Abstract
The usage of social media and the internet has grown rapidly throughout the world and has assimilated into daily life. Through the internet and social media, people can communicate their feelings, ideas, and thoughts, yet, with the growth of social networking sites, bullying is also growing. Cyberbullying is the term for bullying that involves the use of technology, and the internet may be a source of offensive, damaging, and destructive to other people’s content. Bullying can long-term affect young people’s capacity to socialize and build enduring friendships. Social media sites offer a great opportunity for bullying and harassment, and young people who use these sites are in danger. This paper’s framework was presented for detecting cyberbullying and divided into two main sections. NLP (natural language processing) is the first component, and ML is the second component (machine learning). In the first phase, data are collected from online news sources and Twitter, posts and messages on Facebook, Instagram, WhatsApp, and YouTube comments. Additionally, we collected data from the application that we built to receive complaints and threats that reach students and young people, regardless of the type of threat, whether bullying, intimidation, or even abuse in both English and Arabic. Before using machine learning algorithms on our data, we must clean it up and prepare it for the discovery phase because it contains many extraneous characters. To train the model and determine which model has the highest accuracy, we combine NLP with various machine learning techniques, including support vector machine, Naive Bayes, logistic regression, random forest, extreme gradient boosting algorithm, and convolutional neural networks (CNN). This paper developed an effective technology to detect and avoid bullying in social networks. Many workbooks are used to train and learn about bullying behavior. Evaluation of the proposed model for cyberbullying data shows that CNN performs better than other algorithms used in the study.













Similar content being viewed by others
Data availability
Data are available from the authors upon reasonable request.
References
Al-Ajlan MA, Ykhlef M (2018) Optimized twitter cyberbullying detection based on deep learning. In: 2018 21st Saudi computer society national computer conference (NCC), IEEE, pp 1–5
Alloghani M, Al-Jumeily D, Mustafina J, Hussain A, Aljaaf AJ (2020) A systematic review on supervised and unsupervised machine learning algorithms for data science. In: Berry M, Mohamed A, Yap B (eds) Supervised and unsupervised learning for data science. Springer, Cham, pp 3–21
Al-Makhadmeh Z, Tolba A (2020) Automatic hate speech detection using killer natural language processing optimizing ensemble deep learning approach. Computing 102(2):501–522. https://doi.org/10.1007/s00607-019-00745-0
Álvarez-García D, Núñez JC, González-Castro P, Rodríguez C, Cerezo R (2019) The effect of parental control on cyber-victimization in adolescence: the mediating role of impulsivity and high-risk behaviors. Front Psychol 10:1159. https://doi.org/10.3389/fpsyg.2019.01159
Berrimi M, Moussaoui A, Oussalah M, Saidi M (2020) Attention-based networks for analyzing inappropriate speech in arabic text. In: 2020 4th international symposium on informatics and its applications (ISIA), IEEE, pp 1–6
Dang CN, Moreno-García MN, De la Prieta F (2021) Hybrid deep learning models for sentiment analysis. Complexity 2021:1–16
Dewani A, Memon MA, Bhatti S (2021) Cyberbullying detection: advanced preprocessing techniques & deep learning architecture for roman urdu data. J Big Data 8(1):1–20. https://doi.org/10.1186/s40537-021-00550-7
Dubey K, Nair R, Khan MU, Shaikh S (2020) Toxic comment detection using lstm. In: 2020 third international conference on advances in electronics, computers and communications (ICAECC), IEEE, pp 1–8
Jain N, Hegde A, Jain A, Joshi A, Madake J (2021) Pseudo-conventional approach for cyberbullying and hate-speech detection. In: 2021 international conference on advances in computing, communication, and control (ICAC3), IEEE, pp 1–8
Khanday AMUD, Bhushan B, Jhaveri RH, Khan QR, Raut R, Rabani ST (2022) Nnpcov19: artificial neural network-based propaganda identification on social media in covid-19 era. Mob Inf Syst 2022:1–10
Khanday AMUD, Khan QR, Rabani ST (2020) Analysing and predicting propaganda on social media using machine learning techniques. In: 2020 2nd international conference on advances in computing, communication control and networking (ICACCCN), IEEE, pp 122–127
Kowalski RM, Giumetti GW, Schroeder AN, Lattanner MR (2014) A meta-analysis of factors predicting cyberbullying perpetration and victimization: from the social cognitive and media effects approach. Psychol Bull
Lee E, Rustam F, Washington PB, El Barakaz F, Aljedaani W, Ashraf I (2022) Racism detection by analyzing differential opinions through sentiment analysis of tweets using stacked ensemble gcr-nn model. IEEE Access 10:9717–9728. https://doi.org/10.1109/ACCESS.2022.3144266
Luo Y, Zhang X, Hua J, Shen W (2021) Multi-featured cyberbullying detection based on deep learning. In: 2021 16th international conference on computer science & education (ICCSE), pp 746–751
Mahlangu T, Tu C (2019) Deep learning cyberbullying detection using stacked embbedings approach. In: 2019 6th international conference on soft computing & machine intelligence (ISCMI), IEEE, pp 45–49
Roy PK, Tripathy AK, Das TK, Gao X-Z (2020) A framework for hate speech detection using deep convolutional neural network. IEEE Access 8:204951–204962. https://doi.org/10.1109/ACCESS.2020.3037073.[CrossRef][GoogleScholar]
Sahana B, Sandhya G, Tanuja R, Ellur S, Ajina A (2020) Towards a safer conversation space: detection of toxic content in social media (student consortium). In: 2020 IEEE sixth international conference on multimedia big data (BigMM), pp 297–301
Sasson H, Mesch G (2014) Parental mediation, peer norms and risky online behavior among adolescents. Comput Hum Behav 33:32–38. https://doi.org/10.1016/j.chb.2013.12.025
Yadav J, Kumar D, Chauhan D (2020) Cyberbullying detection using pre-trained bert model. In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, pp 1096–1100
Yang C, Sharkey JD, Reed LA, Dowdy E (2020) Cyberbullying victimization and student engagement among adolescents: does school climate matter? Sch Psychol 35(2):158
Zampieri N, Ramisch C, Illina I, Fohr D (2022) Identification of multiword expressions in tweets for hate speech detection. In: LREC 2022-13th edition of its language resources and evaluation conference
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
CrediT author statement IO helped in supervision, conceptualization, methodology, software, investigation, validation, writing—original draft preparation. AA, LA, and AM contributed to writing—original draft preparation, visualization, investigation.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interest regarding the publication of this paper.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Obaidat, I., Al-zou’bi, A., Mughaid, A. et al. Investigating the cyberbullying risk in digital media: protecting victims in school teenagers. Soc. Netw. Anal. Min. 13, 139 (2023). https://doi.org/10.1007/s13278-023-01152-2
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13278-023-01152-2