Study of Cyberbullying Detection

International Journal of Computer Science and Engineering
© 2019 by SSRG - IJCSE Journal
Volume 6 Issue 5
Year of Publication : 2019
Authors : Huma Jameel,Neelam Duhan, Sana Shakeel

pdf
How to Cite?

Huma Jameel,Neelam Duhan, Sana Shakeel, "Study of Cyberbullying Detection," SSRG International Journal of Computer Science and Engineering , vol. 6,  no. 5, pp. 5-9, 2019. Crossref, https://doi.org/10.14445/23488387/IJCSE-V6I5P102

Abstract:

This paper is an overview of cyberbullying which occurs predominantly on social networking sites and issues and challenges in detecting cyberbullying. The topic presented in this paper starts with an introduction on cyberbullying: definition, categories and roles. Then, in the discussion of cyberbullying detection, feasible data sources, features and classification techniques used are reviewed. Natural Language Processing (NLP) and machine learning are the prominent approaches used to identify bullying keywords within the corpus. Finally, issues and challenges in cyberbullying detection are highlighted and discussed.

Keywords:

cyberbullying, social media, Twitter, detection

References:

[1] R. Forssell, "Exploring cyberbullying and face-to-face bullying in working life – Prevalence, targets and expressions," Computers in Human Behavior, vol. 58, pp. 454 - 460, 2016
[2]
[3] M. A. Al-garadi, K. D. Varathan, S. D. Ravana, "Cybercrime detection in online communications:The experimental case of cyberbullying detection in te Twitter network," Computers in Human Behavior, vol. 63, pp. 433 - 443, 2016.
[4] N. M. Zainudin, K. H. Zainal, N. A. Hasbullah, N. A. Wahab, and S. Ramli, “A review on cyberbullying in Malaysia from digital forensic perspective,” ICICTM 2016 - Proc. 1st Int. Conf. Inf. Commun. Technol., no. May, pp. 246–250, 2017.
[5] A. Saravanaraj, J. I. Sheebaassistant, S. Pradeep, and D. Dean, “Automatic Detection of Cyberbullying From Twitter,” IRACST International J. Comput. Sci. Inf. Technol. Secur., vol. 6, no. 6, pp. 2249–9555, 2016.
[6] S. Hinduja and J. W. Patchin, “Cyberbullying: Identification, Prevention, & Response,” Cyberbullying Res. Cent., no. October, pp. 1– 9, 2018.
[7] N. Willard, “Educator ‟ s Guide to Cyberbullying , Cyberthreats& Sexting,” Online, pp. 1–16, 2007.
[8] Q. Li, “Bullying in the new playground: Research into cyberbullying and cyber victimisation,” Australas. J. Educ. Technol., vol. 23, no. 4, p. 435, 2007.
[9] N. E. Willard, “Overview of Cyberbullying and Cyberthreats,” in Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress, Illinois: Reseach Press, 2007, pp. 5–16.
[10] A. Tooley, “Interview with Dr. Jonathan B. Singer on Cyberbullying,” MSWPrograms, 2018. [Online]. [Accessed: 28-May-2018].
[11] B. E. Palladinoet al., “Perceived severity of cyberbullying: Differences and similarities across four countries,” Front. Psychol., vol. 8, no. SEP, pp. 1–12, 2017.
[12] V. DallaPozza, M. Limited Anna Di Pietro, M. Limited Sophie Morel, M. Limited Emma Psaila, and M. Limited, “Cyberbulling among young people,” 2016.
[13] J. Xu, K. Jun, X. Zhu, and A. Bellmore, “Learning from Bullying Traces in Social Media,” Proc. 2012 Conf. North Am. Chapter Assoc. Comput. Linguist. Hum. Lang. Technol., pp. 656–666, 2012.
[14] S. B. R. Institute, “Cyberbullying/ Bullying Statistics,” Statistic Brain Research Institute, 2018. [Online]. Available: https://www.statisticbrain.com/cyber-bullying-statistics/.
[15] K. Dinakar, B. Jones, C. Havasi, H. Lieberman, and R. Picard, “Commonsense Reasoning for Detection, Prevention and Mitigation of Cyberbullying,” vol. 1, no. 212, 2012.
[16] C. Van Heeet al., “Automatic detection and prevention of cyberbullying,” Int. Conf. Hum. Soc. Anal. (HUSO 2015), no. c, pp. 13– 18, 2015.
[17] C. Van Heeet al., “Detection and Fine-Grained Classification of Cyberbullying Events,” Int. Conf. Recent Adv. Nat. Lang. Process., pp. 672–680, 2015.
[18] H. Hosseinmardi, S. A. Mattson, R. I. Rafiq, R. Han, Q. Lv, and S. Mishra, “Prediction of Cyberbullying Incidents on the Instagram Social Network,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 9471, pp. 49–66, 2015.
[19] R. Zhao, A. Zhou, and K. Mao, “Automatic detection of cyberbullying on social networks based on bullying features,” Proc. 17th Int. Conf. Distrib. Comput. Netw. - ICDCN ’16, pp. 1–6, 2016.
[20] S. Salawu, Y. He, and J. Lumsden, “Approaches to Automated Detection of Cyberbullying: A Survey,” IEEE Trans. Affect. Comput., pp. 1–25, 2017.
[21] B. Desmet and V. Hoste, “Recognising suicidal messages in Dutch social media,” Proc. Ninth Int. Conf. Lang. Resour. Eval., pp. 830–835, 2014.
[22] E. Raisi and B. Huang, “Cyberbullying Identification Using ParticipantVocabulary Consistency,” pp. 46–50, 2016.
[23] H. A. Schwartz et al., “Personality, Gender, and Age in the Language of Social Media: The Open-Vocabulary Approach,” PLoS One, vol. 8, no. 9, 2013.
[24] G. Jain and B. Agarwal, “An Overview of RNN and CNN Techniques for Spam Detection in Social Media,” vol. 6, no. 10, pp. 126–132, 2016.