Cyberbullying Indicator as a Precursor to a Cyber Construct Development
- URL: http://arxiv.org/abs/2203.16869v1
- Date: Thu, 31 Mar 2022 07:55:51 GMT
- Title: Cyberbullying Indicator as a Precursor to a Cyber Construct Development
- Authors: Salman Khalifa Al-Romaihi and Richard Adeyemi Ikuesan
- Abstract summary: This study proposes a cyberbullying framework based on the identification of some observable behavioral indicators.
Using a self-administered measurement instrument from 30-respondents, the study observed the probability of a cyberbully construct.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The current global pandemic occasioned by the SARS-CoV-2 virus has been
attributed, partially, to the growing range of cyber vises within the cyber
ecosystem. One area of such impact is the increasing tendencies of
cyber-bullying among students. Cyberbullying -- the act of subjugating others
using a cyber platform -- is a growing concern among educators, especially in
High-S chools. Whilst studies have been carried out towards understanding this
menace, the approach towards id entifying indicators of cyberbullying is
largely missing in the literature. To address this research gap, this study
proposed a cyberbullying framework based on the identification of some
observable behavioral indicators. Using a self-administered measurement
instrument from 30-respondents, the study observed the probability of a
cyberbully construct, as a potential measure of the presence of cyberbullying;
a probability that has been largely ignored in extant literature. This
observation presents a veritable tool for the development of an active and
integrated learning platform void of abuse among students. Furthermore, within
the cyber education ecosystem, a cyberbullying construct would provide a
mechanism for the development of an appropriate online learning platform, which
would be useful to the information system and cyber education research
communities.
Related papers
- Countering Autonomous Cyber Threats [40.00865970939829]
Foundation Models present dual-use concerns broadly and within the cyber domain specifically.
Recent research has shown the potential for these advanced models to inform or independently execute offensive cyberspace operations.
This work evaluates several state-of-the-art FMs on their ability to compromise machines in an isolated network and investigates defensive mechanisms to defeat such AI-powered attacks.
arXiv Detail & Related papers (2024-10-23T22:46:44Z) - Cyberbully and Online Harassment: Issues Associated with Digital Wellbeing [0.0]
This research synthesizes empirical findings from diverse studies to evaluate how innovative technological interventions contribute to reducing the prevalence of cyberbullying.
The study focuses on the effectiveness of these interventions in various settings, highlighting the need for adaptive strategies that respond to the dynamic digital landscape.
arXiv Detail & Related papers (2024-04-29T17:49:49Z) - Securing Social Spaces: Harnessing Deep Learning to Eradicate Cyberbullying [1.8749305679160366]
cyberbullying is a serious problem that can harm the mental and physical health of people who use social media.
This paper explains just how serious cyberbullying is and how it really affects indi-viduals exposed to it.
It stresses how important it is to find better ways to detect cyberbullying so that online spaces can be safer.
arXiv Detail & Related papers (2024-04-01T20:41:28Z) - Explain Thyself Bully: Sentiment Aided Cyberbullying Detection with
Explanation [52.3781496277104]
Cyberbullying has become a big issue with the popularity of different social media networks and online communication apps.
Recent laws like "right to explanations" of General Data Protection Regulation have spurred research in developing interpretable models.
We develop first interpretable multi-task model called em mExCB for automatic cyberbullying detection from code-mixed languages.
arXiv Detail & Related papers (2024-01-17T07:36:22Z) - A Secure Open-Source Intelligence Framework For Cyberbullying
Investigation [0.0]
This paper proposes an open-source intelligence pipeline using data from Twitter to track keywords relevant to cyberbullying in social media.
An OSINT dashboard with real-time monitoring empowers law enforcement to swiftly take action, protect victims, and make significant strides toward creating a safer online environment.
arXiv Detail & Related papers (2023-07-27T23:03:57Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Cyberbullying in Text Content Detection: An Analytical Review [0.0]
Online social networks increase the user's exposure to life-threatening situations such as suicide, eating disorder, cybercrime, compulsive behavior, anxiety, and depression.
To tackle the issue of cyberbullying, most existing literature focuses on developing approaches to identifying factors and understanding the textual factors associated with cyberbullying.
This paper conducts a comprehensive literature review to provide an understanding of cyberbullying detection.
arXiv Detail & Related papers (2023-03-18T21:23:06Z) - DISARM: Detecting the Victims Targeted by Harmful Memes [49.12165815990115]
DISARM is a framework that uses named entity recognition and person identification to detect harmful memes.
We show that DISARM significantly outperforms ten unimodal and multimodal systems.
It can reduce the relative error rate for harmful target identification by up to 9 points absolute over several strong multimodal rivals.
arXiv Detail & Related papers (2022-05-11T19:14:26Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - Enhancing the Identification of Cyberbullying through Participant Roles [1.399948157377307]
This paper proposes a novel approach to enhancing cyberbullying detection through role modeling.
We utilise a dataset from ASKfm to perform multi-class classification to detect participant roles.
arXiv Detail & Related papers (2020-10-13T19:13:07Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.