Advertisement

Sentiment Analysis for Effective Detection of Cyber Bullying

  • Vinita Nahar
  • Sayan Unankard
  • Xue Li
  • Chaoyi Pang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7235)

Abstract

The rapid growth of social networking and gaming sites is associated with an increase of online bullying activities which, in the worst scenario, result in suicidal attempts by the victims. In this paper, we propose an effective technique to detect and rank the most influential persons (predators and victims). It simplifies the network communication problem through a proposed detection graph model. The experimental results indicate that this technique is highly accurate.

Keywords

Social Network Cyber Bullying Text Mining 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    ncpc.org, http://www.ncpc.org/cyberbullying (accessed September 15, 2011)
  2. 2.
    Easley, D., Kleinberg, J.: Link analysis using hubs and authorities. In: Networks, Crowds, and Markets: Reasoning about a Highly Connected World, pp. 399–405Google Scholar
  3. 3.
    Hofmann, T.: Unsupervised learning by probabilistic latent semantic analysis. Machine Learning 42, 177–196 (2001)zbMATHCrossRefGoogle Scholar
  4. 4.
    Liu, Y., Huang, X., Aijun, A., Yu, X.: Arsa: a sentiment-aware model for predicting sales performance using blogs. In: Research and Development in Information Retrieval, SIGIR, pp. 607–614 (July 2007)Google Scholar
  5. 5.
    McGhee, I., Bayzick, J., Kontostathis, A., Edwards, L., McBride, A., Jakubowski, E.: Learning to Identify Internet Sexual Predation. International Journal on Electronic Commerce 15(3), 103–122 (2011)CrossRefGoogle Scholar
  6. 6.
    Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: Bringing order to the web. Technical Report 1999-66, Stanford InfoLab (November 1999)Google Scholar
  7. 7.
    Pang, B., Lee, L.: A sentimental education: Sentiment analysis using subjectivity summarization based on minimum cuts. In: Proc of the ACL, pp. 271–278 (2004)Google Scholar
  8. 8.
    Ptaszynski, M., Dybala, P., Matsuba, T., Masui, F., Rzepka, R., Araki, K.: Machine Learning and Affect Analysis Against Cyber-Bullying. In: Proceedings of the Thirty Sixth Annual Convention of the Society for the Study of Artificial Intelligence and Simulation of Behaviour (AISB 2010), March 29- April 1, pp. 7–16 (2010)Google Scholar
  9. 9.
    Yin, D., Xue, Z., Hong, L., Davisoni, B.D., Kontostathis, A., Edwards, L.: Detection of harassment on web 2.0. In: Content Analysis in the WEB 2.0 (CAW2.0) Workshop at WWW 2009 (April 2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Vinita Nahar
    • 1
  • Sayan Unankard
    • 1
  • Xue Li
    • 1
  • Chaoyi Pang
    • 2
  1. 1.School of Information Technology and Electrical EngineeringThe University of QueenslandAustralia
  2. 2.CSIROThe Australian E-Health Research CenterAustralia

Personalised recommendations