Over the past few years, many efforts have been dedicated to studying cyberbullying in social edge computing devices, and most of them focus on three roles: victims, perpetrators, and bystanders. If we want to obtain a deep insight into the formation, evolution, and intervention of cyberbullying in devices at the edge of the Internet, it is necessary to explore more fine-grained roles. This paper presents a multi-level method for role feature modeling and proposes a differential evolution-assisted K-means (DEK) method to identify diverse roles. Our work aims to provide a role identification scheme for cyberbullying scenarios for social edge computing environments to alleviate the general safety issues that cyberbullying brings. The experiments on ten real-world datasets obtained from Weibo and five public datasets show that the proposed DEK outperforms the existing approaches on the method level. After clustering, we obtain nine roles and analyze the characteristics of each role and their evolution trends under different cyberbullying scenarios. Our work in this paper can be placed in devices at the edge of the Internet, leading to better real-time identification performance and adapting to the broad geographic location and high mobility of mobile devices.
M. G. S. Murshed, C. Murphy, D. Hou, N. Khan, G. Ananthanarayanan and F. Hussain, Machine learning at the network edge: A survey, ACM Comput. Surv., vol. 54, no. 8, pp. 1–37, 2021.
S. Rathore, P. K. Sharma, V. Loia, Y. S. Jeong and J. H. Park, Social network security: Issues, challenges, threats, and solutions, Inf. Sci., vol. 421, pp. 43–69, 2017.
H. Saini, H. Mehra, R. Rani, G. Jaiswal, A. Sharma and A. Dev, Enhancing cyberbullying detection: A comparative study of ensemble CNN-SVM and BERT models, Soc. Netw. Anal. Min., vol. 14, no. 1, p. 1, 2023.
F. Shi, H. Ning, L. Chen and S. Dhelim, Cyber-syndrome: Concept, theoretical characterization, and control mechanism, Tsinghua Science and Technology, vol. 29, no. 3, pp. 721–735, 2024.
T. K. Chan, C. M. Cheung and Z. W. Lee, Cyberbullying on social networking sites: A literature review and future research directions, Inf. Manag., vol. 58, no. 2, p. 103411s, 2021.
M. A. Al-Garadi, M. R. Hussain, N. Khan, G. Murtaza, H. F. Nweke, I. Ali, G. Mujtaba, H. Chiroma, H. A. Khattak and A. Gani, Predicting cyberbullying on social media in the Big Data Era using machine learning algorithms: Review of literature and open challenges, IEEE Access, vol. 7, pp. 70701–70718, 2019.
M. A. Al-Garadi, K. D. Varathan and S. D. Ravana, Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network, Comput. Hum. Behav., vol. 63, pp. 433–443, 2016.
A. Perera and P. Fernando, Accurate cyberbullying detection and prevention on social media, Procedia Comput. Sci., vol. 181, pp. 605–611, 2021.
N. Novalita, A. Herdiani, I. Lukmana and D. Puspandari, Cyberbullying identification on twitter using random forest classifier, J. Phys. Conf. Ser., vol. 1192, no. 1, p. 012029, 2019.
V. Balakrishnan, S. Khan and H. R. Arabnia, Improving cyberbullying detection using Twitter users’ psychological features and machine learning, Comput. Secur., vol. 90, p. 101710, 2020.
N. Lu, G. Wu, Z. Zhang, Y. Zheng, Y. Ren and K. K. R. Choo, Cyberbullying detection in social media text based on character-level convolutional neural network with shortcuts, Concurr. Comp. Pract. E., vol. 32, no. 23, p. e5627, 2020.
D. Sultan, M. Mendes, A. Kassenkhan and O. Akylbekov, Hybrid CNN-LSTM network for cyberbullying detection on social networks using textual contents, Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 9, pp. 748–756, 2023.
S. Chen, J. Wang and K. He, Chinese cyberbullying detection using XLNet and deep Bi-LSTM hybrid model, Information, vol. 15, no. 2, p. 93, 2024.
A. Kumar and N. Sachdeva, A Bi-GRU with attention and CapsNet hybrid model for cyberbullying detection on social media, World Wide Web, vol. 25, no. 4, pp. 1537–1550, 2022.
K. Maity, T. Sen, S. Saha and P. Bhattacharyya, MTBullyGNN: A graph neural network-based multitask framework for cyberbullying detection, IEEE Trans. Comput. Soc. Syst., vol. 11, no. 1, pp. 849–858, 2022.
T. Li, Z. Zeng, Q. Li and S. Sun, Integrating GIN-based multimodal feature transformation and multi-feature combination voting for irony-aware cyberbullying detection, Inf. Process. Manag., vol. 61, no. 3, p. 103651, 2024.
I. Jahnke, Dynamics of social roles in a knowledge management community, Comput. Human Behav., vol. 26, no. 4, pp. 533–546, 2010.
N. Gondal, Multiplexity as a lens to investigate the cultural meanings of interpersonal ties, Soc. Netw., vol. 68, pp. 209–217, 2022.
A. Erfani, P. J. Hickey and Q. Cui, Likeability versus competence dilemma: Text mining approach using LinkedIn data, J. Manag. Eng., vol. 39, no. 3, p. 04023013, 2023.
V. Balakrishnan, S. Khan, T. Fernandez and H. R. Arabnia, Cyberbullying detection on twitter using Big Five and Dark Triad features, Pers. Individ. Differ., vol. 141, pp. 252–257, 2019.
G. Jacobs, C. V. Hee and V. Hoste, Automatic classification of participant roles in cyberbullying: Can we detect victims, bullies, and bystanders in social media text?, Nat. Lang. Eng., vol. 28, no. 2, pp. 141–166, 2020.
M. Mohd, F. Fauzi and W. N. H. W. Ali, Identification of profane words in cyberbullying incidents within social networks, J. Inf. Sci. Theory Pract., vol. 9, no. 1, pp. 24–34, 2021.
A. Bozyiit, S. Utku and E. Nasibov, Cyberbullying detection: Utilizing social media features, Expert Syst. Appl., vol. 179, p. 115001, 2021.
C. P. Barlett, Anonymously hurting others online: The effect of anonymity on cyberbullying frequency, Psychol. Pop. Media. Cult., vol. 4, no. 2, pp. 70–79, 2015.
V. Balakrishnan, Cyberbullying among young adults in Malaysia: The roles of gender, age and Internet frequency, Comput. Hum. Behav., vol. 46, pp. 149–157, 2015.
M. Arif, A systematic review of machine learning algorithms in cyberbullying detection: Future directions and challenges, J. Inf. Secur. Cybercrimes Res., vol. 4, no. 1, pp. 1–26, 2021.
M. F. López-Vizcaíno, F. J. Nóvoa, V. Carneiro and F. Cacheda, Early detection of cyberbullying on social media networks, Future Gener. Comput. Syst., vol. 118, pp. 219–229, 2021.
R. J. Kuo, Y. Zheng and T. P. Q. Nguyen, Metaheuristic-based possibilistic fuzzy k-modes algorithms for categorical data clustering, Inf. Sci., vol. 557, pp. 1–15, 2021.
C. Tîrnăucă, D. Gómez-Pérez, J. L. Balcázar and J. L. Montaña, Global optimality in k-means clustering, Inf. Sci., vol. 439, pp. 79–94, 2018.
R. Storn and K. Price, Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces, J. Glob. Optim., vol. 11, no. 4, pp. 341–359, 1997.
Y. Zhou, H. Wu, Q. Luo, and M. Abdel-Baset, Automatic data clustering using nature-inspired symbiotic organism search algorithm, Knowl. Based. Syst., vol. 163, pp. 546–557, 2019.
J. C. Gower, A general coefficient of similarity and some of its properties, Biometrics, vol. 27, no. 4, pp. 857–871, 1971.
H. Y. Du and W. J. Wang, A clustering ensemble framework with integration of data characteristics and structure information: A graph neural networks approach, Mathematics, vol. 10, no. 11, p. 1834, 2022.
J. C. Bezdek, R. Ehrlich and W. Full, FCM: The fuzzy c-means clustering algorithm, Comput. Geosci., vol. 10, nos. 2&3, pp. 191–203, 1984.
B. Schölkopf, A. Smola and K. R. Müller, Nonlinear component analysis as a kernel eigenvalue problem, Neural. Comput., vol. 10, no. 5, pp. 1299–1319, 1998.
Murtagh and P. Contreras, Algorithms for hierarchical clustering: an overview, Wiley Interdiscip. Rev. Data Min. Knowl. Discov., vol. 2, no. 1, pp. 86–97, 2012.
J. Derrac, S. Garcia, L. Sanchez and F. Herrera, Keel data-mining software tool: Data set repository, integration of algorithms and experimental analysis framework, J. Mult. Valued Log. Soft Comput., vol. 17, pp. 255–287, 2015.
D. Olweus and S. P. Limber, Bullying in school: Evaluation and dissemination of the Olweus bullying prevention program, Am. J. Orthopsychiatry., vol. 80, no. 1, pp. 124–134, 2010.
R. M. Kowalski and S. P. Limber, Electronic bullying among middle school students, J. Adolesc. Health., vol. 41, no. 6, pp. S22–S30, 2007.
E. Tiiri, T. Luntamo, K. Mishina, L. Sillanmäki, A. B. Klomek and A. Sourander, Did bullying victimization decrease after nationwide school-based antibullying program? A time-trend study, J. Am. Acad. Child Adolesc. Psychiatry., vol. 59, no. 4, pp. 531–540, 2020.
I. S. Mahmood, Are cyberbullying interventions and criminal law prevention effective? (A review of cyberbullying legislation in Iraq), J. Arch. Egyptol., vol. 17, no. 7, pp. 16983–16998, 2020.
J. Bailey, Canadian legal approaches to ‘cyberbullying’ and cyberviolence: An overview, Ottawa Faculty of Law Working Paper, no. 2016-37, 2016.
N. Eisenberg, Emotion, regulation, and moral development, Annu. Rev. Psychol., vol. 51, no. 1, pp. 665–697, 2000.
H. Landmann and U. Hess, What elicits third-party anger? The effects of moral violation and others’ outcome on anger and compassion, Cogn. Emot., vol. 31, no. 6, pp. 1097–1111, 2017.