Proceedings of the 3rd International Workshop on Socially-Aware Multimedia 2014
DOI: 10.1145/2661126.2661133
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Bullying Detection Using Social and Textual Analysis

Abstract: Cyber Bullying, which often has a deeply negative impact on the victim, has grown as a serious issue among adolescents. To understand the phenomenon of cyber bullying, experts in social science have focused on personality, social relationships and psychological factors involving both the bully and the victim. Recently computer science researchers have also come up with automated methods to identify cyber bullying messages by identifying bullying-related keywords in cyber conversations. However, the accuracy of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
104
0
2

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 176 publications
(106 citation statements)
references
References 5 publications
0
104
0
2
Order By: Relevance
“…Squicciarini et al (2015) used personal, social network and content-specific features with a C4.5 Decision Tree classifier to detect bullies on online social networks such as MySpace and spring.me, and devised a set of rules to determine if a user's cyberbullying behaviour is instigated by the actions of another bully. Similarly, Huang et al (2014) found that including social features mined from a user's ego networks as input features to J48, Naïve Bayes, SVM, and ZeroR classifiers improved cyberbullying detection over the use of textual features alone. To detect bullying content in their sample of 1000 emails, Burn-Thorton and Burman (2012) found, however, that clustering using a kNN algorithm was sufficient.…”
Section: Supervised Learning Approachesmentioning
confidence: 92%
See 2 more Smart Citations
“…Squicciarini et al (2015) used personal, social network and content-specific features with a C4.5 Decision Tree classifier to detect bullies on online social networks such as MySpace and spring.me, and devised a set of rules to determine if a user's cyberbullying behaviour is instigated by the actions of another bully. Similarly, Huang et al (2014) found that including social features mined from a user's ego networks as input features to J48, Naïve Bayes, SVM, and ZeroR classifiers improved cyberbullying detection over the use of textual features alone. To detect bullying content in their sample of 1000 emails, Burn-Thorton and Burman (2012) found, however, that clustering using a kNN algorithm was sufficient.…”
Section: Supervised Learning Approachesmentioning
confidence: 92%
“…Serra and Venter (2011) is the earliest study in our sample using network-based features; they used total time present online using a mobile phone as a feature in their detection method. Nahar et al (2012), Huang et al (2014), and NaliniPriya and Asswini (2015) used ego networks as features to improve detection. NaliniPriya and Asswini (2015) used the ego network to compute temporal changes in the relationships between users, and uses the detected changes within the detection process.…”
Section: Network-based Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…From this perspective, the task of cyberbullying detection was previously approached as a classification task (Yin et al 2009) that involves data acquisition and pre-processing, feature extraction, and classification. These techniques were used mostly in targeting explicit textual cyberbullying language and rely on detecting features such as profanities (Yin et al 2009;Dinakar et al 2012;Dadvar et al 2013;Al-garadi et al 2016), bad words (Reynolds et al 2011;Huang et al 2014), foul terms (Nahar et al 2013), bullying terms (Kontostathis et al 2013;Nandhini and Sheeba 2015), pejoratives and obscenities (Chen et al 2012), emotemes and vulgarities (Ptaszynski et al 2010;Ptaszynski et al 2016), curses (Chatzakou et al 2017) or negative words (Van Hee et al 2015).…”
Section: Related Workmentioning
confidence: 99%
“…For feature selection, we aimed to determine the most effective features that were derived from multiple sources, as previous studies [15] suggested that classifiers that are based on a multisource of features can give better classification performance. For parameter tuning we aimed to determine the best setting for the number of trees, the size of leaf nodes and the depth of the trees in the RF classifier.…”
Section: Introductionmentioning
confidence: 99%