CyberAid: Are your children safe from cyberbullying?
Researchers around the world have been implementing machine learning as a method to detect cyberbullying text. The machine is trained using features such as variations in texts, through social media context and interactions in a social network environment. The machine can also identify and profile u...
| Main Authors: | Thun, Lee Jia *, Teh, Phoey Lee *, Cheng, Chi-Bin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier / King Saud University
2021
|
| Subjects: | |
| Online Access: | http://eprints.sunway.edu.my/1969/ http://eprints.sunway.edu.my/1969/1/Teh%20Phoey%20Lee%202021%20cyberaid%20are%20your%20children%20safe%20from%20cyberbullying.pdf |
Similar Items
Pay to play: Understanding gamer’s motivation through semantic analysis
by: Teh, Phoey Lee *, et al.
Published: (2021)
by: Teh, Phoey Lee *, et al.
Published: (2021)
Determining the indicators of social capital theory to social network sites
by: Sander, Tom, et al.
Published: (2014)
by: Sander, Tom, et al.
Published: (2014)
Text segmentation techniques: A critical review
by: Pak, Irina *, et al.
Published: (2017)
by: Pak, Irina *, et al.
Published: (2017)
Text segmentation for analysing different languages
by: Pak, Irina *, et al.
Published: (2016)
by: Pak, Irina *, et al.
Published: (2016)
Cyber cafe management system
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
Cyber cafe management system
by: Mohd Khazro'ie, Jaafar
Published: (2010)
by: Mohd Khazro'ie, Jaafar
Published: (2010)
Customer intent prediction using sentiment analysis techniques
by: Lye, Say Hong *, et al.
Published: (2021)
by: Lye, Say Hong *, et al.
Published: (2021)
Facebook in Higher Education: Exploring the educational use of Facebook by undergraduate students
by: Lee, Cheng Ean Catherine *, et al.
Published: (2015)
by: Lee, Cheng Ean Catherine *, et al.
Published: (2015)
Running Your Programs
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Testing Your Programs
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Improving
Your Program’s
Performance
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Development of a multimedia courseware as a teaching aid for children with dyslexia
by: Zakaria, Mohd Hafiz, et al.
Published: (2006)
by: Zakaria, Mohd Hafiz, et al.
Published: (2006)
PolyAQG Framework: Auto-generating assessment questions
by: Tan, Tee Hean *, et al.
Published: (2021)
by: Tan, Tee Hean *, et al.
Published: (2021)
Technology aided learning application for wetlands ecology using constructivism approach
by: Ngwee, Jia Ler
Published: (2023)
by: Ngwee, Jia Ler
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Mobile-Assisted Instructional for Domestic Maid (MAID-M)
by: Teh, Phoey Lee *, et al.
Published: (2014)
by: Teh, Phoey Lee *, et al.
Published: (2014)
The intention to share and re-shared among the young adults towards a posting at social networking sites
by: Teh, Phoey Lee *, et al.
Published: (2014)
by: Teh, Phoey Lee *, et al.
Published: (2014)
Mobile Messenger rating, sharing and engagement in global social commerce
by: Tan, Kiat Yao *, et al.
Published: (2015)
by: Tan, Kiat Yao *, et al.
Published: (2015)
Profanity and hate speech detection
by: Teh, Phoey Lee *, et al.
Published: (2020)
by: Teh, Phoey Lee *, et al.
Published: (2020)
Parental attachment and cyberbullying among Malaysian children
by: Yusup, Sarina
Published: (2015)
by: Yusup, Sarina
Published: (2015)
SmartPLS for the human resources field to evaluate a model
by: Sander, Tom, et al.
Published: (2014)
by: Sander, Tom, et al.
Published: (2014)
A concept to measure social capital in social network sites
by: Sander, Tom, et al.
Published: (2014)
by: Sander, Tom, et al.
Published: (2014)
Analysis of popular social media topics regarding plastic pollution
by: Teh, Phoey Lee *, et al.
Published: (2022)
by: Teh, Phoey Lee *, et al.
Published: (2022)
Know your hotels well! An online review analysis using text analytics.
by: Lee, Angela Siew Hoong *, et al.
Published: (2018)
by: Lee, Angela Siew Hoong *, et al.
Published: (2018)
Serious game for first aid
by: Ain Nur Najwa, Abdul Wahab
Published: (2018)
by: Ain Nur Najwa, Abdul Wahab
Published: (2018)
Parental attachment and cyberbullying experiences among Malaysian children
by: Yusup, Sarina, et al.
Published: (2018)
by: Yusup, Sarina, et al.
Published: (2018)
EduChain: CIA-compliant blockchain for intelligent cyber defense of microservices in education industry 4.0
by: Rahman, Md. Arafatur, et al.
Published: (2022)
by: Rahman, Md. Arafatur, et al.
Published: (2022)
The intention to cyberbully and cyberbullying behaviour among undergraduate students
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017)
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017)
Application of Fuzzy Logic Controller for Safe Braking System: An Anti-Theft Tracking
by: Kahtan, Hasan, et al.
Published: (2018)
by: Kahtan, Hasan, et al.
Published: (2018)
The use of social networking sites for the employment seeking process
by: Sander, Tom, et al.
Published: (2014)
by: Sander, Tom, et al.
Published: (2014)
Cyber security capability maturity model based on Maqasid A Shari’ah (MS-C2M2)
by: Abdul Aziz, Normaziah, et al.
Published: (2020)
by: Abdul Aziz, Normaziah, et al.
Published: (2020)
Cyberbullying among youth in Malaysia
by: Lai, Chee Sern, et al.
Published: (2016)
by: Lai, Chee Sern, et al.
Published: (2016)
Self-portrait images for mobile application
by: Teh, Phoey Lee *, et al.
Published: (2013)
by: Teh, Phoey Lee *, et al.
Published: (2013)
Move your data with you
Published: (2009)
Published: (2009)
A Bring-Your-Own-Device Framework over Software Defined Networking
by: Khoo, Wai Lung
Published: (2015)
by: Khoo, Wai Lung
Published: (2015)
Computer-aided system for extending the performance of diabetes analysis and prediction
by: Murad, Saydul Akbar, et al.
Published: (2021)
by: Murad, Saydul Akbar, et al.
Published: (2021)
The Application of Mixed Method in Developing a Cyber
Terrorism Framework
by: Ahmad, Rabiah, et al.
Published: (2012)
by: Ahmad, Rabiah, et al.
Published: (2012)
Online Academic Appointment Scheduling System
by: Teh, Bin Shun
Published: (2017)
by: Teh, Bin Shun
Published: (2017)
Maternal warmth, motivation for engagement in cyberbullying and cyberbullying involvement among undergraduate student
by: Arshat, Zarinah, et al.
Published: (2022)
by: Arshat, Zarinah, et al.
Published: (2022)
Similar Items
-
Pay to play: Understanding gamer’s motivation through semantic analysis
by: Teh, Phoey Lee *, et al.
Published: (2021) -
Determining the indicators of social capital theory to social network sites
by: Sander, Tom, et al.
Published: (2014) -
Text segmentation techniques: A critical review
by: Pak, Irina *, et al.
Published: (2017) -
Text segmentation for analysing different languages
by: Pak, Irina *, et al.
Published: (2016) -
Cyber cafe management system
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)