Cyberbullying Detection on Social Media Using Machine Learning Techniques
DOI:
https://doi.org/10.13053/cys-29-3-5481Keywords:
Cyberbullying, bullying, sentiment analysis, natural language processing, machine learning.Abstract
With the advancement of social media, cyberbullying among social media users has grown knowingly, causing serious problems such as economic, health, social, and psychological problems. Nowadays, most of the social media users have been affected by cyberbullying, aggressive behavior, and suffering from digital harassment. Several machine-learning techniques are applied to detect cyberbullying from text data sets generated by Twitter and Formspring.com. It is found that cyber-bullies participate in fewer online groups and are not much more popular than normal users. However, one major issue in cyberbullying detection and sentiment analysis is the deficiency of labeled data. Consequently, researchers are usually forced to depend on survey-based data where committers and sufferers provide details about their imitations. Therefore, un-labeled data is gathered, and data annotation techniques are applied to label the data set. After that two more labeled datasets are gathered and machine learning classifiers (voting classifier, random forest, SVM, linear SVM, and Gaussian naïve Bayes) are applied to these labeled datasets to train the model. Thus, the trained model was applied to the primary dataset, but the results gained were not satisfactory. Therefore, the select-k-best (chi^2) feature selection algorithm was applied to reduce features. Hence, the primary dataset is verified by applying the trained model with an accuracy of 91%.Downloads
Published
2025-09-25
Issue
Section
Articles
License
Hereby I transfer exclusively to the Journal "Computación y Sistemas", published by the Computing Research Center (CIC-IPN),the Copyright of the aforementioned paper. I also accept that these
rights will not be transferred to any other publication, in any other format, language or other existing means of developing.I certify that the paper has not been previously disclosed or simultaneously submitted to any other publication, and that it does not contain material whose publication would violate the Copyright or other proprietary rights of any person, company or institution. I certify that I have the permission from the institution or company where I work or study to publish this work.The representative author accepts the responsibility for the publicationof this paper on behalf of each and every one of the authors.
This transfer is subject to the following conditions:- The authors retain all ownership rights (such as patent rights) of this work, except for the publishing rights transferred to the CIC, through this document.
- Authors retain the right to publish the work in whole or in part in any book they are the authors or publishers. They can also make use of this work in conferences, courses, personal web pages, and so on.
- Authors may include working as part of his thesis, for non-profit distribution only.