skip to main content
10.1145/3328833.3328869acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsieConference Proceedingsconference-collections
research-article

Bullying Hurts: A Survey on Non-Supervised Techniques for Cyber-bullying Detection

Published:09 April 2019Publication History

ABSTRACT

The contemporary period is scarred by the predominant place of social media in everyday life. Despite social media being a useful tool for communication and social gathering it also offers opportunities for harmful criminal activities. One of these activities is cyber-bullying enabled through the abuse and mistreatment of the internet as a means of bullying others virtually. As a way of minimising this occurrence, research into computer-based researched is carried out to detect cyber-bullying by the scientific research community. An extensive literature search shows that supervised learning techniques are the most commonly used methods for cyber-bullying detection. However, some non-supervised techniques and other approaches have proven to be effective towards cyber-bullying detection. This paper, therefore, surveys recent research on non-supervised techniques and offers some suggestions for future research in textual-based cyber-bullying detection including detecting roles, detecting emotional state, automated annotation and stylometric methods.

References

  1. V. Skye Wingate, Jessy A. Minney & Rosanna E. Guadagno (2013) Sticks and stones may break your bones, but words will always hurt you: A review of cyberbullying, Social Influence, 8:2--3, 87--106.Google ScholarGoogle ScholarCross RefCross Ref
  2. Lester, David, and Stephanie McSwain. "Suicide and the Internet: the case of Amanda Todd." International journal of emergency mental health 15.3 (2013): 179--180.Google ScholarGoogle Scholar
  3. Washko, Angela. "From Webcams to Wikipedia There Is An Art & Feminism Online Social Movement: Happening and It Is Not Going Away." Nordisk Tidsskrift for Informationsvidenskab og Kulturformidling 5, no. 1 (2016): 43--52.Google ScholarGoogle ScholarCross RefCross Ref
  4. Kennedy, Melanie, and Natalie Coulter. "Introduction: Locating Tween Girls." Girlhood Studies 11.1 (2018): 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  5. Di Capua, Michele, Emanuel Di Nardo, and Alfredo Petrosino. "Unsupervised cyber bullying detection in social networks." Pattern Recognition (ICPR), 2016 23rd International Conference on. IEEE, 2016.Google ScholarGoogle Scholar
  6. E. Raisi and B. Huang, "Weakly Supervised Cyberbullying Detection Using Co-Trained Ensembles of Embedding Models," in International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Barcelona, 2018.Google ScholarGoogle Scholar
  7. M. Devi, "Fuzzy Based Genetic Operators for Cyber Bullying Detection Using Social Network Data," International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT, p. 8, 2018.Google ScholarGoogle Scholar
  8. Zhao, Rui, and Kezhi Mao. "Cyberbullying detection based on semantic-enhanced marginalized denoising auto encoder." IEEE Transactions on Affective Computing 8.3 (2017): 328--339.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Balgi, A. Anand,. Neelkantappa, "Cyberbullying Detection based on Semantic Enhanced Marginalized Stacked Denoising Auto Encoder" International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), p. 5, 2018.Google ScholarGoogle Scholar
  10. V. N. Srinivas and V. Bethimeedi, "Detection of Text based Cyberbullying," International Journal of Computer Science and Mobile Computing IJCSMC, vol. 6, no. 8, p. 6, 2017.Google ScholarGoogle Scholar
  11. B. Haidar, M. Chamoun and A. Serhouchni, "Arabic Cyberbullying Detection: Using Deep Learning," in International Conference on Computer and Communication Engineering (ICCCE), 2018.Google ScholarGoogle Scholar
  12. H. Rosa, D. Matos, R. Ribeiro, L. Coheur and J. P. Carvalho, "A Deeper look at Detecting Cyberbullying in Social Networks," in International Joint Conference on Neural Networks (IJCNN), 2018.Google ScholarGoogle Scholar
  13. Bu, Seok-Jun, and Sung-Bae Cho. "A Hybrid Deep Learning System of CNN and LRCN to Detect Cyberbullying from SNS Comments." In International Conference on Hybrid Artificial Intelligence Systems, pp. 561--572. Springer, Cham, 2018.Google ScholarGoogle Scholar
  14. H. Zhong, H. Li, A. Squicciarini, S. Rajtmajer, C. Griffin, D. Miller and C. Caragea, "Content-Driven Detection of Cyberbullying on the Instagram Social Network," in Proceedinngs of the 25th International Joint Conference on Artificial Intelligence (IJCAI-16), New York, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mohammadreza Ebrahimi et al., Recognizing Predatory Chat Documents using Semi-supervised Anomaly Detection, Montreal, Quebec: Society for Imaging Science and Technology, 2016.Google ScholarGoogle Scholar
  16. V. Nahar and S. Al-Maskari, "Semi-Supervised Learning for Cyberbullying; Xue Li; Chaoyi Pang," in Australasian Database Conference, 2014.Google ScholarGoogle Scholar
  17. Potha, Nektaria, and Manolis Maragoudakis. "Time series forecasting in cyberbullying data." In Engineering Applications of Neural Networks, pp. 289--303. Springer, Cham, 2015..Google ScholarGoogle Scholar
  18. Potha, Nektaria, Manolis Maragoudakis, and D. Lyras. "A biology-inspired, data mining framework for extracting patterns in sexual cyberbullying data." Knowledge-Based Systems 96 (2016): 134--155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Yao, C. Chelmis and D. S. Zois, "Cyberbullying Detection on Instagram with Optimal Online Feature Selection," in International Conferences on Advances in Social Networks Analysis and Mining (ASONAM), Barcelona, 2018.Google ScholarGoogle Scholar
  20. M. X. Y. G. R. Hendro, "Clustering Indonesian Cyberbullying Words in Social Networks," International Journal of Computer Science and Electronics Engineering (IJCSEE), p. 3, 2015.Google ScholarGoogle Scholar
  21. Romsaiyud, Walisa, Kodchakorn na Nakornphanom, Pimpaka Prasertsilp, Piyaporn Nurarak, and Pirom Konglerd. "Automated cyberbullying detection using clustering appearance patterns." In Knowledge and Smart Technology (KST), 2017 9th International Conference on, pp. 242--247. IEEE, 2017.Google ScholarGoogle Scholar
  22. Z. Zainol, S. Wani, P. N. Nohuddin, W. M. Noormanshah and S. Marzukhi, "Association Analysis of Cyberbullying on Social Media using Apriori Algorithm," International Journal of Engineering & Technology, p. 6, 2018.Google ScholarGoogle Scholar
  23. Liu, Leqi, Daniel Preotiuc-Pietro, Zahra Riahi Samani, Mohsen Ebrahimi Moghaddam, and Lyle H. Ungar. "Analyzing Personality through Social Media Profile Picture Choice." In ICWSM, pp. 211--220. 2016.Google ScholarGoogle Scholar

Index Terms

  1. Bullying Hurts: A Survey on Non-Supervised Techniques for Cyber-bullying Detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICSIE '19: Proceedings of the 8th International Conference on Software and Information Engineering
      April 2019
      276 pages
      ISBN:9781450361057
      DOI:10.1145/3328833

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 April 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader