- -

Detecting Discourse-Independent Negated Forms of Public Textual Cyberbullying

RiuNet: Institutional repository of the Polithecnic University of Valencia

Share/Send to

Cited by

Statistics

  • Estadisticas de Uso

Detecting Discourse-Independent Negated Forms of Public Textual Cyberbullying

Show full item record

Power, A.; Keane, A.; Nolan, B.; O'neill, B. (2018). Detecting Discourse-Independent Negated Forms of Public Textual Cyberbullying. Journal of Computer-Assisted Linguistic Research. 2(1):1-20. https://doi.org/10.4995/jclr.2018.8917

Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10251/106473

Files in this item

Item Metadata

Title: Detecting Discourse-Independent Negated Forms of Public Textual Cyberbullying
Author: Power, Aurelia Keane, Anthony Nolan, Brian O'Neill, Brian
Issued date:
Abstract:
[EN] Cyberbullying is a risk associated with the online safety of young people and, in this paper, we address one of its most common implicit forms – negation-based forms. We first describe the role of negation in ...[+]
Subjects: Cyberbullying detection , Dependency parsing , Negation , Natural language processing
Copyrigths: Reconocimiento - No comercial - Sin obra derivada (by-nc-nd)
Source:
Journal of Computer-Assisted Linguistic Research. (eissn: 2530-9455 )
DOI: 10.4995/jclr.2018.8917
Publisher:
Universitat Politècnica de València
Publisher version: https://doi.org/10.4995/jclr.2018.8917
Type: Artículo

References

Al-garadi, M.A., Varathan, K.D. and Ravana S.D. 2016. "Cybercrime Detection in Online Communications: The Experimental Case of Cyberbullying Detection in the Twitter Network." Computers in Human Behaviour, 63: 433 - 443. https://doi.org/10.1016/j.chb.2016.05.051

Allan, K. and Burridge, K. 2006. Forbidden Words: Taboo and Censoring of Language. Cambridge: Cambridge University Press. https://doi.org/10.1017/CBO9780511617881

Boyd, D. 2007. "Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life." In MacArthur Foundation Series on Digital Learning, Youth, Identity, and Digital Media, edited by David Buckingham, 1 - 26. Cambridge, MA: MIT Press. [+]
Al-garadi, M.A., Varathan, K.D. and Ravana S.D. 2016. "Cybercrime Detection in Online Communications: The Experimental Case of Cyberbullying Detection in the Twitter Network." Computers in Human Behaviour, 63: 433 - 443. https://doi.org/10.1016/j.chb.2016.05.051

Allan, K. and Burridge, K. 2006. Forbidden Words: Taboo and Censoring of Language. Cambridge: Cambridge University Press. https://doi.org/10.1017/CBO9780511617881

Boyd, D. 2007. "Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life." In MacArthur Foundation Series on Digital Learning, Youth, Identity, and Digital Media, edited by David Buckingham, 1 - 26. Cambridge, MA: MIT Press.

Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., and Vakali, A. 2017. "Mean Birds: Detecting Aggression and Bullying on Twitter." Cornell University Library: https://arxiv.org/abs/1702.06877.

Chen, Y., Zhou, Y., Zhu, S. and Xu, H. 2012. "Detecting Offensive Language in Social Media to Protect Adolescent Online Safety." Paper presented at the ASE/IEEE International Conference on Social Computing, 71 - 80. Washington, DC, September 3-5. https://doi.org/10.1109/SocialCom-PASSAT.2012.55

Dadvar, M., Trieschnigg, D., R. Ordelman, R., and de Jong, F. 2013. "Improving cyberbullying detection with user context." Paper presented at the 35th European conference on Advances in Information Retrieval, 693 - 696. Moscow, March 24-27. https://doi.org/10.1007/978-3-642-36973-5_62

de Marneffe, M.C., and Manning, C.D. 2008a. "The Stanford typed dependencies representation." Paper presented at the COLING 2008 Workshop on Cross-framework and Cross-domain Parser Evaluation. Manchester, UK August 23 - 23. https://doi.org/10.3115/1608858.1608859

de Marneffe, M.C., and Manning, C. 2008b. "Stanford typed dependencies manual." https://nlp.stanford.edu/software/dependencies_manual.pdf.

Dinakar, K., Jones, B., Havasi, C., Lieberman, H., and Picard, R. 2012. "Common sense reasoning for detection, prevention, and mitigation of cyberbullying." ACM Transactions on Interactive Intelligent Systems, 2: 18:1-18:30. https://doi.org/10.1145/2362394.2362400

Dooley, J.J., Pyzalski, J., and Cross, D. 2009. "Cyberbullying versus face-to-face bullying - A theoretical and conceptual review." Journal of Psychology, 217: 182-188. https://doi.org/10.1027/0044-3409.217.4.182

Goncalves, M. 2011. "Text Classification". In Modern Information Retrieval, the concepts and technology behind search, edited by Ricardo Baeza-Yates and Berthier Ribeiro-Neto, 281 - 336. Pearson Education Limited.

Grigg, D.W. 2010. "Cyber-Aggression: Definition and Concept of Cyberbullying." Australian Journal of Guidance and Counselling, 12: 143-156. https://doi.org/10.1375/ajgc.20.2.143

Hinduja, S., and Patchin, J.W. 2009. Bullying beyond the schoolyard: preventing and responding to cyber-bullying. Thousand Oaks, CA: Corw2017.

Horn, L. R. 1989. A Natural History of Negation. Chicago: University of Chicago Press.

Hosseinmardi, H., Han, R., Lv, Q., Mishra, S., and Ghasemianlangroodi, A. 2014a. "Towards Understanding Cyberbullying Behavior in a Semi-Anonymous Social Network." Paper presented at the International Conference on Advances in Social Networks Analysis and Mining. Beijing, August 17-20. https://doi.org/10.1109/ASONAM.2014.6921591

Hosseinmardi, H., Rafiq, R. I., Li, S., Yang, Z., Han, R., Lv, Q., and Mishra, S. 2014b. "A Comparison of Common Users across Instagram and Ask.fm to Better Understand Cyberbullying." Paper presented at the 7th International Conference on Social Computing and Networking. Sydney, December 3-5.

Huang, Q., Singh, V.K., and Atrey, P.K. 2014. "Cyber Bullying Detection using Social and Textual Analysis." Paper presented at the 3rd International Workshop on Socially-Aware Multimedia, 3 - 6. Orlando, Florida, November 7. https://doi.org/10.1145/2661126.2661133

InternetSlang. 2017. "Internet Slang - Internet Dictionary." Accessed October 19. http://www.Internetslang.com/.

Kavanagh, P. 2014. "Investigation of Cyberbullying Language & Methods." MSc diss., ITB, Ireland.

Kontostathis, A., Reynolds, K., Garron, A. and Edwards, L. 2013. Detecting Cyberbullying: Query Terms and Techniques. Paper presented at the 5th Annual ACM Web Science Conference. Paris, May 2-4. https://doi.org/10.1145/2464464.2464499

Langos, C. 2012. "Cyberbullying: The Challenge to Define." Cyberpsychology, Behavior, and Social Networks, 15(6): 285-289. https://doi.org/10.1089/cyber.2011.0588

Lawler, J. 2005. "Negation and NPIs." http://www.umich.edu/~jlawler/NPIs.pdf

Livingstone, S.,Haddon, L., Görzig, A., and Ólafsson, K. 2011. "EU Kids Online: final report 2011." http://eprints.lse.ac.uk/45490/1/EU%20Kids%20Online%20final%20report%202011%28lsero%29.pdf.

Livingstone, S., Mascheroni, G., Ólafsson, K., and Haddon, L. with the networks of EU Kids Online and Net Children Go Mobile. 2014. "Children's online risks and opportunities: Comparative findings from EU Kids Online and Net Children Go Mobile". http://eprints.lse.ac.uk/60513/1/__lse.ac.uk_storage_LIBRARY_Secondary_libfile_shared_repository_Content_EU%20Kids%20Online_EU%20Kids%20Online-Children%27s%20online%20risks_2014.pdf.

Nahar, V., Li, X. and Pang, C. 2013. "An Effective Approach for Cyberbullying Detection." Communications in Information Science and Management Engineering, 3:238 - 247.

Nandhini, B.S., and Sheeba, J.I. 2015. "Online Social Network Bullying Detection Using Intelligence Techniques." Procedia Computer Science, 45: 485 - 492. https://doi.org/10.1016/j.procs.2015.03.085

Navarro, G. and Ziviani, N. 2011. "Documents: Languages & Properties". In Modern Information Retrieval, the concepts and technology behind search, edited by Ricardo Baeza-Yates and Berthier Ribeiro-Neto, 203 - 254. Pearson Education Limited.

Nitta, T., Masui, F., Ptaszynski, M., Kimura, Y., Rzepka, R., and Araki, K. 2013. "Detecting Cyberbullying Entries on Informal School Websites Based on Category Relevance Maximization." Paper presented at the 6th International Joint Conference on Natural LanguageProcessing. Nagoya, October 14-19.

Norvig, P. 2007. "How to Write a Spelling Corrector." Accessed October 19. http://norvig.com/spell-correct.html.

Oracle. 2017. Java™ Platform, Standard Edition 9 API Specification. Accessed October 19. https://docs.oracle.com/javase/9/docs/api/index.html?overview-summary.html.

Power, A., Keane, A., Nolan, B., and O'Neill, B. 2017. "A Lexical Database for Public Textual Cyberbullying Detection". Special issue of Revista de lenguas para fines específicos, entitled New Insights into Meaning Construction and Knowledge Representation.

Ptaszynski, M., Dybala, P., Matsuba, T., Rzepka, R. and Araki, K. 2010. "Machine Learning and Affect Analysis Against Cyber-Bullying." Paper presented at the 36th AISB Annual Convention. March 29- April 1.

Ptaszynski, M., Masui, F., Nitta, T., Hatekeyama, S., Kimura, Y., Rzepka, R., and Araki, K. 2016. "Sustainable Cyberbullying Detection with Category-Maximised Relevance of Harmful Phrases and Double-Filtered Automatic Optimisation." International Journal of Child-Computer Interaction, 8: 15 - 30. https://doi.org/10.1016/j.ijcci.2016.07.002

Reynolds, K., Kontostathis, A. and Edwards, L. 2011. "Using Machine Learning to Detect Cyberbullying." Paper presented at the 10th International Conference on Machine Learning and Applications Workshops. Hawaii, December 18-21. https://doi.org/10.1109/ICMLA.2011.152

Sourander, A., Brunstein-Klomek, A., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T., Hans Helenius, H. 2010. "Psychosocial risk factors associated with cyberbullying among adolescents: A population-based study." Arch Gen Psychiatry, 67: 720-728. https://doi.org/10.1001/archgenpsychiatry.2010.79

Unicode. 2017. "Emoticons." Accessed October 19. http://www.unicode.org/.

Van Hee, C., Lefever, E.,Verhoeven, B.,Mennes, J.,Desmet, B., DePauw, G., Daelemans, W., and Hoste, V. 2015. "Detection and Fine-GrainedClassificationofCyberbullyingEvents." Paper presented at the annual conference on RANLP. Hissar, September 5-11.

Witten, I.H., Frank, E., and Hall, M.A. 2011. Data Mining: Practical Machine Learning Tools and Techniques (3rd edition). Elsevier Inc., USA.

Yin, D., Xue, Z., Hong, L., Davison, B.D., Kontostathis, A., and Edwards, L. 2009. "Detection of harassment on web 2.0." Paper presented at the 1st conference on CAW. Madrid, April 20-24.

[-]

recommendations

 

This item appears in the following Collection(s)

Show full item record