An Approach to Distinguish Between the Severity of Bullying in Messages in Social Media

Users on the social media can share positive as well as negative information intentionally and unintentionally in the form of multimedia content without knowing its impact on other user, which threatens the security and privacy of social media. Cyberbullying is one of the risks associated with social media. Cyberbullying is an aggressive act carried out intentionally against the victim by posting harmful material on social media to harm his/her reputation. Aggressive act creates depression, anxiety in users which may lead to diversion of attention and sometimes suicidal actions. In this paper the authors have included a survey on recent algorithms which work on detection of cyberbullying. State-of-the-art studies only focus on the detection of cyberbullying but not on the preventive measures against cyberbullying. In order to tackle this problem, the authors showed how the severity of the bullying in messages helps to find the real culprit.

[1]  A. Kaplan,et al.  Users of the world, unite! The challenges and opportunities of Social Media , 2010 .

[2]  Igor Santos,et al.  Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying , 2015, Log. J. IGPL.

[3]  Aaron Smith,et al.  Teens, Kindness and Cruelty on Social Network Sites , 2011 .

[4]  Stephanie Pieschl,et al.  Relevant dimensions of cyberbullying — Results from two experimental studies , 2013 .

[5]  Decui Liang,et al.  Incremental Learning Researches on Rough Set Theory: Status and Future , 2014, Int. J. Rough Sets Data Anal..

[6]  Chaoyi Pang,et al.  Semi-supervised Learning for Cyberbullying Detection in Social Networks , 2014, ADC.

[7]  Henry Lieberman,et al.  Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying , 2012, TIIS.

[8]  D. Olweus,et al.  Bullying at school : what we know and what we can do / Dan Olweus , 1993 .

[9]  Hein S. Venter,et al.  Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness , 2011, 2011 Information Security for South Africa.

[10]  Aboul Ella Hassanien,et al.  Forecasting Exchange Rates: A Chaos-Based Regression Approach , 2015, Int. J. Rough Sets Data Anal..

[11]  Aboul Ella Hassanien,et al.  Evaluating the Degree of Trust Under Context Sensitive Relational Database Hierarchy Using Hybrid Intelligent Approach , 2015, Int. J. Rough Sets Data Anal..

[12]  Justin W. Patchin,et al.  Bullying, Cyberbullying, and Suicide , 2010, Archives of suicide research : official journal of the International Academy for Suicide Research.

[13]  N. Willard Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress , 2007 .

[14]  Laura P. Del Bosque,et al.  Aggressive Text Detection for Cyberbullying , 2014, MICAI.

[15]  Henry Lieberman,et al.  Modeling the Detection of Textual Cyberbullying , 2011, The Social Mobile Web.

[16]  Hiroshi Sakai,et al.  Two Rough Set-based Software Tools for Analyzing Non-Deterministic Data , 2014, Int. J. Rough Sets Data Anal..

[17]  Dolf Trieschnigg,et al.  Expert knowledge for automatic detection of bullies in social networks , 2013 .

[18]  Dolf Trieschnigg,et al.  Towards User Modelling in the Combat against Cyberbullying , 2012, NLDB.

[19]  Nilanjan Dey,et al.  Reversible Color Image Watermarking Using Trigonometric Functions , 2014, 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies.

[20]  Atsushi Tagami,et al.  A Study of Contact Network Generation for Cyber-bullying Detection , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.

[21]  Justin W. Patchin,et al.  Offline Consequences of Online Victimization , 2007 .

[22]  Qianjia Huang,et al.  Cyber Bullying Detection Using Social and Textual Analysis , 2014, SAM '14.

[23]  Robert Slonje,et al.  The nature of cyberbullying, and strategies for prevention , 2013, Comput. Hum. Behav..

[24]  Jayanthi Ranjan,et al.  A holistic framework for mCRM - data mining perspective , 2009, Inf. Manag. Comput. Secur..

[25]  Kelly Reynolds,et al.  Detecting cyberbullying: query terms and techniques , 2013, WebSci.

[26]  Yudong Zhang,et al.  Binary PSO with mutation operator for feature selection using decision tree applied to spam detection , 2014, Knowl. Based Syst..

[27]  Jayanthi Ranjan,et al.  Principles for successful aCRM in organizations , 2008 .

[28]  Dolf Trieschnigg,et al.  Experts and Machines against Bullies: A Hybrid Approach to Detect Cyberbullies , 2014, Canadian Conference on AI.

[29]  Robert S. Tokunaga,et al.  Following you home from school: A critical review and synthesis of research on cyberbullying victimization , 2010, Comput. Hum. Behav..

[30]  M. P. S. Bhatia,et al.  Content based approach to find the credibility of user in social networks: an application of cyberbullying , 2015, International Journal of Machine Learning and Cybernetics.

[31]  Franciska de Jong,et al.  Cyberbullying detection: a step toward a safer internet yard , 2012, WWW.

[32]  Dolf Trieschnigg,et al.  Improving Cyberbullying Detection with User Context , 2013, ECIR.

[33]  D. Deepak,et al.  Information Systems on Hesitant Fuzzy Sets , 2016, Int. J. Rough Sets Data Anal..

[34]  Michele L. Ybarra,et al.  Examining Characteristics and Associated Distress Related to Internet Harassment: Findings From the Second Youth Internet Safety Survey , 2006, Pediatrics.

[35]  Ian Witten,et al.  Data Mining , 2000 .

[36]  Pavel Brazdil,et al.  Comparison of SVM and Some Older Classification Algorithms in Text Classification Tasks , 2006, IFIP AI.

[37]  J S Suri,et al.  Automated and accurate carotid bulb detection, its verification and validation in low quality frozen frames and motion video. , 2014, International angiology : a journal of the International Union of Angiology.

[38]  Shivakant Mishra,et al.  Towards understanding cyberbullying behavior in a semi-anonymous social network , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).

[39]  Jaideep Srivastava,et al.  Predicting trusts among users of online communities: an epinions case study , 2008, EC '08.

[40]  Chaoyi Pang,et al.  Sentiment Analysis for Effective Detection of Cyber Bullying , 2012, APWeb.

[41]  Kelly Reynolds,et al.  Using Machine Learning to Detect Cyberbullying , 2011, 2011 10th International Conference on Machine Learning and Applications and Workshops.