Detecting cyberbullying and cyberaggression in social media

Files
1907.08873.pdf(1.02 MB)
Accepted manuscript
Date
2019-11-18
Authors
Chatzakou, Despoina
Leontiadis, Ilias
Blackburn, Jeremy
Cristofaro, Emiliano De
Stringhini, Gianluca
Vakali, Athena
Kourtellis, Nicolas
Version
Accepted manuscript
OA Version
Citation
Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali, Nicolas Kourtellis. 2019. "Detecting Cyberbullying and Cyberaggression in Social Media." ACM Transactions on the Web, Volume 13, Issue 3, pp. 1 - 51. https://doi.org/10.1145/3343484
Abstract
Cyberbullying and cyberaggression are increasingly worrisome phenomena affecting people across all demographics.More than half of young social media users worldwide have been exposed to such prolonged and/or coordinated digital harassment. Victims can experience a wide range of emotions, with negative consequences such as embarrassment, depression, isolation from other community members, which embed the risk to lead to even more critical consequences, such as suicide attempts. In this work, we take the first concrete steps to understand the characteristics of abusive behavior in Twitter, one of today’s largest social media platforms. We analyze 1.2 million users and 2.1 million tweets, comparing users participating in discussions around seemingly normal topics like the NBA, to those more likely to be hate-related, such as the Gamergate controversy, or the gender pay inequality at the BBC station. We also explore specific manifestations of abusive behavior, i.e., cyberbullying and cyberaggression, in one of the hate-related communities (Gamergate). We present a robust methodology to distinguish bullies and aggressors from normal Twitter users by considering text, user, and network-based attributes. Using various state-of-the-art machine learning algorithms, we classify these accounts with over 90% accuracy and AUC. Finally, we discuss the current status of Twitter user accounts marked as abusive by our methodology, and study the performance of potential mechanisms that can be used by Twitter to suspend users in the future.
Description
License