Learning Deep on Cyberbullying is Always Better Than Brute Force

In this paper we present our research on detection of cyberbullying (CB), which stands for humiliating other people through the Internet. CB has become recognized as a social problem, and its mostly juvenile victims usually fall into depression, selfmutilate, or even commit suicide. To deal with the problem, school personnel performs Internet Patrol (IP) by reading through the available Web contents to spot harmful entries. It is crucial to help IP members detect malicious contents more efficiently. A number of research has tackled the problem during recent years. However, due to complexity of language used in cyberbullying, the results has remained only mildly satisfying. We propose a novel method to automatic cyberbullying detection based on Convolutional Neural Networks and increased Feature Density. The experiments performed on actual cyberbullying data showed a major advantage of our approach to all previous methods, including the best performing method so far based on BruteForce Search algorithm.

[1]  Walter Daelemans,et al.  Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP) , 2014, EMNLP 2014.

[2]  Kenji Araki,et al.  Extracting Patterns of Harmful Expressions for Cyberbullying Detection , 2015 .

[3]  Sven Behnke,et al.  Evaluation of Pooling Operations in Convolutional Architectures for Object Recognition , 2010, ICANN.

[4]  Myrna E. Morales Cyberbullying , 2011 .

[5]  William W. Cohen Fast Effective Rule Induction , 1995, ICML.

[6]  Glen Bull,et al.  The Always-Connected Generation. , 2010 .

[7]  Henry Lieberman,et al.  Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying , 2012, TIIS.

[8]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[9]  Robert Zheng,et al.  Evolving Psychological and Educational Perspectives on Cyber Behavior , 2012 .

[10]  Elizabeth F. Churchill,et al.  Automatic identification of personal insults on social news sites , 2012, J. Assoc. Inf. Sci. Technol..

[11]  Kenji Araki,et al.  Detecting Cyberbullying Entries on Informal School Websites Based on Category Relevance Maximization , 2013, IJCNLP.

[12]  J. Pyżalski,et al.  Empathy and Moral Disengagement in Adolescent Cyberbullying: Implications for Educational Intervention and Pedagogical Practice , 2012 .

[13]  D. Ruppert The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2004 .

[14]  Justin W. Patchin,et al.  Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying , 2008 .

[15]  D. Mant Prevention , 1994, The Lancet.

[16]  Kelly Reynolds,et al.  Detecting cyberbullying: query terms and techniques , 2013, WebSci.

[17]  Thomas G. Dietterich What is machine learning? , 2020, Archives of Disease in Childhood.

[18]  Wiley Interscience Journal of the American Society for Information Science and Technology , 2013 .

[19]  Pawel Dybala,et al.  In the Service of Online Order: Tackling Cyber-Bullying with Machine Learning and Affect Analysis , 2010 .

[20]  D. Rutter Communicating by telephone , 1987 .

[21]  Kenji Araki,et al.  Brute Force Works Best Against Bullying , 2015, CPCR+ITWP@IJCAI.

[22]  Graham Neubig,et al.  Language Resource Addition: Dictionary or Corpus? , 2014, LREC.

[23]  A. Sourander,et al.  Psychosocial risk factors associated with cyberbullying among adolescents: a population-based study. , 2010, Archives of general psychiatry.

[24]  Leslie Haddon,et al.  Comparing children’s online opportunities and risks across Europe: cross-national comparisons for EU Kids Online , 2008 .

[25]  M. P. S. Bhatia,et al.  Content based approach to find the credibility of user in social networks: an application of cyberbullying , 2015, International Journal of Machine Learning and Cybernetics.

[26]  Yuji Matsumoto,et al.  Japanese Dependency Analysis using Cascaded Chunking , 2002, CoNLL.

[27]  J. van Leeuwen,et al.  Neural Networks: Tricks of the Trade , 2002, Lecture Notes in Computer Science.

[28]  Jason Weston,et al.  A unified architecture for natural language processing: deep neural networks with multitask learning , 2008, ICML '08.

[29]  Robin M. Kowalski,et al.  Electronic bullying among middle school students. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[30]  Kenji Araki,et al.  Sustainable cyberbullying detection with category-maximized relevance of harmful phrases and double-filtered automatic optimization , 2016, Int. J. Child Comput. Interact..

[31]  Justin W. Patchin,et al.  Bullying, Cyberbullying, and Suicide , 2010, Archives of suicide research : official journal of the International Academy for Suicide Research.

[32]  Peter D. Turney Thumbs Up or Thumbs Down? Semantic Orientation Applied to Unsupervised Classification of Reviews , 2002, ACL.

[33]  D. Cross,et al.  Australian covert bullying prevalence study , 2009 .

[34]  Jun Zhao,et al.  A Weakly Supervised Bayesian Model for Violence Detection in Social Media , 2013, IJCNLP.

[35]  J. Pyżalski From cyberbullying to electronic aggression: typology of the phenomenon , 2012 .