Abstract
Cyberbullying refers to bullying that occurs through the Internet or text messaging. Understanding the nature of cyberbullying and its implications has become an important issue in society. In an attempt to assist with intervention and prevention efforts, the development of computational systems for detecting acts of cyberbullying has become a common trend. However, prior research notes that such systems are typically vulnerable to inaccurate detections, in particular false-positives. Given the prevalence of cyberbullying across age demographics, understanding how humans identify such activity is important for informing and improving such prevention/intervention efforts and reducing system vulnerability. A study was conducted that asked 180 participants to evaluate three excerpts taken from the social media site Formspring. Participants indicated that the use of profane words, and the determination that someone was harmed by the content of the social media post were the most likely determinants that cyberbullying occurred in the post.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Lenhart, A.: Cyberbullying: what the research is telling us. Retrieved 16 Apr 2011 from http://www.pewinternet.org/Presentations/2010/May/Cyberbullying-2010.aspx (2010)
Ling, R., Stald, G.: Mobile communities: are we talking about a village, a clan, or a small group? Am. Behav. Sci. 53, 1133–1147 (2010)
Magoc, D., Tomaka, J., Bridges-Arzaga, A.: Using the web to increase physical activity in college students. Am. J. Health Behav. 35, 142–154 (2011)
Zhan, Z., Xu, F., Ye, H.: Effects of an online learning community on active and reflective learners’ learning performance and attitudes in a face-to-face undergraduate course. Comput. Educ. 56, 961–968 (2011)
Kowalski, R.M., Giumetti, G., Schroeder, A., Lattanner, M.: Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Psychol. Bull. 140, 1073–1137 (2014)
Smith, P.K., del Barrio, C., Tokunaga, R.: Definitions of bullying and cyberbullying: how useful are the terms? In: Bauman, S., Cross, D., Walker, J. (eds.) Principles of Cyberbullying Research: Definition, Measures, and Methods, pp. 29–40. Routledge, Philadelphia (2012)
O’Brennan, L.M., Bradshaw, C.P., Sawyer, A.L.: Examining developmental differences in the social-emotional problems among frequent bullies, victims, and bully/victims. Psychol. Schools 46, 100–115 (2009)
Pontzer, D.: A theoretical test of bullying behavior: parenting, personality, and the bully/victim relationship. J. Family Violence 25, 259–273 (2010)
Tokunaga, R.S.: Following you home from school: a critical review and synthesis of research on cyber bullying victimization. Comput. Hum. Behav. 26, 277–287 (2010)
Kowalski, R.M., Limber, S., Agatston, P.W.: Cyberbullying: bullying in the digital age, 2nd edn. Wiley, Malden (2012)
Olweus, D.: School bullying: development and some important challenges. Ann. Rev. Clin. Psychol. 9, 751–780 (2013)
Patchin, J.W., Hinduja, S.: Cyberbullying: an update and synthesis of the research. In: Patchin, J.W., Hinduja, S. (eds.) Cyberbullying Prevention and Response: Expert Perspectives, pp. 13–36. Routledge, New York (2012)
Diener, E.: The Psychology of Group Influence. Erlbaum, New York (1980)
Nansel, T.R., Overpeck, M., Pilla, R.S., Ruan, W., Simons-Morton, B., Scheidt, P.: Bullying behaviors among U.S. youth: prevalence and association with psychosocial adjustment. J. Am. Med. Assoc. 285, 2094–2100 (2001)
Bayzick, J., Kontostathis, A., Edwards, L.: Detecting the presence of cyberbullying using computer software. In: 3rd Annual ACM Web Science Conference (WebSci ‘11), pp. 1–2 (2011)
Kontostathis, A., Reynolds, K., Garron, A., Edwards, L.: Detecting cyberbullying: query terms and techniques. In: 5th Annual ACM Web Science Conference (WebSci ‘13), pp. 195–204 (2013)
Xu, J.M., Jun, K.S., Zhu, X., Bellmore, A.: Learning from bullying traces in social media. In: The 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 656–666 (2012)
Yin, D., Xue, Z., Hong, L., Davison, B.D., Kontostathis, A., Edwards, L.: Detection of harassment on web 2.0. In: Proceedings of the Content Analysis in the WEB, vol. 2, pp. 1–7 (2009)
Bosse, T., Stam, S.: A normative agent system to prevent cyberbullying. In: Web Intelligence and Intelligent Agent Technology (WI-IAT), IEEE/WIC/ACM International Conference, vol. 2, pp. 425–430 (2011)
Dinakar, K., Jones, B., Havasi, C., Lieberman, H., Picard, R.: Common sense reasoning for detection, prevention, and mitigation of cyberbullying. In: ACM Transactions on Interactive Intelligent Systems (TiiS), vol. 2, no. 3, p. 18 (2012)
Kontostathis, A., Edwards, L., Leatherman, A.: Text mining and cybercrime. In: Text Mining: Applications and Theory. Wiley, Chichester (2010)
Mishna, F., Cook, C., Gadalla, T., Daciuk, J., Solomon, S.: Cyber bullying behaviors among middle and high school students. Am. J. Orthopsychiatry 80(3), 362–374 (2010)
Acknowledgments
We would like to acknowledge and thank April Kontostathis from Ursinus College for granting us permission to use her FormSpring dataset to conduct this study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Dillon, E., Macbeth, J., Kowalski, R., Whittaker, E., Gilbert, J.E. (2016). “Is This Cyberbullying or Not?”: Intertwining Computational Detection with Human Perception (A Case Study). In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing, vol 501. Springer, Cham. https://doi.org/10.1007/978-3-319-41932-9_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-41932-9_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41931-2
Online ISBN: 978-3-319-41932-9
eBook Packages: EngineeringEngineering (R0)