12.07.2015 Views

Detecting the Presence of Cyberbullying Using Computer Software

Detecting the Presence of Cyberbullying Using Computer Software

Detecting the Presence of Cyberbullying Using Computer Software

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Bayzick, <strong>Cyberbullying</strong> 9III Types <strong>of</strong> <strong>Cyberbullying</strong>The definitions above provide a <strong>the</strong>oretical description <strong>of</strong> cyberbullying. The goal <strong>of</strong>this project is to detect <strong>the</strong> presence <strong>of</strong> cyberbullying in chat transcripts, so more specificdescriptions are needed for <strong>the</strong> development <strong>of</strong> s<strong>of</strong>tware. Nine different methods <strong>of</strong>cyberbullying were found [1][2][4].i. FloodingFlooding consists <strong>of</strong> <strong>the</strong> bully repeatedly entering <strong>the</strong> same comment, nonsensecomments, or holding down <strong>the</strong> enter key for <strong>the</strong> purpose <strong>of</strong> not allowing <strong>the</strong>victim to contribute to <strong>the</strong> conversation. For example:Luke:Luke:Luke:Luke:Luke:Luke:Luke:Luke:Luke:Luke:Jack: Don'tLuke uses flooding against Jack and everyone else in <strong>the</strong> chat room as aform <strong>of</strong> intimidation. Jack’s response includes a protesting comment, “don't.”“Please don’t do that,” “stop,” “this really sucks,” etc. Then, <strong>the</strong> presence <strong>of</strong>multiple lines <strong>of</strong> blank or repeated comments by <strong>the</strong> bully, followed by aprotesting comment by ano<strong>the</strong>r user, <strong>the</strong> victim, would constitute flooding [2].ii. MasqueradeMasquerade involves <strong>the</strong> bully logging in to a website, chat room, or programusing ano<strong>the</strong>r user’s screenname. A masquerading bully can have a number <strong>of</strong>different motivations.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!