skip to main content
10.1145/3424954.3424960acmotherconferencesArticle/Chapter ViewAbstractPublication PageseiccConference Proceedingsconference-collections
research-article

Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis

Published:12 January 2021Publication History

ABSTRACT

COVID-19's impact has surpassed from personal and global health to our social life. In terms of digital presence, it is speculated that during pandemic, there has been a significant rise in cyberbullying. In this paper, we have examined the hypothesis of whether cyberbullying and reporting of such incidents have increased in recent times. To evaluate the speculations, we collected cyberbullying related public tweets (N = 454, 046) posted between January 1st, 2020 - June 7th, 2020. A simple visual frequentist analysis ignores serial correlation and does not depict changepoints as such. To address correlation and a relatively small number of time points, Bayesian estimation of the trends is proposed for the collected data via an autoregressive Poisson model. We show that this new Bayesian method detailed in this paper can clearly show the upward trend on cyberbullying-related tweets since mid-March 2020. However, this evidence itself does not signify a rise in cyberbullying but shows a correlation of the crisis with the discussion of such incidents by individuals. Our work emphasizes a critical issue of cyberbullying and how a global crisis impacts social media abuse and provides a trend analysis model that can be utilized for social media data analysis in general.

References

  1. Sophia Alim. 2015. Analysis of tweets related to cyberbullying: exploring information diffusion and advice available for cyberbullying victims. International Journal of Cyber Behavior, Psychology and Learning (IJCBPL) 5, 4 (2015), 31--52.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Zahra Ashktorab. 2016. A Study of Cyberbullying Detection and Mitigation on Instagram. In Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion. 126--130.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Zahra Ashktorab and Jessica Vitak. 2016. Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 3895--3905.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Emmanuel W Ayaburi and Daniel N Treku. 2020. Effect of penitence on social media trust and privacy concerns: The case of Facebook. International Journal of Information Management 50 (2020), 171--181.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Rina A Bonanno and Shelley Hymel. 2013. Cyber Bullying and Internalizing Difficulties: Above and Beyond the Impact of Traditional Forms of Bullying. Journal of Youth and Adolescence 42, 5 (2013), 685--697.Google ScholarGoogle ScholarCross RefCross Ref
  6. Patrick T Brandt and John T Williams. 2001. A linear Poisson autoregressive model: The Poisson AR (p) model. Political Analysis 9, 2 (2001), 164--184.Google ScholarGoogle ScholarCross RefCross Ref
  7. Keith Cortis and Siegfried Handschuh. 2015. Analysis of Cyberbullying Tweets in Trending World Events. In Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business. 1--8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kate Crawford and Tarleton Gillespie. 2016. What is a Flag for? Social Media Reporting Tools and the Vocabulary of Complaint. New Media & Society 18, 3 (2016), 410--428.Google ScholarGoogle ScholarCross RefCross Ref
  9. Sanchari Das, Jayati Dev, and L Jean Camp. 2019. Privacy Preserving Policy Model Framework. Available at SSRN 3427634 (2019).Google ScholarGoogle Scholar
  10. Sanchari Das, Jayati Dev, and Kaushik Srinivasan. 2018. Modularity is the Key A New Approach to Social Media Privacy Policies. In Proceedings of the 7th Mexican Conference on Human-Computer Interaction. 1--4.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Sanchari Das, Javon Goard, and Dakota Murray. 2017. How Celebrities Feed Tweeples with Personal and Promotional Tweets: Celebrity Twitter Use and Audience Engagement. In Proceedings of the 8th International Conference on Social Media & Society. 1--5.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Sancahri Das, Andrew Kim, and Sayar Karmakar. 2020. Change-Point Analysis of Cyberbullying-Related Twitter Discussions During COVID-19. 16th Annual Social Informatics Research Symposium (ASIS&T) (2020).Google ScholarGoogle Scholar
  13. Anneliese Depoux, Sam Martin, Emilie Karafillakis, Raman Preet, Annelies Wilder-Smith, and Heidi Larson. 2020. The Pandemic of Social Media Panic Travels Faster than the COVID-19 Outbreak.Google ScholarGoogle Scholar
  14. Jayati Dev, Sanchari Das, and Linda Jean Camp. 2018. Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India.. In HAISA. 135--146.Google ScholarGoogle Scholar
  15. Dominic DiFranzo, Samuel Hardman Taylor, Franccesca Kazerooni, Olivia D Wherry, and Natalya N Bazarova. 2018. Upstanding by design: Bystander intervention in cyberbullying. In Proceedings of the 2018 CHI conference on human factors in computing systems. 1--12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Karthik Dinakar, Birago Jones, Catherine Havasi, Henry Lieberman, and Rosalind Picard.2012. Common Sense Reasoning for Detection, Prevention, and Mitigation of Cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiiS) 2, 3 (2012), 1--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Rebecca Dredge, John Gleeson, and Xochitl De la Piedad Garcia. 2014. Cyberbullying in Social Networking Sites: An Adolescent VictimâĂŹs Perspective. Computers in Human Behavior 36 (2014), 13--20.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. David P Farrington. 1993. Understanding and Preventing Bullying. Crime and Justice 17 (1993), 381--458.Google ScholarGoogle ScholarCross RefCross Ref
  19. David Finkelhor, Kimberly J Mitchell, and Janis Wolak. 2000. Online Victimization: A Report on the Nation's Youth. (2000).Google ScholarGoogle Scholar
  20. Sayar Karmakar. 2018. Asymptotic Theory for Simultaneous Inference Under Dependence. Technical Report. University of Chicago.Google ScholarGoogle Scholar
  21. Sayar Karmakar, Stefan Richter, and Wei Biao Wu. 2020+. Simultaneous inference for time-varying models. In revision, https://sayarkarmakar.github.io/publications/sayar1.pdf (2020+).Google ScholarGoogle Scholar
  22. Sayar Karmakar and Arkaprava Roy. 2020. Bayesian modelling of time-varying conditional heteroscedasticity. arXiv preprint arXiv:2009.06007 (2020).Google ScholarGoogle Scholar
  23. Shari Kessel Schneider, Lydia O'Donnell, and Erin Smith. 2015. Trends in cyberbullying and school bullying victimization in a regional census of high school students, 2006--2012. Journal of School Health 85, 9 (2015), 611--620.Google ScholarGoogle ScholarCross RefCross Ref
  24. Bumsoo Kim. 2020. Effects of Social Grooming on Incivility in COVID-19. Cyberpsychology, Behavior, and Social Networking (2020).Google ScholarGoogle Scholar
  25. Robin M Kowalski, Susan P Limber, and Patricia W Agatston. 2012. Cyberbullying: Bullying in the digital age. John Wiley & Sons.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Cheng-Yu Lai and Chia-Hua Tsai. 2016. Cyberbullying in the Social Networking Sites: An Online Disinhibition Effect Perspective. In Proceedings of the 3rd Multidisciplinary International Social Networks Conference. 1--6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. So-Hyun Lee and Hee-Woong Kim. 2015. Why People Post Benevolent and Malicious Comments Online. Commun. ACM 58, 11 (2015), 74--79.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Amrita Mangaonkar, Allenoush Hayrapetian, and Rajeev Raje. 2015. Collaborative detection of cyberbullying behavior in Twitter data. In 2015 IEEE International Conference on Electro/Information Technology (EIT). IEEE, 611--616.Google ScholarGoogle ScholarCross RefCross Ref
  29. Kimberly L Mason. 2008. Cyberbullying: A preliminary assessment for school personnel. Psychology in the Schools 45, 4 (2008), 323--348.Google ScholarGoogle ScholarCross RefCross Ref
  30. Bridget Christine McHugh, Pamela J Wisniewski, Mary Beth Rosson, Heng Xu, and John M Carroll. 2017. Most Teens Bounce Back: Using Diary Methods to Examine How Quickly Teens Recover from Episodic Online Risk Exposure. Proceedings of the ACM on Human-Computer Interaction 1 (2017), 1--19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Brenna McNally, Priya Kumar, Chelsea Hordatt, Matthew Louis Mauriello, Shalmali Naik, Leyla Norooz, Alazandra Shorter, Evan Golub, and Allison Druin. 2018. Co-Designing Mobile Online Safety Applications with Children. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Ali M Meligy, Hani M Ibrahim, and Mohamed F Torky. 2017. Identity Verification Mechanism for Detecting Fake Profiles in Online Social Networks. International Journal of Communication Networks and Information Security (IJCNIS) 9, 1 (2017), 31--39.Google ScholarGoogle ScholarCross RefCross Ref
  33. Tijana Milosevic. 2016. Social Media Companies' Cyberbullying Policies. International Journal of Communication 10 (2016), 22.Google ScholarGoogle Scholar
  34. Tijana Milosevic. 2018. Protecting Children Online? Cyberbullying Policies of Social Media Companies. The MIT Press.Google ScholarGoogle Scholar
  35. Mainack Mondal, Leandro Araújo Silva, and Fabrício Benevenuto. 2017. A Measurement Study of Hate Speech in Social Media. In Proceedings of the 28th ACM Conference on Hypertext and Social Media. 85--94.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Annalaura Nocentini, Juan Calmaestra, Anja Schultze-Krumbholz, Herbert Scheithauer, Rosario Ortega, and Ersilia Menesini. 2010. Cyberbullying: Labels, behaviours and definition in three European countries. Journal of Psychologists and Counsellors in Schools 20, 2 (2010), 129--142.Google ScholarGoogle Scholar
  37. Abu Saleh Md Noman, Sanchari Das, and Sameer Patil. 2019. Techies Against Facebook: Understanding Negative Sentiment Toward Facebook via User Generated Content. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Hani Nurrahmi and Dade Nurjanah. 2018. Indonesian Twitter Cyberbullying Detection using Text Classification and User Credibility. In 2018 International Conference on Information and Communications Technology (ICOIACT). IEEE, 543--548.Google ScholarGoogle ScholarCross RefCross Ref
  39. Justin W Patchin and Sameer Hinduja. 2010. Cyberbullying and self-esteem. Journal of school health 80, 12 (2010), 614--621.Google ScholarGoogle ScholarCross RefCross Ref
  40. Jessica A Pater, Moon K Kim, Elizabeth D Mynatt, and Casey Fiesler. 2016. Characterizations of Online Harassment: Comparing Policies Across Social Media Platforms. In Proceedings of the 19th International Conference on Supporting Group Work. 369--374.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Arkaprava Roy and Sayar Karmakar. 2020. Bayesian semiparametric time varying model for count data to study the spread of the COVID-19 cases. arXiv preprint arXiv:2004.02281 (2020).Google ScholarGoogle Scholar
  42. Weining Shen and Subhashis Ghosal. 2015. Adaptive Bayesian procedures using random series priors. Scandinavian Journal of Statistics 42, 4 (2015), 1194--1213.Google ScholarGoogle ScholarCross RefCross Ref
  43. Vivek K Singh, Marie L Radford, Qianjia Huang, and Susan Furrer. 2017. "They basically like destroyed the school one day" On Newer App Features and Cyberbullying in Schools. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. 1210--1216.Google ScholarGoogle Scholar
  44. Veronika Šléglová and Alena Cerna. 2011. Cyberbullying in Adolescent Victims: Perception and Coping. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 5, 2 (2011).Google ScholarGoogle Scholar
  45. Robert Slonje and Peter K Smith. 2008. Cyberbullying: Another Main Type of Bullying? Scandinavian Journal of Psychology 49, 2 (2008), 147--154.Google ScholarGoogle ScholarCross RefCross Ref
  46. Peter K Smith, Jess Mahdavi, Manuel Carvalho, and Neil Tippett. 2006. An Investigation into Cyberbullying, its Forms, Awareness and Impact, and the Relationship Between Age and Gender in Cyberbullying. Research Brief No. RBX03--06. London: DfES (2006).Google ScholarGoogle Scholar
  47. Patricia A Snell and Elizabeth Englander. 2010. Cyberbullying victimization and behaviors among girls: Applying research findings in the field. Journal of Social Sciences (2010).Google ScholarGoogle Scholar
  48. Alexander Tsoutsanis. 2012. Tackling Twitter and Facebook Fakes: ID Theft in Social Media. World Data Protection Report 12, 4 (2012), 1--3.Google ScholarGoogle Scholar
  49. Erin A Vogel, Jason P Rose, Lindsay R Roberts, and Katheryn Eckles. 2014. Social Comparison, Social Media, and Self-Esteem. Psychology of Popular Media Culture 3, 4 (2014), 206.Google ScholarGoogle ScholarCross RefCross Ref
  50. Elizabeth Whittaker and Robin M Kowalski. 2015. Cyberbullying via Social Media. Journal of School Violence 14, 1 (2015), 11--29.Google ScholarGoogle ScholarCross RefCross Ref
  51. Brenda K Wiederhold. 2020. Social Media Use During Social Distancing.Google ScholarGoogle Scholar
  52. Pamela Wisniewski, Heng Xu, Mary Beth Rosson, Daniel F Perkins, and John M Carroll. 2016. Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 3919--3930.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Michele L Ybarra, Marie Diener-West, and Philip J Leaf. 2007. Examining the Overlap in Internet Harassment and School Bullying: Implications for School Intervention. Journal of Adolescent Health 41, 6 (2007), S42-S50.Google ScholarGoogle ScholarCross RefCross Ref
  54. Michele L Ybarra and Kimberly J Mitchell. 2004. Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of child Psychology and Psychiatry 45, 7 (2004), 1308--1316.Google ScholarGoogle ScholarCross RefCross Ref
  55. Michele L Ybarra, Kimberly J Mitchell, Janis Wolak, and David Finkelhor. 2006. Examining Characteristics and Associated Distress Related to Internet Harassment: Findings from the Second Youth Internet Safety Survey. Pediatrics 118, 4 (2006), e1169-e1177.Google ScholarGoogle ScholarCross RefCross Ref
  56. Scott L Zeger. 1988. A regression model for time series of counts. Biometrika 75, 4 (1988), 621--629.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        EICC '20: Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference
        November 2020
        72 pages
        ISBN:9781450375993
        DOI:10.1145/3424954

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 January 2021

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader