Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Analysis of Tweets Related to Cyberbullying: Exploring Information Diffusion and Advice Available for Cyberbullying Victims

Published: 01 October 2015 Publication History

Abstract

The use of Twitter, especially by teenagers and young people, has raised the issue of cyberbullying. There is a lack of research into what types of advice and support are available in tweets for cyberbullying victims, and into the features influencing the spread of tweets related to cyberbullying. In this study, 7,315 tweets associated with cyberbullying were extracted and analysed. The results highlighted that tweets containing features such as a higher number of URLs, hashtags, or followers did not necessarily lead to a higher number of retweets. Sentiment analysis of the tweets presented both positive and negative sentiments from users towards cyberbullying. This study manually sampled 400 tweets for content analysis. Tweets covered a variety of areas associated with cyberbullying ranging from user opinions to news events. Results showed that 33% of tweets contained advice and support for cyberbullying victims. These tweets produced the highest number of retweets in comparison with tweets covering other areas associated with cyberbullying.

References

[1]
Agarwal, S., Bennett, L., Johnson, C., & Shawn, W. 2014. A model of crowd enabled organization: Theory and methods for understanding the role of Twitter in the occupy protests. International Journal of Communication, 8, 646-672. Retrieved from http://ijoc.org/index.php/ijoc/article/view/2068/1091.
[2]
Anderson, J., Bresnahan, M., & Musatics, C. 2014. Combating weight-based cyberbullying on Facebook with the dissenter effect. Cyberpsychology, Behavior, and Social Networking, 175, 281-286. 24690025.
[3]
André, P., Bernstein, M., & Luther, K. 2012. Who gives a tweet? Evaluating microblog content value. Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work CSCW 12 pp. 471-474. New York, NY: ACM. Retrieved from https: //www.cs.cmu.edu/~pandre/pubs/whogivesatweet-cscw2012.pdf
[4]
Bhattacharya, S., Srinivasan, P., & Polgreen, P. 2014. Engagement with health agencies on Twitter. PLoS ONE, 911, e112235http://www.dx.doi.org/10.1371/journal.pone.0112235. 25379727.
[5]
Boyd, D., Golder, S., & Lotan, G. 2010. Conversational aspects of retweeting on Twitter. Proceedings of the 43rd Hawaii International Conference on Social Systems HICSS pp. 1-10. Honolulu, Hawaii: IEEE; Retrieved from http://toc.proceedings.com/07474webtoc.pdf.
[6]
Bray, P. 2013, February 13. Social Authority: Our Measure of Twitter Influence {Blog post}. Retrieved from http://moz.com/blog/social-authority
[7]
BrightPlanet. 2013, June 25. Twitter Firehose vs. Twitter API: What's the difference and why should you care? {Blog post}. Retrieved from http://www.brightplanet.com/2013/06/twitter-firehose-vs-twitter-api-whats-the-difference-and-why-should-you-care/
[8]
Bruner, J. 2015, December 18. Tweets loud and quiet {Blog post}. Retrieved from http://radar.oreilly.com/2013/12/tweets-loud-and-quiet.html
[9]
Calvin, A., Bellmore, A., Xu, J., & Zhu, X. 2014. #bully: Uses of hashtags in posts about bullying on Twitter. Journal of School Violence, 141, 133-153http://www.dx.doi.org/10.1080/15388220.2014.966828.
[10]
Camacho, S., Hassanein, K., & Head, M. 2014. Understanding the factors that influence the perceived severity of cyber-bullying. HCI in Business, 182014, 133-144.
[11]
Cha, M., Haddadi, H., Benevenuto, F., & Gummadi, P. 2010. Measuring user influence in Twitter: The million follower fallacy. Proceedings of the Fourth International Conference on Weblogs and Social Media ICWSM-2010 pp. 10-17. Menlo Park, CA: AAAI. Retrieved from http://snap.stanford.edu/class/cs224w-readings/cha10influence.pdf.
[12]
Curran, M. 2015. Gone Virtual. Retrieved from http://www.gonevirtual.org/
[13]
Ditch the Label. 2013. The annual cyberbullying survey. Retrieved from http://www.ditchthelabel.org/downloads/the-annual-cyberbullying-survey-2013.pdf
[14]
Eden, S., Heiman, T., & Olenik-Shemesh, D. 2013. Teachers' perceptions, beliefs and concerns about cyberbullying. British Journal of Educational Technology, 446, 1036-1052.
[15]
Ekman, P., & Davidson, R. 1994. The nature of emotion. New York, NY: Oxford University Press.
[16]
Fishwick, C. 2013, December 20. London Twitter users plagued by sexy Christmas spam attack. The Guardian. Retrieved from http://www.theguardian.com/technology/2013/dec/20/london-twitter-sexy-christmas-spam-attack
[17]
Genes, N., Chary, M., & Chason, K. 2014. Analysis of Twitter users sharing of official New York storm response messages. Med 2.0, 31.
[18]
Green, A. 2015. Twitter API tutorial aggregating tweets: Search API vs. streaming API {Blog post}. Retrieved from http://140dev.com/twitter-api-programming-tutorials/aggregating-tweets-search-api-vs-streaming-api/
[19]
Holfeld, B., & Grabe, M. 2012. Middle school students' perceptions of and responses to cyber bullying. Journal of Educational Computing Research, 464, 395-413.
[20]
Hong, L., Dan, O., & Davison, B. 2011. Predicting popular messages in Twitter. Proceedings of the 20th international conference companion on World Wide Web pp. 57-58. New York, NY: ACM. Retrieved from http://www.cse.lehigh.edu/~brian/pubs/2011/WWW/predicting-popular-messages-twitter.pdf
[21]
Jaffray, P. 2015. Taking Stock With Teens - Fall 2014 {Blog post}. Retrieved from http://www.piperjaffray.com/3col.aspx?id=3268
[22]
Janardhana, R. 2012, May 8. How to build a twitter sentiment analyzer? {Blog post}. Retrieved from http://ravikiranj.net/posts/2012/code/how-build-twitter-sentiment-analyzer/
[23]
Jung, Y., Leventhal, B., Kim, Y., Park, T., Lee, S., Lee, M., & Park, J. I. et al . 2014. Cyberbullying, problematic Internet use, and psychopathologic symptoms among Korean youth. Yonsei Medical Journal, 553, 826-830. 24719154.
[24]
Keim, M. 2011. Emergent use of social media: A new age of opportunity for disaster resilience. Prehospital and Disaster Medicine, 61, 47. http://www.dx.doi.org/10.1017/s1049023x11003190 21466029.
[25]
Kelley, P. G., Sleeper, M., & Cranshaw, J. 2013. Conducting Research on Twitter: A Call for Guidelines and Metrics. Proceedings of the 16th ACM Conference on Computer Supported Cooperative Work and Social Computing CSCM-2013, San Antonio, TX. ACM. Retrieved from http://patrickgagekelley.com/papers/twitter-pmj.pdf.
[26]
Kelly, H. 2015, April 24. The power of one wrong tweet CNN. Retrieved from http://edition.cnn.com/2013/04/23/tech/social-media/tweet-ripple-effect/
[27]
Kendell, S. 2013, January 27. How to decode a Tweet {Blog post}. Retrieved from http://edtechsandyk.blogspot.ca/2013/01/how-to-decode-tweet.html
[28]
Ketch, S. 2015, December 12. Instagram now has more users than Twitter {Blog post}. Retrieved from http://www.trustedreviews.com/news/instagram-now-has-more-users-than-twitter
[29]
Kontopoulos, E., Berberidis, C., Dergiades, T., & Bassiliades, N. 2013. Ontology-based sentiment analysis of twitter posts. Expert Systems with Applications, 4010, 4065-4074.
[30]
Kwak, H., Lee, C., Park, H., & Moon, S. 2010. What is Twitter, a social network or a news media? Proceedings of the 19th international conference on World Wide Web pp. 591-600. New York, NY: ACM. Retrieved from http://www.eecs.wsu.edu/~assefaw/CptS580-06/papers/2010-www-twitter.pdf.
[31]
Lawrence, L. 2014. Reliability of sentiment mining tools: A comparison of Semantria and Social Mention. Twente, Netherlands: University of Twente.
[32]
Letierce, J., Passant, A., Breslin, J., & Decker, S. 2010. Understanding how Twitter is used to spread scientific messages. Proceedings of the Web Science Conference WebSci 2010 Extending the Frontiers of Society On-Line pp. 1-10. New York, NY: ACM. Retrieved from http://journal.webscience.org/314/2/websci10_submission_79.pdf.
[33]
Liu, B., & Zhang, L. 2012. A Survey of Opinion Mining and Sentiment Analysis. New York, NY: Springer US. Retrieved from http://link.springer.com/chapter/10.1007%2F978-1-4614-3223-4_13
[34]
Lohman, R. 2015, May 14. Cyberbullying versus traditional bullying {Blog post}. Retrieved from https://www.psychologytoday.com/blog/teen-angst/201205/cyberbullying-versus-traditional-bullying
[35]
Lotan, G., Graeff, E., Ananny, M., Gaffney, D., Pearce, I., & Boyd, D. 2011. The revolutions were tweeted: Information flows during the 2011 Tunisian and Egyptian revolutions. International Journal of Communication, 5, 1375-1405. Retrieved from http://ijoc.org/index.php/ijoc/article/view/1246/643.
[36]
Margono, H., Yi, X., & Raikundalia, G. 2014. Mining Indonesian cyber bullying patterns in social networks. Proceedings of the 37th Australasian Computer Science Conference ACSC 2014, Darlinghurst, Australia pp. 115-124. Australian Computer Society.
[37]
Moreno, M., & Kota, R. 2014. Social media. In Strasburger, V., Wilson, B., & Jordan, A. Eds., Children, adolescents, and the media 3rd ed., pp. 435-486. Thousand Oakes, CA: Sage Publishers.
[38]
Nalini, K., & Sheela, L. 2015. Classification of tweets using text classifier to detect cyber bullying. In Satapathy, C., Govardhan, A., Srujan Raju, K., & Mandal, J. K. Eds., Emerging ICT for Bridging The Future - Proceedings Of The 49th Annual Convention Of The Computer Society Of India CSI Vol. 2, pp. 637-645.
[39]
Naveed, N., Gottron, T., Kunegis, J., & Alhadi, A. 2011. Bad news travel fast: A content-based analysis of interestingness on Twitter. Proceedings of the Web Science Conference WebSci 2011 pp. 1-7. New York, NY: ACM. Retrieved from http://www.websci2011.org/fileadmin/websci/Papers/2050_paper.pdf
[40]
Notar, C., Padgett, S., & Roden, J. 2013. Cyberbullying: A review of the literature. Universal Journal of Educational Research, 11, 1-9.
[41]
Osborne, M., & Lavrenko, V. 2011. RT to win! Predicting message propagation in Twitter. Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media pp. 586-589. New York, NY: AAAI; Retrieved from https://www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/view/2754/3209.
[42]
Park, J., Kim, H., Cha, M., & Jeong, J. 2012. Sentiment analysis on bad news spreading. Proceedings of the ACM CSCW Workshop on Design, Influence, and Social Technologies DIST. New York, NY: ACM. Retrieved from https://distworkshop.files.wordpress.com/2012/01/dist2012_submission_2.pdf.
[43]
Peskin, M. 2014. Adolescent dating violence. Hcdvcc.org. Retrieved from http://hcdvcc.org/2014/wp-content/uploads/2014/10/DV-among-Adolescents_October-2014.pptx
[44]
Romero, D., Galuba, W., Asur, S., & Huberman, B. 2011, Influence and passivity in social media. SSRN Journal. http://www.dx.doi.org/10.2139/ssrn.1653135
[45]
Sampasa-Kanyinga, H., Roumeliotis, P., & Xu, H. 2014. Associations between cyberbullying and school bullying victimization and suicidal ideation, plans and attempts among Canadian schoolchildren. PLoS ONE, 97, e102145. http://www.dx.doi.org/10.1371/journal.pone.0102145 25076490.
[46]
Soboroff, I., McCullough, D., Lin, J., Macdonald, C., Ounis, I., & McCreadie, R. 2012. Evaluating real-time search over tweets. In 2012 International Conference on Weblogs and Social Media ICWSM 2012 pp. 579-582. Dublin, Ireland: AAAI; Retrieved from http://www.nist.gov/customcf/get_pdf.cfm?pub_id=911362.
[47]
Statista. 2015. Number of Twitter users in the United States as of January 2015, by age group in millions. Retrieved from http://www.statista.com/statistics/398152/us-twitter-user-age-groups
[48]
StopBullying.gov. 2014. What is Cyberbullying? Retrieved from http://www.stopbullying.gov/cyberbullying/what-is-it/index.html
[49]
Stvilia, B., & Gibradze, L. 2014. What do academic libraries tweet about, and what makes a library tweet useful? Library & Information Science Research, 363-4, 136-141. http://www.dx.doi.org/10.1016/j.lisr.2014.07.001
[50]
Suh, B., Hong, L., Pirolli, P., & Chi, E. 2010. Want to be retweeted? Large scale analytics on factors impacting retweet in twitter network. In 2010 IEEE Second International Conference on Social Computing SocialCom pp. 177-184. Minneapolis, MN: IEEE. Retrieved from http://www-users.cs.umn.edu/~echi/papers/2010-socialcom/2010-06-25-retweetability-cameraready-v3.pdf.
[51]
Sul, H., Dennis, A., & Yuan, L. 2014. Trading on Twitter: The financial information content of emotion in social media. Proceedings of the 47th Hawaii International Conference on System Sciences, Hilton Waikoloa, HI, USA pp. 806-815. IEEE.
[52]
Sutton, J., League, C., Sellnow, T., & Sellnow, D. 2014. Terse messaging and public health in the midst of natural disasters: The case of the Boulder floods. Health Communication, 302, 135-143. 25470438.
[53]
Tabak, F., & Kaymen, A. E. 2014. Student experiences with cyberbullying in northern Cyprus. Procedia: Social and Behavioral Sciences, 116, 5200-5209.
[54]
Tarapdar, S., & Kellett, M. 2011. Young people's voices on cyberbullying: What can age comparisons tell us? Retrieved from http://oro.open.ac.uk/32271/1/Diana_-_Young_Peoples_Voices_Report.pdf
[55]
Twitter. 2015a. Developer Agreement & Policy. Retrieved from https://dev.twitter.com/overview/terms/agreement-and-policy
[56]
Twitter. 2015b. Privacy Policy. Retrieved from https://twitter.com/privacy?lang=en
[57]
Twitter. 2015c. Rate Limits: Chart. Retrieved from https://dev.twitter.com/rest/public/rate-limits
[58]
Twitter. 2015d. Search API vs Streaming API. Retrieved from https://twittercommunity.com/t/search-api-vs-streaming-api/9460
[59]
Twitter. 2015e. Terms of Service. Retrieved from https://twitter.com/tos?lang=en
[60]
Twitter. 2015f. Twitter Help Center | FAQs about following. Retrieved from https://support.twitter.com/articles/14019-faqs-about-following
[61]
Twitter. 2015g. Twitter Help Center | Posting links in a Tweet. Retrieved from https://support.twitter.com/articles/78124-posting-links-in-a-tweet
[62]
Twitter, 2015h. Twitter Help Center | The Twitter Glossary. Retrieved from https://support.twitter.com/groups/50-welcome-to-twitter/topics/204-the-basics/articles/166337-the-twitter-glossaryNew
[63]
Umihara, J., & Nishikitani, M. 2013. Emergent use of Twitter in the 2011 Tohoku earthquake. Prehospital and. Disaster Medicine 285, 434-440. http://www.dx.doi.org/10.1017/s1049023x13008704
[64]
Webberley, W., Allen, S., & Whitaker, R. 2011. Retweeting: A study of message-forwarding in twitter. Proceedings of the 2011 Workshop on Mobile and Online Social Networks MOSN 2011 pp. 13-18.New York, NY: IEEE. 10.1109/MOSN.2011.6060787
[65]
Wikipedia. 2015, June 30. Twitter. Retrieved from http://en.wikipedia.org/wiki/Twitter#cite_note-twitterearnings-8
[66]
Zahriyeh, E. 2014, September 17. Make this all go away: Cyberbullying multiplies teen pain. Al Jazeera America. Retrieved from http://america.aljazeera.com/watch/shows/edge-of-eighteen/articles/2014/9/17/-make-this-all-goawaycyberbullyingmultipliesteenpain.html
[67]
Zaman, T., Herbrich, R., van Gael, J., & Stern, D. 2010. Predicting information spreading in twitter. In Computational Social Science and the Wisdom of Crowds. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.208.5687&rep=rep1&type=pdf
[68]
Zarella, D. 2015. Tweets between 100 and 115 characters are more likely to be retweeted {Blog post}. Retrieved from http://danzarrella.com/new-data-tweets-between-100-and-115-characters-are-more-likely-to-be-retweeted.html
[69]
Zhu, J., Xiong, F., Piao, D., Liu, Y., & Zhang, Y. 2011. Statistically modeling the effectiveness of disaster information in social media. In 2011 IEEE Global Humanitarian Technology Conference pp. 431-436. New York, NY: IEEE. Retrieved from http://mlt.sv.cmu.edu/joy/publications/ghtc2011.pdf.

Cited By

View all
  • (2022)Hybrid Deep Learning Model–Based Prediction of Images Related to CyberbullyingInternational Journal of Applied Mathematics and Computer Science10.34768/amcs-2022-002432:2(323-334)Online publication date: 4-Jul-2022
  • (2020)Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend AnalysisProceedings of the 2020 European Interdisciplinary Cybersecurity Conference10.1145/3424954.3424960(1-6)Online publication date: 18-Nov-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image International Journal of Cyber Behavior, Psychology and Learning
International Journal of Cyber Behavior, Psychology and Learning  Volume 5, Issue 4
October 2015
82 pages
ISSN:2155-7136
EISSN:2155-7144
Issue’s Table of Contents

Publisher

IGI Global

United States

Publication History

Published: 01 October 2015

Author Tags

  1. Advice
  2. Automated Extraction
  3. Cyberbullying
  4. Tweets
  5. Twitter

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Hybrid Deep Learning Model–Based Prediction of Images Related to CyberbullyingInternational Journal of Applied Mathematics and Computer Science10.34768/amcs-2022-002432:2(323-334)Online publication date: 4-Jul-2022
  • (2020)Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend AnalysisProceedings of the 2020 European Interdisciplinary Cybersecurity Conference10.1145/3424954.3424960(1-6)Online publication date: 18-Nov-2020

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media