Cyberbullying in text content detection: an analytical review

Sylvia W. Azumah, Nelly Elsayed, Zag ElSayed, Murat Ozer
{"title":"Cyberbullying in text content detection: an analytical review","authors":"Sylvia W. Azumah, Nelly Elsayed, Zag ElSayed, Murat Ozer","doi":"10.1080/1206212x.2023.2256048","DOIUrl":null,"url":null,"abstract":"AbstractTechnological advancements have resulted in an exponential increase in the use of online social networks (OSNs) worldwide. While online social networks provide a great communication medium, they also increase the user's exposure to life-threatening situations such as suicide, eating disorder, cybercrime, compulsive behavior, anxiety, and depression. To tackle the issue of cyberbullying, most existing literature focuses on developing approaches to identifying factors and understanding the textual factors associated with cyberbullying. While most of these approaches have brought great success in cyberbullying research, data availability needed to develop model detection remains a challenge in the research space. This paper conducts a comprehensive literature review to provide an understanding of cyberbullying detection.Keywords: Cyberbullyingcybercrimetext detectiondeep learningsocial media Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsSylvia W. AzumahSylvia W. Azumah is a Ghanaian PhD candidate in Information Technology, specializing in cybersecurity at the University of Cincinnati. She holds a master's in IT from the same university, where she was recognized as the most outstanding student and a bachelors in IT at Bluecrest University from Ghana, West Africa An avid coder, mentor to women in cybersecurity.Nelly ElsayedDr. Nelly Elsayed is an Assistant Professor at the School of Information Technology. She is the Leader and Founder of the Applied Machine Learning and Intelligence Lab. She received a BS. and MS. degree in Computer Science from Alexandria University, and she received her MS. Eng. and Ph.D. degrees from the University of Louisiana at Lafayette. She is an IEEE Computational Intelligence Society active member. She has served as a principal investigator and co-principle investigator in different federal, educational, and industrial level-funded research projects. She received the Faculty Incentive Award for Research and Scholarship from the CECH, UC, recognizing her research contributions, journal and conference peer-reviewed publications, and professional presentations in 2020-2021. She received the Love of Learning Award from the Honor Society Phi Kappa Phi in 2019, 2021 and 2023. She received the Golden Apple Award for Excellence in Teaching (Graduate Level), CECH. She received the UCAADA Sarah Grant Barber Outstanding Advising Faculty Award for the academic year 2021-2022 University of Cincinnati. She has been an Ambassador for Goodwill of Lafayette, Louisiana, since 2017.Zag ElSayedDr Zag ElSayed was born in Odessa, USSR; he is a computer engineering scientist specializing in the Brain Machine Interface, Artificial Intelligence, Cybersecurity for Cyber-Physical Systems and I2oT as well as VLSI Digital Design. He received his B.S. and M.S. with Distinction degree of Honor from Alexandria University in 2005 where he introduced the early framework architecture for Industrial Internet of things (IoT) implementation. He got his second M.Sc. and Ph.D. in Computer Engineering from the University of Louisiana at Lafayette in 2016; he worked as a research engineer in Egypt, Russia, Ukraine, and the USA. Since 2014, he has been a constant for leading oil and gas companies specializing in Industrial IoT development and implementation. He is fluent in nine languages, a nationally recognized painting artist, and a registered Red Cross volunteer. Zag believes the key to understanding the Universe is ciphered in the human brain. This talk was given at a TEDx event using the TED conference format at https://www.ted.com/tedx.Murat OzerMurat Ozer, Ph.D. is an Assistant Professor in the School of Information Technology at the University of Cincinnati. part of the university's College of Education, Criminal Justice, and Human Services. He leads the development of the corrections chatbot which will use curated information to offer a new resource for the criminal justice system.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"111 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computers and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/1206212x.2023.2256048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 1

Abstract

AbstractTechnological advancements have resulted in an exponential increase in the use of online social networks (OSNs) worldwide. While online social networks provide a great communication medium, they also increase the user's exposure to life-threatening situations such as suicide, eating disorder, cybercrime, compulsive behavior, anxiety, and depression. To tackle the issue of cyberbullying, most existing literature focuses on developing approaches to identifying factors and understanding the textual factors associated with cyberbullying. While most of these approaches have brought great success in cyberbullying research, data availability needed to develop model detection remains a challenge in the research space. This paper conducts a comprehensive literature review to provide an understanding of cyberbullying detection.Keywords: Cyberbullyingcybercrimetext detectiondeep learningsocial media Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsSylvia W. AzumahSylvia W. Azumah is a Ghanaian PhD candidate in Information Technology, specializing in cybersecurity at the University of Cincinnati. She holds a master's in IT from the same university, where she was recognized as the most outstanding student and a bachelors in IT at Bluecrest University from Ghana, West Africa An avid coder, mentor to women in cybersecurity.Nelly ElsayedDr. Nelly Elsayed is an Assistant Professor at the School of Information Technology. She is the Leader and Founder of the Applied Machine Learning and Intelligence Lab. She received a BS. and MS. degree in Computer Science from Alexandria University, and she received her MS. Eng. and Ph.D. degrees from the University of Louisiana at Lafayette. She is an IEEE Computational Intelligence Society active member. She has served as a principal investigator and co-principle investigator in different federal, educational, and industrial level-funded research projects. She received the Faculty Incentive Award for Research and Scholarship from the CECH, UC, recognizing her research contributions, journal and conference peer-reviewed publications, and professional presentations in 2020-2021. She received the Love of Learning Award from the Honor Society Phi Kappa Phi in 2019, 2021 and 2023. She received the Golden Apple Award for Excellence in Teaching (Graduate Level), CECH. She received the UCAADA Sarah Grant Barber Outstanding Advising Faculty Award for the academic year 2021-2022 University of Cincinnati. She has been an Ambassador for Goodwill of Lafayette, Louisiana, since 2017.Zag ElSayedDr Zag ElSayed was born in Odessa, USSR; he is a computer engineering scientist specializing in the Brain Machine Interface, Artificial Intelligence, Cybersecurity for Cyber-Physical Systems and I2oT as well as VLSI Digital Design. He received his B.S. and M.S. with Distinction degree of Honor from Alexandria University in 2005 where he introduced the early framework architecture for Industrial Internet of things (IoT) implementation. He got his second M.Sc. and Ph.D. in Computer Engineering from the University of Louisiana at Lafayette in 2016; he worked as a research engineer in Egypt, Russia, Ukraine, and the USA. Since 2014, he has been a constant for leading oil and gas companies specializing in Industrial IoT development and implementation. He is fluent in nine languages, a nationally recognized painting artist, and a registered Red Cross volunteer. Zag believes the key to understanding the Universe is ciphered in the human brain. This talk was given at a TEDx event using the TED conference format at https://www.ted.com/tedx.Murat OzerMurat Ozer, Ph.D. is an Assistant Professor in the School of Information Technology at the University of Cincinnati. part of the university's College of Education, Criminal Justice, and Human Services. He leads the development of the corrections chatbot which will use curated information to offer a new resource for the criminal justice system.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
文本内容检测中的网络欺凌:分析综述
摘要技术进步导致全球在线社交网络(OSNs)的使用呈指数级增长。虽然在线社交网络提供了一个很好的交流媒介,但它们也增加了用户面临威胁生命的情况的风险,比如自杀、饮食失调、网络犯罪、强迫行为、焦虑和抑郁。为了解决网络欺凌问题,大多数现有文献侧重于开发识别因素和理解与网络欺凌相关的文本因素的方法。虽然这些方法中的大多数在网络欺凌研究中取得了巨大成功,但开发模型检测所需的数据可用性仍然是研究领域的一个挑战。本文进行了全面的文献综述,以提供对网络欺凌检测的理解。关键词:网络欺凌网络犯罪文本检测深度学习社交媒体披露声明作者未报告潜在利益冲突。西尔维娅·w·阿祖玛西尔维娅·w·阿祖玛是一位加纳籍的信息技术博士研究生,在辛辛那提大学专攻网络安全。她拥有同一所大学的IT硕士学位,在那里她被认为是最优秀的学生,并在西非加纳的Bluecrest大学获得IT学士学位。她是一名狂热的程序员,也是网络安全领域女性的导师。耐莉ElsayedDr。Nelly Elsayed是信息技术学院的助理教授。她是应用机器学习和智能实验室的负责人和创始人。她获得了学士学位。在亚历山大大学获得计算机科学硕士学位,并获得工程学硕士学位。以及路易斯安那大学拉斐特分校的博士学位。她是IEEE计算智能协会的活跃成员。她曾在不同的联邦、教育和工业水平资助的研究项目中担任首席研究员和联合首席研究员。她在2020-2021年获得了加州大学CECH颁发的教师研究激励奖和奖学金,以表彰她的研究贡献、期刊和会议同行评审出版物以及专业演讲。她在2019年,2021年和2023年获得了荣誉协会Phi Kappa Phi颁发的学习之爱奖。曾获欧洲高等教育学院研究生教学金苹果奖。她获得了辛辛那提大学2021-2022学年UCAADA莎拉·格兰特·巴伯杰出指导教师奖。自2017年以来,她一直担任路易斯安那州拉斐特亲善大使。Zag ElSayed博士出生于苏联敖德萨;他是一名计算机工程科学家,专门从事脑机接口,人工智能,网络物理系统和物联网的网络安全以及VLSI数字设计。2005年,他以优异的荣誉学位获得亚历山大大学的学士学位和硕士学位,在此期间,他介绍了工业物联网(IoT)实施的早期框架架构。他于2016年获得路易斯安那大学拉斐特分校计算机工程第二个硕士学位和博士学位;他曾在埃及、俄罗斯、乌克兰和美国担任研究工程师。自2014年以来,他一直在领先的石油和天然气公司工作,专注于工业物联网的开发和实施。他精通九种语言,是全国公认的画家,也是注册的红十字会志愿者。Zag认为理解宇宙的关键就在人脑中。这篇演讲是在TEDx活动上发表的,使用的是TED会议格式:https://www.ted.com/tedx.Murat OzerMurat Ozer博士是辛辛那提大学信息技术学院的助理教授。该校教育、刑事司法和人类服务学院的一部分。他领导了矫正聊天机器人的开发,该机器人将使用精心策划的信息为刑事司法系统提供新的资源。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Computers and Applications
International Journal of Computers and Applications Computer Science-Computer Graphics and Computer-Aided Design
CiteScore
4.70
自引率
0.00%
发文量
20
期刊介绍: The International Journal of Computers and Applications (IJCA) is a unique platform for publishing novel ideas, research outcomes and fundamental advances in all aspects of Computer Science, Computer Engineering, and Computer Applications. This is a peer-reviewed international journal with a vision to provide the academic and industrial community a platform for presenting original research ideas and applications. IJCA welcomes four special types of papers in addition to the regular research papers within its scope: (a) Papers for which all results could be easily reproducible. For such papers, the authors will be asked to upload "instructions for reproduction'''', possibly with the source codes or stable URLs (from where the codes could be downloaded). (b) Papers with negative results. For such papers, the experimental setting and negative results must be presented in detail. Also, why the negative results are important for the research community must be explained clearly. The rationale behind this kind of paper is that this would help researchers choose the correct approaches to solve problems and avoid the (already worked out) failed approaches. (c) Detailed report, case study and literature review articles about innovative software / hardware, new technology, high impact computer applications and future development with sufficient background and subject coverage. (d) Special issue papers focussing on a particular theme with significant importance or papers selected from a relevant conference with sufficient improvement and new material to differentiate from the papers published in a conference proceedings.
期刊最新文献
Weight assignment in cloud service selection based on FAHP and rough sets The social force model: a behavioral modeling approach for information propagation during significant events A comprehensive study on social networks analysis and mining to detect opinion leaders A machine learning approach for skin lesion classification on iOS: implementing and optimizing a convolutional transfer learning model with Create ML Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1