Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1134))

Abstract

This article focuses on cyber security issues related to content. Recent surveys show that youth are being exposed to cyber-aggression at increasing rates, with over 43% of youth reporting in one recent survey that they have been bullied online. While research into this problem has been growing, the research community is hampered by a lack of authentic data for studying communication with and among youth. A large corpus with 800,000 instances of cell phone textual data from youth ages 10–14 has been developed to address this need. This article describes the dataset, as well as plans to enable access to the data while protecting the privacy of the study participants. The results from machine learning experiments for the detection of cyberbullying based on labeled data from several sources, including both SMS and social media messages, are also discussed. These algorithms are shown to be effective at detecting cyberbullying across platforms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Moessner, C.: Cyberbullying, trends and tudes. http://ncpc.mediaroom.com/download/Trends+%26+Tudes+-+Harris+Interactive.pdf (2019)

  2. Bigelow, J.L., Edwards, A., Edwards, L.: Detecting cyberbullying using latent semantic indexing. In: Proceedings of the First International Workshop on Computational Methods for CyberSafety, pp. 11–14. ACM (2016)

    Google Scholar 

  3. Dadvar, M., de Jong, F., Ordelman, R., Trieschnigg, R.: Improved cyberbullying detection using gender information. In: Proceedings of the Twelfth Dutch-Belgian Information Retrieval Workshop (DIR 2012), pp. 23–25. University of Ghent (2012)

    Google Scholar 

  4. Dinakar, K., Reichart, R., Lieberman, H.: Modeling the detection of textual cyberbullying. In: Social Mobile Web Workshop at International Conference on Weblog and Social Media. AAAI (2011)

    Google Scholar 

  5. Reynolds, K., Kontostathis, A., Edwards, L.: Using machine learning to detect cyberbullying. In: Proceedings of the 2011 10th International Conference on Machine Learning and Applications and Workshops, pp. 241–244. IEEE Computer Society (2011)

    Google Scholar 

  6. Al-Garadi, M.A., Hussain, M.R., Khan, N., Murtaza, G., Nweke, H.F., Ali, I., Mujtaba, G., Chiroma, H., Khattak, H.A., Gani, A.: Predicting cyberbullying on social media in the big data era using machine learning algorithms: review of literature and open challenges. IEEE Access. 7, 70701–70718 (2019)

    Article  Google Scholar 

  7. What is cyberbullying. https://www.stopbullying.gov/cyberbullying/what-is-it/index.html (2018)

  8. Willard, N.E.: Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress. Research Press, Champaign (2007)

    Google Scholar 

  9. Olweus, D.: Bullying at School: What We Know and What We Can Do. Blackwell, Oxford (1993)

    Google Scholar 

  10. Lenhart, A., Smith, A., Anderson, M., Duggan, M., Perrin, A.: Teens, Technology, and Friendships. Pew Research Center, Washington, DC. http://www.pewinternet.org/files/2015/08/Teens-and-Friendships-FINAL2.pdf (2015)

    Google Scholar 

  11. Edwards, L., Kontostathis, A.: Reclaiming privacy: reconnecting victims of cyberbullying and cyberpredation. In: Proceedings of the Reconciling Privacy with Social Media Workshop, Held in Conjunction with the 2012 ACM Conference on Computer Supported Cooperative Work. ACM (2012)

    Google Scholar 

  12. Galán-García, P., de la Puerta, J.G., Gómez, C.L., Santos, I., Bringas, P.G.: Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying. In: International Joint Conference SOCO’13-CISIS’13-ICEUTE’13, pp. 419–428. Springer (2014)

    Google Scholar 

  13. Weka 3: data mining software in Java. https://www.cs.waikato.ac.nz/ml/weka/ (2019)

  14. Quinlan, J.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Mateo (1993)

    Google Scholar 

  15. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)

    Article  Google Scholar 

  16. John, G.H., Langley, P.: Estimating continuous distributions in bayesian classifiers. In: Eleventh Conference on Uncertainty in Artificial Intelligence, pp. 338–345. Morgan Kaufmann, San Mateo (1995)

    Google Scholar 

  17. Platt, J.: Fast training of support vector machines using sequential minimal optimization. In: Advances in Kernel Methods - Support Vector Learning, pp. 185–208. MIT Press, Cambridge, MA (1999)

    Google Scholar 

  18. Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning internal representations by error propagation. Parallel distributed processing. In: Parallel Distributed Processing: Explorations in the Microstructure of Cognition, vol. 1: Foundations, pp. 318–362. MIT Press, Cambridge (1986)

    Chapter  Google Scholar 

  19. Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55(1), 119–139 (1997)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This material is based upon work supported in part by the National Science Foundation under Grant Nos. 0916152, 1812380 and 1421896. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to April Edwards .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Edwards, A., Demoll, D., Edwards, L. (2020). Detecting Cyberbullying Activity Across Platforms. In: Latifi, S. (eds) 17th International Conference on Information Technology–New Generations (ITNG 2020). Advances in Intelligent Systems and Computing, vol 1134. Springer, Cham. https://doi.org/10.1007/978-3-030-43020-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43020-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43019-1

  • Online ISBN: 978-3-030-43020-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics