CYBERBULLYING REVELATION IN TWITTER DATA USING NAÃVE BAYES CLASSIFIER ALGORITHM
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Weider D. Yu, Maithili Gole, Nishanth Prabhuswamy, Sowmya Prakash, Vidya Gowdru Shankaramurthy, “An Approach To Design and Analyze the Framework for Preventing Cyberbullyingâ€, IEEE International Conference on Services Computing, 2016, pp.864-867, doi: 10.1109/SCC.2016.125 .
Samaneh Nadali, Masrah Azrifah Azmi Murad, “A Review of Cyberbullying Detection :An Overviewâ€, International Cmiference on Intelligent Systems Design and Applications (ISDA), 2013, pp.325-330, doi:10.1109/ISDA.2013.6920758 .
Amrita Mangoankar, Allenoush Hayrapetian, †Collaborative Detection of Cyberbullying Behaviour In Twitter Dataâ€, 2015, IEEE Conference, pp.612-616, doi:10.1109/EIT.2015.7293405 .
Silvana Tambosi, Gustavo Borges, Vanessa Mondin, Maria José Domingues, †Cyberbullying: Concerns of Teachers and School Involvementâ€, International Conference on Complex, Intelligent, and Software Intensive Systems Cyberbullying, 2015, pp.416-420, doi: 10.1109/CISIS.2015.92
Kelly Reynolds, April Kontostathis, Lynne Edwards, †Using Machine Learning to Detect Cyberbullyingâ€, International Conference on Machine Learning and Applications, 2011, pp.242-244, doi:10.1109/ICMLA.2011.152 .
Ana Kovacevic, â€Cyberbullying Detection Using Web content Miningâ€, Telecommunications forum TELFOR, 2014, pp. 25-27, doi:10.1109/TELFOR.2014.7034560 .
Tibor Bosse, Sven Stam ,â€A Normative Agent System To Prevent Cyberbullyingâ€, IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2011, pp. 425-430, doi: 10.1109/WI-IAT.2011.24.
Homa Hosseinmardi Shaosong Li, Zhili Yang and Qin Lv, Rahat Ibn Rafiq Richard Han and Shivakant Mishra,†A Comparison of Common Users across Instagram and Ask.fm to Better Understand Cyberbullyingâ€, IEEE International Conference on Big Data and Cloud Computing, 2014, pp. 355-362, doi: 10.1109/BDCloud.2014.87.
Nektaria Potha, Manolis Maragoudakis,†Cyberbullying Detection using Time Series Modelingâ€, IEEE International Conference on Data Mining Workshop, 2014, pp.373-382, doi:10.1109/ICDMW.2014.170 .
Marlies Rybnicek, Rainer Poisel and Simon Tjoa, â€Facebook Watchdog:A Research Agenda For Detecting Online Grooming And Bullying Activitiesâ€, IEEE International Conference on Systems, Man, and Cybernetics, 2013, pp.2854-2859, doi: 10.1109/SMC.2013.487 .
Rekha Sugandhi, Anurag Pande, “Method for Detection of Cyberbullying:A Surveyâ€, International Conference on Intelligent Systems Design and Applications (ISDA), 2015, pp.173-177, doi: 10.1109/ISDA.2015.7489220 .
Zinnar Ghasem, Ingo Frommhoz, â€A Hybrid Aprroach to Combat Email Based Cyberstalkingâ€, FGCT International Conference on Future Generation Communication Technologies, 2015, pp.106-111, doi:10.1109/FGCT.2015.7300257