2020
DOI: 10.1007/978-981-15-8354-4_72
|View full text |Cite
|
Sign up to set email alerts
|

Effectiveness of Cyberbullying Prevention Strategies in the UAE

Abstract: The ever rising Internet of Things, rapid globalization and technology advancement have created a valuable seamless platform for folks to interact, publish and share contents online over high-speed connections regardless of location and distance. Nonetheless, several benefits, proliferation of vigor and anonymity of the Internet create a permanent breeding ground for all forms of cyber threats globally and the UAE in particular including all sorts of online crime like sexual harassment, deception, cyborgs, com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…To summarize, and per our second goal, we propose that future research take into consideration and completely disclose a set of essential information in order to enhance the quality of future datasets, models, and the performance of classifiers. It is critical to give annotators clear instructions based on the characteristics that define cyberbullying (i.e., intentionality, repetition, aggression, and peer conduct), as well as to guarantee that the annotators are specialists in the area of cyberbullying [51][52][53][54]. Furthermore, data extraction from users should be acquired through peers, and users' privacy should be prioritized during this process [55].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…To summarize, and per our second goal, we propose that future research take into consideration and completely disclose a set of essential information in order to enhance the quality of future datasets, models, and the performance of classifiers. It is critical to give annotators clear instructions based on the characteristics that define cyberbullying (i.e., intentionality, repetition, aggression, and peer conduct), as well as to guarantee that the annotators are specialists in the area of cyberbullying [51][52][53][54]. Furthermore, data extraction from users should be acquired through peers, and users' privacy should be prioritized during this process [55].…”
Section: Discussionmentioning
confidence: 99%
“…The definition of the emotional component of the text is used to study various forms and manifestations of online aggressiveness: trolling [38,45], verbal hostility [39,[46][47][48], cyberbullying through mobile applications [34,41,49], various types of manipulation [50][51][52], inciting discord [53], etc. The network component of such a form of offline aggression as mass protest is the subject of a complex method of cybermetry, or cybermetric analysis [54][55][56].…”
Section: Machine Learningmentioning
confidence: 99%
“…However, text-based cyberbullying is the most popular form used by misbehaving users. Due to the enormous amount, variety, and velocity of data and information generated by users, manual detection and/or relying on user reports are not an efficient or effective way to overthrow cyberbullying [2,[7][8][9][10][11][12]. Accordingly, automatic cyberbullying detection is important to defend the cyber realm and protect communities and individuals.…”
Section: Introductionmentioning
confidence: 99%
“…Automatic detection of cyberbullying became the subject of many studies over the past few years [1,4,5,9,13,14]. However, cyberbullying has dramatically increased recently [2,15].…”
Section: Introductionmentioning
confidence: 99%