2014 28th International Conference on Advanced Information Networking and Applications Workshops 2014
DOI: 10.1109/waina.2014.70
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Contact Network Generation for Cyber-bullying Detection

Abstract: Cyber-bullying is widely recognized as a serious social problem, especially for adolescents and it is also becoming a threat to the viability of online social networks. Several researchers have proposed digital-communication based frameworks whose goal is to help detect bullying in social networks. In this paper, our study focuses on detecting relation-based cyber-bullying, which is an indirect attack on a human, e.g., isolating a victim by ignoring the victim's messages. Recently, relationship-based cyber-bul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…To eliminate the effects of language on cyberbully detection when comparing the reviewed studies, we excluded papers using non-English corpora; thus a further 7 papers were excluded. These included papers such as Ptazynski et al (2010a;, Honjo et al (2011), Nitta et al (2013), Li and Tagami (2014), Margono et al (2014) and Van Hee et al (2015) which were removed as they used non-English corpora.…”
Section: Data Search and Selectionmentioning
confidence: 99%
“…To eliminate the effects of language on cyberbully detection when comparing the reviewed studies, we excluded papers using non-English corpora; thus a further 7 papers were excluded. These included papers such as Ptazynski et al (2010a;, Honjo et al (2011), Nitta et al (2013), Li and Tagami (2014), Margono et al (2014) and Van Hee et al (2015) which were removed as they used non-English corpora.…”
Section: Data Search and Selectionmentioning
confidence: 99%
“…They also tried to find untrustworthy profile of user on the basis of age, time spent online and types of online access and then classify the risk based on these profiles and suggest safety as a result. Li et al (2014), created the contact network, by forming the undirected graph from the data and add missing links based on the hop count and similarity method, to identify the friendship relation. This study focused on the detection indirect bullying, e.g., isolates the target by disregarding the their messages.…”
Section: Related Workmentioning
confidence: 99%
“…Previous research in the field of cyberbullying detection has been driven by two paradigms which focus on two different types of analysis: network analysis and content analysis, although many studies combine both types of analyses. The social network analysis paradigm focuses on modelling interactions among users of a social network (Li & Tagami, 2014;Honjo et al, 2011;Hosseinmardi et al, 2014), based in particular on the usage statistics of digital media, such as sender and receiver IDs, account IDs, users' names, content, time and location of communication. Content analysis focuses on detecting cyberbullying instances based on text analytics and the use of Natural Language Processing (NLP) techniques, and, from this perspective, the task of cyberbullying detection was previously approached as a classification task (Yin et al, 2009) that involves data acquisition and pre-processing, feature extraction and classification.…”
Section: Introductionmentioning
confidence: 99%