Academia.eduAcademia.edu

Outline

Using computer technology to address the problem of cyberbullying

2014, ACM SIGCAS Computers and Society

https://doi.org/10.1145/2656870.2656876

Abstract

The issue of cyberbullying is a social concern that has arisen due to the prevalent use of computer technology today. In this paper, we present a multi-faceted solution to mitigate the effects of cyberbullying, one that uses computer technology in order to combat the problem. We propose to provide assistance for various groups affected by cyberbullying (the bullied and the bully, both). Our solution was developed through a series of group projects and includes i) technology to detect the occurrence of cyberbullying ii) technology to enable reporting of cyberbullying iii) proposals to integrate third-party assistance when cyberbullying is detected iv) facilities for those with authority to manage online social networks or to take actions against detected bullies. In all, we demonstrate how this important social problem which arises due to computer technology can also leverage computer technology in order to take steps to better cope with the undesirable effects that have arisen.

References (23)

  1. REFERENCES
  2. About page: Stackoverflow (2014). URL http://stackoverflow.com/about
  3. Frequently asked questions: Reddit (2014). URL http://www.reddit.com/wiki/faq
  4. Berstein, M.: Prevention, not tougher punishment key to ending cyber bullying. http://www.unicef.ca/en/blog/prevention-not- tougher-punishment-key-to-ending-cyber-bullying (2013)
  5. Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artificial Intelligence Review 29(1), 63-92 (2008). DOI 10.1007/s10462-009-9109-6. URL http://dx.doi.org/10.1007/s10462-009-9109-6
  6. Brown, J.: Amanda todd: 'cyberbullying' doesn't begin to describe it'. http://www2.macleans.ca/2012/10/16/amanda-todd- cyberbullying-doesnt-begin-to-describe-it/ (2012)
  7. Dadvar, M., de Jong, F.: Cyberbullying detection: a step toward a safer internet yard. In: Proceedings of the 21st international conference companion on World Wide Web, pp. 121-126. ACM (2012)
  8. Dinakar, K., Reichart, R., Lieberman, H.: Modeling the detection of textual cyberbullying. In: The Social Mobile Web (2011)
  9. Garg, V., Patil, S., Kapadia, A., Camp, L.J.: Peer-produced privacy protection. In: Technology and Society (ISTAS), 2013 IEEE International Symposium on, pp. 147-154. IEEE (2013)
  10. Hamilton, G.: Amanda todd and the greatly exaggerated cyber-bullying plague: Web harassment not on the rise, researcher says. http://news.nationalpost.com/2012/10/26/amanda- todd-and-the-greatly-exaggerated-cyber-bullying- plague-web-harassment-isnt-rising-researcher-says/ (2012)
  11. Kerr, R., Cohen, R.: Detecting and identifying coalitions. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 3, pp. 1363-1364. International Foundation for Autonomous Agents and Multiagent Systems (2012)
  12. MacDonald, M.: Nova scotia cyber- bullying unit seeks personal data from facebook, google. http://www.theglobeandmail.com/news/national/nova- scotia-cyberbullying-unit-seeks-personal-data-from- facebook-google/article18955261/ (2014)
  13. Mas, S.: Mps to debate ndp anti-bullying motion. http://www.cbc.ca/news/politics/mps-to-debate-ndp- anti-bullying-motion-1.1127561 (2014)
  14. Moore, M.J., Nakano, T., Suda, T., Enomoto, A.: Tools in cyberbullying. Social Network Engineering for Secure Web Data and Services p. 67 (2013)
  15. Pang, B., Lee, L.: Opinion mining and sentiment analysis. Foundations and Trends in Information Retrieval 2(1-2), 1-135 (2008)
  16. Pedell, T.: Cyber bullying on social media is at 'a breaking point',says ndp mp championing private member's bill. http://news.nationalpost.com/2012/10/15/cyber- bullying-on-social-media-is-at-a-breaking-point-says- ndp-mp-championing-private-members-bill/ [last accessed October 15, 2012] (2012)
  17. Phillips, S.: Copying with cyberbullying: The use of technology to terrify (2014). URL http://www.pbs.org/thisemotionallife/blogs/coping- cyberbullying-use-technology-terrify
  18. Rosen, J.: The right to be forgotten. Stanford law review online 64, 88 (2012)
  19. Sourander, A., Klomek, A.B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T., Helenius, H.: Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study. Archives of general psychiatry 67(7), 720-728 (2010)
  20. Spertus, E.: Smokey: Automatic recognition of hostile messages. In: AAAI/IAAI, pp. 1058-1065 (1997)
  21. Viecco, C., Tsow, A., Camp, L.J.: A privacy-aware architecture for a web rating system. IBM Journal of Research and Development 53(2), 7-1 (2009)
  22. Yin, D., Xue, Z., Hong, L., Davison, B.D., Kontostathis, A., Edwards, L.: Detection of harassment on web 2.0. Proceedings of the Content Analysis in the WEB 2 (2009)
  23. Zhang, L., Zhu, J., Yao, T.: An evaluation of statistical spam filtering techniques. ACM Transactions on Asian Language Information Processing, 3(4), 243-269 (2004)