of binary classification experiments to determine the feasibility of automatic cyberbullying detection. We make use of linear support vector machines exploiting a rich feature set and investigate which information sources contribute the most for this particular task. Experiments on a holdout test set reveal promising results for the detection of cyberbullying-related posts. After optimisation of the hyperparameters, the classifier yields an F1-score of 64% and 61% for English and Dutch respectively, and considerably outperforms baseline systems based on keywords and word unigrams.Comment: 21 pages, 9 tables, under revie

    From risk factors to detection and intervention: a practical proposal for future work on cyberbullying

    Get PDF
    While there is an increasing flow of media stories reporting cases of cyberbullying, particularly within online social media, research efforts in the academic community are scattered over different topics across the social science and computer science academic disciplines. In this work, we explored research pertaining to cyberbullying, conducted across disciplines. We mainly sought to understand scholarly activity on intelligence techniques for the detection of cyberbullying when it occurs. Our findings suggest that the vast majority of academic contributions on cyberbullying focus on understanding the phenomenon, risk factors, and threats, with the prospect of suggesting possible protection strategies. There is less work on intelligence techniques for the detection of cyberbullying when it occurs, while currently deployed algorithms seem to detect the problem only up to some degree of success. The article summarises the current trends aiming to encourage discussion and research with a new scope; we call for more research tackling the problem by leveraging statistical models and computational mechanisms geared to detect, intervene, and prevent cyberbullying. Coupling intelligence techniques with specific web technology problems can help combat this social menace. We argue that a multidisciplinary approach is needed, with expertise from human–computer interaction, psychology, computer science, and sociology, for current challenges to be addressed and significant progress to be made

    Honeypot boulevard: understanding malicious activity via decoy accounts

    Get PDF
    This thesis describes the development and deployment of honeypot systems to measure real-world cybercriminal activity in online accounts. Compromised accounts expose users to serious threats including information theft and abuse. By analysing the modus operandi of criminals that compromise and abuse online accounts, we aim to provide insights that will be useful in the development of mitigation techniques. We explore account compromise and abuse across multiple online platforms that host webmail, social, and cloud document accounts. First, we design and create realistic decoy accounts (honeypots) and build covert infrastructure to monitor activity in them. Next, we leak credentials of those accounts online to lure miscreants to the accounts. Finally, we record and analyse the resulting activity in the compromised accounts. Our top three findings on what happens after online accounts are attacked can be summarised as follows. First, attackers that know the locations of webmail account owners tend to connect from places that are closer to those locations. Second, we show that demographic attributes of social accounts influence how cybercriminals interact with them. Third, in cloud documents, we show that document content influences the activity of cybercriminals. We have released a tool for setting up webmail honeypots to help other researchers that may be interested in setting up their own honeypots
    corecore