Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3078714.3078723acmconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
research-article

A Measurement Study of Hate Speech in Social Media

Published: 04 July 2017 Publication History

Abstract

Social media platforms provide an inexpensive communication medium that allows anyone to quickly reach millions of users. Consequently, in these platforms anyone can publish content and anyone interested in the content can obtain it, representing a transformative revolution in our society. However, this same potential of social media systems brings together an important challenge---these systems provide space for discourses that are harmful to certain groups of people. This challenge manifests itself with a number of variations, including bullying, offensive content, and hate speech. Specifically, authorities of many countries today are rapidly recognizing hate speech as a serious problem, specially because it is hard to create barriers on the Internet to prevent the dissemination of hate across countries or minorities. In this paper, we provide the first of a kind systematic large scale measurement and analysis study of hate speech in online social media. We aim to understand the abundance of hate speech in online social media, the most common hate expressions, the effect of anonymity on hate speech and the most hated groups across regions. In order to achieve our objectives, we gather traces from two social media systems: Whisper and Twitter. We then develop and validate a methodology to identify hate speech on both of these systems. Our results identify hate speech forms and unveil a set of important patterns, providing not only a broader understanding of online hate speech, but also offering directions for detection and prevention approaches.

References

[1]
Swati Agarwal and Ashish Sureka. 2015. Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on Twitter. In Proceedings of The 11th International Conference on Distributed Computing and Internet Technology (ICDCIT'15).
[2]
J. Bartlett, J. Reffin, N. Rumball, and S. Williamson. 2014. Anti-social media. DEMOS.
[3]
Irfan Chaudhry. 2015. #Hashtagging hate: Using Twitter to trac racism online. First Monday 20, 2 (2015).
[4]
Adrian Chen. 2014. The Laborers Who Keep Dick Pics and Beheading Out of Your Facebook Feed. https://www.wired.com/2014/10/content-moderation/. (2014). (Accessed on May 2017).
[5]
Ying Chen, Yilu Zhou, Sencun Zhu, and Heng Xu. 2012. Detectin Offensive Language in Social Media to Protect Adolescent Online Safety. In Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust.
[6]
Justin Cheng, Cristian Danescu-Niculescu-Mizil, and Jure Leskovec 2015. Anti-social Behavior in Online Discussion Communities. In International Conference on Web and Social Media (ICWSM).
[7]
Denzil Correa, Leandro Silva, Mainack Mondal, Fabricio Benevenuto and Krishna P. Gummadi. 2015. The Many Shades of Anonymity: Characterizing Anonymous Social Media Content. In Proceedings of The 9th International AAAI Conference on Weblogs and Social Media (ICWSM'15).
[8]
Maral Dadvar, Dolf Trieschnigg, Roeland Ordelman, and Franciska d Jong. 2013. Improving Cyberbullying Detection with User Context. In Proceedings of 35th European Conference on IR Research.
[9]
Richard Delgado and Jean Stefancic. 2004. Understanding words that wound. Westview Press.
[10]
Iginio Gagliardone, Danit Gal, Thiago Alves, and Gabriel Martinez. 2015. Countering online Hate Speech. UNESCO.
[11]
Liz Gannes. 2013. On Making Our Digital Lives More Real. http://allthingsd.com/20130802/im-so-over-oversharing-on-making-our-digital-lives-more-real/. (August 2013).
[12]
Njagi Dennis Gitari, Zhang Zuping, Hanyurwimfura Damien, and Ju Long. 2015. A Lexicon-based Approach for Hate Speech Detection. International Journal of Multimedia and Ubiquitous Engineering 10, 4 (2015), 215--230.
[13]
Edel Greevy and Alan F. Smeaton. 2004. Classifying Racist Text Using a Support Vector Machine. In Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval.
[14]
Erin Griffith. 2013. With 2 million users, "secrets app" Whispe launches on Android. http://pando.com/2013/05/16/with-2-million-users-secrets-app-whisper-launches-on-android/. (May 2013).
[15]
Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq Richard Han, Qin Lv, and Shivakant Mishra. 2015. Detection of cyberbullying incidents on the instagram social network. arXiv preprint arXiv:1503.03909 (2015).
[16]
Adam N Joinson. 2001. Self-disclosure in computer-mediate communication: The role of self-awareness and visual anonymity. European Journal of Social Psychology 31, 2 (2001), 177--192.
[17]
Grace Chi En Kwan and Marko M. Skoric. 2013. Facebook Bullying: A Extension of Battles in School. Computers in Human Behavior 29, 1 (2013), 16--25.
[18]
I. Kwok and Y. Wang. 2013. Locate the hate: Detecting tweets against blacks. In Proceedings of The AAAI Conference on Artificial Intelligence (AAAI'13).
[19]
T. M. Massaro. 1990. Equality and freedom of expression: The hat speech dilemma. William and Mary Law review 32, 2 (1990), 211--265.
[20]
George A Miller. 1995. WordNet: a lexical database for English. Commun. ACM 38, 11 (1995), 39--41.
[21]
Fred Morstatter, Jürgen Pfeffer, and Huan Liu. 2014. When is I Biased?: Assessing the Representativeness of Twitter's Streaming API. In Proceedings of the 23rd International Conference on World Wide Web.
[22]
Alain Pinsonneault and Nelson Heppel. 1997. Anonymity in grou support systems research: A new conceptualization, measure, and contingency framework. Journal of Management Information Systems 14, 3 (1997), 89--108.
[23]
Julio Reis, Fabrício Benevenuto, Pedro O.S. Vaz de Melo, Raque Prates, Haewoon Kwak, and Jisun An. 2015. Breaking the News: First Impressions Matter on Online News. In International Conference on Web and Social Media (ICWSM).
[24]
Huascar Sanchez and Shreyas Kumar. 2011. Twitter bullyin detection. ser. NSDI 12 (2011).
[25]
Leandro Araújo Silva, Mainack Mondal, Denzil Correa, Fabríci Benevenuto, and Ingmar Weber. 2016. Analyzing the Targets of Hate in Online Social Media. In International Conference on Web and Social Media (ICWSM).
[26]
M. Stephens. 2013. The Geography of Hate Map. http://users.humboldt.edu/mstephens/hate/hate_map.html. (2013).
[27]
John Suler. 2004. The online disinhibition effect. Cyberpsycholog & behavior 7, 3 (2004), 321--326.
[28]
Twitter team. 2017. The Streaming APIs. https://dev.twitter.co/streaming/overview. (2017).
[29]
I-Hsien Ting, Hsing-Miao Chi, Jyun-Sing Wu, and Shyue-Liang Wang 2013. An approach for hate groups detection in facebook. In Proceedings of The 3rd International Workshop on Intelligent Data Analysis and Management (IADM'13).
[30]
Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, and Ben Y. Zhao. 2014. Whispers in the Dark: Analyzing an Anonymous Social Network. In Proceedings of the 2014 Conference on Internet Measurement Conference (IMC'14).
[31]
William Warner and Julia Hirschberg. 2012. Detecting hate speech on the world wide web. In Proceedings of the 2nd Workshop on Language in Social Media (LSM'12).
[32]
Philip G Zimbardo. 1969. The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos. Nebraska Symposium on Motivation 17 (1969), 237--307.

Cited By

View all
  • (2024)Hate Speech in Indian Cyber Space at the Intersection of Law and TechnologyIntersections Between Rights and Technology10.4018/979-8-3693-1127-1.ch009(156-191)Online publication date: 10-Jul-2024
  • (2024)The Risk of Silence—How the Capital Market Penalizes Social Media PassivityJournal of Information Systems10.2308/ISYS-2023-05938:1(5-38)Online publication date: 20-Feb-2024
  • (2024)Code-mixing unveiled: Enhancing the hate speech detection in Arabic dialect tweets using machine learning modelsPLOS ONE10.1371/journal.pone.030565719:7(e0305657)Online publication date: 17-Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
HT '17: Proceedings of the 28th ACM Conference on Hypertext and Social Media
July 2017
336 pages
ISBN:9781450347082
DOI:10.1145/3078714
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 July 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anonymity
  2. hate speech
  3. pattern recognition
  4. social media
  5. twitter
  6. whisper

Qualifiers

  • Research-article

Funding Sources

  • MASWeb

Conference

HT'17
Sponsor:
HT'17: 28th Conference on Hypertext and Social Media
July 4 - 7, 2017
Prague, Czech Republic

Acceptance Rates

HT '17 Paper Acceptance Rate 19 of 69 submissions, 28%;
Overall Acceptance Rate 378 of 1,158 submissions, 33%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)720
  • Downloads (Last 6 weeks)76
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Hate Speech in Indian Cyber Space at the Intersection of Law and TechnologyIntersections Between Rights and Technology10.4018/979-8-3693-1127-1.ch009(156-191)Online publication date: 10-Jul-2024
  • (2024)The Risk of Silence—How the Capital Market Penalizes Social Media PassivityJournal of Information Systems10.2308/ISYS-2023-05938:1(5-38)Online publication date: 20-Feb-2024
  • (2024)Code-mixing unveiled: Enhancing the hate speech detection in Arabic dialect tweets using machine learning modelsPLOS ONE10.1371/journal.pone.030565719:7(e0305657)Online publication date: 17-Jul-2024
  • (2024)Offensive language detection in low resource languages: A use case of Persian languagePLOS ONE10.1371/journal.pone.030416619:6(e0304166)Online publication date: 21-Jun-2024
  • (2024)A normalization model for repeated letters in social media hate speech text based on rules and spelling correctionPLOS ONE10.1371/journal.pone.029965219:3(e0299652)Online publication date: 21-Mar-2024
  • (2024)Bias-Based Cyberaggression Related To Origin, Religion, Sexual Orientation, Gender, and Weight: Systematic Review of Young People’s Experiences, Risk and Protective Factors, and the ConsequencesTrauma, Violence, & Abuse10.1177/15248380241275971Online publication date: 8-Sep-2024
  • (2024)IntroductionAntisemitism in Online Communication10.11647/obp.0406.00(1-18)Online publication date: 21-Jun-2024
  • (2024)Artificial Intelligence inspired method for cross-lingual cyberhate detection from low resource languagesACM Transactions on Asian and Low-Resource Language Information Processing10.1145/367717623:9(1-23)Online publication date: 11-Jul-2024
  • (2024)Investigating Influential Users' Responses to Permanent Suspension on Social MediaProceedings of the ACM on Human-Computer Interaction10.1145/36373568:CSCW1(1-41)Online publication date: 26-Apr-2024
  • (2024)Towards a crowdsourced framework for online hate speech moderation - a case study in the Indian political scenarioCompanion Publication of the 16th ACM Web Science Conference10.1145/3630744.3663607(75-84)Online publication date: 21-May-2024
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media