12.07.2015 Views

Detecting the Presence of Cyberbullying Using Computer Software

Detecting the Presence of Cyberbullying Using Computer Software

Detecting the Presence of Cyberbullying Using Computer Software

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bayzick, <strong>Cyberbullying</strong> 29Appendix A – <strong>Cyberbullying</strong> CodebookThis is <strong>the</strong> information our undergraduate assistants were given to learn to code chattranscripts for cyberbullying. They had <strong>the</strong> opportunity to ask questions at any time <strong>of</strong>myself or Pr<strong>of</strong>essors Kontostathis and Edwards for clarification. The reference to mySummer Fellows paper encompasses <strong>the</strong> information in sections III and IV <strong>of</strong> this paper.Directions for Hand Coders:Thank you so much for helping us out!!So <strong>the</strong> plan:My honors project is on <strong>the</strong> detection <strong>of</strong> cyberbullying in online chat conversations. My goalis to build a program – BullyTracer – that will detect <strong>the</strong> presence <strong>of</strong> cyberbullying based ona set <strong>of</strong> rules I need to develop. To decide what should and should not constitutecyberbullying (and <strong>the</strong>n train <strong>the</strong> computer to recognize it), I need “correct answers” – that’swhere you come in. I need o<strong>the</strong>rs’ opinions on what should and should not constitutecyberbullying to develop <strong>the</strong> program, and I also need truth sets to determine if <strong>the</strong>computer is doing what it should be.To begin, please read through my Summer Fellows paper – <strong>the</strong> file labeledBayzickBullyTracerSFFinal.docx. The whole thing will be good background information, but<strong>the</strong> only section that is necessary is section IV – Types <strong>of</strong> <strong>Cyberbullying</strong>. With research, Idiscovered and defined nine categories that cyberbullying conversation can fall into. Becomefamiliar with <strong>the</strong>se categories, but realize <strong>the</strong>re is also much ambiguity between <strong>the</strong>m, aswell as between cyberbullying and innocent conversations. The first few sections <strong>of</strong> my papergive background information on cyberbullying itself, and <strong>the</strong> last few sections describe myplan for my honors project. If you have any suggestions or comments for my research, pleaselet me know!So, as for <strong>the</strong> actual coding,1. Locate <strong>the</strong> Excel spreadsheet entitled Human Data Sheet 1.xlsx. Fill in your name at<strong>the</strong> top. Note: you should have a new copy <strong>of</strong> <strong>the</strong> data sheet to fill in for each newpacket <strong>of</strong> files you are working on (<strong>the</strong> packets will contain 100 – 200 files to beanalyzed). When you save your edited copy <strong>of</strong> <strong>the</strong> file, please label it as “HumanData Sheet [your last name] packet [packet number].xlsx”2. In each packet, <strong>the</strong>re are html files that contain windows <strong>of</strong> 10 chat lines that areexcerpts from longer chat conversations. All data was crawled (saved by anautomated computer program) from MySpace thread-style conversations, in which

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!