Journal article Open Access

From risk factors to detection and intervention: a practical proposal for future work on cyberbullying

Andri Ioannou; Jeremy Blackburn; Gianluca Stringhini; Emiliano De Cristofaro; Nicolas Kourtellis; Michael Sirivianos


DCAT Export

<?xml version='1.0' encoding='utf-8'?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#">
  <rdf:Description rdf:about="https://zenodo.org/record/1185092">
    <rdf:type rdf:resource="http://www.w3.org/ns/dcat#Dataset"/>
    <dct:type rdf:resource="http://purl.org/dc/dcmitype/Text"/>
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/1185092</dct:identifier>
    <foaf:page rdf:resource="https://zenodo.org/record/1185092"/>
    <dct:creator>
      <rdf:Description rdf:about="http://orcid.org/0000-0002-3570-6578">
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">0000-0002-3570-6578</dct:identifier>
        <foaf:name>Andri Ioannou</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Cyprus Interaction Lab</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Jeremy Blackburn</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>University of Alabama at Birmingham</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Gianluca Stringhini</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>University College London</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Emiliano De Cristofaro</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>University College London</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Nicolas Kourtellis</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Telefonica Research</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Michael Sirivianos</foaf:name>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Cyprus Interaction Lab</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:title>From risk factors to detection and intervention: a practical proposal for future work on cyberbullying</dct:title>
    <dct:publisher>
      <foaf:Agent>
        <foaf:name>Zenodo</foaf:name>
      </foaf:Agent>
    </dct:publisher>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2018</dct:issued>
    <dcat:keyword>cyberbullying</dcat:keyword>
    <dcat:keyword>internet bullying</dcat:keyword>
    <dcat:keyword>cyber aggression</dcat:keyword>
    <dcat:keyword>bullying</dcat:keyword>
    <dcat:keyword>social media</dcat:keyword>
    <dcat:keyword>literature survey</dcat:keyword>
    <frapo:isFundedBy rdf:resource="info:eu-repo/grantAgreement/EC/H2020/691025/"/>
    <schema:funder>
      <foaf:Organization>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">10.13039/501100000780</dct:identifier>
        <foaf:name>European Commission</foaf:name>
      </foaf:Organization>
    </schema:funder>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2018-02-08</dct:issued>
    <owl:sameAs rdf:resource="https://zenodo.org/record/1185092"/>
    <adms:identifier>
      <adms:Identifier>
        <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/1185092</skos:notation>
        <adms:schemeAgency>url</adms:schemeAgency>
      </adms:Identifier>
    </adms:identifier>
    <owl:sameAs rdf:resource="https://doi.org/10.1080/0144929X.2018.1432688"/>
    <dct:description>&lt;p&gt;While there is an increasing flow of media stories reporting cases of cyberbullying, particularly within&lt;br&gt; online social media, research efforts in the academic community are scattered over different topics&lt;br&gt; across the social science and computer science academic disciplines. In this work, we explored&lt;br&gt; research pertaining to cyberbullying, conducted across disciplines. We mainly sought to&lt;br&gt; understand scholarly activity on intelligence techniques for the detection of cyberbullying when it&lt;br&gt; occurs. Our findings suggest that the vast majority of academic contributions on cyberbullying&lt;br&gt; focus on understanding the phenomenon, risk factors, and threats, with the prospect of&lt;br&gt; suggesting possible protection strategies. There is less work on intelligence techniques for the&lt;br&gt; detection of cyberbullying when it occurs, while currently deployed algorithms seem to detect&lt;br&gt; the problem only up to some degree of success. The article summarises the current trends aiming&lt;br&gt; to encourage discussion and research with a new scope; we call for more research tackling the&lt;br&gt; problem by leveraging statistical models and computational mechanisms geared to detect,&lt;br&gt; intervene, and prevent cyberbullying. Coupling intelligence techniques with specific web&lt;br&gt; technology problems can help combat this social menace. We argue that a multidisciplinary&lt;br&gt; approach is needed, with expertise from human&amp;ndash;computer interaction, psychology, computer&lt;br&gt; science, and sociology, for current challenges to be addressed and significant progress to be made.&lt;/p&gt;</dct:description>
    <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/PUBLIC"/>
    <dct:accessRights>
      <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess">
        <rdfs:label>Open Access</rdfs:label>
      </dct:RightsStatement>
    </dct:accessRights>
    <dcat:distribution>
      <dcat:Distribution>
        <dct:license rdf:resource="https://creativecommons.org/licenses/by/4.0/legalcode"/>
        <dcat:accessURL rdf:resource="https://zenodo.org/record/1185092"/>
      </dcat:Distribution>
    </dcat:distribution>
    <dcat:distribution>
      <dcat:Distribution>
        <dcat:accessURL>https://doi.org/10.1080/0144929X.2018.1432688</dcat:accessURL>
        <dcat:byteSize>1059849</dcat:byteSize>
        <dcat:downloadURL>https://zenodo.org/record/1185092/files/From risk factors to detection and intervention a practical proposal for future work on cyberbullying.pdf</dcat:downloadURL>
        <dcat:mediaType>application/pdf</dcat:mediaType>
      </dcat:Distribution>
    </dcat:distribution>
  </rdf:Description>
  <foaf:Project rdf:about="info:eu-repo/grantAgreement/EC/H2020/691025/">
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">691025</dct:identifier>
    <dct:title>EnhaNcing seCurity And privacy in the Social wEb: a user centered approach for the protection of minors</dct:title>
    <frapo:isAwardedBy>
      <foaf:Organization>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">10.13039/501100000780</dct:identifier>
        <foaf:name>European Commission</foaf:name>
      </foaf:Organization>
    </frapo:isAwardedBy>
  </foaf:Project>
</rdf:RDF>
69
172
views
downloads
Views 69
Downloads 172
Data volume 182.3 MB
Unique views 52
Unique downloads 161

Share

Cite as