12.07.2015 Views

Detecting the Presence of Cyberbullying Using Computer Software

Detecting the Presence of Cyberbullying Using Computer Software

Detecting the Presence of Cyberbullying Using Computer Software

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bayzick, <strong>Cyberbullying</strong> 14or parts <strong>of</strong> <strong>the</strong> conversation. In terms <strong>of</strong> <strong>the</strong> language used, outing is generallysimilar to denigration, although usually less vulgar and volatile [4].ix. ExclusionIn <strong>the</strong> survey conducted by Patchin and Hinduja, exclusion, or ignoring <strong>the</strong> victimin a chat room or conversation, was <strong>the</strong> type <strong>of</strong> cyberbullying reported to havehappened most <strong>of</strong>ten among youth and teens [3]. However, detecting exclusionwithout contact from <strong>the</strong> victim outside <strong>the</strong> chat room is not straight forward. If<strong>the</strong> victim reacts in a way that indicates <strong>the</strong>y think <strong>the</strong>y are being ignored (i.e.“hey guys, are you listening???”), <strong>the</strong>n it can be concluded that exclusion hashappened. However, if <strong>the</strong> victim brings up a topic or asks a question, but <strong>the</strong>subject is never responded to or brought up again, this constitutes exclusion butmay not be as easily distinguished [4].

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!