scholarly journals Detection of Harassment Type of Cyberbullying: A Dictionary of Approach Words and Its Impact

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Syed Mahbub ◽  
Eric Pardede ◽  
A. S. M. Kayes

The purpose of this paper is to analyse the effects of predatory approach words in the detection of cyberbullying and to propose a mechanism of generating a dictionary of such approach words. The research incorporates analysis of chat logs from convicted felons, to generate a dictionary of sexual approach words. By analysing data across multiple social networks, the study demonstrates the usefulness of such a dictionary of approach words in detection of online predatory behaviour through machine learning algorithms. It also shows the difference between the nature of contents across specific social network platforms. The proposed solution to detect cyberbullying and the domain of approach words are scalable to fit real-life social media, which can have a positive impact on the overall health of online social networks. Different types of cyberbullying have different characteristics. However, existing cyberbullying detection works are not targeted towards any of these specific types. This research is tailored to focus on sexual harassment type of cyberbullying and proposes a novel dictionary of approach words. Since cyberbullying is a growing threat to the mental health and intellectual development of adolescents in the society, models targeted towards the detection of specific type of online bullying or predation should be encouraged among social network researchers.

Author(s):  
M. G. Khachatrian ◽  
P. G. Klyucharev

Online social networks are of essence, as a tool for communication, for millions of people in their real world. However, online social networks also serve an arena of information war. One tool for infowar is bots, which are thought of as software designed to simulate the real user’s behaviour in online social networks.The paper objective is to develop a model for recognition of bots in online social networks. To develop this model, a machine-learning algorithm “Random Forest” was used. Since implementation of machine-learning algorithms requires the maximum data amount, the Twitter online social network was used to solve the problem of bot recognition. This online social network is regularly used in many studies on the recognition of bots.For learning and testing the Random Forest algorithm, a Twitter account dataset was used, which involved above 3,000 users and over 6,000 bots. While learning and testing the Random Forest algorithm, the optimal hyper-parameters of the algorithm were determined at which the highest value of the F1 metric was reached. As a programming language that allowed the above actions to be implemented, was chosen Python, which is frequently used in solving problems related to machine learning.To compare the developed model with the other authors’ models, testing was based on the two Twitter account datasets, which involved as many as half of bots and half of real users. As a result of testing on these datasets, F1-metrics of 0.973 and 0.923 were obtained. The obtained F1-metric values  are quite high as compared with the papers of other authors.As a result, in this paper a model of high accuracy rates was obtained that can recognize bots in the Twitter online social network.


Author(s):  
P. Ponvasan ◽  
M. Muthusangari

Social networking sites are very useful in sharing information, making friends and keeping in touch with old friends. It is an online service, platform, or site that focuses on facilitating the building of social networks and social elation among peoples for sharing interests, activities, backgrounds, or real-life connections. But with the increasing demand of social networking sites (SNS) privacy and security concern have also increased. Protecting personal information privacy has become a controversial issue among online social network providers and users. Most social network providers have developed several techniques to decrease threats and risks to the users’ privacy. These risks include the misuse of personal information which may lead to illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their personal information privacy, as well as the suitability of the privacy systems which they use to modify privacy settings. In this paper, categorize the picture as sensitive or normal. If it is sensitive means, perform copyrights algorithms. Then provide the permission to the receiver end for download the images in secure manner. Experimental result can be shows that in real time environments using C#.NET as front end and SQL SERVER as back end and comparative study of existing algorithms based on computational time and privacy rate.


2014 ◽  
Vol 17 (02) ◽  
pp. 1450008
Author(s):  
MELISSA FALETRA ◽  
NATHAN PALMER ◽  
JEFFREY S. MARSHALL

A mathematical model was developed for opinion propagation on online social networks using a scale-free network with an adjustable clustering coefficient. Connected nodes influence each other when the difference between their opinion values is less than a threshold value. The model is used to examine effectiveness of three different approaches for influencing public opinion. The approaches examined include (1) a "Class", defined as an approach (such as a class or book) that greatly influences a small, randomly selected portion of the population, (2) an "Advertisement", defined as an approach (such as a TV or online advertisement) that has a small influence at each viewing on a large randomly selected portion of the population, and (3) an "App", defined as an approach (such as a Facebook game or smartphone "App") that spreads via the online social network (rather than randomly) and has a small influence at each viewing on the affected population. The Class and Advertisement approaches result in similar overall influence on the population, despite the fact that these approaches are highly different. In contrast, the App approach has a much more significant effect on opinion values of users occupying clusters within the social network compared to the overall population.


2021 ◽  
Vol 9 ◽  
Author(s):  
Sensen Guo ◽  
Xiaoyu Li ◽  
Zhiying Mu

In recent years, machine learning technology has made great improvements in social networks applications such as social network recommendation systems, sentiment analysis, and text generation. However, it cannot be ignored that machine learning algorithms are vulnerable to adversarial examples, that is, adding perturbations that are imperceptible to the human eye to the original data can cause machine learning algorithms to make wrong outputs with high probability. This also restricts the widespread use of machine learning algorithms in real life. In this paper, we focus on adversarial machine learning algorithms on social networks in recent years from three aspects: sentiment analysis, recommendation system, and spam detection, We review some typical applications of machine learning algorithms and adversarial example generation and defense algorithms for machine learning algorithms in the above three aspects in recent years. besides, we also analyze the current research progress and prospects for the directions of future research.


2021 ◽  
Vol 9 (1) ◽  
Author(s):  
Sunyoung Park ◽  
Lasse Gerrits

AbstractAlthough migration has long been an imperative topic in social sciences, there are still needs of study on migrants’ unique and dynamic transnational identity, which heavily influences the social integration in the host society. In Online Social Network (OSN), where the contemporary migrants actively communicate and share their stories the most, different challenges against migrants’ belonging and identity and how they cope or reconcile may evidently exist. This paper aims to scrutinise how migrants are manifesting their belonging and identity via different technological types of online social networks, to understand the relations between online social networks and migrants’ multi-faceted transnational identity. The research introduces a comparative case study on an online social movement led by Koreans in Germany via their online communities, triggered by a German TV advertisement considered as stereotyping East Asians given by white supremacy’s point of view. Starting with virtual ethnography on three OSNs representing each of internet generations (Web 1.0 ~ Web 3.0), two-step Qualitative Data Analysis is carried out to examine how Korean migrants manifest their belonging and identity via their views on “who we are” and “who are others”. The analysis reveals how Korean migrants’ transnational identities differ by their expectation on the audience and the members in each online social network, which indicates that the distinctive features of the online platform may encourage or discourage them in shaping transnational identity as a group identity. The paper concludes with the two main emphases: first, current OSNs comprising different generational technologies play a significant role in understanding the migrants’ dynamic social values, and particularly, transnational identities. Second, the dynamics of migrants’ transnational identity engages diverse social and situational contexts. (keywords: transnational identity, migrants’ online social networks, stereotyping migrants, technological evolution of online social network).


2014 ◽  
Vol 25 (10) ◽  
pp. 1450056 ◽  
Author(s):  
Ke-Ke Shang ◽  
Wei-Sheng Yan ◽  
Xiao-Ke Xu

Previously many studies on online social networks simply analyze the static topology in which the friend relationship once established, then the links and nodes will not disappear, but this kind of static topology may not accurately reflect temporal interactions on online social services. In this study, we define four types of users and interactions in the interaction (dynamic) network. We found that active, disappeared, new and super nodes (users) have obviously different strength distribution properties and this result also can be revealed by the degree characteristics of the unweighted interaction and friendship (static) networks. However, the active, disappeared, new and super links (interactions) only can be reflected by the strength distribution in the weighted interaction network. This result indicates the limitation of the static topology data on analyzing social network evolutions. In addition, our study uncovers the approximately stable statistics for the dynamic social network in which there are a large variation for users and interaction intensity. Our findings not only verify the correctness of our definitions, but also helped to study the customer churn and evaluate the commercial value of valuable customers in online social networks.


2016 ◽  
Vol 42 (6) ◽  
pp. 536-552 ◽  
Author(s):  
Shaista Wasiuzzaman ◽  
Siavash Edalat

Purpose – The vast amount of information available via online social networks (OSN) makes it a very good avenue for understanding human behavior. One of the human characteristics of interest to financial practitioners is an individual’s financial risk tolerance. The purpose of this paper is to look at the relationship between an individual’s OSN behavior and his/her financial risk tolerance. Design/methodology/approach – The study uses data collected from a sample of 220 university students and the backward variables selection ordinary least squares regression analysis technique to achieve its objective. Findings – The results of the study find that the frequency of logging on to social network sites indicates an individual who has higher financial risk tolerance. Additionally, the increasing use of social networks for social connection is found to be associated with lower financial risk tolerance. The results are mostly consistent when the sample is split based on prior financial knowledge. Originality/value – To the authors’ knowledge this is the first study which documents the possibility of understanding an individual’s financial risk tolerance via his/her social network activity. This provides investment/financial consultants with more avenues for gathering information in order to understand their current or potential clients hence providing better services.


2019 ◽  
Vol 3 (Supplement_1) ◽  
pp. S529-S529
Author(s):  
Daniele Zaccaria ◽  
Georgia Casanova ◽  
Antonio Guaita

Abstract In the last decades the study of older people and social networks has been at the core of gerontology research. The literature underlines the positive health effects of traditional and online social connections and also the social networks’s positive impact on cognitive performance, mental health and quality of life. Aging in a Networked Society is a randomized controlled study aimed at investigating causal impact of traditional face-to-face social networks and online social networks (e.g. Social Network Sites) on older people’ health, cognitive functions and well-being. A social experiment, based on a pre-existing longitudinal study (InveCe - Brain Aging in Abbiategrasso) has involved 180 older people born from 1935 to 1939 living in Abbiategrasso, a municipality near Milan. We analyse effects on health and well-being of smartphones and Facebook use (compared to engagement in a more traditional face-to-face activity), exploiting the research potential of past waves of InveCe study, which collected information concerning physical, cognitive and mental health using international validate scale, blood samples, genetic markers and information on social networks and socio-demographic characteristics of all participants. Results of statistical analysis show that poor social relations and high level of perceived loneliness (measured by Lubben Scale and UCLA Loneliness scale) affect negatively physical and mental outcomes. We also found that gender and marital status mediate the relationship between loneliness and mental wellbeing, while education has not significant effect. Moreover, trial results underline the causal impact of ICT use (smartphones, internet, social network sites) on self-perceived loneliness and cognitive and physical health.


Author(s):  
Abhishek Vaish ◽  
Rajiv Krishna G. ◽  
Akshay Saxena ◽  
Dharmaprakash M. ◽  
Utkarsh Goel

The aim of this research is to propose a model through which the viral nature of an information item in an online social network can be quantified. Further, the authors propose an alternate technique for information asset valuation by accommodating virality in it which not only complements the existing valuation system, but also improves the accuracy of the results. They use a popularly available YouTube dataset to collect attributes and measure critical factors such as share-count, appreciation, user rating, controversiality, and comment rate. These variables are used with a proposed formula to obtain viral index of each video on a given date. The authors then identify a conventional and a hybrid asset valuation technique to demonstrate how virality can fit in to provide accurate results.The research demonstrates the dependency of virality on critical social network factors. With the help of a second dataset acquired, the authors determine the pattern virality of an information item takes over time.


2019 ◽  
Vol 10 ◽  
pp. 35
Author(s):  
Andrey  Rodrigues ◽  
Natasha  M. C. Valentim ◽  
Eduardo  Feitosa

In the last few years, Online Social Networks (OSN) have experienced growth in the number of users, becoming an increasingly embedded part of people’s daily lives. Privacy expectations of OSNs are higher as more members start realizing potential privacy problems they face by interacting with these systems. Inspection methods can be an effective alternative for addressing privacy problems because they detect possible defects that could be causing the system to behave in an undesirable way. Therefore, we proposed a set of privacy inspection techniques called PIT-OSN (Privacy Inspection Techniques for Online Social Network). This paper presents the description and evolution of PIT-OSN through the results of a preliminary empirical study. We discuss the quantitative and qualitative results and their impact on improving the techniques. Results indicate that our techniques assist non-expert inspectors uncover privacy problems effectively, and are considered easy to use and useful by the study participants. Finally, the qualitative analysis helped us improve some technique steps that might be unclear.


Sign in / Sign up

Export Citation Format

Share Document