skip to main content
research-article

Cyberbullying Detection, Based on the FastText and Word Similarity Schemes

Published:25 November 2020Publication History
Skip Editorial Notes Section

Editorial Notes

The editors have requested minor, non-substantive changes to the VoR and, in accordance with ACM policies, a Corrected VoR was published on February 9, 2021. For reference purposes the VoR may still be accessed via the Supplemental Material section on this page.

Skip Abstract Section

Abstract

With recent developments in online social networks (OSNs), these services are widely applied in daily lives. On the other hand, cyberbullying, which is a relatively new type of harassment through the internet-based electronic devices, is rising in online social networks. Accordingly, scholars are attracted to investigating cyberbullying behaviors. Studies show that cyberbullying has a devastating effect on mental health, especially for teenagers. In order to reduce or even stop cyberbullying, different machine learning techniques are applied and numerous studies have been conducted so far. However, conventional detection schemes still have challenges, such as low accuracy. Therefore, it is of significant importance to find an efficient detection solution in the natural language processing and machine learning communities. In the present study, characteristics of cyberbullying are initially analyzed from vocabulary and syntax points of view. Then a new detection algorithm is proposed based on FastText and word similarity schemes. Finally, experiments are carried out to evaluate the effectiveness and performance of the proposed method. Obtained results show that the proposed algorithm can effectively improve the detection accuracy and recall rate of cyberbullying detection.

Skip Supplemental Material Section

Supplemental Material

References

  1. Mohammed Ali Al-garadi, Kasturi Dewi Varathan, and Sri Devi Ravana. 2016. Cybercrime detection in online communications: The experimental case of cyberbullying detection in the twitter network. Computers in Human Behavior 63 (2016), 433--443.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Monica Anderson. 2018. A Majority of Teens Have Experienced Some Form of Cyberbullying. Pew Research Center.Google ScholarGoogle Scholar
  3. Jennifer Bayzick, April Kontostathis, and Lynne Edwards. 2011. Detecting the Presence of Cyberbullying Using Computer Software. Ursinus College.Google ScholarGoogle Scholar
  4. Bill Belsey. 2005. Cyberbullying: An emerging threat to the “always on” generation. Recuperado el 5, 5 (2005), 2010.Google ScholarGoogle Scholar
  5. Piotr Bojanowski, Edouard Grave, Armand Joulin, and Tomas Mikolov. 2017. Enriching word vectors with subword information. Transactions of the Association for Computational Linguistics 5 (2017), 135--146.Google ScholarGoogle ScholarCross RefCross Ref
  6. Vikas S. Chavan and S. S. Shylaja. 2015. Machine learning approach for detection of cyber-aggressive comments by peers on social media network. In 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI’15). IEEE, 2354--2358.Google ScholarGoogle Scholar
  7. Maral Dadvar, Dolf Trieschnigg, Roeland Ordelman, and Franciska de Jong. 2013. Improving cyberbullying detection with user context. In European Conference on Information Retrieval. Springer, 693--696.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Stephen F. Davis, Patrick F. Drinan, and Tricia Bertram Gallant. 2009. Cheating in School. Wiley-Blackwell.Google ScholarGoogle Scholar
  9. Maria Fridh, Martin Lindström, and Maria Rosvall. 2015. Subjective health complaints in adolescent victims of cyber harassment: Moderation through support from parents/friends-a Swedish population-based study. BMC Public Health 15, 1 (2015), 949.Google ScholarGoogle ScholarCross RefCross Ref
  10. Homa Hosseinmardi, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2016. Prediction of cyberbullying incidents in a media-based social network. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’16). IEEE, 186--192.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. V. Karthik, Sannasi Ganapathy, and Arputharaj Kannan. 2018. A recommendation system for online purchase using feature and product ranking. In 2018 11th International Conference on Contemporary Computing (IC3’18). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  12. Qing Li. 2006. Cyberbullying in schools: A research of gender differences. School Psychology International 27, 2 (2006), 157--170.Google ScholarGoogle ScholarCross RefCross Ref
  13. Kimberly Miller. 2016. Cyberbullying and its consequences: How cyberbullying is contorting the minds of victims and bullies alike, and the law’s limited available redress. Southern California Interdisciplinary Law Journal 26 (2016), 379.Google ScholarGoogle Scholar
  14. Charisse L. Nixon. 2014. Current perspectives: the impact of cyberbullying on adolescent health. Adolescent Health, Medicine and Therapeutics 5 (2014), 143.Google ScholarGoogle ScholarCross RefCross Ref
  15. Sankar Pariserum Perumal, Kannan Arputharaj, and Ganapathy Sannasi. 2017. Fuzzy family tree similarity based effective e-learning recommender system. In 2016 8th International Conference on Advanced Computing (ICoAC’17). IEEE, 146--150.Google ScholarGoogle ScholarCross RefCross Ref
  16. Sankar Pariserum Perumal, Ganapathy Sannasi, and Kannan Arputharaj. 2019. An intelligent fuzzy rule-based e-learning recommendation system for dynamic user interests. Journal of Supercomputing 75, 8 (2019), 5145--5160.Google ScholarGoogle ScholarCross RefCross Ref
  17. L. Sai Ramesh, Sannasi Ganapathy, R. Bhuvaneshwari, Kanagasabai Kulothungan, V. Pandiyaraju, and Arputharaj Kannan. 2015. Prediction of user interests for providing relevant information using relevance feedback and re-ranking. International Journal of Intelligent Information Technologies (IJIIT) 11, 4 (2015), 55--71.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kelly Reynolds, April Kontostathis, and Lynne Edwards. 2011. Using machine learning to detect cyberbullying. In 2011 10th International Conference on Machine Learning and Applications and Workshops, Vol. 2. IEEE, 241--244.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Hugo Rosa, Joao P. Carvalho, Pável Calado, Bruno Martins, Ricardo Ribeiro, and Luisa Coheur. 2018. Using fuzzy fingerprints for cyberbullying detection in social networks. In 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE’18). IEEE, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  20. Hugo Rosa, David Matos, Ricardo Ribeiro, Luisa Coheur, and João P. Carvalho. 2018. A “deepe” look at detecting cyberbullying in social networks. In 2018 International Joint Conference on Neural Networks (IJCNN’18). IEEE, 1--8.Google ScholarGoogle Scholar
  21. S. A. Sadhana, L. SaiRamesh, S. Sabena, S. Ganapathy, and A. Kannan. 2017. Mining target opinions from online reviews using semi-supervised word alignment model. In 2017 2nd International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM’17). IEEE, 196--200.Google ScholarGoogle Scholar
  22. Peter K. Smith and Paul Brain. 2000. Bullying in schools: Lessons from two decades of research. Aggressive Behavior: Official Journal of the International Society for Research on Aggression 26, 1 (2000), 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  23. S. B. Souza, A. M. Veiga Simão, Aristides I. Ferreira, and P. Costa Ferreira. 2018. University students’ perceptions of campus climate, cyberbullying and cultural issues: Implications for theory and practice. Studies in Higher Education 43, 11 (2018), 2072--2087.Google ScholarGoogle ScholarCross RefCross Ref
  24. Unicef. 2016. Ending the torment: Tackling bullying from the schoolyard to cyberspace.Google ScholarGoogle Scholar
  25. Rui Zhao and Kezhi Mao. 2016. Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder. IEEE Transactions on Affective Computing 8, 3 (2016), 328--339.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Rui Zhao, Anna Zhou, and Kezhi Mao. 2016. Automatic detection of cyberbullying on social networks based on bullying features. In Proceedings of the 17th International Conference on Distributed Computing and Networking. 1--6.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Cyberbullying Detection, Based on the FastText and Word Similarity Schemes

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Asian and Low-Resource Language Information Processing
      ACM Transactions on Asian and Low-Resource Language Information Processing  Volume 20, Issue 1
      Special issue on Deep Learning for Low-Resource Natural Language Processing, Part 1 and Regular Papers
      January 2021
      332 pages
      ISSN:2375-4699
      EISSN:2375-4702
      DOI:10.1145/3439335
      Issue’s Table of Contents

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 November 2020
      • Online AM: 7 May 2020
      • Accepted: 1 May 2020
      • Revised: 1 April 2020
      • Received: 1 February 2020
      Published in tallip Volume 20, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format