Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1051))

  • 720 Accesses

Abstract

The paper is focused on recognition of antisocial behavior in social media. User generated content in the form of discussions is essential to the success of many online platforms. While most users tend to civil accepting the social norms, others engage in antisocial behavior negatively affecting the rest of the community and its goals. Such behavior includes harassment, bullying, flaming, trolling, etc. The contribution is focused on classification of troll posts in online discussions to distinguish them from creditable posts. The work proposes a machine learning approach to build the classification model for toxic posts identification on an extensive dataset. The following machine learning methods were used: k Nearest Neighbors, Naïve Bayes Classifier, Decision Trees, Logistic regression and Support Vector Machine. These machine learning methods were used in combination with three different feature representations of texts of online discussions as a binary vector, a bag of words and the TF-IDF weighting scheme. The paper contains also the results of experiments with all learned models for toxic posts recognition.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kumar, S., West, Ř., Leskovec, J.: Disinformation on the web. In: Proceedings of the 25th International on Word Wide Web – WWW16. Association for Computing Machinery, pp. 591–602. ACM, Montreal (2016)

    Google Scholar 

  2. Lessne, X., Hermalkar, X.: Student Reports of Bullying and Cyber-Bullying: Results from the 2011 School Crime Supplement to the National Crime Victimization Survey, Web Tables, NCES 2013-329. http://nces.ed.gov/. Accessed 25 May 2019

  3. March, E.: ‘Don’t feed the trolls’ really is good advice – here’s the evidence. https://theconversation.com/dont-feed-the-trolls-really-is-good-advice-heres-the-evidence-63657. Accessed 25 May 2019

  4. Wang, S.E., Garcia-Molina, H.: Disinformation Techniques for Entity resolution. In: Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, New York, USA, pp. 715–720 (2013)

    Google Scholar 

  5. Řimnáč, M.: Detection of a disinformation content – case study Novičok in CR. In: Proceedings of the Conference Data a znalosti & WIKT 2018, Brno, Vysoké učení technické, pp. 65–69 (2018)

    Google Scholar 

  6. Dematis, I., Karapistoli, E., Vakali, A.: Fake review detection via exploitation os spam indicators and reviewer behaviour characteristics. In: Proceedings of the 44th International Conference on Current Trends in Theory and Practice of Computer Science beyond Frontiers - SOFSEM 2018. Lecture Notes in Computer Science, Krems an der Donau, pp. 1–14. Springer, Heidelberg (2018)

    Google Scholar 

  7. Samuel, A.L.: Some studies in machine learning using the game of checkers. IBM J. Res. Dev. 3(3), 210–229 (1959)

    Article  MathSciNet  Google Scholar 

  8. Russell, S.J., Norvig, P.: Artificial Intelligence. A Modern Approach, 3rd edn. Prentice Hall, Pearson Education, New Jersey (2010). ISBN-13 978-0-13-604259-4

    Google Scholar 

  9. Tan, S.: Neighbor-weighted K-nearest neighbor for unbalanced text corpus. Expert Syst. Appl. 28(4), 667–671 (2005)

    Article  Google Scholar 

  10. Cunningham, P., Delany, S.J.: k-Neighbour classifiers. Technical report, pp. 1–17, Dublin (2007)

    Google Scholar 

  11. Jiang, S., et al.: An improved k-nearest neighbor algorithm for text categorization. Expert Syst. Appl. 30(1), 1503–1509 (2012)

    Article  Google Scholar 

  12. Pang, B., Lee, L., Vaithyanathan, S.: Thumbs up? Sentiment classification using machine learning techniques. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP), Philadelphia, pp. 79–86 (2002)

    Google Scholar 

  13. Kingsford, C., Salzberg, S.L.: What are decision trees? Nat. Biotechnol. 26(1), 1011–1013 (2008)

    Article  Google Scholar 

  14. Orphanos, G., et al.: Decision Trees and NLP: A Case Study in POS Tagging. Academia, pp. 1–7 (1999)

    Google Scholar 

  15. Magerman, D.M., et al.: Statistical decision-tree models for parsing. In: Proceeding ACL 1995 Proceedings of the 33rd Annual Meeting on Association for Computational Linguistics, pp. 276–283 (1995)

    Google Scholar 

  16. Cox, D.R.: The regression analysis of binary sequences. J. R. Stat. Soc. 20(2), 215–242 (1958)

    MathSciNet  MATH  Google Scholar 

  17. Zhang, J., et al.: Modified logistic regression: an approximation to SVM and its applications in large-scale text categorization. In: Proceedings of the Twentieth International Conference on Machine Learning, Washington DC, pp. 888–895 (2003)

    Google Scholar 

  18. Ben-Hur, A., et al.: Support vector clustering. J. Mach. Learn. Res. 2(2), 125–137 (2001)

    MATH  Google Scholar 

  19. Wulczyn, E., Thain, N., Dixon, L.: Ex machina: personal attacks seen at scale. In: Proceedings of the International World Wide Web Conference (WWW 2017), Perth, Australia, 3–7 April 2017, pp. 1391–1399 (2017)

    Google Scholar 

  20. Hosted by Kaggle.com, Toxic Comment Classification Challenge. https://www.kaggle.com/c/jigsaw-toxic-comment-classification-challenge. Accessed 26 May 2019

  21. Švec, A., Pikuliak, M., Šimko, M., Bieliková, M.: Improving moderation of online discussions via interpretable neural models. FIIT Slovak University of Technology, Bratislava, Slovakia, pp. 1–6 (2018)

    Google Scholar 

  22. Chandrasekharan, E., Samory, M., Srinivasan, A., Gilbert, E.: The bag of communities: identifying abusive behavior online with preexisting internet data. In: Proceedings of the CHI Conference on Human Factors in Computing Systems, pp. 3175–3187. ACM (2017)

    Google Scholar 

  23. Ventirozos, F.K., Varlamis, I., Tsatsaronis, G.: Detecting aggressive behavior in discussion threads using text mining. In: CICLing 2017. LNCS, vol. 10762, pp. 420–431. Springer, Cham (2018)

    Chapter  Google Scholar 

  24. Seah, C.W., et al.: Troll detection by domain-adapting sentiment analysis. In: Proceedings of the 18th International Conference on Information Fusion Washington, DC, pp. 792–799 (2015). 978-0-9824-4386-6/15/$31.00 ©2015 IEEE

    Google Scholar 

  25. Mutlu, B., et al.: Identifying trolls and determining terror awareness level in social networks using a scalable framework. In: Proceedings of IEEE International Conference on Big Data, pp. 1792–1798 (2016). 978-1-4673-9005-7/16/$31.00 ©2016 IEEE

    Google Scholar 

  26. Saeed, H.H., Shahzad, K., Kamiran, F.: Overlapping toxic sentiment classification using deep neural architectures. In: Proceedings of IEEE International Conference on Data Mining Workshops (ICDMW), pp. 1361–1366 (2018). 2375-9259/18/$31.00 ©2018 IEEE

    Google Scholar 

  27. Saif, M.A., et al.: classification of online toxic comments using the logistic regression and neural networks models. In: Proceedings of the 44th International Conference on Applications of Mathematics in Engineering and Economics, pp. 1–5. AIP Publishing (2018). 978-0-7354-1774-8/$30.00

    Google Scholar 

  28. Fazil, M., Abulaish, M.: A hybrid approach for detecting automated spammers in Twitter. IEEE Trans. Inf. Forensics Secur. 13, 1556–6013 (2018)

    Article  Google Scholar 

  29. Mikula, M., Machová, K.: Combined approach for sentiment analysis in Slovak using a dictionary annotated by particle swarm optimization. In: Acta Elektrotechnica et Informatica, vol. 18, no. 2, pp. 27–34 (2018). ISSN 1335–8243

    Article  Google Scholar 

Download references

Acknowledgements

The work presented in this paper was supported by the Slovak Research and Development Agency under the contract No. APVV-017-0267 “Automated Recognition of Antisocial Behavior in Online Communities” and the contract No. APVV-015-0731.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kristína Machová .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Machová, K., Kolesár, D. (2020). Recognition of Antisocial Behavior in Online Discussions. In: Świątek, J., Borzemski, L., Wilimowska, Z. (eds) Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology – ISAT 2019. ISAT 2019. Advances in Intelligent Systems and Computing, vol 1051. Springer, Cham. https://doi.org/10.1007/978-3-030-30604-5_23

Download citation

Publish with us

Policies and ethics