A Secure Open-Source Intelligence Framework For Cyberbullying
Investigation
- URL: http://arxiv.org/abs/2307.15225v2
- Date: Sat, 12 Aug 2023 02:26:25 GMT
- Title: A Secure Open-Source Intelligence Framework For Cyberbullying
Investigation
- Authors: Sylvia Worlali Azumah, Victor Adewopo, Zag ElSayed, Nelly Elsayed,
Murat Ozer
- Abstract summary: This paper proposes an open-source intelligence pipeline using data from Twitter to track keywords relevant to cyberbullying in social media.
An OSINT dashboard with real-time monitoring empowers law enforcement to swiftly take action, protect victims, and make significant strides toward creating a safer online environment.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Cyberbullying has become a pervasive issue based on the rise of cell phones
and internet usage affecting individuals worldwide. This paper proposes an
open-source intelligence pipeline using data from Twitter to track keywords
relevant to cyberbullying in social media to build dashboards for law
enforcement agents. We discuss the prevalence of cyberbullying on social media,
factors that compel individuals to indulge in cyberbullying, and the legal
implications of cyberbullying in different countries also highlight the lack of
direction, resources, training, and support that law enforcement officers face
in investigating cyberbullying cases. The proposed interventions for
cyberbullying involve collective efforts from various stakeholders, including
parents, law enforcement, social media platforms, educational institutions,
educators, and researchers. Our research provides a framework for cyberbullying
and provides a comprehensive view of the digital landscape for investigators to
track and identify cyberbullies, their tactics, and patterns. An OSINT
dashboard with real-time monitoring empowers law enforcement to swiftly take
action, protect victims, and make significant strides toward creating a safer
online environment.
Related papers
- Securing Social Spaces: Harnessing Deep Learning to Eradicate Cyberbullying [1.8749305679160366]
cyberbullying is a serious problem that can harm the mental and physical health of people who use social media.
This paper explains just how serious cyberbullying is and how it really affects indi-viduals exposed to it.
It stresses how important it is to find better ways to detect cyberbullying so that online spaces can be safer.
arXiv Detail & Related papers (2024-04-01T20:41:28Z) - Explain Thyself Bully: Sentiment Aided Cyberbullying Detection with
Explanation [52.3781496277104]
Cyberbullying has become a big issue with the popularity of different social media networks and online communication apps.
Recent laws like "right to explanations" of General Data Protection Regulation have spurred research in developing interpretable models.
We develop first interpretable multi-task model called em mExCB for automatic cyberbullying detection from code-mixed languages.
arXiv Detail & Related papers (2024-01-17T07:36:22Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Cyberbullying in Text Content Detection: An Analytical Review [0.0]
Online social networks increase the user's exposure to life-threatening situations such as suicide, eating disorder, cybercrime, compulsive behavior, anxiety, and depression.
To tackle the issue of cyberbullying, most existing literature focuses on developing approaches to identifying factors and understanding the textual factors associated with cyberbullying.
This paper conducts a comprehensive literature review to provide an understanding of cyberbullying detection.
arXiv Detail & Related papers (2023-03-18T21:23:06Z) - DISARM: Detecting the Victims Targeted by Harmful Memes [49.12165815990115]
DISARM is a framework that uses named entity recognition and person identification to detect harmful memes.
We show that DISARM significantly outperforms ten unimodal and multimodal systems.
It can reduce the relative error rate for harmful target identification by up to 9 points absolute over several strong multimodal rivals.
arXiv Detail & Related papers (2022-05-11T19:14:26Z) - Cyberbullying Indicator as a Precursor to a Cyber Construct Development [0.0]
This study proposes a cyberbullying framework based on the identification of some observable behavioral indicators.
Using a self-administered measurement instrument from 30-respondents, the study observed the probability of a cyberbully construct.
arXiv Detail & Related papers (2022-03-31T07:55:51Z) - An Investigative Model of Adult Cyberbullying: A Court Case Analysis [0.0]
This research developed an investigative model for cyberbullying, specifically developed for adults.
The model considers the cyberbullying journey from conception of the bullying idea, identification of the target to the bullying as an action.
The a-priori model is then validated using 20 cyberbullying court cases from Australia, Canada, the United States and Scotland.
arXiv Detail & Related papers (2021-10-27T00:24:01Z) - Detecting Harmful Content On Online Platforms: What Platforms Need Vs.
Where Research Efforts Go [44.774035806004214]
harmful content on online platforms comes in many different forms including hate speech, offensive language, bullying and harassment, misinformation, spam, violence, graphic content, sexual abuse, self harm, and many other.
Online platforms seek to moderate such content to limit societal harm, to comply with legislation, and to create a more inclusive environment for their users.
There is currently a dichotomy between what types of harmful content online platforms seek to curb, and what research efforts there are to automatically detect such content.
arXiv Detail & Related papers (2021-02-27T08:01:10Z) - Enhancing the Identification of Cyberbullying through Participant Roles [1.399948157377307]
This paper proposes a novel approach to enhancing cyberbullying detection through role modeling.
We utilise a dataset from ASKfm to perform multi-class classification to detect participant roles.
arXiv Detail & Related papers (2020-10-13T19:13:07Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - Quantifying the Vulnerabilities of the Online Public Square to Adversarial Manipulation Tactics [43.98568073610101]
We use a social media model to quantify the impacts of several adversarial manipulation tactics on the quality of content.
We find that the presence of influential accounts, a hallmark of social media, exacerbates the vulnerabilities of online communities to manipulation.
These insights suggest countermeasures that platforms could employ to increase the resilience of social media users to manipulation.
arXiv Detail & Related papers (2019-07-13T21:12:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.