Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

See No Evil, Hear No Evil: Audio-Visual-Textual Cyberbullying Detection

Published: 01 November 2018 Publication History

Abstract

Emerging multimedia communication apps are allowing for more natural communication and richer user engagement. At the same time, they can be abused to engage in cyberbullying, which can cause significant psychological harm to those affected. Thus, with the growth in multimodal communication platforms, there is an urgent need to devise multimodal methods for cyberbullying detection and prevention. However, there are no existing approaches that use automated audio and video analysis to complement textual analysis. Based on the analysis of a human-labeled cyberbullying data-set of Vine "media sessions' (six-second videos, with audio, and corresponding text comments), we report that: 1) multiple audio and visual features are significantly associated with the occurrence of cyberbullying, and 2) audio and video features complement textual features for more accurate and earlier cyberbullying detection. These results pave the way for more effective cyberbullying detection in emerging multimodal (audio, visual, virtual reality) social interaction spaces.

References

[1]
Denise E Agosto, Andrea Forte, and Rathe Magee. 2012. Cyberbullying and teens: what YA librarians can do to help. Young Adult Library Services 10, 2 (2012), 38.
[2]
Sweta Agrawal and Amit Awekar. 2018. Deep Learning for Detecting Cyberbullying Across Multiple Social Media Platforms. arXiv preprint arXiv:1801.06482 (2018).
[3]
Saleem Alhabash, Jong-hwan Baek, Carie Cunningham, and Amy Hagerstrom. 2015. To comment or not to comment?: How virality, arousal level, and commenting behavior on YouTube videos affect civic behavioral intentions. Computers in human behavior 51 (2015), 520--531.
[4]
Nazanin Andalibi, Pinar Öztürk, and Andrea Forte. 2017. Sensitive Self-disclosures, Responses, and Social Support on Instagram: The Case of# Depression. In CSCW. 1485--1500.
[5]
Craig A Anderson and Brad J Bushman. 2002. Human aggression. Annual review of psychology 53 (2002).
[6]
Zahra Ashktorab and Jessica Vitak. 2016. Designing Cyberbullying Mitigation and Prevention Solutions through Participatory Design With Teenagers. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 3895--3905.
[7]
Alexandra Balahur. 2013. Sentiment Analysis in Social Media Texts. In WASSA@ NAACL-HLT. 120--128.
[8]
Linda Beckman, Curt Hagquist, and Lisa Hellström. 2012. Does the association with psychosomatic health problems differ between cyberbullying and traditional bullying? Emotional and behavioural difficulties 17, 3--4 (2012), 421--434.
[9]
Tibor Bosse and Sven Stam. 2011. A normative agent system to prevent cyberbullying. In Web Intelligence and Intelligent Agent Technology (WI-IAT), 2011 IEEE/WIC/ACM International Conference on, Vol. 2. IEEE, 425--430.
[10]
Danah Boyd, Alice Marwick, Parry Aftab, and Maeve Koeltl. 2009. The conundrum of visibility: Youth safety and the Internet. Journal of Children and Media 3, 4 (2009), 410--419.
[11]
Stevie Chancellor, Yannis Kalantidis, Jessica A Pater, Munmun De Choudhury, and David A Shamma. 2017. Multimodal Classification of Moderated Online Pro-Eating Disorder Content. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 3213--3226.
[12]
Eshwar Chandrasekharan, Mattia Samory, Anirudh Srinivasan, and Eric Gilbert. 2017. The Bag of Communities: Identifying Abusive Behavior Online with Preexisting Internet Data. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 3175--3187.
[13]
Nitesh V. Chawla, Kevin W. Bowyer, Lawrence O. Hall, and W. Philip Kegelmeyer. 2002. SMOTE: Synthetic Minority Over-sampling Technique. J. Artif. Int. Res. 16, 1 (June 2002), 321--357. http://dl.acm.org/citation.cfm?id=1622407. 1622416
[14]
Justin Cheng, Michael Bernstein, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec. 2017. Anyone Can Become a Troll: Causes of Trolling Behavior in Online Discussions. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, USA, 1217--1230.
[15]
Clarifai. 2017. General Model. https://www.clarifai.com/models/general-image-recognition-model/ aaa03c23b3724a16a56b629203edc62c {Online; accessed 29-August-2017 }.
[16]
Niall J Conroy, Victoria L Rubin, and Yimin Chen. 2015. Automatic deception detection: Methods for finding fake news. Proceedings of the Association for Information Science and Technology 52, 1 (2015), 1--4.
[17]
M. Dadvar, Franciska M.G. de Jong, Roeland J.F. Ordelman, and Rudolf Berend Trieschnigg. 2012. Improved cyberbullying detection using gender information. Ghent University, 23--25.
[18]
Maral Dadvar, Dolf Trieschnigg, Roeland Ordelman, and Franciska de Jong. 2013. Improving cyberbullying detection with user context. In Advances in Information Retrieval. Springer, 693--696.
[19]
Nicholas A Diakopoulos. 2015. The Editor's Eye: Curation and Comment Relevance on the New York Times. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 1153-- 1157.
[20]
Karthik Dinakar, Birago Jones, Catherine Havasi, Henry Lieberman, and Rosalind Picard. 2012. Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiiS) 2, 3 (2012), 18.
[21]
Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. In The Social Mobile Web.
[22]
Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of Textual Cyberbullying. The Social Mobile Web 11, 02 (2011), 11--17.
[23]
Julian J Dooley, Therese Shaw, and Donna Cross. 2012. The association between the mental health and behavioural problems of students and their reactions to cyber-victimization. European Journal of Developmental Psychology 9, 2 (2012), 275--289.
[24]
Justin Ellis. 2015. What happened after 7 news sites got rid of reader comments. http://www.niemanlab.org/2015/09/ what-happened-after-7-news-sites-got-rid-of-reader-comments/. {Online; accessed 19-Sep-2017}.
[25]
Dorothy L Espelage, Mrinalini A Rao, and Rhonda G Craven. 2012. Theories of cyberbullying. Principles of cyberbullying research: Definitions, measures, and methodology (2012), 49--67.
[26]
Facebook. {n. d.}. Bullying Prevention Hub. https://www.facebook.com/safety/bullying/. Accessed: 2018-06--26.
[27]
FFmpeg. 2017. FFmpeg. https://www.ffmpeg.org/ {Online; accessed 29-August-2017 }.
[28]
Figure Eight. 2018. How to Calculate a Confidence Score. https://success.figure-eight.com/hc/en-us/articles/ 201855939-How-to-Calculate-a-Confidence-Score, Accessed: 2018-03-01.
[29]
Johnny R.J. Fontaine, Klaus R. Scherer, Etienne B. Roesch, and Phoebe C. Ellsworth. 2007. The World of Emotions is not Two-Dimensional. Psychological Science 18, 12 (2007), 1050--1057. arXiv:https://doi.org/10.1111/j.1467--9280.2007.02024.x 18031411
[30]
Gerald Friedland and Ramesh Jain. 2014. Multimedia Computing. Cambridge University Press.
[31]
Theodoros Giannakopoulos. 2015. pyAudioAnalysis: An Open-Source Python Library for Audio Signal Analysis. PloS one 10, 12 (2015).
[32]
Sameer Hinduja and Justin W Patchin. 2012. School climate 2.0: Preventing cyberbullying and sexting one classroom at a time. Corwin Press.
[33]
Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015. Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network. In International Conference on Social Informatics. Springer, 49--66.
[34]
Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015. Detection of cyberbullying incidents on the instagram social network. arXiv preprint arXiv:1503.03909 (2015).
[35]
Qianjia Huang, Vivek Kumar Singh, and Pradeep Kumar Atrey. 2014. Cyber bullying detection using social and textual analysis. In Proc. Int. Workshop on Socially-Aware Multimedia. ACM, 3--6.
[36]
C.J. Hutto and Eric Gilbert. 2015. VADER: A Parsimonious Rule-based Model for Sentiment Analysis of Social Media Text. In Proceedings of the 8th International Conference on Weblogs and Social Media, ICWSM 2014.
[37]
Birago Birago Korayga Jones. 2012. Reflective interfaces: Assisting teens with stressful situations online. Ph.D. Dissertation. Massachusetts Institute of Technology.
[38]
James J. Kellaris and Ronald C. Rice. 1993. The influence of tempo, loudness, and gender of listener on responses to music. Psychology and Marketing 10, 1 (1993), 15--29.
[39]
Kurt Koffka. 2013. Principles of Gestalt psychology. Vol. 44. Routledge.
[40]
Janet Kornblum. 2008. Cyberbullying grows bigger and meaner with photos, video. http://usatoday30.usatoday.com/ tech/webguide/internetlife/2008-07--14-cyberbullying_N.htm. USA Today (2008).
[41]
Rajitha Kota, Shari Schoohs, Meghan Benson, and Megan A Moreno. 2014. Characterizing cyberbullying among college students: Hacking, dirty laundry, and mocking. Societies 4, 4 (2014), 549--560.
[42]
Robin M Kowalski, Gary W Giumetti, Amber N Schroeder, and Micah R Lattanner. 2014. Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological bulletin 140, 4 (2014), 1073.
[43]
Robin M Kowalski and Susan P Limber. 2013. Psychological, physical, and academic correlates of cyberbullying and traditional bullying. Journal of Adolescent Health 53, 1 (2013), S13--S20.
[44]
Annie Lang. 2009. The limited capacity model of motivated mediated message processing. The SAGE handbook of media processes and effects (2009), 193--204.
[45]
Ingo Lutkebohle. 2016. Recognize Emotions in Images. https://www.microsoft.com/cognitive-services/en-us/ emotion-api/. {Online; accessed 19-July-2016}.
[46]
Jing Ma, Wei Gao, Zhongyu Wei, Yueming Lu, and Kam-Fai Wong. 2015. Detect rumors using time series of social context information on microblogging websites. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. ACM, 1751--1754.
[47]
Paul E Madlock and David Westerman. 2011. Hurtful Cyber-Teasing and Violence WhoÃ?Â?Â's Laughing Out Loud? Journal of interpersonal violence 26, 17 (2011), 3542--3560.
[48]
Brendan Maher. 2016. Can a video game company tame toxic behaviour? Nature 531, 7596 (2016), 568--571.
[49]
Massimo Marchiori. 2017. The secure mobile teen: Looking at the secret world of children. In 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 341--348.
[50]
Marshall McLuhan and Quentin Fiore. 1967. The medium is the message. New York 123 (1967), 126--128.
[51]
FrontGate Media. 2017. A LIST OF 723 BAD WORDS TO BLACKLIST & HOW TO USE FACEBOOK'S MODERATION TOOL. http://www.frontgatemedia.com/new/wp-content/uploads/2014/03/Terms-to-Block.csv {Online; accessed 29-August-2017 }.
[52]
Ersilia Menesini and Annalaura Nocentini. 2009. Cyberbullying definition and measurement: Some critical considerations. Zeitschrift für Psychologie/Journal of Psychology 217, 4 (2009), 230--232.
[53]
Ersilia Menesini, Annalaura Nocentini, and Pamela Calussi. 2011. The measurement of cyberbullying: Dimensional structure and relative item severity and discrimination. Cyberpsychology, Behavior, and Social Networking 14, 5 (2011), 267--274.
[54]
Joshua Meyrowitz. 2008. Medium theory. The international encyclopedia of communication (2008).
[55]
Vinita Nahar, Xue Li, and Chaoyi Pang. 2013. An Effective Approach for Cyberbullying Detection. Communications in Information Science and Management Engineering 3, 5 (2013), 238--247.
[56]
Vinita Nahar, Xue Li, Chaoyi Pang, and Yang Zhang. 2013. Cyberbullying detection based on text-stream classification. In The 11th Australasian Data Mining Conference (AusDM 2013).
[57]
Vinita Nahar, Sayan Unankard, Xue Li, and Chaoyi Pang. 2012. Sentiment analysis for effective detection of cyber bullying. In Web Technologies and Applications. Springer, 767--774.
[58]
National Crime Prevention Council. 2014. Stop bullying before it starts. http://www.ncpc.org/resources/files/pdf/ bullying/cyberbullying.pdf. Accessed: 2017-06--10.
[59]
Chikashi Nobata, Joel Tetreault, Achint Thomas, Yashar Mehdad, and Yi Chang. 2016. Abusive language detection in online user content. In Proceedings of the 25th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 145--153.
[60]
Bridianne O'Dea, Stephen Wan, Philip J Batterham, Alison L Calear, Cecile Paris, and Helen Christensen. 2015. Detecting suicidality on Twitter. Internet Interventions 2, 2 (2015), 183--188.
[61]
OpenCV. 2017. Reading and Writing Images and Video. http://docs.opencv.org/2.4/modules/highgui/doc/reading_ and_writing_images_and_video.html {Online; accessed 29-August-2017 }.
[62]
F Javier Ortega, José A Troyano, FermíN L Cruz, Carlos G Vallejo, and Fernando EnríQuez. 2012. Propagation of trust and distrust for the detection of trolls in a social network. Computer Networks 56, 12 (2012), 2884--2895.
[63]
Justin W Patchin and Sameer Hinduja. 2012. Cyberbullying prevention and response: Expert perspectives. Routledge.
[64]
Jessica A Pater, Andrew D Miller, and Elizabeth D Mynatt. 2015. This Digital Life: A Neighborhood-Based Study of Adolescents' Lives Online. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 2305--2314.
[65]
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825--2830.
[66]
Jeffrey Pennington, Richard Socher, and Christopher D. Manning. 2014. GloVe: Global Vectors for Word Representation. In Empirical Methods in Natural Language Processing (EMNLP). 1532--1543. http://www.aclweb.org/anthology/D14--1162
[67]
T Pradheep, JI Sheeba, T Yogeshwaran, and S Pradeep Devaneyan. 2017. Automatic Multi Model Cyber Bullying Detection from Social Networks. (2017).
[68]
R. I. Rafiq, H. Hosseinmardi, R. Han, Q. Lv, S. Mishra, and S. A. Mattso. 2015. Careful what you share in six seconds: Detecting cyberbullying instances in Vine. In 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 617--622.
[69]
Rahat Ibn Rafiq, Homa Hosseinmardi, Sabrina Arredondo Mattson, Richard Han, Qin Lv, and Shivakant Mishra. 2016. Analysis and detection of labeled cyberbullying instances in Vine, a video-based social network. Social Network Analysis and Mining 6, 1 (2016), 88.
[70]
Elaheh Raisi and Bert Huang. 2016. Cyberbullying identification using participant-vocabulary consistency. arXiv preprint arXiv:1606.08084 (2016).
[71]
MIT Technology Review. 2018. Intelligent Machines - Three problems with Facebook's plan to kill hate speech using AI. https://www.technologyreview.com/s/610860/three-problems-with-facebooks-plan-to-kill-hate-speech-using-ai/. Accessed: 2018-07-06.
[72]
Kelly Reynolds, April Kontostathis, and Lynne Edwards. 2011. Using machine learning to detect cyberbullying. In Proc. Int. Conf. Machine Learning and Applications and Workshops (ICMLA), Vol. 2. IEEE, 241--244.
[73]
Gerard Salton and Christopher Buckley. 1988. Term-weighting approaches in automatic text retrieval. Information processing & management 24, 5 (1988), 513--523.
[74]
Steven J Seiler and Jordana N Navarro. 2014. Bullying on the pixel playground: Investigating risk factors of cyberbullying at the intersection of childrenÃ?Â?Â's online-offline social lives. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8, 4 (2014).
[75]
Chengcheng Shao, Giovanni Luca Ciampaglia, Alessandro Flammini, and Filippo Menczer. 2016. Hoaxy: A platform for tracking online misinformation. In Proceedings of the 25th International Conference Companion on World Wide Web. International World Wide Web Conferences Steering Committee, 745--750.
[76]
Vivek Singh, Marie Radford, Huang Qianjia, and Susan Furrer. 2017. "They basically like destroyed the school one day": On Newer App Features and Cyberbullying in Schools. In Proceedings of the international conference on Computer Supported Collaborative Work and Social Computing (CSCW). ACM, 1210--1216.
[77]
Vivek K Singh, Souvick Ghosh, and Christin Jose. 2017. Toward Multimodal Cyberbullying Detection. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 2090--2099.
[78]
Vivek Kumar Singh, Qianjia Huang, and Pradeep Kumar Atrey. 2016. Cyberbullying Detection Using Probabilistic Socio-Textual Information Fusion. In Proc. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM.
[79]
Robert Slonje and Peter K Smith. 2008. Cyberbullying: Another main type of bullying? Scandinavian journal of psychology 49, 2 (2008), 147--154.
[80]
Peter K Smith, Jess Mahdavi, Manuel Carvalho, Sonja Fisher, Shanette Russell, and Neil Tippett. 2008. Cyberbullying: Its nature and impact in secondary school pupils. Journal of child psychology and psychiatry 49, 4 (2008), 376--385.
[81]
Peter K Smith, Jess Mahdavi, Manuel Carvalho, and Neil Tippett. 2006. An investigation into cyberbullying, its forms, awareness and impact, and the relationship between age and gender in cyberbullying. Research Brief No. RBX03-06. London: DfES (2006).
[82]
Andre Sourander, Anat Brunstein Klomek, Maria Ikonen, Jarna Lindroos, Terhi Luntamo, Merja Koskelainen, Terja Ristkari, and Hans Helenius. 2010. Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study. Archives of general psychiatry 67, 7 (2010), 720--728.
[83]
Junming Sui. 2015. Understanding and fighting bullying with machine learning. Ph.D. Dissertation. UNIVERSITY OF WISCONSIN--MADISON.
[84]
USA Today. 2018. Mark Zuckerberg pledges Facebook will put 'people first,' avoid past mistakes. https://www.usatoday. com/story/tech/news/2018/05/01/mark-zuckerberg-pledges-facebook-put-people-first-avoid-past-mistakes/ 564474002/. Accessed: 2018-07-06.
[85]
Robert S Tokunaga. 2010. Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in human behavior 26, 3 (2010), 277--287.
[86]
Carnegie Mellon University. 2017. Carnegie Mellon University Sphinx. https://cmusphinx.github.io/ {Online; accessed 29-August-2017 }.
[87]
Kris Varjas, Christopher C Henrich, and Joel Meyers. 2009. Urban middle school students' perceptions of bullying, cyberbullying, and school safety. Journal of School Violence 8, 2 (2009), 159--176.
[88]
William Warner and Julia Hirschberg. 2012. Detecting hate speech on the world wide web. In Proceedings of the Second Workshop on Language in Social Media. Association for Computational Linguistics, 19--26.
[89]
Amy Beth Warriner, Victor Kuperman, and Marc Brysbaert. 2013. Norms of valence, arousal, and dominance for 13,915 English lemmas. Behavior Research Methods 45, 4 (01 Dec 2013), 1191--1207.
[90]
Ralf Wölfer, Anja Schultze-Krumbholz, Pavle Zagorscak, Anne Jäkel, Kristin Göbel, and Herbert Scheithauer. 2014. Prevention 2.0: Targeting cyberbullying@ school. Prevention Science 15, 6 (2014), 879--887.
[91]
Youtube. 2016. Harassment and cyberbullying policy. https://support.google.com/youtube/answer/2802268?hl=en& ref_topic=2803176. Accessed: 2018-06--26.
[92]
Rui Zhao, Anna Zhou, and Kezhi Mao. 2016. Automatic detection of cyberbullying on social networks based on bullying features. In Proceedings of the 17th International Conference on Distributed Computing and Networking. ACM, 43.
[93]
Haoti Zhong, Hao Li, Anna Squicciarini, Sarah Rajtmajer, Christopher Griffin, David Miller, and Cornelia Caragea. 2016. Content-driven Detection of Cyberbullying on the Instagram Social Network. In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI'16). AAAI Press, 3952--3958. http://dl.acm.org/citation.cfm?id=3061053.3061172

Cited By

View all
  • (2024)Participatory Design to Address Disclosure-Based CyberbullyingProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3660716(1547-1565)Online publication date: 1-Jul-2024
  • (2024)Personally Targeted Risk vs. Humor: How Online Risk Perceptions of Youth vs. Third-Party Annotators Differ based on Privately Shared Media on InstagramProceedings of the 23rd Annual ACM Interaction Design and Children Conference10.1145/3628516.3655799(1-13)Online publication date: 17-Jun-2024
  • (2024)An Efficient Approach to Deal with Cyber Bullying using Machine Learning: A Systematic Review2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)10.1109/ic-ETITE58242.2024.10493443(1-8)Online publication date: 22-Feb-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 2, Issue CSCW
November 2018
4104 pages
EISSN:2573-0142
DOI:10.1145/3290265
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 2018
Published in PACMHCI Volume 2, Issue CSCW

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. audio-visual
  2. cyberbullying
  3. detection
  4. machine learning
  5. multimodal

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)302
  • Downloads (Last 6 weeks)49
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Participatory Design to Address Disclosure-Based CyberbullyingProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3660716(1547-1565)Online publication date: 1-Jul-2024
  • (2024)Personally Targeted Risk vs. Humor: How Online Risk Perceptions of Youth vs. Third-Party Annotators Differ based on Privately Shared Media on InstagramProceedings of the 23rd Annual ACM Interaction Design and Children Conference10.1145/3628516.3655799(1-13)Online publication date: 17-Jun-2024
  • (2024)An Efficient Approach to Deal with Cyber Bullying using Machine Learning: A Systematic Review2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE)10.1109/ic-ETITE58242.2024.10493443(1-8)Online publication date: 22-Feb-2024
  • (2024)A Multimodal Correlation and Interaction-based Method for Cyberbullying Detection2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10650748(1-8)Online publication date: 30-Jun-2024
  • (2024)View No Evil And Listen To No Evil: The Need For Harm Metrics To Evaluate Online Hate On Multimedia Communication Channels2024 IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)10.1109/AVSS61716.2024.10672585(1-8)Online publication date: 15-Jul-2024
  • (2024)Toward Multi-Modal Approach for Identification and Detection of Cyberbullying in Social NetworksIEEE Access10.1109/ACCESS.2024.342013112(90158-90170)Online publication date: 2024
  • (2024)A Review of Deep Learning Techniques for Multimodal Fake News and Harmful Languages DetectionIEEE Access10.1109/ACCESS.2024.340625812(76133-76153)Online publication date: 2024
  • (2024)A comprehensive review of cyberbullying-related content classification in online social mediaExpert Systems with Applications10.1016/j.eswa.2023.122644244(122644)Online publication date: Jun-2024
  • (2024)Shielding against online harmEngineering Applications of Artificial Intelligence10.1016/j.engappai.2024.108241133:PDOnline publication date: 1-Jul-2024
  • (2024)Exploring bystander contagion in cyberbully detection: a systematic reviewJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-024-04831-wOnline publication date: 17-Jul-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media