Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network

被引:208
作者
Al-garadr, Mohammed Ali [1 ]
Varathan, Kasturi Dewi [1 ]
Ravana, Sri Devi [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Informat Syst, Kuala Lumpur, Malaysia
关键词
Online social networks; Cybercrime; Cyberbullying; Machine learning; Online communication; Twitter; SOCIAL MEDIA; ADOLESCENTS; PERSONALITY; CHILDREN; ROUTINE; PREDICT; GENDER; SITES; AGE;
D O I
10.1016/j.chb.2016.05.051
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
The popularity of online social networks has created massive social communication among their users and this leads to a huge amount of user-generated communication data. In recent years, Cyberbullying has grown into a major problem with the growth of online communication and social media. Cyberbullying has been recognized recently as a serious national health issue among online social network users and developing art efficient detection model holds tremendous practical significance. In this paper, we have proposed set of unique features derived from Twitter; network, activity, user, and tweet content, based on these feature, we developed a supervised machine learning solution for detecting cyberbullying in the Twitter. An evaluation demonstrates that our developed detection model based on our proposed features, achieved results with an area under the receiver-operating characteristic curve of 0.943 and an f-measure of 0.936. These results indicate that the proposed model based on these features provides a feasible solution to detecting Cyberbullying in online communication environments. Finally, we compare result obtained using our proposed features with the result obtained from two baseline features. The comparison outcomes show the significance of the proposed features. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:433 / 443
页数:11
相关论文
共 111 条
[61]   New bottle but old wine: A research of cyberbullying in schools [J].
Li, Qing .
COMPUTERS IN HUMAN BEHAVIOR, 2007, 23 (04) :1777-1791
[62]   Let's Gang Up on Cyberbullying [J].
Lieberman, Henry ;
Dinakar, Karthik ;
Jones, Birago .
COMPUTER, 2011, 44 (09) :93-96
[63]  
Liu XY, 2006, IEEE DATA MINING, P970
[64]  
Mahmud J., 2013, P 2013 INT C INT US, P37
[65]  
Mairesse F., Computational Models of Personality Recognition through Language
[66]   Cyber Worlds: New Playgrounds for Bullying [J].
Mark, Lauren ;
Ratliffe, Katherine .
COMPUTERS IN THE SCHOOLS, 2011, 28 (02) :92-116
[67]  
McCord M., 2011, Autonomic and Trusted Computing. Proceedings 8th International Conference (ATC 2011), P175, DOI 10.1007/978-3-642-23496-5_13
[68]  
Morstatter F., 2013, PROC INT AAAI C WEB, V7, P400, DOI [10.1609/icwsm.v7i1.14401, DOI 10.1609/ICWSM.V7I1.14401]
[69]   Using Twitter to Examine Smoking Behavior and Perceptions of Emerging Tobacco Products [J].
Myslin, Mark ;
Zhu, Shu-Hong ;
Chapman, Wendy ;
Conway, Mike .
JOURNAL OF MEDICAL INTERNET RESEARCH, 2013, 15 (08)
[70]   Classification of Tweets Using Text Classifier to Detect Cyber Bullying [J].
Nalini, K. ;
Sheela, L. Jaba .
EMERGING ICT FOR BRIDGING THE FUTURE, VOL 2, 2015, 338 :637-645