

Detection of Cyber bullying on Social Media Using Machine Learning
Abstract
With the widespread use of the Internet in modern times, a massive amount of data has been generated. However, along with its advantages, the cyberworld also has its own set of disadvantages. One such disadvantage is cyberbullying, which is an online crime. Cyberbullying occurs when bullying takes place online using technology. This research paper presents review of30 different cyberbullying researchers and the methods they use to detect bullying. Cybercrime refers to all criminal activities that use the Internet as a means of access and are carried out through computers, mobile phones, and other electronic devices. The previous research on detecting cyberbullying has been limited due to factors such as unavailability of the dataset, hidden identities of the predators, and privacy of the victims. To overcome these limitations, an efficient text mining method is proposed in this paper, which uses machine learning algorithms to actively detect bullying texts. The dataset used for evaluation is collected from myspace.com and Preverted-Justice.com. Unlike previous studies that only considered textual features, this study extracted three types of features, namely textual, behavioral, and demographic features from the dataset. The text features include intimidating words that could lead to real cyberbullying results. The behavioral trait observed is that if a person is bullied once, they might bully someone else later. The demographic features extracted from the dataset include age, gender, and location.The system’s performance was evaluated using two classifiers, namely the Support Vector Machine (SVM) and the Bernoulli NB. The SVM classifier outperformed the Bernoulli NB with an overall accuracy of 87.14
References
Y. Bengio, A. Courville, and P. Vincent, “Representation learning: A review and new perspectives,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 35, no. 8,
pp. 1798–1828, 2013
A. M. Kaplan and M. Heinlein, “Users of the world, unite! The challenges and opportunities of social media,” Business horizons, vol. 53, no. 1, pp. 59–68, 2010.
R. M. Kowalski, G. W. Giumetti, A.
N. Schroeder
M. R.Lattanner, “Bullying in the digital age: A critical review and misanalysis of cyber bullying research among youth.”2014
B. K. Biggs, J. M. Nelson, and M. L. Sampilo, “Peer relations in the anxiety–depression link: Test of a mediation model,” Anxiety, Stress, Coping, vol. 23, no. 4, pp. 431–447, 2010.
K. Dinakar, B. Jones, C.Havasi, H. Lieberman, and R. Picard. ”Common sense reasoning for detect ion, prevent ion, and mit igat ion of cyberbullying.” ACM Transact ions on Interactive Intelligent Systems (TiiS) 2, no. 3, 2012, p. 18.
V. Nahar, S. Unankard, X. Li, and C. Pang. ”Sentiment analysis for effective detect ion of cyber bullying.” In Asia- Pacific Web Conference, Springer,Berlin, Heidelberg, 2012, pp. 767-774.
V. Nahar, X. Li, C. Pang, and Y. Zhang. ”Cyberbullying detect ion based on text-st ream classification.” In The 11th Aust ralasian Data Mining Conference (AusDM 2013), 2013.
M. Dadvar, D. Trieschnigg, R. Ordelman, and F. de Jong. ”Improving cyberbullying detect ion with user context
In European Conference on Information Retrieval, Springer, Berlin, Heidelberg, 2013, pp. 693- 696.
Refbacks
- There are currently no refbacks.