{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T14:47:44Z","timestamp":1775486864428,"version":"3.50.1"},"reference-count":116,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T00:00:00Z","timestamp":1603929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The advent of social media, particularly Twitter, raises many issues due to a misunderstanding regarding the concept of freedom of speech. One of these issues is cyberbullying, which is a critical global issue that affects both individual victims and societies. Many attempts have been introduced in the literature to intervene in, prevent, or mitigate cyberbullying; however, because these attempts rely on the victims\u2019 interactions, they are not practical. Therefore, detection of cyberbullying without the involvement of the victims is necessary. In this study, we attempted to explore this issue by compiling a global dataset of 37,373 unique tweets from Twitter. Moreover, seven machine learning classifiers were used, namely, Logistic Regression (LR), Light Gradient Boosting Machine (LGBM), Stochastic Gradient Descent (SGD), Random Forest (RF), AdaBoost (ADB), Naive Bayes (NB), and Support Vector Machine (SVM). Each of these algorithms was evaluated using accuracy, precision, recall, and F1 score as the performance metrics to determine the classifiers\u2019 recognition rates applied to the global dataset. The experimental results show the superiority of LR, which achieved a median accuracy of around 90.57%. Among the classifiers, logistic regression achieved the best F1 score (0.928), SGD achieved the best precision (0.968), and SVM achieved the best recall (1.00).<\/jats:p>","DOI":"10.3390\/fi12110187","type":"journal-article","created":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T21:21:00Z","timestamp":1604006460000},"page":"187","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":151,"title":["A Comparative Analysis of Machine Learning Techniques for Cyberbullying Detection on Twitter"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7157-3020","authenticated-orcid":false,"given":"Amgad","family":"Muneer","sequence":"first","affiliation":[{"name":"Department of Computer and Information Sciences, Universiti Teknologi PETRONAS, Seri Iskandar 32160, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6969-2338","authenticated-orcid":false,"given":"Suliman Mohamed","family":"Fati","sequence":"additional","affiliation":[{"name":"Information Systems Department, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2020,10,29]]},"reference":[{"key":"ref_1","first-page":"79","article-title":"The history of social media and its impact on business","volume":"16","author":"Edosomwan","year":"2011","journal-title":"J. Appl. Manag. Entrep."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bauman, S. (2014). Cyberbullying: What Counselors Need to Know, John Wiley & Sons.","DOI":"10.1002\/9781119221685"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Pereira-Kohatsu, J.C., Quijano-S\u00e1nchez, L., Liberatore, F., and Camacho-Collados, M. (2019). Detecting and Monitoring Hate Speech in Twitter. Sensors, 19.","DOI":"10.3390\/s19214654"},{"key":"ref_4","first-page":"379","article-title":"Cyberbullying and its consequences: How cyberbullying is contorting the minds of victims and bullies alike, and the law\u2019s limited available redress","volume":"26","author":"Miller","year":"2016","journal-title":"S. Cal. Interdisc. Law J."},{"key":"ref_5","first-page":"51","article-title":"Cyberbullying: Experiences, impacts and coping strategies as described by australian young people","volume":"29","author":"Price","year":"2010","journal-title":"Youth Stud. Aust."},{"key":"ref_6","unstructured":"Smith, P.K. (2015). Cyberbullying and Cyber Aggression. Handbook of School Violence and School Safety, Informa UK Limited."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Sampasa-Kanyinga, H., Roumeliotis, P., and Xu, H. (2014). Associations between Cyberbullying and School Bullying Victimization and Suicidal Ideation, Plans and Attempts among Canadian Schoolchildren. PLoS ONE, 9.","DOI":"10.1371\/journal.pone.0102145"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Davidson, T., Warmsley, D., Macy, M., and Weber, I. (2017). Automated Hate Speech Detection and the Problem of Offensive Language. arXiv.","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"ref_9","unstructured":"Mc Guckin, C., and Corcoran, L. (2017). Cyberbullying: Where Are We Now? A Cross-National Understanding, MDPI."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1177\/0706743716684791","article-title":"Cyberbullying in Children and Youth: Implications for Health and Clinical Practice","volume":"62","author":"Vaillancourt","year":"2016","journal-title":"Can. J. Psychiatry"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/17482798.2012.739756","article-title":"What Makes a Bully a Cyberbully? Unravelling the Characteristics of Cyberbullies across Twenty-Five European Countries","volume":"7","year":"2013","journal-title":"J. Child. Media"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","article-title":"Term-wsevening approaches in automatic text retrieval","volume":"24","author":"Salton","year":"1988","journal-title":"Inf. Process. Manag."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Liu, Q., Wang, J., Zhang, D., Yang, Y., and Wang, N. (2018, January 7\u201310). Text Features Extraction based on TF-IDF Associating Semantic. Proceedings of the 2018 IEEE 4th International Conference on Computer and Communications (ICCC), Chengdu, China.","DOI":"10.1109\/CompComm.2018.8780663"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., and Manning, C. (2014, January 25\u201329). Glove: Global Vectors for Word Representation. Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar.","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref_15","unstructured":"Goldberg, Y., and Levy, O. (2014). word2vec Explained: Deriving Mikolov et al.\u2019s negative-sampling word-embedding method. arXiv."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1794","DOI":"10.3906\/elk-1806-38","article-title":"Key word extraction for short text via word2vec, doc2vec, and textrank","volume":"27","author":"Li","year":"2019","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MWC.2016.1500356WC","article-title":"Machine Learning Paradigms for Next-Generation Wireless Networks","volume":"24","author":"Jiang","year":"2016","journal-title":"IEEE Wirel. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1093","DOI":"10.1016\/j.asej.2014.04.011","article-title":"Sentiment analysis algorithms and applications: A survey","volume":"5","author":"Medhat","year":"2014","journal-title":"Ain Shams Eng. J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"70701","DOI":"10.1109\/ACCESS.2019.2918354","article-title":"Predicting Cyberbullying on Social Media in the Big Data Era Using Machine Learning Algorithms: Review of Literature and Open Challenges","volume":"7","author":"Hussain","year":"2019","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1504\/IJDATS.2011.041335","article-title":"Logistic regression in data analysis: An overview","volume":"3","author":"Maalouf","year":"2011","journal-title":"Int. J. Data Anal. Tech. Strat."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Hosmer, D.W., Lemeshow, S., and Sturdivant, R.X. (2013). Applied Logistic Regression, Wiley.","DOI":"10.1002\/9781118548387"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Chavan, V.S., and Shylaja, S.S. (2015, January 10\u201313). Machine learning approach for detection of cyber-aggressive comments by peers on social media network. Proceedings of the 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, India.","DOI":"10.1109\/ICACCI.2015.7275970"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Mangaonkar, A., Hayrapetian, A., and Raje, R. (2015, January 21\u201323). Collaborative detection of cyberbullying behavior in Twitter data. Proceedings of the 2015 IEEE International Conference on Electro\/Information Technology (EIT), Dekalb, IL, USA.","DOI":"10.1109\/EIT.2015.7293405"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Leon-Paredes, G.A., Palomeque-Leon, W.F., Gallegos-Segovia, P.L., Vintimilla-Tapia, P.E., Bravo-Torres, J.F., Barbosa-Santillan, L.I., and Paredes-Pinos, M.M. (2019, January 13\u201327). Presumptive Detection of Cyberbullying on Twitter through Natural Language Processing and Machine Learning in the Spanish Language. Proceedings of the 2019 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), Valparaiso, Chile.","DOI":"10.1109\/CHILECON47746.2019.8987684"},{"key":"ref_25","unstructured":"Ho, S.M., Li, W., Lai, C.J., and Ankamah, B. (2019, January 15). Charged Language on Twitter: A Predictive Model of Cyberbullying to Prevent Victimization. Proceedings of the 2019 AIS SIGSEC Special Interest Group 10th Annual Workshop on Information Security and Privacy (WISP), International Conference on Information Systems (ICIS), AIS, Munich, Germany."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ibn Rafiq, R., Hosseinmardi, H., Han, R., Lv, Q., and Mishra, S. (2018, January 9\u201313). Scalable and timely detection of cyberbullying in online social networks. Proceedings of the 33rd Annual ACM Symposium on Applied Computing\u2014SAC \u201918, Pau, France.","DOI":"10.1145\/3167132.3167317"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Cheng, L., Li, J., Silva, Y.N., Hall, D.L., and Liu, H. (2019, January 11\u201315). XBully: Cyberbullying Detection within a Multi-Modal Context. Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, Melbourne, Australia.","DOI":"10.1145\/3289600.3291037"},{"key":"ref_28","first-page":"375","article-title":"Detecting cyberbullying in social networks using multi-agent system","volume":"12","author":"Nahar","year":"2014","journal-title":"Web Intell. Agent Syst. Int. J."},{"key":"ref_29","unstructured":"Mandot, P. (2020, July 22). What Is Lightgbm, How to Implement It? How to Fine Tune the Parameters? Medium. Available online: https:\/\/medium.com\/@pushkarmandot\/https-medium-com-pushkarmandot-what-is-lightgbm-how-to-implement-it-how-to-fine-tune-the-parameters-60347819b7fc."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Rahman, S., Irfan, M., Raza, M., Ghori, K.M., Yaqoob, S., and Awais, M. (2020). Performance Analysis of Boosting Classifiers in Recognizing Activities of Daily Living. Int. J. Environ. Res. Public Health, 17.","DOI":"10.3390\/ijerph17031082"},{"key":"ref_31","unstructured":"Brownlee, J. (2020, July 22). Gradient Boosting With Scikit-Learn, Xgboost, Lightgbm, and Catboost. Machine Learning Mastery. Available online: https:\/\/machinelearningmastery.com\/gradient-boosting-with-scikit-learn-xgboost-lightgbm-and-catboost\/."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"113362","DOI":"10.1016\/j.dss.2020.113362","article-title":"Antisocial online behavior detection using deep learning","volume":"138","author":"Zinovyeva","year":"2020","journal-title":"Decis. Support Syst."},{"key":"ref_33","unstructured":"Bhattacharya, I., and Lindgreen, E.R. (2020, January 15\u201317). A Semi-Supervised Machine Learning Approach to Detect Anomalies in Big Accounting Data. Proceedings of the ECIS, Marrakech, Morocco."},{"key":"ref_34","unstructured":"Ke, G., Meng, Q., Finley, T., Wang, T., Chen, W., Ma, W., Ye, Q., and Liu, T.Y. (2017). Lightgbm: A highly efficient gradient boosting decision tree. Advances in Neural Information Processing Systems, Morgan Kaufmann Publishers Inc."},{"key":"ref_35","unstructured":"Brownlee, J. (2016). Master Machine Learning Algorithms: Discover How They Work and Implement Them from Scratch, Machine Learning Mastery."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Pawar, R., Agrawal, Y., Joshi, A., Gorrepati, R., and Raje, R.R. (2018, January 3\u20135). Cyberbullying detection system with multiple server configurations. Proceedings of the 2018 IEEE International Conference on Electro\/Information Technology (EIT), Rochester, MI, USA.","DOI":"10.1109\/EIT.2018.8500110"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"168","DOI":"10.31127\/tuje.554417","article-title":"Automatic Detection of Cyberbullying in FORMSPRING.Me, Myspace and Youtube Social Networks","volume":"3","author":"Aci","year":"2019","journal-title":"Turk. J. Eng."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Pawar, R., and Raje, R.R. (2019, January 20\u201322). Multilingual Cyberbullying Detection System. Proceedings of the 2019 IEEE International Conference on Electro Information Technology (EIT), Brookings, SD, USA.","DOI":"10.1109\/EIT.2019.8833846"},{"key":"ref_39","unstructured":"(2020, July 22). Why Logistic Regression over Na\u00efve Bayes. Available online: https:\/\/medium.com\/@sangha_deb\/naive-bayes-vs-logisticregression-a319b07a5d4c."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"ref_41","unstructured":"Patel, S. (2020, July 22). Chapter 5: Random Forest Classifier. Available online: https:\/\/medium.com\/machine-learning-101\/chapter-5-random-forest-classifier-56dc7425c3e1."},{"key":"ref_42","unstructured":"Louppe, G. (2014). Understanding random forests: From theory to practice. arXiv."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"012029","DOI":"10.1088\/1742-6596\/1192\/1\/012029","article-title":"Cyberbullying identification on twitter using random forest classifier","volume":"1192","author":"Novalita","year":"2019","journal-title":"J. Physics Conf. Ser."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Garc\u00eda-Recuero, \u00c1. (2016, January 11\u201315). Discouraging Abusive Behavior in Privacy-Preserving Online Social Networking Applications. Proceedings of the 25th International Conference Companion on World Wide Web\u2014WWW \u201916 Companion, Montreal, QC, Canada.","DOI":"10.1145\/2872518.2888600"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Waseem, Z., and Hovy, D. (2016, January 16\u201317). Hateful Symbols or Hateful People? Predictive Features for Hate Speech Detection on Twitter. Proceedings of the NAACL Student Research Workshop, San Diego, CA, USA.","DOI":"10.18653\/v1\/N16-2013"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"00222","DOI":"10.1051\/matecconf\/201713900222","article-title":"AdaBoost typical Algorithm and its application research","volume":"Volume 139","author":"Chengsheng","year":"2017","journal-title":"MATEC Web of Conferences"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Chatterjee, R., Datta, A., and Sanyal, D.K. (2019). Ensemble Learning Approach to Motor Imagery EEG Signal Classification. Machine Learning in Bio-Signal Analysis and Diagnostic Imaging, Elsevier BV.","DOI":"10.1016\/B978-0-12-816086-2.00008-4"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Misra, S., and Li, H. (2020). Noninvasive fracture characterization based on the classification of sonic wave travel times. Machine Learning for Subsurface Characterization, Elsevier BV.","DOI":"10.1016\/B978-0-12-817736-5.00009-0"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Ibn Rafiq, R., Hosseinmardi, H., Han, R., Lv, Q., Mishra, S., and Mattson, S.A. (2015). Careful What You Share in Six Seconds.ss2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2015\u2014ASONAM \u201915, Association for Computing Machinery (ACM).","DOI":"10.1145\/2808797.2809381"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Tarwani, S., Jethanandani, M., and Kant, V. (2019). Cyberbullying Detection in Hindi-English Code-Mixed Language Using Sentiment Classification. Communications in Computer and Information Science, Springer Science and Business Media LLC.","DOI":"10.1007\/978-981-13-9942-8_51"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Raza, M.O., Memon, M., Bhatti, S., and Bux, R. (2020). Detecting Cyberbullying in Social Commentary Using Supervised Machine Learning. Advances in Intelligent Systems and Computing, Springer Science and Business Media LLC.","DOI":"10.1007\/978-3-030-39442-4_45"},{"key":"ref_52","first-page":"jzv048","article-title":"Supervised machine learning for the detection of troll profiles in twitter social network: Application to a real case of cyberbullying","volume":"24","author":"Santos","year":"2015","journal-title":"Log. J. IGPL"},{"key":"ref_53","first-page":"1","article-title":"Cyber Bullying Detection and Classification using Multinomial Na\u00efve Bayes and Fuzzy Logic","volume":"5","author":"Akhter","year":"2019","journal-title":"Int. J. Math. Sci. Comput."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"510","DOI":"10.26483\/ijarcs.v9i1.5396","article-title":"Cyberbullying revelation in twitter data using na\u00efve bayes classifier algorithm","volume":"9","author":"Nandakumar","year":"2018","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref_55","unstructured":"Dinakar, K., Reichart, R., and Lieberman, H. (2011, January 17\u201321). Modeling the detection of textual cyberbullying. Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, Barcelona, Spain."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zhou, Y., Zhu, S., and Xu, H. (2012, January 3\u20135). Detecting Offensive Language in Social Media to Protect Adolescent Online Safety. Proceedings of the 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, Amsterdam, The Netherlands.","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"ref_57","unstructured":"Sintaha, M., Satter, S.B., Zawad, N., Swarnaker, C., and Hassan, A. (2016). Cyberbullying Detection Using Sentiment Analysis in Social Media. [Ph.D. Thesis, BRAC University]."},{"key":"ref_58","first-page":"41","article-title":"A comparison of event models for naive bayes text classification","volume":"Volume 752","author":"McCallum","year":"1998","journal-title":"AAAI-98 Workshop on Learning for Text Categorization"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","article-title":"A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection","volume":"18","author":"Buczak","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1142\/S0218001405003983","article-title":"Exploring conditions for the optimality of na\u00efve bayes","volume":"19","author":"Zhang","year":"2005","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Joachims, T. (1998). Text categorization with Support Vector Machines: Learning with many relevant features. the Computer Vision\u2014ECCV 2018, Springer Science and Business Media LLC.","DOI":"10.1007\/BFb0026683"},{"key":"ref_62","unstructured":"Ptaszynski, M., Eronen, J.K.K., and Masui, F. (2017, January 21). Learning Deep on Cyberbullying is Always Better than Brute Force. Proceedings of the LaCATODA@ IJCAI, Melbourne, Australia."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3343484","article-title":"Detecting Cyberbullying and Cyberaggression in Social Media","volume":"13","author":"Chatzakou","year":"2019","journal-title":"ACM Trans. Web"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"711","DOI":"10.29207\/resti.v4i4.2125","article-title":"Fake News (Hoax) Identification on Social Media Twitter using Decision Tree C4.5 Method","volume":"4","author":"Irena","year":"2020","journal-title":"J. RESTI (Rekayasa Sist. dan Teknol. Informasi)"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Hosseinmardi, H., Mattson, S.A., Ibn Rafiq, R., Han, R., Lv, Q., and Mishra, S. (2015). Detection of Cyberbullying Incidents on the Instagram Social Network. arXiv.","DOI":"10.1007\/978-3-319-27433-1_4"},{"key":"ref_66","unstructured":"Ptaszynski, M., Dybala, P., Matsuba, T., Masui, F., Rzepka, R., and Araki, K. (April, January 29). Machine learning and affect analysis against cyber-bullying. Proceedings of the the 36th AISB, Leicester, UK."},{"key":"ref_67","unstructured":"Dadvar, M., Jong, F.D., Ordelman, R., and Trieschnigg, D. (2012, January 23\u201324). Improved cyberbullying detection using gender information. Proceedings of the Twelfth Dutch-Belgian Information Retrieval Workshop (DIR 2012), University of Ghent, Gent, Belgium."},{"key":"ref_68","unstructured":"Van Hee, C., Lefever, E., Verhoeven, B., Mennes, J., Desmet, B., De Pauw, G., Daelemans, W., and Hoste, V. (2015). Detection and fine-grained classification of cyberbullying events. International Conference Recent Advances in Natural Language Processing (RANLP), INCOMA Ltd."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Kowsari, K., Meimandi, K.J., Heidarysafa, M., Mendu, S., Barnes, L., and Brown, D. (2019). Text Classification Algorithms: A Survey. Information, 10.","DOI":"10.3390\/info10040150"},{"key":"ref_70","unstructured":"Sahlgren, M., Isbister, T., and Olsson, F. (November, January 31). Learning Representations for Detecting Abusive Language. Proceedings of the 2nd Workshop on Abusive Language Online (ALW2), Brussels, Belgium."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Salminen, J., Almerekhi, H., Milenkovi\u0107, M., Jung, S.G., An, J., Kwak, H., and Jansen, B.J. (2018). Anatomy of online hate: Developing a taxonomy and machine learning models for identifying and classifying hate in online news media. Twelfth International AAAI Conference on Web and Social Media, AAAI Press.","DOI":"10.1609\/icwsm.v12i1.15028"},{"key":"ref_72","unstructured":"Ottesen, C. (2020, July 24). Comparison between Na\u00efve Bayes and Logistic Regression. DataEspresso. Available online: https:\/\/dataespresso.com\/en\/2017\/10\/24\/comparison-between-naive-bayes-and-logistic-regression\/#:~:text=Na%C3%AFve%20Bayes%20has%20a%20naive,belonging%20to%20a%20certain%20class."},{"key":"ref_73","unstructured":"Deb, S. (2020, July 24). Naive Bayes vs. Logistic Regression. Medium. Available online: https:\/\/medium.com\/@sangha_deb\/naive-bayes-vs-logistic-regression-a319b07a5d4c."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1080\/1045988X.2011.539454","article-title":"Cyberbullying: Prevention and Intervention to Protect Our Children and Youth","volume":"55","author":"Snakenborg","year":"2011","journal-title":"Prev. Sch. Fail. Altern. Educ. Child. Youth"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1177\/0044118X10366951","article-title":"Traditional and Nontraditional Bullying Among Youth: A Test of General Strain Theory","volume":"43","author":"Patchin","year":"2011","journal-title":"Youth Soc."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1177\/0143034311402309","article-title":"Coping strategies and perceived effectiveness in fourth through eighth grade victims of bullying","volume":"32","author":"Tenenbaum","year":"2011","journal-title":"Sch. Psychol. Int."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/17405629.2012.682358","article-title":"Invited expert discussion paper Cyberbullying: An overrated phenomenon?","volume":"9","author":"Olweus","year":"2012","journal-title":"Eur. J. Dev. Psychol."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1080\/01639620701457816","article-title":"Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization","volume":"29","author":"Hinduja","year":"2008","journal-title":"Deviant Behav."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jadohealth.2011.11.019","article-title":"Longitudinal Predictors of Cyber and Traditional Bullying Perpetration in Australian Secondary School Students","volume":"51","author":"Hemphill","year":"2012","journal-title":"J. Adolesc. Health"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1016\/j.chb.2012.11.015","article-title":"Bullying and cyberbullying: Convergent and divergent predictor variables","volume":"29","author":"Casas","year":"2013","journal-title":"Comput. Hum. Behav."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s10578-010-0176-3","article-title":"Cyberbullying among Adolescents: The Role of Affective and Cognitive Empathy, and Gender","volume":"41","author":"Ang","year":"2010","journal-title":"Child Psychiatry Hum. Dev."},{"key":"ref_82","first-page":"37","article-title":"Cyberbullying among Adolescent Bystanders: Role of the Communication Medium, Form of Violence, and Empathy","volume":"23","author":"Szuster","year":"2012","journal-title":"J. Community Appl. Soc. Psychol."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"e1169","DOI":"10.1542\/peds.2006-0815","article-title":"Examining Characteristics and Associated Distress Related to Internet Harassment: Findings from the Second Youth Internet Safety Survey","volume":"118","author":"Ybarra","year":"2006","journal-title":"Pediatrics"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","article-title":"Cyberbullying: Its nature and impact in secondary school pupils","volume":"49","author":"Smith","year":"2008","journal-title":"J. Child Psychol. Psychiatry"},{"key":"ref_85","unstructured":"Raisi, E., and Huang, B. (2016). Cyberbullying Identification Using Participant-Vocabulary Consistency. arXiv."},{"key":"ref_86","first-page":"47","article-title":"A Conversation Model Enabling Intelligent Agents to Give Emotional Support","volume":"Volume 431","author":"Dignum","year":"2012","journal-title":"Uncertainty Theory"},{"key":"ref_87","first-page":"425","article-title":"A Normative Agent System to Prevent Cyberbullying","volume":"Volume 2","author":"Bosse","year":"2011","journal-title":"Proceedings of the 2011 IEEE\/WIC\/ACM International Conferences on Web Intelligence and Intelligent Agent Technology"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/ICMLA.2011.152","article-title":"Using Machine Learning to Detect Cyberbullying","volume":"Volume 2","author":"Reynolds","year":"2011","journal-title":"Proceedings of the 2011 10th International Conference on Machine Learning and Applications and Workshops"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Rybnicek, M., Poisel, R., and Tjoa, S. (2013, January 13\u201316). Facebook Watchdog: A Research Agenda for Detecting Online Grooming and Bullying Activities. Proceedings of the 2013 IEEE International Conference on Systems, Man, and Cybernetics, Manchester, UK.","DOI":"10.1109\/SMC.2013.487"},{"key":"ref_90","unstructured":"Yin, D., Xue, Z., Hong, L., Davison, B.D., Kontostathis, A., and Edwards, L. (2009, January 21). Detection of harassment on web 2.0. Proceedings of the Content Analysis in the WEB, Madrid, Spain."},{"key":"ref_91","unstructured":"Bayzick, J., Kontostathis, A., and Edwards, L. (2020, October 29). Detecting the Presence of Cyberbullying Using Computer Software. Available online: https:\/\/april-edwards.me\/BayzickHonors.pdf."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/j.chb.2016.05.051","article-title":"Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network","volume":"63","author":"Varathan","year":"2016","journal-title":"Comput. Hum. Behav."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13673-019-0205-6","article-title":"Developing an online hate classifier for multiple social media platforms","volume":"10","author":"Salminen","year":"2020","journal-title":"Hum. Cent. Comput. Inf. Sci."},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2362394.2362400","article-title":"Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying","volume":"2","author":"Dinakar","year":"2012","journal-title":"ACM Trans. Interact. Intell. Syst."},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Dadvar, M., Trieschnigg, R.B., Ordelman, R.J., and De Jong, F.M. (2013). Improving Cyberbullying Detection with User Context. European Conference on Information Retrieval, Springer Science and Business Media LLC.","DOI":"10.1007\/978-3-642-36973-5_62"},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Van Hee, C., Jacobs, G., Emmery, C., Desmet, B., Lefever, E., Verhoeven, B., De Pauw, G., Daelemans, W., and Hoste, V. (2018). Automatic detection of cyberbullying in social media text. PLoS ONE, 13.","DOI":"10.1371\/journal.pone.0203794"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Zhao, R., Zhou, A., and Mao, K. (2016, January 4\u20137). Automatic detection of cyberbullying on social networks based on bullying features. Proceedings of the 17th International Conference on Distributed Computing and Networking\u2014ICDCN \u201916, Singapore.","DOI":"10.1145\/2833312.2849567"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Ahlfors Many Sources (2010). One Theme: Analysis of Cyberbullying Prevention and Intervention Websites. J. Soc. Sci., 6, 515\u2013522.","DOI":"10.3844\/jssp.2010.515.522"},{"key":"ref_99","unstructured":"Lenhart, A., Purcell, K., Smith, A., and Zickuhr, K. (2020, October 28). Social Media & Mobile Internet Use among Teens and Young Adults, Available online: http:\/\/samaritanbehavioralhealth.net\/files\/social-media-young-adults.pdf."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1111\/j.1751-7893.2008.00066.x","article-title":"Providing online support for young people with mental health difficulties: Challenges and opportunities explored","volume":"2","author":"Webb","year":"2008","journal-title":"Early Interv. Psychiatry"},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1108\/09654281111123466","article-title":"Adolescents\u2019 views about an internet platform for adolescents with mental health problems","volume":"111","author":"Havas","year":"2011","journal-title":"Health Educ."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Jacobs, N.C., V\u00f6llink, T., Dehue, F., and Lechner, L. (2014). Online Pestkoppenstoppen: Systematic and theory-based development of a web-based tailored intervention for adolescent cyberbully victims to combat and prevent cyberbullying. BMC Public Health, 14.","DOI":"10.1186\/1471-2458-14-396"},{"key":"ref_103","unstructured":"KiVa Program (2020, August 17). Kiva Is an Anti-Bullying Programme|Kiva Antibullying Program|Just Another Kiva Koulu Site. Available online: http:\/\/www.kivaprogram.net."},{"key":"ref_104","unstructured":"Nonauharcelement.Education.gouv.fr (2020, August 18). Non Au Harc\u00e8lement\u2014Appelez Le 3020. Available online: https:\/\/www.nonauharcelement.education.gouv.fr\/."},{"key":"ref_105","unstructured":"Veiligonline.be (2020, August 18). Cyberpesten|Veilig Online. Available online: https:\/\/www.veiligonline.be\/cyberpesten."},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1002\/pits.21603","article-title":"High school teachers\u2019 perceptions of cyberbullying prevention and intervention strategies","volume":"49","author":"Stauffer","year":"2012","journal-title":"Psychol. Sch."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"133","DOI":"10.13189\/ujer.2013.010301","article-title":"Cyberbullying: Resources for Intervention and Prevention","volume":"1","author":"Notar","year":"2013","journal-title":"Univers. J. Educ. Res."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1080\/17405629.2011.643169","article-title":"A longitudinal study of cyberbullying: Examining riskand protective factors","volume":"9","author":"Fanti","year":"2012","journal-title":"Eur. J. Dev. Psychol."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.jadohealth.2007.03.005","article-title":"Prevalence and Frequency of Internet Harassment Instigation: Implications for Adolescent Health","volume":"41","author":"Ybarra","year":"2007","journal-title":"J. Adolesc. Health"},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1089\/cpb.2007.0016","article-title":"Cyberbullying among Turkish Adolescents","volume":"11","author":"Aricak","year":"2008","journal-title":"CyberPsychology Behav."},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Kontostathis, A., Reynolds, K., Garron, A., and Edwards, L. (2013, January 23\u201326). Detecting cyberbullying: Query terms and techniques. Proceedings of the 5th Annual ACM Web Science Conference, New York, NY, USA.","DOI":"10.1145\/2464464.2464499"},{"key":"ref_112","unstructured":"Xu, J.M., Jun, K.S., Zhu, X., and Bellmore, A. (2012, January 3\u20138). Learning from bullying traces in social media. Proceedings of the 2012 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Montr\u00e9al, QC, Canada."},{"key":"ref_113","unstructured":"Chowdhary, K.R. (2020). Natural language processing for word sense disambiguation and information extraction. arXiv."},{"key":"ref_114","unstructured":"Liddy, E.D. (2001). Natural language processing. Encyclopedia of Library and Information Science, Springer."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.future.2020.07.047","article-title":"An intelligent healthcare monitoring framework using wearable sensors and social networking data","volume":"114","author":"Ali","year":"2020","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.knosys.2019.02.033","article-title":"Transportation sentiment analysis using word embedding and ontology-based topic modeling","volume":"174","author":"Ali","year":"2019","journal-title":"Knowl. Based Syst."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/11\/187\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:26:41Z","timestamp":1760178401000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/11\/187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,29]]},"references-count":116,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2020,11]]}},"alternative-id":["fi12110187"],"URL":"https:\/\/doi.org\/10.3390\/fi12110187","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,29]]}}}