A Socio-Contextual Approach in Automated Detection of Public Cyberbullying on Twitter

Cyberbullying is a major cyber issue that is common among adolescents. Recent reports show that more than one out of five students in the United States is a victim of cyberbullying. Majority of cyberbullying incidents occur on public social media platforms such as Twitter. Automated cyberbullying detection methods can help prevent cyberbullying before the harm is done on the victim. In this study, we analyze two corpora of cyberbullying tweets from similar incidents to construct and validate an automated detection model. Our method emphasizes the two claims that are supported by our results. First, despite other approaches that assume that cyberbullying instances use vulgar or profane words, we show that they do not necessarily contain negative words. Second, we highlight the importance of context and the characteristics of actors involved and their position in the network structure in detecting cyberbullying rather than only considering the textual content in our analysis.

[1]  E. Menesini,et al.  Cyberbullying: Labels, Behaviours and Definition in Three European Countries , 2010, Australian Journal of Guidance and Counselling.

[2]  Kamran Raza,et al.  Effect of Feature Selection, SMOTE and under Sampling on Class Imbalance Classification , 2012, 2012 UKSim 14th International Conference on Computer Modelling and Simulation.

[3]  Michael Sedlmair,et al.  More than Bags of Words: Sentiment Analysis with Word Embeddings , 2018 .

[4]  J. I. Sheeba,et al.  Cyberbullying Detection and Classification Using Information Retrieval Algorithm , 2015, ICARCSET '15.

[5]  Henry Lieberman,et al.  Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying , 2012, TIIS.

[6]  C. Salmivalli,et al.  Bullying as a group process: Participant roles and their relations to social status within the group , 1998 .

[7]  Kasturi Dewi Varathan,et al.  Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network , 2016, Comput. Hum. Behav..

[8]  Heidi Vandebosch,et al.  Dark Triad personality traits and adolescent cyber-aggression , 2015 .

[9]  F. Ekşi,et al.  Examination of Narcissistic Personality Traits' Predicting Level of Internet Addiction and Cyber Bullying through Path Analysis. , 2012 .

[10]  Nicu Sebe,et al.  Friends don't lie: inferring personality traits from social network structure , 2012, UbiComp.

[11]  Igor Santos,et al.  Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying , 2015, Log. J. IGPL.

[12]  Christophe Mues,et al.  An experimental comparison of classification algorithms for imbalanced credit scoring data sets , 2012, Expert Syst. Appl..

[13]  K. Champion,et al.  Victimization, anger, and gender: low anger and passive responses work. , 2009, The American journal of orthopsychiatry.

[14]  Henry Lieberman,et al.  Let's Gang Up on Cyberbullying , 2011, Computer.

[15]  Anna Cinzia Squicciarini,et al.  Identification and characterization of cyberbullying dynamics in an online social network , 2022 .

[16]  Rajeev R. Raje,et al.  Collaborative detection of cyberbullying behavior in Twitter data , 2015, 2015 IEEE International Conference on Electro/Information Technology (EIT).

[17]  Walter Daelemans,et al.  Automatic Detection and Prevention of Cyberbullying , 2015 .

[18]  Gustavo E. A. P. A. Batista,et al.  A study of the behavior of several methods for balancing machine learning training data , 2004, SKDD.

[19]  Rui Zhao,et al.  Automatic detection of cyberbullying on social networks based on bullying features , 2016, ICDCN.

[20]  Aaron Smith,et al.  Teens, technology and friendships , 2015 .

[21]  George Forman,et al.  An Extensive Empirical Study of Feature Selection Metrics for Text Classification , 2003, J. Mach. Learn. Res..

[22]  Sandra Graham,et al.  Bullying in schools: the power of bullies and the plight of victims. , 2014, Annual review of psychology.

[23]  Ana-Maria Popescu,et al.  Democrats, republicans and starbucks afficionados: user classification in twitter , 2011, KDD.

[24]  Barbara Hammer,et al.  Incremental learning algorithms and applications , 2016, ESANN.

[25]  Kelly Reynolds,et al.  Detecting cyberbullying: query terms and techniques , 2013, WebSci.

[26]  M. Slater,et al.  Examination of the Predictors of Latent Class Typologies of Bullying Involvement Among Middle School Students , 2012, Journal of school violence.

[27]  Peter K. Smith,et al.  Cyberbullying: another main type of bullying? , 2008, Scandinavian journal of psychology.

[28]  Robin M. Kowalski,et al.  Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. , 2014, Psychological bulletin.

[29]  M. Pujazon-Zazik,et al.  To Tweet, or Not to Tweet: Gender Differences and Potential Positive and Negative Health Outcomes of Adolescents’ Social Internet Use , 2010, American journal of men's health.

[30]  Stefan Burr,et al.  The Mathematics of networks , 1982 .

[31]  Alena Černá,et al.  Cyberbullying in Adolescent Victims: Perception and Coping , 2011 .

[32]  Laura P. Del Bosque,et al.  Aggressive Text Detection for Cyberbullying , 2014, MICAI.

[33]  Henry Lieberman,et al.  Modeling the Detection of Textual Cyberbullying , 2011, The Social Mobile Web.

[34]  Charlene Cook,et al.  Cyber bullying behaviors among middle and high school students. , 2010, The American journal of orthopsychiatry.

[35]  M. Newman Mathematics of networks , 2018, Oxford Scholarship Online.

[36]  Shivakant Mishra,et al.  Towards understanding cyberbullying behavior in a semi-anonymous social network , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).

[37]  Soyeon Ahn,et al.  The effects of anger management on children’s social and emotional outcomes: A meta-analysis , 2012 .

[38]  Michael Coleman Dalvean,et al.  Changes in the style and content of Australian election campaign speeches from 1901 to 2016: A computational linguistic analysis , 2017 .

[39]  Vivian H. Wright,et al.  Cyberbullying: Using Virtual Scenarios to Educate and Raise Awareness , 2009 .

[40]  Nargess Tahmasbi,et al.  Challenges and Future Directions of Automated Cyberbullying Detection , 2018, AMCIS.

[41]  A. Demetriou,et al.  A longitudinal study of cyberbullying: Examining riskand protective factors , 2012 .

[42]  D. Olweus,et al.  Bullying in School , 2017 .

[43]  Mahesh Chandra Govil,et al.  A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).

[44]  Christiane Spiel,et al.  Definition and Measurement of Cyberbullying , 2010 .

[45]  Peter K. Smith,et al.  Cyberbullying: its nature and impact in secondary school pupils. , 2008, Journal of child psychology and psychiatry, and allied disciplines.

[46]  Deborah S. Lessne,et al.  Student Reports of Bullying: Results from the 2015 School Crime Supplement to the National Crime Victimization Survey. Web Tables. NCES 2017-015. , 2016 .

[47]  Dolf Trieschnigg,et al.  Improving Cyberbullying Detection with User Context , 2013, ECIR.

[48]  Kilian Q. Weinberger,et al.  An alternative text representation to TF-IDF and Bag-of-Words , 2013, ArXiv.

[49]  Justin W. Patchin,et al.  Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .

[50]  Peter K. Smith,et al.  Cyberbullying Definition Among Adolescents: A Comparison Across Six European Countries , 2012, Cyberpsychology Behav. Soc. Netw..

[51]  Stefan Wehrli,et al.  Personality on Social Network Sites: An Application of the Five Factor Model , 2008 .