skip to main content
research-article

Using computer technology to address the problem of cyberbullying

Authors Info & Claims
Published:01 July 2014Publication History
Skip Abstract Section

Abstract

The issue of cyberbullying is a social concern that has arisen due to the prevalent use of computer technology today. In this paper, we present a multi-faceted solution to mitigate the effects of cyberbullying, one that uses computer technology in order to combat the problem. We propose to provide assistance for various groups affected by cyberbullying (the bullied and the bully, both). Our solution was developed through a series of group projects and includes i) technology to detect the occurrence of cyberbullying ii) technology to enable reporting of cyberbullying iii) proposals to integrate third-party assistance when cyberbullying is detected iv) facilities for those with authority to manage online social networks or to take actions against detected bullies. In all, we demonstrate how this important social problem which arises due to computer technology can also leverage computer technology in order to take steps to better cope with the undesirable effects that have arisen.

References

  1. About page: Stackoverflow (2014). URL http://stackoverflow.com/aboutGoogle ScholarGoogle Scholar
  2. Frequently asked questions: Reddit (2014). URL http://www.reddit.com/wiki/faqGoogle ScholarGoogle Scholar
  3. What is cyberbyulling (2014). URL http://www.stopbullying.gov/cyberbullying/what-is-it/Google ScholarGoogle Scholar
  4. Berstein, M.: Prevention, not tougher punishment key to ending cyber bullying. http://www.unicef.ca/en/blog/prevention-not-tougher-punishment-key-to-ending-cyber-bullying (2013)Google ScholarGoogle Scholar
  5. Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artificial Intelligence Review 29(1), 63--92 (2008). DOI 10.1007/s10462-009-9109-6. URL http://dx.doi.org/10.1007/s10462-009-9109-6 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Brown, J.: Amanda todd: 'cyberbullying' doesn't begin to describe it'. http://www2.macleans.ca/2012/10/16/amanda-todd-cyberbullying-doesnt-begin-to-describe-it/ (2012)Google ScholarGoogle Scholar
  7. Dadvar, M., de Jong, F.: Cyberbullying detection: a step toward a safer internet yard. In: Proceedings of the 21st international conference companion on World Wide Web, pp. 121--126. ACM (2012) Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dinakar, K., Reichart, R., Lieberman, H.: Modeling the detection of textual cyberbullying. In: The Social Mobile Web (2011)Google ScholarGoogle Scholar
  9. Garg, V., Patil, S., Kapadia, A., Camp, L. J.: Peer-produced privacy protection. In: Technology and Society (ISTAS), 2013 IEEE International Symposium on, pp. 147--154. IEEE (2013)Google ScholarGoogle ScholarCross RefCross Ref
  10. Hamilton, G.: Amanda todd and the greatly exaggerated cyber-bullying plague: Web harassment not on the rise, researcher says. http://news.nationalpost.com/2012/10/26/amanda-todd-and-the-greatly-exaggerated-cyber-bullying-plague-web-harassment-isnt-rising-researcher-says/ (2012)Google ScholarGoogle Scholar
  11. Kerr, R., Cohen, R.: Detecting and identifying coalitions. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 3, pp. 1363--1364. International Foundation for Autonomous Agents and Multiagent Systems (2012) Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. MacDonald, M.: Nova scotia cyberbullying unit seeks personal data from facebook, google. http://www.theglobeandmail.com/news/national/nova-scotia-cyberbullying-unit-seeks-personal-data-from-facebook-google/article18955261/ (2014)Google ScholarGoogle Scholar
  13. Mas, S.: Mps to debate ndp anti-bullying motion. http://www.cbc.ca/news/politics/mps-to-debate-ndp-anti-bullying-motion-1.1127561 (2014)Google ScholarGoogle Scholar
  14. Moore, M. J., Nakano, T., Suda, T., Enomoto, A.: Tools in cyberbullying. Social Network Engineering for Secure Web Data and Services p. 67 (2013)Google ScholarGoogle Scholar
  15. Pang, B., Lee, L.: Opinion mining and sentiment analysis. Foundations and Trends in Information Retrieval 2(1--2), 1--135 (2008) Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Pedell, T.: Cyber bullying on social media is at 'a breaking point', says ndp mp championing private member's bill. http://news.nationalpost.com/2012/10/15/cyberbullying-on-social-media-is-at-a-breaking-point-says-ndp-mp-championing-private-members-bill/ {last accessed October 15, 2012} (2012)Google ScholarGoogle Scholar
  17. Phillips, S.: Copying with cyberbullying: The use of technology to terrify (2014). URL http://www.pbs.org/thisemotionallife/blogs/coping-cyberbullying-use-technology-terrifyGoogle ScholarGoogle Scholar
  18. Rosen, J.: The right to be forgotten. Stanford law review online 64, 88 (2012)Google ScholarGoogle Scholar
  19. Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T., Helenius, H.: Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study. Archives of general psychiatry 67(7), 720--728 (2010)Google ScholarGoogle Scholar
  20. Spertus, E.: Smokey: Automatic recognition of hostile messages. In: AAAI/IAAI, pp. 1058--1065 (1997) Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Viecco, C., Tsow, A., Camp, L. J.: A privacy-aware architecture for a web rating system. IBM Journal of Research and Development 53(2), 7--1 (2009) Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Yin, D., Xue, Z., Hong, L., Davison, B. D., Kontostathis, A., Edwards, L.: Detection of harassment on web 2.0. Proceedings of the Content Analysis in the WEB 2 (2009)Google ScholarGoogle Scholar
  23. Zhang, L., Zhu, J., Yao, T.: An evaluation of statistical spam filtering techniques. ACM Transactions on Asian Language Information Processing, 3(4), 243--269 (2004) Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Using computer technology to address the problem of cyberbullying

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader