A Survey On Different Approaches of Detecting Cyber Bullying Messages

Authors

  • M. Devi  Research Scholar, Department of Computer Science Sakthi Arts and Science College For Women, Oddanchatram, Tamil Nadu, India
  • M. Chitra Devi  PG Head & Associate Professor, Department of Computer Science, Sakthi Arts and Science College For Women, Oddanchatram, Tamil Nadu, India

Keywords:

Social Media, Twitter,Machine Learning, Cyberbullying Detection.

Abstract

Opinion mining or sentiment analysis is considered as an important application of NLP (Natural Language Processing). Opinion mining is extracting the views that people express online. Those Websites which permits social interaction and collaboration can be considered as social media site, including networking sites such as Facebook, MySpace, and Twitter. Such sites offer today's youth a platform for amusement, entertainment, thrill, correspondence and communication with friends and furthermore have developed radically and exponentially as of late. This is the reason, there are various side effects, as cyberbullying has emerged as a serious issue afflicting children, adolescents and young adults. Machine learning techniques have conceivable ability to make automatic detection of bullying messages in social media, and this could develop a healthy and comparatively safe social media environment. Social media getting more and more popular in our day today life. By the popularity of the social media affects the people who involving into it. This makes the technology to work or to feel smarter and makes us lazier. On resulting to this robust and discriminative numerical representation learning of text messages is a critical issue. Hence here we propose a learning method to tackle this issue which is named as Semantic Enhanced Marginalized Denoising Auto Encoder (smsda).

References

  1. A. M. Kaplan and M. Haenlein, “Users of the world, unite! The challenges and opportunities of social media,” Business horizons, vol. 53, no. 1, pp. 59-68, 2010.
  2. R. M. Kowalski, G. W. Giumetti, A. N. Schroeder, and M. R.Lattanner, “Bullying in the digital age: A critical review and metaanalysis of cyberbullying research among youth.” 2014.
  3. M. Ybarra, “Trends in technology-based sexual and non-sexual aggression over time and linkages to nontechnology aggression,”National Summit on Interpersonal Violence and Abuse Across the Lifespan: Forging a Shared Agenda, 2010.
  4. B. K. Biggs, J. M. Nelson, and M. L. Sampilo, “Peer relations in the anxiety-depression link: Test of a mediation model,” Anxiety, Stress, & Coping, vol. 23, no. 4, pp. 431-447, 2010.
  5. S. R. Jimerson, S. M. Swearer, and D. L. Espelage, Handbook of bullying in schools: An international perspective. Routledge/Taylor & Francis Group, 2010.
  6. G. Gini and T. Pozzoli, “Association between bullying and psychosomatic problems: A meta-analysis,” Pediatrics, vol. 123, no. 3, pp. 1059-1065, 2009.
  7. A. Kontostathis, L. Edwards, and A. Leatherman, “Text mining and cybercrime,” Text Mining: Applications and Theory. John Wiley & Sons, Ltd, Chichester, UK, 2010.
  8. J.-M. Xu, K.-S. Jun, X. Zhu, and A. Bellmore, “Learning from bullying traces in social media,” in Proceedings of the 2012 conferenceof the North American chapter of the association for computational linguistics: Human language technologies. Association for Computational Linguistics, 2012, pp. 656-666.
  9. Q. Huang, V. K. Singh, and P. K. Atrey, “Cyber bullying detection using social and textual analysis,” in Proceedings of the 3rd International Workshop on Socially-Aware Multimedia. ACM, 2014, pp.3-6.
  10. D. Yin, Z. Xue, L. Hong, B. D. Davison, A. Kontostathis, and L. Edwards, “Detection of harassment on web 2.0,” Proceedings of the Content Analysis in the WEB, vol. 2, pp. 1-7, 2009.
  11. K. Dinakar, R. Reichart, and H. Lieberman, “Modeling the detection of textual cyberbullying.” in The Social Mobile Web, 2011.
  12. V. Nahar, X. Li, and C. Pang, “An effective approach for cyberbullying detection,” Communications in Information Science and Management Engineering, 2012.
  13. M. Dadvar, F. de Jong, R. Ordelman, and R. Trieschnigg, “Improved cyberbullying detection using gender information,” in Proceedings of the 12th -Dutch-Belgian Information Retrieval Workshop (DIR2012). Ghent, Belgium: ACM, 2012.
  14. M. Dadvar, D. Trieschnigg, R. Ordelman, and F. de Jong, “Improving cyberbullying detection with user context,” in Advances in Information Retrieval. Springer, 2013, pp. 693-696.
  15. P. Vincent, H. Larochelle, I. Lajoie, Y. Bengio, and P.-A. Manzagol, “Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion,” The Journal of Machine Learning Research, vol. 11, pp. 3371-3408, 2010.
  16. P. Baldi, “Autoencoders, unsupervised learning, and deep architectures,” Unsupervised and Transfer Learning Challenges in Machine Learning, Volume 7, p. 43, 2012.
  17. M. Chen, Z. Xu, K. Weinberger, and F. Sha, “Marginalized denoising autoencoders for domain adaptation,” arXiv preprint arXiv: 1206.4683, 2012.
  18. T. K. Landauer, P. W. Foltz, and D. Laham, “An introduction to latent semantic analysis,” Discourse processes, vol. 25, no. 2-3, pp.259-284, 1998.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
M. Devi, M. Chitra Devi, " A Survey On Different Approaches of Detecting Cyber Bullying Messages, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 4, pp.450-454, March-April-2018.