Test model for Cyberbullying

Anjusha*
Associate Professor, Department of Computer Science and Engineering, MLR Institute of Technology, Hyderabad, India.
Periodicity:March - May'2017
DOI : https://doi.org/10.26634/jcom.5.1.13791

Abstract

With the development of Web 2.0, online correspondence and interpersonal organizations are rising. This variation helps clients to impart their data and team up to each other effectively. These web administrations help build up new associations between people or strengthen existing ones. Notwithstanding, they can likewise prompt malicious activities or a digital criminal is dealt in a cyberbullying case. In the meantime, it can make children and young age people to utilize the advances for the expectation of hurting another person. The proposed strategy is a powerful technique in order to recognize cyberbullying exercises via web-based networking media. The recognition strategy can recognize the nearness of cyberbullying terms and group cyberbullying exercises in informal community, for example, Flaring, Provocation, and Bigotry utilizing Semantic-upgraded Minimized Stack Denoising Autoencoders (smSDA). Due to the negative impact of cyberbullying, a few procedures and strategies are proposed to conquer this issue.

Keywords

Cyberbullying Detection, Automatic Blocking, Stack Denoising Auto Encoders, Timeline Posting, Victims

How to Cite this Article?

Pimpalshende, A. (2017). Test Model for Cyber Bullying. i-manager’s Journal on Computer Science, 5(1), 1-6. https://doi.org/10.26634/jcom.5.1.13791

References

[1]. Bengio, Y., Courville, A., & Vincent, P. (2013). Representation learning: A review and new perspectives. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(8), 1798-1828.
[2]. Biggs, B. K., Nelson, J. M., & Sampilo, M. L. (2010). Peer relations in the anxiety–depression link: Test of a mediation model. Anxiety, Stress, & Coping, 23(4), 431-447.
[3]. Georgiou, C., Anderson, S., & Dodd, T. (2017). Constructing informative Bayesian map priors: A multiobjective optimisation approach applied to indoor occupancy grid mapping. The International Journal of Robotics Research, 36(3), 274-291.
[4]. Gerlach, A. (2016). Improving e-commerce fraud investigations in virtual, inter-institutional teams: Towards an approach based on Semantic Web technologies (Master Thesis TH Koln - University of Applied Sciences, Institute of Informatics).
[5]. Hsu, W. N., Zhang, Y., & Glass, J. (2017). Unsupervised domain adaptation for robust speech recognition via variational autoencoder-based data augmentation. arXiv preprint arXiv:1707.06265.
[6]. Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons, 53(1), 59-68.
[7]. Kowalski, R. M., Giumetti, G. W., Schroeder, A. N., & Lattanner, M. R. (2014). Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4):1073-1137.
[8]. Silva, Y. N., Rich, C., & Hall, D. (2016, August). Bully Blocker: Towards the identification of cyberbullying in social networking sites. In Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on (pp. 1377-1379). IEEE.
[9]. Zhao, R., & Mao, K. (2017). Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder. IEEE Transactions on Affective Computing, 8(3), 328-339.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.