Mattingly "AI & Prompt Design: Named Entity Recognition"
cyber.pptx
1. National INSTITUTE OF
TECHNOLOGY ,WARANGAL
DETECTING THE PRESENCE
Of CYBER BULLYING Using
Machine Learning
Submitted By :- Vishal Thakur
2. Content
What is Cyber Bullying ?
Who is Cyber Bully ?
Side Effect of Cyber Bullying
Cyber Bullying Preventions
Forms of Cyber Bullying
Side Effect of Cyber Bullying
Cyber Bullying Prevenstion
3. WHAT IS CYBER BULLYING ?
Cyber bullying is when
a child, pre-teen or
adolescent is harassed,
threatened, or
humiliated by another
child, preteen, or teen
using the Internet,
interactive and digital
technologies or mobile
phones.
4. WHO IS CYBER BULLY ?
•In order to be considered
cyber bullying there must
be a child on both sides, or
at least have been
instigated by a minor
against another minor.
•Once adults become
involved it is cyber
harassment or cyber
stalking.
•Adult cyber harassment
or cyber stalking are never
referred to as cyber
bullying.
6. Cyber Bullying Prevention
Knowing which gaming communities, social media, and apps your child
uses while gaming and their security risks, which you can research online.
Cyberbullies are looking for an emotional response, but if your child
refuses to give them anything to go on, they are left with one-sided
communications.
Teachers need to monitor internet activity, and discuss the
dangers of cyber bullying.
7. CYBER BULLYING TAKES MANY FORMS
sending mean messages or threats to a person’s email account
or cell phone.
Posting hurtful or threatening messages on social networking
sites or webpage’s.
Stealing a person’s account information to break into their
account and send damaging messages
Taking unflattering pictures of a person and spreading them
through cell phones and the internet.
Sexting or circulating sexually suggestive pictures or messages
about a person
8. PREVIOUS APPROACH
1. Detection of Cyberbullying activity
2. Saving the URL of website
3. Printing out websites containing
cyberbullying entry
Sending deletion request of the
suspicious entry to the website
admin or internet provider
Informing the police or
legal affair
bureau
Confirming the deletion of the
entry containing Cyber- Bullying
activity
9. IBK:
THE INSTANCE-BASED (IBK) ALGORITHM IMPLEMENTED IN WEKA IS A K-NEAREST
NEIGHBOR APPROACH . WE USED THE IBK METHOD WITH K = 1 AND K = 3.
IBK
THE INSTANCE-BASED (IBK) ALGORITHM IMPLEMENTED IN WEKA IS A
K-NEAREST NEIGHBOR APPROACH . WE USED THE IBK METHOD WITH
K = 1 AND K = 3.
In k-NN classification, the output is a class membership. An object
is classified by a plurality vote of its neighbors, with the object
being assigned to the class most common among its k nearest
neighbors (k is a positive integer, typically small). If k = 1, then the
object is simply assigned to the class of that single nearest
neighbor.
10. What to do if you are or know a
victim of cyber bullying:
-Tell an adult you know and trust.
-Contact your internet and or cell phone provider.
-Contact your local police.
- Do not erase and messages or photos as they may be needed for evidence.