University of Oulu

Y. J. Foong and M. Oussalah, "Cyberbullying System Detection and Analysis," 2017 European Intelligence and Security Informatics Conference (EISIC), Athens, 2017, pp. 40-46. doi: 10.1109/EISIC.2017.43

Cyberbullying system detection and analysis

Saved in:
Author: Foong, Yee Jang1; Oussalah, Mourad2
Organizations: 1University of Birmingham, EECS, Edgbaston, Birmingham B15 2TT, UK
2Centre for Ubiquitous Computing, University of Oulu, 90014 Oulu, Finland
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 0.2 MB)
Persistent link:
Language: English
Published: Institute of Electrical and Electronics Engineers, 2017
Publish Date: 2020-03-24


Cyber-bullying has recently been reported as one that causes tremendous damage to society and economy. Advances in technology related to web-document annotation and the multiplicity of the online communities renders the detection and monitoring of such cases rather difficult and very challenging. This paper describes an online system for automatic detection and monitoring of Cyber-bullying cases from online forums and online communities. The system relies on the detection of three basic natural language components corresponding to Insults, Swears and Second Person. A classification system and ontology like reasoning have been employed to detect the occurrence of such entities in the forum/web documents, which would trigger a message to security in order to take appropriate action. The system has been tested on two distinct forums and achieves reasonable detection performances.

see all

ISBN: 978-1-5386-2385-5
ISBN Print: 978-1-5386-2386-2
Pages: 40 - 46
DOI: 10.1109/EISIC.2017.43
Host publication: 2017 European Intelligence and Security Informatics Conference (EISIC)
Conference: European Intelligence and Security Informatics Conference
Type of Publication: A4 Article in conference proceedings
Field of Science: 113 Computer and information sciences
Copyright information: © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.