[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Detecting Cyberbullying and Cyberaggression in Social Media

Published: 14 October 2019 Publication History

Abstract

Cyberbullying and cyberaggression are increasingly worrisome phenomena affecting people across all demographics. More than half of young social media users worldwide have been exposed to such prolonged and/or coordinated digital harassment. Victims can experience a wide range of emotions, with negative consequences such as embarrassment, depression, isolation from other community members, which embed the risk to lead to even more critical consequences, such as suicide attempts.
In this work, we take the first concrete steps to understand the characteristics of abusive behavior in Twitter, one of today’s largest social media platforms. We analyze 1.2 million users and 2.1 million tweets, comparing users participating in discussions around seemingly normal topics like the NBA, to those more likely to be hate-related, such as the Gamergate controversy, or the gender pay inequality at the BBC station. We also explore specific manifestations of abusive behavior, i.e., cyberbullying and cyberaggression, in one of the hate-related communities (Gamergate). We present a robust methodology to distinguish bullies and aggressors from normal Twitter users by considering text, user, and network-based attributes. Using various state-of-the-art machine-learning algorithms, we classify these accounts with over 90% accuracy and AUC. Finally, we discuss the current status of Twitter user accounts marked as abusive by our methodology and study the performance of potential mechanisms that can be used by Twitter to suspend users in the future.

References

[1]
AllSlang. 2017. List of Swear Words and Curse Words. Retrieved from https://www.noswearing.com/dictionary.
[2]
A. A. Amleshwaram, N. Reddy, S. Yadav, G. Gu, and C. Yang. 2013. CATS: Characterizing automation of twitter spammers. In Proceedings of the 5th International Conference on Communication Systems and Networks (COMSNETS’13). 1--10.
[3]
Anonymous. [n.d.]. “I dated Zoe Quinn.” 4chan. Retrieved from https://archive.is/qrS5Q.
[4]
Anonymous. [n.d.]. Zoe Quinn, prominent SJW and indie developer is a liar and a slut. 4chan. Retrieved from https://archive.is/QIjm3.
[5]
Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. Arxiv Preprint Arxiv:1409.0473.
[6]
Shane Bergsma, Matt Post, and David Yarowsky. 2012. Stylometric analysis of scientific articles. In Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Association for Computational Linguistics, 327--337.
[7]
Devipsita Bhattacharya and Sudha Ram. 2015. RT News: An analysis of news agency ego networks in a microblogging environment. ACM Trans. Manage. Info. Syst. 6, 3 (2015), 11:1--11:25.
[8]
Jeremy Blackburn, Ramanuja Simha, Nicolas Kourtellis, Xiang Zuo, Matei Ripeanu, John Skvoretz, and Adriana Iamnitchi. 2012. Branded with a scarlet “C”: Cheaters in a gaming social network. In Proceedings of the Conference on the World Wide Web (WWW’12).
[9]
David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2003. Latent dirichlet allocation. J. Mach. Learn. Res. 3(Jan. 2003), 993--1022.
[10]
V. D. Blondel, J. L. Guillaume, R. Lambiotte, and E. Lefebvre. 2011. The louvain method for community detection in large networks. Stat. Mech.: Theory Exper. 10 (2011).
[11]
Axel Bruns and Stefan Stieglitz. 2013. Towards more systematic twitter analysis: Metrics for tweeting activities. Int. J. Soc. Res. Methodol. 16, 2 (2013), 91--108.
[12]
Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Mean birds: Detecting aggression and bullying on twitter. In Proceedings of the ACM Web Science Conference (WebSci’17).
[13]
Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Measuring #GamerGate: A tale of hate, sexism, and bullying. In Proceedings of the WWW CyberSafety Workshop.
[14]
Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Hate is not binary: Studying abusive behavior of #GamerGate on twitter. In Proceedings of the ACM Conference on Hypertext and Social Media.
[15]
Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Mean birds: Detecting aggression and bullying on twitter. In Proceedings of the ACM Web Science Conference. ACM, 13--22.
[16]
Despoina Chatzakou, Vassiliki Koutsonikola, Athena Vakali, and Konstantinos Kafetsios. 2013. Micro-blogging content analysis via emotionally-driven clustering. In Proceedings of the International Conference on Affective Computing and Intelligent Interaction (ACII’13).
[17]
Despoina Chatzakou, Nikolaos Passalis, and Athena Vakali. 2015. MultiSpot: Spotting sentiments with semantic aware multilevel cascaded analysis. In Proceedings of the International Conference on Big Data Analytics and Knowledge (DaWaK’15), Vol. 9263. Springer, 337--350.
[18]
D. Chatzakou and A. Vakali. 2015. Harvesting opinions and emotions from social media textual resources. IEEE Internet Comput. 19, 4 (2015), 46--50.
[19]
Despoina Chatzakou, Athena Vakali, and Konstantinos Kafetsios. 2017. Detecting variation of emotions in online activities. Expert Syst. Appl. 89 (2017), 318--332.
[20]
C. Chen, J. Zhang, X. Chen, Y. Xiang, and W. Zhou. 2015. 6 million spam tweets: A large ground truth for timely twitter spam detection. In Proceedings of the IEEE International Conference on Communications (ICC’15).
[21]
Ying Chen, Yilu Zhou, Sencun Zhu, and Heng Xu. 2012. Detecting offensive language in social media to protect adolescent online safety. In Proceedings of the IEEE Joint International Conference on Privacy, Security, Risk and Trust (PASSAT’12) and Social Computing (SocialCom’12).
[22]
Lucie Corcoran, Conor McGuckin, and Garry Prentice. 2015. Cyberbullying or cyber aggression?: A review of existing definitions of cyber-based peer-to-peer aggression. Societies 5, 2 (2015).
[23]
Cyberbullying Research Center. 2016. Retrieved from https://cyberbullying.org/summary-of-our-cyberbullying-research.
[24]
Cyberbullying Research Center. 2017. Retrieved from https://cyberbullying.org/facts.
[25]
Maral Dadvar, Dolf Trieschnigg, and Franciska Jong. 2014. Experts and machines against bullies: A hybrid approach to detect cyberbullies. In Proceedings of the Canadian Conference on Artificial Intelligence.
[26]
Jesse Davis and Mark Goadrich. 2006. The relationship between precision-recall and ROC curves. In Proceedings of the Conference on Machine Learning.
[27]
Thomas G. Dietterich. 2000. Ensemble methods in machine learning. In Proceedings of the 1st International Workshop on Multiple Classifier Systems.
[28]
Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of textual cyberbullying. Soc. Mobile Web 11 (2011).
[29]
Nemanja Djuric, Jing Zhou, Robin Morris, Mihajlo Grbovic, Vladan Radosavljevic, and Narayan Bhamidipati. 2015. Hate speech detection with comment embeddings. In Proceedings of the Conference on the World Wide Web (WWW’15).
[30]
P. Ekman, W. V. Friesen, and P. Ellsworth. 1982. What emotion categories or dimensions can observers judge from facial behavior? Emot. Hum. Face (1982), 39--55.
[31]
Dennis Fetterly, Mark Manasse, and Marc Najork. 2004. On the evolution of clusters of near-duplicate web pages. J. Web Eng. 2, 228--246.
[32]
Dennis Fetterly, Mark Manasse, and Marc Najork. 2005. Detecting phrase-level duplication on the world wide web. In Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’05). Association for Computing Machinery.
[33]
Figure Eight. 2019. Retrieved from https://www.figure-eight.com/.
[34]
Jesse Fox and Wai Yen Tang. 2014. Sexism in online video games: The role of conformity to masculine norms and social dominance orientation. Comput. Hum. Behav. 33 (2014).
[35]
Nir Friedman, Dan Geiger, and Moises Goldszmidt. 1997. Bayesian network classifiers. Mach. Learn. 29, 2--3 (1997).
[36]
Maria Giatsoglou, Despoina Chatzakou, Neil Shah, Christos Faloutsos, and Athena Vakali. 2015. Reteeting activity on twitter: Signs of deception. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD’15).
[37]
Dorothy Wunmi Grigg. 2010. Cyber-aggression: Definition and concept of cyberbullying. Austral. J. Guid. Counsel. 20, 02 (2010).
[38]
The Guardian. 2018. Gary Lineker is BBC’s best-paid star and only one not to take pay cut. Retrieved from https://www.theguardian.com/world/2018/jul/11/gary-lineker-bbc-best-paid-star-only-one-not-to-take-pay-cut.
[39]
Joshua Guberman and Libby Hemphill. 2017. Challenges in modifying existing scales for detecting harassment in individual tweets. In Proceedings of the International Conference on System Sciences.
[40]
Laura D. Hanish, Becky Kochenderfer-Ladd, Richard A. Fabes, Carol Lynn Martin, Donna Denning et al. 2003. Bullying among young children: The influence of peers and teachers. Bully. Amer. Schools 141 (2003), 141--159.
[41]
Trevor Hastie, Saharon Rosset, Ji Zhu, and Hui Zou. 2009. Multi-class adaboost. Stat. Interface 2, 3 (2009), 349--360.
[42]
Hatebase database. 2017. Retrieved from https://www.hatebase.org/.
[43]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 770--778.
[44]
Alex Hern. 2014. Feminist Critics of Video Games Facing Threats in “GamerGate” Campaign. The Guardian. Retrieved from https://www.theguardian.com/technology/2014/oct/23/felicia-days-public-details-online-gamergate.
[45]
Balázs Hidasi, Massimo Quadrana, Alexandros Karatzoglou, and Domonkos Tikk. 2016. Parallel recurrent neural network architectures for feature-rich session-based recommendations. In Proceedings of the 10th ACM Conference on Recommender Systems. ACM, 241--248.
[46]
Gabriel Emile Hine, Jeremiah Onaolapo, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, and Jeremy Blackburn. 2016. A longitudinal measurement study of 4chan’s politically incorrect forum and its effect on the web. Arxiv Preprint Arxiv:1610.03452
[47]
Homa Hosseinmardi, Richard Han, Qin Lv, Shivakant Mishra, and Amir Ghasemianlangroodi. 2014. Towards understanding cyberbullying behavior in a semi-anonymous social network. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’14).
[48]
Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015. Analyzing labeled cyberbullying incidents on the instagram social network. In Proceedings of the International Conference on Social Informatics (SocInfo’15).
[49]
Fang Jin, Edward Dougherty, Parang Saraf, Yang Cao, and Naren Ramakrishnan. 2013. Epidemiological modeling of news and rumors on twitter. In Proceedings of the Social Network Analysis Workshop (SNAKDD’13).
[50]
Ji-Hyun K. 2009. Estimating classification error rate: Repeated cross-validation, repeated hold-out and bootstrap. Comput. Stat. Data Anal. 53, 11 (2009).
[51]
Imrul Kayes, Nicolas Kourtellis, Daniele Quercia, Adriana Iamnitchi, and Francesco Bonchi. 2015. The social world of content abusers in community question answering. In Proceedings of the Conference on the World Wide Web (WWW’15).
[52]
Keras. 2017. Retrieved from https://keras.io/.
[53]
Aamera Z. H. Khan, Mohammad Atique, and V. M. Thakare. 2015. Combining lexicon-based and learning-based methods for twitter sentiment analysis. Int. J. Electron. Commun. Soft Comput. Sci. Eng. (2015), 89.
[54]
Kenji Kira and Larry A. Rendell. 1992. A practical approach to feature selection. In Proceedings of the 9th International Workshop on Machine Learning.
[55]
Jon M. Kleinberg. 1999. Hubs, authorities, and communities. Comput. Surveys 31, 4es, Article 5 (1999).
[56]
Kurt Wagner. 2017. Twitter says it’s punishing 10 times more users for being abusive than it was a year ago. Retrieved from https://www.vox.com/2017/7/20/15999636/twitter-safety-abuse-update-suspensions-increase.
[57]
Haewoon Kwak, Jeremy Blackburn, and Seungyeop Han. 2015. Exploring cyberbullying and other toxic behavior in team competition online games. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.
[58]
Kyumin Lee, James Caverlee, and Steve Webb. 2010. Uncovering social spammers: Social honeypots + machine learning. In Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’10). ACM, New York, NY, 435--442.
[59]
A. Massanari. 2015. #Gamergate and the fappening: How Reddit’s algorithm, governance, and culture support toxic technocultures. New Media Soc. 19, 3 (2015), 329--346.
[60]
M. McCord and M. Chuah. 2011. Spam detection on twitter using traditional classifiers. In Autonomic and Trusted Computing. Springer, Berlin, 175--186.
[61]
Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. CoRR abs/1301.3781 (2013).
[62]
Meagan Miller. 2016. Retrieved from goo.gl/n1W6nt.
[63]
Torill Elvira Mortensen. 2016. Anger, fear, and games: The long event of #GamerGate. Games Culture 13, 8 (2016), 787--806.
[64]
Vinita Nahar, Sayan Unankard, Xue Li, and Chaoyi Pang. 2012. Sentiment analysis for effective detection of cyber bullying. In Proceedings of the Asian Pacific Web Conference (APWeb’12).
[65]
Gonzalo Navarro. 2001. A guided tour to approximate string matching. Comput. Surveys 33, 1 (2001).
[66]
Shirin Nilizadeh, François Labrèche, Alireza Sedighian, Ali Zand, José Fernandez, Christopher Kruegel, Gianluca Stringhini, and Giovanni Vigna. 2017. Poised: Spotting twitter spam off the beaten paths. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’17).
[67]
Chikashi Nobata, Joel Tetreault, Achint Thomas, Yashar Mehdad, and Yi Chang. 2016. Abusive language detection in online user content. In Proceedings of the Conference on the World Wide Web (WWW’16).
[68]
Donie O’Sullivan. 2018. Bomb suspect threatened people on Twitter, and Twitter didn’t act. Retrieved fromxbrk https://edition.cnn.com/2018/10/26/tech/cesar-sayoc-twitter-response/index.html.
[69]
Jeffrey Pennington, Richard Socher, and Christopher D. Manning. 2014. GloVe: Global vectors for word representation. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP’14). 1532--1543. Retrieved from http://www.aclweb.org/anthology/D14-1162.
[70]
Pew Research Center. 2014. Retrieved from http://www.pewinternet.org/2017/07/11/online-harassment-2017/.
[71]
J. Pfeffer, T. Zorbach, and K. M. Carley. 2014. Understanding online firestorms: Negative word-of-mouth dynamics in social media networks. J. Market. Commun. 20, 1--2 (2014).
[72]
Pham, Sherisse. 2017. Twitter tries new measures in crackdown on harassment. CNNtech. Retrieved from https://money.cnn.com/2017/02/07/technology/twitter-combat-harassment-features/.
[73]
Stephanie Pieschl, Torsten Porsch, Tobias Kahl, and Rahel Klockenbusch. 2013. Relevant dimensions of cyberbullying—Results from two experimental studies. J. Appl. Dev. Psychol. 34, 5 (2013).
[74]
Robert Plutchik. 1980. A general psychoevolutionary theory of emotion. Theor. Emot. 1 (1980), 3--31.
[75]
Associated Press. 2016. Retrieved from https://www.dailymail.co.uk/wires/ap/article-3419263/Venezuela-doctors-worried-official-silence-Zika.htm.
[76]
J. R. Quinlan. 1986. Induction of decision trees. Mach. Learn. 1, 1 (1986).
[77]
Edward Raff. 2017. JSAT: Java statistical analysis tool, a library for machine learning. J. Mach. Learn. Res. 18, 23 (2017), 1--5. Retrieved from http://jmlr.org/papers/v18/16-131.html.
[78]
Twitter Safety. 2017. Enforcing new rules to reduce hateful conduct and abusive behavior. Retrieved from https://blog.twitter.com/official/en_us/topics/company/2017/safetypoliciesdec2017.html.
[79]
Huascar Sanchez and Shreyas Kumar. 2011. Twitter bullying detection. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI’11).
[80]
A. Saravanaraj, J. I. Sheeba, and S. Pradeep Devaneyan. 2016. Automatic detection of cyberbullying from twitter. Int. J. Comput. Sci. Info. Technol. Secur. 6 (2016).
[81]
SentiStrength. 2017. Retrieved from http://sentistrength.wlv.ac.uk/.
[82]
P. K. Smith, J. Mahdavi, M. Carvalho, S. Fisher, S. Russell, and N. Tippett. 2008. Cyberbullying: Its nature and impact in secondary school pupils. In Child Psychology and Psychiatry. Cambridge University Press.
[83]
Richard Socher, Alex Perelygin, Jean Y. Wu, Jason Chuang, Christopher D. Manning, Andrew Y. Ng, and Christopher Potts. 2013. Recursive deep models for semantic compositionality over a sentiment treebank. In Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP’13), Vol. 1631, page 1642.
[84]
Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15, 1 (2014), 1929--1958.
[85]
Statista. 2019. Number of monthly active Twitter users worldwide from 1st quarter 2010 to 1st quarter 2019. Retrieved from https://www.statista.com/statistics/282087/number-of-monthly-active-twitter-users/.
[86]
stopbullying.gov. 2014. Facts About Bullying. Retrieved from https://www.stopbullying.gov/media/facts/index.html.
[87]
Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2010. Detecting spammers on social networks. In Proceedings of the Annual Computer Security Applications Conference (ACSAC’10).
[88]
Aatif Sulleyman. 2017. Twitter temporarily limiting users for abusive behaviour. Independent. Retrieved from goo.gl/yfJrZn.
[89]
Theano. 2017. Retrieved from http://deeplearning.net/software/theano/.
[90]
Aditya Timmaraju and Vikesh Khanna. 2015. Sentiment analysis on movie reviews using recursive and recurrent neural network architectures. Semantic Scholar (2015).
[91]
Naftali Tishby and Noga Zaslavsky. 2015. Deep learning and the information bottleneck principle. In Proceedings of the Information Theory Workshop (ITW’15). IEEE, 1--5.
[92]
Robert S. Tokunaga. 2010. Review: Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Comput. Hum. Behav. 26, 3 (2010).
[93]
Tweet NLP. 2018. Retrieved from http://www.cs.cmu.edu/∼ark/TweetNLP/.
[94]
Twitter. 2017. About suspended accounts in Twitter. Retrieved from https://help.twitter.com/en/managing-your-account/suspended-twitter-accounts?lang=browser.
[95]
Twitter. 2018. Twitter API. Retrieved from https://developer.twitter.com/en/docs/accounts-and-users/follow-search-get-users/api-reference/get-followers-ids.
[96]
UMICH SI650—Sentiment Classification. 2011. Retrieved from https://inclass.kaggle.com/c/si650winter11.
[97]
Cynthia Van Hee, Els Lefever, Ben Verhoeven, Julie Mennes, Bart Desmet, Guy De Pauw, Walter Daelemans, and Véronique Hoste. 2015. Automatic detection and prevention of cyberbullying. In Proceedings of the Conference on Human and Social Analytics.
[98]
A. H. Wang. 2010. Don’t follow me: Spam detection in twitter. In Proceedings of the International Conference on Security and Cryptography (SECRYPT’10).
[99]
J. B. Watson. 1930. Behaviorism. University of Chicago Press, Chicago.
[100]
Matthew Weaver. 2017. BBC accused of discrimination as salaries reveal gender pay gap—as it happened. Retrieved from https://www.theguardian.com/media/live/2017/jul/19/bbc-publishes-salaries-of-highest-earning-stars-live-updates.
[101]
Nick Wingfield. 2014. Feminist Critics of Video Games Facing Threats in “GamerGate” Campaign. New York Times. Retrieved from https://www.nytimes.com/2014/10/16/technology/gamergate-women-video-game-threats-anita-sarkeesian.html.
[102]
Qing Zou and Eun G. Park. 2015. Trust and trust building of virtual communities in the networked age. In Handbook of Research on Emerging Developments in Data Privacy. IGI Global, 300--328.

Cited By

View all
  • (2024)Unravelling Adolescent PerceptionsInvestigating and Combating Gender-Related Victimization10.4018/979-8-3693-5436-0.ch002(25-45)Online publication date: 5-Apr-2024
  • (2024)Protecting Privacy on Social Media: Mitigating Cyberbullying and Data Heist Through Regulated Use and Detox, with a Mediating Role of Privacy Safety MotivationsSocial Media + Society10.1177/2056305124130633110:4Online publication date: 16-Dec-2024
  • (2024)INCEPT: A Framework for Duplicate Posts Classification with Combined Text RepresentationsACM Transactions on the Web10.1145/367732218:3(1-24)Online publication date: 15-Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on the Web
ACM Transactions on the Web  Volume 13, Issue 3
August 2019
156 pages
ISSN:1559-1131
EISSN:1559-114X
DOI:10.1145/3352383
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 October 2019
Accepted: 01 June 2019
Revised: 01 April 2019
Received: 01 April 2018
Published in TWEB Volume 13, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Online social networks (OSNs)
  2. aggression
  3. bullying
  4. twitter

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • European Union's Marie Sklodowska-Curie grant agreement (project ENCASE)

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)269
  • Downloads (Last 6 weeks)43
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Unravelling Adolescent PerceptionsInvestigating and Combating Gender-Related Victimization10.4018/979-8-3693-5436-0.ch002(25-45)Online publication date: 5-Apr-2024
  • (2024)Protecting Privacy on Social Media: Mitigating Cyberbullying and Data Heist Through Regulated Use and Detox, with a Mediating Role of Privacy Safety MotivationsSocial Media + Society10.1177/2056305124130633110:4Online publication date: 16-Dec-2024
  • (2024)INCEPT: A Framework for Duplicate Posts Classification with Combined Text RepresentationsACM Transactions on the Web10.1145/367732218:3(1-24)Online publication date: 15-Jul-2024
  • (2024)“HOT” ChatGPT: The Promise of ChatGPT in Detecting and Discriminating Hateful, Offensive, and Toxic Comments on Social MediaACM Transactions on the Web10.1145/364382918:2(1-36)Online publication date: 2-Feb-2024
  • (2024)Systemization of Knowledge (SoK): Creating a Research Agenda for Human-Centered Real-Time Risk Detection on Social Media PlatformsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642315(1-21)Online publication date: 11-May-2024
  • (2024)Understanding the Evolution of Abusive Behaviour in Online Social Networks2024 3rd International Conference for Innovation in Technology (INOCON)10.1109/INOCON60754.2024.10511522(1-7)Online publication date: 1-Mar-2024
  • (2024)Detection of Cyberbullying Incidents on the X Social Network2024 2nd International Conference on Technology Innovation and Its Applications (ICTIIA)10.1109/ICTIIA61827.2024.10761832(1-6)Online publication date: 12-Sep-2024
  • (2024)Advanced Cyberbullying Detection: A Hybrid Model Integrated with Naïve Bayes2024 Third International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)10.1109/ICEEICT61591.2024.10718535(1-5)Online publication date: 24-Jul-2024
  • (2024)Racists spreader is narcissistic; sexists is Machiavellian Influence of Psycho-Sociological Facets in hate-speech diffusion predictionExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.123211247:COnline publication date: 1-Aug-2024
  • (2024)A comprehensive review of cyberbullying-related content classification in online social mediaExpert Systems with Applications10.1016/j.eswa.2023.122644244(122644)Online publication date: Jun-2024
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media