Preventing Digital Harm through AI: A Hybrid Model for Detecting Cyber-Bullying and Emotional Risk on Social Media
Keywords:
cyber-bully, social Networking sites, social media, cybercrime, Harassment.Abstract
The rise of social media has introduced a new form of psychological toxicity cyber-bullying, which significantly threatens mental well-being, particularly among adolescents and young adults. The emotional consequences of online harassment, such as anxiety, depression, and suicidal ideation, have increasingly been recognized as public health risks. The Hybrid Supervised Cyber-bully Detection System (HS-CBDS) integrates multiple machine learning techniques to enhance classification accuracy and reliability. The system incorporates comprehensive text preprocessing including normalization, tokenization, stopword removal, and lemmatization followed by feature engineering using TF-IDF, Bag of Words (BoW), sentiment polarity, and text length. A rule-based filter checks for offensive terms using a curated lexicon. The model employs supervised learning classifiers Linear SVC, Logistic Regression, and Random Forest optimized via hyperparameter tuning and GridSearchCV. In the HS-CBDS system, ensemble learning is implemented by combining predictions from five different classifiers LinearSVC, Logistic Regression, Random Forest, Decision Tree, and MLPClassifier. Each model's prediction is assigned an equal weight (0.2), and the final decision is made by averaging these outputs and rounding the result. Experimental results demonstrate that HS-CBDS outperforms individual classifiers, achieving an accuracy of 99.33%, significantly outperforming individual models, including ANN (98.17%) and Random Forest (97.99%). Evaluation metrics such as precision (99.34%), recall (99.33%), F1-score (99.33%), and ROC-AUC (0.9932) further validate the robustness and reliability of the system. HS-CBDS demonstrates a scalable, interpretable, and high-performing solution suitable for real-time cyber-bullying detection across social media and educational platforms, contributing effectively to a safer digital environment.
Downloads
References
Peter K Smith, Jess Mahdavi, Manuel Carvalho, Sonja Fisher, Shanette Russell, and Neil Tippett. Cyberbullying: Its nature and impact in secondary school pupils. Journal of child psychology and psychiatry, 49(4):376–385, 2008.
Cyber victimization during the COVID-19 pandemic: a syndemic looming large. Shoib S, Philip S, Bista S, et al. Health Sci Rep. 2022;5:0. doi: 10.1002/hsr2.528.
Cyberbullying among youth in developing countries: a qualitative systematic review with bibliometric analysis. Saif AN, Purbasha AE. Child Youth Serv Rev. 2023;146:1–10.
B Nandhini and JI Sheeba. Cyberbullying detection and classification using information retrieval algorithm. In Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015), page 20. ACM, 2015.
B Sri Nandhini and JI Sheeba. Online social network bullying detection using intelligence techniques. Procedia Computer Science, 45:485–492, 2015.
Walisa Romsaiyud, Kodchakorn na Nakornphanom, Pimpaka Prasertsilp, Piyaporn Nurarak, and Pirom Konglerd. Automated cyberbullying detection using clustering appearance patterns. In Knowledge and Smart Technology (KST), 2017 9th International Conference on, pages 242– 247. IEEE, 2017.
Shane Murnion, William J Buchanan, Adrian Smales, and Gordon Russell. Machine learning and semantic analysis of in-game chat for cyberbullying. Computers & Security, 76:197–213, 2018.
Sani Muhamad Isa, Livia Ashianti, et al. Cyberbullying classification using text mining. In Informatics and Computational Sciences (ICICoS), 2017 1st International Conference on, pages 241–246. IEEE, 2017.
Karthik Dinakar, Birago Jones, Catherine Havasi, Henry Lieberman, and Rosalind Picard. Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiiS), 2(3):18, 2012.
Michele Di Capua, Emanuel Di Nardo, and Alfredo Petrosino. Unsupervised cyber bullying detection in social networks. In Pattern Recognition (ICPR), 2016 23rd International Conference on, pages 432–437. IEEE, 2016.
Batoul Haidar, Maroun Chamoun, and Ahmed Serhrouchni. A multilingual system for cyberbullying detection: Arabic content detection using machine learning. Advances in Science, Technology and Engineering Systems Journal, 2(6):275–284, 2017.
Rui Zhao, Anna Zhou, and Kezhi Mao. Automatic detection of cyberbullying on social networks based on bullying features. In Proceedings of the 17th international conference on distributed computing and networking, page 43. ACM, 2016.
Sourabh Parime and Vaibhav Suri. Cyberbullying detection and prevention: Data mining and psychological perspective. In Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference on, pages 1541–1547. IEEE, 2014.
Ying Chen, Yilu Zhou, Sencun Zhu, and Heng Xu. Detecting offensive language in social media to protect adolescent online safety. In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom), pages 71–80. IEEE, 2012.
I-Hsien Ting, Wun Sheng Liou, Dario Liberona, Shyue-Liang Wang, and Giovanny Mauricio Tarazona Bermudez. Towards the detection of cyberbullying based on social network mining techniques. In Behavioral, Economic, Socio-cultural Computing (BESC), 2017 International Conference on, pages 1–2. IEEE, 2017.
Harsh Dani, Jundong Li, and Huan Liu. Sentiment informed cyberbullying detection in social media. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pages 52– 67. Springer, 2017.
Van Hee C, Jacobs G, Emmery C, Desmet B, Lefever E, et al. (2018) Automatic detection of cyberbullying in social media text. PLOS ONE 13(10): e0203794. https://doi.org/10.1371/journal.pone.0203794
Aldhyani, T.H.H.; Al-Adhaileh, M.H.; Alsubari, S.N. Cyberbullying Identification System Based Deep Learning Algorithms. Electronics 2022, 11, 3273. https:// doi.org/10.3390/electronics11203273
Roy, P.K., Mali, F.U. Cyberbullying detection using deep transfer learning. Complex Intell. Syst. 8, 5449–5467 (2022). https://doi.org/10.1007/s40747-022-00772-z
Dewani A, Memon MA, Bhatti S. Cyberbullying detection: advanced preprocessing techniques & deep learning architecture for Roman Urdu data. J Big Data. 2021;8(1):160. doi: 10.1186/s40537-021-00550-7. Epub 2021 Dec 22. PMID: 34956818; PMCID: PMC8693595.
Bharti, S., Yadav, A.K., Kumar, M. and Yadav, D. (2022), "Cyberbullying detection from tweets using deep learning", Kybernetes, Vol. 51 No. 9, pp. 2695-2711. https://doi.org/10.1108/K-01-2021-0061
Hani, J., Mohamed, N., Mostafa, A. E., Emad, Z., Amer, E., & Mohammed, A. (2019). Social Media Cyberbullying Detection using Machine Learning. International Journal of Advanced Computer Science and Applications, 10(5). https://doi.org/10.14569/ijacsa.2019.0100587
https://www.kaggle.com/datasets/momo12341234/cyberbully-detection-dataset.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.