SONG Yu-qi1,2, GAO Min1,2, LI Jun-dong3, RONG Wen-ge4, XIONG Qing-yu1,2
1. Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing 400044, China;
2. School of Big Data&Software Engineering, Chongqing University, Chongqing 400044, China;
3. Department of Electrical and Computer Engineering, University of Virginia, VA 22904, US;
4. School of Computer Science and Engineering, Beihang University, Beijing 100191, China
Abstract:Cyberbullying has attracted the increasing attention among researchers.Social and computer science researchers have explored cyberbullying from various perspectives.This paper surveys the existing work on cyberbullying detection in social and computer science domains.It first introduces the basic research problems and characteristics of cyberbullying;second,it discusses a variety of machine learning algorithms for cyberbullying detection,including supervised learning,weakly supervised learning,rule-based and deep learning algorithms;and third,it summarizes 12 existing datasets used in cyberbullying detection and the popular metrics for detection performance.Finally,the paper analyzes the potential research from several aspects,such as cyberbullying detection approaches based on heterogeneous information network,auxiliary information fusion,and psychological characteristics.
[1] Semiu Salawu,Yulan He,Joanna Lumsden.Approaches to automated detection of cyberbullying:A survey[J].IEEE Transactions on Affective Computing,2017,99(10):1-10.
[2] Cheng L,Li J,Silva Y,et al.PI-bully:personalized cyberbullying detection with peer influence[A].The International Joint Conference on Artificial Intelligence[C].Palo Alto:AAAI,2019.5829-5835.
[3] Dani H,Li J,Liu H.Sentiment informed cyberbullying detection in social media[A].The European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases[C].Cham:Springer,2017.52-67.
[4] Olweus D.Aggressive Behavior‖Bullying at School[M].Boston,MA:Springer,1994.97-130.
[5] Tokunaga R S.Following you home from school:a critical review and synthesis of research on cyberbullying victimization[J].Computersin Human Behavior,2010,26(3):277-287.
[6] 杨坤玉.青少年网络欺凌行为介入模式的GAM探索[D].兰州:兰州大学哲学,2017.
[7] Wong R Y M,Cheung C M K,Xiao B.Does gender matter in cyberbullying perpetration?An empirical investigation[J].Computers in Human Behavior,2018,79(2):247-257.
[8] Schneider S K,O'donnell L,Stueve A,et al.Cyberbullying,school bullying,and psychological distress:a regional census of high school students[J].American Journal of Public Health,2012,102(1):171-177.
[9] Kowalski R M,Limber S P.Electronic bullying among middle school students[J].Journal of Adolescent Health,2007,41(6):S22-S30.
[10] Slonje R,Smith P K.Cyberbullying:another main type of bullying?[J].Scandinavian Journal of Psychology,2008,49(2):147-154.
[11] Brewer G,Kerslake J.Cyberbullying,self-esteem,empathy and loneliness[J].Computers in Human Behavior,2015,48(1):255-260.
[12] 刘琳.中学生传统欺凌、网络欺凌及其与自尊的关系[D].沈阳:沈阳师范大学,2014.
[13] 苑广哲.大学生大五人格和网络欺凌行为的关系:自我控制的中介作用[D].南京:南京师范大学,2017.
[14] Goodboy A K,Martin M M.The personality profile of a cyberbully:examining the dark triad[J].Computers in Human Behavior,2015,49(4):1-4.
[15] 杨继平,王兴超,高玲.道德推脱对大学生网络偏差行为的影响:道德认同的调节作用[J].心理发展与教育,2015,31(3):311-318.
[16] Winterich K P,Aquino K,Mittal V,et al.When moral identity symbolization motivates prosocial behavior:the role of recognition and moral identity internalization[J].Journal of Applied Psychology,2013,98(5):759.
[17] Zhou Z,Tang H,Tian Y,et al.Cyberbullying and its risk factors among Chinese high school students[J].School Psychology International,2013,34(6):630-647.
[18] Yang X,Wang Z,Chen H,et al.Cyberbullying perpetration among Chinese adolescents:the role of interparental conflict,moral disengagement,and moral identity[J].Children and Youth Services Review,2018,86:256-263.
[19] Zhong H,Li H,Squicciarini A C,et al.Content-driven detection of cyberbullying on theInstagram social network[A].The International Joint Conference on Artificial Intelligence[C].Palo Alto:AAAI Press,2016.3952-3958.
[20] Haidar B,Chamoun M,Yamout F.Cyberbullying detection:a survey on multilingual techniques[A].The European Modelling Symposium on Computer Modelling and Simulation[C].New York:IEEE,2016.165-171.
[21] Dinakar K,Reichart R,Lieberman H.Modeling the detection of textual cyberbullying[A].The International Conference on Weblogs and Social Media[C].CA:AI Access Foundation,2011.11-17.
[22] Pérez P J C,Valdez C J L,Ortiz M G C,et al.MISAAC:Instant messaging tool for cyberbullying detection[A].The International Conference on Artificial Intelligence[C].Las Vegas:CSREA Press,2012.1-4.
[23] Kontostathis A,Reynolds K,Garron A,et al.Detecting cyberbullying:query terms and techniques[A].The Annual Web Science Conference[C].New York:ACM,2013.195-204.
[24] Bretschneider U,Wöhner T,Peters R.Detecting online harassment in social networks[A].The International Conference on Information Systems[C].Auckland:AIS,2014.1-14.
[25] Dadvar M,Trieschnigg D,de Jong F.Experts and machines against bullies:a hybrid approach to detect cyberbullies[A].The Canadian Conference on Artificial Intelligence[C].Cham:Springer,2014.275-281.
[26] Dadvar M,Trieschnigg R B,de Jong F M G.Expert knowledge for automatic detection of bullies in social networks[A].The Benelux Conference on Artificial Intelligence[C].Delft:University of Groningen Press,2013.57-64.
[27] Wulczyn E,Thain N,Dixon L.Ex machina:Personal attacks seen at scale[A].The International World Wide Web Conference[C].New York:ACM,2017.1391-1399.
[28] Zhao R,Mao K.Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder[J].IEEE Transactions on Affective Computing,2016,8(3):328-339.
[29] Yin D,Xue Z,Hong L,et al.Detection of harassment on web 2.0[A].The Content Analysis in the WEB[C].New York:ACM,2009.1-7.
[30] Chavan V S,Shylaja S S.Machine learning approach for detection of cyber-aggressive comments by peers on social media network[A].The International Conference on Advances in Computing,Communications and Informatics[C].DC:IEEE,2015.2354-2358.
[31] Sood S O,Antin J,Churchill E.Using crowdsourcing to improve profanity detection[A].The AAAI Spring Symposium[C].CA:AI Access Foundation,2012.69-74.
[32] Dadvar M,Jong F M G,Ordelman R,et al.Improved cyberbullying detection using gender information[A].The Dutch-Belgian Information Retrieval Workshop[C].Ghent:Ghent University Press,2012.1-3.
[33] Al-garadi M A,Varathan K D,Ravana S D.Cybercrime detection in online communications:the experimental case of cyberbullying detection in the twitter network[J].Computers in Human Behavior,2016,63(C):433-443.
[34] Zhao R,Zhou A,Mao K.Automatic detection of cyberbullying on social networks based on bullying features[A].The International Conference on Distributed Computing and Networking[C].New York:ACM,2016.43-48.
[35] Chelmis C,Zois D S,Yao M.Mining patterns of cyberbullying on twitter[A].The International Conference on Data Mining Workshops[C].New York:IEEE,2017.126-133.
[36] Raisi E,Huang B.Cyberbullying detection with weakly supervised machine learning[A].The International Conference on Advances in Social Networks Analysis and Mining[C].New York:ACM,2017.409-416.
[37] Raisi E,Huang B.Weakly supervised cyberbullying detection with participant-vocabulary consistency[J].Social Network Analysis and Mining,2018,8(1):38-53.
[38] Serra S M,Venter H S.Mobile cyber-bullying:a proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness[A].The Conference on Information Security for South Africa[C].IEEE Computer Society,2011.1-5.
[39] Founta A M,Chatzakou D,Kourtellis N,et al.A unified deep learning architecture for abuse detection[A].The Conference on Web Science[C].New York:ACM,2019.105-114.
[40] Pitsilis G K,Ramampiaro H,Langseth H.Detecting Offensive Language in Tweets Using Deep Learning[DB/OL].https://arxiv.org/abs/1801.04433,2018-08-16/2019-11-28.
[41] Ptaszynski M,Eronen J K K,Masui F.Learning deep on cyberbullying is always better than brute force[A].The Linguistic and Cognitive Approaches to Dialog Agents Workshop[C].Aachen:CEUR-WS,2017.19-25.
[42] Agrawal S,Awekar A.Deep learning for detecting cyberbullying across multiple social media platforms[A].The European Conference on Information Retrieval[C].Cham:Springer,2018.141-153.
[43] Bosse T,Stam S.A normative agent system to prevent cyberbullying[A].The International Conference on Intelligent Agent Technology[C].DC:IEEE,2011.425-430.
[44] Reynolds K,Kontostathis A,Edwards L.Using machine learning to detect cyberbullying[A].The 10th International Conference on Machine Learning and Applications[C].New York:IEEE,2011.241-244.
[45] Bayzick J,Kontostathis A,Edwards L.Detecting the presence of cyberbullying using computer software[A].Web Science Conference[C].New York:ACM,2011.93-96.
[46] Hosseinmardi H,Ghasemianlangroodi A,Han R,et al.Towards understanding cyberbullying behavior in a semi-anonymous social network[A].The International Conference on Advances in Social Networks Analysis and Mining[C].DC:IEEE,2014.244-252.
[47] Hosseinmardi H,Mattson S A,Rafiq R I,et al.Analyzing labeled cyberbullying incidents on the instagram social network[A].The International Conference on Social Informatics[C].Cham:Springer,2015.49-66.
[48] Rafiq R I,Hosseinmardi H,Han R,et al.Careful what you share in six seconds:Detecting cyberbullying instances in vine[A].The International Conference on Advances in Social Networks Analysis and Mining[C].New York:ACM,2015.617-622.
[49] Sui J.Understanding andFighting Bullying with Machine Learning[D].USA WI:The Univ of Wisconsin-Madison,2015.
[50] Bretschneider U,Peters R.Detecting cyberbullying in online communities[A].The European Conference on Information Systems[C].Istanbul:AIS,2016.61-74.
[51] Chatzakou D,Kourtellis N,Blackburn J,et al.Mean birds:Detecting aggression and bullying on Twitter[A].The Web Science Conference[C].New York:ACM,2017.13-22.
[52] Rezvan M,Shekarpour S,Balasuriya L,et al.A quality type-aware annotated corpus and lexicon for harassment research[A].The Conference on Web Science[C].New York:ACM,2018.33-36.
[53] Founta A M,Djouvas C,Chatzakou D,et al.Large scale crowdsourcing and characterization of twitter abusive behavior[A].The AAAI Conference on Web and Social Media[C].Palo Alto:AAAI,2018.491-500.
[54] Cheng L,Li J,Silva Y N,et al.Xbully:cyberbullying detection within a multi-modal context[A].The International Conference on Web Search and Data Mining[C].New York:ACM,2019.339-347.