2019
DOI: 10.35940/ijrte.b1001.0782s419
|View full text |Cite
|
Sign up to set email alerts
|

Identification and Classification of Cyberbully Incidents using Bystander Intervention Model

Abstract: Cyberharassment is bullying and degrading the adults by means of posting the comments like hurtful and derogatory humor over the internet in an online community. Though few bystanders ever try to reduce the conflicting effects of cyberbullying, and bystanders ever endeavor to interrupt. This will analyze the chattels of articulatory study on bystander intervention using the caricatured procedural made online Social Networking Sites. The proposed works mainly focus on the analysis of direct intervention by byst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Access control policy [47][48][49][50][51] in fog computing is known as if the user needs to access some devices in order to do storage and computational services it should be properly authorized by data and services. Both the cloud and Fog environment need to be reciprocally need access control policies.…”
Section: E Access Control In Fog Techniquementioning
confidence: 99%
“…Access control policy [47][48][49][50][51] in fog computing is known as if the user needs to access some devices in order to do storage and computational services it should be properly authorized by data and services. Both the cloud and Fog environment need to be reciprocally need access control policies.…”
Section: E Access Control In Fog Techniquementioning
confidence: 99%