SlideShare a Scribd company logo
1 of 11
National INSTITUTE OF
TECHNOLOGY ,WARANGAL
DETECTING THE PRESENCE
Of CYBER BULLYING Using
Machine Learning
Submitted By :- Vishal Thakur
Content
What is Cyber Bullying ?
 Who is Cyber Bully ?
 Side Effect of Cyber Bullying
Cyber Bullying Preventions
Forms of Cyber Bullying
Side Effect of Cyber Bullying
Cyber Bullying Prevenstion
WHAT IS CYBER BULLYING ?
Cyber bullying is when
a child, pre-teen or
adolescent is harassed,
threatened, or
humiliated by another
child, preteen, or teen
using the Internet,
interactive and digital
technologies or mobile
phones.
WHO IS CYBER BULLY ?
•In order to be considered
cyber bullying there must
be a child on both sides, or
at least have been
instigated by a minor
against another minor.
•Once adults become
involved it is cyber
harassment or cyber
stalking.
•Adult cyber harassment
or cyber stalking are never
referred to as cyber
bullying.
Side Effect of Cyber BUllying
Cyber Bullying Prevention
Knowing which gaming communities, social media, and apps your child
uses while gaming and their security risks, which you can research online.
Cyberbullies are looking for an emotional response, but if your child
refuses to give them anything to go on, they are left with one-sided
communications.
Teachers need to monitor internet activity, and discuss the
dangers of cyber bullying.
CYBER BULLYING TAKES MANY FORMS
sending mean messages or threats to a person’s email account
or cell phone.
Posting hurtful or threatening messages on social networking
sites or webpage’s.
Stealing a person’s account information to break into their
account and send damaging messages
Taking unflattering pictures of a person and spreading them
through cell phones and the internet.
Sexting or circulating sexually suggestive pictures or messages
about a person
PREVIOUS APPROACH
1. Detection of Cyberbullying activity
2. Saving the URL of website
3. Printing out websites containing
cyberbullying entry
Sending deletion request of the
suspicious entry to the website
admin or internet provider
Informing the police or
legal affair
bureau
Confirming the deletion of the
entry containing Cyber- Bullying
activity
IBK:
THE INSTANCE-BASED (IBK) ALGORITHM IMPLEMENTED IN WEKA IS A K-NEAREST
NEIGHBOR APPROACH . WE USED THE IBK METHOD WITH K = 1 AND K = 3.
IBK
THE INSTANCE-BASED (IBK) ALGORITHM IMPLEMENTED IN WEKA IS A
K-NEAREST NEIGHBOR APPROACH . WE USED THE IBK METHOD WITH
K = 1 AND K = 3.
In k-NN classification, the output is a class membership. An object
is classified by a plurality vote of its neighbors, with the object
being assigned to the class most common among its k nearest
neighbors (k is a positive integer, typically small). If k = 1, then the
object is simply assigned to the class of that single nearest
neighbor.
What to do if you are or know a
victim of cyber bullying:
-Tell an adult you know and trust.
-Contact your internet and or cell phone provider.
-Contact your local police.
- Do not erase and messages or photos as they may be needed for evidence.
Thank You
References
https://www.avast.com/c-cyberbullying
shorturl.at/vxC67
https://kids.kaspersky.com/10-forms-of-cyberbullying/

More Related Content

Similar to cyber.pptx

Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
Joyce Hirsh
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
Rahuljain40418
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
shannonmf
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
Ollie Bray
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
Grant Ward
 

Similar to cyber.pptx (20)

Cyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptxCyber Crime Cyber Space and Effects .pptx
Cyber Crime Cyber Space and Effects .pptx
 
Cyberbullying includes sending, posting, or sharing negative, harmful,
Cyberbullying includes sending, posting, or sharing negative, harmful,Cyberbullying includes sending, posting, or sharing negative, harmful,
Cyberbullying includes sending, posting, or sharing negative, harmful,
 
Makalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan IndonesiaMakalah cyber crime dalam Bahasa Inggris dan Indonesia
Makalah cyber crime dalam Bahasa Inggris dan Indonesia
 
Adolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing MatterAdolescent Mobile Safety: Not a LOL-ing Matter
Adolescent Mobile Safety: Not a LOL-ing Matter
 
Aet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullyingAet 545 week 6 tutorial cyber bullying
Aet 545 week 6 tutorial cyber bullying
 
Cyber Bullying is Real
Cyber Bullying is RealCyber Bullying is Real
Cyber Bullying is Real
 
Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02Cyberbullyingpowerpoint 110624092326-phpapp02
Cyberbullyingpowerpoint 110624092326-phpapp02
 
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptxRAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
RAHUL JAIN_RAC REPORT_L22SOLP0013.pptx
 
Cyber bullying powerpoint
Cyber bullying powerpointCyber bullying powerpoint
Cyber bullying powerpoint
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Cyber harassment ppt umt
Cyber harassment ppt umtCyber harassment ppt umt
Cyber harassment ppt umt
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Digital citizenship at home and school
Digital citizenship at home and schoolDigital citizenship at home and school
Digital citizenship at home and school
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 

Recently uploaded (20)

Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 

cyber.pptx

  • 1. National INSTITUTE OF TECHNOLOGY ,WARANGAL DETECTING THE PRESENCE Of CYBER BULLYING Using Machine Learning Submitted By :- Vishal Thakur
  • 2. Content What is Cyber Bullying ?  Who is Cyber Bully ?  Side Effect of Cyber Bullying Cyber Bullying Preventions Forms of Cyber Bullying Side Effect of Cyber Bullying Cyber Bullying Prevenstion
  • 3. WHAT IS CYBER BULLYING ? Cyber bullying is when a child, pre-teen or adolescent is harassed, threatened, or humiliated by another child, preteen, or teen using the Internet, interactive and digital technologies or mobile phones.
  • 4. WHO IS CYBER BULLY ? •In order to be considered cyber bullying there must be a child on both sides, or at least have been instigated by a minor against another minor. •Once adults become involved it is cyber harassment or cyber stalking. •Adult cyber harassment or cyber stalking are never referred to as cyber bullying.
  • 5. Side Effect of Cyber BUllying
  • 6. Cyber Bullying Prevention Knowing which gaming communities, social media, and apps your child uses while gaming and their security risks, which you can research online. Cyberbullies are looking for an emotional response, but if your child refuses to give them anything to go on, they are left with one-sided communications. Teachers need to monitor internet activity, and discuss the dangers of cyber bullying.
  • 7. CYBER BULLYING TAKES MANY FORMS sending mean messages or threats to a person’s email account or cell phone. Posting hurtful or threatening messages on social networking sites or webpage’s. Stealing a person’s account information to break into their account and send damaging messages Taking unflattering pictures of a person and spreading them through cell phones and the internet. Sexting or circulating sexually suggestive pictures or messages about a person
  • 8. PREVIOUS APPROACH 1. Detection of Cyberbullying activity 2. Saving the URL of website 3. Printing out websites containing cyberbullying entry Sending deletion request of the suspicious entry to the website admin or internet provider Informing the police or legal affair bureau Confirming the deletion of the entry containing Cyber- Bullying activity
  • 9. IBK: THE INSTANCE-BASED (IBK) ALGORITHM IMPLEMENTED IN WEKA IS A K-NEAREST NEIGHBOR APPROACH . WE USED THE IBK METHOD WITH K = 1 AND K = 3. IBK THE INSTANCE-BASED (IBK) ALGORITHM IMPLEMENTED IN WEKA IS A K-NEAREST NEIGHBOR APPROACH . WE USED THE IBK METHOD WITH K = 1 AND K = 3. In k-NN classification, the output is a class membership. An object is classified by a plurality vote of its neighbors, with the object being assigned to the class most common among its k nearest neighbors (k is a positive integer, typically small). If k = 1, then the object is simply assigned to the class of that single nearest neighbor.
  • 10. What to do if you are or know a victim of cyber bullying: -Tell an adult you know and trust. -Contact your internet and or cell phone provider. -Contact your local police. - Do not erase and messages or photos as they may be needed for evidence.