252 results
Search Results
2. Revise and resubmit? Reviewing the 2019 Online Harms White Paper.
- Author
-
Nash, Victoria
- Subjects
- *
CYBERBULLYING , *INTERNET forums , *CLINICAL psychology , *GOVERNMENT policy , *ONLINE social networks , *CHILD psychology , *LEGAL liability - Abstract
Given the range and extent of problematic content and behaviour described in the OHWP, government concern and scrutiny is certainly merited. If we set aside the focus on harms or illegal content, the OHWP could instead be read as a manifesto for government-led platform governance. If viewed from a platform governance perspective, the most significant failing of the duty of care approach is that (at least as currently framed) it doesn't tackle the unique regulatory challenges posed by problematic behaviour and content on platforms. The proposed "duty of care" may in practice require procedural accountability on the part of platforms, but by choosing to target rhetorical simplicity over principles for good governance, it fails to provide a broad-ranging normative framework for platform governance that could truly set an international standard. [Extracted from the article]
- Published
- 2019
- Full Text
- View/download PDF
3. You Can Knock on the Doors and Windows of the University, but Nobody Will Care: How Universities Benefit from Network Silence around Gender-Based Violence.
- Author
-
Pilinkaite Sotirovic, Vilana, Lipinsky, Anke, Struzińska, Katarzyna, and Ranea-Triviño, Beatriz
- Subjects
- *
GENDER-based violence , *CYBERBULLYING , *VIOLENCE against women , *SEXUAL harassment , *HIGHER education , *POWER (Social sciences) , *REPUTATION - Abstract
This paper exposes the role of universities in creating silence around gender-based violence in higher education, drawing on narratives from 39 qualitative interviews with victims/survivors and bystanders about reporting incidents and experiences. In this paper, we extend concept of 'network silence' around sexual harassment to other forms of gender-based violence. Our research applies three components of the theoretical model of network silence, namely, self-silencing by victims/survivors, silencing, and not hearing by others, and analyses their contextual manifestations through the reporting experiences of victims/survivors and bystanders. This helps to identify the traits of the informal organisational structures and power dynamics, gendered attitudes, actors, and factors which facilitate silencing. The intersectional approach in our analysis of organisational contextual traits contributes to the research on inequality regimes in universities. The findings suggest that universities are making limited efforts to address silence around gender-based violence. We conclude that shared beliefs among the leadership about the reputation and prestige of the university facilitate the endurance of silence in universities. Our findings indicate reasons why universities fail to create spaces that are safe from gender-based violence. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. The Social Culture of Bullying: Exploring the Institutions of Family and School.
- Author
-
Singh, Shubham
- Subjects
- *
CYBERBULLYING , *BULLYING , *SCHOOL bullying , *SCHOOLBOYS , *CULTURE , *FAMILIES - Abstract
In the social cultural setup of the world, the differentiation between a man and a boy is almost universally established, with the man representing the evolved, comprehensive, mature and wise end of the spectrum, whereas the boy being the imperfect, meek, ignorant and premature organism. This polarity structures an acutely gendered concurrence, in that, a boy is always defined in a grown man's world with a lack that also characterizes the female species. The aggrandizing features and the cultural reinforcements of the masculine inadvertently lead to the genesis of a tendency to prioritize this trait as the most desirable and the negation of all that falls outside its predefined markers. With the onset of puberty and the appearances of physiological changes in the body, the young boys with a generous influence of these alterations, tend to assert their superiority over others through both open and covert forms of bullying, the latter often falling within the growing menace of the phenomenon of cyberbullying. This paper attempts to argue that the phenomenon of bullying is both infused and ingrained in the psyche of the young through the primary institutions in the society, that is, the family, the schools, the external world, even often without consciously aiming to do so. The paper charts out the concept of bullying in schools and makes an assessment of the various biological as well as socio-cultural influences which generate this tendency among school boys. Making use of psychosocial data and real-life examples, the paper also suggests how schools, teachers and parents, may tackle bullying by regarding it as a behavioural problem and adopting approaches that bring positive interpersonal connections. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Still a rite of passage? A perspective on current therapeutic attitudes and interventions in relation to cyberbullying.
- Author
-
Jones, Callum
- Subjects
- *
THERAPEUTICS , *ATTITUDE (Psychology) , *RITES & ceremonies , *VICTIM psychology , *SUPPORT groups , *CYBERBULLYING , *BULLYING , *MEDICAL education - Abstract
This paper examines cyberbullying concerning therapeutic interventions. A section on bullying and how bullying impacts the therapeutic environment is included. The author provides his definition of bullying to incorporate cyberbullying and how it is no longer a "new issue" but an evolving one. The current status of therapeutic interventions used to support victims of cyberbullying has been explored, emphasising their effectiveness in assisting those experiencing bullying. A segment has been implemented to comprehend whether practitioners fully understand the potential implications of cyberbullying on clients, whether bullying is still seen as a "rite of passage" and what the possible consequences of this could be. Peer interventions and support groups concerning cyberbullying have been referenced, including The KiVa Programme, the Shared Concern Method and The Circle of Friends Method. These have highlighted specific examples of therapeutic and nontherapeutic approaches to intervene with cyberbullying. A section on potential further training is presented for practitioners working within educational environments. Moreover, physical, psychological, sexual and relational bullying are discussed in the article when applicable, with the umbrella term "bullying" used to discuss all forms of bullying at once. The paper has uncovered two key messages: (1) cyberbullying requires more awareness in counselling and is no longer a new issue and (2) more extensive training is required to assist therapists to work with cyberbullying victims. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Nursing in the digital age: The role of nursing in addressing cyberbullying and adolescents mental health.
- Author
-
Amin, Shaimaa Mohamed, Mohamed, Marwa Ahmed El‐Sayed, Metwally El‐Sayed, Mona, and El‐Ashry, Ayman Mohamed
- Abstract
Accessible Summary The Relevance of Our Study to Mental Health Nursing What is known on the subject? What this paper adds to existing knowledge? What are the implications for practice? Summary Statement of Implications for Practice What Does This Research Add to Existing Knowledge of Cyberbullying Among Adolescents? What are the Implications of This New Knowledge for Nursing Care with Adolescents? How Could the Findings Influence Policy, Practice, Research, or Education? Background Methods Results Conclusion Patient or Public Contribution Implications for Nursing Practice The study's findings are crucial for mental health nursing, as they highlight the significant impact of cyberbullying on adolescents' mental health in Egypt. By establishing a clear link between cyberbullying, family income, and mental health issues such as anxiety, stress, and depression, the research underscores the need for targeted interventions and support systems. Mental health nurses can utilize this information to develop effective prevention and treatment strategies, advocate for policy changes, and educate families and communities. Addressing cyberbullying and its effects can lead to improved mental health outcomes, demonstrating the critical role of mental health nursing in supporting affected adolescents. This study brings attention to the widespread occurrence of cyberbullying among adolescents in Egypt and its substantial impact on their mental health. The research indicates that cyberbullying, along with family income, collectively explains more than 60% of the variation in mental health. These results underscore the importance of developing strategies to address cyberbullying and taking socioeconomic factors into account when addressing mental health issues in adolescents. School nurses should be knowledgeable about the prevalence and effects of cyberbullying on the mental well‐being of teenagers. They need to be equipped to recognize signs of cyberbullying and associated mental health issues, such as anxiety, depression, and stress. Educating adolescents, parents, and school staff about the dangers of cyberbullying and prevention methods is a crucial role that school nurses can play. This may involve teaching safe internet usage, promoting open communication about online experiences, and encouraging positive online behaviour. When evaluating mental health needs and planning care for adolescents, school nurses should consider their economic status. They should advocate for resources and assistance for low‐income families to help alleviate the impact of financial stress on mental health. It is important to introduce policies that provide financial support to families with lower incomes, as the research has shown a strong connection between a family's monthly income and its members' mental well‐being. Educational institutions, including schools, should introduce programs to prevent bullying, with a specific focus on cyberbullying. It would be beneficial for researchers to explore the effectiveness of various interventions in reducing cyberbullying and improving mental health outcomes. It is crucial to integrate education on cyberbullying into school curricula in order to raise awareness about this issue and to teach students how to respond if they or someone they know becomes a victim of cyberbullying. Educating parents and teachers about the indicators of cyberbullying and its potential impact on mental health is important so that they can offer support to adolescents who are experiencing cyberbullying. Further research is needed to address other covariates that could impact cyberbullying, such as addictive personality traits, impulsive seeking behaviours, and parenting styles. Cyberbullying, a significant concern in today's digital age, has a profound impact on teenagers' mental health, leading to stress, depression, anxiety, low self‐esteem, and, in severe cases, suicidal ideation. This study aimed to explore the effects of cyberbullying on adolescents' mental health.The study employed a cross‐sectional descriptive research design conducted at five public secondary schools in El‐Beheira governorate, Egypt. A total of 500 students were selected through a multistage sampling technique, yielding a response rate of 96%. The instruments used for data collection were the European Cyberbullying Intervention Project Questionnaire and the Depression Anxiety Stress Scale‐21.The findings revealed that 27.4% and 32.0% of respondents reported high levels of victimization and cyberaggression, respectively. Furthermore, 72.2%, 44%, and 52.6% of students exhibited severe to extremely severe levels of anxiety, stress, and depression, respectively. The study also found that cyberbullying and family monthly income accounted for 61.6% of the variance in stress, anxiety, and depressive symptoms (adjusted R2 = .614).The study concludes that cyberbullying is a prevalent issue among adolescents in Egypt, with a majority of students experiencing moderate to high levels of cybervictimization and aggression. This leads to varying degrees of anxiety, stress, and depression. The study also established a significant relationship between cyberbullying and mental health issues among adolescents. Moreover, both cyberbullying and family monthly income were found to significantly influence mental health, with higher levels of cyberbullying and lower income associated with increased stress, anxiety, and depressive symptoms.No Patient or Public Contribution.It is important for nurses working with adolescents to have an understanding of how common cyberbullying is and how it can affect mental health. They should receive training to be able to recognize signs of cyberbullying and mental health issues, such as anxiety, depression, and stress. Nurses can teach adolescents, parents, and school staff about its dangers and ways to prevent cyberbullying. This may involve educating adolescents on safe internet practices, promoting open communication about online experiences, and encouraging positive online behaviour. Lastly, considering the strong connection between income and mental health, nurses should also take into account the socioeconomic status of adolescents when assessing their mental health needs and planning care. They should work to secure resources and support for low‐income families to help alleviate the impact of financial stress on mental health. Additionally, further research is needed to address other covariates that could impact cyberbullying, such as addictive personality traits, impulsive seeking behaviours, and parenting styles. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Unravelling the mysteries of cyber incivility: a systematic review and research agenda.
- Author
-
Shahwar, Durrey and Dhar, Rajib Lochan
- Subjects
- *
OFFENSIVE behavior , *CYBERBULLYING , *DIGITAL technology , *CYBERCULTURE , *CYBERSPACE - Abstract
Purpose: The current digital work environment promoting a "constant-on" culture is a hotbed for cyber incivility. Thus, there is a pressing need to understand its mechanisms. This study aims to shed light on the triggers, sources and impact of rude behaviours in cyberspace. The authors also present the boundary conditions that exacerbate or alleviate the effects of such negative experiences. Design/methodology/approach: Through a systematic literature review based on predefined search protocols, the authors synthesised the current knowledge on cyber incivility and identified 21 peer-reviewed research articles. Findings: The findings reveal the different sources of cyber incivility, its personal, relational and organisational antecedents and consequences, and its personal and situational boundary conditions that curb or enhance the negative impact. Research limitations/implications: The authors unravel the main future research avenues based on the review findings by systemising knowledge on cyber incivility. Managerial efforts in the form of interventions and mitigation are also discussed to help combat this grieving issue in the workplace. Originality/value: This paper presents the first systematic review of the cyber incivility literature and identifies new avenues for future research. Scholars can expand upon the findings of this study to fill gaps and move the incivility in cyberspace forward. It also offers practical insights on mitigating the advancement of such behaviours in organisations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Authenticity and recognition: Theorising antiracist becomings and allyship in the time of COVID-19 and Black Lives Matter.
- Author
-
Mullard, Jordan CR
- Subjects
- *
BLACK Lives Matter movement , *ANTI-racism , *KILLINGS by police , *SOCIAL justice , *COVID-19 , *RECOGNITION (Psychology) , *CYBERBULLYING - Abstract
The confluence of the COVID-19 pandemic, the murder of George Floyd in America and a global Black Lives Matter response triggered anew the global struggle for racial justice. Using cyber, remote, and in-person ethnographic methods, this paper explores racial identity, allyship and processes of becoming during the spring and summer of 2020. Building on theories of 'the struggle for recognition', I situate becoming within the interplay of what I call epistemic, affective and reciprocal authenticity. Within this project, I address identity, redistribution and the reconfiguration of conceptual distinctions between justice and dignity. The analysis reflects a time of racial tension in a provincial Northeastern town in England, UK – a predominantly white and marginalised location. I amplify the personal testimonies, conversations and written words of three quite different activists to highlight the nuanced refractions of lived experience and a developing antiracism. These collaborators reveal how their antiracist becomings, in the light of 2020 events, incorporate affective, epistemic and reciprocal authenticities that bring to the fore new potentialities for racial justice, white allyship and recognition. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Africa united: exploring the fandoms around the African Men's Qatar 2022 World Cup teams among fans in Harare, Zimbabwe.
- Author
-
Chiweshe, Manase Kudzai
- Subjects
- *
SOCCER teams , *AFRICANS , *SOCIAL media , *NATIONAL sports teams , *SOCCER , *SOCCER fans , *ETHNICITY , *CYBERBULLYING - Abstract
Qatar 2022 World Cup provides a unique opportunity to explore how Zimbabwean football fans play out their 'Africanness' through supporting African teams. Most studies on transnational fandoms tend to focus on the growth of European football fandoms across the continent. Yet, there are transnational fandoms that are more regional and 'localized' to the continent. This paper uses the case of Zimbabwean soccer fans to explore these transnational fandoms within the context of supporting African teams at the Qatar World Cup. It utilized interviews with fans at various watching spaces during the competition and cyber ethnography focusing on the most popular social media sites related to Zimbabwean football. My main argument is that our understanding of transnational fandoms is enhanced by explaining the creation, recreation, celebration, and contestations related to supporting another African national football team. This is mainly because research has shown that football is intricately linked to national, ethnic, and social identities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Cognition and gender differences in cyberbullying in China: an investigation of textual cues and sentimental clues.
- Author
-
Li, Wanqi and Peng, Huaxin
- Subjects
- *
CYBERBULLYING , *GENDER differences (Psychology) , *GENDER differences (Sociology) , *SOCIAL media , *SOCIAL cognitive theory - Abstract
Purpose: Cyberbullying is a globally pervasive problem and not novel in academia. Previous studies mainly focussed on the features, consequences and technological management of cyberbullying. However, most of the studies took cyberbullying examples in the West, and some issues still need to be addressed in the Chinese context. Thus, this study investigates how participants use cyberbullying words and why they use them in that particular way in China. Design/methodology/approach: This study uses content analysis to summarise the typical features of cyberbullying words, revealing a positive relationship between cyberbullying words and sentimental expressions. This paper also uses the questionnaire (N = 705) to explore the prevalence of cyberbullying among Chinese Internet users and to compare the gender differences in the cognition of cyberbullying words and involvement in cyberbullying, in line with the social cognitive theory. Findings: This study stated that people prefer repetitively using offensive words to achieve cyberbullying goals. Interestingly, this study does not find obvious gender differences in cyberbullying roles and cyberbullying language use. However, it explained the relationship between cognition and the use of cyberbullying words from a gender perspective. Practical implications: Theoretically, this study expands cyberbullying studies into a new cultural environment, pointing to a novel term, "imbalanced relation," for exploring cyberbullying behaviours. This study highlights the significance of technology and education in detecting and preventing cyberbullying, suggesting that educators and social media platforms can directly predict and prevent cyberbullying through textual perspectives and individuals' cognition of cyberbullying. Originality/value: This study aims to examine cyberbullying linguistic and emotional features and individual differences in cyberbullying behaviour in a high-context culture like China. Its values include comparing the differences between cyberbullying in China and cyberbullying in the West from the linguistic and cultural directions and reconsidering the "power imbalance" feature of cyberbullying. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. "GREETINGS FROM HELL (NERAKA KIRIM SALAM)": A DISCOURSE ANALYSIS OF RELIGIOUS-BASED CYBERBULLYING OF DEHIJABIS.
- Author
-
Rosidi, Nur Syifaa and Mohamad Jamil, Siti Nurnadilla
- Subjects
- *
CYBERBULLYING , *DISCOURSE analysis , *ARABIC language , *SALUTATIONS , *HIJAB (Islamic clothing) , *LIBEL & slander - Abstract
Background and Purpose: Many studies have been conducted on cyberbullying discourse in Malaysia, but religious-based cyberbullying discourse has received comparatively less attention. Malaysia's second place ranking in cyberbullying practices among Asian countries in 2018 is striking, and it is worth highlighting that many public figures in the country have encountered cyberbullying upon deciding to remove their hijab. This paper examines how the first dehijabed Instagram posts by local celebrities, Uqasha Senrose, Emma Maembong and Liyana Jasmay incited religious-based cyberbullying. Methodology: This paper employs a mixed-methods approach. We examined the initial postdehijabbing captions, along with a total of 300 comments on these posts. Through a two-tiered coding and categorization process, we identified 168 religious-based comments containing religious-related terminologies, Arabic expressions, Quranic verses, and Hadith. From this subset, 70 of them exhibit cyberbullying characteristics: Defamation, Defense, Encouragement, Exclusion, Sexual Talk, Insult and Threat/Blackmail. The most prevalent categories, Insult (n=29) and Threat/Blackmail (n=18) were further qualitatively analysed using Laclau and Mouffe's discourse framework and Halliday's transitivity analysis. Findings: The findings reveal that public figures who have removed their hijab have created a hegemonic intervention that challenges Malay Muslim hegemonic practice. Meanwhile, cyberbullies have created a hegemonic closure to counter the hegemonic intervention created by the dehijabed celebrities through the implementation of "Insult" and "Threat". Nevertheless, the effects of the hegemonic closure, which involves the stabilization of myths as objective reality and the rearticulation of the transgressors' identities as the sinners, have reproduced the power imbalance between the dominant group and the antagonists. Contributions: This paper demonstrated that while such practices allow cyberbullies to reinforce their dominance and hegemonic practices by manipulating religion, it is crucial to problematize religiousbased cyberbullying discourse as yet another form of hegemonic intervention that appears to be a natural articulation in contemporary discourse. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering.
- Author
-
AKYEŞİLMEN, Nezir and ALHOSBAN, Amal
- Subjects
- *
SOCIAL engineering (Fraud) , *INTERNET fraud , *CYBERTERRORISM , *UNITED States presidential election, 2016 , *DIGITAL technology , *CYBERBULLYING , *PHISHING - Abstract
This paper aims to provide an overview of social engineering attacks, and their impacts on cybersecurity, including national and international security, and figures out detection techniques, and major methods for countermeasure. How do social engineering attacks affect national and international security? And why is it so hard to cope with them? Seeking for answers to these questions, this paper applies qualitative research methods particularly literature review and case analysis. While qualitative research methods are predominantly employed, quantitative methods will also be utilized when deemed essential. Social engineering attacks, also referred to as online fraud, are a type of attack that typically necessitates minimal or no technical knowledge. Social engineering attacks, instead benefit from the weaknesses and mistakes of individuals, since the user is accepted as the weakest link in cybersecurity. Many studies have shown that the vast majority of successful cyber-attacks in the digital world are social engineering (SE) because countering them is more difficult than countering technical cyber-attacks. Based on the analysis of some major cyber-attacks such as the intervention in the 2016 US Presidential elections, the hacking of CIA director, John Brennan in 2015, and Stuxnet in 2010, the paper figures out that social engineering attacks have a tremendous impact on cybersecurity on the individual, institutional, societal, national, and international levels. Penetration tests and training for raising awareness are the prolific ways to mitigate social engineering attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Social Media Political Information Use and Political Participation of the Net Generation.
- Author
-
Jue Jun Tan
- Subjects
- *
POLITICAL participation , *MASS media & politics , *MILLENNIALS , *SOCIAL media , *CYBERBULLYING , *POLITICAL knowledge - Abstract
Given the pervasiveness of social media in our contemporary communication environment, this paper explored the aptitude of social media use for political information in empowering the wired youth with more diverse political information which is deemed as key precursor of political participation. To be more specific, this paper examined how the utilisation of political information on social media predicts political knowledge, political efficacy, and different modes of political participation (offline, online, and cyber) of the Net Generation. There were 379 Malaysian students aged between 18 and 24, who depend extensively on social media platforms as their primary reservoir of political news and information took part in a selfadministered online survey questionnaire. Among the key findings of the current study are: (i) political informational use of social media predicts political efficacy but not political knowledge; (ii) political informational use of social media predicts offline, online, and cyber political participation via political efficacy; (iii) political knowledge does not predict political participation; meanwhile (iv) political efficacy predicts political participation. All in all, political informational use of social media holds the most potent positive effect on political efficacy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. "Beauty Ideals" from a Christian, Educational and Media Perspective: Dangers, Challenges and Opportunities in the Croatian Educational System.
- Author
-
Labaš, Danijel, Ciboci Perša, Lana, and Uldrijan, Ivan
- Subjects
- *
CYBERBULLYING , *TEACHING aids , *CROATIAN language , *CHILD behavior , *RELIGIOUS education , *CATHOLIC education - Abstract
Today's children are growing up and spending most of their free time with media, especially social networks, on which various lifestyles are imposed every day, including ideals of beauty that are often based on physical appearance and far from authentic images of the observed object. In this paper, it is shown how the topic of beauty is presented throughout the history of art, with a special focus on the presentation of beauty in theology. Additionally, the paper investigates how much the topic of beauty is treated within the Croatian formal education system, with a particular emphasis on the representation of beauty and to what extent children are prepared to critically evaluate the representation of beauty in different types of media, but also to reflect on the potential impact of such content on themselves. Research has shown that most such content is present in the subjects of Visual Culture, Visual Arts, Croatian Language and Informatics. The paper also presents such contents in the Catholic religious education curricula. In addition to imposed media ideals of beauty affecting childrens' self-confidence, they are often the subject of peer violence, especially in the virtual world. Specifically, humiliation based on physical appearance is a common form of cyberbullying. To determine how physical appearance is used in such unacceptable behavior among children, all the posts that have arrived on UHO, the first online platform for the prevention of cyberbullying in Croatia, were analyzed. Research has shown that girls report such forms of abuse more often than boys, that cyberbullying based on appearance most often occurs inside closed groups or private messages rather than publicly on social networks, and that children rarely report to adults that they are the victims of such forms of violence. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Non-Kinetic Warfare and Technological Advancements: An Overview.
- Author
-
Gautam, Aashriti
- Subjects
- *
TECHNOLOGICAL innovations , *MILITARY science , *INFORMATION warfare , *TECHNOLOGICAL progress , *HIGH technology , *CYBERTERRORISM , *CYBERBULLYING - Abstract
The paper argues that, in light of the changing warfare dynamics and tactics globally, the concept of non-kinetic warfare has increased the significance of advanced technology in a country's defense sector. Using instances from the ongoing Russia-Ukraine crisis, the chapter further elucidates the emergence of non-kinetic warfare capabilities, particularly cyber warfare, as a new battlefield game-changer. Additionally, drawing inspiration from the technological progress in cyber warfare on a global scale, it is my argument that India should prioritize the development of non-kinetic warfare capabilities, considering the cyber dangers it encounters due to the China-Pakistan Nexus. In this context, a comprehensive, multifaceted strategy to counter threats posed by low-cost and low-tech to high-cost and specialized technologies is paramount for India. Against this background, the paper has been divided into four sections. The first reviews the existing literature about non-kinetic warfare. The second section examines the growth of non-kinetic warfare capabilities, with a particular focus on cyber warfare as a new battlefield game-changer. This analysis draws upon examples derived from the ongoing Russia-Ukraine issue, specifically highlighting Russia's utilization of cyber and information warfare capabilities against Ukraine. Given the global strides in cyber warfare, the third section focuses on the cyber threats faced by India because of the China-Pakistan Nexus. The final section represents the main conclusions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Explicating Evolutionary Epistemological Concerns on Gossip and Cyberbullying.
- Author
-
Choudhuri, Abhramika and Saraswat, Lalit
- Subjects
- *
GOSSIP , *CYBERBULLYING , *SOCIAL order , *VIRTUAL reality , *BULLYING - Abstract
Gossip and bullying have psychosocial concerns and are usually considered as vice, bad, hence, non-virtuous. This paper deals with a plausible modest account for them to be considered not as bad, rather significant behavioral and epistemic tools from evolutionary and epistemological points of view. It adheres to a relationship between gossip and bullying in real (sociobiological-psychological domains) and within cyberspaces. Considering the formation of social relations and orders in reality and virtual platforms, it attempts to understand the issues and advantages gossip poses to societies from a reputational perspective. While evolutionary explanations of complex social behavior are not only difficult, but controversial too, this paper aims to present an evolutionary epistemological perspective to the act of gossiping, to understand the vantage it may have or provide. Usually, gossip and bullying are considered as having a negative connotation, but these are explicated as epistemic access tools for regulation, social order, knowledge gain, and niche construction. Consequently, gossip is showcased as an evolutionary epistemic achievement and virtuous enough to deal with the partly unknown features of the World. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Cyberbullying detection on social networking sites using BERT transformer.
- Author
-
Saini, Hiteshi, Mehra, Himashri, and Arya, Greeshma
- Subjects
- *
ONLINE social networks , *CYBERBULLYING , *TECHNOLOGICAL innovations , *VIRTUAL communities , *SUICIDAL ideation - Abstract
Technological advancements have increased the amount of people using online social networking sites, which has led to an increase in cyberbullying. Online Social Networking sites provide a vast network for bullies to attack victims. Cyberbullying is a catch-all phrase for a wide range of online abuse, including but not limited to harassment, doxing and reputation assaults. These attacks often leave permanent mental scar(s) on the victim(s), which leads to drastic measures like depression, self-harm and suicidal thoughts. Given the consequences of cyberbullying, there is a dire need to take action against such crimes and to prevent them. This paper proposes a novel architecture to efficiently detect cyberbullying pattern. The proposed architecture utilizes the pre-trained model BERT to detect cyberbullying behavior on online platforms. The proposed models were tested on dataset taken from Kaggle and achieved accuracy of 80 percent. This paper provides a thorough examination of the various methodologies used for cyberbullying detection. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
18. A conceptual framework for mobile-based cyberbullying-related youth suicide risk screening and intervention.
- Author
-
Kim, Sangmi
- Abstract
The prevalence of cyberbullying and related suicide rate increases among youth demand a proactive and systematic response. This paper proposes a mobile-based Framework for Youth Suicide Screening and intervention (YSSI) to address the issue of youth suicide within the cyber environment. It draws on Vygotsky’s sociocultural theory to understand the developmental stages of youth and employs Durkheim’s concept of anomic suicide to frame suicide due to cyberbullying as a social fact that extends beyond individual problems. Additionally, the framework invokes Friedrich Engels’ concept of social murder to highlight the urgent social responsibility of preventing youth suicide. The YSSI framework is designed for early detection and intervention, with mobile technology as a primary tool. It encompasses four stages: Stage 1 (Warning Signs), Stage 2 (Assessment), Stage 3 (Intervention), and Stage 4 (Follow-up). This framework emphasizes the critical role of community and family engagement in addressing youth suicide in the digital era. This engagement aims to provide support and guidance to youth, thereby strengthening their resilience to adversity associated with cyberbullying. In alignment with the objectives of the Grand Challenge for Social Work Initiative (GCSWI), the YSSI framework is dedicated to mitigating the negative effects of cyberbullying through collaborative social engagement and fostering a critical discourse on youth mental health and cyber well-being. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. State Repression and Opposition Survival in Pinochet's Chile.
- Author
-
Amat, Consuelo
- Subjects
- *
POLITICAL persecution , *VICTIMIZATION rates , *SURVIVAL rate , *DICTATORSHIP , *CYBERBULLYING - Abstract
Why do some groups survive government repression while others get eliminated? This paper offers a corrective to the widely held theory that locally embedded opposition organizations with large and interconnected networks of civilian supporters are better adapted to survive. It argues that extreme and selective violent repression from a capable state requires strict compartmentalization and social detachment. These measures slow the speed and reach of repression. I test these propositions by examining the top targets of the Pinochet dictatorship in Chile. Cross-checking individuals on the Pinochet's target lists against the victims lists, the article shows that the Revolutionary Leftist Movement (MIR) had a significantly lower rate of victimization than the other top targets. Archival and interview data demonstrate that MIR's higher survival rate is due to the mechanisms proposed. This study renders intended repression observable and offers implications for the survival of a wide range of actors. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Patriarchal Masculinities and Cyberbullying on Facebook: Unraveling Interconnections and Implications in the Context of Bangladesh.
- Author
-
Islam, Lamia
- Subjects
- *
PATRIARCHY , *MASCULINITY , *CYBERBULLYING - Abstract
The study analyzes three major cyberbullying incidents that occurred on Facebook between 2019 and 2020 to understand how the practices of patriarchal masculinities are involved in cyberbullying. The research employs the "4I's framework" of UN Women to understand the relationship between cyberbullying and different levels of patriarchal masculinities, the internal, interpersonal, institutional, and ideological. The official Facebook page of the Daily Prothom Alo, one of the most popular newspapers in Bangladesh, has been considered for collecting and analyzing the contents. The reason for selecting the official Facebook page of the newspaper for data collection is the availability of comment threads of Facebook users in the public domain on particular cyberbullying incidents. The paper's significant findings reveal that victim blaming, demeaning women and girls, and institutional steps undertaken to ensure justice for the victims are the main attributes that construct the dominant community opinion online. In this context, ideas and practices of internal and ideological patriarchal masculinities characterized by the misogynist attitudes are the new ways to normalize and legitimize sexual assault, physical assault, and humiliation of women and girls, which ultimately contributes to the escalation of cyberbullying. The research also uncovers positive discourse initiated by social media users aimed at promoting awareness against the practices of patriarchal masculinities which exacerbatetendencies such as—victim blaming, slut-shaming, rape culture, and demeaning women and girls. The study concludes by offering recommendations to protect women and girls from cyberbullying encompassing awareness programs, improvement in reporting and blocking functionalities on social media platforms, and the strengthening of image processing and filtering mechanisms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Data Augmentation for Improving Explainability of Hate Speech Detection.
- Author
-
Ansari, Gunjan, Kaur, Parmeet, and Saxena, Chandni
- Subjects
- *
DEEP learning , *LANGUAGE models , *DATA augmentation , *HATE speech , *NATURAL language processing , *CONVOLUTIONAL neural networks - Abstract
The paper presents a novel data augmentation-based approach to develop explainable, deep learning models for hate speech detection. Hate speech is widely prevalent on online social media but difficult to detect automatically due to challenges of natural language processing and complexity of hate speech. Further, the decisions of the existing solutions possess constrained explainability since limited annotated data are available for training and testing of models. Therefore, this work proposes the use of text-based data augmentation for improving the performance and explainability of deep learning models. Techniques based on easy data augmentation, bidirectional encoder representations from transformers and back translation have been utilized for data augmentation. Convolutional neural networks and long short-term memory models are trained with augmented data and evaluated on two publicly available datasets for hate speech detection. Methods of LIME and integrated gradients are used to retrieve explanations of the deep learning models. A diagnostic study is conducted on test samples to check for improvement in the models as a result of the data augmentation. The experimental results verify that the proposed approach improves the explainability as well as the accuracy of hate speech detection. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. The impact of cyber entrepreneurship education on Chinese college students' self-efficacy and intention in cyber entrepreneurship.
- Author
-
Li, Yue
- Subjects
- *
CYBERBULLYING , *HIGHER education , *SELF-efficacy in students , *REGULATORY focus theory , *BUSINESS students ,ENTREPRENEURSHIP education - Abstract
Purpose: This paper aims to investigate the effects of four types of cyber entrepreneurship courses on entrepreneurial self-efficacy (ESE) and intention. It is based on Social Cognitive Theory and Regulatory Focus Theory, which takes Chinese college students as the research objects. Design/methodology/approach: Approximately 101 senior business school students who had participated in all cyber entrepreneurship courses were selected to complete the horizontal analysis. Approximately 317 students from different grades who had participated in different cyber entrepreneurship courses were selected for the multi-group analysis (MGA) for the longitudinal comparison. Findings: The results show that different cyber entrepreneurship courses may trigger Chinese students' positive or defensive mechanisms for cyber entrepreneurship and affect their ESE and intentions. The impact of cyber entrepreneurship theoretical courses on Chinese students' entrepreneurial intentions is not significant, and self-efficacy has no mediating effect between cyber entrepreneurial theory courses and intentions. Originality/value: This study helps teachers and policymakers to better understand the impacts of cyber entrepreneurship courses and to adopt proper teaching contents and methods for diversity goals. It also has reference value in theoretical and practical perspectives. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Too much information: exploring technology-mediated abuse in higher education online learning and teaching spaces resulting from COVID-19 and emergency remote education.
- Author
-
Bovill, Helen
- Subjects
- *
DISTANCE education , *COVID-19 pandemic , *CYBERBULLYING , *BLENDED learning , *DIGITAL technology - Abstract
During COVID-19, universities across the globe experienced a rapid requirement to move to online learning and teaching provision. This rapid move has been explored as emergency remote education (ERE). This paper reviews and presents some emerging literature regarding ERE, demonstrating how this created an environment where technology-mediated abuse could arise within the university context. Intentional and unintentional forms of technology-mediated abuse, within a global context, are considered with account of how intersectional characteristics can impact. The paper concludes with a set of provocations explored within an example framework. The provocations are given to situate ways of thinking which are facilitative of safer and more respectful use of technological spaces. Both the provocations and example framework aim to be useful critical tools for program and module teams to adapt in higher education institutions within the online sphere. The phenomenon of ERE is an opportunity to consider what can be learned with regard to management of technology-mediated abuse. However, a focus on ERE presents limitations in the paper because of the smaller number of academic sources at this time, due to recency of the COVID-19 pandemic. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. The effect of rebalancing techniques on the classification performance in cyberbullying datasets.
- Author
-
Khairy, Marwa, Mahmoud, Tarek M., and Abd-El-Hafeez, Tarek
- Subjects
- *
CYBERBULLYING , *MACHINE learning , *CLASSIFICATION algorithms , *RESEARCH personnel , *NAIVE Bayes classification , *CLASSIFICATION - Abstract
Cyberbullying detection systems rely increasingly on machine learning techniques. However, class imbalance in cyberbullying datasets, where the percentage of normal labeled classes is higher than that of abnormal labeled ones, presents a significant challenge for classification algorithms. This issue is particularly problematic in two-class datasets, where conventional machine learning methods tend to perform poorly on minority class samples due to the influence of the majority class. To address this problem, researchers have proposed various oversampling and undersampling techniques. In this paper, we investigate the effectiveness of such techniques in addressing class imbalance in cyberbullying datasets. We conduct an experimental study that involves a preprocessing step to enhance machine learning algorithm performance. We then examine the impact of imbalanced data on classification performance for four cyberbullying datasets. To study the classification performance on balanced cyberbullying datasets, we employ four resampling techniques, namely random undersampling, random oversampling, SMOTE, and SMOTE + TOMEK. We evaluate the impact of each rebalancing technique on classification performance using eight well-known classification algorithms. Our findings demonstrate that the performance of resampling techniques depends on the dataset size, imbalance ratio, and classifier used. The conducted experiments proved that there are no techniques that will always perform better the others. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Network bullying detection based on deep learning.
- Author
-
Liu, Mengran
- Subjects
- *
DEEP learning , *ONLINE social networks , *BULLYING , *CYBERBULLYING , *SOCIAL networks , *NATURAL languages - Abstract
The rise of social networking in today's society has brought convenience to people's lives, but at the same time people are also suffering from cyberbullying. How to check these bullying languages has become a popular problem. As text is an important vehicle for online social networking, the natural language learning, representation, and training becomes a necessary work for cyberbullying detection. In this paper, we summarize and analyze the existing work by studying it, and then finally propose new ideas and experiments. The specific method is based on the LSTM model, in which the parameters and dimensions are adjusted to demonstrate the best results of the model. And a user rating system is used to detect bullying more effectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Shifting Mindsets; A Critical Commentary on Child Protection and Welfare, Disability, and Online Risk Through Critical Literature Review.
- Author
-
Doolan Maher, Rose, Flynn, Susan, and Byrne, Julie
- Subjects
- *
CHILD welfare , *CYBERBULLYING , *DATA protection , *CHILDREN with disabilities , *INTERNET content - Abstract
Critical commentary is presented at the complex intersection of child protection and welfare, disability, and internet use. A profound lack of research exists on this topic. Findings from a critical literature review focus on the theme of online risk which included the topic of child abuse/online solicitation, cyber victimization/cyberbullying, problematic internet use, and breach of data protection. The approach taken to review literature was adopted from Aromataris and Pearson (2014). Disabled young people are exposed to and impacted by harmful online content. Key points, and online resources are highlighted for parents and guardians of disabled children, social care practitioners, safeguarding professionals, and educators. This paper attempts to advance scholarly discourse, policy, and practice, the authors arguing that it is time to shift our mindsets about safeguarding disabled young people online from thoughtful attention to purposeful action. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Psychometric Properties of a Cyberaggression Measure in Mexican Students.
- Author
-
Navarro-Rodríguez, Christián Denisse, Bauman, Sheri, Vera Noriega, José Ángel, and Lagarda Lagarda, Angel Emigdio
- Subjects
- *
PSYCHOMETRICS , *TEST reliability , *TEST validity , *TEENAGERS - Abstract
Cyberaggression is an important problem today; it can affect adolescents in different ways. Therefore, reliable and valid measures are necessary to better study the phenomenon. The aim of the present study was to generate validity and reliability evidence for a Spanish-language cyberaggression scale from Garaigordobil, (2017) in a population of 1695 adolescents from northwestern Mexico (51.5% female) between 12- and 15-years-of-age. The results of this study contribute to the research and focus on cyberaggression in adolescents in Mexico. The measure used in this paper detects the different roles, including the bystander, rigorously testing the reliability and validity of the measure, providing a solid tool to evaluate cyberaggression in the Mexican context and guide evidence-based interventions and policies in educational settings. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Iranian Women Traveling in vTime: A Cyberfeminist Approach.
- Author
-
Kiani, Mahtab, Tavakoli, Rokhshad, and Mura, Paolo
- Subjects
- *
IRANIANS , *WOMEN travelers , *SELF-expression , *HARASSMENT , *WOMEN'S empowerment , *CYBERBULLYING , *VIRTUAL tourism , *VIRTUAL reality - Abstract
Informed by a cyberfeminist standpoint, this paper explores the role of cyberworlds and virtual tourism in providing less constrained and more liberating traveling experiences for women. More specifically, through interviews with a group of Iranian women traveling in a virtual world known as vTime, this work discusses whether and how virtual tourist experiences allow women to overcome their travel-related constraints and pave the way to forms of self-determination and emancipation. In contrast, several feminists hold utopian and dystopian views regarding the benefits of the Internet and technology for women's empowerment, and the findings of our study point to a rather complex and less encouraging scenario. Virtual tourism in cyberspace allows Iranian women to overcome constraints affecting their traveling experiences. Nevertheless, it is far from a liberating experience as women's self-expression and activities are restricted and limited by patriarchy-driven concerns about surveillance, legal consequences, harassment, social stigma, and western dominance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Digital Forensics in Cyber Security and Its Impact on Developing Countries.
- Author
-
Khalid, Bassam, Khalid, Assma'a, Ali, Jamal, Hussein, Mohammed, Shoaai, Mohammed, Faisal, Mohammed, and Qaid, Mohammed
- Subjects
- *
DIGITAL forensics , *INTERNET security , *COMPUTER security , *DIGITAL technology , *CYBERTERRORISM , *CYBERBULLYING ,DEVELOPING countries - Abstract
The proliferation of cloud computing and the introduction of Web technologies and the significant development in the digital technologies led to the connectivity of states and nations (developed and developing countries) worldwide in which global network provide platform for the connection. Digital forensics is a field of computer security that uses software applications and standard guidelines which support the extraction of evidences from any computer appliances which are perfectly enough for the court of law to use and make a judgment based on the authenticity and objectivity of the information obtained. This work aims to study the importance of digital forensics in cyber security and its impact on developing countries and shows the tremendous growth of cyber threats and attacks in them. A systematic survey method was used for research papers in this field. As a consequence, researchers have called for the need to develop digital forensics skills in South Africa through university programs, have associated training courses, and evaluate the extent to which the current cyber security awareness initiatives address cyber security threats and risks. In most parts of the world today, especially in developing countries where computers and other digital devices are used daily on the Internet for excessive fraudulent activities, this will help eliminate and minimize computer-related crimes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
30. A NEUROPSYCHOPEDAGOGICAL TRAINING FOR ADOLESCENTS: AN EXPLORATORY STUDY ON SELF-COMPASSION AND DETECTION OF BULLYING EPISODES.
- Author
-
Di Giuseppe, Tania, Serantoni, Grazia, Anella, Sandro, Vianello, Francesca, Perasso, Giulia, Lillo, Carmela, Maculan, Alessandro, and Paoletti, Patrizio
- Subjects
- *
CYBERBULLYING , *BULLYING , *TEENAGERS , *ITALIANS , *COVID-19 pandemic , *MENTAL health - Abstract
The COVID-19 pandemic influenced adolescents' psychological wellbeing and the frequency of bullying and cyberbullying. Literature highlights that self-compassion could protect adolescents' mental health. In the present study, the impact of the neuropsychopedagogical training Envisioning the Future (EF) on adolescents is investigated. Three-hundred and fourteen (N=314) Italian adolescents (59% females; Mean age=15.41 years, SD=1.94) answered an online questionnaire in two stages, at the beginning (t1) and end (t2) of EF. The questionnaire included the Self-Compassion Scale (Neff, 2003; Veneziani et al., 2017) and two ad-hoc items on the perceived frequency of bullying and cyberbullying episodes among peers (0=never to 4=once a day). Data were analyzed using paired sample t-tests with frequentist and Bayesian approaches. From pre-to post-EF, frequentist t-tests reveal an increase in self-kindness t(314)=-2.68, p=.008, common humanity t(313)=-3.76, p<.001, frequency with which adolescents perceive bullying t(313)=-8.9, p<.001 and cyberbullying t(313)=-5.22, p<.001. Bayesian t-tests corroborate the results, revealing extreme evidence (BF10<100) of an increase in the perceived frequency of bullying and cyberbullying, strong evidence (30
- Published
- 2023
31. Cyberbullying in the workplace: a novel framework of routine activities and organizational control.
- Author
-
Oguz, Abdullah, Mehta, Nikhil, and Palvia, Prashant
- Subjects
- *
CYBERBULLYING , *INFORMATION & communication technologies - Abstract
Purpose: This study aims to develop a unified theoretical framework that presents a cohesive picture of workplace cyberbullying to better understand the interplay between cyberbullying, its effects on organizations and organizational controls enacted to contain these effects. Design/methodology/approach: The study conducts a theoretical review of the workplace cyberbullying literature between 2005 and 2021 drawing upon existing literature and two important theories, the routine activities theory and control theory. The final sample of 54 empirical papers represents a comprehensive body of literature on cyberbullying published across various disciplines. Findings: A theoretical model of workplace cyberbullying is developed, which highlights major antecedents to workplace cyberbullying and its impact on individual employees as well as organizations. Originality/value: As firms increasingly rely on information and communication technologies (ICTs), the misuse of ICTs in the form of cyberbullying is also increasing. Workplace cyberbullying severely hurts an organization's employees and compromises the efficacy of its information systems. Fortunately, various controls can be utilized by firms to minimize workplace cyberbullying and its attendant costs. In all, eleven propositions are offered, providing a robust agenda for future research. The authors also offer insights for practitioners on how to minimize cyberbullying in the workplace and its damaging effects. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
32. ‘Maddie is Online’: A Creative Learning Path to Digital Literacy for Young People.
- Author
-
Martzoukou, Konstantina, Panayiotakis, Ioannis, Herbert, Nicholas, Grey, Emma, and MacDonald, Niall
- Abstract
Abstract This paper explores young people’s development of digital literacy and resilience and discusses how teachers and librarians can play an important role in supporting young people to become digital citizens: informed, active, ethical, safe and responsible members of the online society. The research involved the delivery and evaluation of an interactive educational workshops that included an online cartoon series, accompanied by openly available educational toolkits dealing with topics of online resilience and safety in the online environment. The research involved a total of 239 secondary school pupils, across six schools and within a single local authority in Scotland. Anonymous qualitative and quantitative data were collected from the learning activities, which related to young people’s experiences, coping strategies and emotions in the online environment. The workshops empowered young people to open dialogue about challenging situations they experience in their everyday online connectivity and express their needs for further training. This work presents an innovative constructivist learning approach that can be replicated with young people to explore multiple challenges and opportunities they may encounter when navigating their online environment. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
33. Personality and emotion based cyberbullying detection on YouTube using ensemble classifiers.
- Author
-
Balakrishnan, Vimala and Ng, See Kiat
- Subjects
- *
PREVENTION of cyberbullying , *PERSONALITY , *SOCIAL media , *PSYCHOLOGY , *LANGUAGE & languages , *RANDOM forest algorithms , *COMMUNICATION , *THEORY , *CONCEPTUAL models , *DESCRIPTIVE statistics , *EMOTIONS , *CYBERBULLYING , *TEXT messages , *PSYCHOLOGICAL adaptation - Abstract
This paper investigates the effect of users' personality traits and emotions expressed through textual communications on YouTube to detect cyberbullying using a series of ensemble classifiers. Personality traits were determined using the Big Five model whereas emotions were based on Ekman's basic emotion theory. Annotated YouTube textual comments in English (N = 5152; i.e. 2576 number of bullying versus 2576 non-bullying instances) were used to detect cyberbullying incidents using several ensemble classifiers, including Random Forest and AdaBoost. Performance metrics revealed both personality traits and emotion to significantly improve the identification of cyberbullying presence, with accuracy and F-score values of more than 95%. Further fine-grained analysis revealed anger and openness to be more profound compared to other emotions and personalities. Further, neurotic individuals tend to be driven to cyberbullying by joy, disgust and fear. The findings show that personality and emotions play pertinent roles in cyberbullying, and the identification of specific traits and emotions can help in designing a more strategic intervention programme. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. Cyberbullying Detection on Social Media Using Stacking Ensemble Learning and Enhanced BERT.
- Author
-
Muneer, Amgad, Alwadain, Ayed, Ragab, Mohammed Gamal, and Alqushaibi, Alawi
- Subjects
- *
CYBERBULLYING , *LANGUAGE models , *SOCIAL media , *NATURAL language processing , *FEATURE extraction - Abstract
The prevalence of cyberbullying on Social Media (SM) platforms has become a significant concern for individuals, organizations, and society as a whole. The early detection and intervention of cyberbullying on social media are critical to mitigating its harmful effects. In recent years, ensemble learning has shown promising results for detecting cyberbullying on social media. This paper presents an ensemble stacking learning approach for detecting cyberbullying on Twitter using a combination of Deep Neural Network methods (DNNs). It also introduces BERT-M, a modified BERT model. The dataset used in this study was collected from Twitter and preprocessed to remove irrelevant information. The feature extraction process involved utilizing word2vec with Continuous Bag of Words (CBOW) to form the weights in the embedding layer. These features were then fed into a convolutional and pooling mechanism, effectively reducing their dimensionality, and capturing the position-invariant characteristics of the offensive words. The validation of the proposed stacked model and BERT-M was performed using well-known model evaluation measures. The stacked model achieved an F1-score of 0.964, precision of 0.950, recall of 0.92 and the detection time reported was 3 min, which surpasses the previously reported accuracy and speed scores for all known NLP detectors of cyberbullying, including standard BERT and BERT-M. The results of the experiment showed that the stacking ensemble learning approach achieved an accuracy of 97.4% in detecting cyberbullying on Twitter dataset and 90.97% on combined Twitter and Facebook dataset. The results demonstrate the effectiveness of the proposed stacking ensemble learning approach in detecting cyberbullying on SM and highlight the importance of combining multiple models for improved performance. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
35. Development of Technologies for the Detection of (Cyber)Bullying Actions: The BullyBuster Project.
- Author
-
Orrù, Giulia, Galli, Antonio, Gattulli, Vincenzo, Gravina, Michela, Micheletto, Marco, Marrone, Stefano, Nocerino, Wanda, Procaccino, Angela, Terrone, Grazia, Curtotti, Donatella, Impedovo, Donato, Marcialis, Gian Luca, and Sansone, Carlo
- Subjects
- *
PSYCHOLOGICAL techniques , *BULLYING , *AUTOMATIC identification , *CYBERBULLYING , *ARTIFICIAL intelligence - Abstract
Bullying and cyberbullying are harmful social phenomena that involve the intentional, repeated use of power to intimidate or harm others. The ramifications of these actions are felt not just at the individual level but also pervasively throughout society, necessitating immediate attention and practical solutions. The BullyBuster project pioneers a multi-disciplinary approach, integrating artificial intelligence (AI) techniques with psychological models to comprehensively understand and combat these issues. In particular, employing AI in the project allows the automatic identification of potentially harmful content by analyzing linguistic patterns and behaviors in various data sources, including photos and videos. This timely detection enables alerts to relevant authorities or moderators, allowing for rapid interventions and potential harm mitigation. This paper, a culmination of previous research and advancements, details the potential for significantly enhancing cyberbullying detection and prevention by focusing on the system's design and the novel application of AI classifiers within an integrated framework. Our primary aim is to evaluate the feasibility and applicability of such a framework in a real-world application context. The proposed approach is shown to tackle the pervasive issue of cyberbullying effectively. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. Free Papers Compiled.
- Subjects
- *
DELUSIONS , *PSYCHOTHERAPY patients , *CONFERENCES & conventions , *PSYCHOSOCIAL factors , *CYBERBULLYING , *STALKING - Published
- 2022
- Full Text
- View/download PDF
37. ALBERT-based fine-tuning model for cyberbullying analysis.
- Author
-
Tripathy, Jatin Karthik, Chakkaravarthy, S. Sibi, Satapathy, Suresh Chandra, Sahoo, Madhulika, and Vaidehi, V.
- Subjects
- *
CYBERBULLYING , *CONVOLUTIONAL neural networks , *LINGUISTIC complexity - Abstract
With the world's interaction moving more and more toward using online social media platforms, the advent of cyberbullying has also raised its head. Multiple forms of cyberbullying exist from the more common text based to images or even videos, and this paper will explore the context of textual comments. Even in the niche area of considering only text-based data, several approaches have already been worked upon such as n-grams, recurrent units, convolutional neural networks (CNNs), gated recurrent unit (GRU) and even a combination of the mentioned architectures. While all of these produce workable results, the main point of contention is that true contextual understanding is quite a complex concept. These methods fail due to two simple reasons: (i) lack of large datasets to properly utilize these architectures and (ii) the fact that understanding context requires some mechanism of remembering history that is only present in the recurrent units. This paper explores some of the recent approaches to the difficulties of contextual understanding and proposes an ALBERT-based fine-tuned model that achieves state-of-the-art results. ALBERT is a transformer-based architecture and thus even at its untrained form provides better contextual understanding than other recurrent units. This coupled with the fact that ALBERT is pre-trained on a large corpus allowing the flexibility to use a smaller dataset for fine-tuning as the pre-trained model already has deep understanding of the complexities of the human language. ALBERT showcases high scores in multiple benchmarks such as the GLUE and SQuAD showing that high levels of contextual understanding are inherently present and thus fine-tuning for the specific case of cyberbullying allows to use this to our advantage. With this approach, we have achieved an F1 score of 95% which surpasses current approaches such as the CNN + wordVec, CNN + GRU and BERT implementations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
38. BODY SHAMING AS A MODERN FORM OF CYBER AGGRESSION.
- Author
-
ŽIDOVÁ, MONIKA, KURINCOVÁ, VIERA, and TURZÁK, TOMÁŠ
- Subjects
- *
AGGRESSION (Psychology) , *CYBERBULLYING , *BULLYING , *TWENTY-first century - Abstract
The paper deals with body shaming, which is a form of bullying behavior. This is a modern phenomenon in the 21st century, in which the communicator makes disrespectful comments about the physical appearance of the person in question or uses various forms of (cyber)bullying. Body shaming accompanied by cyber aggression is becoming more and more a part of online communication and is as dangerous and distressing for the victim as cyberbullying. Therefore, it is necessary to focus on its elimination. The aim of the present paper is to define the basic principles of body shaming, reactions to it and risks as well as to point out its negative impact and the importance of prevention. [ABSTRACT FROM AUTHOR]
- Published
- 2022
39. A comprehensive review of cyberbullying-related content classification in online social media.
- Author
-
Teng, Teoh Hwai, Varathan, Kasturi Dewi, and Crestani, Fabio
- Subjects
- *
FOLKSONOMIES , *SOCIAL media , *SOCIAL networks , *CYBERBULLYING , *WORKFLOW , *MACHINE learning - Abstract
The emergence of online social networks (OSN) platforms removes communication barriers that are essential to human life, catalyzing social networking growth. However, this emergence has given rise to a negative impact when someone abuses the platform to commit cyberbullying activities. Hence, it is crucial to work on automated cyberbullying-related classification to mitigate the societal phenomena in OSN. The research on the automated classification model for cyberbullying was pioneered over the last decade with growing interest among researchers. It is helpful to track its growth over the decades to elucidate the state-of-arts techniques applied in this field. This paper presents a large amount of literature germane to cyberbullying classification from past to present to provide a comprehensive review. A total of 126 papers were reviewed. This paper emphasizes text-based cyberbullying and multi-modal cyberbullying. The review was presented around the machine learning workflow, encompassing four core sections: dataset analysis, pre-processing analysis, feature analysis, and technique analysis. Based on the critical analysis, limitations are addressed along with the future works that can be conducted to fill the gap in previous research. Furthermore, the review also examined the ethical implications associated with the implementation of these techniques. This review paper is expected to assist readers in fully comprehending the current trend, architecture, and techniques applied to the field. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. "It's Kind of Our Everyday Life. It Sort of Becomes Natural": Everyday Violence and Violent Practices Among Young People.
- Author
-
Skott, Sara
- Subjects
- *
SAFETY , *FOCUS groups , *AGE distribution , *VIOLENCE , *INTERVIEWING , *MENTAL health , *VICTIM psychology , *SEX distribution , *SEXUAL harassment , *PHOTOGRAPHY , *SOUND recordings , *SOCIAL classes , *SEX crimes , *THEMATIC analysis , *CYBERBULLYING , *PUBLIC opinion , *ADULTS , *ADOLESCENCE - Abstract
Although violence among youth remains an important, global issue, little research has been conducted regarding how young people themselves define violence and what practices in relation to violence that are evident in their everyday lives. Using an intersectional gender perspective, specifically exploring the intersection of gender, age, and class, this paper therefore aims to explore how young people define violence, as well as to explore what practices in relation to violence that are evident in young people's everyday lives. By using a photovoice methodology, 11 focus groups of young boys and girls (17–19 years old) living in two municipalities in northern Sweden were interviewed and asked to take photographs representing themes that were discussed. Overall, three main themes in the young peoples' stories were identified: Violence as ubiquitous, Easy prey and dangerous predators, and The way forward. The findings demonstrated that violence is pervasive, all-encompassing and normalized in young people's everyday lives, and that this violence is moderated by intersecting power orders of gender, age, and class. Any future theoretical frameworks or prevention strategies should therefore aim to include an intersectional perspective as well as including the voices of the youths themselves. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. Meta-Analysis of Cyber Intimate Partner Violence Perpetration and Victimization: Different Types and their Associations with Face-to-Face IPV among Men and Women.
- Author
-
Gilbar, Ohad, Charak, Ruby, Trujillo, Oscar, Cantu, Jorge I., Cavazos, Valeria, and Lavi, Iris
- Subjects
- *
PSYCHOLOGY information storage & retrieval systems , *META-analysis , *SYSTEMATIC reviews , *INTIMATE partner violence , *VICTIM psychology , *SEX distribution , *RISK assessment , *CYBERBULLYING , *MEDLINE , *AGGRESSION (Psychology) , *ERIC (Information retrieval system) , *CONTROL (Psychology) - Abstract
Cyber intimate partner violence (C-IPV) is a technology-mediated form of violence. It has been examined only in the last 10 years as a form of violence that can cause psychological damage to its victims. How this phenomenon connects to and differs from face-to-face IPV (F2F-IPV) has been, as yet, little studied. Research has not made clear whether sex differences may impact its use, particularly in light of the fact that no physical coercion is used in C-IPV. Thus, the current research aimed to investigate through a meta-analysis: differences between the average levels of different types of C-IPV victimization and perpetration; the association between C-IPV and F2F-IPV victimization and perpetration; and whether the answers to these questions were dependent on sex. The current meta-analysis drew on 46 studies, within 44 papers, with a total sample of 27,491 participants. Findings from 22 of these studies showed no significant sex differences between the average levels of different types of C-IPV victimization and between different types of C-IPV perpetration. These 22 studies showed positive large effect sizes for the correlation between C-IPV and F2F-IPV perpetration and victimization. Moreover, in both perpetration and victimization, sex did not impact the level of association. The findings suggested that C-IPV and F2F-IPV are highly correlated, and though not the same, they may share similar characteristics. Additionally, the results suggested that sex differences do not impact non-physical aggression, such as C-IPV. The implications for preventive strategies include that IPV interventions should also focus on alleviating instances of C-IPV. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
42. Cyberloafing among Gen Z students: the role of norms, moral disengagement, multitasking self-efficacy, and psychological outcomes.
- Author
-
Mihelič, Katarina Katja, Lim, Vivien Kim Geok, and Culiberg, Barbara
- Subjects
- *
MORAL disengagement , *PSYCHOLOGICAL disengagement , *CYBERBULLYING , *SELF-efficacy , *DIGITAL natives , *STUDENTS , *STATE universities & colleges - Abstract
This paper examines mobile cyberloafing, i.e. the use of phones for non-study purposes among Gen Z students, the first generation of digital natives. Drawing from research on misbehaviour and cyberloafing, we developed and tested a model with moral disengagement and subjective norms as predictors and psychological detachment and cognitive engagement as outcomes of cyberloafing. We also hypothesise that multitasking self-efficacy moderates the relationships between the antecedents and cyberloafing. Data were collected from 254 Gen Z students from a large state university in Europe. The findings show that subjective norms are negatively related to cyberloafing in class, while moral disengagement is positively related to it. In turn, cyberloafing is positively related to psychological detachment and negatively to cognitive engagement. The results also show a significant moderating effect for multitasking self-efficacy. Implications for research and practice are discussed, as well as future research opportunities. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. Introduction.
- Author
-
Konantambigi, Rajani M.
- Subjects
- *
CYBERBULLYING , *FATHERS , *PARENT-child relationships , *OVERPRESSURE (Education) , *CHILD development , *ADOLESCENT development , *SOCIALIZATION - Abstract
The papers included in the section on Perspectives and Voices of Children and Adolescents, provide diverse perspectives on child-parent relationships. They address issues in the context of parenting by fathers, concerns in parenting children with chronic medical conditions, academic stress and its social construction and parental concerns for cyberbullying, in fact, meaning- making of bullying itself by adolescents. The contributions raise several themes and concerns constituting the field of child and adolescent development and socialisation. There are also suggestions for potential inquiry in the field of socialisation and possibilities in methodological innovations. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. Cyberbullying detection solutions based on deep learning architectures.
- Author
-
Iwendi, Celestine, Srivastava, Gautam, Khan, Suleman, and Maddikunta, Praveen Kumar Reddy
- Subjects
- *
DEEP learning , *MACHINE learning , *ARTIFICIAL intelligence , *CYBERBULLYING , *RECURRENT neural networks , *SOCIAL commentary - Abstract
Cyberbullying is disturbing and troubling online misconduct. It appears in various forms and is usually in a textual format in most social networks. Intelligent systems are necessary for automated detection of these incidents. Some of the recent experiments have tackled this issue with traditional machine learning models. Most of the models have been applied to one social network at a time. The latest research has seen different models based on deep learning algorithms make an impact on the detection of cyberbullying. These detection mechanisms have resulted in efficient identification of incidences while others have limitations of standard identification versions. This paper performs an empirical analysis to determine the effectiveness and performance of deep learning algorithms in detecting insults in Social Commentary. The following four deep learning models were used for experimental results, namely: Bidirectional Long Short-Term Memory (BLSTM), Gated Recurrent Units (GRU), Long Short-Term Memory (LSTM), and Recurrent Neural Network (RNN). Data pre-processing steps were followed that included text cleaning, tokenization, stemming, Lemmatization, and removal of stop words. After performing data pre-processing, clean textual data is passed to deep learning algorithms for prediction. The results show that the BLSTM model achieved high accuracy and F1-measure scores in comparison to RNN, LSTM, and GRU. Our in-depth results shown which deep learning models can be most effective against cyberbullying when directly compared with others and paves the way for future hybrid technologies that may be employed to combat this serious online issue. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
45. Site Agnostic Approach to Early Detection of Cyberbullying on Social Media Networks.
- Author
-
López-Vizcaíno, Manuel, Nóvoa, Francisco J., Artieres, Thierry, and Cacheda, Fidel
- Subjects
- *
SOCIAL networks , *CYBERBULLYING , *SOCIAL media , *ENGLISH language - Abstract
The rise in the use of social media networks has increased the prevalence of cyberbullying, and time is paramount to reduce the negative effects that derive from those behaviours on any social media platform. This paper aims to study the early detection problem from a general perspective by carrying out experiments over two independent datasets (Instagram and Vine), exclusively using users' comments. We used textual information from comments over baseline early detection models (fixed, threshold, and dual models) to apply three different methods of improving early detection. First, we evaluated the performance of Doc2Vec features. Finally, we also presented multiple instance learning (MIL) on early detection models and we assessed its performance. We applied t i m e a w a r e p r e c i s i o n ( T a P ) as an early detection metric to asses the performance of the presented methods. We conclude that the inclusion of Doc2Vec features improves the performance of baseline early detection models by up to 79.6%. Moreover, multiple instance learning shows an important positive effect for the Vine dataset, where smaller post sizes and less use of the English language are present, with a further improvement of up to 13%, but no significant enhancement is shown for the Instagram dataset. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
46. Trolling CNN and Fox News on Facebook, Instagram, and Twitter.
- Author
-
Fichman, Pnina and Rathi, Maanvi
- Subjects
- *
MASS media , *PROPAGANDA , *SOCIAL media , *DISINFORMATION , *GOVERNMENT agencies , *CHI-squared test , *CYBERBULLYING , *MISINFORMATION - Abstract
Online trolling, disinformation, and deception are posing an existential threat to democracy. Informed by the online disinhibition theory and research on the ideological asymmetry between Democrats and Republicans, we examined how the extent and style of trolling varies across social media platforms, by analyzing comments on posts by two media channels (CNN and Fox News) on three social media platforms (Facebook, Instagram, and Twitter). We found differences in the style and extent of trolling across platforms and between media channels, with more trolling on articles posted by Fox News than by CNN, and a different trolling style on Twitter than Facebook or Instagram. Our study demonstrates a delicate balance between the socio‐technical factors that are enabling and hindering trolling. While some platforms and government agencies believe in removing anonymity to regulate online harm, this paper makes a significant contribution against that view. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
47. Is internet gaming disorder associated with suicidal behaviors among the younger generation? Multiple logistic regressions on a large-scale purposive sampling survey.
- Author
-
Junus, Alvin, Hsu, Yu-cheng, Wong, Clifford, and Yip, Paul S.F.
- Subjects
- *
GAMING disorder , *SUICIDAL behavior , *CYBERBULLYING , *MENTAL illness , *JUDGMENT sampling , *LOGISTIC regression analysis - Abstract
The ubiquity of Internet gaming as part of the younger generation's (11-35 year-olds) lifestyle to-day warrants a deeper understanding of its impact on their mental health. In particular, there has been scant research investigating the link between Internet Gaming Disorder (IGD) and suicidal behaviors in this demographic group, even though several mental health symptoms of the former are known risk factors for the latter. This paper aims to establish the presence or absence of association between IGD and each of suicidal ideation, self-harm, and suicide attempt among the younger generation. A large-scale online survey on Internet gamers in Hong Kong was conducted in February 2019. 3430 respondents were recruited through purposive sampling. Study samples were stratified into distinct age groups and multiple logistic regression was conducted for each measured suicidal behavior in each age group. After controlling for sociodemographics, Internet usage, self-reported bullying perpetration and bullying victimization, social withdrawal, and self-reported psychiatric diagnoses such as depression and psychosis, analyses revealed that adolescent (11-17 year-old) gamers with IGD were more likely than their peers who had no IGD to have had suicidal ideation, self-harm, and suicide attempt in their lifetime. These associations did not hold for 18-35 year-old gamers. Findings suggest that it may be prudent to recognize IGD as a growing public mental health priority for the young populace, particularly adolescents. Existing suicide prevention efforts can be complemented through screening adolescents for IGD, and could be expanded to online gaming platforms to reach more hidden at-risk individuals. • Adolescent gamers with IGD had higher odds of lifetime suicidal ideation compared to their peers with no IGD. • Adolescent gamers with IGD had higher odds of lifetime self-harm compared to their peers with no IGD. • Adolescent gamers with IGD had higher odds of lifetime suicide attempt compared to their peers with no IGD. • IGD was not associated with lifetime suicidal behaviors among gamers aged 18–35 years old. • Suicide prevention efforts may be enhanced by screening individuals for IGD and expanding efforts to online game platforms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
48. Cyberbullying and Cyber Victimization: A Pilot Study with Adolescents Living in Egypt.
- Author
-
Zaki, Nevin FW, Amer, Noha, Saleh, Elsayed, Elboraie, Hala, Alzahrani, Walid Abdallah, and Pandi Perumal, Seithikurippu R
- Subjects
- *
CYBERBULLYING , *MORNINGNESS-Eveningness Questionnaire , *EGYPTIANS , *TEENAGERS , *PILOT projects - Abstract
Introduction: Cyberbullying is a serious public health phenomenon that affects all countries and all ages, but adolescents are considered a high-risk group. Aims: The current study examined the nature of cyberbullying among Egyptian adolescents together with the impact of age, gender, and chronotype on the magnitude of the problem. Method: Demographic data was collected for N=475 Egyptian adolescents via an electronic, and paper, survey method together with the Revised Cyber-Bullying Inventory (CBIR) and the Morningness-Eveningness Questionnaire (MEQ). Results: The numbers and frequencies of cyberbullying behaviors were calculated; the frequency of cyberbullying victimization was higher than that of the bullying behaviors. It was also found that chronotype and education year correlated with a statistically significant impact on the cyberbullying behavior. Conclusion: Detecting the pattern of cyberbullying and its risk factors is an important consideration when designing antibullying preventive programs. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
49. Editorial.
- Author
-
Scheithauer, Herbert
- Subjects
- *
CYBERBULLYING , *DEVELOPMENTAL psychology , *EARLY intervention (Education) - Abstract
The International Journal of Developmental Science (IJDS) is undergoing significant changes in 2024. The journal has been acquired by academic publisher Sage and will now be part of their product range. The Editorial Board and group of Editors will also be changing, and the journal will be transitioning to APA7th guidelines and a new manuscript tracking system. The journal will continue to publish papers from scientific congresses focused on developmental science, with the upcoming issue featuring abstracts from the 15th International Conference on Child and Adolescent Psychopathology. The current issue of the journal includes articles on a preventive intervention program in early childhood education, college students' occupational identity, and a coding system for qualitative responses related to negative online behaviors. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
50. A generic review of cyberbullying detection framework by machine learning approach.
- Author
-
Singh, Savinder, Foozy, Cik Feresa Mohd, Omar, Nurul Aswa, Shamala, Palaniappan, and Othman, Nur Fadzilah
- Subjects
- *
BIBLIOGRAPHIC databases , *CYBERBULLYING , *MACHINE learning , *NATURAL language processing - Abstract
Research into cyberbullying detection has increased in recent years, this is due to the proliferation of cyberbullying across social media and its negative effect on the younger generation. The growing body of work is emerging on automated approaches to cyberbullying detection. These approaches utilize machine learning, natural language processing techniques and cyberbullying features to automatically detect cyberbullying. In this paper, a review of published research (as identifies via Scopus, ACM and IEEE bibliographic databases) on cyberbullying detection approaches will be presented. On the basis of the review that have been done the most suitable cyberbullying feature and the categories will be mapped out. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.