2021
DOI: 10.48550/arxiv.2104.10788
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Defining and Detecting Toxicity on Social Media: Context and Knowledge are Key

Abstract: As the role of online platforms has become increasingly prominent for communication, toxic behaviors, such as cyberbullying and harassment, have been rampant in the last decade. On the other hand, online toxicity is multi-dimensional and sensitive in nature, which makes its detection challenging. As the impact of exposure to online toxicity can lead to serious implications for individuals and communities, reliable models and algorithms are required for detecting and understanding such communications. In this p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 42 publications
0
1
0
Order By: Relevance
“…For example, abusers may misuse Wi-Fi enabled devices, including locking out and controlling devices to terrorize and harass users [38,149], or use technology to generate or share non-consensual sexually explicit images [15,123]. Beyond gender violence, other facets of technology-facilitated violence, include doxxing [69], trolling [14], cyberstalking [14], cyberbullying [14,88,179], monitoring and control [38], and online harassment and intimidation [88,169,174,200], under the broader banner of online toxicity [88,117]. Technology-facilitated violence leads to co-occurring harms, including feeling of distress, fear, and humiliation [38], while often infringing personal and bodily integrity, dignity, and privacy and inhibiting autonomy and expression [123].…”
Section: Interpersonal Harms: Technological Affordances Adversely Sha...mentioning
confidence: 99%
“…For example, abusers may misuse Wi-Fi enabled devices, including locking out and controlling devices to terrorize and harass users [38,149], or use technology to generate or share non-consensual sexually explicit images [15,123]. Beyond gender violence, other facets of technology-facilitated violence, include doxxing [69], trolling [14], cyberstalking [14], cyberbullying [14,88,179], monitoring and control [38], and online harassment and intimidation [88,169,174,200], under the broader banner of online toxicity [88,117]. Technology-facilitated violence leads to co-occurring harms, including feeling of distress, fear, and humiliation [38], while often infringing personal and bodily integrity, dignity, and privacy and inhibiting autonomy and expression [123].…”
Section: Interpersonal Harms: Technological Affordances Adversely Sha...mentioning
confidence: 99%