Skip to main content
Top
Published in: Social Network Analysis and Mining 1/2018

01-12-2018 | Original Article

BullyBlocker: toward an interdisciplinary approach to identify cyberbullying

Authors: Yasin N. Silva, Deborah L. Hall, Christopher Rich

Published in: Social Network Analysis and Mining | Issue 1/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cyberbullying is the deliberate use of online digital media to communicate false, embarrassing, or hostile information about another person. It is the most common online risk for adolescents, yet well over half of young people do not tell their parents when it occurs. While there have been many studies about the nature and prevalence of cyberbullying, there have been relatively few in the area of automated identification of cyberbullying that integrate findings from computer science and psychology. The goal of our work is thus to adopt an interdisciplinary approach to develop an automated model for identifying and measuring the degree of cyberbullying in social networking sites, and a Facebook app, built on this model, that notifies parents about the likelihood that their adolescent is a cyberbullying victim. This paper describes the challenges associated with building a computer model for cyberbullying identification, presents key results from psychology research that can be used to inform such a model, introduces a holistic model and mobile app design for cyberbullying identification, presents a novel evaluation framework for assessing the effectiveness of the identification model, and highlights crucial areas of future work. Importantly, the proposed model—which can be applied to other social networking sites—is the first that we know of to bridge computer science and psychology to address this timely problem.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Baldry AC, Farrington DP, Sorrentino A (2016) Cyberbullying in youth: a pattern of disruptive behaviour. Psicología Educativa 22(1):19–26CrossRef Baldry AC, Farrington DP, Sorrentino A (2016) Cyberbullying in youth: a pattern of disruptive behaviour. Psicología Educativa 22(1):19–26CrossRef
go back to reference Bonnet DG (2007) Transforming odds ratios into correlations for meta-analytic research. Am Psychol 62(3):254–255CrossRef Bonnet DG (2007) Transforming odds ratios into correlations for meta-analytic research. Am Psychol 62(3):254–255CrossRef
go back to reference Dinakar K, Reichart R, Lieberman H (2011) Modeling the Detection of Textual Cyberbullying. In: The international AAAI conference on web and social media (ICWSM) Dinakar K, Reichart R, Lieberman H (2011) Modeling the Detection of Textual Cyberbullying. In: The international AAAI conference on web and social media (ICWSM)
go back to reference Dooley JJ, Pyżalski J, Cross D (2009) Cyberbullying versus face-to-face bullying: a theoretical and conceptual review. J Psychol 217(4):182–188 Dooley JJ, Pyżalski J, Cross D (2009) Cyberbullying versus face-to-face bullying: a theoretical and conceptual review. J Psychol 217(4):182–188
go back to reference Fedewa AL, Ahn S (2011) The effects of bullying and peer victimization on sexual-minority and heterosexual youths: a quantitative meta-analysis of the literature. J GLBT Family Stud 7:398–418CrossRef Fedewa AL, Ahn S (2011) The effects of bullying and peer victimization on sexual-minority and heterosexual youths: a quantitative meta-analysis of the literature. J GLBT Family Stud 7:398–418CrossRef
go back to reference Golbeck J (2013) Analyzing the social web. Morgan Kaufmann, Burlington Golbeck J (2013) Analyzing the social web. Morgan Kaufmann, Burlington
go back to reference Guo S (2016) A meta-analysis of the predictors of cyberbullying perpetration and victimization. Psychol Sch 53(4):432–453CrossRef Guo S (2016) A meta-analysis of the predictors of cyberbullying perpetration and victimization. Psychol Sch 53(4):432–453CrossRef
go back to reference Hinduja S, Patchin JW (2008) Cyberbullying: an exploratory analysis of factors related to offending and victimization. Deviant Behavior 29(2):129–156CrossRef Hinduja S, Patchin JW (2008) Cyberbullying: an exploratory analysis of factors related to offending and victimization. Deviant Behavior 29(2):129–156CrossRef
go back to reference Hinduja S, Patchin JW (2013) Social influences on cyberbullying behaviors among middle and high school students. J Youth Adolesc 42(5):711–722CrossRef Hinduja S, Patchin JW (2013) Social influences on cyberbullying behaviors among middle and high school students. J Youth Adolesc 42(5):711–722CrossRef
go back to reference Hosseinmardi H, Rafiq RI, Han R, Lv Q, Mishra S (2016) Prediction of cyberbullying incidents in a media-based social network. In: The IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM) Hosseinmardi H, Rafiq RI, Han R, Lv Q, Mishra S (2016) Prediction of cyberbullying incidents in a media-based social network. In: The IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM)
go back to reference Huang Q, Singh VK, Atrey PK (2014) Cyber bullying detection using social and textual analysis. In: The 3rd international workshop on socially-aware multimedia (SAM) Huang Q, Singh VK, Atrey PK (2014) Cyber bullying detection using social and textual analysis. In: The 3rd international workshop on socially-aware multimedia (SAM)
go back to reference Kelleher JD, Namee BM, D’Arcy A (2015) Fundamentals of machine learning for predictive data analytics: algorithms, worked examples, and case studies, 1st edn. The MIT Press, CambridgeMATH Kelleher JD, Namee BM, D’Arcy A (2015) Fundamentals of machine learning for predictive data analytics: algorithms, worked examples, and case studies, 1st edn. The MIT Press, CambridgeMATH
go back to reference Kowalski RM, Limber SP (2007) Electronic bullying among middle school students. J Adolesc Health 41(6):S22–S30CrossRef Kowalski RM, Limber SP (2007) Electronic bullying among middle school students. J Adolesc Health 41(6):S22–S30CrossRef
go back to reference Kowalski RK, Giumetti GW, Schroeder AN, Lattanner MR (2014) Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Psychol Bull 140(4):1073–1137CrossRef Kowalski RK, Giumetti GW, Schroeder AN, Lattanner MR (2014) Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Psychol Bull 140(4):1073–1137CrossRef
go back to reference Mishna F, Khoury-Kassabri M, Gadalla T, Daciuk J (2012) Risk factors for involvement in cyber bullying: victims, bullies and bully–victims. Child Youth Serv Rev 34(1):63–70CrossRef Mishna F, Khoury-Kassabri M, Gadalla T, Daciuk J (2012) Risk factors for involvement in cyber bullying: victims, bullies and bully–victims. Child Youth Serv Rev 34(1):63–70CrossRef
go back to reference Morstatter F, Pfeffer J, Liu H, Carley KM (2013) Is the sample good enough? comparing data from Twitter’s streaming API with Twitter’s Firehose. In: Proceedings of the 7th international AAAI conference on web and social media (ICWSM) Morstatter F, Pfeffer J, Liu H, Carley KM (2013) Is the sample good enough? comparing data from Twitter’s streaming API with Twitter’s Firehose. In: Proceedings of the 7th international AAAI conference on web and social media (ICWSM)
go back to reference Nand P, Perera R, Kasture A (2016) How bullying is this message?: a psychometric thermometer for bullying. In: COLING, pp 695–706 Nand P, Perera R, Kasture A (2016) How bullying is this message?: a psychometric thermometer for bullying. In: COLING, pp 695–706
go back to reference Ortega R, Elipe P, Mora-Merchin JA, Calmaestra J, Vega E (2009) The emotional impact on victims of traditional bullying and cyberbullying: a study of Spanish adolescents. J Psychol 217(4):197–204 Ortega R, Elipe P, Mora-Merchin JA, Calmaestra J, Vega E (2009) The emotional impact on victims of traditional bullying and cyberbullying: a study of Spanish adolescents. J Psychol 217(4):197–204
go back to reference Patchin JW, Hinduja S (2012) Cyberbullying—an update and synthesis of the research. In: Patchin JW, Hindija S (eds) Cyberbullying prevention and response. Routledge, London, pp 13–35CrossRef Patchin JW, Hinduja S (2012) Cyberbullying—an update and synthesis of the research. In: Patchin JW, Hindija S (eds) Cyberbullying prevention and response. Routledge, London, pp 13–35CrossRef
go back to reference Piazza J, Bering JM (2009) Evolutionary cyber-psychology: applying an evolutionary framework to Internet behavior. Comput Hum Behav 25(6):1258–1269CrossRef Piazza J, Bering JM (2009) Evolutionary cyber-psychology: applying an evolutionary framework to Internet behavior. Comput Hum Behav 25(6):1258–1269CrossRef
go back to reference Rafiq RI, Hosseinmardi H, Han R, Lv Q, Mishra S, Arredondo-Mattson S (2015) Careful what you share in six seconds: detecting cyberbullying instances in Vine. In: The IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM) Rafiq RI, Hosseinmardi H, Han R, Lv Q, Mishra S, Arredondo-Mattson S (2015) Careful what you share in six seconds: detecting cyberbullying instances in Vine. In: The IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM)
go back to reference Reynolds K, Kontostathis A, Edwards L (2011) Using Machine Learning to Detect Cyberbullying. In: The 10th international conference on machine learning and applications and workshops (ICMLA) Reynolds K, Kontostathis A, Edwards L (2011) Using Machine Learning to Detect Cyberbullying. In: The 10th international conference on machine learning and applications and workshops (ICMLA)
go back to reference Silva YN, Pearson S, Cheney JA (2013) Database Similarity Join for Metric Spaces. The International Conference on Similarity Search and Applications (SISAP), vol 8199. Springer LNCS, pp 266–279 Silva YN, Pearson S, Cheney JA (2013) Database Similarity Join for Metric Spaces. The International Conference on Similarity Search and Applications (SISAP), vol 8199. Springer LNCS, pp 266–279
go back to reference Silva YN, Pearson SS, Chon J, Roberts R (2015) Similarity Joins: Their implementation and interactions with other database operators. Inf Syst 52:149–162CrossRef Silva YN, Pearson SS, Chon J, Roberts R (2015) Similarity Joins: Their implementation and interactions with other database operators. Inf Syst 52:149–162CrossRef
go back to reference Silva YN, Rich C, Hall D (2016) BullyBlocker: towards the identification of cyberbullying in social networking sites. In: The IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), 2016, pp 1377–1379 Silva YN, Rich C, Hall D (2016) BullyBlocker: towards the identification of cyberbullying in social networking sites. In: The IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), 2016, pp 1377–1379
go back to reference Squicciarini A, Rajtmajer S, Liu Y, Griffin C (2015) Identification and characterization of cyberbullying dynamics in an online social network. In: The IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM) Squicciarini A, Rajtmajer S, Liu Y, Griffin C (2015) Identification and characterization of cyberbullying dynamics in an online social network. In: The IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM)
go back to reference Tokunaga RS (2010) Following you home from school: a critical review and synthesis of research on cyberbullying victimization. Comput Hum Behav 26(3):277–287CrossRef Tokunaga RS (2010) Following you home from school: a critical review and synthesis of research on cyberbullying victimization. Comput Hum Behav 26(3):277–287CrossRef
go back to reference Van Geel M, Vedder P, Tanilon J (2014) Relationship between peer victimization, cyberbullying, and suicide in children and adolescents: a meta-analysis. JAMA Pediatr 168(5):435–442CrossRef Van Geel M, Vedder P, Tanilon J (2014) Relationship between peer victimization, cyberbullying, and suicide in children and adolescents: a meta-analysis. JAMA Pediatr 168(5):435–442CrossRef
go back to reference Williams KR, Guerra NG (2007) Prevalence and predictors of internet bullying. J Adolesc Health 41(6):S14–S21CrossRef Williams KR, Guerra NG (2007) Prevalence and predictors of internet bullying. J Adolesc Health 41(6):S14–S21CrossRef
go back to reference Wolke D, Lereya T, Tippett N (2016) Individual and social determinants of bullying and cyberbullying. In: Vollink T, Dehue F, Guckin C (eds) Cyberbullying. Routledge, London, pp 26–53 Wolke D, Lereya T, Tippett N (2016) Individual and social determinants of bullying and cyberbullying. In: Vollink T, Dehue F, Guckin C (eds) Cyberbullying. Routledge, London, pp 26–53
go back to reference Xu J-M, Jun K-S, Zhu X, Bellmore A (2012) Learning from bullying traces in social media. In: Proceedings of the 2012 conference of the North American chapter of the association for computational linguistics: Human language technologies. Association for Computational Linguistics, pp 656–666 Xu J-M, Jun K-S, Zhu X, Bellmore A (2012) Learning from bullying traces in social media. In: Proceedings of the 2012 conference of the North American chapter of the association for computational linguistics: Human language technologies. Association for Computational Linguistics, pp 656–666
go back to reference Ybarra ML, Mitchell KJ (2008) How risky are social networking sites? a comparison of places online where youth sexual solicitation and harassment occurs. Pediatrics 121(2):e350–e357CrossRef Ybarra ML, Mitchell KJ (2008) How risky are social networking sites? a comparison of places online where youth sexual solicitation and harassment occurs. Pediatrics 121(2):e350–e357CrossRef
go back to reference Tang M, Tahboub RY, Aref WG, Atallah MJ, Malluhi QM, Ouzzani M, Silva YN (2016) Similarity Group-by Operators for Multi-dimensional Relational Data. IEEE Trans Knowl Data Eng 28(2):510–523 Tang M, Tahboub RY, Aref WG, Atallah MJ, Malluhi QM, Ouzzani M, Silva YN (2016) Similarity Group-by Operators for Multi-dimensional Relational Data. IEEE Trans Knowl Data Eng 28(2):510–523
go back to reference Yu C, Cui B, Wang S, Su J (2007) Efficient index-based knn join processing for high-dimensional data. Inf Softw Technol 49:332–344 Yu C, Cui B, Wang S, Su J (2007) Efficient index-based knn join processing for high-dimensional data. Inf Softw Technol 49:332–344
Metadata
Title
BullyBlocker: toward an interdisciplinary approach to identify cyberbullying
Authors
Yasin N. Silva
Deborah L. Hall
Christopher Rich
Publication date
01-12-2018
Publisher
Springer Vienna
Published in
Social Network Analysis and Mining / Issue 1/2018
Print ISSN: 1869-5450
Electronic ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-018-0496-z

Other articles of this Issue 1/2018

Social Network Analysis and Mining 1/2018 Go to the issue

Premium Partner