A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cyber Bullying and Machine Learning: A Survey
2020
Zenodo
However, there is a requirement for intelligent systems to identify possible risks automatically, given how the Web is overloaded with massive information. ...
This paper surveys several attempts to use machine learning technology to detect instances of cyber bullying and summarizes their results. ...
For the feature extraction stage, two categories of features were leveraged: lexical and behavioral features [15] . ...
doi:10.5281/zenodo.4249340
fatcat:rty6mejoqbdghbnf5secickfhq
Exploring high-level features for detecting cyberpedophilia
2014
Computer Speech and Language
The SVM classification results show that the NPS data and the pedophiles' conversations can be accurately discriminated with character n-grams, while in the more complicated case of cybersex logs high-level ...
features significantly outperform the low-level ones and achieve a 97% accuracy. ...
Her research was partially supported by Google Research Award. ...
doi:10.1016/j.csl.2013.04.007
fatcat:mwqen452pvd3raroqb5xqw4kwi
Classification of Online Grooming on Chat Logs Using Two Term Weighting Schemes
2019
International Journal of Innovative Computing
The performance of these techniques were examined via datasets, and the accuracy of their result was measured by Support Vector Machine (SVM). ...
Cyber groomers are one of cyber predators who prey on children or minors to satisfy their sexual desire. ...
The algorithms used are TF.IDF.ICS F and Naïve Bayes algorithm, and SVM is used to identify and classify feature vectors. ...
doi:10.11113/ijic.v9n2.239
fatcat:ix266w7lx5gkvogxmakkb4aic4
Detecting Offensive Language in Social Media to Protect Adolescent Online Safety
2012
2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing
To bridge this gap, we propose the Lexical Syntactic Feature (LSF) architecture to detect offensive content and identify potential offensive users in social media. ...
We distinguish the contribution of pejoratives/profanities and obscenities in determining offensive content, and introduce hand-authoring syntactic rules in identifying name-calling harassments. ...
Part of this research was supported by the U.S. National Science Foundation under grant CAREER 0643906 and CNS-1018302. ...
doi:10.1109/socialcom-passat.2012.55
dblp:conf/socialcom/ChenZZX12
fatcat:pb4343kzofca7ceidw2lwbroci
A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement
2015
ACM Computing Surveys
Such technologies must be well-designed and rigorously grounded, yet no survey of the online data-mining literature exists which examines their techniques, applications and rigour. ...
As more and more crime takes on a digital aspect, law enforcement bodies must tackle an online environment generating huge volumes of data. ...
The authors identify from related work that several sentiment features are linked to sexual predation, and construct a feature set based on sentiment markers. ...
doi:10.1145/2811403
fatcat:qpvfebejpfgp5bh3cgykaoumze
Effects of Feature Extraction and Classification Methods on Cyberbully Detection
2016
Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi
To perform the experiments FormSpring.me dataset is used and the effects of preprocessing methods; several classifiers like C4.5, Naïve Bayes, kNN, and SVM; and information gain and chi square feature ...
In this study we show the effects of feature extraction, feature selection, and classification methods that are used, on the performance of automatic detection of cyberbullying. ...
Acknowledgment This study was supported by TUBITAK 2211-C Scholarship and Scientific Research Project Unit of Çukurova University under Grant Number: MMF2013D10. ...
doi:10.19113/sdufbed.20964
fatcat:6xugyepsxvcupczdg7b74wh7lu
A Multilingual System for Cyberbullying Detection: Arabic Content Detection using Machine Learning
2017
Advances in Science, Technology and Engineering Systems
Previously, researches dealt with the psychological effects of cyberbullying on the victim and the predator. ...
With the abundance of Internet and electronic devices bullying has moved its place from schools and backyards into cyberspace; to be now known as Cyberbullying. ...
others for the purpose of prevention and awareness; and identifying predators with their victims. ...
doi:10.25046/aj020634
fatcat:7f332jkprnbybct3hjt5aktzba
Online Social Networks and Writing Styles — A Review of the Multidisciplinary Literature
2020
IEEE Access
demographics, personality & behavior, and cybersecurity. ...
In recent years, author identification has become an active research area, where the major differences are caused by paper or online medium, mode of entry and target audience. ...
Seventy-seven lexical and 157 syntactic features and two different classifiers, i.e., the SVM with SMO and naive Bayes for deceptive review classification, are used. ...
doi:10.1109/access.2020.2985916
fatcat:qpejezxkmveyhmpazdz5a3mf7q
The Language of Legal and Illegal Activity on the Darknet
2019
Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics
This paper tackles this gap and performs an in-depth investigation of the characteristics of legal and illegal text in the Darknet, comparing it to a clear net website with similar content as a control ...
The non-indexed parts of the Internet (the Darknet) have become a haven for both legal and illegal anonymous activity. ...
Acknowledgments This work was supported by the Israel Science Foundation (grant no. 929/17) and by the HUJI Cyber Security Research Center in conjunction with the Israel National Cyber Bureau in the Prime ...
doi:10.18653/v1/p19-1419
dblp:conf/acl/ChoshenEHSA19
fatcat:bfcry3cvo5fd7pya4wmtpm45ay
The Language of Legal and Illegal Activity on the Darknet
[article]
2019
arXiv
pre-print
This paper tackles this gap and performs an in-depth investigation of the characteristics of legal and illegal text in the Darknet, comparing it to a clear net website with similar content as a control ...
The non-indexed parts of the Internet (the Darknet) have become a haven for both legal and illegal anonymous activity. ...
Conclusion In this paper we identified several distinguishing factors between legal and illegal texts, taking a variety of approaches, predictive (text classification), application-based (named entity ...
arXiv:1905.05543v2
fatcat:ysxevbc6rreirlfm5jeigjohi4
A Framework for Detecting Intentions of Criminal Acts in Social Media: A Case Study on Twitter ‡
2020
Information
We propose a framework and construct software prototypes for the selection of social network posts with criminal slang expressions and automatic classification of these posts according to illocutionary ...
Criminals use online social networks for various activities by including communication, planning, and execution of criminal acts. ...
With the victim isolated, sexual predators change their approach and use direct texts with sexual content or video communication. ...
doi:10.3390/info11030154
fatcat:ls2plqoq2fdzzkf7re55spjofi
Integrated-system to minimizing cyber harassment in kingdom of Saudi Arabia (KSA)
2018
International Journal of Engineering & Technology
The system provides the judge with laws used in issuing the judgment in KSA and UK courts. ...
The proposed system framework consists two main databases: Lexicon dictionary and Summarized previous cases, by depending on Senti-ment analysis and N-Gram algorithms to match the terms and documents. ...
Acknowledgements We would like to thank Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia by giving the authors an opportunity to conduct this research. ...
doi:10.14419/ijet.v7i4.15149
fatcat:k2szvohoojbmxeuvkflvbqqk54
Profiling School Shooters: Automatic Text-Based Analysis
2015
Frontiers in Psychiatry
Using a ranking/prioritization procedure, similar to the one used for the automatic identification of sexual predators, we provide support for the validity and relevance of the proposed methodology. ...
Comparing texts written by 6 school shooters to 6056 texts written by a comparison group of male subjects, we found that the shooters' texts scored significantly higher on the Narcissistic Personality ...
The Ranking and Prioritization Procedure We followed the logic of the automatic identification of sexual predators (21) . ...
doi:10.3389/fpsyt.2015.00086
pmid:26089804
pmcid:PMC4453266
fatcat:nthue6wmfbcbxmagr3j4z2ltvy
Characterizing Pedophile Conversations on the Internet using Online Grooming
[article]
2012
arXiv
pre-print
We manually annotated 75 pedophile chat conversations with six stages of online grooming and test several hypothesis on it. ...
The results of our experiments reveal that relationship forming is the most dominant online grooming stage in contrast to the sexual stage. ...
Smita Sahay for her inputs on annotation and linking us to the psychology literature. The authors thank all members of PreCog research group at IIIT-Delhi for their support. ...
arXiv:1208.4324v1
fatcat:r6bklcuilvd5bmfggiwy4empn4
An Unsupervised Domain-Independent Framework for Automated Detection of Persuasion Tactics in Text
[article]
2019
arXiv
pre-print
Existing works on detecting persuasion in text make use of lexical features for detecting persuasive tactics, without taking advantage of the possible structures inherent in the tactics used. ...
With the increasing growth of social media, people have started relying heavily on the information shared therein to form opinions and make decisions. ...
We see that the baseline SVM, on lexical features had considerably high precision but it fell short on recall. ...
arXiv:1912.06745v1
fatcat:ig2l6gky25eojgomdlxdm77lei
« Previous
Showing results 1 — 15 out of 33 results