Professional Documents
Culture Documents
ISSN No:-2456-2165
Abstract:- Online social networks (OSNs) have seen a communicative (3) desensitization (4) compliment (5)
rapid growth in recent time. This growth in popularity has isolation (6) personal information (7) reframing and (8)
also paved the way for the threat of cyberbullying to grow relationship. Cyberbullying detection is performed by
to an extent that was never seen before. Cyberbullying is incorporating the weighting scheme in feature selection and
more alarming day by day in our present life. But the using graph model to identify most active cyberbullying
technical solution for preventing and detection of predator and victim in a social network [4].
cyberbullying is very limited. Most of the studies on
The computational complexity is increased due to using
cyberbullying detection focus on detection, not prevention.
multiple classifiers in the system. To overcome the above
In this paper, we show that the automatic cyberbullying
problems our proposed work concentrates on efficient
detection both individual and group communication.
cyberbullying detection and prevention in the social network.
In social networks, bullying takes place at individuals
Keywords:-Cyberbullying detection; SVM classifier; PSO-GA.
communication (i.e.) user-user communication (messages) and
a group communication (i.e.) user-group communication
I. INTRODUCTION
(posts). Our proposed work concentrates on bullying detection
Social networks are the place where huge people interact, and prevention at both communications.
share, discuss and disseminate knowledge and information for
mutual benefits. Cyberbullying is a form of harassment or A. Challenges and Issues in cyberbullying detection
bullying with a use of electronic devices such as mobile Although lots of work carried out by researchers in
phones, laptops etc. through social networks. Nowadays cyberbullying detection, there are still many research areas to
cyberbullying increases rapidly especially among teenagers be explored. Existing methods focused only on cyberbullying
with the development of the internet [1]. Cyberbullying detection, the cyberbullying prevention is not considered.
analysis among youths is performed with the influence of Issues and challenges in cyberbullying detection are discussed
disability status on participant’s ability detect the presence of in [6]. The issues such as the type of cyberbullying, motive
cyberbullying. Both participants with and without the and impact of cyber victimization and prevention possibilities
disability are displayed high victimization prevalence rate. But are discussed by the author. Life Exposure theory (LET) based
youth with disability status displayed significantly higher rates cyberbullying observation is performed to protect individuals
on cyberbullying victimization. It also highlights the to become a target victim of cyberbullying [17]. The
importance of studying predators and victim status on observation of social network is performed based on Value-
cyberbullying. It shows the importance of cyberbullying Inertia-Visibility-Accessibility (VIVA) model. In LET online
detection and prevention. Hence cyberbullying detection and activities and risk online behaviors are taken in account to
prevention is an emerging need in the social network. detect individual activities. Psychological and behavioral
Automatic cyberbullying detection is performed based on factors are associated with cyberbullying [18]. Victims use the
cyber victimization and fine-grained classification [2]. The internet to create a new relationship and to escape from the
cyberbullying events are classified into the thread, blackmail, real world which is the weakness of victims and used by
insult, curse, defense, defamation, and encouragement based predators. But these methods are proposed only theoretically
on word unigram, word bigrams, character trigram and and not well suitable for real-time.
sentiment lexicon. The features for classification are extracted
from bag-of-words which give the lexical feature of words. II. RELATED WORKS
Most challenges that found in cyberbullying detection
including classification of messages, victim detection, and Many approaches had been employed in cyberbullying
prevention of cyberbullying have been performed by detection and prevention. Most of them use machine learning
researchers. approaches for cyberbullying detection.
A. Cyberbullying detection based on supervised learning
Automated cyberbullying detection is performed by the approaches
clustering method [3] with enhanced Naïve Bayes classifier. Support Vector Machine (SVM) is employed for
The entire dataset is partitioned into clusters using k-means cyberbullying detection which uses the user’s characteristics,
clustering approach and eight classes are predicted based on their information, gender information and post harassment
the frequency of word with multinomial model feature vector behavior [6]. It considers user characteristics to predict victim
in specific partition and probability of that word to occur in and predator in cyberbullying event. The features used in
other documents. Clustering is performed based on data SVM classifier are profane words, second person pronoun,
similarity and Naïve Bayes classifier classifies data into eight other pronouns and TF-IDF value of all words in each post.
sub-categories as follows: (1) activities approach (2) Then the dataset is divided into male and female posts and two
C. Evaluation Results
In order to evaluate the proposed model, we have used
dataset collected from Formspring.me and MySpace. At first,
we have calculated precision and recall for both individual as
Classifier True False Positive Precision Recall AUC value Accuracy (%)
Positive
Classifier True Positive False Positive Precision Recall AUC value Accuracy (%)