Ruminati Modeling the Detection of Textual Cyber - bullying

نویسندگان

  • Karthik Dinakar
  • Mitchel Resnick
چکیده

The scourge of cyber-bullying has received widespread attention at all levels of society including parents, educators, adolescents, social scientists, psychiatrists and policy makers at the highest echelons of power. Cyber-bullying and it's complex intermingling with traditional bullying has been shown to have a deeply negative impact on both the bully as well as the victim. We hypothesize that tackling cyber-bullying entails two parts detection and user-interaction strategies for effective mitigation. In this thesis, we investigate the problem of detecting textual cyber-bullying. A companion thesis by Birago Jones will investigate use-interaction strategies. In this thesis, we explore mechanisms to tackle the problem of textual cyber-bullying using computational empathy a combination of detection and intervention techniques informed by scoping the social parameters that underlie the problem as well as a sociolinguistic treatment of the underlying socially mediated communication on the web. We begin by presenting a qualitative analysis of textual cyber-bullying based on data gathered from two major social networking websites and decompose the problem of detection into sub-problems. I then present Ruminati a society of models of models involving supervised learning, commonsense reasoning and probabilistic topic modeling to tackle each sub-problem. Thesis Supervisor: Dr. Henry Lieberman Title: Principal Research Scientist, MIT Media Lab

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media

Social media allows people interact to express their thoughts or feelings about different subjects. However, some of users may write offensive twits to other via social media which known as cyber bullying. Successful prevention depends on automatically detecting malicious messages. Automatic detection of bullying in the text of social media by analyzing the text "twits" via one of the machine l...

متن کامل

A Dynamic Cognitive System for Automatic Detection and Prevention of Cyber-bullying Attacks

The phenomenal growth of the social networking sites has swept over the communication world. The rising popularity of the social networking sites have also contributed to the rise in offensive behaviours, giving birth to one of the most crucial problem called cyber-bullying. Most of the social networking users would have encountered a worst e-day experience .The victims of cyber-bullying, widel...

متن کامل

Prevalence of Traditional and Cyber Bullying Among Teenagers Herat-Afghanistan

Background and Aim: Bullying is one of the most common problems among teenagers in many schools around the world, which is recently considered by researchers in the fields of psychology and even criminology as a traditional and cyber bullying. The purpose of this study is to investigate the rate of traditional and cyber bullying among male and female teenagers in the secondary schools of Herat...

متن کامل

Positive affect predicting worker psychological response to cyber-bullying in the high-tech industry in Northern Taiwan

Online cyber-bullying has become a frequent occurrence in organizations. To understand individual dispositions and the organizational factors that effect online cyber-bullying, the present study investigates the relationship among positive affect, the perceived organizational innovation climate, and psychological responses to cyber-bullying. The research samples for this study are staff members...

متن کامل

Supervised Feature Selection Based Extreme Learning Machine (sfs-elm) Classifier for Cyber Bullying Detection in Twitter

Cyber bullying detection that are prevailing commonly in social networks like Twitter is one of the focussed research area. Text mining and detecting cyber bullying has several research challenges and lot of research scope to work with. This research work makes use of supervised feature selection by ranking method in order to choose the features from the tweets. After that extreme learning mach...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012