Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Using computer technology to address the problem of cyberbullying

Published: 01 July 2014 Publication History

Abstract

The issue of cyberbullying is a social concern that has arisen due to the prevalent use of computer technology today. In this paper, we present a multi-faceted solution to mitigate the effects of cyberbullying, one that uses computer technology in order to combat the problem. We propose to provide assistance for various groups affected by cyberbullying (the bullied and the bully, both). Our solution was developed through a series of group projects and includes i) technology to detect the occurrence of cyberbullying ii) technology to enable reporting of cyberbullying iii) proposals to integrate third-party assistance when cyberbullying is detected iv) facilities for those with authority to manage online social networks or to take actions against detected bullies. In all, we demonstrate how this important social problem which arises due to computer technology can also leverage computer technology in order to take steps to better cope with the undesirable effects that have arisen.

References

[1]
About page: Stackoverflow (2014). URL http://stackoverflow.com/about
[2]
Frequently asked questions: Reddit (2014). URL http://www.reddit.com/wiki/faq
[3]
What is cyberbyulling (2014). URL http://www.stopbullying.gov/cyberbullying/what-is-it/
[4]
Berstein, M.: Prevention, not tougher punishment key to ending cyber bullying. http://www.unicef.ca/en/blog/prevention-not-tougher-punishment-key-to-ending-cyber-bullying (2013)
[5]
Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artificial Intelligence Review 29(1), 63--92 (2008). DOI 10.1007/s10462-009-9109-6. URL http://dx.doi.org/10.1007/s10462-009-9109-6
[6]
Brown, J.: Amanda todd: 'cyberbullying' doesn't begin to describe it'. http://www2.macleans.ca/2012/10/16/amanda-todd-cyberbullying-doesnt-begin-to-describe-it/ (2012)
[7]
Dadvar, M., de Jong, F.: Cyberbullying detection: a step toward a safer internet yard. In: Proceedings of the 21st international conference companion on World Wide Web, pp. 121--126. ACM (2012)
[8]
Dinakar, K., Reichart, R., Lieberman, H.: Modeling the detection of textual cyberbullying. In: The Social Mobile Web (2011)
[9]
Garg, V., Patil, S., Kapadia, A., Camp, L. J.: Peer-produced privacy protection. In: Technology and Society (ISTAS), 2013 IEEE International Symposium on, pp. 147--154. IEEE (2013)
[10]
Hamilton, G.: Amanda todd and the greatly exaggerated cyber-bullying plague: Web harassment not on the rise, researcher says. http://news.nationalpost.com/2012/10/26/amanda-todd-and-the-greatly-exaggerated-cyber-bullying-plague-web-harassment-isnt-rising-researcher-says/ (2012)
[11]
Kerr, R., Cohen, R.: Detecting and identifying coalitions. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 3, pp. 1363--1364. International Foundation for Autonomous Agents and Multiagent Systems (2012)
[12]
MacDonald, M.: Nova scotia cyberbullying unit seeks personal data from facebook, google. http://www.theglobeandmail.com/news/national/nova-scotia-cyberbullying-unit-seeks-personal-data-from-facebook-google/article18955261/ (2014)
[13]
Mas, S.: Mps to debate ndp anti-bullying motion. http://www.cbc.ca/news/politics/mps-to-debate-ndp-anti-bullying-motion-1.1127561 (2014)
[14]
Moore, M. J., Nakano, T., Suda, T., Enomoto, A.: Tools in cyberbullying. Social Network Engineering for Secure Web Data and Services p. 67 (2013)
[15]
Pang, B., Lee, L.: Opinion mining and sentiment analysis. Foundations and Trends in Information Retrieval 2(1--2), 1--135 (2008)
[16]
Pedell, T.: Cyber bullying on social media is at 'a breaking point', says ndp mp championing private member's bill. http://news.nationalpost.com/2012/10/15/cyberbullying-on-social-media-is-at-a-breaking-point-says-ndp-mp-championing-private-members-bill/ {last accessed October 15, 2012} (2012)
[17]
Phillips, S.: Copying with cyberbullying: The use of technology to terrify (2014). URL http://www.pbs.org/thisemotionallife/blogs/coping-cyberbullying-use-technology-terrify
[18]
Rosen, J.: The right to be forgotten. Stanford law review online 64, 88 (2012)
[19]
Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T., Helenius, H.: Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study. Archives of general psychiatry 67(7), 720--728 (2010)
[20]
Spertus, E.: Smokey: Automatic recognition of hostile messages. In: AAAI/IAAI, pp. 1058--1065 (1997)
[21]
Viecco, C., Tsow, A., Camp, L. J.: A privacy-aware architecture for a web rating system. IBM Journal of Research and Development 53(2), 7--1 (2009)
[22]
Yin, D., Xue, Z., Hong, L., Davison, B. D., Kontostathis, A., Edwards, L.: Detection of harassment on web 2.0. Proceedings of the Content Analysis in the WEB 2 (2009)
[23]
Zhang, L., Zhu, J., Yao, T.: An evaluation of statistical spam filtering techniques. ACM Transactions on Asian Language Information Processing, 3(4), 243--269 (2004)

Cited By

View all
  • (2022)CyberSaver – A Machine Learning Approach to Detection of Cyber Bullying2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)10.1109/IMCOM53663.2022.9721630(1-5)Online publication date: 3-Jan-2022
  • (2021)CHI Against BullyingProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445282(1-17)Online publication date: 6-May-2021
  • (2020)Approaches to Automated Detection of Cyberbullying: A SurveyIEEE Transactions on Affective Computing10.1109/TAFFC.2017.276175711:1(3-24)Online publication date: 1-Jan-2020
  • Show More Cited By

Index Terms

  1. Using computer technology to address the problem of cyberbullying

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM SIGCAS Computers and Society
      ACM SIGCAS Computers and Society  Volume 44, Issue 2
      July 2014
      57 pages
      ISSN:0095-2737
      DOI:10.1145/2656870
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 July 2014
      Published in SIGCAS Volume 44, Issue 2

      Check for updates

      Author Tags

      1. cyberbullying
      2. education
      3. online safety
      4. social network

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)71
      • Downloads (Last 6 weeks)11
      Reflects downloads up to 02 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)CyberSaver – A Machine Learning Approach to Detection of Cyber Bullying2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)10.1109/IMCOM53663.2022.9721630(1-5)Online publication date: 3-Jan-2022
      • (2021)CHI Against BullyingProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445282(1-17)Online publication date: 6-May-2021
      • (2020)Approaches to Automated Detection of Cyberbullying: A SurveyIEEE Transactions on Affective Computing10.1109/TAFFC.2017.276175711:1(3-24)Online publication date: 1-Jan-2020
      • (2020)Affective states recognition through touch dynamicsMultimedia Tools and Applications10.1007/s11042-020-09146-4Online publication date: 17-Jun-2020
      • (2018)Upstanding by DesignProceedings of the 2018 CHI Conference on Human Factors in Computing Systems10.1145/3173574.3173785(1-12)Online publication date: 21-Apr-2018
      • (2018)Bullying and Cyberbullying Prevalence as a Form of Violence in EducationThe Wiley Handbook on Violence in Education10.1002/9781118966709.ch16(327-357)Online publication date: 20-Apr-2018
      • (2016)An Approach to Design and Analyze the Framework for Preventing Cyberbullying2016 IEEE International Conference on Services Computing (SCC)10.1109/SCC.2016.125(864-867)Online publication date: Jun-2016
      • (2016)Cyberbullying and the lawComputers in Human Behavior10.1016/j.chb.2016.08.01265:C(127-141)Online publication date: 1-Dec-2016

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media