scholarly journals Identification and Classification of Cyberbully Incidents using Bystander Intervention Model

Cyberharassment is bullying and degrading the adults by means of posting the comments like hurtful and derogatory humor over the internet in an online community. Though few bystanders ever try to reduce the conflicting effects of cyberbullying, and bystanders ever endeavor to interrupt. This will analyze the chattels of articulatory study on bystander intervention using the caricatured procedural made online Social Networking Sites. The proposed works mainly focus on the analysis of direct intervention by bystanders. The direct intervention allows bystanders to do reporting and blocking of cyberbully activities as additional features here. It will generate a report which contains the details of bully by means of alert message and block that bully by the bystander with the victim’s permission in the Facebook. This proposed framework will detect cyberbully words from the short hand text and emoticons on the comment sections using Latent semantic analysis (LSA). The Cyberbully words will be classified using a Random Decision Forest algorithm.

2022 ◽  
pp. 791-802
Author(s):  
Sakshi Gupta ◽  
Neha Yadav ◽  
Loveleen Gaba

Recruitment has changed over the years. Organisations have started searching for an easy and cost effective platform for personality mining. With the explosion of social networking sites, candidates are now able to choose where they could spend their time online. This has encouraged many recruiters to start using social networking as part of a new cost-conscious approach to personality mining. Social networking websites function like an online community of internet users. Popular online sites include LinkedIn, Twitter, and Facebook. They are growing at an exponential rate, with most of the sites being free to join and, importantly, giving organizations an effective means of attracting today's Generation Y workforce. The purpose of this article is to contribute to emerging theory about the role of social networking sites in the process of personality mining.


2015 ◽  
Vol 2 (3) ◽  
pp. 264-286
Author(s):  
Nathan Light

The Chinese social networking website Fenbei.com was started in 2003 by a young Chinese software engineer. By 2006 it provided an important online community for tens of thousands of Uyghurs, who developed an online culture and communication genres through which they creatively engaged in a virtual world with thousands of others who shared their interests. By 2010 the site was closed, stranding these Uyghurs and millions of other Chinese citizens without the online site that had become their virtual community and connected them to other users around China and even abroad. This article attempts to uncover a small part of what Fenbei meant for young Uyghur Internet enthusiasts and fills some of the gaps in research on popular Internet use in China.


Author(s):  
Julie Derges Kastner

Social networking sites have emerged as a way for musicians to connect, create, and collaborate, and, as a result, they have become important spaces for identity expression and formation. This chapter reveals the findings of a content analysis of 23 empirical studies focusing on social media, identity, and music or music education in order to explore the types of research methods and identity frameworks they employed, emergent themes, and possible avenues for future research. Results of this content analysis revealed three themes: (1) personal expressions of identity, as individuals sought to curate their online identities; (2) identity through social interactions, which often featured a convergence of musical and nonmusical roles; and (3) identity through teaching and learning as individuals participated and found support and encouragement in an online community. Additionally, these studies most commonly used qualitative methods, with several using a cyber ethnographic approach, and a variety of identity frameworks. The chapter closes with suggestions for future research to further explore the evolving expressions of musical identity on social networking sites.


As social networking sites are gaining populism across the globe, people are more enthusiastic about sharing their thoughts on Various networking Platforms. Facebook and Twitter have become a leading destination for sharing various kinds of information. In the existing literature the focus is to access the information published in the networking platforms in the real-time, and they do not focus on obtaining the geo-location of the user. Here we propose a monitoring system that classifies the tweets using some reliable techniques which can be used across the globe without any security concerns. As there is a lot of fake news available in the digital form, there is a definite need to access the user information and his geo-location metrics. In this paper, we have introduced Naive Bayes Multinomial classifier and a few other models which performs a spatiotemporal analysis. This study also identifies a comprehensive set of performance metrics which can access the tweet’s country of origin by using eight tweet-inherent features. The outcome of this analysis can be used by various cyber-crime departments to deal with the numerous cybercrime cases on networking platforms, and real-time decisive actions can be taken.


Author(s):  
Jean-Paul Lafayette DuQuette

What makes a successful online community? This is a question that would probably not have much meaning to someone in the early 1990. At the time, use of the World Wide Web had just begun to spread, first across college campuses and then among the general public in North America and Western Europe. A more common question, and one that Wellman and Gulia (1999) asked, was do online groups even call themselves communities at all? This chapter examines how much has changed about how we perceive online community since 1995: the people we converse with, the reasons for communicating online and the pitfalls encountered. It also introduces Cypris Chat, a virtual world community within Second Life that stubbornly clings to Internet first adopter values and goals, a group that reminds us that an online existence dominated by social networking sites has its alternatives.


2019 ◽  
Vol 10 (1) ◽  
Author(s):  
Dmitry Zhmurov

The article considers separate aspects of criminogenic internet groups activities. Their definition is given, scientific literature on this topic is analyzed, a classification of criminogenic social groups on the Russian social networking site «VKontakte» is suggested. A conclusion about the necessity of a thorough research of the issue is drawn. It is related to a number of aspects and namely: lack of data on types of criminogenic groups which are present on social networking sites; an insignificant number of works dedicated to criminogenic groups, to the analysis of their content, their structure, rate of their expansion and detection of the number of real participants; lack of internet content analysis techniques to decide whether a certain group is criminogenic or not; imperfection of preventive strategies and efficient measures of control over criminogenic groups activities and also lack of state policy in this field. The solution of the stated problems is urgent and congruent with National Security Strategy of the Russian Federation till 2020.


2020 ◽  
Vol 10 (3) ◽  
pp. 9-22
Author(s):  
Sakshi Gupta ◽  
Neha Yadav ◽  
Loveleen Gaba

Recruitment has changed over the years. Organisations have started searching for an easy and cost effective platform for personality mining. With the explosion of social networking sites, candidates are now able to choose where they could spend their time online. This has encouraged many recruiters to start using social networking as part of a new cost-conscious approach to personality mining. Social networking websites function like an online community of internet users. Popular online sites include LinkedIn, Twitter, and Facebook. They are growing at an exponential rate, with most of the sites being free to join and, importantly, giving organizations an effective means of attracting today's Generation Y workforce. The purpose of this article is to contribute to emerging theory about the role of social networking sites in the process of personality mining.


2013 ◽  
Vol 41 (3) ◽  
pp. 673-679 ◽  
Author(s):  
Amy Snow Landa ◽  
Carl Elliott

In September 2006, a small start-up company in Cambridge, MA called Sermo, Inc., launched a social networking site with an unusual twist: only physicians practicing medicine in the United States would be allowed to participate. Sermo, which means “conversation” in Latin, marketed its website as an online community exclusively for doctors that would allow them to talk openly (and anonymously) about a range of topics, from challenging and unusual medical cases to the relative merits of one treatment versus another. “Sermo enables the private and instant exchange of knowledge among MDs,” the company announced in its first press release. Even better, participation was free and the site carried no advertising.


2015 ◽  
Vol 155 (1) ◽  
pp. 120-129 ◽  
Author(s):  
Jeroen Stragier ◽  
Tom Evens ◽  
Peter Mechant

This article focuses on the practice of self-tracking of physical activity data and sharing it via social networking sites. The use of wearable technology devices and the latest smartphones with built-in GPS tracking technology – capturing the speed, distance and duration of physical activities such as running and cycling – is a striking example of the trend towards quantifying sports performances. The study explores the determinants and motivations of recreational athletes to share physical activity status updates on the social networking sites Facebook and Twitter. Evidence is drawn from a large-scale survey of 400 users of Strava, a popular fitness app and online community. The results suggest that intrinsic rather than extrinsic motivations determine a person's willingness to share physical activity via social networking sites.


Author(s):  
D. S. RAJPUT ◽  
R. S. THAKUR ◽  
G. S. THAKUR ◽  
NEERAJ SAHU

Clustering is one of the very important technique used for classification of large dataset and widely applied to many applications including analysis of social networking sites, aircraft accidental, company performance etc. In recent days, Communication, advertising through social networking sites are most popular and interactive strategy among the users. This research attempts to find the large scale measurement study and analysis, effectiveness of communication strategy, analyzing the information about the usage, people’s interest in social network sites in promoting and advertising their brand in social networking sites. The significance of the proposed work is determined with the help of various surveys, and from people who use these sites. Further a more specific pre-processing method is applied to clean data and perform the clustering method to generate patterns that will be work as heuristics for designing more effective social networking sites.


Sign in / Sign up

Export Citation Format

Share Document