Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3091478.3091487acmconferencesArticle/Chapter ViewAbstractPublication PageswebsciConference Proceedingsconference-collections
research-article

Mean Birds: Detecting Aggression and Bullying on Twitter

Published: 25 June 2017 Publication History

Abstract

In recent years, bullying and aggression against social media users have grown significantly, causing serious consequences to victims of all demographics. Nowadays, cyberbullying affects more than half of young social media users worldwide, suffering from prolonged and/or coordinated digital harassment. Also, tools and technologies geared to understand and mitigate it are scarce and mostly ineffective. In this paper, we present a principled and scalable approach to detect bullying and aggressive behavior on Twitter. We propose a robust methodology for extracting text, user, and network-based attributes, studying the properties of bullies and aggressors, and what features distinguish them from regular users. We find that bullies post less, participate in fewer online communities, and are less popular than normal users. Aggressors are relatively popular and tend to include more negativity in their posts. We evaluate our methodology using a corpus of 1.6M tweets posted over 3 months, and show that machine learning classification algorithms can accurately detect users exhibiting bullying and aggressive behavior, with over 90% AUC.

References

[1]
About suspended accounts. 2017. (2017). goo.gl/asJgpq.
[2]
Jeremy Blackburn, Ramanuja Simha, Nicolas Kourtellis, Xiang Zuo, Matei Ripeanu, John Skvoretz, and Adriana Iamnitchi. 2012. Branded with a scarlet "C": cheaters in a gaming social network. In WWW.
[3]
V. D. Blondel, J. L. Guillaume, R. Lambiotte, and E. Lefebvre. 2011. The Louvain method for community detection in large networks. Statistical Mechanics: Theory and Experiment 10 (2011).
[4]
Cyberbullying Research Center. 2016. (26 November 2016). goo.gl/7kzSY0.
[5]
Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Hate is not Binary: Studying Abusive Behavior of #GamerGate on Twitter. In ACM Hypertext.
[6]
Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying. In WWW CyberSafety Workshop.
[7]
Despoina Chatzakou, Vassiliki Koutsonikola, Athena Vakali, and Konstantinos Kafetsios. 2013. Micro-blogging Content Analysis via Emotionally-Driven Clustering. In ACII.
[8]
Nitesh V. Chawla, Kevin W. Bowyer, Lawrence O. Hall, and W. Philip Kegelmeyer. 2002. SMOTE: Synthetic Minority Over-sampling Technique. Artificial Intelligence Research 16, 1 (2002).
[9]
Chao Chen, Andy Liaw, and Leo Breiman. 2004. Using random forest to learn imbalanced data. University of California, Berkeley (2004).
[10]
C. Chen, J. Zhang, X. Chen, Y. Xiang, and W. Zhou. 2015. 6 million spam tweets: A large ground truth for timely Twitter spam detection. In IEEE ICC.
[11]
Ying Chen, Yilu Zhou, Sencun Zhu, and Heng Xu. 2012. Detecting Offensive Language in Social Media to Protect Adolescent Online Safety. In PASSAT and SocialCom.
[12]
Lucie Corcoran, Conor Mc Guckin, and Garry Prentice. 2015. Cyberbullying or Cyber Aggression? A Review of Existing Definitions of Cyber-Based Peer-toPeer Aggression. Societies 5, 2 (2015).
[13]
CrowdFlower. 2017. (2017). crowdflower.com.
[14]
Maral Dadvar, Dolf Trieschnigg, and Franciska Jong. 2014. Experts and machines against bullies: A hybrid approach to detect cyberbullies. In Canadian AI.
[15]
Jesse Davis and Mark Goadrich. 2006. The relationship between Precision-Recall and ROC curves. In Machine learning.
[16]
Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. The Social Mobile Web 11 (2011).
[17]
Nemanja Djuric, Jing Zhou, Robin Morris, Mihajlo Grbovic, Vladan Radosavljevic, and Narayan Bhamidipati. 2015. Hate Speech Detection with Comment Embeddings. In WWW.
[18]
Maria Giatsoglou, Despoina Chatzakou, Neil Shah, Christos Faloutsos, and Athena Vakali. 2015. Reteeting Activity on Twitter: Signs of Deception. In PAKDD.
[19]
Dorothy Wunmi Grigg. 2010. Cyber-aggression: Definition and concept of cyberbullying. Australian Journal of Guidance and Counselling 20, 02 (2010).
[20]
Laura D. Hanish, Becky Kochenderfer-Ladd, Richard A. Fabes, Carol Lynn Martin, Donna Denning, and others. 2004. Bullying among young children: The influence of peers and teachers. Bullying in American schools: A social-ecological perspective on prevention and intervention (2004).
[21]
James A. Hanley and Barbara J. McNeil. 1982. The meaning and use of the area under a receiver operating characteristic (ROC) curve. Radiology 143, 1 (1982).
[22]
Hatebase database. 2017. (2017). https://www.hatebase.org/.
[23]
Gabriel Emile Hine, Jeremiah Onaolapo, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, and Jeremy Blackburn. 2017. Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web. In ICWSM.
[24]
Homa Hosseinmardi, Richard Han, Qin Lv, Shivakant Mishra, and Amir Ghasemianlangroodi. 2014. Towards understanding cyberbullying behavior in a semi-anonymous social network. In IEEE/ACM ASONAM.
[25]
Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015. Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network. In In SocInfo.
[26]
Fang Jin, Edward Dougherty, Parang Saraf, Yang Cao, and Naren Ramakrishnan. 2013. Epidemiological Modeling of News and Rumors on Twitter. In SNAKDD.
[27]
Ji-Hyun, K. 2009. Estimating Classification Error Rate: Repeated Cross-validation, Repeated Hold-out and Bootstrap. Comput. Stat. Data Anal. 53, 11 (2009).
[28]
Imrul Kayes, Nicolas Kourtellis, Daniele Quercia, Adriana Iamnitchi, and Francesco Bonchi. 2015. The Social World of Content Abusers in Community Question Answering. In WWW.
[29]
Jon M. Kleinberg. 1999. Hubs, Authorities, and Communities. Comput. Surveys 31, 4es, Article 5 (1999).
[30]
A. Massanari. 2015. #Gamergate and The Fappening: How Reddit's algorithm, governance, and culture support toxic technocultures. New Media & Society (2015).
[31]
Lucy McMahon. 2000. Bullying and harassment in the workplace. International Journal of Contemporary Hospitality Management 12, 6 (2000).
[32]
Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. CoRR abs/1301.3781 (2013).
[33]
Meagan Miller. 2016. goo.gl/n1W6nt. (4 Oct 2016).
[34]
Vinita Nahar, Sayan Unankard, Xue Li, and Chaoyi Pang. 2012. Sentiment Analysis for Effective Detection of Cyber Bullying. In APWeb.
[35]
Gonzalo Navarro. 2001. A Guided Tour to Approximate String Matching. Comput. Surveys 33, 1 (2001).
[36]
Chikashi Nobata, Joel Tetreault, Achint Thomas, Yashar Mehdad, and Yi Chang. 2016. Abusive Language Detection in Online User Content. In WWW.
[37]
List of Swear Words & Curse Words. 2017. (2017). goo.gl/ur1Ind.
[38]
Jerrad Arthur Patch. 2015. Detecting bullying on Twitter using emotion lexicons.
[39]
J. Pfeffer, T. Zorbach, and K. M. Carley. 2014. Understanding online firestorms: Negative word-of-mouth dynamics in social media networks. Journal of Marketing Communications 20, 1--2 (2014).
[40]
Pham, Sherisse. 2017. Twitter tries new measures in crackdown on harassment. CNNtech. (7 February 2017). goo.gl/nMi4ZQ.
[41]
Stephanie Pieschl, Torsten Porsch, Tobias Kahl, and Rahel Klockenbusch. 2013. Relevant dimensions of cyberbullying - Results from two experimental studies. Journal of Applied Developmental Psychology 34, 5 (2013).
[42]
J. R. Quinlan. 1986. Induction of Decision Trees. Machine Learning 1, 1 (1986).
[43]
Rozsa, Matthew 2016. Twitter trolls are now abusing the company's bottom line. goo.gl/SryS3k. (2016).
[44]
A. Saravanaraj, J. I. Sheeba, and S. Pradeep Devaneyan. 2016. Automatic Detection of Cyberbullying from Twitter. IJCSITS 6 (2016).
[45]
SentiStrength. 2017. http://sentistrength.wlv.ac.uk/. (2017).
[46]
P. K. Smith, J. Mahdavi, M. Carvalho, S. Fisher, S. Russell, and N. Tippett. 2008. Cyberbullying: Its nature and impact in secondary school pupils. In Child Psychology and Psychiatry.
[47]
stopbullying.gov. 2014. Facts About Bullying. (2014). goo.gl/in5JJB.
[48]
Gianluca Stringhini, Christopher Kruegel, and Giovanni Vigna. 2010. Detecting spammers on social networks. In ACSAC.
[49]
Aatif Sulleyman. 2017. Twitter temporarily limiting users for abusive behaviour. Independent. (16 February 2017). goo.gl/yfJrZn.
[50]
The Guardian. 2015. Twitter CEO: We suck at dealing with trolls and abuse. goo.gl/6CxnwP. (2015).
[51]
The Guardian. 2016. Did trolls cost Twitter 3.5bn and its sale goo.gl/2IdA5W. (2016).
[52]
Robert S. Tokunaga. 2010. Review: Following You Home from School: A Critical Review and Synthesis of Research on Cyberbullying Victimization. Computers in Human Behavior 26, 3 (2010).
[53]
UMICH SI650 - Sentiment Classification. 2011. https://inclass.kaggle.com/c/si650winter11. (15 Apr 2011).
[54]
Cynthia Van Hee, Els Lefever, Ben Verhoeven, Julie Mennes, Bart Desmet, Guy De Pauw, Walter Daelemans, and Véronique Hoste. 2015. Automatic detection and prevention of cyberbullying. In Human and Social Analytics.
[55]
A. H. Wang. 2010. Don't follow me: Spam detection in Twitter. In SECRYPT.
[56]
Jun-Ming Xu, Xiaojin Zhu, and Amy Bellmore. 2012. Fast Learning for Sentiment Analysis on Bullying. In WISDOM.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WebSci '17: Proceedings of the 2017 ACM on Web Science Conference
June 2017
438 pages
ISBN:9781450348966
DOI:10.1145/3091478
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 June 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cyberaggression
  2. cyberbullying
  3. twitter

Qualifiers

  • Research-article

Funding Sources

Conference

WebSci '17
Sponsor:
WebSci '17: ACM Web Science Conference
June 25 - 28, 2017
New York, Troy, USA

Acceptance Rates

WebSci '17 Paper Acceptance Rate 30 of 85 submissions, 35%;
Overall Acceptance Rate 245 of 933 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)150
  • Downloads (Last 6 weeks)11
Reflects downloads up to 18 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Artificial Intelligence in Detecting and Preventing Online HarassmentAI Tools and Applications for Women’s Safety10.4018/979-8-3693-1435-7.ch002(14-35)Online publication date: 19-Jan-2024
  • (2024)Cross-lingual hate speech detection using domain-specific word embeddingsPLOS ONE10.1371/journal.pone.030652119:7(e0306521)Online publication date: 30-Jul-2024
  • (2024)Opinion leaders on sporting events for country brandingJournal of Vacation Marketing10.1177/13567667241227640Online publication date: 22-Jan-2024
  • (2024)MTBullyGNN: A Graph Neural Network-Based Multitask Framework for Cyberbullying DetectionIEEE Transactions on Computational Social Systems10.1109/TCSS.2022.323097411:1(849-858)Online publication date: Feb-2024
  • (2024)Decoding Cyberbullying on Social Media: A Machine Learning Exploration2024 IEEE Conference on Artificial Intelligence (CAI)10.1109/CAI59869.2024.00084(425-428)Online publication date: 25-Jun-2024
  • (2024)RoBERTaNET: Enhanced RoBERTa Transformer Based Model for Cyberbullying Detection With GloVe FeaturesIEEE Access10.1109/ACCESS.2024.338663712(58950-58959)Online publication date: 2024
  • (2024)Detection of Hate Speech and Offensive Language CodeMix Text in Dravidian Languages Using Cost-Sensitive Learning ApproachIEEE Access10.1109/ACCESS.2024.335881112(20064-20090)Online publication date: 2024
  • (2024)A comprehensive review of cyberbullying-related content classification in online social mediaExpert Systems with Applications10.1016/j.eswa.2023.122644244(122644)Online publication date: Jun-2024
  • (2024)CALEB: A Conditional Adversarial Learning Framework to enhance bot detectionData & Knowledge Engineering10.1016/j.datak.2023.102245149(102245)Online publication date: Jan-2024
  • (2024)Towards comprehensive cyberbullying detection: A dataset incorporating aggressive texts, repetition, peerness, and intent to harmComputers in Human Behavior10.1016/j.chb.2023.108123153(108123)Online publication date: Apr-2024
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media