Akankshi Mody, Shreni N. Shah, Reeva Pimple, N. Shekokar
{"title":"Identification of Potential Cyber Bullying Tweets using Hybrid Approach in Sentiment Analysis","authors":"Akankshi Mody, Shreni N. Shah, Reeva Pimple, N. Shekokar","doi":"10.1109/ICEECCOT43722.2018.9001476","DOIUrl":null,"url":null,"abstract":"With the rise of the Internet, cyber bullying is becoming more and more widespread. Cyber bullying has resulted in such disastrous consequences that there is a pressing need to detect it. The aim of this study is to do the same by using sentiment analysis. We perform cyber bullying detection using a novice approach on Tweets using Natural Language Processing and Machine Learning techniques. After processing a tweet, it can be flagged down if the tweet is a potential cyber bullying threat.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEECCOT43722.2018.9001476","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
With the rise of the Internet, cyber bullying is becoming more and more widespread. Cyber bullying has resulted in such disastrous consequences that there is a pressing need to detect it. The aim of this study is to do the same by using sentiment analysis. We perform cyber bullying detection using a novice approach on Tweets using Natural Language Processing and Machine Learning techniques. After processing a tweet, it can be flagged down if the tweet is a potential cyber bullying threat.