Us and them: identifying cyber hate on Twitter across multiple protected characteristics

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Hate Speech on Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making

The use of “Big Data” in policy and decision making is a current topic of debate. The 2013 murder of Drummer Lee Rigby in Woolwich, London, UK led to an extensive public reaction on social media, providing the opportunity to study the spread of online hate speech (cyber hate) on Twitter. Human annotated Twitter data was collected in the immediate aftermath of Rigby’s murder to train and test a ...

متن کامل

Identifying Depression on Twitter

Social media has recently emerged as a premier method to disseminate information online. Through these online networks, tens of millions of individuals communicate their thoughts, personal experiences, and social ideals. We therefore explore the potential of social media to predict, even prior to onset, Major Depressive Disorder (MDD) in online personas. We employ a crowdsourced method to compi...

متن کامل

Comparison of Hate Crime Rates Across Protected and Unprotected Groups – An Update

Recent changes to federal legislation mandated the inclusion of sexual orientation, gender, and gender identity in federal hate crimes law. In addition, many state hate crimes laws also include these categories. Earlier studies have shown that lesbians, gay men, and bisexuals, Jews, and Blacks face similar rates of overall hate crimes. This study is the first to consider hate crimes against les...

متن کامل

Identifying Effective Signals to Predict Deleted and Suspended Accounts on Twitter Across Languages

Social networks have an ephemerality to them where accounts and messages are constantly being edited, deleted, or marked as private. This continuous change comes from concerns around privacy, a potential desire for to be forgotten and suspicious behavior. In this study we present a novel task – predicting suspicious e.g., to be deleted or suspended accounts in social media. We analyze multiple ...

متن کامل

Identifying Users across Multiple Online Social Networks

An online user joins multiple social networks in order to enjoy different services. On each joined social network, she creates an identity and constitutes its three major dimensions namely profile, content and connection network. She largely governs her identity formulation on any social network and therefore can manipulate multiple aspects of it. With no global identifier to mark her presence ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EPJ Data Science

سال: 2016

ISSN: 2193-1127

DOI: 10.1140/epjds/s13688-016-0072-6