Bayzick, <strong>Cyberbullying</strong> 30multiple users can chat about a specified topic, though conversations do not alwaysstay on that topic. Some windows include <strong>the</strong> entire thread, while o<strong>the</strong>rs are somesection <strong>of</strong> a much larger conversation. Locate <strong>the</strong>se files.3. For a particular file: Open <strong>the</strong> html file in your web browser or notepad/wordpadprogram. Read through <strong>the</strong> conversation excerpt. Enter <strong>the</strong> file name into <strong>the</strong>spreadsheet. If <strong>the</strong>re is language (a post or a group <strong>of</strong> posts) that you thinkconstitute cyberbullying, note that in <strong>the</strong> spreadsheet in <strong>the</strong> “Is <strong>Cyberbullying</strong>Present? (Y/N)” column, and <strong>the</strong> line numbers (all files should be labeled 1-10) thatare involved in <strong>the</strong> “Chat Lines Involved” column. Make a best guess at <strong>the</strong> categoryit falls into. It is more important to identify <strong>the</strong> presence <strong>of</strong> cyberbullying than toclassify it correctly. However, classification is helpful too. If you would like to makeany notes about <strong>the</strong> language used, <strong>the</strong> ambiguity <strong>of</strong> <strong>the</strong> category you chose, <strong>the</strong>style <strong>of</strong> a particular user, or anything else you think <strong>of</strong>, feel free to do that in <strong>the</strong>spreadsheet to <strong>the</strong> right <strong>of</strong> <strong>the</strong> designated columns. Any comments would be helpfulfor my analysis.4. Note: most conversations you will read will probably be considered innocent andmight be boring. I apologize. However, if <strong>the</strong>re are any innocent conversations thatlook like cyberbullying but you would not consider <strong>the</strong>m to be “bad” enough to beclassified, notes on those examples would be particularly helpful to determine where<strong>the</strong> line falls between cyberbullying and trash talking or innocent conversation. Also,<strong>the</strong>re do not have to be notes for each file (window), but if <strong>the</strong>re is somethinginteresting going on, please comment.5. Once you finish documenting a particular html file, congratulations!! Pick a new one,rinse, and repeat. When you have finished all files in a packet, make sure to saveyour human data sheet, and start a new packet <strong>of</strong> files! Remember, <strong>the</strong>re should bea separate data sheet for each packet (so your excel file doesn’t get too crazy long)Things I’m thinking about:1. The difference in language patterns in cyberbullying versus innocent conversationversus trash talking, and how to distinguish between <strong>the</strong>m in a systematic way.2. Users’ roles in <strong>the</strong> cyberbullying (bully/victim, multiple bullies harassing one or morevictims, multiple users attacking each o<strong>the</strong>r, but with no clear victim) and how thisplays a part in <strong>the</strong> classification <strong>of</strong> <strong>the</strong> window.3. Ways in which a computer could begin to classify conversations (think hard and fastrules, a computer doesn’t do ambiguity)4. Where can we go from here?
Bayzick, <strong>Cyberbullying</strong> 315. Lots <strong>of</strong> o<strong>the</strong>r random things that I’m blanking on right now – if you have anysuggestions, please let me know!!Thank you again for helping us all out!! You are a particular help to me and my honorsproject, so thank you! If you have any questions/comments/concerns/suggestions, feel freeto let me know at jebayzick@ursinus.edu.Thanks again!!~Jen BayzickSenior, ma<strong>the</strong>matics and computer science
- Page 1 and 2: Detecting the Presence of Cyberbull
- Page 3 and 4: Bayzick, Cyberbullying 3AbstractCyb
- Page 5 and 6: Bayzick, Cyberbullying 5I Introduct
- Page 7 and 8: Bayzick, Cyberbullying 7o“Dude to
- Page 9 and 10: Bayzick, Cyberbullying 9III Types o
- Page 11 and 12: Bayzick, Cyberbullying 11masquerade
- Page 13 and 14: Bayzick, Cyberbullying 13vii. Denig
- Page 15 and 16: Bayzick, Cyberbullying 15IV Dataset
- Page 17 and 18: Bayzick, Cyberbullying 17V ChatCode
- Page 19 and 20: Bayzick, Cyberbullying 19insult to
- Page 21 and 22: Bayzick, Cyberbullying 21VII BullyT
- Page 23 and 24: Bayzick, Cyberbullying 23VIII Evalu
- Page 25 and 26: Bayzick, Cyberbullying 25However, t
- Page 27 and 28: Bayzick, Cyberbullying 27X Acknowle
- Page 29: Bayzick, Cyberbullying 29Appendix A
- Page 33: Bayzick, Cyberbullying 33douchebagi