skip to main content
10.1145/3011141.3011182acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

Cyberbullying detection using parent-child relationship between comments

Published: 28 November 2016 Publication History

Abstract

Cyberbullying is a underlying problem in social networking service, threatening users' mental and physical health. Previous research on automated cyberbullying detection is mostly textual or social based methods. Cyberbullying content is identified through a set of textual features within the content in the former method and through social information surrounding the content in the latter method. Those methods can not cater different cyberbullying standard for individual SNS user since each content is evaluated using same features. Therefore, in this article we propose a automated cyberbullying detection method that utilises the parent-child relationship between comments to capture the reaction from a third party to detect cyberbullying comments. We were able to improve the effectiveness of cyberbullying detection using only publicly available data.

References

[1]
S. Bastiaensens, H. Vandebosch, K. Poels, K. Van Cleemput, A. Desmet, and I. De Bourdeaudhuij. Cyberbullying on social network sites. an experimental study into bystanders' behavioural intentions to help the victim or reinforce the bully. Computers in Human Behavior, 31:259--271, 2014.
[2]
S. Bird. Nltk: the natural language toolkit. In Proceedings of the COLING/ACL on Interactive presentation sessions, pages 69--72. Association for Computational Linguistics, 2006.
[3]
C. Burger, D. Strohmeier, N. Spröber, S. Bauman, and K. Rigby. How teachers respond to school bullying: An examination of self-reported intervention strategy use, moderator effects, and concurrent use of multiple strategies. Teaching and Teacher Education, 51:191--202, 2015.
[4]
M. Campbell, B. Spears, P. Slee, D. Butler, and S. Kift. Victims' perceptions of traditional and cyberbullying, and the psychosocial correlates of their victimisation. Emotional and Behavioural Difficulties, 17(3--4):389--401, 2012.
[5]
M. Cha, H. Kwak, P. Rodriguez, Y.-Y. Ahn, and S. Moon. I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pages 1--14. ACM, 2007.
[6]
N. V. Chawla. Data mining for imbalanced datasets: An overview. In Data mining and knowledge discovery handbook, pages 853--867. Springer, 2005.
[7]
M. Dadvar, F. M. de Jong, R. Ordelman, and R. Trieschnigg. Improved cyberbullying detection using gender information. 2012.
[8]
M. Dadvar, D. Trieschnigg, R. Ordelman, and F. de Jong. Improving cyberbullying detection with user context. In European Conference on Information Retrieval, pages 693--696. Springer, 2013.
[9]
K. Dinakar, R. Reichart, and H. Lieberman. Modeling the detection of textual cyberbullying. The Social Mobile Web, 11:02, 2011.
[10]
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. The weka data mining software: an update. ACM SIGKDD explorations newsletter, 11(1):10--18, 2009.
[11]
Q. Huang, V. K. Singh, and P. K. Atrey. Cyber bullying detection using social and textual analysis. In Proceedings of the 3rd International Workshop on Socially-Aware Multimedia, pages 3--6. ACM, 2014.
[12]
C. J. Hutto and E. Gilbert. Vader: A parsimonious rule-based model for sentiment analysis of social media text. In Eighth International AAAI Conference on Weblogs and Social Media, 2014.
[13]
C. Langos. Cyberbullying: The challenge to define. Cyberpsychology, Behavior, and Social Networking, 15(6):285--289, 2012.
[14]
P. O'CONNELL, D. Pepler, and W. Craig. Peer involvement in bullying: Insights and challenges for intervention. Journal of adolescence, 22(4):437--452, 1999.
[15]
K. Reynolds, A. Kontostathis, and L. Edwards. Using machine learning to detect cyberbullying. In Machine Learning and Applications and Workshops (ICMLA), 2011 10th International Conference on, volume 2, pages 241--244. IEEE, 2011.
[16]
T. D. Smedt and W. Daelemans. Pattern for python. Journal of Machine Learning Research, 13(Jun):2063--2067, 2012.
[17]
D. Yin, Z. Xue, L. Hong, B. D. Davison, A. Kontostathis, and L. Edwards. Detection of harassment on web 2.0. Proceedings of the Content Analysis in the WEB, 2:1--7, 2009.

Cited By

View all

Index Terms

  1. Cyberbullying detection using parent-child relationship between comments

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    iiWAS '16: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services
    November 2016
    528 pages
    ISBN:9781450348072
    DOI:10.1145/3011141
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 November 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. SNS
    2. cyberbullying
    3. data mining

    Qualifiers

    • Research-article

    Conference

    iiWAS '16

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)18
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 15 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media