Matches in SemOpenAlex for { <https://semopenalex.org/work/W2162591330> ?p ?o ?g. }
- W2162591330 abstract "One form of online misbehaviour which has deeply affected society with harmful consequences is known as cyberbullying. Cyberbullying can simply be defined as an intentional act that is conducted through digital technology to hurt someone. Cyberbullying is a widely covered topic in the social sciences. There are many studies in which the problem of cyberbullying has been introduced and its origins and consequences have been explored in detail. There are also studies which have investigated the intervention and prevention strategies and have proposed guidelines for parents and adults in this regard. However, studies on the technical dimensions of this topic are relatively rare. In this research the overall goal was to bridge the gap between social science approaches and technical solutions. In order to be able to suggest solutions that could contribute to minimizing the risk and impact of cyberbullying we have investigated the phenomenon of cyberbullying from different angles. We have thoroughly studied the origin of cyberbullying and its growth over time, as well as the role of technology in the emergence of this type of virtual behaviour and in the potential for reducing the extent of the social concern it raises. First we introduced a novel outlook towards the cyberbullying phenomenon. We looked into the gradual changes which have occurred in relationships and social communication with the emergence of the Internet. We argued that one should look at virtual environments as virtual communities, because the human needs projected on these environments, the relationships, human concerns and misbehaviour have the same nature as in real-life societies. Therefore, to make virtual communities safe, we need to take safety measures and precautions that are similar to the ones that are common in non-virtual communities. We derived the assumption that if cyberbullying is recognized and treated as a social problem and not just seen as some random mischief conducted by individuals with the use of technology, the methods for handling its consequences are likely to be more realistic, effective and comprehensive. This part of our study led to the conviction that for combating cyberbullying, behavioural and psychological studies, and the study of technical solutions should go hand in hand.One of the main limitations that we faced when we started our research was the lack of a comprehensive dataset for cyberbullying studies. We needed a dataset which included real instances of bullying incidents. Moreover, it was essential for our studies to also have the demographic information of the social media users as well as the history of their activities. We started our preliminary experiments using a dataset that was collected from MySpace forums. This dataset did not meet all the requirements for our experiment, namely in terms of size and sufficiency of information. Therefore we developed our own YouTube dataset, with the aim to encompass extensive information about the users and their activities as well as larger numbers of bullying comments. We collected information on user activities and posted textual comments as well as personal and demographic details of the users involved. Detecting a bullying comment or post at the earliest possible moment in time can substantially decrease the negative effects of cyberbullying incidents. We started our experiments by showing that besides the conventional features used for text mining methods such as sentiment analysis and specifically bullying detection, more personal features, in this experiment gender, can improve the accuracy of the detection models. As expected the models which were optimized accordingly resulted in a more accurate classification. The improved outcome motivated us to look into other personal features as well, such as age and the writing style of users. By adding more personal information, the previous classification results were outperformed and the detection accuracy enhanced even further. In the last experiment we made use of experts’ knowledge to identify potential bully users in social networks. To better understand and interpret the intentions underlying the online activities of users of social media, we decided to incorporate human reasoning and knowledge into a bulliness rating system by developing a Multi-Criteria Evaluation System. Moreover, to have more sources of information and to make use of the potential of both human and machine, we designed a hybrid approach, incorporating machine learning models on top of the expert system. The hybrid approach reached an optimum model which outperformed the results obtained from the machine learning models and the expert system individually. Our hybrid model illustrates the added value of integrating technical solutions with insights from the social sciences for the first time. As argued in this thesis, the integration of social studies into a software-enhanced monitoring workflow could pave the way towards the tackling of this kind of online misbehaviour. The ideas and algorithms proposed for fulfilling this purpose can be a stepping stone for future research in this direction. The work carried out is also a demonstration of the added value of frameworks for text categorization, sentiment mining and user profiling in applications addressing societal issues. This work can be viewed as a contribution to the more general societal challenge of increasing the level of cybersecurity, in particular for the younger generations of social network users. By turning the internet into a safer place for children, the chances increase that they will be able to benefit from the informational richness that it also offers." @default.
- W2162591330 created "2016-06-24" @default.
- W2162591330 creator A5091125894 @default.
- W2162591330 date "2014-08-08" @default.
- W2162591330 modified "2023-09-24" @default.
- W2162591330 title "Experts and machines united against cyberbullying" @default.
- W2162591330 cites W123108252 @default.
- W2162591330 cites W1260602278 @default.
- W2162591330 cites W136459803 @default.
- W2162591330 cites W1480606622 @default.
- W2162591330 cites W1481272075 @default.
- W2162591330 cites W1482992112 @default.
- W2162591330 cites W1492737170 @default.
- W2162591330 cites W1495712467 @default.
- W2162591330 cites W1504397524 @default.
- W2162591330 cites W1529430867 @default.
- W2162591330 cites W1532593523 @default.
- W2162591330 cites W1542197169 @default.
- W2162591330 cites W1552949272 @default.
- W2162591330 cites W1563088657 @default.
- W2162591330 cites W1570448133 @default.
- W2162591330 cites W15740664 @default.
- W2162591330 cites W1602942503 @default.
- W2162591330 cites W1606069744 @default.
- W2162591330 cites W1648885110 @default.
- W2162591330 cites W173895910 @default.
- W2162591330 cites W1761475674 @default.
- W2162591330 cites W1774539535 @default.
- W2162591330 cites W1904244396 @default.
- W2162591330 cites W1924689489 @default.
- W2162591330 cites W1928047241 @default.
- W2162591330 cites W1961125382 @default.
- W2162591330 cites W1967022892 @default.
- W2162591330 cites W1967581691 @default.
- W2162591330 cites W1972062587 @default.
- W2162591330 cites W1976930398 @default.
- W2162591330 cites W1978144193 @default.
- W2162591330 cites W1983243750 @default.
- W2162591330 cites W1987871578 @default.
- W2162591330 cites W1996924157 @default.
- W2162591330 cites W2002356434 @default.
- W2162591330 cites W2004404540 @default.
- W2162591330 cites W2006292558 @default.
- W2162591330 cites W2014433011 @default.
- W2162591330 cites W2020449983 @default.
- W2162591330 cites W2026081722 @default.
- W2162591330 cites W2029022908 @default.
- W2162591330 cites W2029430065 @default.
- W2162591330 cites W2031177668 @default.
- W2162591330 cites W2034757259 @default.
- W2162591330 cites W2044173330 @default.
- W2162591330 cites W2047443612 @default.
- W2162591330 cites W2057844097 @default.
- W2162591330 cites W2061960305 @default.
- W2162591330 cites W2062866147 @default.
- W2162591330 cites W2063205814 @default.
- W2162591330 cites W2063392280 @default.
- W2162591330 cites W2069165059 @default.
- W2162591330 cites W2071042936 @default.
- W2162591330 cites W2071141511 @default.
- W2162591330 cites W2073365362 @default.
- W2162591330 cites W2075302467 @default.
- W2162591330 cites W2080782277 @default.
- W2162591330 cites W2082400853 @default.
- W2162591330 cites W2084443753 @default.
- W2162591330 cites W2094648091 @default.
- W2162591330 cites W2097726431 @default.
- W2162591330 cites W2098053295 @default.
- W2162591330 cites W2102106185 @default.
- W2162591330 cites W2104076180 @default.
- W2162591330 cites W2104278263 @default.
- W2162591330 cites W2105644778 @default.
- W2162591330 cites W2111112238 @default.
- W2162591330 cites W2112744748 @default.
- W2162591330 cites W2115268776 @default.
- W2162591330 cites W2115727255 @default.
- W2162591330 cites W2115760558 @default.
- W2162591330 cites W2116901654 @default.
- W2162591330 cites W2116951053 @default.
- W2162591330 cites W2117198260 @default.
- W2162591330 cites W2118519969 @default.
- W2162591330 cites W2119769989 @default.
- W2162591330 cites W2121029633 @default.
- W2162591330 cites W2122263961 @default.
- W2162591330 cites W2123919880 @default.
- W2162591330 cites W2124863509 @default.
- W2162591330 cites W2125681293 @default.
- W2162591330 cites W2128118337 @default.
- W2162591330 cites W2130196635 @default.
- W2162591330 cites W2133990480 @default.
- W2162591330 cites W2136453523 @default.
- W2162591330 cites W2139212933 @default.
- W2162591330 cites W2141410518 @default.
- W2162591330 cites W2142423963 @default.
- W2162591330 cites W2145302527 @default.
- W2162591330 cites W2147050295 @default.
- W2162591330 cites W2147783027 @default.
- W2162591330 cites W2148118048 @default.
- W2162591330 cites W2148603752 @default.
- W2162591330 cites W2149684865 @default.