[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2396761.2398723acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
demonstration

4Is of social bully filtering: identity, inference, influence, and intervention

Published: 29 October 2012 Publication History

Abstract

As the increasing of popularity of social web, cyber bullying has become a more and more serious issue among children. Bullying causes huge negative effects on children, even suicide. SocialFilter is a realtime system that helps parents and educators track children's messages on Twitter, especially in order to detect whether they have been bullied or bullying others. The aim of the system is 4 I's, identity of bullies, inference of bullying message, influence of bully behavior, and intervention. We solve this problem by using machine learning technique. The current system is tracking tens of thousands of active children users on Twitter and automatically detect bullying messages at real time.

References

[1]
K. Bjorkqvist. Sex differences in physical, verbal, and indirect aggression: A review of recent research. Sex Roles, 30, 1994.
[2]
L. Bowers, P. Smith, and V. Binney. Perceived family relationships of bullies, victims and bully/victims in middle childhood. J Soc Pers Relat, 11:215--232, 1994.
[3]
bullyingstatistics.org. Cyber bullying statistics. http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html.
[4]
S. Goldbaum, W. Craig, D. Pepler, and J. C. J. Developmental trajectories of victimization: Identifying risk and protective factors. Zins, J. E., Elias, M. J., Maher, C. A., eds. Bullying, victimization, and peer harassment: A handbook of prevention and intervention, pages 143--60, 2007.
[5]
irkmlab.soe.ucsc.edu. Happytweets. http://santacruz.soe.ucsc.edu/filtering/.
[6]
K. M. J. Lagerspetz, K. Bjorkqvist, and T. Peltonen. Is indirect aggression typical of females? gender diffeiences in aggressiveness in 11-l2-year-old children. Agtessive Behavior, 14:303--315, 1988.
[7]
T. Nansel, M. O. M, and R. Pilla. Bullying behaviors among us youth: Prevalence and association with psychosocial adjustment. J Am Med Assoc, 285, 2001.
[8]
J. Pennebaker, C. Chung, and M. Ireland. The development and psychometric properties of liwc2007. LIWC Manual, 2007.
[9]
stopbullying.gov. Cyber bullying. http://www.stopbullying.gov/topics/cyberbullying/index.html.
[10]
Telegraph. Cyberbullying is a new threat for children. http://www.telegraph.co.uk/education/education/educationadvice/8593880/Cyberbullying-is-a-new-threat-for-children.html.
[11]
J. Wang, T. R. Nansel, and R. J. Iannotti. School bullying among adolescents in the united states: Physical, verbal, relational, and cyber. Journal of Adolescent Health, 45(4):368--375, 2009.
[12]
P. Li and C. J. C. Burges. Learning to rank using classification and gradient boosting. NIPS 06, 2006.

Cited By

View all
  • (2021)CHI Against BullyingProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445282(1-17)Online publication date: 6-May-2021
  • (2018)A socio-linguistic model for cyberbullying detectionProceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.5555/3382225.3382237(53-60)Online publication date: 28-Aug-2018
  • (2018)A Socio-linguistic Model for Cyberbullying Detection2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)10.1109/ASONAM.2018.8508294(53-60)Online publication date: Aug-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '12: Proceedings of the 21st ACM international conference on Information and knowledge management
October 2012
2840 pages
ISBN:9781450311564
DOI:10.1145/2396761

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 October 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bully
  2. detecting
  3. twitter

Qualifiers

  • Demonstration

Conference

CIKM'12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)2
Reflects downloads up to 10 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)CHI Against BullyingProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445282(1-17)Online publication date: 6-May-2021
  • (2018)A socio-linguistic model for cyberbullying detectionProceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.5555/3382225.3382237(53-60)Online publication date: 28-Aug-2018
  • (2018)A Socio-linguistic Model for Cyberbullying Detection2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)10.1109/ASONAM.2018.8508294(53-60)Online publication date: Aug-2018
  • (2015)Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy BehaviorsProceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing10.1145/2675133.2675287(583-599)Online publication date: 28-Feb-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media