Skip to main content

Towards User Modelling in the Combat against Cyberbullying

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7337))

Abstract

Friendships, relationships and social communications have all gone to a new level with new definitions as a result of the invention of online social networks. Meanwhile, alongside this transition there is increasing evidence that online social applications have been used by children and adolescents for bullying. State-of-the-art studies in cyberbullying detection have mainly focused on the content of the conversations while largely ignoring the users involved in cyberbullying. We hypothesis that incorporation of the users’ profile, their characteristics, and post-harassing behaviour, for instance, posting a new status in another social network as a reaction to their bullying experience, will improve the accuracy of cyberbullying detection. Cross-system analyses of the users’ behaviour - monitoring users’ reactions in different online environments - can facilitate this process and could lead to more accurate detection of cyberbullying. This paper outlines the framework for this faceted approach.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Campbell, M.A.: Cyber bullying: An old problem in a new guise? Australian Journal of Guidance and Counselling 15, 68–76 (2005)

    Article  Google Scholar 

  2. Espelage, D.L., Swearer, S.M.: Research on school bullying and victimization. School Psychology Review 32, 365–383 (2003)

    Google Scholar 

  3. Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., Tippett, N.: Cyberbullying: its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry 49, 376–385 (2008)

    Article  Google Scholar 

  4. Kowalski, R.M., Limber, S.P., Agatston, P.W.: Cyber bullying: Bullying in the digital age, p. 224. Blackwell Publishing (2008)

    Google Scholar 

  5. Yin, D., Xue, Z., Hong, L., Davison, B.D., Kontostathis, A., Edwards, L.: Detection of harassment on Web 2.0. In: Proceedings of CAW2.0, Madrid, April 20-24 (2009)

    Google Scholar 

  6. Dinakar, K., Reichart, R., Lieberman, H.: Modelling the Detection of Textual Cyberbullying. In: ICWSM 2011, Barcelona, Spain, July 17-21 (2011)

    Google Scholar 

  7. Kontostathis, A.: ChatCoder: Toward the tracking and categorization of internet predators. In: Proceedings of SDM 2009, Sparks, NV, May 2 (2009)

    Google Scholar 

  8. Tan, P.N., Chen, F., Jain, A.: Information assurance: Detection of web spam attacks in social media. In: Proceedings of Army Science Conference, Orland, Florida (2010)

    Google Scholar 

  9. Chisholm, J.F.: Cyberspace violence against girls and adolescent females. Annals of the New York Academy of Sciences 1087, 74–89 (2006)

    Article  Google Scholar 

  10. Carmagnola, F., Cena, F.: User identification for cross-system personalisation. Information Sciences 179, 16–32 (2009)

    Article  Google Scholar 

  11. Abel, F., Araújo, S., Gao, Q., Houben, G.-J.: Analyzing Cross-System User Modeling on the Social Web. In: Auer, S., Díaz, O., Papadopoulos, G.A. (eds.) ICWE 2011. LNCS, vol. 6757, pp. 28–43. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. Argamon, S., Koppel, M., Fine, J., Shimoni, A.R.: Gender, genre, and writing style in formal written texts. Text - Interdisciplinary Journal for the Study of Discourse 23, 321–346 (2003)

    Article  Google Scholar 

  13. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. ACM SIGKDD Newsletter 11, 10–18 (2009)

    Article  Google Scholar 

  14. Abel, F., Henze, N., Herder, E., Krause, D.: Linkage, aggregation, alignment and enrichment of public user profiles with Mypes. In: Proceedings of I-SEMANTICS, Graz, Austria, pp. 1–8 (September 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dadvar, M., Ordelman, R., de Jong, F., Trieschnigg, D. (2012). Towards User Modelling in the Combat against Cyberbullying. In: Bouma, G., Ittoo, A., Métais, E., Wortmann, H. (eds) Natural Language Processing and Information Systems. NLDB 2012. Lecture Notes in Computer Science, vol 7337. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31178-9_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31178-9_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31177-2

  • Online ISBN: 978-3-642-31178-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics