SlideShare a Scribd company logo
“Application of Actor Level
Social Characteristic
Indicator Selection for the
Precursory Detection of
Bullies in Online Social
Networks”
April 19th
, 2016
Holly White, Jeremy Fields
Robert Hall, Joshua White
2

Introduction

Background on Cyberbullying

Bullying Traits

Dataset Selection

Analysis
– Pre-processing
– Determining Negativity

Initial Results

Conclusion and Future Work

References / Contact Info.
Overview
3

This work presents a precursory method for
detection of “potential” bullies in social
networks. We still have an unknown number of
false positives that we have yet to quantify.
Disclaimer
4

Cyberbully occurs globally and impacts people of
all ages and walks of life
– Effects include depression, low self-esteem, physical
and psychological conditions and suicide (3,4)
– Early detection can mitigate effects

Cyberbullying occurs within a wide range of
technologies
– Analyzing social media for cases of cyberbullying
requires methods isolating key factors within large
samples of data
Introduction
5

Cyberbullying effects both victims and offenders (8)
– victims are 1.9X more likely to attempt suicide
– Offenders are 1.5X more
– Attacks are personal & focus on sexuality, race,
intelligence, and appearance

Courts insist schools have a legal & moral
responsibility to take action
– 49 states prohibit cyberbullying (8,9)
– The Safe Schools Improvement Act will require all
schools prohibit bullying to acquire funding
– Dignity For All Students Act (NYS) (10)
Cyberbullying
6
Cyberbullying

While there are numerous forms of cyberbullying, Chisolm created
the top 11
– Catfishing
– Use of MMOGs (Massive Multi-player Online Gaming-typical of males)
– Material or messages dehumanizing, attacking, or threatening the target
– Flaming (hostile & insulting)
– Impersonating
– Slamming (by-standers are crucial)
– Ratting (utilization of victim's hardware)
– Relational aggression (mean girl & by-standers)
– Sexting (large repercussions)
– Shock Trolling
– Online Stalking
7

Aside from the chart below, cyberbullies are
primarily teenaged and female (9)

Gender aside, bullies typically have low
effective & cognitive empathy (13)

Bystanders play a major role (DASA)
Bullying Traits
8

This work applies to many different social
networks

In 2010 the Department of Homeland Security
proposed classifications for social networks [17]

Twitter is Unique:
– Allows for non-accepted Follower Relationships
– 140 Character Limit
– Easy Access API
– * The Twitter Rules *
Dataset Selection
9

Started with a series of political hashtags that
were collected as part of a previous research
project, researchers at SUNY Polytechnic
collected 9Million+ tweets from the trickler API.
Dataset Selection

This dataset is
available upon
request in full or
summarized form,
under a data sharing
agreement. A
complete summation
of the dataset is also
available in report
form.
10

Build a process that can be highly parralellized
using mapreduce

Reduce the dataset through various, easy to
compute mechanisms

Eliminate as much “noise” as possible

High confidence selection of bullying messages
Analysis Goals
11

Removal of Bots/SPAM/etc.

Plot (Entropy over Time)
– Previous work showed messages scoring under
4.9 to be bots/SPAM 99% of the time
– 325,396 messages removed from 189,263
accounts.
Analysis [Entropy]
12

Analyzed 2 groups (Male, Female)
– Assumption: Males more negatively polarized,
• A. Sifferlin stated that men share more negative
emotion online than women [21]
• Our Findings:
– (All Messages - Male Negative: 17.048%)
– (All Messages - Female Negative 14.742%)
– Difference (2.306%)
Male Female
Analysis [Polarity]
13

Next we analyzed negative messages directed
at another user
– Twitter denotes directed messages as
@username
– We found 725,572 messages were directed
– Within this data we found a much smaller
gender difference (0.55%)
Analysis Cont.
14

We have not built the classifiers (discussed in
future work)
– Instead we set an arbitrary threshold for
selection of potential bully accounts
• Manual analysis shows accounts containing more
than 4 negative messages directed at a particular
user was a good threshold choice
• 1,035 individuals fell into the 4 or more category
• Sample messages from 1 such account are
shown:
Initial Results
15

Goal: Create a variable “real-time” threshold by
training two probability based machine learning
classifiers:
– 1.) Assess negativity and “cruelty” of messages
along with demographics of an individual
compared to users of the same demographics
– 2.) Compare the overall negativity and “cruelty”
of an individual, to the amount of negativity and
“cruelty” shown to a specific user
Future Work / Next Steps
16

Despite our arbitrary threshold, our method
located bullying within the dataset

This method shows potential as a tool to
combat cyberbullying

We aim to enhance this capability

Planned future work will also create more “real-
time” recognition of cyberbullying

Future work with Rutgers University under NSF
grant is underway
Conclusion
17
Contact:
Holly M. White
hwhite@cvalleycsd.org
Citations / Contact

More Related Content

What's hot

2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
Marc Smith
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures
dnac
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
Duke Network Analysis Center
 
Towards Making an Anonymous and One-Stop Online Reporting System for Third-Wo...
Towards Making an Anonymous and One-Stop Online Reporting System for Third-Wo...Towards Making an Anonymous and One-Stop Online Reporting System for Third-Wo...
Towards Making an Anonymous and One-Stop Online Reporting System for Third-Wo...
Tarik Reza Toha
 
Network Theory Final Draft
Network Theory Final DraftNetwork Theory Final Draft
Network Theory Final Draft
kmbaldau
 
Social Network Analysis and Partnerships SNA presentation Guevara 2015
Social Network Analysis and Partnerships SNA presentation Guevara 2015Social Network Analysis and Partnerships SNA presentation Guevara 2015
Social Network Analysis and Partnerships SNA presentation Guevara 2015
Sophia Guevara
 
Social Network Analysis: Applications & Challenges
Social Network Analysis: Applications & ChallengesSocial Network Analysis: Applications & Challenges
Social Network Analysis: Applications & Challenges
IIIT Hyderabad
 
00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview
Duke Network Analysis Center
 
Social Network Analysis Workshop
Social Network Analysis WorkshopSocial Network Analysis Workshop
Social Network Analysis Workshop
Data Works MD
 
01 Network Data Collection
01 Network Data Collection01 Network Data Collection
01 Network Data Collection
Duke Network Analysis Center
 
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
Liliana Bounegru
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation
Ratnesh Shah
 
Las redes sociales
Las redes socialesLas redes sociales
Las redes sociales
uteco
 
Introduction to Computational Social Science
Introduction to Computational Social ScienceIntroduction to Computational Social Science
Introduction to Computational Social Science
Premsankar Chakkingal
 
Social Network Analysis (SNA)
Social Network Analysis (SNA)Social Network Analysis (SNA)
Social Network Analysis (SNA)
Development Innovations
 
HealthGIS_Lisa_Levoir
HealthGIS_Lisa_LevoirHealthGIS_Lisa_Levoir
HealthGIS_Lisa_Levoir
Lisa LeVoir
 
Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)
SocialMediaMining
 
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
IIIT Hyderabad
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
World Agroforestry (ICRAF)
 

What's hot (19)

2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 
Towards Making an Anonymous and One-Stop Online Reporting System for Third-Wo...
Towards Making an Anonymous and One-Stop Online Reporting System for Third-Wo...Towards Making an Anonymous and One-Stop Online Reporting System for Third-Wo...
Towards Making an Anonymous and One-Stop Online Reporting System for Third-Wo...
 
Network Theory Final Draft
Network Theory Final DraftNetwork Theory Final Draft
Network Theory Final Draft
 
Social Network Analysis and Partnerships SNA presentation Guevara 2015
Social Network Analysis and Partnerships SNA presentation Guevara 2015Social Network Analysis and Partnerships SNA presentation Guevara 2015
Social Network Analysis and Partnerships SNA presentation Guevara 2015
 
Social Network Analysis: Applications & Challenges
Social Network Analysis: Applications & ChallengesSocial Network Analysis: Applications & Challenges
Social Network Analysis: Applications & Challenges
 
00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview
 
Social Network Analysis Workshop
Social Network Analysis WorkshopSocial Network Analysis Workshop
Social Network Analysis Workshop
 
01 Network Data Collection
01 Network Data Collection01 Network Data Collection
01 Network Data Collection
 
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation
 
Las redes sociales
Las redes socialesLas redes sociales
Las redes sociales
 
Introduction to Computational Social Science
Introduction to Computational Social ScienceIntroduction to Computational Social Science
Introduction to Computational Social Science
 
Social Network Analysis (SNA)
Social Network Analysis (SNA)Social Network Analysis (SNA)
Social Network Analysis (SNA)
 
HealthGIS_Lisa_Levoir
HealthGIS_Lisa_LevoirHealthGIS_Lisa_Levoir
HealthGIS_Lisa_Levoir
 
Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)
 
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
Selfie Deaths (KillFies) and Distracted Driving: Social Computing, Machine L...
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
 

Similar to Presentation - Application of Actor Level Social Characteristic Indicator Selection for the Precursory Detection of Bullies in Online Social Networks

Towards a More Holistic Approach on Online Abuse and Antisemitism
Towards a More Holistic Approach on Online Abuse and AntisemitismTowards a More Holistic Approach on Online Abuse and Antisemitism
Towards a More Holistic Approach on Online Abuse and Antisemitism
IIIT Hyderabad
 
Computational Approaches to Studying Anti-Social Behaviour on Social Media
Computational Approaches to Studying Anti-Social Behaviour on Social MediaComputational Approaches to Studying Anti-Social Behaviour on Social Media
Computational Approaches to Studying Anti-Social Behaviour on Social Media
Toronto Metropolitan University
 
My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docx
AttaUrRahman78
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
Lisa Muthukumar
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdf
JioAhuja
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
Ray Brannon
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
Bernajean Porter
 
762019109
762019109762019109
762019109
IJRAT
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
Claire Webber
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
Claire Webber
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2
IAEME Publication
 
Spam identification fake profile
Spam identification fake profileSpam identification fake profile
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
Abhishek Sharma
 
Determinants of Internet Media Abuse In Workplace.
Determinants of Internet Media Abuse In Workplace.Determinants of Internet Media Abuse In Workplace.
Determinants of Internet Media Abuse In Workplace.
Fairul Hisyam Mat
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o script
Jacque Lewis
 
Political Implications of Data Doubles.pdf
Political Implications of Data Doubles.pdfPolitical Implications of Data Doubles.pdf
Political Implications of Data Doubles.pdf
GauravDeshmukh54
 
Digital development and Online Gender-Based Violence
Digital development and Online Gender-Based ViolenceDigital development and Online Gender-Based Violence
Digital development and Online Gender-Based Violence
Anand Sheombar
 
Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...
ijtsrd
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
ijaia
 

Similar to Presentation - Application of Actor Level Social Characteristic Indicator Selection for the Precursory Detection of Bullies in Online Social Networks (20)

Towards a More Holistic Approach on Online Abuse and Antisemitism
Towards a More Holistic Approach on Online Abuse and AntisemitismTowards a More Holistic Approach on Online Abuse and Antisemitism
Towards a More Holistic Approach on Online Abuse and Antisemitism
 
Computational Approaches to Studying Anti-Social Behaviour on Social Media
Computational Approaches to Studying Anti-Social Behaviour on Social MediaComputational Approaches to Studying Anti-Social Behaviour on Social Media
Computational Approaches to Studying Anti-Social Behaviour on Social Media
 
My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docx
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
 
Research Methodology.pdf
Research Methodology.pdfResearch Methodology.pdf
Research Methodology.pdf
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
NetSafety w/ Anne Collier
NetSafety w/ Anne CollierNetSafety w/ Anne Collier
NetSafety w/ Anne Collier
 
762019109
762019109762019109
762019109
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2
 
Spam identification fake profile
Spam identification fake profileSpam identification fake profile
Spam identification fake profile
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Determinants of Internet Media Abuse In Workplace.
Determinants of Internet Media Abuse In Workplace.Determinants of Internet Media Abuse In Workplace.
Determinants of Internet Media Abuse In Workplace.
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o script
 
Political Implications of Data Doubles.pdf
Political Implications of Data Doubles.pdfPolitical Implications of Data Doubles.pdf
Political Implications of Data Doubles.pdf
 
Digital development and Online Gender-Based Violence
Digital development and Online Gender-Based ViolenceDigital development and Online Gender-Based Violence
Digital development and Online Gender-Based Violence
 
Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...Comparative Study of Cyberbullying Detection using Different Machine Learning...
Comparative Study of Cyberbullying Detection using Different Machine Learning...
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
 

More from Joshua S. White, PhD josh@securemind.org

Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...
Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...
Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...
Joshua S. White, PhD josh@securemind.org
 
Presentation - Social Relevance Toward Understanding the Impact of the Indivi...
Presentation - Social Relevance Toward Understanding the Impact of the Indivi...Presentation - Social Relevance Toward Understanding the Impact of the Indivi...
Presentation - Social Relevance Toward Understanding the Impact of the Indivi...
Joshua S. White, PhD josh@securemind.org
 
Supraja_SMS_presentation
Supraja_SMS_presentationSupraja_SMS_presentation
ase-social-informatics (6)
ase-social-informatics (6)ase-social-informatics (6)
ase-social-informatics (6)
Joshua S. White, PhD josh@securemind.org
 
Social Network Analysis Applications and Approach
Social Network Analysis Applications and ApproachSocial Network Analysis Applications and Approach
Social Network Analysis Applications and Approach
Joshua S. White, PhD josh@securemind.org
 
Clarkson joshua white - ids testing - spie 2013 presentation - jsw - d1
Clarkson   joshua white - ids testing - spie 2013 presentation - jsw - d1Clarkson   joshua white - ids testing - spie 2013 presentation - jsw - d1
Clarkson joshua white - ids testing - spie 2013 presentation - jsw - d1
Joshua S. White, PhD josh@securemind.org
 
Malware bek slides 20131023 final
Malware bek slides 20131023 finalMalware bek slides 20131023 final
Malware bek slides 20131023 final
Joshua S. White, PhD josh@securemind.org
 
CSIAC - Social Media Analysis and Privacy
CSIAC - Social Media Analysis and PrivacyCSIAC - Social Media Analysis and Privacy
CSIAC - Social Media Analysis and Privacy
Joshua S. White, PhD josh@securemind.org
 
Clarkson - Joshua White - Research Proposal Presentation
Clarkson - Joshua White - Research Proposal PresentationClarkson - Joshua White - Research Proposal Presentation
Clarkson - Joshua White - Research Proposal Presentation
Joshua S. White, PhD josh@securemind.org
 
Coalmine spie 2012 presentation - jsw -d3
Coalmine   spie 2012 presentation - jsw -d3Coalmine   spie 2012 presentation - jsw -d3
Coalmine spie 2012 presentation - jsw -d3
Joshua S. White, PhD josh@securemind.org
 
Phishing spie 2012 presentation - jsw - d2
Phishing   spie 2012 presentation - jsw - d2Phishing   spie 2012 presentation - jsw - d2
Phishing spie 2012 presentation - jsw - d2
Joshua S. White, PhD josh@securemind.org
 
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Joshua S. White, PhD josh@securemind.org
 

More from Joshua S. White, PhD josh@securemind.org (12)

Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...
Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...
Presentation - Hybrid Sentiment Analysis Utilizing Multiple Indicators To Det...
 
Presentation - Social Relevance Toward Understanding the Impact of the Indivi...
Presentation - Social Relevance Toward Understanding the Impact of the Indivi...Presentation - Social Relevance Toward Understanding the Impact of the Indivi...
Presentation - Social Relevance Toward Understanding the Impact of the Indivi...
 
Supraja_SMS_presentation
Supraja_SMS_presentationSupraja_SMS_presentation
Supraja_SMS_presentation
 
ase-social-informatics (6)
ase-social-informatics (6)ase-social-informatics (6)
ase-social-informatics (6)
 
Social Network Analysis Applications and Approach
Social Network Analysis Applications and ApproachSocial Network Analysis Applications and Approach
Social Network Analysis Applications and Approach
 
Clarkson joshua white - ids testing - spie 2013 presentation - jsw - d1
Clarkson   joshua white - ids testing - spie 2013 presentation - jsw - d1Clarkson   joshua white - ids testing - spie 2013 presentation - jsw - d1
Clarkson joshua white - ids testing - spie 2013 presentation - jsw - d1
 
Malware bek slides 20131023 final
Malware bek slides 20131023 finalMalware bek slides 20131023 final
Malware bek slides 20131023 final
 
CSIAC - Social Media Analysis and Privacy
CSIAC - Social Media Analysis and PrivacyCSIAC - Social Media Analysis and Privacy
CSIAC - Social Media Analysis and Privacy
 
Clarkson - Joshua White - Research Proposal Presentation
Clarkson - Joshua White - Research Proposal PresentationClarkson - Joshua White - Research Proposal Presentation
Clarkson - Joshua White - Research Proposal Presentation
 
Coalmine spie 2012 presentation - jsw -d3
Coalmine   spie 2012 presentation - jsw -d3Coalmine   spie 2012 presentation - jsw -d3
Coalmine spie 2012 presentation - jsw -d3
 
Phishing spie 2012 presentation - jsw - d2
Phishing   spie 2012 presentation - jsw - d2Phishing   spie 2012 presentation - jsw - d2
Phishing spie 2012 presentation - jsw - d2
 
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
Physical Layer Optical Network Security Thesis Presentation To The CNY ISSA C...
 

Presentation - Application of Actor Level Social Characteristic Indicator Selection for the Precursory Detection of Bullies in Online Social Networks

  • 1. “Application of Actor Level Social Characteristic Indicator Selection for the Precursory Detection of Bullies in Online Social Networks” April 19th , 2016 Holly White, Jeremy Fields Robert Hall, Joshua White
  • 2. 2  Introduction  Background on Cyberbullying  Bullying Traits  Dataset Selection  Analysis – Pre-processing – Determining Negativity  Initial Results  Conclusion and Future Work  References / Contact Info. Overview
  • 3. 3  This work presents a precursory method for detection of “potential” bullies in social networks. We still have an unknown number of false positives that we have yet to quantify. Disclaimer
  • 4. 4  Cyberbully occurs globally and impacts people of all ages and walks of life – Effects include depression, low self-esteem, physical and psychological conditions and suicide (3,4) – Early detection can mitigate effects  Cyberbullying occurs within a wide range of technologies – Analyzing social media for cases of cyberbullying requires methods isolating key factors within large samples of data Introduction
  • 5. 5  Cyberbullying effects both victims and offenders (8) – victims are 1.9X more likely to attempt suicide – Offenders are 1.5X more – Attacks are personal & focus on sexuality, race, intelligence, and appearance  Courts insist schools have a legal & moral responsibility to take action – 49 states prohibit cyberbullying (8,9) – The Safe Schools Improvement Act will require all schools prohibit bullying to acquire funding – Dignity For All Students Act (NYS) (10) Cyberbullying
  • 6. 6 Cyberbullying  While there are numerous forms of cyberbullying, Chisolm created the top 11 – Catfishing – Use of MMOGs (Massive Multi-player Online Gaming-typical of males) – Material or messages dehumanizing, attacking, or threatening the target – Flaming (hostile & insulting) – Impersonating – Slamming (by-standers are crucial) – Ratting (utilization of victim's hardware) – Relational aggression (mean girl & by-standers) – Sexting (large repercussions) – Shock Trolling – Online Stalking
  • 7. 7  Aside from the chart below, cyberbullies are primarily teenaged and female (9)  Gender aside, bullies typically have low effective & cognitive empathy (13)  Bystanders play a major role (DASA) Bullying Traits
  • 8. 8  This work applies to many different social networks  In 2010 the Department of Homeland Security proposed classifications for social networks [17]  Twitter is Unique: – Allows for non-accepted Follower Relationships – 140 Character Limit – Easy Access API – * The Twitter Rules * Dataset Selection
  • 9. 9  Started with a series of political hashtags that were collected as part of a previous research project, researchers at SUNY Polytechnic collected 9Million+ tweets from the trickler API. Dataset Selection  This dataset is available upon request in full or summarized form, under a data sharing agreement. A complete summation of the dataset is also available in report form.
  • 10. 10  Build a process that can be highly parralellized using mapreduce  Reduce the dataset through various, easy to compute mechanisms  Eliminate as much “noise” as possible  High confidence selection of bullying messages Analysis Goals
  • 11. 11  Removal of Bots/SPAM/etc.  Plot (Entropy over Time) – Previous work showed messages scoring under 4.9 to be bots/SPAM 99% of the time – 325,396 messages removed from 189,263 accounts. Analysis [Entropy]
  • 12. 12  Analyzed 2 groups (Male, Female) – Assumption: Males more negatively polarized, • A. Sifferlin stated that men share more negative emotion online than women [21] • Our Findings: – (All Messages - Male Negative: 17.048%) – (All Messages - Female Negative 14.742%) – Difference (2.306%) Male Female Analysis [Polarity]
  • 13. 13  Next we analyzed negative messages directed at another user – Twitter denotes directed messages as @username – We found 725,572 messages were directed – Within this data we found a much smaller gender difference (0.55%) Analysis Cont.
  • 14. 14  We have not built the classifiers (discussed in future work) – Instead we set an arbitrary threshold for selection of potential bully accounts • Manual analysis shows accounts containing more than 4 negative messages directed at a particular user was a good threshold choice • 1,035 individuals fell into the 4 or more category • Sample messages from 1 such account are shown: Initial Results
  • 15. 15  Goal: Create a variable “real-time” threshold by training two probability based machine learning classifiers: – 1.) Assess negativity and “cruelty” of messages along with demographics of an individual compared to users of the same demographics – 2.) Compare the overall negativity and “cruelty” of an individual, to the amount of negativity and “cruelty” shown to a specific user Future Work / Next Steps
  • 16. 16  Despite our arbitrary threshold, our method located bullying within the dataset  This method shows potential as a tool to combat cyberbullying  We aim to enhance this capability  Planned future work will also create more “real- time” recognition of cyberbullying  Future work with Rutgers University under NSF grant is underway Conclusion