Skip to main content

An Enhanced Model for Abusive Behavior Detection in Social Network

  • Conference paper
  • First Online:
  • 713 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 29))

Abstract

Due to the growing use of social media, incidents of online abuse are also on rise. Online abusive behavior is defined as the use of electronic devices connected through internet for offensive activities. It is mostly in the form of comments containing abusive words about others, which affect the target users’ psychology and depresses them. This paper is aimed at devising method for detecting abusive behavior using supervised learning techniques. Two hypotheses are presented to extract features for detection of offensive comments. The initial experiments show that using features using our proposed method has better accuracy than the traditional feature extraction techniques like TF-IDF.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Pickering, T.A., Yuen, T.T., Wang, T.: STEM conversations in social media: implications on STEM education. In: 2016 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), Bangkok, pp. 296–302 (2016). https://doi.org/10.1109/TALE.2016.7851810

  2. Li, Q., Liu, P.: Detecting user behavior anomalies in communication networks. In: 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), Chengdu, pp. 384–388 (2017). https://doi.org/10.1109/icccbda.2017.7951943

  3. Chen, Y., Lv, Y., Wang, X., Wang, F.Y.: A convolutional neural network for traffic information sensing from social media text. In: 2017 IEEE 20th International Conference on Intelligent Transportation Systems (ITSC), Yokohama, pp. 1–6 (2017). https://doi.org/10.1109/itsc.2017.8317650

  4. Lourentzou, I., Morales, A., Zhai, C.: Text-based geolocation prediction of social media users with neural networks. In: 2017 IEEE International Conference on Big Data (Big Data), Boston, MA, pp. 696–705 (2017). https://doi.org/10.1109/bigdata.2017.8257985

  5. Ivaschenko, A., Khorina, A., Isayko, V., Krupin, D., Bolotsky, V., Sitnikov, P.: Modeling of user behavior for social media analysis. In: 2018 Moscow Workshop on Electronic and Networking Technologies (MWENT), Moscow, pp. 1–4 (2018). https://doi.org/10.1109/MWENT.2018.8337258

  6. Gupta, S., Singhal, A.: Phishing URL detection by using artificial neural network with PSO. In: 2nd International Conference on Telecommunication and Networks (TEL-NET), Noida, pp. 1–6 (2017). https://doi.org/10.1109/tel-net.2017.8343553

  7. Li, H.: Centrality analysis of online social network big data. In: 2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA), Shanghai, pp. 38–42 (2018). https://doi.org/10.1109/ICBDA.2018.8367648

  8. Whittaker, E., Kowalski, R.M.: Abusive behavior via social media. J. Sch. Violence 14(1), 11–29 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kefaya Qaddoum .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qaddoum, K., Ahmad, I., Javed, Y., Rodan, A. (2019). An Enhanced Model for Abusive Behavior Detection in Social Network. In: Barolli, L., Xhafa, F., Khan, Z., Odhabi, H. (eds) Advances in Internet, Data and Web Technologies. EIDWT 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 29. Springer, Cham. https://doi.org/10.1007/978-3-030-12839-5_43

Download citation

Publish with us

Policies and ethics