ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 学術雑誌論文
  2. 洋雑誌

Brute-Force Sentence Pattern Extortion from Harmful Messages for Cyberbullying Detection

https://kitami-it.repo.nii.ac.jp/records/8891
https://kitami-it.repo.nii.ac.jp/records/8891
8531cb96-5f3f-44b9-b0b5-a1d8d1d7eeab
名前 / ファイル ライセンス アクション
Journal Journal of the Association for Information Systems (2019) 20(8), 1075-1128 (2.2 MB)
Item type 学術雑誌論文 / Journal Article(1)
公開日 2020-01-17
タイトル
タイトル Brute-Force Sentence Pattern Extortion from Harmful Messages for Cyberbullying Detection
言語 en
言語
言語 eng
キーワード
言語 en
主題Scheme Other
主題 Automatic Cyberbullying Detection
キーワード
言語 en
主題Scheme Other
主題 Natural Language Processing
キーワード
言語 en
主題Scheme Other
主題 Language Combinatorics
資源タイプ
資源 http://purl.org/coar/resource_type/c_6501
タイプ journal article
アクセス権
アクセス権 open access
アクセス権URI http://purl.org/coar/access_right/c_abf2
著者 Ptaszynski, Michal

× Ptaszynski, Michal

en Ptaszynski, Michal

ja ISNI

Search repository
Lempa, Pawel

× Lempa, Pawel

en Lempa, Pawel

Search repository
Masui, Fumito

× Masui, Fumito

en Masui, Fumito

Search repository
Kimura, Yasutomo

× Kimura, Yasutomo

en Kimura, Yasutomo

Search repository
Rzepka, Rafal

× Rzepka, Rafal

en Rzepka, Rafal

Search repository
Araki, Kenji

× Araki, Kenji

en Araki, Kenji

Search repository
Wroczynski, Michal

× Wroczynski, Michal

en Wroczynski, Michal

Search repository
Leliwa, Gniewosz

× Leliwa, Gniewosz

en Leliwa, Gniewosz

Search repository
抄録
内容記述タイプ Abstract
内容記述 Cyberbullying, or humiliating people using the Internet, has existed almost since the beginning of Internet communication.The relatively recent introduction of smartphones and tablet computers has caused cyberbullying to evolve into a serious social problem. In Japan, members of a parent-teacher association (PTA)attempted to address the problem by scanning the Internet for cyber bullying entries. To help these PTA members and other interested parties confront this difficult task we propose a novel method for automatic detection of malicious Internet content. This method is based on a combinatorial approach resembling brute-force search algorithms, but applied in language classification. The method extracts sophisticated patterns from sentences and uses them in classification. The experiments performed on actual cyberbullying data reveal an advantage of our method vis-à-visprevious methods. Next, we implemented the method into an application for Android smartphones to automatically detect possible harmful content in messages. The method performed well in the Android environment, but still needs to be optimized for time efficiency in order to be used in practice
言語 en
書誌情報 en : Journal of the Association for Information Systems

巻 20, 号 8, p. 1075-1127, 発行日 2019
ISSN
収録物識別子タイプ EISSN
収録物識別子 1536-9323
DOI
識別子タイプ DOI
関連識別子 https://doi.org/10.17705/1jais.00562
権利
権利情報 c 2019by the Association for Information Systems. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit orcommercial advantage and that copies bear this notice and full citation on the first page. Copyright for components of this work owned by others than the Association for Information Systems must be honored. Abstracting with creditis permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists requires prior specific permission and/or fee. Request permission to publish from: AIS Administrative Office, P.O. Box 2712 Atlanta, GA, 30301-2712 Attn: Reprints or via email from publications@aisnet.org.
出版者
出版者 Association for Information Systems
著者版フラグ
言語 en
値 publisher
出版タイプ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
戻る
0
views
See details
Views

Versions

Ver.1 2021-03-01 06:14:20.787134
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR 2.0
  • OAI-PMH JPCOAR 1.0
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3