Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network

被引:201
作者
Al-garadr, Mohammed Ali [1 ]
Varathan, Kasturi Dewi [1 ]
Ravana, Sri Devi [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Informat Syst, Kuala Lumpur, Malaysia
关键词
Online social networks; Cybercrime; Cyberbullying; Machine learning; Online communication; Twitter; SOCIAL MEDIA; ADOLESCENTS; PERSONALITY; CHILDREN; ROUTINE; PREDICT; GENDER; SITES; AGE;
D O I
10.1016/j.chb.2016.05.051
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
The popularity of online social networks has created massive social communication among their users and this leads to a huge amount of user-generated communication data. In recent years, Cyberbullying has grown into a major problem with the growth of online communication and social media. Cyberbullying has been recognized recently as a serious national health issue among online social network users and developing art efficient detection model holds tremendous practical significance. In this paper, we have proposed set of unique features derived from Twitter; network, activity, user, and tweet content, based on these feature, we developed a supervised machine learning solution for detecting cyberbullying in the Twitter. An evaluation demonstrates that our developed detection model based on our proposed features, achieved results with an area under the receiver-operating characteristic curve of 0.943 and an f-measure of 0.936. These results indicate that the proposed model based on these features provides a feasible solution to detecting Cyberbullying in online communication environments. Finally, we compare result obtained using our proposed features with the result obtained from two baseline features. The comparison outcomes show the significance of the proposed features. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:433 / 443
页数:11
相关论文
共 111 条
[1]  
Adali S, 2012, 2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), P302, DOI 10.1109/ASONAM.2012.58
[2]  
Aggarwal A., 2012, eCrime Researchers Summit (eCrime), 2012, P1
[3]  
[Anonymous], 2012, P 21 ACM INT C INFOR
[4]  
[Anonymous], 2015, P 2 WORKSHOP COMPUTA, DOI [DOI 10.3115/V1/W15-1203, 10.3115/v1/w15-1203]
[5]  
[Anonymous], 2013, WHATS NAME USING 1 N
[6]  
[Anonymous], WHAT ARE THEY BIOGGI
[7]  
[Anonymous], 2009, 1 MONDAY
[8]  
[Anonymous], PATTERN RECOGN LETT
[9]  
[Anonymous], 2011, J COMPUT SCI-NETH, DOI DOI 10.1016/j.jocs.2010.12.007
[10]  
[Anonymous], INT AAAI C WEBL SOC