Skip to main content

Time Series Forecasting in Cyberbullying Data

  • Conference paper
  • First Online:
Engineering Applications of Neural Networks (EANN 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 517))

Abstract

The present article deals with sexual cyberbullying, a serious subject that has gained significant attention throughout recent years of emerging social media platforms. The detection of sexual predation is one of the most important and challenging tasks in our days. Using real-world data, we follow a time series modeling approach, in which predator’s posts (i.e. questions) are associated with numeric labels, according to the style of the attack (e.g. attempts for physical approach, grooming, retrieval of personal information, etc.). Upon modeling the domain as time series, in order to allow for forecasting the severity of a future question of a predator (i.e. the class label), a sliding window method was adopted. Two well-known methods that have been traditionally applied in time series problems, namely Support Vector Machines and Neural Networks, were utilized for forecasting. Simultaneously, since text processing is almost certain to derive a large number of input features, an additional method for reducing dimensionality of the original dataset was applied, implemented with Singular Value Decomposition. We demonstrate that the use of SVM classifier is more appropriate for our data and we show that it is able to provide accurate results that surpass current state-of-the-art outcomes, by using both the original feature set as well as the reduced SVD dimensions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cyberbullying, The National Crime Prevention. http://www.ncpc.org/cyberbullying

  2. Inches, G., Crestani, F.: Overview of the international sexual predator identification competition at pan-2012. In: Forner, P., Karlgren, J., Womser-Hacker, C. (eds.) CLEF 2012 Evaluation Labs and Workshop - Working Notes Papers, Rome, Italy (2012)

    Google Scholar 

  3. Kontostathis, A., Reynolds, K., Garron, A., Edwards, L.: Detecting cyberbullying: query terms and techniques. In: Proceedings of the 5th Annual ACM Web Science Conference, pp. 195–204 (2013)

    Google Scholar 

  4. Yin, Z.X., Hong, L., Davison, B.D., Kontostathis, A., Edwards, L.: Detection of harassment on web 2.0. In: CAW 2.0 2009: Proceedings of the 1st Content Analysis in Web 2.0 Workshop, Madrid, Spain (2009)

    Google Scholar 

  5. Dadvar, M., de Jong, F., Ordelman, R., Trieschnigg, D.: Improved cyberbullying detection using gender information. In: Proceedings of the 12th -Dutch-Belgian Information Retrieval Workshop (DIR 2012), Ghent, Belgium (2012)

    Google Scholar 

  6. http://www.Perverted-Justice.com (2008)

  7. Kalman, D.: Asingularly valuable decomposition: the SVDof a matrix. College Math. J. 27, 2–23 (1996)

    Article  MathSciNet  Google Scholar 

  8. http://www.simafore.com/blog/bid/109051/Time-Series-Forecasting-comparing-RapidMiner-and-R-for-analysis

  9. Korning, P.G.: Training neura networks by means of genetic algorithms working on very long chromosomes. International Journal of Neural Systems 6(3), 299–316 (1995)

    Article  Google Scholar 

  10. Vapnik, V.: The Natural Of Statistical Learning Theory. Springer, New York (1995)

    Book  MATH  Google Scholar 

  11. Chang, Y.-W., Lin, C.-J.: Feature ranking using linear SVM. J. Machine Learning Res. 3, 53–64 (2008)

    Google Scholar 

  12. Kontostathis, A., West, W., Garron, A., Reynolds, K., Edwards, L.: Identify predators using chatcoder 2.0 - notebook for pan at clef 2012. In: Forner, et al. (eds.)

    Google Scholar 

  13. Kontostathis, A., Edwards, L., Leatherman, A.: ChatCoder: toward the tracking and categorization of internet predators. In: Proceedings of Text Mining Workshop 2009 Held in Conjunction with the Ninth SIAM International Conference on Data Mining (SDM 2009) (2009)

    Google Scholar 

  14. Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves. In: Proceedings of the International Conference on Machine Learning (ICML) (2006)

    Google Scholar 

  15. McGhee, I., Bayzick, J., Kontostathis, A., Edwards, L., McBride, A., Jakubowski, E.: Learning to Identify Internet Sexual Predation. International Journal of Electronic Commerce 15(3), 103–122 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manolis Maragoudakis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Potha, N., Maragoudakis, M. (2015). Time Series Forecasting in Cyberbullying Data. In: Iliadis, L., Jayne, C. (eds) Engineering Applications of Neural Networks. EANN 2015. Communications in Computer and Information Science, vol 517. Springer, Cham. https://doi.org/10.1007/978-3-319-23983-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23983-5_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23981-1

  • Online ISBN: 978-3-319-23983-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics