BullyBlocker: toward an interdisciplinary approach to identify cyberbullying

Cyberbullying is the deliberate use of online digital media to communicate false, embarrassing, or hostile information about another person. It is the most common online risk for adolescents, yet well over half of young people do not tell their parents when it occurs. While there have been many studies about the nature and prevalence of cyberbullying, there have been relatively few in the area of automated identification of cyberbullying that integrate findings from computer science and psychology. The goal of our work is thus to adopt an interdisciplinary approach to develop an automated model for identifying and measuring the degree of cyberbullying in social networking sites, and a Facebook app, built on this model, that notifies parents about the likelihood that their adolescent is a cyberbullying victim. This paper describes the challenges associated with building a computer model for cyberbullying identification, presents key results from psychology research that can be used to inform such a model, introduces a holistic model and mobile app design for cyberbullying identification, presents a novel evaluation framework for assessing the effectiveness of the identification model, and highlights crucial areas of future work. Importantly, the proposed model—which can be applied to other social networking sites—is the first that we know of to bridge computer science and psychology to address this timely problem.

[1]  K. Williams,et al.  Prevalence and predictors of internet bullying. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[2]  Robert S. Tokunaga,et al.  Following you home from school: A critical review and synthesis of research on cyberbullying victimization , 2010, Comput. Hum. Behav..

[3]  Justin W. Patchin,et al.  Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .

[4]  Yasin N. Silva,et al.  BullyBlocker: Towards the identification of cyberbullying in social networking sites , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[5]  Jennifer D. Shapka,et al.  To control or not to control? Parenting behaviours and adolescent online aggression , 2010, Comput. Hum. Behav..

[6]  John D. Kelleher,et al.  Fundamentals of Machine Learning for Predictive Data Analytics: Algorithms, Worked Examples, and Case Studies , 2015 .

[7]  J. Stockman Electronic Bullying Among Middle School Students , 2009 .

[8]  Soyeon Ahn,et al.  The Effects of Bullying and Peer Victimization on Sexual-Minority and Heterosexual Youths: A Quantitative Meta-Analysis of the Literature , 2011 .

[9]  Kelly Reynolds,et al.  Using Machine Learning to Detect Cyberbullying , 2011, 2011 10th International Conference on Machine Learning and Applications and Workshops.

[10]  Justin W. Patchin,et al.  Cyberbullying Prevention and Response , 2011 .

[11]  Douglas G Bonett,et al.  Transforming odds ratios into correlations for meta-analytic research. , 2007, The American psychologist.

[12]  Anna Cinzia Squicciarini,et al.  Identification and characterization of cyberbullying dynamics in an online social network , 2022 .

[13]  Qianjia Huang,et al.  Cyber Bullying Detection Using Social and Textual Analysis , 2014, SAM '14.

[14]  Michele L. Ybarra,et al.  How Risky Are Social Networking Sites? A Comparison of Places Online Where Youth Sexual Solicitation and Harassment Occurs , 2008, Pediatrics.

[15]  Justin W. Patchin,et al.  Social Influences on Cyberbullying Behaviors Among Middle and High School Students , 2013, Journal of youth and adolescence.

[16]  Parma Nand,et al.  “How Bullying is this Message?”: A Psychometric Thermometer for Bullying , 2016, COLING.

[17]  Jared Piazza,et al.  Evolutionary cyber-psychology: Applying an evolutionary framework to Internet behavior , 2009, Comput. Hum. Behav..

[18]  Clayton R. Cook,et al.  Predictors of Bullying and Victimization in Childhood and Adolescence: A Meta-analytic Investigation , 2010 .

[19]  Dieter Wolke,et al.  Individual and Social detriments of bullying and cyberbullying , 2015 .

[20]  Henry Lieberman,et al.  Modeling the Detection of Textual Cyberbullying , 2011, The Social Mobile Web.

[21]  Jennifer Golbeck,et al.  Analyzing the Social Web , 2013 .

[22]  Yasin N. Silva,et al.  Database Similarity Join for Metric Spaces , 2013, SISAP.

[23]  Rebecca Pei-Hui Ang,et al.  Loneliness and generalized problematic Internet use: Parents' perceived knowledge of adolescents' online activities as a moderator , 2012, Comput. Hum. Behav..

[24]  Yasin N. Silva,et al.  Similarity Joins: Their implementation and interactions with other database operators , 2015, Inf. Syst..

[25]  Juan Merlo,et al.  Socioeconomic inequality in exposure to bullying during adolescence: a comparative, cross-sectional, multilevel study in 35 countries. , 2009, American journal of public health.

[26]  Paul Vedder,et al.  Relationship between peer victimization, cyberbullying, and suicide in children and adolescents: a meta-analysis. , 2014, JAMA pediatrics.

[27]  Emily M. Lund,et al.  National prevalence rates of bully victimization among students with disabilities in the United States. , 2012, School psychology quarterly : the official journal of the Division of School Psychology, American Psychological Association.

[28]  Shivakant Mishra,et al.  Prediction of cyberbullying incidents in a media-based social network , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[29]  Jun-Ming Xu,et al.  Learning from Bullying Traces in Social Media , 2012, NAACL.

[30]  Justin W. Patchin,et al.  Cyberbullying: An Update and Synthesis of the Research , 2012 .

[31]  Catherine P. Bradshaw,et al.  Examining student responses to frequent bullying: A latent class approach. , 2011 .

[32]  David P. Farrington,et al.  Cyberbullying in youth: A pattern of disruptive behaviour , 2016 .

[33]  Huan Liu,et al.  Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose , 2013, ICWSM.

[34]  Ellen Riloff,et al.  Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies , 2012, HLT-NAACL 2012.

[35]  Robin M. Kowalski,et al.  Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. , 2014, Psychological bulletin.

[36]  D. Cross,et al.  Cyberbullying Versus Face-to-Face Bullying A Theoretical and Conceptual Review , 2009 .

[37]  F. Mishna,et al.  Risk Factors for involvement in cyber bullying: Victims, bullies, and bully-victims , 2012 .

[38]  Shivakant Mishra,et al.  Careful what you share in six seconds: Detecting cyberbullying instances in Vine , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[39]  Walid G. Aref,et al.  Similarity Group-by Operators for Multi-Dimensional Relational Data , 2014, IEEE Transactions on Knowledge and Data Engineering.

[40]  Juan Calmaestra,et al.  The emotional impact on victims of traditional bullying and cyberbullying: A study of Spanish adolescents. , 2009 .

[41]  Jianwen Su,et al.  Efficient index-based KNN join processing for high-dimensional data , 2007, Inf. Softw. Technol..

[42]  Siying Guo,et al.  A Meta-Analysis of the Predictors of Cyberbullying Perpetration and Victimization. , 2016 .