Search Results - algorithm of actions in case of bullying

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    BULLYING: PROBLEM SOLVING ALGORITHM by NAKAZNYI, Mykola

    ISSN: 2786-7005, 2786-7013
    Published: 14.10.2022
    “…The article presents the algorithm of actions of pedagogical staff of a general secondary education institution in case of detection of signs or facts of bullying (harassment), namely…”
    Get full text
    Journal Article
  2. 2

    Psychological Study of Cyber-Bullying Against Adolescent Girls in India Using Twitter by Sharma, Kavya, Singh, Krishna Kumar

    ISSN: 2155-7136, 2155-7144
    Published: Hershey IGI Global 11.08.2023
    “… Understanding cyberbullying trends and preventing them, using suitable machine learning algorithms, could help numerous school students lead better lives…”
    Get full text
    Journal Article
  3. 3

    A Framework to Detect and Prevent Cyberbullying from Social Media by Exploring Machine Learning Algorithms by Mitra, Shutonu, Tasnim, Tasfia, Islam, Md. Arr Rafi, Khan, Nafiz Imtiaz, Majib, Mohammad Shahjahan

    Published: IEEE 26.12.2021
    “… But unfortunately, users get subject to bully or harassment while surfing through social media. Over the last decade, cyberbullying surfaced as one of the most significant issues in the digital world…”
    Get full text
    Conference Proceeding
  4. 4

    A Novel Position-based Sentiment Classification Algorithm for Facebook Comments by Surroop, Khunishkah, Canoo, Khushboo, Pudaruth, Sameerchand

    ISSN: 2158-107X, 2156-5570
    Published: West Yorkshire Science and Information (SAI) Organization Limited 01.01.2016
    “… Millions of users are connected each day on social networks and they often contribute to online crimes by their comments or posts through cyberbullying, identity theft, online blackmailing, etc…”
    Get full text
    Journal Article
  5. 5

    Detection of traits in students with suicidal tendencies on Internet applying Web Mining by Castillo-Zúñiga, Iván, Luna-Rosas, Francisco-Javier, López-Veyna, Jaime-Iván

    ISSN: 1134-3478
    Published: Huelva Grupo Comunicar 2022
    Published in Comunicar (2022)
    “… To test the proposed method, suicide web pages were analyzed as a study case to identify and detect traits in students with suicidal tendencies…”
    Get full text
    Journal Article
  6. 6

    Cyberbullying Analysis on Instagram Using K-Means Clustering by Muhariya, Ahmad, Riadi, Imam, Prayudi, Yudi

    ISSN: 2086-9398, 2579-8901
    Published: Universitas Muhammadiyah Purwokerto 14.11.2022
    Published in Juita : jurnal informatika (Online) (14.11.2022)
    “… In terms of cyberbullying cases, cases often occur through social media, Twitter, and Instagram…”
    Get full text
    Journal Article
  7. 7

    Detection and prevention measures for cyberbullying and online grooming by Upadhyay, Aishwarya, Chaudhari, Akshay, Arunesh, Ghale, Sarita, Pawar, S. S.

    Published: IEEE 01.01.2017
    “…, these facilities bring along big threats with them such as cyber attacks, which includes online grooming and cyberbullying…”
    Get full text
    Conference Proceeding
  8. 8

    End of Life Care's Ongoing Evolution by Fink-Samnick, Ellen

    ISSN: 1932-8095, 1932-8095
    Published: United States 01.05.2020
    Published in Professional case management (01.05.2020)
    “…PRIMARY PRACTICE SETTINGS:: Applicable to all settings across the transitions of care where case management practice occurs…”
    Get more information
    Journal Article
  9. 9

    Prediction of Cyberbullying in Social Media on Twitter Using Logistic Regression by Prayudani, Santi, Adha, Lilis Tiara, Ariyani, Tika, Lubis, Arif Ridho

    ISSN: 2548-6861, 2548-6861
    Published: Politeknik Negeri Batam 07.08.2025
    “…As cases of cyberbullying on social media increase, there is a need for efficient measures to detect the vice…”
    Get full text
    Journal Article
  10. 10

    AbuSniff: Automatic Detection and Defenses Against Abusive Facebook Friends by Talukder, Sajedul, Carbunar, Bogdan

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 26.04.2018
    Published in arXiv.org (26.04.2018)
    “…Adversaries leverage social network friend relationships to collect sensitive data from users and target them with abuse that includes fake news, cyberbullying, malware, and propaganda…”
    Get full text
    Paper
  11. 11

    Chicago Tribune Rex Huppke column by Huppke, Rex

    Published: Chicago Tribune Content Agency LLC 09.09.2016
    Published in TCA Regional News (09.09.2016)
    “…NRA Executive Vice President Wayne LaPierre has been predicting that Obama will go after the guns of law-abiding Americans since the 2008 presidential campaign…”
    Get full text
    Newsletter
  12. 12

    Deceptive behavior in doping related interviews: The case of Lance Armstrong by Zurloni, Valentino, Diana, Barbara, Cavalera, Cesare, Argenton, Luca, Elia, Massimiliano, Mantovani, Fabrizia

    ISSN: 1469-0292
    Published: Elsevier Ltd 01.01.2015
    Published in Psychology of sport and exercise (01.01.2015)
    “… In this observational study we focused on Armstrong's micro-expressions (action units, gaze movements, head movements…”
    Get full text
    Journal Article
  13. 13

    ShamrockStocks.com: Lucky Picks of The Day: (OTCBB:GLLA)- (OTCBB:DVLY)- (OTCBB:MITK)

    Published: Coventry Normans Media Ltd 07.07.2010
    Published in M2 Presswire (07.07.2010)
    “…CARSON CITY, Nev., Aug 11, 2010 -- GILLA INC. (OTCBB:GLLA) (the "Company") has received confirmation that the application for Mineral Rights made by its 100%…”
    Get full text
    Newsletter
  14. 14

    Text Classification Techniques Used to Faciliate Cyber Terrorism Investigation by Simanjuntak, D A, Ipung, H P, Lim, Charles, Nugroho, A S

    ISBN: 9781424487462, 1424487463
    Published: IEEE 01.12.2010
    “… These kinds of activity are categorized as cyber terrorism. As the number of such cases increase, the availability of information regarding these actions is required to facilitate experts in investigating cyber terrorism…”
    Get full text
    Conference Proceeding
  15. 15

    AbuSniff: Automatic Detection and Defenses Against Abusive Facebook Friends by Talukder, Sajedul, Carbunar, Bogdan

    ISSN: 2162-3449, 2334-0770
    Published: 15.06.2018
    “…Adversaries leverage social network friend relationships to collect sensitive data from users and target them with abuse that includes fake news, cyberbullying, malware, and propaganda…”
    Get full text
    Journal Article