A new direction in social network analysis: Online social network analysis problems and applications
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …
of the Internet has become widespread worldwide as the technological infrastructure and the …
Cyber-aggression, cyberbullying, and cyber-grooming: A survey and research challenges
M Mladenović, V Ošmjanski, SV Stanković - ACM Computing Surveys …, 2021 - dl.acm.org
Cyber-aggression, cyberbullying, and cyber-grooming are distinctive and similar
phenomena that represent the objectionable content appearing on online social media …
phenomena that represent the objectionable content appearing on online social media …
[PDF][PDF] Learning from bullying traces in social media
We introduce the social study of bullying to the NLP community. Bullying, in both physical
and cyber worlds (the latter known as cyberbullying), has been recognized as a serious …
and cyber worlds (the latter known as cyberbullying), has been recognized as a serious …
Common sense reasoning for detection, prevention, and mitigation of cyberbullying
Cyberbullying (harassment on social networks) is widely recognized as a serious social
problem, especially for adolescents. It is as much a threat to the viability of online social …
problem, especially for adolescents. It is as much a threat to the viability of online social …
Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder
As a side effect of increasingly popular social media, cyberbullying has emerged as a
serious problem afflicting children, adolescents and young adults. Machine learning …
serious problem afflicting children, adolescents and young adults. Machine learning …
Internet sexual solicitation of children: a proposed typology of offenders based on their chats, e-mails, and social network posts
Although researchers have examined sexual solicitation of minors online, there is limited
research on the content and patterns of victim-offender chats. These chats have potential …
research on the content and patterns of victim-offender chats. These chats have potential …
[PDF][PDF] Overview of the International Sexual Predator Identification Competition at PAN-2012.
G Inches, F Crestani - CLEF (Online working notes/labs/workshop), 2012 - Citeseer
This contribution presents the evaluation methodology for the identification of potential
“sexual predators” in online conversations as part of PAN 2012. We provide details of the …
“sexual predators” in online conversations as part of PAN 2012. We provide details of the …
Detection of cyberbullying on social media messages in Turkish
The increased use of the Internet and the ease of access to online communities like social
media have provided an avenue for cybercrimes. Cyberbullying, which is a kind of …
media have provided an avenue for cybercrimes. Cyberbullying, which is a kind of …
Bipolar fuzzy soft information applied to hypergraphs
Soft set theory is the most developed tool for demonstrating uncertain, vague, not clearly
defined objects in a parametric manner. Bipolar uncertainty incorporates a significant role in …
defined objects in a parametric manner. Bipolar uncertainty incorporates a significant role in …
Learning to identify internet sexual predation
I McGhee, J Bayzick, A Kontostathis… - … Journal of Electronic …, 2011 - Taylor & Francis
This work integrates communication theories and computer science algorithms to create a
program that can detect the occurrence of sexual predation in an online social setting …
program that can detect the occurrence of sexual predation in an online social setting …