Exploring bystander contagion in cyberbully detection: a systematic review

3区 计算机科学 Q1 Computer Science Journal of Ambient Intelligence and Humanized Computing Pub Date : 2024-07-17 DOI:10.1007/s12652-024-04831-w
Haifa Saleh Alfurayj, Belén F. Hurtado, Syaheerah Lebai Lutfi, Toqir A. Rana
{"title":"Exploring bystander contagion in cyberbully detection: a systematic review","authors":"Haifa Saleh Alfurayj, Belén F. Hurtado, Syaheerah Lebai Lutfi, Toqir A. Rana","doi":"10.1007/s12652-024-04831-w","DOIUrl":null,"url":null,"abstract":"<p>Since the advent of mass access to the Internet, aggressive behaviors such as cyberbullying have become widespread on social networking sites. An aggressive online environment can lead to negative attitudes that negatively impact the victim, bystanders, and the bullies themselves. One of the main reasons for the increase in this type of behavior is contagion from bystanders—a phenomenon that needs to be stopped. In recent years, many studies have looked at cyberbullying detection, considering various factors to improve detection, such as extracting different types of features, comparing the performance of different classifiers, and processing datasets in myriad ways. It is evident from our findings that previous works in the literature fell short of detecting cyberbullying by ignoring the characteristics of bystanders and their roles. Thus, this paper aims to present a systematic literature review of research conducted over the past 10 years to determine which methods encompassed features related to bystanders and their role and analyzed the contagion and causal factors of the spread of cyberbullying. There are different studies confirmed the existence of bystander contagion, which researchers rarely consider to detect cyberbullying. This gap could be exploited in future studies and used to improve the detection of cyberbullying. Therefore, in this paper, the summary and comparison of findings from the selected studies that examined the role of bystanders in cyberbullying are presented, concluding how bystander-related features could contribute to the detection of cyberbullying.</p>","PeriodicalId":14959,"journal":{"name":"Journal of Ambient Intelligence and Humanized Computing","volume":"23 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Ambient Intelligence and Humanized Computing","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12652-024-04831-w","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

Since the advent of mass access to the Internet, aggressive behaviors such as cyberbullying have become widespread on social networking sites. An aggressive online environment can lead to negative attitudes that negatively impact the victim, bystanders, and the bullies themselves. One of the main reasons for the increase in this type of behavior is contagion from bystanders—a phenomenon that needs to be stopped. In recent years, many studies have looked at cyberbullying detection, considering various factors to improve detection, such as extracting different types of features, comparing the performance of different classifiers, and processing datasets in myriad ways. It is evident from our findings that previous works in the literature fell short of detecting cyberbullying by ignoring the characteristics of bystanders and their roles. Thus, this paper aims to present a systematic literature review of research conducted over the past 10 years to determine which methods encompassed features related to bystanders and their role and analyzed the contagion and causal factors of the spread of cyberbullying. There are different studies confirmed the existence of bystander contagion, which researchers rarely consider to detect cyberbullying. This gap could be exploited in future studies and used to improve the detection of cyberbullying. Therefore, in this paper, the summary and comparison of findings from the selected studies that examined the role of bystanders in cyberbullying are presented, concluding how bystander-related features could contribute to the detection of cyberbullying.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
探索网络欺凌检测中的旁观者传染:系统性综述
自从互联网大规模普及以来,网络欺凌等攻击性行为在社交网站上变得十分普遍。具有攻击性的网络环境会导致消极的态度,对受害者、旁观者和欺凌者本身造成负面影响。此类行为增多的主要原因之一是旁观者的传染--这种现象必须加以制止。近年来,许多研究都对网络欺凌检测进行了探讨,考虑了各种因素以提高检测能力,如提取不同类型的特征、比较不同分类器的性能以及以多种方式处理数据集。我们的研究结果表明,以往的文献由于忽视了旁观者的特征及其作用,在检测网络欺凌方面存在不足。因此,本文旨在对过去 10 年的研究进行系统的文献回顾,以确定哪些方法包含了与旁观者及其角色相关的特征,并分析了网络欺凌传播的传染性和因果因素。有不同的研究证实了旁观者传染的存在,但研究人员很少考虑用旁观者传染来检测网络欺凌。在未来的研究中,可以利用这一空白点来改进对网络欺凌的检测。因此,本文总结并比较了所选研究中旁观者在网络欺凌中的作用,总结出旁观者相关特征如何有助于发现网络欺凌。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Ambient Intelligence and Humanized Computing
Journal of Ambient Intelligence and Humanized Computing COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCEC-COMPUTER SCIENCE, INFORMATION SYSTEMS
CiteScore
9.60
自引率
0.00%
发文量
854
期刊介绍: The purpose of JAIHC is to provide a high profile, leading edge forum for academics, industrial professionals, educators and policy makers involved in the field to contribute, to disseminate the most innovative researches and developments of all aspects of ambient intelligence and humanized computing, such as intelligent/smart objects, environments/spaces, and systems. The journal discusses various technical, safety, personal, social, physical, political, artistic and economic issues. The research topics covered by the journal are (but not limited to): Pervasive/Ubiquitous Computing and Applications Cognitive wireless sensor network Embedded Systems and Software Mobile Computing and Wireless Communications Next Generation Multimedia Systems Security, Privacy and Trust Service and Semantic Computing Advanced Networking Architectures Dependable, Reliable and Autonomic Computing Embedded Smart Agents Context awareness, social sensing and inference Multi modal interaction design Ergonomics and product prototyping Intelligent and self-organizing transportation networks & services Healthcare Systems Virtual Humans & Virtual Worlds Wearables sensors and actuators
期刊最新文献
Predicting the unconfined compressive strength of stabilized soil using random forest coupled with meta-heuristic algorithms Expressive sign language system for deaf kids with MPEG-4 approach of virtual human character MEDCO: an efficient protocol for data compression in wireless body sensor network A multi-objective gene selection for cancer diagnosis using particle swarm optimization and mutual information Partial policy hidden medical data access control method based on CP-ABE
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1