Investigation into the Automated Detection of Image Based Cyber Bullying on Social Media Platforms

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Access to the Web 2.0 technologies and social networking has become a ubiquitous factor of our lifestyles. Mobile devices, smart phones and other such technologies create a permanent link between the person and their presence on the Internet. Reporting daily activities, feelings, opinions and emotions have become common place, particularly with teenagers and young adults. Circles of friendships can expand rapidly without careful consideration to what is being shared and to whom. Such an environment has become an avenue for cyber bullying, enabling persecutors to breach the safety of the home environment to reach their victims. In order for social networking to be a safe technology in the lives of adolescents and vulnerable adults, measures need to be put in place to monitor and detect potentially threatening online activity. In this paper an overview is given of the possible techniques that could be employed in the detection of negative online interactions. The combination of sentiment analysis with image processing techniques is considered as a suitable platform from which to categorize the textual and visual connotations of the content. This is illustrated as a flow diagram illustrating the key processes envisaged for the detection of potential cyber bullying threats.
LanguageEnglish
Title of host publicationUnknown Host Publication
Pages193-194
Number of pages2
Publication statusPublished - 1 Sep 2014
Event2014 Irish Machine Vision and Image processing conference - Derry-Londonderry Northern Ireland
Duration: 1 Sep 2014 → …

Conference

Conference2014 Irish Machine Vision and Image processing conference
Period1/09/14 → …

Fingerprint

Mobile devices
Image processing
Internet

Cite this

@inproceedings{e50d0252b2ed420588eed67460fd01d1,
title = "Investigation into the Automated Detection of Image Based Cyber Bullying on Social Media Platforms",
abstract = "Access to the Web 2.0 technologies and social networking has become a ubiquitous factor of our lifestyles. Mobile devices, smart phones and other such technologies create a permanent link between the person and their presence on the Internet. Reporting daily activities, feelings, opinions and emotions have become common place, particularly with teenagers and young adults. Circles of friendships can expand rapidly without careful consideration to what is being shared and to whom. Such an environment has become an avenue for cyber bullying, enabling persecutors to breach the safety of the home environment to reach their victims. In order for social networking to be a safe technology in the lives of adolescents and vulnerable adults, measures need to be put in place to monitor and detect potentially threatening online activity. In this paper an overview is given of the possible techniques that could be employed in the detection of negative online interactions. The combination of sentiment analysis with image processing techniques is considered as a suitable platform from which to categorize the textual and visual connotations of the content. This is illustrated as a flow diagram illustrating the key processes envisaged for the detection of potential cyber bullying threats.",
author = "Gaye Lightbody and Raymond Bond and Maurice Mulvenna and Yaxin Bi and Macartan Mulligan",
year = "2014",
month = "9",
day = "1",
language = "English",
pages = "193--194",
booktitle = "Unknown Host Publication",

}

Lightbody, G, Bond, R, Mulvenna, M, Bi, Y & Mulligan, M 2014, Investigation into the Automated Detection of Image Based Cyber Bullying on Social Media Platforms. in Unknown Host Publication. pp. 193-194, 2014 Irish Machine Vision and Image processing conference, 1/09/14.

Investigation into the Automated Detection of Image Based Cyber Bullying on Social Media Platforms. / Lightbody, Gaye; Bond, Raymond; Mulvenna, Maurice; Bi, Yaxin; Mulligan, Macartan.

Unknown Host Publication. 2014. p. 193-194.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Investigation into the Automated Detection of Image Based Cyber Bullying on Social Media Platforms

AU - Lightbody, Gaye

AU - Bond, Raymond

AU - Mulvenna, Maurice

AU - Bi, Yaxin

AU - Mulligan, Macartan

PY - 2014/9/1

Y1 - 2014/9/1

N2 - Access to the Web 2.0 technologies and social networking has become a ubiquitous factor of our lifestyles. Mobile devices, smart phones and other such technologies create a permanent link between the person and their presence on the Internet. Reporting daily activities, feelings, opinions and emotions have become common place, particularly with teenagers and young adults. Circles of friendships can expand rapidly without careful consideration to what is being shared and to whom. Such an environment has become an avenue for cyber bullying, enabling persecutors to breach the safety of the home environment to reach their victims. In order for social networking to be a safe technology in the lives of adolescents and vulnerable adults, measures need to be put in place to monitor and detect potentially threatening online activity. In this paper an overview is given of the possible techniques that could be employed in the detection of negative online interactions. The combination of sentiment analysis with image processing techniques is considered as a suitable platform from which to categorize the textual and visual connotations of the content. This is illustrated as a flow diagram illustrating the key processes envisaged for the detection of potential cyber bullying threats.

AB - Access to the Web 2.0 technologies and social networking has become a ubiquitous factor of our lifestyles. Mobile devices, smart phones and other such technologies create a permanent link between the person and their presence on the Internet. Reporting daily activities, feelings, opinions and emotions have become common place, particularly with teenagers and young adults. Circles of friendships can expand rapidly without careful consideration to what is being shared and to whom. Such an environment has become an avenue for cyber bullying, enabling persecutors to breach the safety of the home environment to reach their victims. In order for social networking to be a safe technology in the lives of adolescents and vulnerable adults, measures need to be put in place to monitor and detect potentially threatening online activity. In this paper an overview is given of the possible techniques that could be employed in the detection of negative online interactions. The combination of sentiment analysis with image processing techniques is considered as a suitable platform from which to categorize the textual and visual connotations of the content. This is illustrated as a flow diagram illustrating the key processes envisaged for the detection of potential cyber bullying threats.

M3 - Conference contribution

SP - 193

EP - 194

BT - Unknown Host Publication

ER -