Reference Hub1
Social Interactions and Automated Detection Tools in Cyberbullying

Social Interactions and Automated Detection Tools in Cyberbullying

Michael J. Moore, Tadashi Nakano, Tatsuya Suda, Akihiro Enomoto
Copyright: © 2013 |Pages: 21
ISBN13: 9781466639263|ISBN10: 1466639261|EISBN13: 9781466639270
DOI: 10.4018/978-1-4666-3926-3.ch004
Cite Chapter Cite Chapter

MLA

Moore, Michael J., et al. "Social Interactions and Automated Detection Tools in Cyberbullying." Social Network Engineering for Secure Web Data and Services, edited by Luca Caviglione, et al., IGI Global, 2013, pp. 67-87. https://doi.org/10.4018/978-1-4666-3926-3.ch004

APA

Moore, M. J., Nakano, T., Suda, T., & Enomoto, A. (2013). Social Interactions and Automated Detection Tools in Cyberbullying. In L. Caviglione, M. Coccoli, & A. Merlo (Eds.), Social Network Engineering for Secure Web Data and Services (pp. 67-87). IGI Global. https://doi.org/10.4018/978-1-4666-3926-3.ch004

Chicago

Moore, Michael J., et al. "Social Interactions and Automated Detection Tools in Cyberbullying." In Social Network Engineering for Secure Web Data and Services, edited by Luca Caviglione, Mauro Coccoli, and Alessio Merlo, 67-87. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3926-3.ch004

Export Reference

Mendeley
Favorite

Abstract

Face-to-Face bullying is a traditional form of bullying in which bullies attack victims through physical, verbal, or social attacks. Cyberbullying is a new form of bullying. Cyberbullies abuse digital media to attack victims (such as attacks through websites, social networking services, blogging, e-mail, instant messaging, chat rooms, and cell phones). Cyberbullying and face-to-face bullying share many similarities. For example, bullies achieve power over a victim in both cyberbullying and face-to-face bullying. On the other hand, cyberbullying has differences from face-to-face bullying that arise from characteristics of digital media such as anonymity and rapid spreading of attacks. This chapter highlights key concerns of cyberbullying stemming from the use of digital media and discusses existing models of face-to-face bullying which may aid in model cyberbullying. This chapter then introduces state-of-the-art research in automated tools to detect cyberbullying. Finally, this chapter concludes with future perspective of research in automated tools to detect cyberbullying.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.