Skip to main content

Advertisement

Log in

A Mobile-Based System for Preventing Online Abuse and Cyberbullying

  • Original Article
  • Published:
International Journal of Bullying Prevention Aims and scope Submit manuscript

Abstract

A negative consequence of the proliferation of social media is the increase in online abuse. Bullying, once restricted to the playground, has found a new home on social media. Online social networks on their part have intensified efforts to tackle online abuse, but unfortunately, such is the scale of the problem that many young people are still regularly subjected to a wide range of abuse online. Research in automated detection of online abuse has increased considerably in recent times. However, existing studies on online abuse detection typically focus on developing newer algorithms to improve predictions, and little research is done on developing impactful tools that leverage these algorithms to tackle online abuse. In this paper, we present BullStop, a mobile application that can use different machine learning models to detect cyberbullying. A new cyberbullying dataset containing 62,587 tweets annotated using a taxonomy of different cyberbullying types was created to facilitate the classifier’s training. BullStop was developed using a participatory and user-centred design approach involving young people, parents, educators, law enforcement and mental health professionals. Additionally, the application incorporates online training for the ML models using ground truth supplied by the user as additional training data, and in this way, it can create a personalised classifier for each user. Furthermore, on detecting online abuse, the application automatically initiates punitive actions such as deleting offensive messages and blocking cyberbullies on behalf of the user. BullStop is freely available on the Google Play Store and has been downloaded by hundreds of users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28

Similar content being viewed by others

Availability of Data and Material

Not applicable.

Code Availability

Not applicable.

Notes

  1. https://whatsapp.com

  2. https://snapchat.com

  3. https://okta.com

References

  • Abaido, G. M. (2020). Cyberbullying on social media platforms among university students in the United Arab Emirates. International Journal of Adolescence and Youth, 25(1), 407–420.

    Article  Google Scholar 

  • Abras, C., Maloney-Krichmar, D., & Preece, J. (2004). User-centered design. In Bainbridge, W. (Ed.) Encyclopedia of Human-Computer Interaction. 37(4), 445–456.

  • Anderson, M. (2018). A majority of teens have experienced some form of cyberbullying. From https://www.pewresearch.org/internet/2018/09/27/a-majority-of-teens-have-experienced-some-form-of-cyberbullying/. Accessed 04 Mar 2019.

  • Anicas, M. (2014). An Introduction to OAuth. From https://www.digitalocean.com/community/tutorials/an-introduction-to-oauth-2. Accessed 11 Aug 2021.

  • Ashktorab, Z., & Vitak, J. (2016). Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. Proceedings of the 2016 CHI conference on human factors in computing systems, USA, 3895–3905.

  • Calmaestra, J., Rodríguez-Hidalgo, A. J., Mero-Delgado, O., & Solera, E. (2020). Cyberbullying in adolescents from Ecuador and Spain: Prevalence and differences in gender, school year and ethnic-cultural background. Sustainability, 12(11), 4597.

    Article  Google Scholar 

  • Chatzakou, D., Kourtellis, N., Blackburn, J., Cristofaro, E. D., Stringhini, G., & Vakali, A. (2017). Mean birds: Detecting aggression and bullying on Twitter. Proceedings of the 2017 ACM on web science conference, 13–22.

  • Chen, J. K., & Chen, L. M. (2020). Cyberbullying among adolescents in Taiwan, Hong Kong, and Mainland China: A cross-national study in Chinese societies. Asia Pacific Journal of Social Work and Development, 30(3), 227–241.

    Article  Google Scholar 

  • Clemensen, J., Larsen, S. B., Kyng, M., & Kirkevold, M. (2007). Participatory design in health sciences: Using cooperative experimental methods in developing health services and computer technology. Qualitative Health Research, 17(1), 122–130.

    Article  Google Scholar 

  • Davidson, T., Warmsley, D., Macy, M., & Weber, I. (2017). Automated hate speech detection and the problem of offensive language.

  • Dehue, F., Bolman, C., & Völlink, T. (2008). Cyberbullying: Youngsters’ experiences and parental perception. Cyberpsychology and Behavior, 11(2), 217–223.

  • Dinakar, K., Jones, B., Havasi, C., Lieberman, H., & Picard, R. (2012). Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiiS), 2(3), 1–30.

    Article  Google Scholar 

  • Ditch The Label. (2020). What is cyberbullying? From https://www.ditchthelabel.org/what-is-cyberbullying/. Accessed 04 Mar 2021.

  • Dixon, L., Li, J., Sorensen, J., Thain, N., & Vasserman, L. (2018). Measuring and mitigating unintended bias in text classification. Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society, USA, 67–73.

  • Eden, S., Heiman, T., & Olenik-Shemesh, D. (2013). Teachers’ perceptions, beliefs and concerns about cyberbullying. British Journal of Educational Technology, 44(6), 1036–1052.

  • Gladden, R. M., Vivolo-Kantor, A. M., Hamburger, M. E., & Lumpkin, C. D. (2014). Bullying surveillance among youths: Uniform definitions for public health and recommended data elements, Version 1.0. From https://www.cdc.gov/violenceprevention/pdf/bullying-definitions-final-a.pdf. Accessed 17 Sept 2020.

  • Gregory, J. (2003). Scandinavian approaches to participatory design. International Journal of Engineering Education, 19(1), 62–74.

    Google Scholar 

  • Hakobyan, L., Lumsden, J., & O’Sullivan, D. (2014). Older adults with amd as co-designers of an assistive mobile application. International Journal of Mobile Human Computer Interaction (IJMHCI), 6(1), 54–70.

    Article  Google Scholar 

  • Hee, C. V., Jacobs, G., Emmery, C., Desmet, B., Lefever, E., Verhoeven, B., & Hoste, V. (2018). Automatic detection of cyberbullying in social media text. (H. Suleman, Ed.) PLoS One, 13(10).

  • Hovy, D., & Spruit, S. L. (2016, August). The social impact of natural language processing. Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, Germany, 591–598.

  • Kaggle. (2018). Toxic comment classification challenge. From https://www.kaggle.com/c/jigsaw-toxic-comment-classification-challenge/data. Accessed 11 Feb 2019.

  • Landay, J. A., & Myers, B. A. (2001). Sketching interfaces: toward more human interface design. Computer, 34(3), 56–64.

  • Lehrig, S., Eikerling, H., & Becker, S. (2015). Scalability, elasticity, and efficiency in cloud computing: A systematic literature review of definitions and metrics. Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures, Canada, 83–92.

  • Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., & Stoyanov, V. (2019). Roberta: A robustly optimised bert pretraining approach. arXiv. From http://arxiv.org/abs/1907.11692. Accessed 27 May 2020.

  • Maguire, M., & Bevan, N. (2002). User requirements analysis. Proceedings of IFIP World Computer Congress, Netherlands, 133–148.

  • Makri-Botsari, E., & Karagianni, G. (2014). Cyberbullying in Greek adolescents: The role of parents. Procedia - Social and Behavioral Sciences, 116, 3241–3253.

    Article  Google Scholar 

  • Moreno, M. A., Suthamjariya, N., & Selkie, E. (2018). Stakeholder perceptions of cyberbullying cases: Application of the uniform definition of bullying. Journal of Adolescent Health, 62(4), 444–449.

  • Muller, M. J., & Kuhn, S. (1993). Participatory design. Communications of the ACM, 36(6), 24–28.

    Article  Google Scholar 

  • Ofcom. (2019). Online Nation. https://www.ofcom.org.uk/__data/assets/pdf_file/0025/149146/online-nation-report.pdf

  • Ousidhoum, N., Lin, Z., Zhang, H., Song, Y., & Yeung, D. Y. (2019). Multilingual and multi-aspect hate speech analysis. arXiv preprint arXiv:1908.11049.

  • Patchin, J. W., & Hinduja, S. (2006). Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice, 4(2), 148–169.

    Article  Google Scholar 

  • Porter, J. (2019). Instagram to start warning users before they post ‘potentially offensive’ captions. From https://www.theverge.com/2019/12/16/21024051/instagram-captions-potentially-offensive-ai-moderation-bullying-edit. Accessed 17 Oct 2020

  • Rafiq, R. I., Hosseinmardi, H., Han, R., Lv, Q., & Mishra, S. (2018). Scalable and timely detection of cyberbullying in online social networks. Proceedings of the 33rd Annual ACM Symposium on Applied Computing, France, 1738–1747.

  • Rajadesingan, A., Zafarani, R., & Liu, H. (2015). Sarcasm detection on Twitter: a behavioral modeling approach. Association for Computing Machinery, 97–106.

  • Ruland, C. M., Starren, J., & Vatne, T. M. (2008). Participatory design with children in the development of a support system for patient-centered care in pediatric oncology. Journal of Biomedical Informatics, 41(4), 624–635.

    Article  Google Scholar 

  • Ryan, S. (2021). APIs vs. Webhooks: What’s the difference? From https://www.mparticle.com/blog/apis-vs-webhooks. Accessed 19 Jul 2021.

  • Saleem, S., Khan, N. F., & Zafar, S. (2021). Prevalence of cyberbullying victimisation among Pakistani Youth. Technology in Society, 65, 101577.

  • Silva, Y. N., Hall, D. L., & Rich, C. (2018). BullyBlocker: Toward an interdisciplinary approach to identify cyberbullying. Social Network Analysis and Mining, 8(1), 1–15.

    Article  Google Scholar 

  • Silva, Y. N., Rich, C., & Hall, D. (2016). BullyBlocker: Towards the identification of cyberbullying in social networking sites. Proceedings of 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), USA, 1377–1379.

  • Statt, N. (2020). Twitter tests a warning message that tells users to rethink offensive replies. From https://www.theverge.com/2020/5/5/21248201/twitter-reply-warning-harmful-language-revise-tweet-moderation. Accessed 28 Aug 2020.

  • Sweet, D. (2000). KDE 2.0 Development. Sams.

  • Talukder, S., & Carbunar, B. (2018). Abusniff: Automatic detection and defenses against abusive Facebook friends. Proceedings of the International AAAI Conference on Web and Social Media, USA, 12(1), 385–394.

    Google Scholar 

  • Vishwamitra, N., Zhang, X., Tong, J., Hu, H., Luo, F., Kowalski, R., & Mazer, J. (2017). MCDefender: Toward effective cyberbullying defense in mobile online social networks. Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, USA, 37–42.

  • Walker, M., Takayama, L., & Landay, J. A. (2002). High-fidelity or low-fidelity, paper or computer? Choosing attributes when testing web prototypes. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 46, 661–665.

    Article  Google Scholar 

  • Wang, W., Chen, L., Thirunarayan, K., & Sheth, A. P. (2014). Cursing in English on Twitter. Proceedings of the 17th ACM conference on computer supported cooperative work & social computing, USA, 415–425.

  • Weider, D. Y., Gole, M., Prabhuswamy, N., Prakash, S., & Shankaramurthy, V. G. (2016). An Approach to Design and Analyse the Framework for Preventing Cyberbullying. Proceedings 2016 IEEE International Conference on Services Computing (SCC), USA, 864–867.

  • Yao, M., Chelmis, C., & Zois, D. S. (2019). Cyberbullying ends here: Towards robust detection of cyberbullying in social media. Proceedings of The World Wide Web Conference, USA, 3427–3433.

  • Zampieri, M., Malmasi, S., Nakov, P., Rosenthal, S., Farra, N., & Kumar, R. (2019). Predicting the Type and Target of Offensive Posts in Social Media. Proceeding of NAACL HLT 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 1, 1415–1420.

  • Zois, D. S., Kapodistria, A., Yao, M., & Chelmis, C. (2018). Optimal online cyberbullying detection. Proceedings of 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Canada, 2017–2021.

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Semiu Salawu.

Ethics declarations

Conflict of Interest

The authors declare no competing interests.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Salawu, S., Lumsden, J. & He, Y. A Mobile-Based System for Preventing Online Abuse and Cyberbullying. Int Journal of Bullying Prevention 4, 66–88 (2022). https://doi.org/10.1007/s42380-021-00115-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42380-021-00115-5

Keywords

Navigation