A new direction in social network analysis: Online social network analysis problems and applications

U Can, B Alatas - Physica A: Statistical Mechanics and its Applications, 2019 - Elsevier
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …

Cyber-aggression, cyberbullying, and cyber-grooming: A survey and research challenges

M Mladenović, V Ošmjanski, SV Stanković - ACM Computing Surveys …, 2021 - dl.acm.org
Cyber-aggression, cyberbullying, and cyber-grooming are distinctive and similar
phenomena that represent the objectionable content appearing on online social media …

[PDF][PDF] Learning from bullying traces in social media

JM Xu, KS Jun, X Zhu, A Bellmore - … of the 2012 conference of the …, 2012 - aclanthology.org
We introduce the social study of bullying to the NLP community. Bullying, in both physical
and cyber worlds (the latter known as cyberbullying), has been recognized as a serious …

Common sense reasoning for detection, prevention, and mitigation of cyberbullying

K Dinakar, B Jones, C Havasi, H Lieberman… - ACM Transactions on …, 2012 - dl.acm.org
Cyberbullying (harassment on social networks) is widely recognized as a serious social
problem, especially for adolescents. It is as much a threat to the viability of online social …

Cyberbullying detection based on semantic-enhanced marginalized denoising auto-encoder

R Zhao, K Mao - IEEE Transactions on Affective Computing, 2016 - ieeexplore.ieee.org
As a side effect of increasingly popular social media, cyberbullying has emerged as a
serious problem afflicting children, adolescents and young adults. Machine learning …

Internet sexual solicitation of children: a proposed typology of offenders based on their chats, e-mails, and social network posts

D DeHart, G Dwyer, MC Seto, R Moran… - Journal of sexual …, 2017 - Taylor & Francis
Although researchers have examined sexual solicitation of minors online, there is limited
research on the content and patterns of victim-offender chats. These chats have potential …

[PDF][PDF] Overview of the International Sexual Predator Identification Competition at PAN-2012.

G Inches, F Crestani - CLEF (Online working notes/labs/workshop), 2012 - Citeseer
This contribution presents the evaluation methodology for the identification of potential
“sexual predators” in online conversations as part of PAN 2012. We provide details of the …

Detection of cyberbullying on social media messages in Turkish

SA Özel, E Saraç, S Akdemir… - … Conference on Computer …, 2017 - ieeexplore.ieee.org
The increased use of the Internet and the ease of access to online communities like social
media have provided an avenue for cybercrimes. Cyberbullying, which is a kind of …

Bipolar fuzzy soft information applied to hypergraphs

M Sarwar, M Akram, S Shahzadi - Soft Computing, 2021 - Springer
Soft set theory is the most developed tool for demonstrating uncertain, vague, not clearly
defined objects in a parametric manner. Bipolar uncertainty incorporates a significant role in …

Learning to identify internet sexual predation

I McGhee, J Bayzick, A Kontostathis… - … Journal of Electronic …, 2011 - Taylor & Francis
This work integrates communication theories and computer science algorithms to create a
program that can detect the occurrence of sexual predation in an online social setting …