2018
DOI: 10.1145/3290838
|View full text |Cite
|
Sign up to set email alerts
|

A Socio-Contextual Approach in Automated Detection of Public Cyberbullying on Twitter

Abstract: Cyberbullying is a major cyber issue that is common among adolescents. Recent reports show that more than one out of five students in the United States is a victim of cyberbullying. Majority of cyberbullying incidents occur on public social media platforms such as Twitter. Automated cyberbullying detection methods can help prevent cyberbullying before the harm is done on the victim. In this study, we analyze two corpora of cyberbullying tweets from similar incidents to construct and validate an automated detec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“… Chatzakou et al (2019) Robust methodology To separate bullies and attackers from regular Twitter users Twitter Textual, User-based, Network-based Classify the accounts with an accuracy of over 90% and an AUC. Tahmasbi and Rastegari (2018) Socio-contextual approach To create and test a model for automatic detection Twitter Textual, Sentimental, Contextual It gives information about several scenarios to detect cyberbullying. …”
Section: Background and Related Workmentioning
confidence: 99%
“… Chatzakou et al (2019) Robust methodology To separate bullies and attackers from regular Twitter users Twitter Textual, User-based, Network-based Classify the accounts with an accuracy of over 90% and an AUC. Tahmasbi and Rastegari (2018) Socio-contextual approach To create and test a model for automatic detection Twitter Textual, Sentimental, Contextual It gives information about several scenarios to detect cyberbullying. …”
Section: Background and Related Workmentioning
confidence: 99%
“…SOP links the saved information to a specific domain, so the information can only be retrieved from the original domain. When SOP is applied, the browser tests the port number, name of host, and protocol against the source record of the saved data [2].…”
Section: Security Issuesmentioning
confidence: 99%
“…HTML5 brought new technologies, such as local storage, web Socket, and enhanced XHR. With these technologies and modules, it has improved the surface of the attack and added new risks to the end-user, which means that the SOP will not help [2]. The weaknesses of SOP led to many aggressions, such as "crosssite scripting (XSS), cross-site request forgeries (CSRF), cross-origin resource sharing (CORS) attacks, social engineering, and physical access" [17].…”
Section: Security Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…Different types of data can be saved in object storage, and it ranges from simple data types (e.g., date, string and array), to classified objects (e.g., JSON and JavaScript Object). It permits objects to be retrieved/ saved with keys [11]. Indexed DB has numerous advantages, like offering fast access to large volumes of structured data, a bigger storage capacity than what's available in other user-side storages, using indexes for effective searches, and the ability to duplicate the values of the keys.…”
Section: Introductionmentioning
confidence: 99%