Application-Oriented Approach for Detecting Cyberaggression in Social Media

The paper discuses and demonstrates the use of named-entity recognition for automatic hate speech detection. Our approach also addresses the design of models to map storylines and social anchors. They provide valuable background information for the analysis and correct classification of the brief statements used in social media. Furthermore, named-entity recognition can help to tackle the specifics of the language style often used in hate tweets, a style that differs from regular language in deliberate and unintentional misspellings, strange abbreviations and interpunctuations, and the use of symbols. We implemented a prototype for our approach that automatically analyzes tweets along storylines. It operates on a series of bags of words containing names of persons, locations, characteristic words for insults, threats, and phenomena reflected in social anchors. We demonstrate our approach using a collection of German tweets that address the vitally discussed topic “refugees” in Germany.

[1]  Andrew McCallum,et al.  An Introduction to Conditional Random Fields , 2010, Found. Trends Mach. Learn..

[2]  Ken-ichi Kawarabayashi,et al.  ClassiNet -- Predicting Missing Features for Short-Text Classification , 2018, ACM Trans. Knowl. Discov. Data.

[3]  Alistair Moffat,et al.  The Role of Anchor Text in ClueWeb09 Retrieval , 2010, TREC.

[4]  Jun-Ming Xu,et al.  Learning from Bullying Traces in Social Media , 2012, NAACL.

[5]  Josiane Mothe,et al.  Automatic keyphrase extraction using graph-based methods , 2018, SAC.

[6]  Gianluca Stringhini,et al.  Detecting Cyberbullying and Cyberaggression in Social Media , 2019, ACM Trans. Web.

[7]  Isabelle Guyon,et al.  An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..

[8]  Kevin S. McCurley,et al.  Analysis of anchor text for web search , 2003, SIGIR.

[9]  Ying Chen,et al.  Detecting Offensive Language in Social Media to Protect Adolescent Online Safety , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[10]  W. Bruce Croft,et al.  Incorporating social anchors for ad hoc retrieval , 2013, OAIR.