Skip to main content

A Cognitive Assistant Functional Model and Architecture for the Social Media Victim Behavior Prevention

  • Conference paper
  • First Online:
Artificial Intelligence Methods in Intelligent Algorithms (CSOC 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 985))

Included in the following conference series:

Abstract

Nowadays the facilities of a parental control are not sufficient due to the numerous mobile devices and Internet access points. Another approach to control the children’s behavior in the Social Media is to augment the human capabilities by the usage of a cognitive assistant. Cognitive assistants usually provide such features as self-learning, adaptive behavior, big data processing, etc. This paper focuses on the design of the cognitive assistant based on the authorship attribution methods. The major functions of the cognitive assistant as an online service are highlighted, the authorship attribution methods are analyzed and the base model and architecture of the cognitive assistant service are presented. The cognitive map usage as a data analysis intelligent technique is proposed. Also some issues of the service (i.e. scalability, dependability, integration) are considered and discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ilyina, L.V.: Ugolovno-pravovoye znacheniye viktimnosty. Pravovedeniye, № 3, p. 119 (1975)

    Google Scholar 

  2. https://www.cybersmile.org/advice-help/category/is-my-child-a-cyberbully

  3. https://www.stopbullying.gov/cyberbullying/cyberbullying-tactics/index.html

  4. https://www.komando.com/tips/411428/does-your-teen-have-a-fake-account-online

  5. https://www.telesign.com/fake-user-impact-report/

  6. Cheng, J.: Ars Technica Not an obscene racist after all: 4 flagged for Facebook fake. Ars Technica, 28 September 2009. http://arstechnica.com/tech-policy/2009/09/that-obscene-racist-may-be-fake-4-sued-for-profile-prank/. Accessed 24 Mar 2014

  7. Girl, 13, commits suicide after being cyber-bullied by neighbour posing as teenage boy (n.d.). http://www.dailymail.co.uk/news/article-494809/Girl-13-commits-suicide-cyber-bullied-neighbour-posing-teenage-boy.html. Accessed 24 Mar 2014

  8. Henry, L.: Man faces cyber-bullying charge in ex-girlfriend’s fake adult-date profile, 7 November 2013. 5NEWSOnlinecom. http://5newsonline.com/2013/11/07/man-faces-cyber-bullying-charge-in-ex-girlfriends-fake-adult-date-profile/. Accessed 24 Mar 2014

  9. Hinduja, S., Patchin, J.W.: Bullying, cyberbullying, and suicide. Arch. Suicide Res. 14, 206–221 (2010)

    Article  Google Scholar 

  10. Kowalski, R.M., Limber, S.P.: Psychological, physical, and academic correlates of cyberbullying and traditional bullying. J. Adolesc. Health 53(1 Suppl), S13–S20 (2013)

    Article  Google Scholar 

  11. Davis, A.: New tools to prevent harassment, 19 December 2017. https://newsroom.fb.com/news/2017/12/new-tools-to-prevent-harassment/

  12. Garreffa, A.: Facebook has deleted 1.3 billion fake accounts. Social Networking News, 10 September 2018. https://www.tweaktown.com/news/63113/facebook-deleted-1-3-billion-fake-accounts/index.html

  13. https://blog.hubspot.com/marketing/twitter-harassment-cyberbullying

  14. https://www.washingtonpost.com/news/the-switch/wp/2018/04/11/ai-will-solve-facebooks-most-vexing-problems-mark-zuckerberg-says-just-dont-ask-when-or-how/?noredirect=on

  15. SafetyNet: Cyberbullying’s impact on young people’s mental health. Inquiry report. https://www.childrenssociety.org.uk/what-we-do/resources-and-publications/safety-net-the-impact-of-cyberbullying-on-children-and-young

  16. https://www.slideshare.net/hrmn/cognitive-assistants-opportunities-and-challenges-slides

  17. Koppel, M., Schler, J., Argamon, S.: Authorship attribution in the wild. Lang. Resour. Eval. 45, 83–94 (2011). https://doi.org/10.1007/s10579-009-9111-2

    Article  Google Scholar 

  18. Afroz, S.: Deception in authorship attribution. Ph.D. thesis (2013). https://www1.icsi.berkeley.edu/~sadia/thesis.pdf

  19. Coyotl-Morales, R.M., Villaseñor-Pineda, L., Montes-y-Gómez, M., Rosso, P.: Authorship attribution using word sequences. In: Proceedings of the 11th Iberoamerican Congress on Pattern Recognition, pp. 844–853. Springer (2006)

    Google Scholar 

  20. Diederich, J., Kindermann, J., Leopold, E., Paass, G.: Authorship attribution with support vector machines. Appl. Intell. 19(1/2), 109–123 (2003)

    Article  Google Scholar 

  21. Holmes, D.I.: Authorship attribution. Comput. Humanit. 28, 87–106 (1994)

    Article  Google Scholar 

  22. Abbasi, A., Chen, H.: Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26(2), 29 (2008). https://doi.org/10.1145/1344411.1344413. http://doi.acm.org/10.1145/1344411.1344413

    Article  Google Scholar 

  23. Qian, T.Y., Liu, B., Li, Q., et al.: J. Comput. Sci. Technol. 30, 200 (2015). https://doi.org/10.1007/s11390-015-1513-6

    Article  Google Scholar 

  24. Groumpos, P.P.: Fuzzy cognitive maps: basic theories and their application to complex systems. In: Glykas, M. (ed.) Fuzzy Cognitive Maps. Studies in Fuzziness and Soft Computing, vol. 247. Springer, Heidelberg (2010)

    Google Scholar 

Download references

Acknowledgement

The paper has been prepared within the RFBR project 18-29-22093.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anna Klimenko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Melnik, E., Korovin, I., Klimenko, A. (2019). A Cognitive Assistant Functional Model and Architecture for the Social Media Victim Behavior Prevention. In: Silhavy, R. (eds) Artificial Intelligence Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 985. Springer, Cham. https://doi.org/10.1007/978-3-030-19810-7_6

Download citation

Publish with us

Policies and ethics