Analysis of Cyber-bullying in a virtual social networking

This paper focuses on the social and cultural implications of cyber technologies. Identity, bullying and inappropriate use of communication are major issues that need to be addressed in relation to communication technologies for the security in the Web use. The contribution of this paper is to present a novel approach to explain the performance of a novel Cyber-bullying model applied on a Social Network using Multiagents to improve the understanding of this social behavior.

[1]  Roberto Leombruni,et al.  A Common Protocol for Agent-Based Social Simulation , 2006, J. Artif. Soc. Soc. Simul..

[2]  Scott Lobdell,et al.  Identity Theft , 2006 .

[3]  René Santaolaya Salgado,et al.  Use of Agents to Realize a Federated Searching of Learning Objects , 2010, PAAMS.

[4]  Ron Sun Individual action and collective function: From sociology to multi-agent learning , 2001, Cognitive Systems Research.

[5]  Adem Karahoca,et al.  Data Mining and Knowledge Discovery in Real Life Applications , 2009 .

[6]  Peter K. Smith,et al.  Cyberbullying: another main type of bullying? , 2008, Scandinavian journal of psychology.

[7]  Yale E Cohen,et al.  Who Goes There? , 1999, Neuron.

[8]  M. Macy,et al.  FROM FACTORS TO ACTORS: Computational Sociology and Agent-Based Modeling , 2002 .

[9]  Barbara L. Ludlow,et al.  Book and Software Review: Cyber Law: Maximizing Safety and Minimizing Risk in Classrooms , 2010 .

[10]  James T. Carmichael ChatSafe ( Patent Pending , 2022 .

[11]  María Ángeles Hernández Prados,et al.  Ciberbullying, un problema de acoso escolar , 2012 .

[12]  Justin W. Patchin,et al.  Personal information of adolescents on the Internet: A quantitative content analysis of MySpace. , 2008, Journal of adolescence.

[13]  Justin W. Patchin,et al.  Bullying, Cyberbullying, and Suicide , 2010, Archives of suicide research : official journal of the International Academy for Suicide Research.

[14]  Justin W. Patchin,et al.  Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .

[15]  Karl Rihaczek,et al.  1. WHAT IS DATA MINING? , 2019, Data Mining for the Social Sciences.

[16]  John G. Palfrey,et al.  Enhancing child safety and online technologies : final report of the Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States , 2010 .

[17]  Ian Witten,et al.  Data Mining , 2000 .

[18]  Latanya Sweeney Protecting job seekers from identity theft , 2006, IEEE Internet Computing.

[19]  G. McNair,et al.  Identity Theft , 2007, The SAGE Encyclopedia of Criminal Psychology.