Detecting the Presence of Cyberbullying Using Computer Software

نویسندگان

  • Jennifer Bayzick
  • Lynne Edwards
چکیده

Cyberbullying is willful and repeated harm inflicted through the medium of electronic text. Computer software was developed to detect the presence of cyberbullying in online chat conversations. Rules based on a dictionary of key words are used to classify a window of posts. A truth set of MySpace threads was created. The software was found to correctly identify windows containing cyberbullying 85.30% of the time, and it identifies innocent windows 51.91% of the time. The overall accuracy is 58.63%. This suggests that our coding rules must be refined to not falsely flag so much innocent conversation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media

Social media allows people interact to express their thoughts or feelings about different subjects. However, some of users may write offensive twits to other via social media which known as cyber bullying. Successful prevention depends on automatically detecting malicious messages. Automatic detection of bullying in the text of social media by analyzing the text "twits" via one of the machine l...

متن کامل

Detection and Fine-Grained Classification of Cyberbullying Events

In the current era of online interactions, both positive and negative experiences are abundant on the Web. As in real life, negative experiences can have a serious impact on youngsters. Recent studies have reported cybervictimization rates among teenagers that vary between 20% and 40%. In this paper, we focus on cyberbullying as a particular form of cybervictimization and explore its automatic ...

متن کامل

Detecting Active Bot Networks Based on DNS Traffic Analysis

Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...

متن کامل

Effectiveness of Cognitive Behavioral Social Work Intervention on Preventing Cyberbullying Revictimization Among Youths

Introduction: Cyberbullying is one of the most common results of information and communication technologies' development. Cyberbullying victims may experience various consequences which will effect on different aspects of their well-being. In this investigation the effectiveness of cognitive-behavioral social work intervention on preventing cyberbullying revictimization was studied. Methods: Th...

متن کامل

Detecting and counting vehicles using adaptive background subtraction and morphological operators in real time systems

vehicle detection and classification of vehicles play an important role in decision making for the purpose of traffic control and management.this paper presents novel approach of automating detecting and counting vehicles for traffic monitoring through the usage of background subtraction and morphological operators. We present adaptive background subtraction that is compatible with weather and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011