Advertisement

“Think Before You Post”: A Cognitive Psychological Approach for Limiting Bullying in Social Media

  • Sreeshma Mohan
  • Indu Valsaladevi
  • Sabu M. ThampiEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1122)

Abstract

Online social media bullying has become extremely detrimental in recent times with the proliferation of smartphones and the wide popularity of social networks among people. The number of people being victimized as a result of cyberbullying is increasing day-by-day and the researchers are continuously thriving to develop new techniques to detect online social media bullying in order to curb this serious social menace. Current research in this domain focuses on the detection of cyberbullying and only a few works have addressed the problem on how to prevent cyberbullying before it occurs. Considering this aspect, our work mainly concentrates on the prevention of online bullying utilizing the concepts of Cognitive psychology and Intent analysis. We propose a cognitive psychological approach inspired by the Theory of Planned Behavior to understand the psychological factors in a person prompting him/her to perform online bullying and prevent him/her from posting bully comments. Initially, we use sentiment analysis to determine whether the content posted by a user includes bully comments and subsequently Intent analysis is carried out to identify the intention hidden in the text posted by the user and warns him/her about the future consequences if that message contains any negative intention to harm others. The classification of the text data into bully and non-bully comments is employed using different machine learning algorithms of which Naïve Bayes yielded the best result. Later on, cognitive psychology is applied to understand the intention of a user posting or sharing a bully text and thereby diverting his attempt to perform online bullying.

Keywords

Cognitive psychology Intent analysis Theory of Planned Behavior Machine Learning 

References

  1. 1.
    Poletti, C., Michieli, M.: Smart cities, social media platforms and security: online content regulation as a site of controversy and conflict. City Territory Archit. 5(1), 20 (2018)CrossRefGoogle Scholar
  2. 2.
    Kumar, A., Sachdeva, N.: Cyberbullying detection on social multimedia using soft computing techniques: a meta-analysis. Multimed. Tools Appl. 78, 23973–24010 (2019)CrossRefGoogle Scholar
  3. 3.
    Espelage, D.L., Rao, M.A., Craven, R.G.: Theories of cyberbullying. In: Principles Cyberbullying Research: Definitions, Measures, and Methodology, pp. 49–67 (2012)Google Scholar
  4. 4.
    National Academies of Sciences, Engineering, and Medicine: Preventing bullying through science, policy, and practice. National Academies Press, 14 October 2016Google Scholar
  5. 5.
    Ang, R.P., Goh, D.H.: Cyberbullying among adolescents: the role of affective and cognitive empathy, and gender. Child Psychiatry Hum. Dev. 41(4), 387–397 (2010)CrossRefGoogle Scholar
  6. 6.
    Rybnicek, M., Poisel, R., Tjoa, S.: Facebook watchdog: a research agenda for detecting online grooming and bullying activities. In: IEEE International Conference on Systems, Man, and Cybernetics. IEEE (2013)Google Scholar
  7. 7.
    Dinakar, K., Reichart, R., Lieberman, H.: Modeling the detection of textual cyberbullying. In: Fifth International AAAI Conference on Weblogs and Social Media (2011)Google Scholar
  8. 8.
    Wicker, A.W.: Attitudes versus actions: the relationship of verbal and üvert behavioral responses to attitude objects. J. Soc. Issues 25, 41–78 (1969)CrossRefGoogle Scholar
  9. 9.
    Na, H., Dancy, B.L., Park, C.: College student engaging in cyberbullying victimization: cognitive appraisals, coping strategies, and psychological adjustments. Arch. Psychiatr. Nurs. 29(3), 155–161 (2015)CrossRefGoogle Scholar
  10. 10.
    HaIe, J.L., Householder, B.J., Greene, K.L.: The theory of reasoned action. In: Dillard, J.P., Shen, L. (eds.) The Sage Handbook of Persuasion: Developments in Theory and Practice, 2nd edn, pp. 259–286. Thousand Oaks, SAGE (2002)Google Scholar
  11. 11.
    Fishbein, M., Ajzen, I.: Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Boston (1975)Google Scholar
  12. 12.
    Völlink, T., et al.: An introduction in cyberbullying research. In: Cyberbullying: From Theory to Intervention. Routledge, New York (2016)CrossRefGoogle Scholar
  13. 13.
    Ybarra, M.L., Mitchell, K.J.: Youth engaging in online harassment: Associations with caregiver-child relationships, internet use, and personal characteristics. J. Adolesc. 27(3), 319–336 (2004)CrossRefGoogle Scholar
  14. 14.
    Hasebrink, U.: Children’s changing online experiences in a longitudinal perspective (2014)Google Scholar
  15. 15.
    Livingstone, S., et al.: In their own words: what bothers children online? Eur. J. Commun. 29(3), 271–288 (2014)CrossRefGoogle Scholar
  16. 16.
    Bryce, J., Fraser, J.: The role of disclosure of personal information in the evaluation of risk and trust in young peoples’ online interactions. Comput. Hum. Behav. 30, 299–306 (2014)CrossRefGoogle Scholar
  17. 17.
    Valkenburg, P.M., Peter, J.: Online communication among adolescents: an integrated model of its attraction, opportunities, and risks. J. Adolesc. Health 48(2), 121–127 (2011)CrossRefGoogle Scholar
  18. 18.
    Van Hee, C., et al.: Automatic detection and prevention of cyberbullying. In: International Conference on Human and Social Analytics (HUSO 2015). IARIA (2015)Google Scholar
  19. 19.
    Jafarkarimi, H., et al.: Cyberbullying among students: an application of theory of planned behavior. In: International Conference on Research and Innovation in Information Systems (ICRIIS) (2017)Google Scholar
  20. 20.
    Lee, Y.C., Wu, W.-L.: Factors in cyber bullying: the attitude-social influence-efficacy model. Anales De Psicología Ann. Psychol. 34(2), 324–331 (2018)CrossRefGoogle Scholar
  21. 21.
    Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Processes 50(2), 179–211 (1991)CrossRefGoogle Scholar
  22. 22.
    Fischer, K.W.: A theory of cognitive development: the control and construction of hierarchies of skills. Psychol. Rev. 87(6), 477 (1980)CrossRefGoogle Scholar
  23. 23.
    Davidson, T., et al.: Automated hate speech detection and the problem of offensive language. In: Eleventh International AAAI Conference on Web and Social Media (2017)Google Scholar
  24. 24.
    Zeitel-Bank, N., Tat, U.: Social media and its effects on individuals and social systems. J. Manag. Knowl. Learn., 1183–1190 (2014, online) Google Scholar
  25. 25.
    Swearer, S.M., et al.: Reducing bullying: application of social cognitive theory. Theory Pract. 53(4), 271–277 (2014)CrossRefGoogle Scholar
  26. 26.
    Prabhu, T.: Rethink: an effective way to prevent cyber bullying (2014)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Sreeshma Mohan
    • 1
  • Indu Valsaladevi
    • 1
    • 2
  • Sabu M. Thampi
    • 1
    Email author
  1. 1.Center for Research and Innovation in Cyber Threat Resilience (CRICTR)Indian Institute of Information Technology and Management-Kerala (IIITM-K)ThiruvananthapuramIndia
  2. 2.University of KeralaThiruvananthapuramIndia

Personalised recommendations