Abstract
Nowadays the facilities of a parental control are not sufficient due to the numerous mobile devices and Internet access points. Another approach to control the children’s behavior in the Social Media is to augment the human capabilities by the usage of a cognitive assistant. Cognitive assistants usually provide such features as self-learning, adaptive behavior, big data processing, etc. This paper focuses on the design of the cognitive assistant based on the authorship attribution methods. The major functions of the cognitive assistant as an online service are highlighted, the authorship attribution methods are analyzed and the base model and architecture of the cognitive assistant service are presented. The cognitive map usage as a data analysis intelligent technique is proposed. Also some issues of the service (i.e. scalability, dependability, integration) are considered and discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ilyina, L.V.: Ugolovno-pravovoye znacheniye viktimnosty. Pravovedeniye, â„–Â 3, p. 119 (1975)
https://www.cybersmile.org/advice-help/category/is-my-child-a-cyberbully
https://www.stopbullying.gov/cyberbullying/cyberbullying-tactics/index.html
https://www.komando.com/tips/411428/does-your-teen-have-a-fake-account-online
Cheng, J.: Ars Technica Not an obscene racist after all: 4 flagged for Facebook fake. Ars Technica, 28 September 2009. http://arstechnica.com/tech-policy/2009/09/that-obscene-racist-may-be-fake-4-sued-for-profile-prank/. Accessed 24 Mar 2014
Girl, 13, commits suicide after being cyber-bullied by neighbour posing as teenage boy (n.d.). http://www.dailymail.co.uk/news/article-494809/Girl-13-commits-suicide-cyber-bullied-neighbour-posing-teenage-boy.html. Accessed 24 Mar 2014
Henry, L.: Man faces cyber-bullying charge in ex-girlfriend’s fake adult-date profile, 7 November 2013. 5NEWSOnlinecom. http://5newsonline.com/2013/11/07/man-faces-cyber-bullying-charge-in-ex-girlfriends-fake-adult-date-profile/. Accessed 24 Mar 2014
Hinduja, S., Patchin, J.W.: Bullying, cyberbullying, and suicide. Arch. Suicide Res. 14, 206–221 (2010)
Kowalski, R.M., Limber, S.P.: Psychological, physical, and academic correlates of cyberbullying and traditional bullying. J. Adolesc. Health 53(1 Suppl), S13–S20 (2013)
Davis, A.: New tools to prevent harassment, 19 December 2017. https://newsroom.fb.com/news/2017/12/new-tools-to-prevent-harassment/
Garreffa, A.: Facebook has deleted 1.3 billion fake accounts. Social Networking News, 10 September 2018. https://www.tweaktown.com/news/63113/facebook-deleted-1-3-billion-fake-accounts/index.html
https://blog.hubspot.com/marketing/twitter-harassment-cyberbullying
SafetyNet: Cyberbullying’s impact on young people’s mental health. Inquiry report. https://www.childrenssociety.org.uk/what-we-do/resources-and-publications/safety-net-the-impact-of-cyberbullying-on-children-and-young
https://www.slideshare.net/hrmn/cognitive-assistants-opportunities-and-challenges-slides
Koppel, M., Schler, J., Argamon, S.: Authorship attribution in the wild. Lang. Resour. Eval. 45, 83–94 (2011). https://doi.org/10.1007/s10579-009-9111-2
Afroz, S.: Deception in authorship attribution. Ph.D. thesis (2013). https://www1.icsi.berkeley.edu/~sadia/thesis.pdf
Coyotl-Morales, R.M., Villaseñor-Pineda, L., Montes-y-Gómez, M., Rosso, P.: Authorship attribution using word sequences. In: Proceedings of the 11th Iberoamerican Congress on Pattern Recognition, pp. 844–853. Springer (2006)
Diederich, J., Kindermann, J., Leopold, E., Paass, G.: Authorship attribution with support vector machines. Appl. Intell. 19(1/2), 109–123 (2003)
Holmes, D.I.: Authorship attribution. Comput. Humanit. 28, 87–106 (1994)
Abbasi, A., Chen, H.: Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26(2), 29 (2008). https://doi.org/10.1145/1344411.1344413. http://doi.acm.org/10.1145/1344411.1344413
Qian, T.Y., Liu, B., Li, Q., et al.: J. Comput. Sci. Technol. 30, 200 (2015). https://doi.org/10.1007/s11390-015-1513-6
Groumpos, P.P.: Fuzzy cognitive maps: basic theories and their application to complex systems. In: Glykas, M. (ed.) Fuzzy Cognitive Maps. Studies in Fuzziness and Soft Computing, vol. 247. Springer, Heidelberg (2010)
Acknowledgement
The paper has been prepared within the RFBR project 18-29-22093.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Melnik, E., Korovin, I., Klimenko, A. (2019). A Cognitive Assistant Functional Model and Architecture for the Social Media Victim Behavior Prevention. In: Silhavy, R. (eds) Artificial Intelligence Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 985. Springer, Cham. https://doi.org/10.1007/978-3-030-19810-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-19810-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19809-1
Online ISBN: 978-3-030-19810-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)