Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Public Access

A Human-Centered Systematic Literature Review of Cyberbullying Detection Algorithms

Published: 18 October 2021 Publication History

Abstract

Cyberbullying is a growing problem across social media platforms, inflicting short and long-lasting effects on victims. To mitigate this problem, research has looked into building automated systems, powered by machine learning, to detect cyberbullying incidents, or the involved actors like victims and perpetrators. In the past, systematic reviews have examined the approaches within this growing body of work, but with a focus on the computational aspects of the technical innovation, feature engineering, or performance optimization, without centering around the roles, beliefs, desires, or expectations of humans. In this paper, we present a human-centered systematic literature review of the past 10 years of research on automated cyberbullying detection. We analyzed 56 papers based on a three-prong human-centeredness algorithm design framework - spanning theoretical, participatory, and speculative design. We found that the past literature fell short of incorporating human-centeredness across multiple aspects, ranging from defining cyberbullying, establishing the ground truth in data annotation, evaluating the performance of the detection models, to speculating the usage and users of the models, including potential harms and negative consequences. Given the sensitivities of the cyberbullying experience and the deep ramifications cyberbullying incidents bear on the involved actors, we discuss takeaways on how incorporating human-centeredness in future research can aid with developing detection systems that are more practical, useful, and tuned to the diverse needs and contexts of the stakeholders.

References

[1]
Rediet Abebe and Kira Goldner. 2018. Mechanism design for social good. AI Matters, Vol. 4, 3 (2018), 27--34.
[2]
S Aboud El-Seoud, Nadine Farag, and Gerard McKee. 2020. A review on non-supervised approaches for cyberbullying detection. International Journal of Engineering Pedagogy, Vol. 10, 4 (2020), 25--34.
[3]
Dana Aizenkot. 2020. Cyberbullying experiences in classmates 'WhatsApp discourse, across public and private contexts. Children and Youth Services Review, Vol. 110 (2020), 104814.
[4]
Mohammed Ali Al-Garadi, Mohammad Rashid Hussain, Nawsher Khan, Ghulam Murtaza, Henry Friday Nweke, Ihsan Ali, Ghulam Mujtaba, Haruna Chiroma, Hasan Ali Khattak, and Abdullah Gani. 2019. Predicting cyberbullying on social media in the big data era using machine learning algorithms: review of literature and open challenges. IEEE Access, Vol. 7 (2019), 70701--70718.
[5]
Mohammed Ali Al-Garadi, Kasturi Dewi Varathan, and Sri Devi Ravana. 2016. Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network. Computers in Human Behavior, Vol. 63 (10 2016), 433--443. https://doi.org/10.1016/j.chb.2016.05.051
[6]
Jamal Alasadi, Ramanathan Arunachalam, Pradeep K Atrey, and Vivek K Singh. 2020. A Fairness-Aware Fusion Framework for Multimodal Cyberbullying Detection. In 2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM). IEEE, 166--173.
[7]
Mark Alber, Adrian Buganza Tepole, William R Cannon, Suvranu De, Salvador Dura-Bernal, Krishna Garikipati, George Karniadakis, William W Lytton, Paris Perdikaris, Linda Petzold, et al. 2019. Integrating machine learning and multiscale modeling-perspectives, challenges, and opportunities in the biological, biomedical, and behavioral sciences. NPJ digital medicine, Vol. 2, 1 (2019), 1--11.
[8]
Saleema Amershi, Maya Cakmak, William Bradley Knox, and Todd Kulesza. 2014. Power to the people: The role of humans in interactive machine learning. Ai Magazine, Vol. 35, 4 (2014), 105--120.
[9]
James Auger. 2013. Speculative design: crafting the speculation. Digital Creativity, Vol. 24, 1 (2013), 11--35.
[10]
Jieun Baek and Lyndal M Bullock. 2014. Cyberbullying: a cross-cultural perspective. Emotional and behavioural difficulties, Vol. 19, 2 (2014), 226--238.
[11]
Christopher P Barlett, Douglas A Gentile, Craig A Anderson, Kanae Suzuki, Akira Sakamoto, Ayuchi Yamaoka, and Rui Katsura. 2014. Cross-cultural differences in cyberbullying behavior: A short-term longitudinal study. Journal of cross-cultural psychology, Vol. 45, 2 (2014), 300--313.
[12]
Julia Barli'nska, Anna Szuster, and Mikołaj Winiewski. 2013. Cyberbullying among adolescent bystanders: Role of the communication medium, form of violence, and empathy. Journal of Community & Applied Social Psychology, Vol. 23, 1 (2013), 37--51.
[13]
Eric PS Baumer. 2017. Toward human-centered algorithm design. Big Data & Society, Vol. 4, 2 (2017), 2053951717718854.
[14]
Emily M Bender and Batya Friedman. 2018. Data statements for natural language processing: Toward mitigating system bias and enabling better science. Transactions of the Association for Computational Linguistics, Vol. 6 (2018), 587--604.
[15]
Ruha Benjamin. 2019. Assessing risk, automating racism. Science, Vol. 366, 6464 (2019), 421--422.
[16]
Jacob L. Bigelow, April Edwards, and Lynne Edwards. 2016. Detecting cyberbullying using latent semantic indexing. In Proceedings of the 1st International Workshop on Computational Methods for CyberSafety, CyberSafety 2016. Association for Computing Machinery, Inc, 11--14. https://doi.org/10.1145/3002137.3002144
[17]
Tazeek Bin Abdur Rakib and Lay Ki Soon. 2018. Using the Reddit Corpus for Cyberbully Detection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 10751 LNAI. Springer Verlag, 180--189. https://doi.org/10.1007/978--3--319--75417--8_17
[18]
Danah Boyd and Kate Crawford. 2012. Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, communication & society, Vol. 15, 5 (2012), 662--679.
[19]
Wanda Cassidy, Chantal Faucher, and Margaret Jackson. 2013. Cyberbullying among youth: A comprehensive review of current international research and its implications and application to policy and practice. School psychology international, Vol. 34, 6 (2013), 575--612.
[20]
Pew Research Center. 2018. A Majority of Teens Have Experienced Some Form of Cyberbullying. https://www.pewresearch.org/internet/2018/09/27/a-majority-of-teens-have-experienced-some-form-of-cyberbullying/
[21]
Tommy KH Chan, Christy MK Cheung, and Zach WY Lee. 2020. Cyberbullying on Social Networking Sites: A Literature Review and Future Research Directions. Information & Management (2020), 103411.
[22]
Stevie Chancellor, Eric PS Baumer, and Munmun De Choudhury. 2019. Who is the “Human” in Human-Centered Machine Learning: The Case of Predicting Mental Health from Social Media. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--32.
[23]
Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Mean birds: Detecting aggression and bullying on Twitter. In WebSci 2017 - Proceedings of the 2017 ACM Web Science Conference. Association for Computing Machinery, Inc, New York, New York, USA, 13--22. https://doi.org/10.1145/3091478.3091487
[24]
Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2019 a. Detecting aggressors and bullies on twitter. In 26th International World Wide Web Conference 2017, WWW 2017 Companion. International World Wide Web Conferences Steering Committee, New York, New York, USA, 767--768. https://doi.org/10.1145/3041021.3054211
[25]
Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali, and Nicolas Kourtellis. 2019 b. Detecting Cyberbullying and Cyberaggression in Social Media. ACM Transactions on the Web, Vol. 13, 3 (10 2019), 1--51. https://doi.org/10.1145/3343484
[26]
Vikas S. Chavan and S. S. Shylaja. 2015. Machine learning approach for detection of cyber-aggressive comments by peers on social media network. In 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015. Institute of Electrical and Electronics Engineers Inc., 2354--2358. https://doi.org/10.1109/ICACCI.2015.7275970
[27]
Lu Cheng, Ruocheng Guo, and Huan Liu. 2019 a. Robust cyberbullying detection with causal interpretation. In The Web Conference 2019 - Companion of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, 169--175. https://doi.org/10.1145/3308560.3316503
[28]
Lu Cheng, Ruocheng Guo, Yasin Silva, Deborah Hall, and Huan Liu. 2019 b. Hierarchical attention networks for cyberbullying detection on the instagram social network. In SIAM International Conference on Data Mining, SDM 2019. Society for Industrial and Applied Mathematics Publications, 235--243. https://doi.org/10.1137/1.9781611975673.27
[29]
Lu Cheng, Jundong Li, Yasin N. Silva, Deborah L. Hall, and Huan Liu. 2019 c. XBully: Cyberbullying detection within a multi-modal context. In WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, 339--347. https://doi.org/10.1145/3289600.3291037
[30]
Anand Inasu Chittilappilly, Lei Chen, and Sihem Amer-Yahia. 2016. A survey of general-purpose crowdsourcing techniques. IEEE Transactions on Knowledge and Data Engineering, Vol. 28, 9 (2016), 2246--2266.
[31]
James J Clark and Robert Walker. 2011. Research ethics in victimization studies: Widening the lens. Violence against women, Vol. 17, 12 (2011), 1489--1508.
[32]
Lawrence E Cohen and Marcus Felson. 1979. Social change and crime rate trends: A routine activity approach. American sociological review (1979), 588--608.
[33]
Maral Dadvar, Franciska De, Jong Roeland, and Ordelman Dolf Trieschnigg. 2012a. Improved Cyberbullying Detection Using Gender Information. Technical Report. http://www.noswearing.com/dictionary
[34]
Maral Dadvar and Franciska De Jong. 2012. Cyberbullying detection: A step toward a safer internet yard. In WWW'12 - Proceedings of the 21st Annual Conference on World Wide Web Companion. ACM Press, New York, New York, USA, 121--125. https://doi.org/10.1145/2187980.2187995
[35]
Maral Dadvar, FMG de Jong, Roeland Ordelman, and Dolf Trieschnigg. 2012b. Improved cyberbullying detection using gender information. In Proceedings of the Twelfth Dutch-Belgian Information Retrieval Workshop (DIR 2012). University of Ghent.
[36]
Maral Dadvar, Dolf Trieschnigg, and Franciska De Jong. 2013a. Expert knowledge for automatic detection of bullies in social networks. Technical Report. 57--64 pages.
[37]
Maral Dadvar, Dolf Trieschnigg, and Franciska De Jong. 2014. Experts and machines against bullies: A hybrid approach to detect cyberbullies. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 8436 LNAI. Springer Verlag, 275--281. https://doi.org/10.1007/978--3--319-06483--3_25
[38]
Maral Dadvar, Dolf Trieschnigg, Roeland Ordelman, and Franciska De Jong. 2013b. Improving cyberbullying detection with user context. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 7814 LNCS. Springer, Berlin, Heidelberg, 693--696. https://doi.org/10.1007/978--3--642--36973--5_62
[39]
Cristian Danescu-Niculescu-Mizil, Robert West, Dan Jurafsky, Jure Leskovec, and Christopher Potts. 2013. No country for old members: User lifecycle and linguistic change in online communities. In Proceedings of the 22nd international conference on World Wide Web. 307--318.
[40]
Harsh Dani, Jundong Li, and Huan Liu. 2017. Sentiment Informed Cyberbullying Detection in Social Media. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 10534 LNAI. Springer Verlag, 52--67. https://doi.org/10.1007/978--3--319--71249--9_4
[41]
Thomas Davidson, Debasmita Bhattacharya, and Ingmar Weber. 2019. Racial Bias in Hate Speech and Abusive Language Detection Datasets. In Proceedings of the Third Workshop on Abusive Language Online. Association for Computational Linguistics, Florence, Italy, 25--35. https://doi.org/10.18653/v1/W19--3504
[42]
Katie Davis, David P Randall, Anthony Ambrose, and Mania Orand. 2015. `I was bullied too': stories of bullying and coping in an online community. Information, Communication & Society, Vol. 18, 4 (2015), 357--375.
[43]
Rebecca Dennehy, Sarah Meaney, Kieran A Walsh, Carol Sinnott, Mary Cronin, and Ella Arensman. 2020. Young people's conceptualizations of the nature of cyberbullying: A systematic review and synthesis of qualitative research. Aggression and violent behavior, Vol. 51 (2020), 101379.
[44]
Michele Di Capua, Emanuel Di Nardo, and Alfredo Petrosino. 2016. Unsupervised cyber bullying detection in social networks. In 2016 23rd International conference on pattern recognition (ICPR). IEEE, 432--437.
[45]
Karthik Dinakar, Birago Jones, Catherine Havasi, Henry Lieberman, and Rosalind Picard. 2012. Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying. ACM Transactions on Interactive Intelligent Systems, Vol. 2, 3 (9 2012), 1--30. https://doi.org/10.1145/2362394.2362400
[46]
Karthik Dinakar, Roi Reichart, and Henry Lieberman. 2011. Modeling the detection of textual cyberbullying. In AAAI Workshop - Technical Report, Vol. WS-11-02. 11--17. www.aaai.org
[47]
Lucas Dixon, John Li, Jeffrey Sorensen, Nithum Thain, and Lucy Vasserman. 2018. Measuring and mitigating unintended bias in text classification. In Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society. 67--73.
[48]
Finale Doshi-Velez and Been Kim. 2017. Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608 (2017).
[49]
Rebecca Dredge, John Gleeson, and Xochitl De la Piedad Garcia. 2014a. Cyberbullying in social networking sites: An adolescent victim's perspective. Computers in human behavior, Vol. 36 (2014), 13--20.
[50]
Rebecca Dredge, John Gleeson, and Xochitl De La Piedad Garcia. 2014b. Presentation on Facebook and risk of cyberbullying victimisation. Computers in Human Behavior, Vol. 40 (8 2014), 16--22. https://doi.org/10.1016/j.chb.2014.07.035
[51]
Ana Maria Bustamante Duarte, Nina Brendel, Auriol Degbelo, and Christian Kray. 2018. Participatory design and participatory research: An HCI case study with young forced migrants. ACM Transactions on Computer-Human Interaction (TOCHI), Vol. 25, 1 (2018), 1--39.
[52]
Anthony Dunne and Fiona Raby. 2013. Speculative everything: design, fiction, and social dreaming .MIT press.
[53]
Chris Emmery, Ben Verhoeven, Guy De Pauw, Gilles Jacobs, Cynthia Van Hee, Els Lefever, Bart Desmet, Véronique Hoste, and Walter Daelemans. 2020. Current limitations in cyberbullying detection: On evaluation criteria, reproducibility, and data scarcity. Language Resources and Evaluation (2020), 1--37.
[54]
Sindhu Kiranmai Ernala, Michael L Birnbaum, Kristin A Candan, Asra F Rizvi, William A Sterling, John M Kane, and Munmun De Choudhury. 2019. Methodological gaps in predicting mental health states from social media: Triangulating diagnostic signals. In Proceedings of the 2019 chi conference on human factors in computing systems. 1--16.
[55]
Dorothy L Espelage and Susan M Swearer. 2003. Research on school bullying and victimization: What have we learned and where do we go from here? School psychology review, Vol. 32, 3 (2003), 365--383.
[56]
Rebecca Fiebrink and Marco Gillies. 2018. Introduction to the special issue on human-centered machine learning.
[57]
Casey Fiesler, Michaelanne Dye, Jessica L Feuston, Chaya Hiruncharoenvate, Clayton J Hutto, Shannon Morrison, Parisa Khanipour Roshan, Umashanthi Pavalanathan, Amy S Bruckman, Munmun De Choudhury, et al. 2017. What (or who) is public? Privacy settings and social media content sharing. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 567--580.
[58]
Helen L Fisher, Terrie E Moffitt, Renate M Houts, Daniel W Belsky, Louise Arseneault, and Avshalom Caspi. 2012. Bullying victimisation and risk of self harm in early adolescence: longitudinal cohort study. bmj, Vol. 344 (2012), e2683.
[59]
Patxi Galán-Garc'ia, José Gaviria de la Puerta, Carlos Laorden Gómez, Igor Santos, and Pablo Garc'ia Bringas. 2016. Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying. Logic Journal of the IGPL, Vol. 24, 1 (2016), 42--53.
[60]
Oguzhan Gencoglu. 2020. Cyberbullying Detection with Fairness Constraints. arXiv preprint arXiv:2005.06625 (2020).
[61]
James J Gibson. 1977. The theory of affordances. Hilldale, USA, Vol. 1, 2 (1977).
[62]
Kim D. Gorro, Mary Jane G. Sabellano, Ken Gorro, Christian Maderazo, and Kris Capao. 2018. Classification of Cyberbullying in Facebook Using Selenium and SVM. In 2018 3rd International Conference on Computer and Communication Systems, ICCCS 2018. Institute of Electrical and Electronics Engineers Inc., 233--238. https://doi.org/10.1109/CCOMS.2018.8463326
[63]
Pamela Grimm. 2010. Social desirability bias. Wiley international encyclopedia of marketing (2010).
[64]
Ana M Giménez Gualdo, Simon C Hunter, Kevin Durkin, Pilar Arnaiz, and Javier J Maquilón. 2015. The emotional impact of cyberbullying: Differences in perceptions and experiences as a function of role. Computers & Education, Vol. 82 (2015), 228--235.
[65]
John Hani, Mohamed Nashaat, Mostafa Ahmed, Zeyad Emad, Eslam Amer, and Ammar Mohammed. 2019. Social media cyberbullying detection using machine learning. International Journal of Advanced Computer Science and Applications, Vol. 10, 5 (2019), 703--707. https://doi.org/10.14569/ijacsa.2019.0100587
[66]
Alex Hanna, Emily Denton, Andrew Smart, and Jamila Smith-Loud. 2020. Towards a critical race methodology in algorithmic fairness. In Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency. 501--512.
[67]
Morten Steen Hansen, Per Fink, Morten Frydenberg, Marie-Louise Oxhøj, Lene Søndergaard, and Povl Munk-Jørgensen. 2001. Mental disorders among internal medical inpatients: prevalence, detection, and treatment status. Journal of Psychosomatic Research, Vol. 50, 4 (2001), 199--204.
[68]
Douglas M Hawkins. 2004. The problem of overfitting. Journal of chemical information and computer sciences, Vol. 44, 1 (2004), 1--12.
[69]
Brent Hecht, Lauren Wilcox, Jeffrey P Bigham, Johannes Schöning, Ehsan Hoque, Jason Ernst, Yonatan Bisk, Lana Yarosh, Bushra Amjam, and Cathy Wu. 2018. It's time to do something: Mitigating the negative impacts of computing through a change to the peer review process. ACM Future of Computing Blog (2018).
[70]
Sameer Hinduja and Justin W Patchin. 2012. School law enforcement and cyberbullying. Cyberbullying prevention and response: Expert perspectives (2012), 161--184.
[71]
Dianne L Hoff and Sidney N Mitchell. 2009. Cyberbullying: Causes, effects, and remedies. Journal of Educational Administration (2009).
[72]
Jake M Hofman, Amit Sharma, and Duncan J Watts. 2017. Prediction and explanation in social systems. Science, Vol. 355, 6324 (2017), 486--488.
[73]
Homa Hosseinmardi, Sabrina Arredondo Mattson, Rahat Ibn Rafiq, Richard Han, Qin Lv, and Shivakant Mishra. 2015. Detection of Cyberbullying Incidents on the Instagram Social Network. MobiSys (3 2015), 2014. http://arxiv.org/abs/1503.03909
[74]
Qianjia Huang, Vivek Kumar Singh, and Pradeep Kumar Atrey. 2014. Cyber Bullying Detection Using Social and Textual Analysis. In Proceedings of the 3rd International Workshop on Socially-Aware Multimedia - SAM '14. ACM Press, New York, New York, USA, 3--6. https://doi.org/10.1145/2661126.2661133
[75]
Ben Hutchinson and Margaret Mitchell. 2019. 50 years of test (un) fairness: Lessons for machine learning. In Proceedings of the Conference on Fairness, Accountability, and Transparency. 49--58.
[76]
Abigail Z Jacobs and Hanna Wallach. 2019. Measurement and fairness. arXiv preprint arXiv:1912.05511 (2019).
[77]
Alejandro Jaimes, Daniel Gatica-Perez, Nicu Sebe, and Thomas S Huang. 2007. Guest Editors' Introduction: Human-Centered Computing--Toward a Human Revolution. Computer, Vol. 40, 5 (2007), 30--34.
[78]
Eun Seo Jo and Timnit Gebru. 2020. Lessons from archives: Strategies for collecting sociocultural data in machine learning. In Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency. 306--316.
[79]
David Jurgens, Libby Hemphill, and Eshwar Chandrasekharan. 2019. A Just and Comprehensive Strategy for Using NLP to Address Online Abuse. In Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics. Association for Computational Linguistics, Florence, Italy, 3658--3666. https://doi.org/10.18653/v1/P19--1357
[80]
Seunghyun Kim, Afsaneh Razi, Gianluca Stringhini, Pamela Wisniewski, and Munmun De Choudhury. noop3002forthcoming. You Don't Know How I Feel: Insider-Outsider Perspective Gaps in Cyberbullying Risk Detection. In Proceedings of the International AAAI Conference on Web and Social Media .
[81]
Barbara Kitchenham and Stuart Charters. 2007. Guidelines for performing systematic literature reviews in software engineering. (2007).
[82]
David G Kleinbaum, K Dietz, M Gail, Mitchel Klein, and Mitchell Klein. 2002. Logistic regression .Springer.
[83]
Ana Kovavc ević. 2014. Cyberbullying detection using web content mining. In 2014 22nd Telecommunications Forum Telfor (TELFOR). IEEE, 939--942.
[84]
Akshi Kumar and Nitin Sachdeva. 2019. Cyberbullying detection on social multimedia using soft computing techniques: a meta-analysis. Multimedia Tools and Applications, Vol. 78, 17 (2019), 23973--24010.
[85]
Stephen S Leff. 2007. Bullying and peer victimization at school: Considerations and future directions. School Psychology Review, Vol. 36, 3 (2007), 406--412.
[86]
Suzet Tanya Lereya, Catherine Winsper, Jon Heron, Glyn Lewis, David Gunnell, Helen L Fisher, and Dieter Wolke. 2013. Being bullied during childhood and the prospective pathways to self-harm in late adolescence. Journal of the American Academy of Child & Adolescent Psychiatry, Vol. 52, 6 (2013), 608--618.
[87]
Melvin J Lerner and Dale T Miller. 1978. Just world research and the attribution process: Looking back and ahead. Psychological bulletin, Vol. 85, 5 (1978), 1030.
[88]
Qing Li. 2008. A cross-cultural comparison of adolescents' experience related to cyberbullying. Educational Research, Vol. 50, 3 (2008), 223--234.
[89]
Ziyi Li, Junpei Kawamoto, Yaokai Feng, and Kouichi Sakurai. 2016. Cyberbullying detection using parent-child relationship between comments. In ACM International Conference Proceeding Series. Association for Computing Machinery, 325--334. https://doi.org/10.1145/3011141.3011182
[90]
Paul Benjamin Lowry, Jun Zhang, Chuang Wang, and Mikko Siponen. 2016. Why do adults engage in cyberbullying on social media? An integration of online disinhibition and deindividuation effects with the social structure and social learning model. Information Systems Research, Vol. 27, 4 (2016), 962--986.
[91]
Thabo Mahlangu, Chunling Tu, and Pius Owolawi. 2018. A review of automated detection methods for cyberbullying. In 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC). IEEE, 1--5.
[92]
Amrita Mangaonkar, Allenoush Hayrapetian, and Rajeev Raje. 2015. Collaborative detection of cyberbullying behavior in Twitter data. In IEEE International Conference on Electro Information Technology, Vol. 2015-June. IEEE Computer Society, 611--616. https://doi.org/10.1109/EIT.2015.7293405
[93]
Tolba Marwa, Ouadfel Salima, and Meshoul Souham. 2018. Deep learning for online harassment detection in tweets. In Proceedings - PAIS 2018: International Conference on Pattern Analysis and Intelligent Systems. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/PAIS.2018.8598530
[94]
Ersilia Menesini, Annalaura Nocentini, Benedetta Emanuela Palladino, Ann Frisén, Sofia Berne, Rosario Ortega-Ruiz, Juan Calmaestra, Herbert Scheithauer, Anja Schultze-Krumbholz, Piret Luik, et al. 2012. Cyberbullying definition among adolescents: A comparison across six European countries. Cyberpsychology, Behavior, and Social Networking, Vol. 15, 9 (2012), 455--463.
[95]
Diana J Meter, Ross Budziszewski, Abigail Phillips, and Troy E Beckert. 2021. A Qualitative Exploration of College Students' Perceptions of Cyberbullying. TechTrends (2021), 1--9.
[96]
Jerold D Miller and Shirley M Hufstedler. 2009. Cyberbullying Knows No Borders. Australian Teacher Education Association (2009).
[97]
Tijana Milosevic. 2016. Social media companies' cyberbullying policies. International Journal of Communication, Vol. 10 (2016), 22.
[98]
Margaret Mitchell, Simone Wu, Andrew Zaldivar, Parker Barnes, Lucy Vasserman, Ben Hutchinson, Elena Spitzer, Inioluwa Deborah Raji, and Timnit Gebru. 2019. Model cards for model reporting. In Proceedings of the conference on fairness, accountability, and transparency. 220--229.
[99]
Farman A Moayed, Nancy Daraiseh, Richard Shell, and Sam Salem. 2006. Workplace bullying: a systematic review of risk factors and outcomes. Theoretical Issues in Ergonomics Science, Vol. 7, 3 (2006), 311--327.
[100]
R Morris, Daniel McDuff, and R Calvo. 2014. Crowdsourcing techniques for affective computing. In The Oxford handbook of affective computing. Oxford Univ. Press, 384--394.
[101]
Michael Muller, Cecilia Aragon, Shion Guha, Marina Kogan, Gina Neff, Cathrine Seidelin, Katie Shilton, and Anissa Tanweer. 2020. Interrogating Data Science. In Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing. 467--473.
[102]
Michael J Muller and Allison Druin. 2012. Participatory design: The third space in human-computer interaction. The human-computer interaction handbook: Fundamentals, evolving technologies, and emerging applications (2012), 1125--1154.
[103]
Amgad Muneer and Suliman Mohamed Fati. 2020. A Comparative Analysis of Machine Learning Techniques for Cyberbullying Detection on Twitter. Future Internet, Vol. 12, 11 (2020), 187.
[104]
David Nabuzoka. 2003. Experiences of bullying-related behaviours by English and Zambian pupils: a comparative study. Educational Research, Vol. 45, 1 (2003), 95--109.
[105]
Samaneh Nadali, Masrah Azrifah Azmi Murad, Nurfadhlina Mohamad Sharef, Aida Mustapha, and Somayeh Shojaee. 2014. A review of cyberbullying detection: An overview. In International Conference on Intelligent Systems Design and Applications, ISDA. IEEE Computer Society, 325--330. https://doi.org/10.1109/ISDA.2013.6920758
[106]
Vinita Nahar, Sanad Al-Maskari, Xue Li, and Chaoyi Pang. 2014. Semi-supervised learning for cyberbullying detection in social networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 8506 LNCS. Springer Verlag, 160--171. https://doi.org/10.1007/978--3--319-08608--8_14
[107]
Vinita Nahar, Xue Li, Chaoyi Pang, and Yang Zhang. 2013. Cyberbullying Detection based on text-stream classification. In Conferences in Research and Practice in Information Technology Series, Vol. 146. 49--58. http://www.noswearing.com/
[108]
Vinita Nahar, Sayan Unankard, Xue Li, and Chaoyi Pang. 2012. Sentiment analysis for effective detection of cyber bullying. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 7235 LNCS. Springer, Berlin, Heidelberg, 767--774. https://doi.org/10.1007/978--3--642--29253--8_75
[109]
K. Nalini and L. Jaba Sheela. 2015. Classification of tweets using text classifier to detect cyber bullying. In Advances in Intelligent Systems and Computing, Vol. 338. Springer Verlag, 637--645. https://doi.org/10.1007/978--3--319--13731--5_69
[110]
K. Nalini and L. Jaba Sheela. 2016. Classification using Latent Dirichlet Allocation with Naive Bayes Classifier to detect Cyber Bullying in Twitter. Indian Journal of Science and Technology, Vol. 9, 28 (7 2016).
[111]
Charisse L Nixon. 2014. Current perspectives: the impact of cyberbullying on adolescent health. Adolescent health, medicine and therapeutics, Vol. 5 (2014), 143.
[112]
William S Noble. 2006. What is a support vector machine? Nature biotechnology, Vol. 24, 12 (2006), 1565--1567.
[113]
Chitu Okoli and Kira Schabram. 2010. A guide to conducting a systematic literature review of information systems research. (2010).
[114]
Scott W O'Leary-Kelly and Robert J Vokurka. 1998. The empirical assessment of construct validity. Journal of operations management, Vol. 16, 4 (1998), 387--405.
[115]
Alexandra Olteanu, Carlos Castillo, Fernando Diaz, and Emre Kiciman. 2019. Social data: Biases, methodological pitfalls, and ethical boundaries. Frontiers in Big Data, Vol. 2 (2019), 13.
[116]
Dan Olweus. 1994. Bullying at school. In Aggressive behavior. Springer, 97--130.
[117]
Mahesh Pal. 2005. Random forest classifier for remote sensing classification. International journal of remote sensing, Vol. 26, 1 (2005), 217--222.
[118]
Ji Ho Park, Jamin Shin, and Pascale Fung. 2018. Reducing Gender Bias in Abusive Language Detection. In Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, Brussels, Belgium, 2799--2804. https://doi.org/10.18653/v1/D18--1302
[119]
John Pavlopoulos, Jeffrey Sorensen, Lucas Dixon, Nithum Thain, and Ion Androutsopoulos. 2020. Toxicity Detection: Does Context Really Matter? arXiv preprint arXiv:2006.00998 (2020).
[120]
James W Pennebaker, Martha E Francis, and Roger J Booth. 2001. Linguistic inquiry and word count: LIWC 2001. Mahway: Lawrence Erlbaum Associates, Vol. 71, 2001 (2001), 2001.
[121]
Nektaria Potha and Manolis Maragoudakis. 2015. Cyberbullying detection using time series modeling. In IEEE International Conference on Data Mining Workshops, ICDMW, Vol. 2015-Janua. IEEE Computer Society, 373--382. https://doi.org/10.1109/ICDMW.2014.170
[122]
Yada Pruksachatkun, Sachin R Pendse, and Amit Sharma. 2019. Moments of change: Analyzing peer-based cognitive support in online mental health forums. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--13.
[123]
Rahat Ibn Rafiq, Homa Hosseinmardi, Richard Han, Qin Lv, and Shivakant Mishra. 2018. Scalable and timely detection of cyberbullying in online social networks. In Proceedings of the ACM Symposium on Applied Computing. Association for Computing Machinery, 1738--1747. https://doi.org/10.1145/3167132.3167317
[124]
Elaheh Raisi and Bert Huang. 2016. Cyberbullying Identification Using Participant-Vocabulary Consistency. (6 2016). http://arxiv.org/abs/1606.08084
[125]
Elaheh Raisi and Bert Huang. 2017. Cyberbullying detection with weakly supervised machine learning. In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2017. Association for Computing Machinery, Inc, New York, New York, USA, 409--416. https://doi.org/10.1145/3110025.3110049
[126]
Elaheh Raisi and Bert Huang. 2019. Reduced-bias co-trained ensembles for weakly supervised cyberbullying detection. In International Conference on Computational Data and Social Networks. Springer, 293--306.
[127]
Gonzalo Ramos, Jina Suh, Soroush Ghorashi, Christopher Meek, Richard Banks, Saleema Amershi, Rebecca Fiebrink, Alison Smith-Renner, and Gagan Bansal. 2019. Emerging Perspectives in Human-Centered Machine Learning. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. 1--8.
[128]
Johan Redström. 2006. Towards user design? On the shift from object to user as the subject of design. Design studies, Vol. 27, 2 (2006), 123--139.
[129]
Kelly Reynolds, April Kontostathis, and Lynne Edwards. 2011. Using machine learning to detect cyberbullying. In Proceedings - 10th International Conference on Machine Learning and Applications, ICMLA 2011, Vol. 2. 241--244. https://doi.org/10.1109/ICMLA.2011.152
[130]
Irina Rish et al. 2001. An empirical study of the naive Bayes classifier. In IJCAI 2001 workshop on empirical methods in artificial intelligence, Vol. 3. 41--46.
[131]
Walisa Romsaiyud, Kodchakorn Na Nakornphanom, Pimpaka Prasertsilp, Piyaporn Nurarak, and Pirom Konglerd. 2017. Automated cyberbullying detection using clustering appearance patterns. In 2017 9th International Conference on Knowledge and Smart Technology: Crunching Information of Everything, KST 2017. Institute of Electrical and Electronics Engineers Inc., 242--247. https://doi.org/10.1109/KST.2017.7886127
[132]
Hugo Rosa, N Pereira, Ricardo Ribeiro, Paula Costa Ferreira, Jo ao Paulo Carvalho, Sofia Oliveira, Lu'isa Coheur, Paula Paulino, AM Veiga Sim ao, and Isabel Trancoso. 2019. Automatic cyberbullying detection: A systematic review. Computers in Human Behavior, Vol. 93 (2019), 333--345.
[133]
Derek Ruths and Jürgen Pfeffer. 2014. Social media for large studies of behavior. Science, Vol. 346, 6213 (2014), 1063--1064.
[134]
Koustuv Saha, Eshwar Chandrasekharan, and Munmun De Choudhury. 2019. Prevalence and psychological effects of hateful speech in online college communities. In Proceedings of the 10th ACM Conference on Web Science. 255--264.
[135]
Semiu Salawu, Yulan He, and Joanna Lumsden. 2017. Approaches to automated detection of cyberbullying: A survey. IEEE Transactions on Affective Computing (2017).
[136]
Nithya Sambasivan, Erin Arnesen, Ben Hutchinson, and Vinodkumar Prabhakaran. 2020. Fairness Considered Harmful: On the Non-portability of Fair-ML in India. arXiv preprint arXiv:2012.03659 (2020).
[137]
Huascar Sanchez and Shreyas Kumar. [n.d.]. Twitter Bullying Detection. Technical Report. https://www.researchgate.net/publication/267823748
[138]
Martin Shepperd, David Bowes, and Tracy Hall. 2014. Researcher bias: The use of machine learning in software defect prediction. IEEE Transactions on Software Engineering, Vol. 40, 6 (2014), 603--616.
[139]
Shruthi and Prof Mangala C. 2017. A Framework for Automatic Detection and Prevention of Cyberbullying in Social Media. International Journal of Innovative Research in Computer and Communication Engineering, Vol. 5, 6 (2017), 86--90. www.ijircce.com
[140]
Jim Sidanius and Felicia Pratto. 2001. Social dominance: An intergroup theory of social hierarchy and oppression .Cambridge University Press.
[141]
Theodore M Singelis. 1994. The measurement of independent and interdependent self-construals. Personality and social psychology bulletin, Vol. 20, 5 (1994), 580--591.
[142]
Vivek K. Singh, Souvick Ghosh, and Christin Jose. 2017. Toward multimodal cyberbullying detection. In Conference on Human Factors in Computing Systems - Proceedings, Vol. Part F1276. Association for Computing Machinery, 2090--2099. https://doi.org/10.1145/3027063.3053169
[143]
Vivek K Singh and Connor Hofenbitzer. 2019. Fairness across network positions in cyberbullying detection algorithms. In 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 557--559.
[144]
Vivek K. Singh, Qianjia Huang, and Pradeep K. Atrey. 2016. Cyberbullying detection using probabilistic socio-textual information fusion. In Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016. Institute of Electrical and Electronics Engineers Inc., 884--887. https://doi.org/10.1109/ASONAM.2016.7752342
[145]
Robert Slonje, Peter K Smith, and Ann Frisén. 2013. The nature of cyberbullying, and strategies for prevention. Computers in human behavior, Vol. 29, 1 (2013), 26--32.
[146]
Peter K. Smith, Jess Mahdavi, Manuel Carvalho, Sonja Fisher, Shanette Russell, and Neil Tippett. 2008. Cyberbullying: its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry, Vol. 49, 4 (4 2008), 376--385. https://doi.org/10.1111/j.1469--7610.2007.01846.x
[147]
A. Squicciarini, S. Rajtmajer, Y. Liu, and C. Griffin. 2015. Identification and characterization of cyberbullying dynamics in an online social network. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015. Association for Computing Machinery, Inc, New York, New York, USA, 280--285. https://doi.org/10.1145/2808797.2809398
[148]
B. Sri Nandhini and J. I. Sheeba. 2015. Cyberbullying detection and classification using information retrieval algorithm. In ACM International Conference Proceeding Series, Vol. 06-07-March-2015. Association for Computing Machinery. https://doi.org/10.1145/2743065.2743085
[149]
B. Srinandhini and J. I. Sheeba. 2015. Online social network bullying detection using intelligence techniques. Procedia Computer Science, Vol. 45, C (2015), 485--492. https://doi.org/10.1016/j.procs.2015.03.085
[150]
Rekha Sugandhi, Anurag Pande, Siddhant Chawla, Abhishek Agrawal, and Husen Bhagat. 2015. Methods for detection of cyberbullying: A survey. In 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 173--177.
[151]
Harini Suresh and John V Guttag. 2019. A framework for understanding unintended consequences of machine learning. ArXiv, Vol. abs/1901.10002 (2019).
[152]
Nargess Tahmasbi and Elham Rastegari. 2018. A socio-contextual approach in automated detection of public cyberbullying on Twitter. ACM Transactions on Social Computing, Vol. 1, 4 (2018), 1--22.
[153]
Hannah J Thomas, Jason P Connor, and James G Scott. 2015. Integrating traditional bullying and cyberbullying: challenges of definition and measurement in adolescents--a review. Educational psychology review, Vol. 27, 1 (2015), 135--152.
[154]
Robert S Tokunaga. 2010. Following you home from school: A critical review and synthesis of research on cyberbullying victimization. Computers in human behavior, Vol. 26, 3 (2010), 277--287.
[155]
Sabina Tomkins, Lise Getoor, Yunfei Chen, and Yi Zhang. 2018. A socio-linguistic model for cyberbullying detection. In Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018. Institute of Electrical and Electronics Engineers Inc., 53--60. https://doi.org/10.1109/ASONAM.2018.8508294
[156]
Laura P. v Bosque and Sara Elena Garza. 2014. Aggressive text detection for cyberbullying. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 8856 (11 2014), 221--232. https://doi.org/10.1007/978--3--319--13647--9_21
[157]
Katrien Van Cleemput, Heidi Vandebosch, and Sara Pabian. 2014. Personal characteristics and contextual factors that determine “helping,”“joining in,” and “doing nothing” when witnessing cyberbullying. Aggressive behavior, Vol. 40, 5 (2014), 383--396.
[158]
Cynthia Van Hee, Gilles Jacobs, Chris Emmery, Bart DeSmet, Els Lefever, Ben Verhoeven, Guy De Pauw, Walter Daelemans, and Véronique Hoste. 2018. Automatic detection of cyberbullying in social media text. PLoS ONE, Vol. 13, 10 (10 2018). https://doi.org/10.1371/journal.pone.0203794
[159]
Kathleen Van Royen, Karolien Poels, Walter Daelemans, and Heidi Vandebosch. 2015. Automatic monitoring of cyberbullying on social networking sites: From technological feasibility to desirability. Telematics and Informatics, Vol. 32, 1 (2015), 89--97.
[160]
Kiri Wagstaff. 2012. Machine Learning that Matters. Proceedings of 29th International Conference on Machine Learning., Vol. 1 (06 2012).
[161]
Thilini Wijesiriwardene, Hale Inan, Ugur Kursuncu, Manas Gaur, Valerie L Shalin, Krishnaprasad Thirunarayan, Amit Sheth, and I Budak Arpinar. 2020. ALONE: A Dataset for Toxic Behavior Among Adolescents on Twitter. In International Conference on Social Informatics. Springer, 427--439.
[162]
Dieter Wolke, Andrea Schreier, Mary C Zanarini, and Catherine Winsper. 2012. Bullied by peers in childhood and borderline personality symptoms at 11 years of age: a prospective study. Journal of child psychology and psychiatry, Vol. 53, 8 (2012), 846--855.
[163]
Richmond Y Wong and Vera Khovanskaya. 2018. Speculative Design in HCI: From Corporate Imaginations to Critical Orientations. In New Directions in Third Wave Human-Computer Interaction: Volume 2-Methodologies. Springer, 175--202.
[164]
Mengfan Yao. 2019. Robust detection of cyberbullying in social media. In The Web Conference 2019 - Companion of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, 61--66. https://doi.org/10.1145/3308560.3314196
[165]
Mengfan Yao, Charalampos Chelmis, and Daphney Stavroula Zois. 2018. Cyberbullying detection on instagram with optimal online feature selection. In Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018. Institute of Electrical and Electronics Engineers Inc., 401--408. https://doi.org/10.1109/ASONAM.2018.8508329
[166]
Mengfan Yao, Charalampos Chelmis, and Daphney Stavroula Zois. 2019. Cyberbullying ends here: Towards robust detection of cyberbullying in social media. In The World Wide Web Conference. 3427--3433.
[167]
Xiang Zhang, Jonathan Tong, Nishant Vishwamitra, Elizabeth Whittaker, Joseph P. Mazer, Robin Kowalski, Hongxin Hu, Feng Luo, Jamie Macbeth, and Edward Dillon. 2016. Cyberbullying Detection with a Pronunciation Based Convolutional Neural Network. In 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA). Institute of Electrical and Electronics Engineers (IEEE), 740--745. https://doi.org/10.1109/icmla.2016.0132
[168]
Rui Zhao and Kezhi Mao. 2016. Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder. IEEE Transactions on Affective Computing, Vol. 8, 3 (2016), 328--339.
[169]
Rui Zhao, Anna Zhou, and Kezhi Mao. 2016. Automatic detection of cyberbullying on social networks based on bullying features. In ACM International Conference Proceeding Series, Vol. 04-07-Janu. Association for Computing Machinery, New York, New York, USA, 1--6. https://doi.org/10.1145/2833312.2849567
[170]
Haoti Zhong, Hao Li, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Christopher Griffin, David J Miller, and Cornelia Caragea. 2016. Content-Driven Detection of Cyberbullying on the Instagram Social Network. In IJCAI. 3952--3958.
[171]
Haoti Zhong, David J Miller, and Anna Squicciarini. 2018. Flexible Inference for Cyberbully Incident Detection. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 356--371.
[172]
Karolina Zwierzynska, Dieter Wolke, and Tanya S Lereya. 2013. Peer victimization in childhood and internalizing problems in adolescence: a prospective longitudinal study. Journal of abnormal child psychology, Vol. 41, 2 (2013), 309--323.

Cited By

View all
  • (2024)ProTect: a hybrid deep learning model for proactive detection of cyberbullying on social mediaFrontiers in Artificial Intelligence10.3389/frai.2024.12693667Online publication date: 6-Mar-2024
  • (2024)A novel approach toward cyberbullying with intelligent recommendations using deep learning based blockchain solutionFrontiers in Medicine10.3389/fmed.2024.137921111Online publication date: 2-Apr-2024
  • (2024)Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive surveyFrontiers in Computer Science10.3389/fcomp.2024.13873546Online publication date: 10-Jun-2024
  • Show More Cited By

Index Terms

  1. A Human-Centered Systematic Literature Review of Cyberbullying Detection Algorithms

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 5, Issue CSCW2
    CSCW2
    October 2021
    5376 pages
    EISSN:2573-0142
    DOI:10.1145/3493286
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 October 2021
    Published in PACMHCI Volume 5, Issue CSCW2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cyberbullying detection
    2. human-centered machine learning
    3. literature review
    4. social media

    Qualifiers

    • Research-article

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1,023
    • Downloads (Last 6 weeks)131
    Reflects downloads up to 18 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)ProTect: a hybrid deep learning model for proactive detection of cyberbullying on social mediaFrontiers in Artificial Intelligence10.3389/frai.2024.12693667Online publication date: 6-Mar-2024
    • (2024)A novel approach toward cyberbullying with intelligent recommendations using deep learning based blockchain solutionFrontiers in Medicine10.3389/fmed.2024.137921111Online publication date: 2-Apr-2024
    • (2024)Unveiling machine learning strategies and considerations in intrusion detection systems: a comprehensive surveyFrontiers in Computer Science10.3389/fcomp.2024.13873546Online publication date: 10-Jun-2024
    • (2024)When the "Matchmaker" Does Not Have Your Interest at Heart: Perceived Algorithmic Harms, Folk Theories, and Users' Counter-Strategies on TinderProceedings of the ACM on Human-Computer Interaction10.1145/36897108:CSCW2(1-29)Online publication date: 8-Nov-2024
    • (2024)Teen Talk: The Good, the Bad, and the Neutral of Adolescent Social Media UseProceedings of the ACM on Human-Computer Interaction10.1145/36869618:CSCW2(1-35)Online publication date: 8-Nov-2024
    • (2024)"Just Like, Risking Your Life Here": Participatory Design of User Interactions with Risk Detection AI to Prevent Online-to-Offline Harm Through Dating AppsProceedings of the ACM on Human-Computer Interaction10.1145/36869068:CSCW2(1-41)Online publication date: 8-Nov-2024
    • (2024)Decomposition-based Synthesis for Applying Divide-and-Conquer-like Algorithmic ParadigmsACM Transactions on Programming Languages and Systems10.1145/364844046:2(1-59)Online publication date: 17-Jun-2024
    • (2024)Participatory Design to Address Disclosure-Based CyberbullyingProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3660716(1547-1565)Online publication date: 1-Jul-2024
    • (2024)Stash: Flexible Energy Storage for Intermittent SensorsACM Transactions on Embedded Computing Systems10.1145/364151123:2(1-23)Online publication date: 18-Mar-2024
    • (2024)Missed Opportunities for Human-Centered AI Research: Understanding Stakeholder Collaboration in Mental Health AI ResearchProceedings of the ACM on Human-Computer Interaction10.1145/36373728:CSCW1(1-24)Online publication date: 26-Apr-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media