Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-1684-3.ch015
Geetika Sarna, M. Bhatia
Cyberbullying is a felonious act carried out against the victim by sending harassing/ embarrassing/ abusing information online. Normally offenders create fake profiles in order to hide their identity for unscrupulous activities. Assuming a fake identity is very harmful as the real picture of the offender is not visible, and also it can become difficult to entrap them. Sometimes, some trustworthy friends can also take advantage of the fake identity in order to harm the victim. Culprits can reveal victim's personal information like financial details, personal history, family, etc., and along with it, he can harass, threaten or blackmail the victim using fake profiles and permeates that information on the social network. So, it is necessary to resolve this issue. In this article, the authors used the concept of entropy and cross entropy to identify fake profiles as entropy works on the degree of uncertainty. Also, this article shows the comparison of proposed method with the existing classifiers.
{"title":"Entropy Based Identification of Fake Profiles in Social Network","authors":"Geetika Sarna, M. Bhatia","doi":"10.4018/978-1-7998-1684-3.ch015","DOIUrl":"https://doi.org/10.4018/978-1-7998-1684-3.ch015","url":null,"abstract":"Cyberbullying is a felonious act carried out against the victim by sending harassing/ embarrassing/ abusing information online. Normally offenders create fake profiles in order to hide their identity for unscrupulous activities. Assuming a fake identity is very harmful as the real picture of the offender is not visible, and also it can become difficult to entrap them. Sometimes, some trustworthy friends can also take advantage of the fake identity in order to harm the victim. Culprits can reveal victim's personal information like financial details, personal history, family, etc., and along with it, he can harass, threaten or blackmail the victim using fake profiles and permeates that information on the social network. So, it is necessary to resolve this issue. In this article, the authors used the concept of entropy and cross entropy to identify fake profiles as entropy works on the degree of uncertainty. Also, this article shows the comparison of proposed method with the existing classifiers.","PeriodicalId":117579,"journal":{"name":"Developing Safer Online Environments for Children","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114668702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-8076-8.CH004
G. Marzano
This chapter intends to present the most common technological solutions that can be implemented to prevent and reduce cyberbullying. Three main questions will be addressed: How can children stay safe online? What can the information technology (IT) industry do to combat cyberbullying? How effective is automatic cyberbullying detection? The chapter will illustrate the progress that has been made to reduce cyberbullying through technological means and discuss the notion of industry self-regulation. Indeed, the IT industry has a responsibility to respect societal obligations towards users, especially when users are children. While many companies in the industry are working responsibly on solutions for the safer use of technology, some global internet service providers are involved in the illicit use of users' personal data. As a consequence, problems of online safety cannot be solved locally, but through concerted actions undertaken at an international level.
{"title":"Technological Help to Prevent and Reduce Cyberbullying","authors":"G. Marzano","doi":"10.4018/978-1-5225-8076-8.CH004","DOIUrl":"https://doi.org/10.4018/978-1-5225-8076-8.CH004","url":null,"abstract":"This chapter intends to present the most common technological solutions that can be implemented to prevent and reduce cyberbullying. Three main questions will be addressed: How can children stay safe online? What can the information technology (IT) industry do to combat cyberbullying? How effective is automatic cyberbullying detection? The chapter will illustrate the progress that has been made to reduce cyberbullying through technological means and discuss the notion of industry self-regulation. Indeed, the IT industry has a responsibility to respect societal obligations towards users, especially when users are children. While many companies in the industry are working responsibly on solutions for the safer use of technology, some global internet service providers are involved in the illicit use of users' personal data. As a consequence, problems of online safety cannot be solved locally, but through concerted actions undertaken at an international level.","PeriodicalId":117579,"journal":{"name":"Developing Safer Online Environments for Children","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132408353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}