Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (5)

Search Parameters:
Keywords = detection of cyberbullying’s source

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 2219 KB  
Article
Unraveling Cyberbullying Dynamis: A Computational Framework Empowered by Artificial Intelligence
by Liliana Ibeth Barbosa-Santillán, Bertha Patricia Guzman-Velazquez, Ma. Teresa Orozco-Aguilera and Leticia Flores-Pulido
Information 2025, 16(2), 80; https://doi.org/10.3390/info16020080 - 22 Jan 2025
Viewed by 1036
Abstract
Cyberbullying, which manifests in various forms, is a growing challenge on social media, mainly when it involves threats of violence through images, especially those featuring weapons. This study introduces a computational framework to identify such content using convolutional neural networks of weapon-related images. [...] Read more.
Cyberbullying, which manifests in various forms, is a growing challenge on social media, mainly when it involves threats of violence through images, especially those featuring weapons. This study introduces a computational framework to identify such content using convolutional neural networks of weapon-related images. By integrating artificial intelligence techniques with image analysis, our model detects visual patterns associated with violent threats, creating safer digital environments. The development of this work involved analyzing images depicting scenes with weapons carried by children or adolescents. Images were sourced from social media and spatial repositories. The statistics were processed through a 225-layer convolutional neural network, achieving an 86% accuracy rate in detecting weapons in images featuring children, adolescents, and young adults. The classifier method reached an accuracy of 17.86% with training over only 25 epochs and a recall of 14.2%. Weapon detection is a complex task due to the variability in object exposures and differences in weapon shapes, sizes, orientations, colors, and image capture methods. Segmentation issues and the presence of background objects or people further compound this complexity. Our study demonstrates that convolutional neural networks can effectively detect weapons in images, making them a valuable tool in addressing cyberbullying involving weapon imagery. Detecting such content contributes to creating safer digital environments for young people. Full article
Show Figures

Figure 1

19 pages, 5691 KB  
Article
Development of Technologies for the Detection of (Cyber)Bullying Actions: The BullyBuster Project
by Giulia Orrù, Antonio Galli, Vincenzo Gattulli, Michela Gravina, Marco Micheletto, Stefano Marrone, Wanda Nocerino, Angela Procaccino, Grazia Terrone, Donatella Curtotti, Donato Impedovo, Gian Luca Marcialis and Carlo Sansone
Information 2023, 14(8), 430; https://doi.org/10.3390/info14080430 - 1 Aug 2023
Cited by 9 | Viewed by 5041
Abstract
Bullying and cyberbullying are harmful social phenomena that involve the intentional, repeated use of power to intimidate or harm others. The ramifications of these actions are felt not just at the individual level but also pervasively throughout society, necessitating immediate attention and practical [...] Read more.
Bullying and cyberbullying are harmful social phenomena that involve the intentional, repeated use of power to intimidate or harm others. The ramifications of these actions are felt not just at the individual level but also pervasively throughout society, necessitating immediate attention and practical solutions. The BullyBuster project pioneers a multi-disciplinary approach, integrating artificial intelligence (AI) techniques with psychological models to comprehensively understand and combat these issues. In particular, employing AI in the project allows the automatic identification of potentially harmful content by analyzing linguistic patterns and behaviors in various data sources, including photos and videos. This timely detection enables alerts to relevant authorities or moderators, allowing for rapid interventions and potential harm mitigation. This paper, a culmination of previous research and advancements, details the potential for significantly enhancing cyberbullying detection and prevention by focusing on the system’s design and the novel application of AI classifiers within an integrated framework. Our primary aim is to evaluate the feasibility and applicability of such a framework in a real-world application context. The proposed approach is shown to tackle the pervasive issue of cyberbullying effectively. Full article
(This article belongs to the Special Issue Computer Vision, Pattern Recognition and Machine Learning in Italy)
Show Figures

Figure 1

13 pages, 1238 KB  
Article
Human Activity Recognition for the Identification of Bullying and Cyberbullying Using Smartphone Sensors
by Vincenzo Gattulli, Donato Impedovo, Giuseppe Pirlo and Lucia Sarcinella
Electronics 2023, 12(2), 261; https://doi.org/10.3390/electronics12020261 - 4 Jan 2023
Cited by 16 | Viewed by 2831
Abstract
The smartphone is an excellent source of data; it is possible to extrapolate smartphone sensor values and, through Machine Learning approaches, perform anomaly detection analysis characterized by human behavior. This work exploits Human Activity Recognition (HAR) models and techniques to identify human activity [...] Read more.
The smartphone is an excellent source of data; it is possible to extrapolate smartphone sensor values and, through Machine Learning approaches, perform anomaly detection analysis characterized by human behavior. This work exploits Human Activity Recognition (HAR) models and techniques to identify human activity performed while filling out a questionnaire via a smartphone application, which aims to classify users as Bullying, Cyberbullying, Victims of Bullying, and Victims of Cyberbullying. The purpose of the work is to discuss a new smartphone methodology that combines the final label elicited from the cyberbullying/bullying questionnaire (Bully, Cyberbully, Bullying Victim, and Cyberbullying Victim) and the human activity performed (Human Activity Recognition) while the individual fills out the questionnaire. The paper starts with a state-of-the-art analysis of HAR to arrive at the design of a model that could recognize everyday life actions and discriminate them from actions resulting from alleged bullying activities. Five activities were considered for recognition: Walking, Jumping, Sitting, Running and Falling. The best HAR activity identification model then is applied to the Dataset derived from the “Smartphone Questionnaire Application” experiment to perform the analysis previously described. Full article
Show Figures

Figure 1

15 pages, 1286 KB  
Article
An Approach to Ranking the Sources of Information Dissemination in Social Networks
by Lidia Vitkova, Igor Kotenko and Andrey Chechulin
Information 2021, 12(10), 416; https://doi.org/10.3390/info12100416 - 11 Oct 2021
Cited by 3 | Viewed by 2781
Abstract
The problem of countering the spread of destructive content in social networks is currently relevant for most countries of the world. Basically, automatic monitoring systems are used to detect the sources of the spread of malicious information, and automated systems, operators, and counteraction [...] Read more.
The problem of countering the spread of destructive content in social networks is currently relevant for most countries of the world. Basically, automatic monitoring systems are used to detect the sources of the spread of malicious information, and automated systems, operators, and counteraction scenarios are used to counteract it. The paper suggests an approach to ranking the sources of the distribution of messages with destructive content. In the process of ranking objects by priority, the number of messages created by the source and the integral indicator of the involvement of its audience are considered. The approach realizes the identification of the most popular and active sources of dissemination of destructive content. The approach does not require the analysis of graphs of relationships and provides an increase in the efficiency of the operator. The proposed solution is applicable both to brand reputation monitoring systems and for countering cyberbullying and the dissemination of destructive information in social networks. Full article
(This article belongs to the Special Issue Information Spreading on Networks)
Show Figures

Figure 1

21 pages, 33665 KB  
Review
A Topic-Based Bibliometric Review of Computers in Human Behavior: Contributors, Collaborations, and Research Topics
by Xieling Chen, Di Zou, Haoran Xie and Gary Cheng
Sustainability 2021, 13(9), 4859; https://doi.org/10.3390/su13094859 - 26 Apr 2021
Cited by 5 | Viewed by 9498
Abstract
Computers in Human Behavior (CHB) is a well-established source with a wide range of audiences in the field of human interactions with computers and has been one of the most widely acknowledged and leading venues with significant scientific impact for more [...] Read more.
Computers in Human Behavior (CHB) is a well-established source with a wide range of audiences in the field of human interactions with computers and has been one of the most widely acknowledged and leading venues with significant scientific impact for more than 35 years. This review provides an overview of the status, trends, and particularly the thematic structure of the CHB by adopting bibliometrics and structural topic modeling on 5957 studies. Specifically, we analyzed the trend of publications, identified major institutions and countries/regions, detected scientific collaboration patterns, and uncovered important topics. Significant findings were presented. For example, the contribution of the USA and Open University of Netherlands was highlighted. Important research topics such as e-commerce, social interactions and behaviors, public opinion and social media, cyberbullying, online sexual issues, and game andgamification were identified. This review contributes to the CHB community by justifying the interest in human behavior issues concerning computer use and identifying future research lines on this topic. Full article
Show Figures

Figure 1

Back to TopTop