Journal of Industrial and Systems Engineering

Journal of Industrial and Systems Engineering

Prediction of Risk Factors in Cyber Harassment Using Big Data Analytics on Social Media

Document Type : Research Paper

Authors
1 Department of Industrial Management, West Tehran Branch, Islamic Azad University, Tehran, Iran
2 Department of Industrial Management, South Tehran Branch, Islamic Azad University, Tehran, Iran
3 Department of Information Technology Management, Science and Research Branch, Islamic Azad University, Tehran, Iran
4 Department of Industrial Engineering, Faculty of Industrial and Mechanical Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran
Abstract
Taking into account the fact that social media are today known as a platform to express and relieve the emotions, stress, and concerns that adolescents face in their daily lives, the ground has been provided for self-seekers. This is to the extent that these websites have been raised as a place for serious social problems and that vulnerable people, especially adolescents, are harassed on the Internet, commit suicide, or become bullies who harm others. Many new research papers are published every day in which various artificial intelligence (AI) techniques are applied to various tasks and applications related to sentiment analysis.
Keywords
Subjects

Aliahmadi, A., Jafari-Eskandari, M., Mozafari, M., & Nozari, H. (2013). Comparing artificial neural networks and regression methods for predicting crude oil exports. International Journal of Information, Business and Management, 5(2), 40-58.
Ameri, H., Alizadeh, S., & Barzegari, A. (2013). Knowledge extraction from the data of diabetic patients using the decision tree method. Journal of Health Management, (53)16.
Bathaee, M., Nozari, H., & Szmelter-Jarosz, A. (2023). Designing a new location-allocation and routing model with simultaneous pick-up and delivery in a closed-loop supply chain network under uncertainty. Logistics, 7(1), 3.
Braha, D. (2013). Data mining for design and manufacturing: methods and applications. Springer Science & Business Media.
Chatzakou, D., Leontiadis, I., Blackburn, J., Cristofaro, E. D., Stringhini, G., Vakali, A., & Kourtellis, N. (2019). Detecting cyberbullying and cyberaggression in social media. ACM Transactions on the Web (TWEB), 13(3), 1-51.
Dastani, M., Mousavi Chalek, A., Ziyai, S., & Delghanadi, F. (2020). Thematic analysis of published articles of medical librarianship and information in Iran using text mining techniques. Health Image, 1(1), 10-15.
Gutiérrez-Esparza, G. O., Vallejo-Allende, M., & Hernández-Torruco, J. (2019). Classification of cyber-aggression cases applying machine learning. Applied Sciences, 9(9), 1828.
Hadi, R. M., Hashem, S. H., & Maolood, A. T. (2017). An effective preprocessing step algorithm in text mining application. Engineering and Technology Journal, 35(2B), 232-241.
Hematpoor, B., Mazaheri, A. M., & Mohseni, R. A. (2017). Detection and sociological explanation of violence against women in cyber space. Women's Research Journal, 8(4), 131-105.
Herodotou, H., Chatzakou, D., & Kourtellis, N. (2020). A streaming machine learning framework for online aggression detection on Twitter. In 2020 IEEE International Conference on Big Data (Big Data) (pp. 5056-5067). IEEE.
Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of Suicide Research, 14(3), 206-221. https://doi.org/10.1080/13811118.2010.494133
Holland, D., Ireland, J. L., & Muncer, S. (2009). Impulsivity, attribution and prison bullying: Bully-category and perpetrator–victim mutuality. International journal of law and psychiatry, 32(2), 84-91. https://doi.org/10.10/j.ijlp.2009.01.00
Jafari, E., & Samadian, M.-a. (2012). The use of data mining in investigating the behavior of delinquent drivers in big cities. Traffic Studies Quarterly,  9(17), 14-35.
Lotfi, F. H. Z., Najafi, S. E., & Nozari, H. (Eds.). (2016). Data envelopment analysis and effective performance assessment. IGI Global.
Mandela, N., & Kennedy, J. F. (2018). Online harassment: bullying, stalking and trolling. In Internet Literacy Handbook.
Mehrani, K., Mirshahvalad, A., & Abbasi, E. (2019). Comparison of the Accuracy of Black Hole Algorithms and Gravitational Research and the Hybrid Method in Portfolio Optimization. International Journal of Finance & Managerial Accounting, 4(14), 111-126.
Mehrani, K., Mirshahvalad, A., & Abbasi, E. (2019). Portfolio optimization using black hole meta heuristic algorithm. specialty journal of accounting and economics, 5(2-2019), 1-13.
Moon, B., Hwang, H. W., & McCluskey, J. D. (2011). Causes of school bullying: Empirical test of a general theory of crime, differential association theory, and general strain theory. Crime & Delinquency, 57(6), 849-877.
Muneer, A., & Fati, S. M. (2020). A comparative analysis of machine learning techniques for cyberbullying detection on twitter. Future Internet, 12(11), 187.
Noori, S., Nourijelyani, K., & Mohammad, K. (2011). Random Forests Analysis: A modern statistical method for screening in high-dimensional studies and its application in a population-based genetic. Journal of North Khorasan University of Medical Sciences, 3, 49-57.
Nozari, H., & Ghahremani-Nahr, J. (2023). A Comprehensive Strategic-Tactical Multi-Objective Sustainable Supply Chain Model with Human Resources Considerations. Supply Chain Analytics, 4, 100044.
Nozari, H., Najafi, S. E., Jafari-Eskandari, M., & Aliahmadi, A. (2016). Providing a model for virtual project management with an emphasis on IT projects. In Project Management: Concepts, Methodologies, Tools, and Applications (pp. 476-496). IGI Global.
Rafiq, R. I., Hosseinmardi, H., Lv, R., Han, Q., & Mishra, S. (2018). Scalable and timely detection of cyberbullying in online social networks. In Proceedings of the 33rd Annual ACM Symposium on Applied Computing (pp. 1738-1747). ACM.
Rahmaty, M., Daneshvar, A., Salahi, F., Ebrahimi, M., & Chobar, A. P. (2022). Customer churn modeling via the grey wolf optimizer and ensemble neural networks. Discrete Dynamics in Nature and Society, 2022(1), 9390768.
Saadollahi, A., & Najimeh, A. (2015). Data mining comparison of PSIRC methodology and RMEES methodology. In Proceedings of the Second International Research Conference in Science and Technology.
Saito, T., & Rehmsmeier, M. (2015). The precision-recall plot is more informative than the ROC plot when evaluating binary classifiers on imbalanced datasets. PloS one, 10(3), e0118432.
Sedehi, M., Mehrabi, Y., Kazemnejad, A., & Hadaegh, F. (2010). Comparison of artificial neural network, logistic regression and discriminant analysis methods in prediction of metabolic syndrome. Iranian Journal of Endocrinology and Metabolism, 11(4), 638-646.
Shafique, U., & Qaiser, H. (2014). A comparative study of data mining process models (KDD, CRISP-DM and SEMMA). International Journal of Innovation and Scientific Research, 12(1), 217-222.
Shin, S., Lee, S., & Kim, J. (2005). An application of support vector machines in bankruptcy prediction model. Expert Systems with Applications, 28(1), 127-135.
Singh, V., & Saini, B. (2014). An effective tokenization algorithm for information retrieval systems. Department of Computer Engineering, National Institute of Technology Kurukshetra, Haryana, India.
Singhal, P., & Bansal, A. (2013). Improved textual cyberbullying detection using data mining. International Journal of Information and Computation Technology, 3(6), 569-575.
Smith, P. K. (2012). Cyberbullying and cyber aggression. In Handbook of school violence and school safety (pp. 93-103). Routledge.
Taher, S. A., Akhter, K. A., & Hasan, K. A. (2018). N-gram based sentiment mining for Bangla text using support vector machine. In 2018 International Conference on Bangla Speech and Language Processing (ICBSLP) (pp. 1-5). IEEE.
Yao, M., Chelmis, C., & Zois, D. S. (2019, May). Cyberbullying ends here: Towards robust detection of cyberbullying in social media. In The World Wide Web Conference (pp. 3427-3433).
Ybarra, M. L., & Mitchell, K. J. (2007). Prevalence and frequency of Internet harassment instigation: Implications for adolescent health. Journal of Adolescent Health, 41(2), 189-195.

  • Receive Date 18 March 2023
  • Revise Date 12 June 2023
  • Accept Date 22 June 2023