Latent Semantic Analysis Based Sentimental Analysis of Tweets in Social Media for the Classification of Cyberbullying Text
Keywords:
Latent semantic analysis, sentimental analysis, tweets, cyberbullying textAbstract
With wide spread of mobile technology, cyberbullying has developed as a substantial problem, particularly among adolescents. This is especially true in the case of adolescents. The fact that some people have chosen to end their own lives by committing suicide has also helped increase awareness of the issue among the broader population. Various methods are adopted to reduce the suicides and in broader sense, todays online media is highly prone to bullying that is termed as cyber bullying. Methods are adopted to detect the cyberbullying text, however most of them lacks clarity in detecting the accurate cyber bullying tweets. In this paper, Latent Semantic Analysis (LSA) based sentimental analysis of tweets in social media for the classification of cyberbullying text. The study uses LSA that helps in classifying the texts and help the user to post their opinions in social media without any online abuse. The simulation is conducted to test the efficacy of the classification model and the results show that the proposed method achieves higher rate of accuracy than other existing methods.
Downloads
References
Rosa, H., Pereira, N., Ribeiro, R., Ferreira, P. C., Carvalho, J. P., Oliveira, S., ... & Trancoso, I. (2019). Automatic cyberbullying detection: A systematic review. Computers in Human Behavior, 93, 333-345.
Kim, S., Razi, A., Stringhini, G., Wisniewski, P. J., & De Choudhury, M. (2021). A Human-Centered Systematic Literature Review of Cyberbullying Detection Algorithms. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW2), 1-34.
Ali, W. N. H. W., Mohd, M., & Fauzi, F. (2018, November). Cyberbullying detection: an overview. In 2018 Cyber Resilience Conference (CRC) (pp. 1-3). IEEE.
Balakrishnan, V., Khan, S., & Arabnia, H. R. (2020). Improving cyberbullying detection using Twitter users’ psychological features and machine learning. Computers & Security, 90, 101710.
Muneer, A., & Fati, S. M. (2020). A comparative analysis of machine learning techniques for cyberbullying detection on Twitter. Future Internet, 12(11), 187.
Iwendi, C., Srivastava, G., Khan, S., & Maddikunta, P. K. R. (2020). Cyberbullying detection solutions based on deep learning architectures. Multimedia Systems, 1-14.
Gencoglu, O. (2020). Cyberbullying detection with fairness constraints. IEEE Internet Computing, 25(1), 20-29.
Cheng, L., Li, J., Silva, Y. N., Hall, D. L., & Liu, H. (2019, January). Xbully: Cyberbullying detection within a multi-modal context. In Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining (pp. 339-347).
Cheng, L., Guo, R., Silva, Y., Hall, D., & Liu, H. (2019, May). Hierarchical attention networks for cyberbullying detection on the instagram social network. In Proceedings of the 2019 SIAM international conference on data mining (pp. 235-243). Society for Industrial and Applied Mathematics.
Balakrishnan, V., Khan, S., Fernandez, T., & Arabnia, H. R. (2019). Cyberbullying detection on twitter using Big Five and Dark Triad features. Personality and individual differences, 141, 252-257.
Hani, J., Mohamed, N., Ahmed, M., Emad, Z., Amer, E., & Ammar, M. (2019). Social media cyberbullying detection using machine learning. International Journal of Advanced Computer Science and Applications, 10(5).
Soni, D., & Singh, V. K. (2018). See no evil, hear no evil: Audio-visual-textual cyberbullying detection. Proceedings of the ACM on Human-Computer Interaction, 2(CSCW), 1-26.
Pawar, R., & Raje, R. R. (2019, May). Multilingual cyberbullying detection system. In 2019 IEEE international conference on electro information technology (EIT) (pp. 040-044). IEEE.
Kumar, A., & Sachdeva, N. (2019). Cyberbullying detection on social multimedia using soft computing techniques: a meta-analysis. Multimedia Tools and Applications, 78(17), 23973-24010.
Bozyiğit, A., Utku, S., & Nasibov, E. (2021). Cyberbullying detection: Utilizing social media features. Expert Systems with Applications, 179, 115001.
Can, U., & Alatas, B. (2019). A new direction in social network analysis: Online social network analysis problems and applications. Physica A: Statistical Mechanics and its Applications, 535, 122372.
Hernandez-Suarez, A., Sanchez-Perez, G., Toscano-Medina, K., Martinez-Hernandez, V., Perez-Meana, H., Olivares-Mercado, J., & Sanchez, V. (2018). Social sentiment sensor in twitter for predicting cyber-attacks using ℓ 1 regularization. Sensors, 18(5), 1380.
Sharma, K., Bhasin, S., & Bharadwaj, P. (2019). A worldwide analysis of cyber security and cyber crime using Twitter. Int. J. Eng. Adv. Technol, 8, 1051-1056.
Founta, A. M., Chatzakou, D., Kourtellis, N., Blackburn, J., Vakali, A., & Leontiadis, I. (2019, June). A unified deep learning architecture for abuse detection. In Proceedings of the 10th ACM conference on web science (pp. 105-114).
Al-Smadi, M., Qawasmeh, O., Al-Ayyoub, M., Jararweh, Y., & Gupta, B. (2018). Deep Recurrent neural network vs. support vector machine for aspect-based sentiment analysis of Arabic hotels’ reviews. Journal of computational science, 27, 386-393.
Drishya, S. V., Saranya, S., Sheeba, J. I., & Devaneyan, S. P. (2019). Cyberbully image and text detection using convolutional neural networks. CiiT Int. J. Fuzzy Syst, 11(2), 25-30.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.