IDEAS home Printed from https://ideas.repec.org/a/abq/ijist1/v5y2023i4p760-772.html
   My bibliography  Save this article

Utilizing Machine Learning for Detecting Cyber Bullying in Social Media

Author

Listed:
  • Saba Yousha

    (Department of Computer Information & Engineering, Mehran University of Engineering and Technology Jamshoro SINDH, Pakistan)

Abstract

The widespread dominance of the Internet and Electronic Media has made Social Media platforms a primary mode of communication. Unfortunately, these platforms have also become breeding grounds for harmful behavior, notably "Cyber Bullying," which involves using technology to inflict disrespect and harm on others. Despite various efforts by researchers to address this issue, the detection of such behavior remains crucial in combating this menace. This study aims to emphasize an effective approach for detecting cyberbullying on Social Media platforms. The findings indicate that the SVM (Support Vector Machine) classifier outperforms other classifiers in this context.We acquired tweet data from Twitter and used significant machine learning techniques to classify and forecast whether tweets are "offensive" or "non-offensive" and after that, using the Support Vector Machine'sAlgorithm, a machine learning-modelis prepared to detect Cyber Bullying on Social Media Platform.This research provide promising resultsto useML techniques for detection of Cyber Bullying.

Suggested Citation

  • Saba Yousha, 2023. "Utilizing Machine Learning for Detecting Cyber Bullying in Social Media," International Journal of Innovations in Science & Technology, 50sea, vol. 5(4), pages 760-772, December.
  • Handle: RePEc:abq:ijist1:v:5:y:2023:i:4:p:760-772
    as

    Download full text from publisher

    File URL: https://journal.50sea.com/index.php/IJIST/article/view/598/1216
    Download Restriction: no

    File URL: https://journal.50sea.com/index.php/IJIST/article/view/598
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Amgad Muneer & Suliman Mohamed Fati, 2020. "A Comparative Analysis of Machine Learning Techniques for Cyberbullying Detection on Twitter," Future Internet, MDPI, vol. 12(11), pages 1-20, October.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ebrahim A. A. Ghaleb & P. D. D. Dominic & Suliman Mohamed Fati & Amgad Muneer & Rao Faizan Ali, 2021. "The Assessment of Big Data Adoption Readiness with a Technology–Organization–Environment Framework: A Perspective towards Healthcare Employees," Sustainability, MDPI, vol. 13(15), pages 1-33, July.
    2. Suliman Mohamed Fati & Amgad Muneer & Ayed Alwadain & Abdullateef O. Balogun, 2023. "Cyberbullying Detection on Twitter Using Deep Learning-Based Attention Mechanisms and Continuous Bag of Words Feature Extraction," Mathematics, MDPI, vol. 11(16), pages 1-21, August.
    3. JongSerl Chun & Serim Lee & Jinyung Kim, 2024. "Ontology Development for Cyber Violence Victimization in Korean Adolescents," SAGE Open, , vol. 14(2), pages 21582440241, May.
    4. Hongzhe Kang & Yao Wang & Min Wang & Megat Imran Yasin & Mohd Nizam Osman & Lay Hoon Ang, 2024. "RETRACTED ARTICLE: Navigating Digital Network: Mindfulness as a Shield Against Cyberbullying in the Knowledge Economy Era," Journal of the Knowledge Economy, Springer;Portland International Center for Management of Engineering and Technology (PICMET), vol. 15(3), pages 13233-13271, September.
    5. José Manuel Ortiz-Marcos & María Tomé-Fernández & Christian Fernández-Leyva, 2021. "Cyberbullying Analysis in Intercultural Educational Environments Using Binary Logistic Regressions," Future Internet, MDPI, vol. 13(1), pages 1-15, January.
    6. Alaa Marshan & Farah Nasreen Mohamed Nizar & Athina Ioannou & Konstantina Spanaki, 2025. "Comparing Machine Learning and Deep Learning Techniques for Text Analytics: Detecting the Severity of Hate Comments Online," Information Systems Frontiers, Springer, vol. 27(2), pages 487-505, April.

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:abq:ijist1:v:5:y:2023:i:4:p:760-772. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Iqra Nazeer (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.