[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2833312.2849567acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicdcnConference Proceedingsconference-collections
research-article

Automatic detection of cyberbullying on social networks based on bullying features

Published: 04 January 2016 Publication History

Abstract

With the increasing use of social media, cyberbullying behaviour has received more and more attention. Cyberbullying may cause many serious and negative impacts on a person's life and even lead to teen suicide. To reduce and stop cyberbullying, one effective solution is to automatically detect bullying content based on appropriate machine learning and natural language processing techniques. However, many existing approaches in the literature are just normal text classification models without considering bullying characteristics. In this paper, we propose a representation learning framework specific to cyberbullying detection. Based on word embeddings, we expand a list of pre-defined insulting words and assign different weights to obtain bullying features, which are then concatenated with Bag-of-Words and latent semantic features to form the final representation before feeding them into a linear SVM classifier. Experimental study on a twitter dataset is conducted, and our method is compared with several baseline text representation learning models and cyberbullying detection methods. The superior performance achieved by our method has been observed in this study.

References

[1]
D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. the Journal of machine Learning research, 3:993--1022, 2003.
[2]
C.-C. Chang and C.-J. Lin. Libsvm: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST), 2(3):27, 2011.
[3]
G. Chowdhury. Introduction to modern information retrieval. Facet publishing, 2010.
[4]
K. Dinakar, R. Reichart, and H. Lieberman. Modeling the detection of textual cyberbullying. In The Social Mobile Web, 2011.
[5]
M. Fekkes, F. I. Pijpers, A. M. Fredriks, T. Vogels, and S. P. Verloove-Vanhorick. Do bullied children get ill, or do ill children get bullied? a prospective cohort study on the relationship between bullying and health-related symptoms. Pediatrics, 117(5):1568--1574, 2006.
[6]
G. Gini and T. Pozzoli. Association between bullying and psychosomatic problems: A meta-analysis. Pediatrics, 123(3):1059--1065, 2009.
[7]
F. Godin, B. Vandersmissen, W. De Neve, and R. Van de Walle. Named entity recognition for twitter microposts using distributed word representations. In Proceedings of the Workshop on Noisy User-generated Text, pages 146--153, Beijing, China, July 2015. Association for Computational Linguistics.
[8]
J. Juvonen and E. F. Gross. Extending the school grounds? - bullying experiences in cyberspace. Journal of School health, 78(9):496--505, 2008.
[9]
R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and M. R. Lattanner. Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. 2014.
[10]
T. K. Landauer, P. W. Foltz, and D. Laham. An introduction to latent semantic analysis. Discourse processes, 25(2--3):259--284, 1998.
[11]
B. L. McLaughlin, A. A. Braga, C. V. Petrie, M. H. Moore, et al. Deadly Lessons:: Understanding Lethal School Violence. National Academies Press, 2002.
[12]
T. Mikolov, K. Chen, G. Corrado, and J. Dean. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781, 2013.
[13]
T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems, pages 3111--3119, 2013.
[14]
V. Nahar, X. Li, and C. Pang. An effective approach for cyberbullying detection. Communications in Information Science and Management Engineering, 2012.
[15]
V. Nahar, X. Li, and C. Pang. An effective approach for cyberbullying detection. Communications in Information Science and Management Engineering, 3(5):238, 2013.
[16]
H. C. Wu, R. W. P. Luk, K. F. Wong, and K. L. Kwok. Interpreting tf-idf term weights as making relevance decisions. ACM Transactions on Information Systems (TOIS), 26(3):13, 2008.
[17]
J.-M. Xu, K.-S. Jun, X. Zhu, and A. Bellmore. Learning from bullying traces in social media. In Proceedings of the 2012 conference of the North American chapter of the association for computational linguistics: Human language technologies, pages 656--666. Association for Computational Linguistics, 2012.
[18]
M. Ybarra. Trends in technology-based sexual and non-sexual aggression over time and linkages to nontechnology aggression. National Summit on Interpersonal Violence and Abuse Across the Lifespan: Forging a Shared Agenda, 2010.
[19]
R. Zhao and K. Mao. Semi-random projection for dimensionality reduction and extreme learning machine in high-dimensional space. Computational Intelligence Magazine, IEEE, 10(3):30--41, 2015.

Cited By

View all
  • (2024)A Generative AI Powered Approach to Cyberbullying DetectionProceedings of the 2024 8th International Conference on Information System and Data Mining10.1145/3686397.3686407(57-63)Online publication date: 24-Jun-2024
  • (2024)Beyond Text: Multimodal Credibility Assessment Approaches for Online User-Generated ContentACM Transactions on Intelligent Systems and Technology10.1145/367323615:5(1-33)Online publication date: 14-Jun-2024
  • (2024)Cyberbullying Detection Using Bidirectional Encoder Representations from Transformers (BERT)2024 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)10.1109/MeditCom61057.2024.10621093(257-262)Online publication date: 8-Jul-2024
  • Show More Cited By

Index Terms

  1. Automatic detection of cyberbullying on social networks based on bullying features

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICDCN '16: Proceedings of the 17th International Conference on Distributed Computing and Networking
    January 2016
    370 pages
    ISBN:9781450340328
    DOI:10.1145/2833312
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 January 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bag-of-words
    2. cyberbullying detection
    3. representation learning
    4. text mining
    5. word embeddings

    Qualifiers

    • Research-article

    Conference

    ICDCN '16

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)114
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 24 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A Generative AI Powered Approach to Cyberbullying DetectionProceedings of the 2024 8th International Conference on Information System and Data Mining10.1145/3686397.3686407(57-63)Online publication date: 24-Jun-2024
    • (2024)Beyond Text: Multimodal Credibility Assessment Approaches for Online User-Generated ContentACM Transactions on Intelligent Systems and Technology10.1145/367323615:5(1-33)Online publication date: 14-Jun-2024
    • (2024)Cyberbullying Detection Using Bidirectional Encoder Representations from Transformers (BERT)2024 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)10.1109/MeditCom61057.2024.10621093(257-262)Online publication date: 8-Jul-2024
    • (2024)Detecting Cyberbullying on Social Networks Using Language Learning Model2024 16th International Conference on Knowledge and Smart Technology (KST)10.1109/KST61284.2024.10499678(161-166)Online publication date: 28-Feb-2024
    • (2024)Unveiling the Intricacies of Cyber Harassment Intentions on Social Media Platforms2024 3rd International Conference for Innovation in Technology (INOCON)10.1109/INOCON60754.2024.10512248(1-7)Online publication date: 1-Mar-2024
    • (2024)Defending Against Digital Threats: Machine Learning Techniques for Cyber Persecution Detection2024 5th International Conference on Artificial Intelligence and Data Sciences (AiDAS)10.1109/AiDAS63860.2024.10730176(1-6)Online publication date: 3-Sep-2024
    • (2024)Toward Multi-Modal Approach for Identification and Detection of Cyberbullying in Social NetworksIEEE Access10.1109/ACCESS.2024.342013112(90158-90170)Online publication date: 2024
    • (2024)Electronic AggressionThe Cambridge Handbook of Cyber Behavior10.1017/9781107165250.040(1058-1084)Online publication date: 6-Dec-2024
    • (2024)Effects in Cyber BehaviorThe Cambridge Handbook of Cyber Behavior10.1017/9781107165250.034(873-1205)Online publication date: 6-Dec-2024
    • (2024)A comprehensive review of cyberbullying-related content classification in online social mediaExpert Systems with Applications10.1016/j.eswa.2023.122644244(122644)Online publication date: Jun-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media