15 research outputs found
Analyzing Users' Activity in On-line Social Networks over Time through a Multi-Agent Framework
[EN] The number of people and organizations using online social networks as a new way of communication is continually increasing. Messages that users write in networks and their interactions with other users leave a digital trace that is recorded. In order to understand what is going on in these virtual environments, it is necessary systems that collect, process, and analyze the information generated. The majority of existing tools analyze information related to an online event once it has finished or in a specific point of time (i.e., without considering an in-depth analysis of the evolution of users activity during the event). They focus on an analysis based on statistics about the quantity of information generated in an event. In this article, we present a multi-agent system that automates the process of gathering data from users activity in social networks and performs an in-depth analysis of the evolution of social behavior at different levels of granularity in online events based on network theory metrics. We evaluated its functionality analyzing users activity in events on Twitter.This work is partially supported by the PROME-TEOII/2013/019, TIN2014-55206-R, TIN2015-65515-C4-1-R, H2020-ICT-2015-688095.Del Val Noguera, E.; MartĂnez, C.; Botti, V. (2016). Analyzing Users' Activity in On-line Social Networks over Time through a Multi-Agent Framework. Soft Computing. 20(11):4331-4345. https://doi.org/10.1007/s00500-016-2301-0S433143452011Ahn Y-Y, Han S, Kwak H, Moon S, Jeong H (2007) Analysis of topological characteristics of huge online social networking services. In: Proceedings of the 16th WWW, pp 835â844Bastiaensens S, Vandebosch H, Poels K, Cleemput KV, DeSmet A, Bourdeaudhuij ID (2014) Cyberbullying on social network sites. an experimental study into behavioural intentions to help the victim or reinforce the bully. Comput Hum Behav 31:259â271Benevenuto F, Rodrigues T, Cha M, Almeida V (2009) Characterizing user behavior in online social networks. In: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. ACM, pp 49â62Borge-Holthoefer J, Rivero A, GarcĂa I, CauhĂ© E, Ferrer A, Ferrer D, Francos D, Iñiguez D, PĂ©rez MP, Ruiz G et al (2011) Structural and dynamical patterns on online social networks: the Spanish may 15th movement as a case study. PLoS One 6(8):e23883Borondo J, Morales AJ, Losada JC, Benito RM (2013) Characterizing and modeling an electoral campaign in the context of Twitter: 2011 Spanish presidential election as a case studyCatanese SA, De Meo P, Ferrara E, Fiumara G, Provetti A (2011) Crawling facebook for social network analysis purposes. In: Proceedings of the international conference on web intelligence, mining and semantics. ACM, p 52Cha M, Mislove A, Gummadi KP (2009) A measurement-driven analysis of information propagation in the flickr social network. In: Proceedings of the 18th international conference on World Wide Web. ACM, pp 721â730del Val E, MartĂnez C, Botti V (2015a) A multi-agent framework for the analysis of users behavior over time in on-line social networks. In: 10th International conference on soft computing models in industrial and environmental applications. Springer, Berlin, pp 191â201del Val E, Rebollo M, Botti V (2015b) Does the type of event influence how user interactions evolve on twitter? PLOS One 10(5):e0124049Eurostat (2016a) Internet use statisticsâindividuals. http://ec.europa.eu/eurostat/statistics-explained/index.php/Internet_use_statistics_-_individuals . Accessed 29 April 2016Eurostat (2016b) Social mediaâstatistics on the use by enterprises. http://ec.europa.eu/eurostat/statistics-explained/index.php/Social_media_-_statistics_on_the_use_by_enterprises#Further_Eurostat_information . Accessed 29 April 2016GarcĂa Fornes AM, Rodrigo Solaz M, Terrasa Barrena AM, Inglada J, Javier V, Jorge Cano J, Mulet Mengual L, Palomares Chust A, BĂșrdalo Rapa LA, Giret Boggino AS et al (2015) Magentix 2 userâs manualGolbeck J, Robles C, Turner K (2011) Predicting personality with social media. In: CHIâ11, pp 253â262GuimerĂ R, Llorente A, Moro E, Sales-Pardo M (2012) Predicting human preferences using the block structure of complex social networks. PloS One 7(9):e44620Huberman BA, Romero DM, Wu F (2008) Social networks that matter: Twitter under the microscope. arXiv preprint arXiv:0812.1045Jamali M, Abolhassani H (2006) Different aspects of social network analysis. In: 2006 IEEE/WIC/ACM international conference on web intelligence (WI 2006 main conference proceedings)(WIâ06). IEEE, pp 66â72Jiang Y, Jiang J (2014) Understanding social networks from a multiagent perspective. Parallel Distrib Syst IEEE Trans 25(10):2743â2759Kossinets G, Watts D (2006) Empirical analysis of an evolving social network. Science 311(5757):88â90Kumar R, Novak J, Tomkins A (2010) Structure and evolution of online social networks. In: Yu PS, Han J, Faloutsos C (eds) Link mining: models, algorithms, and applications. Springer, New York, pp 337â357Lazer D (2009) Life in the network: the coming age of computational social science. Science 323(5915):721â723Leskovec J, Adamic LA, Huberman BA (2007) The dynamics of viral marketing. ACM Trans Web 1(1):5Licoppe C, Smoreda Z (2005) Are social networks technologically embedded? How networks are changing today with changes in communication technology. Soc Netw 27(4):317â335Lotan G, Graeff E, Ananny M, Gaffney D, Pearce I, Boyd D (2011) The revolutions were tweeted: information flows during the 2011 tunisian and egyptian revolutions. Int J Commun 5:1375â1405Peña-LĂłpez I, Congosto M, AragĂłn P (2013) Spanish indignados and the evolution of 15M: towards networked para-institutions. Big data: challenges and opportunities, pp 25â26Perliger A, Pedahzur A (2011) Social network analysis in the study of terrorism and political violence. PS Polit Sci Polit 44:45â50Romero DM, Galuba W, Asur S, Huberman BA (2011a) Influence and passivity in social media. In: Proceedings of the 20th WWW, pp 113â114Romero DM, Meeder B, Kleinberg J (2011b) Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on Twitter. In: Proceedings of the 20th WWW, pp 695â704Stockman FN, Doreian P, (1997) Evolution of social networks: processes and principles. In: Doreian P, Stokman FN (eds) Evolution of social networks. Routledge, London, pp 233â250Traud AL, Mucha PJ, Porter MA (2012) Social structure of facebook networks. Phys A Stat Mech Its Appl 391(16):4165â4180Ugander J, Karrer B, Backstrom L, Marlow C (2011) The anatomy of the Facebook social graph. arXiv preprint arXiv:1111.4503Valero S, del Val E, Alemany J, Botti V (2015) Using magentix2 in smart-home environments. In: 10th International conference on soft computing models in industrial and environmental applications. Springer, Berlin, pp 27â37Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, CambridgeWersm (2015) How much data is generated every minute on social media? http://wersm.com/how-much-data-is-generated-every-minute-on-social-media/ . Accessed 29 April 201
Automatic Detection of Cyberbullying in Social Media Text
While social media offer great communication opportunities, they also
increase the vulnerability of young people to threatening situations online.
Recent studies report that cyberbullying constitutes a growing problem among
youngsters. Successful prevention depends on the adequate detection of
potentially harmful messages and the information overload on the Web requires
intelligent systems to identify potential risks automatically. The focus of
this paper is on automatic cyberbullying detection in social media text by
modelling posts written by bullies, victims, and bystanders of online bullying.
We describe the collection and fine-grained annotation of a training corpus for
English and Dutch and perform a series of binary classification experiments to
determine the feasibility of automatic cyberbullying detection. We make use of
linear support vector machines exploiting a rich feature set and investigate
which information sources contribute the most for this particular task.
Experiments on a holdout test set reveal promising results for the detection of
cyberbullying-related posts. After optimisation of the hyperparameters, the
classifier yields an F1-score of 64% and 61% for English and Dutch
respectively, and considerably outperforms baseline systems based on keywords
and word unigrams.Comment: 21 pages, 9 tables, under revie
Perpetrators, victims, bystanders and up standers: cyber bullying in a special school context.
This study offers a multi-dimensional analysis of âreal worldâ cyberbullying between members of a special school community. The purpose of this article is to analyse the social and educational contexts within which interactions of this nature are embedded.The interview both illuminated a number of themes pertinent to the current literature and extended those related to the call for further analysis of the contextual determinants of cyberbullying.The influence of the conditions experienced by the children involved (Attention Deficit Hyperactivity Disorder (ADHD) and Autistic Spectrum Condition (ASC)) is discussed and demonstrated. This use of natural observation provides a current and âreal worldâ illustration of teacher perceptions of the complex behaviours and interactions occurring in cyberspace, which hold potential for grave consequences. A hopeful tone is maintained as the potential for selfless upstander behaviour and resolution via the involvement of supportive and knowledgeable pastoral staff is realised in the articleâs conclusion.<br/
Comparing early adolescentsâ positive bystander responses to cyberbullying and traditional bullying: the impact of severity and gender
Young people are frequently exposed to bullying events in the offline and online domain. Witnesses to these incidents act as bystanders and play a pivotal role in reducing or encouraging bullying behaviour. The present study examined 868 (47.2% female) 11-13-year-old early adolescent pupilsâ bystander responses across a series of hypothetical vignettes based on traditional and cyberbullying events. The vignettes experimentally controlled for severity across mild, moderate, and severe scenarios. The findings showed positive bystander responses (PBRs) were higher in cyberbullying than traditional bullying incidents. Bullying severity impacted on PBRs, in that PBRs increased across mild, moderate, and severe incidents, consistent across traditional and cyberbullying. Females exhibited more PBRs across both types of bullying. Findings are discussed in relation to practical applications within the school. Strategies to encourage PBRs to all forms of bullying should be at the forefront of bullying intervention methods
Psychometric data of a questionnaire to measure cyberbullying bystander behavior and its behavioral determinants among adolescents
info:eu-repo/semantics/publishe
Psychometric data of a questionnaire to measure cyberbullying bystander behavior and its behavioral determinants among adolescents
.This paper describes the items, scale validity and scale reliability of a self-report questionnaire that measures bystander behavior in cyberbullying incidents among adolescents, and its behavioral determinants. Determinants included behavioral intention, behavioral attitudes, moral disengagement attitudes, outcome expectations, self-efficacy, subjective norm and social skills. Questions also assessed (cyber-)bullying involvement. Validity and reliability information is based on a sample of 238 adolescents (M age=13.52 years, SD=0.57). Construct validity was assessed using Confirmatory Factor Analysis (CFA) or Exploratory Factor Analysis (EFA) in Mplus7 software. Reliability (Cronbach Alpha, α) was assessed in SPSS, version 22. Data and questionnaire are included in this article. Further information can be found in DeSmet et al. (2018) [1].status: publishe