Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Due to the increased prevalence of cyberbullying and the detrimental impact it can have on adolescents, there is a critical need for tools to help combat cyberbullying. This paper introduces the ActionPoint app, a mobile application based on empirical work highlighting the importance of strong parent-teen relationships for reducing cyberbullying risk. The app is designed to help families improve their communication skills, set healthy boundaries for social media use, identify instances of cyberbullying and cyberbullying risk, and, ultimately, decrease the negative outcomes associated with cyberbullying. The app guides parents and teens through a series of interactive modules that engage them in evidence-based activities that promote better understanding of cyberbullying risks and healthy online behaviors. In this paper, we describe the app design, the psychology research supporting the design of each module, the architecture and implementation details, and crucial paths to extend the app.more » « less
-
Cyberbullying has become a prominent risk for youth and an increasing concern for parents. To help parents reduce their child’s cyberbullying risk, anti-bullying apps (ABAs)—mobile applications for identifying and preventing instances of cyberbullying—have been developed in recent years. Given that ABAs are an emerging technology, limited research has been conducted to understand the factors predicting parents’ intentions to use them. Drawing on three interdisciplinary theoretical frameworks, a sample of parents in the U.S. recruited through Amazon Mechanical Turk completed an online survey to assess parents’ knowledge of, attitudes about, and intentions to use ABAs. Participants also rated the importance of a range of ABA functions and provided information about their child’s social media use and bullying history. A series of path analyses revealed that the importance parents placed on an app’s ability to provide information about their child’s cyberbullying risk predicted more positive attitudes toward ABAs and greater perceived usefulness of them. Stronger intentions to use ABAs were predicted by greater cyberbullying concern, greater importance of social recommendations, greater perceived usefulness, more positive attitudes toward the apps, and lower ratings of the importance of ease of use. These findings shed light on the factors predicting parents’ intentions to use ABAs and the app features they view as most important. Crucial directions for future research and implications for antibullying efforts are discussed.more » « less
-
null (Ed.)Previous research has identified a link between mental health and cyberbullying, primarily in studies of youth. Fewer studies have examined cyberbullying in adults or how the relation between mental health and cyberbullying might vary based on an individual's social media use. The present research examined how three indicators of mental health—depression, anxiety, and substance use—interact with social media use and gender to predict cyberbullying in adults. In Study 1, U.S. adults recruited through Amazon Mechanical Turk ( N = 525) completed an online survey that included measures of mental health and cyberbullying. Multiple regression analyses revealed significant three-way interactions between mental health, degree of social media use, and gender in models predicting cyberbullying victimization and perpetration. Specifically, for men, depression and anxiety predicted greater cyberbullying victimization and perpetration, particularly among men with relatively higher levels of social media use. In contrast, depression and anxiety were uncorrelated with cyberbullying for women, regardless of level of social media use. Study 2 largely replicated these findings using well-validated measures of mental health (e.g., Center for Epidemiological Studies-Depression scale, Beck Anxiety Inventory, Global Appraisal of Individual Needs Substance Use scale) in U.S. adults recruited through Prolific.co ( N = 482). Together, these results underscore the importance of examining mental health correlates of cyberbullying within the context of social media use and gender and shed light on conditions in which indicators of mental health may be especially beneficial for predicting cyberbullying in adults.more » « less
-
null (Ed.)Cyberbullying is rapidly becoming one of the most serious online risks for adolescents. This has motivated work on machine learning methods to automate the process of cyberbullying detection, which have so far mostly viewed cyberbullying as one-off incidents that occur at a single point in time. Comparatively less is known about how cyberbullying behavior occurs and evolves over time. This oversight highlights a crucial open challenge for cyberbullying-related research, given that cyberbullying is typically defined as intentional acts of aggression via electronic communication that occur repeatedly and persistently . In this article, we center our discussion on the challenge of modeling temporal patterns of cyberbullying behavior. Specifically, we investigate how temporal information within a social media session, which has an inherently hierarchical structure (e.g., words form a comment and comments form a session), can be leveraged to facilitate cyberbullying detection. Recent findings from interdisciplinary research suggest that the temporal characteristics of bullying sessions differ from those of non-bullying sessions and that the temporal information from users’ comments can improve cyberbullying detection. The proposed framework consists of three distinctive features: (1) a hierarchical structure that reflects how a social media session is formed in a bottom-up manner; (2) attention mechanisms applied at the word- and comment-level to differentiate the contributions of words and comments to the representation of a social media session; and (3) the incorporation of temporal features in modeling cyberbullying behavior at the comment-level. Quantitative and qualitative evaluations are conducted on a real-world dataset collected from Instagram, the social networking site with the highest percentage of users reporting cyberbullying experiences. Results from empirical evaluations show the significance of the proposed methods, which are tailored to capture temporal patterns of cyberbullying detection.more » « less
-
Cyberbullying has become one of the most pressing online risks for young people and has raised serious concerns in society. The emerging literature identifies cyberbullying as repetitive acts that occur over time rather than one-off incidents. Yet, there has been relatively little work to model the hierarchical structure of social media sessions and the temporal dynamics of cyberbullying in online social network sessions. We propose a hierarchical attention network for cyberbullying detection that takes these aspects of cyberbullying into account. The primary distinctive characteristics of our approach include: (i) a hierarchical structure that mirrors the structure of a social media session; (ii) levels of attention mechanisms applied at the word and comment level, thereby enabling the model to pay different amounts of attention to words and comments, depending on the context; and (iii) a cyberbullying detection task that also predicts the interval of time between two adjacent comments. These characteristics allow the model to exploit the commonalities and differences across these two tasks to improve the performance of cyberbullying detection. Experiments on a real-world dataset from Instagram, the social media platform on which the highest percentage of users have reported experiencing cyberbullying, reveal that the proposed architecture outperforms the state-of-the-art method.more » « less
-
Over the last decade, research has revealed the high prevalence of cyberbullying among youth and raised serious concerns in society. Information on the social media platforms where cyberbullying is most prevalent (e.g., Instagram, Facebook, Twitter) is inherently multi-modal, yet most existing work on cyberbullying identification has focused solely on building generic classification models that rely exclusively on text analysis of online social media sessions (e.g., posts). Despite their empirical success, these efforts ignore the multi-modal information manifested in social media data (e.g., image, video, user profile, time, and location), and thus fail to offer a comprehensive understanding of cyberbullying. Conventionally, when information from different modalities is presented together, it often reveals complementary insights about the application domain and facilitates better learning performance. In this paper, we study the novel problem of cyberbullying detection within a multi-modal context by exploiting social media data in a collaborative way. This task, however, is challenging due to the complex combination of both cross-modal correlations among various modalities and structural dependencies between different social media sessions, and the diverse attribute information of different modalities. To address these challenges, we propose XBully, a novel cyberbullying detection framework, that first reformulates multi-modal social media data as a heterogeneous network and then aims to learn node embedding representations upon it. Extensive experimental evaluations on real-world multi-modal social media datasets show that the XBully framework is superior to the state-of-the-art cyberbullying detection models.more » « less
-
Cyberbullying has become one of the most pressing online risks for adolescents and has raised serious concerns in society. Traditional efforts are primarily devoted to building a single generic classification model for all users to differentiate bullying behaviors from the normal content [6, 3, 1, 2, 4]. Despite its empirical success, these models treat users equally and inevitably ignore the idiosyncrasies of users. Recent studies from psychology and sociology suggest that the occurrence of cyberbullying has a strong connection with the personality of victims and bullies embedded in the user-generated content, and the peer influence from like-minded users. In this paper, we propose a personalized cyberbullying detection framework PI-Bully with peer influence in a collaborative environment to tailor the prediction for each individual. In particular, the personalized classifier of each individual consists of three components: a global model that captures the commonality shared by all users, a personalized model that expresses the idiosyncratic personality of each specific user, and a third component that encodes the peer influence received from like-minded users. Most of the existing methods adopt a two-stage approach: they first apply feature engineering to capture the cyberbullying patterns and then employ machine learning classifiers to detect cyberbullying behaviors. However, building a personalized cyberbullying detection framework that is customized to each individual remains a challenging task, in large part because: (1) Social media data is often sparse, noisy and high-dimensional (2) It is important to capture the commonality shared by all users as well as idiosyncratic aspects of the personality of each individual for automatic cyberbullying detection; (3) In reality, a potential victim of cyberbullying is often influenced by peers and the influences from different users could be quite diverse. Hence, it is imperative to develop a way to encode the diversity of peer influence for cyberbullying detection. To summarize, we study a novel problem of personalized cyberbullying detection with peer influence in a collaborative environment, which is able to jointly model users' common features, unique personalities and peer influence to identify cyberbullying cases.more » « less
An official website of the United States government

Full Text Available