Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network

  title={Analyzing Labeled Cyberbullying Incidents on the Instagram Social Network},
  author={Homa Hosseinmardi and Sabrina Arredondo Mattson and Rahat Ibn Rafiq and Richard Han and Qin Lv and Shivakant Mishra},
Cyberbullying is a growing problem affecting more than half of all American teens. The main goal of this paper is to study labeled cyberbullying incidents in the Instagram social network. In this work, we have collected a sample data set consisting of Instagram images and their associated comments. We then designed a labeling study and employed human contributors at the crowd-sourced CrowdFlower website to label these media sessions for cyberbullying. A detailed analysis of the labeled data is… CONTINUE READING
Highly Cited
This paper has 66 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 40 extracted citations

On Obstructing Obscenity Obfuscation

View 5 Excerpts
Highly Influenced

Toward Multimodal Cyberbullying Detection

CHI Extended Abstracts • 2017
View 3 Excerpts
Highly Influenced

Cyberbullying Detection on Instagram with Optimal Online Feature Selection

2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) • 2018
View 1 Excerpt

67 Citations

Citations per Year
Semantic Scholar estimates that this publication has 67 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 47 references

Bullying by peers has effects later in life (2015)

A. Strickland
http://www.cnn. com/2015/05/08/health/bullying-mental-health-effects/index.html • 2015
View 1 Excerpt

Cyberbullying ’causes suicidal thoughts in kids more than traditional bullying (2014)

D. McNamee • 2015
View 1 Excerpt

Jessica Logan - Victims of bullying (2008)

cbcNews pictures/victims-of-bullying/11/ • 2015
View 1 Excerpt

Online social network bullying detection using intelligence techniques

B. S. Nandhini, J. Sheeba
Procedia Computer Science 45, 485–492 • 2015
View 1 Excerpt

Similar Papers

Loading similar papers…