Editorial Notes
The editors have requested minor, non-substantive changes to the VoR and, in accordance with ACM policies, a Corrected VoR was published on February 9, 2021. For reference purposes the VoR may still be accessed via the Supplemental Material section on this page.
Abstract
With recent developments in online social networks (OSNs), these services are widely applied in daily lives. On the other hand, cyberbullying, which is a relatively new type of harassment through the internet-based electronic devices, is rising in online social networks. Accordingly, scholars are attracted to investigating cyberbullying behaviors. Studies show that cyberbullying has a devastating effect on mental health, especially for teenagers. In order to reduce or even stop cyberbullying, different machine learning techniques are applied and numerous studies have been conducted so far. However, conventional detection schemes still have challenges, such as low accuracy. Therefore, it is of significant importance to find an efficient detection solution in the natural language processing and machine learning communities. In the present study, characteristics of cyberbullying are initially analyzed from vocabulary and syntax points of view. Then a new detection algorithm is proposed based on FastText and word similarity schemes. Finally, experiments are carried out to evaluate the effectiveness and performance of the proposed method. Obtained results show that the proposed algorithm can effectively improve the detection accuracy and recall rate of cyberbullying detection.
Supplemental Material
Available for Download
Version of Record for "Cyberbullying Detection, Based on the FastText and Word Similarity Schemes" by Wang et al., ACM Transactions on Asian and Low-Resource Language Information Processing, Volume 20, Issue 1 (TALLIP 20:1).
- Mohammed Ali Al-garadi, Kasturi Dewi Varathan, and Sri Devi Ravana. 2016. Cybercrime detection in online communications: The experimental case of cyberbullying detection in the twitter network. Computers in Human Behavior 63 (2016), 433--443.Google ScholarDigital Library
- Monica Anderson. 2018. A Majority of Teens Have Experienced Some Form of Cyberbullying. Pew Research Center.Google Scholar
- Jennifer Bayzick, April Kontostathis, and Lynne Edwards. 2011. Detecting the Presence of Cyberbullying Using Computer Software. Ursinus College.Google Scholar
- Bill Belsey. 2005. Cyberbullying: An emerging threat to the “always on” generation. Recuperado el 5, 5 (2005), 2010.Google Scholar
- Piotr Bojanowski, Edouard Grave, Armand Joulin, and Tomas Mikolov. 2017. Enriching word vectors with subword information. Transactions of the Association for Computational Linguistics 5 (2017), 135--146.Google ScholarCross Ref
- Vikas S. Chavan and S. S. Shylaja. 2015. Machine learning approach for detection of cyber-aggressive comments by peers on social media network. In 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI’15). IEEE, 2354--2358.Google Scholar
- Maral Dadvar, Dolf Trieschnigg, Roeland Ordelman, and Franciska de Jong. 2013. Improving cyberbullying detection with user context. In European Conference on Information Retrieval. Springer, 693--696.Google ScholarDigital Library
- Stephen F. Davis, Patrick F. Drinan, and Tricia Bertram Gallant. 2009. Cheating in School. Wiley-Blackwell.Google Scholar
- Maria Fridh, Martin Lindström, and Maria Rosvall. 2015. Subjective health complaints in adolescent victims of cyber harassment: Moderation through support from parents/friends-a Swedish population-based study. BMC Public Health 15, 1 (2015), 949.Google ScholarCross Ref
- Homa Hosseinmardi, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2016. Prediction of cyberbullying incidents in a media-based social network. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’16). IEEE, 186--192.Google ScholarDigital Library
- R. V. Karthik, Sannasi Ganapathy, and Arputharaj Kannan. 2018. A recommendation system for online purchase using feature and product ranking. In 2018 11th International Conference on Contemporary Computing (IC3’18). IEEE, 1--6.Google ScholarCross Ref
- Qing Li. 2006. Cyberbullying in schools: A research of gender differences. School Psychology International 27, 2 (2006), 157--170.Google ScholarCross Ref
- Kimberly Miller. 2016. Cyberbullying and its consequences: How cyberbullying is contorting the minds of victims and bullies alike, and the law’s limited available redress. Southern California Interdisciplinary Law Journal 26 (2016), 379.Google Scholar
- Charisse L. Nixon. 2014. Current perspectives: the impact of cyberbullying on adolescent health. Adolescent Health, Medicine and Therapeutics 5 (2014), 143.Google ScholarCross Ref
- Sankar Pariserum Perumal, Kannan Arputharaj, and Ganapathy Sannasi. 2017. Fuzzy family tree similarity based effective e-learning recommender system. In 2016 8th International Conference on Advanced Computing (ICoAC’17). IEEE, 146--150.Google ScholarCross Ref
- Sankar Pariserum Perumal, Ganapathy Sannasi, and Kannan Arputharaj. 2019. An intelligent fuzzy rule-based e-learning recommendation system for dynamic user interests. Journal of Supercomputing 75, 8 (2019), 5145--5160.Google ScholarCross Ref
- L. Sai Ramesh, Sannasi Ganapathy, R. Bhuvaneshwari, Kanagasabai Kulothungan, V. Pandiyaraju, and Arputharaj Kannan. 2015. Prediction of user interests for providing relevant information using relevance feedback and re-ranking. International Journal of Intelligent Information Technologies (IJIIT) 11, 4 (2015), 55--71.Google ScholarDigital Library
- Kelly Reynolds, April Kontostathis, and Lynne Edwards. 2011. Using machine learning to detect cyberbullying. In 2011 10th International Conference on Machine Learning and Applications and Workshops, Vol. 2. IEEE, 241--244.Google ScholarDigital Library
- Hugo Rosa, Joao P. Carvalho, Pável Calado, Bruno Martins, Ricardo Ribeiro, and Luisa Coheur. 2018. Using fuzzy fingerprints for cyberbullying detection in social networks. In 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE’18). IEEE, 1--7.Google ScholarCross Ref
- Hugo Rosa, David Matos, Ricardo Ribeiro, Luisa Coheur, and João P. Carvalho. 2018. A “deepe” look at detecting cyberbullying in social networks. In 2018 International Joint Conference on Neural Networks (IJCNN’18). IEEE, 1--8.Google Scholar
- S. A. Sadhana, L. SaiRamesh, S. Sabena, S. Ganapathy, and A. Kannan. 2017. Mining target opinions from online reviews using semi-supervised word alignment model. In 2017 2nd International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM’17). IEEE, 196--200.Google Scholar
- Peter K. Smith and Paul Brain. 2000. Bullying in schools: Lessons from two decades of research. Aggressive Behavior: Official Journal of the International Society for Research on Aggression 26, 1 (2000), 1--9.Google ScholarCross Ref
- S. B. Souza, A. M. Veiga Simão, Aristides I. Ferreira, and P. Costa Ferreira. 2018. University students’ perceptions of campus climate, cyberbullying and cultural issues: Implications for theory and practice. Studies in Higher Education 43, 11 (2018), 2072--2087.Google ScholarCross Ref
- Unicef. 2016. Ending the torment: Tackling bullying from the schoolyard to cyberspace.Google Scholar
- Rui Zhao and Kezhi Mao. 2016. Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder. IEEE Transactions on Affective Computing 8, 3 (2016), 328--339.Google ScholarDigital Library
- Rui Zhao, Anna Zhou, and Kezhi Mao. 2016. Automatic detection of cyberbullying on social networks based on bullying features. In Proceedings of the 17th International Conference on Distributed Computing and Networking. 1--6.Google ScholarDigital Library
Index Terms
- Cyberbullying Detection, Based on the FastText and Word Similarity Schemes
Recommendations
Parental mediation, cyberbullying, and cybertrolling
Researchers are concerned with identifying the risk and protective factors associated with adolescents' involvement in cyberharassment. One such factor is parental mediation of children's electronic technology use. Little attention has been given to how ...
Pathological narcissism, cyberbullying victimization and offending among homosexual and heterosexual participants in online dating websites
Homosexual individuals are exposed to high levels of victimization. However, no studies have examined personality risk factors for cyberbullying victimization and offending among this population. This study investigated the relationships between ...
Prevalence of cyberbullying and predictors of cyberbullying perpetration among Korean adolescents
This study aimed to investigate the prevalence of cyberbullying and factors in cyberbullying perpetration with a national sample of 4000 adolescents selected through multi-stage cluster sampling. The respondents were 2166 boys (54.1%) and 1834 girls (...
Comments