IJISA Vol. 11, No. 11, 8 Nov. 2019
Cover page and Table of Contents: PDF (size: 514KB)
Full Text (PDF, 514KB), PP.48-57
Views: 0 Downloads: 0
Cyberbullying, association rule, pattern recognition, associative approach
Cyberbullying is an intentional action of harassment along the complex domain of social media utilizing information technology online. This research experimented unsupervised associative approach on text mining technique to automatically find cyberbullying words, patterns and extract association rules from a collection of tweets based on the domain / frequent words. Furthermore, this research identifies the relationship between cyberbullying keywords with other cyberbullying words, thus generating knowledge discovery of different cyberbullying word patterns from unstructured tweets. The study revealed that the type of dominant frequent cyberbullying words are intelligence, personality, and insulting words that describe the behavior, appearance of the female victims and sex related words that humiliate female victims. The results of the study suggest that we can utilize unsupervised associative approached in text mining to extract important information from unstructured text. Further, applying association rules can be helpful in recognizing the relationship and meaning between keywords with other words, therefore generating knowledge discovery of different datasets from unstructured text.
Frederick F. Patacsil, "Analysis of Cyberbullying Incidence among Filipina Victims: A Pattern Recognition using Association Rule Extraction", International Journal of Intelligent Systems and Applications(IJISA), Vol.11, No.11, pp.48-57, 2019. DOI:10.5815/ijisa.2019.11.05
[1]Potha, N., & Maragoudakis, M. (2014, December). Cyberbullying detection using time series modeling. In Data Mining Workshop (ICDMW), 2014 IEEE International Conference on (pp.373-382). IEEE.
[2]Raisi, E. and Huang, B., 2018. Weakly supervised cyberbullying detection with participant-vocabulary consistency. Social Network Analysis and Mining, 8(1), p.38.
[3]Salawu, S., He, Y. and Lumsden, J., 2017. Approaches to automated detection of cyberbullying: A survey. IEEE Transactions on Affective Computing.
[4]Espelage, D. L., & Swearer, S. M. (2003). Research on school bullying and victimization: What have we learned and where do we go from here?. School psychology review, 32(3), 365-384.
[5]Bird, L. E., Taylor, T., & Kraft, K. M. (2012). Chapter 10 Student Conduct in the Digital Age: When does the First Amendment Protection End and Misconduct Begin?. In Misbehavior Online in Higher Education (pp. 183-205). Emerald Group Publishing Limited.
[6]Herman, J. L. (2013). Gendered restrooms and minority stress: The public regulation of gender and its impact on transgender people’s lives. Journal of Public Management & Social Policy, 19(1), 65.
[7]Livingstone, S., & Helsper, E. J. (2007). Taking risks when communicating on the Internet: The role of offline social-psychological factors in young people’s vulnerability to online risks. Information, Communication and Society, 10(5), 619-644.
[8]Vinutha, H., & Deepashree, N. S. (2016). An Effective System To Improve The Cyberbullying. IJITR, 4(3), 3002-3006.
[9]Hosseinmardi, H., Rafiq, R.I., Han, R., Lv, Q., & Mishra, S. (2016, August). Prediction of cyberbullying incidents in a media-based social network. In Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on (pp. 186-192). IEEE.
[10]Dinakar, K., Reichart, R., & Lieberman, H. (2011). Modeling the detection of Textual Cyberbullying. The Social Mobile Web, 11(02).
[11]Nalini, K., & Sheela, L. J. (2016). Classification using Latent Dirichlet allocation with Naïve Bayes classifier to detect cyber bullying in twitter. Indian Journal of Science and Technology, 9(28).
[12]Yin, D., Xue, Z., Hong, L., Davison, B. D., Kontostathis, A., & Edwards, L. (2009). Detection of harassment on web 2.0. Proceedings of the Content Analysis in the WEB, 2, 1-7.
[13]Margono, H., Yi. X., & Raikundalia, G. K. (2014, January). Mining Indonesian cyber bullying patterns in social networks In Proceedings of the Thirty-Seventh Australasian Computer Science Conference Volume 147 (pp. 115-124). Australian Computer Society, Inc..
[14]Austin, K. 2015. Common Terms Used By Teen Cyberbullies Online. http://www.mobile-spy.com/blog/common-terms-used-by-teen-cyberbullies/
[15]Beale, A. V., & Hall, K. R. (2007). Cyberbullying: What school administrators (and parents) can do. The Clearing House; A Journal of Educational Strategies, Issues and Ideas, 81(1), 8-12.
[16]Bogartz, R. S., Interrater Agreement and Combining RatingsUniversity of Massachusetts, Amherst. http://people.umass.edu /~bogartz /Interrater%20Agreement.pdf
[17]Slater, S. 2014. DCU seeks public’s help to tackle ‘subtle’ cyberbullying. Irish Examiner, http://www.irishexaminer.com./ireland/dcu-seeks-publics-help-to-tackle-subtle-cyberbullying-285366.html
[18]Winterman, D., (2008). How ‘gay’ became children’s insult of choice. BBC news, 18. Yin, D., Xue, Z., Hond, L., Davison, B.D., Kontostathis, A. and Edwards, L., 2009. Detection of harassment on web 2.0. Proceedings of the Content Analysis in the WEB, 2, pp.1-7.
[19]Bradshaw, C.P., Waasdorp, T.E., O’Brennan, L.M. and Gulemetova, M., 2011. Findings from the National Education Association’s Nationwide Study of Bullying. National Education Association. Retrieved April, 5, p.2018.
[20]Villasor, R. 2010. Bulling as Perceived by Adolescent Students, School Counselors, and Teachers. De La Salle University Manila. Presented in the 47th Annual Convention of Psychological Association of the Philippines. Souvenir Invitation. August 18-20,2010. Palawan State University.
[21]Payne P. 2017. Sex and Dignity? Seriously?, http://www.huffingtonpost.com/peggy-payne/sex-and-dignity-seriously_b_9691660.html