CHARACTERIZATION OF USER BEHAVIOR IN SOCIAL NETWORKS TO BETTER UNDERSTAND CYBERBULLYING Homa Hosseinmardi Department of Computer Science University of.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

Technology SafeKEY.
Our Digital World Second Edition
Bullying & Cyberbullying ◦What is it? ◦Examples ◦Impact and support for students ◦Bystander effect ◦Prevention.
I. S. W. M.It Starts With Me Cyber Communication Awareness.
What is Personal Publishing? If you’ve ever written a blog entry, posted a comment or reply on a website, uploaded a video to YouTube, posted a picture.
Goals of this session Identify the definition of cyberbullying Identify the signs when a child is being bullied or is being a bully Identify the four.
Cyber Bullying By B Bryant.
Bully Free Freshman Class Session 2
High School Safe Environment “Cyberbullying” Resources and Assessment Materials.
Bullying. Bullying: The Definition 2  Bullying is verbal, physical or psychological abuse or teasing accompanied by real or perceived imbalance of power.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
Bullying. Bullying snowball Bullying: The Definition 3  Bullying is verbal, physical or psychological abuse or teasing accompanied by real or perceived.
Bullying and Cyber bullying What Parents Should Know Crystal Smith, Professional School Counselor Elmore Park Middle School.
INCREASE THE PEACE STOP BULLYING
How can I adjust my behavior and choices in order to improve the learning environment to represent SMS?
BE AN UP-STANDER NOT A BY-STANDER. Caring We care about others and the world around us. We are committed to having a positive impact on the world. Caring.
Social Media Perry seikhon Per 7 March 11,2014. What is social media?  I think social media is talking to others or sharing pictures online, such as.
Social Networks Cyberbullying Techno Addiction Digital footprint Spam Internet shopping The positive side Netiquette.
What’s the Big Deal About Bullying?
CYBERBULLYING. What is it? Cyber bullying is bullying or harassment that happens online. It can happen in an , a text message, an online game, or.
 FOOD, WATER, SLEEP, AIR  SAFETY FROM THREATS AND VIOLENCE  LOVE OF FRIENDS AND FAMILY  RESPECT.
Cyberbullying By Sharon Synan. Recognizing Cyberbullying Cyberbullying is using electronic means to bully, harass, and otherwise make life miserable for.
Cyberbullying By:Ali Komorek. What is Cyberbullying O Cyberbullying is bullying that takes place using electronic technology. (
Analyzing Social Problems with the Public Policy Analyst Bullying in the United States Donna LaPorte Donovan Middle School
Helping Children Create a Caring Community Julia Laibson, LMFT Arrowhead School Therapist.
Netiquette/Internet Safety Presentation VAHS Boys Swim Team.
Bull.
4th Grade Stop Bullying Now! Lesson. Whip Around  Find a partner  Turn back-to-back  Answer question -True: Make a “T” with hands -False: Cross arms.
Welcome!! CyberBullying SkyCast. CyberBullying Today’s Aims: To create a therapeutic ‘online space’ during the SkyCast! To understand more about cyberbullying:
Offline Consequences Internet Safety. What are some offline consequences to what you post and see online? Brainstorm  Teachers and parents see the post.
1. Each person will have a basic understanding of the legal definition of bullying as outlined in the anti-bullying bill of rights law 2. Each person will.
Cortney Wolf November 22, 2015 What is Bullying? Cortney Wolf November 22, 2015.
CYBERBULLYING RAMLAC ARRON,ADAM,GABRIELA, WILLIAM, ANTONIO AND INES.
Virtual Case Study Entry Clemson University M.Ed. Counselor Education—Student Affairs Team: Tiffany N. Hughes Danielle Barefoot Sarah Beth Potter Faculty.
Bullying What is it really?really. Bullying Defined Is unwanted, aggressive behavior Involves a real or perceived imbalance of power, Behavior is repeated.
E-Safety By Ian Hopper. Session Aims Apoyo Training & Consultancy -Develop a shared understanding of E-safety -Understand good practice in this area -Understand.
Patti Fowler Internet Safety Education Coordinator SC ICAC Task Force Office of the Attorney General Internet Safety.
Technology Tips and Safety for Teens. Social Networks Social Networks are internet applications which are used to facilitate communication between users.
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
Sarah Manuel Final Presentation MCO435-Social Media.
Be a Friend, Not a Bully!. True or False? 1. Cyberbullying generally involves physical violence.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Bullying. In order to be considered bullying, the behavior must be aggressive and include:  An Imbalance of Power: Kids who bully use their power—such.
Internet Safety. Online Concerns: Contact Content Conduct.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Digital Citizenship.  I can…. What is digital citizenship?  Think.Pair.Share.
CyberBullying By Larry Ly. Cyber Bullying ● Cyberbullying is bullying that takes place using electronic technology. The following electronic devices used.
How We Treat One Another
Cyberbullying on Instagram and Snapchat
Digital Citizenship.
Cyber Bullying Erika Dillard, M. Ed. School Counselor
GOSSIP and CYBERBULLYING
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
What does bullying look like?
Cyber bullying is a form of teen violence that can do lasting harm to young people.
Digital Citizenship.
Digital Citizenship & Social Media.
CYBERBULLYING.
Bullying 101 Presented by: RHMS Counselors
A guide for middle and high school students
GOSSIP and CYBERBULLYING
Digital Citizenship.
Cyberbullying PREPARED FOR STUDENTS OF SHAC ST. JOHN’S COLLEGE.
Bullying, Cyber-Bullying, Internet Safety
Lindsey Williams Bullying Lindsey Williams
Building RELATIONSHIPS with Respect
Digital Citizenship.
CYBER BULLYING BY RODRICK HILTZ 2014.
What it is, how to spot it, and how to respond to it
Presentation transcript:

CHARACTERIZATION OF USER BEHAVIOR IN SOCIAL NETWORKS TO BETTER UNDERSTAND CYBERBULLYING Homa Hosseinmardi Department of Computer Science University of Colorado at Boulder

“Cyberbullying means posting mean, negative and hurtful comments, pictures or videos posted online or on cell phones, or spreading of rumors or threats via technology.”  Important and growing social problem  Devastating psychological  Can happen on a 24/7 basis

 Facebook, 54%  Twitter, 21%  YouTube, 28%  Ask.fm, 26%  Instagram, 24%  BEBO, 14%

 Cyberaggression is broadly defined as using digital media to intentionally harm another person  Cyberbullying is one form of cyberaggression:  imbalance of power between the individuals involved  repeated over time Distinguish between cyberbullying and cyberaggression

 Text-based cyberagression  Improvement with more features  Detecting bullies  Anonymity and cyberagression  Detecting author’s roles  Cyberbullying across social networks Key limitation:  Proper definition of cyberbullying is not considered  Low reported accuracies

Friendly talks Aggressive towards bullies

 Measure imbalance of power  Ratio of cyberaggressive comments directed at a victim compared to the number of supportive comments  Threshold  Factor in the victim's reaction  Vigorously defends him/herself  Provides no self-defense or express indifference  Express hurt feelings  Frequency of occurrence  How many cyberaggressive comments?  Over what time period?

 Proposed research  Definition, Ground truth labeling and Data collection  Characterization and analysis  Automated detection and prediction

 Ranked 5 th  Image based

 Snowball sampling, 41K Instagram user ids  61% or about 25K public profiles  Collected data:  The media objects/images that the user has posted  The associated comments plus posted times  User id of each user followed by this user  User id of each user who follows this user  User id of each user who commented on or liked the media objects shared by the user

 Media session: media object/image and its associated comments  697K media sessions  We select images using the following two criteria:  at least 15 comments  more than 40% of the comments by users other than the profile owner have at least one negative word

Fraction of media sessions that have been voted k times as cyberagression (left) or cyberbullying (right).

 Content (Selfie, Scene, Pets, Group of people)  Photoshopped images

 What content receive more negativity  Person/people  Tattos  Drugs  etc.

Distribution of image categories given the media sessions have been voted for k times for cyberaggression.

Distribution of image categories given the media sessions have been voted for k times for cyberbullying.

 Weighted version of the majority voting  Media sessions with weighted trust-based metric equal to or greater than 60%  52% belonged to the “bullying” group  48% were not deemed to be bullying

accuracyprecisionrecall Followed by61.66% Follows68.89% Comments68.33% Person/text/tattoo68.89%

accuracyprecisionrecall Unigaram69.44% Bigaram70.0% gram69.0%

 Young undergraduate college students  Crowd-sourced sites  CrowdFlower and  Amazon Mechanical  Craft a survey with sufficient information to declare occurrence  Sequence of comments  Imbalance of power  Frequency of cyberaggression

 Labeling 1000 images selected randomly from the rest of media sessions.  Extracting features from images directly instead of using labeled data  Using temporal information