A machine learning and qualitative examination of cyberbullying disclosures on Twitter
Keywords:Cyberbullying, Bullying roles, Social media, Twitter, Machine learning, Qualitative content analysis
Although clear links exist between social networking sites (SNS) and cyberbullying, limited studies have examined the content of SNS platforms. This study provides one of the few explorations of cyberbullying using Twitter data. Using supervised machine learning, it analyzes the disclosure of cyberbullying episodes on Twitter to understand who is posting and why they are posting about cyberbullying. Additionally, a qualitative content analysis of 500 tweets provides further insights into the characteristics of cyberbullying episodes. The findings reveal that aside from serving as a medium for cyberbullying, Twitter is also a space for bystanders to engage in ‘upstander’ behavior and where victims make connections and receive validation. We also found that cyberbullying targets extend beyond the peer group; random strangers, celebrities, and entire groups are victimized on SNS platforms via multiple forms of cyberbullying. The paper discusses how SNS platforms can become a part of the fight against cyberbullying.
BBC. (n.d.). 7 stars who have personal experiences of online bullying. BBC Radio 1. Retrieved from https://www.bbc.co.uk/programmes/articles/3QcD9W13Dr0bxmt4CMWVkGk/7-stars-who-have-personal-experiences-of-online-bullying
BBC. (May 23, 2020). Hana Kimura: Netflix star and Japanese wrestler dies at 22. Retrieved from https://www.bbc.com/news/world-asia-52782235
Bengtsson, M. (2016). How to plan and perform a qualitative study using content analysis. NursingPlus Open, 2, 8-14.
Blanco, K., Briceno, A. & Steele, A., Tapia, J., McKay, J., Towers, S. & Yong, K. (2014). The Dynamics of Offensive Messages in the World of Social Media: the Control of Cyberbullying on Twitter. arXiv:1408.0694 [cs.SI]
Bellmore, A., Calvin, A., Xu, J-M., & Zhu, X. (2015). The five W’s of “bullying” on Twitter: Who, What, Why, Where and When. Computers in Human Behavior, 44, 305–314.
Bird, S., Klein, E., & Loper, E. (2019). Natural language Processing with Python: Analyzing text with the natural language toolkit. O’Reilly Media.
Butler, D., Kift, S., Campbell, M. (2009). Cyberbullying in schools and the law: Is there an effective means of addressing the power imbalance? eLaw Journal, 16(1), 84-114.
Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., & Vakali, A. (2017). Mean Birds: Detecting Aggression and Bullying on Twitter. 13-22. https://doi.org/10.1145/3091478.3091487
Chen, G.M. (2011). Tweet this: A uses and gratification perspective on how active Twitter use gratifies a need to connect with others. Computers in Human Behavior, 27, 755-762.
Clement, J. (2019). Number of monthly active Twitter users worldwide from 1st quarter 2010 to first quarter 2019. Statistica. Retrieved from: https://www.statista.com/statistics/282087/number-of-monthly-active-twitter-users/
Christie, C. (2007). Content analysis. In R. Baumeister, & K. Vohs (Eds.), Encyclopedia of social psychology. Thousand Oaks, CA: Sage.
Dedoose Version 8.0.35 web application for managing, analyzing, and presenting qualitative and mixed method research data (2018). Los Angeles, CA: SocioCultural Research Consultants, LLC www.dedoose.com.
Della Cioppa, V., O'Neil, A., & Craig, W. (2015). Learning from traditional bullying interventions: A review of research on cyberbullying and best practice, Aggression and Violent Behavior, 23, 61-68, https://doi.org/10.1016/j.avb.2015.05.009.
Dhungana Sainju, K., Mishra, N., Kuffour, A., Young, L. (2021a). Bullying discourse on Twitter: An examination of bully-related tweets using supervised machine learning. Computers in Human Behavior, 120, 106735.
Dhungana Sainju, K., Kuffour, A., Young, L., Mishra, N. (2021b). Bullying-related tweets: A qualitative examination of perpetrators, targets, and helpers. International Journal of Bullying Prevention, 4, 6–22.
Dooley, J.J., Pyzalski, J., & Cross, D. (2009). Cyberbullying versus face-to-face bullying: A theoretical and conceptual review. Zeitschrift für Psychologie/Journal of Psychology, 217(4), 182–188.
Dowell, E.B., Burgess, A.W., & Cavanaugh, D.J. (2009). Clustering of internet risk behaviors in a middle school student population. Journal of School Health, 11, 547–53.
Dredge, R., Gleeson, J., & Garcia, X. D. (2014). Cyberbullying in social networking sites: An adolescent victim’s perspective. Computers in Human Behavior, 36, 13-20.
El Asam, A., & Samara, M. (2016) Cyberbullying and the law: a review of psychological and legal challenges. Computers in Human Behavior, 65, 127-141.
Freelon, D., McIlwain, C.D., Charlton, D., & Clark, M. (2016). Beyond the Hashtags: #Ferguson, #Blacklivesmatter, and the Online Struggle for Offline Justice; Center for Media & Social Impact, American University: Washington, DC, USA.
Gahagan, K., Vaterlaus, J.M., & Frost, L.R. (2016). College student cyberbullying on social networking sites: Conceptualization, prevalence, and perceived bystander responsibility. Computers in Human Behavior, 55(B), 1097-1105.
Hamm, M.P., Newton, A.S., Chisholm, A., Shulhan, J., Milne, A., Sundar, P., Ennis, H., Scott, S.D., Hartling, L. (2015). Prevalence and effect of cyberbullying on children and young people: A scoping review of social media studies. JAMA Pediatrics, 169(8), 770–777. doi:10.1001/jamapediatrics.2015.0944
Hawkins, D. L., Pepler, D. J., & Craig, W. M. (2001). Naturalistic observations of peer interventions in bullying. Social Development, 10(4), 512–527.
Hellström, L., Persson, L. & Hagquist, C. (2015). Understanding and defining bullying – adolescents’ own views. Archives of Public Health. 73, 4.
Hinduja, S. & Patchin, J. W. (2015). Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying (2nd edition). Thousand Oaks, CA: Sage Publications.
Lambe, L. J., Della Cioppa, V., Hong, I. K., & Craig, W. M. (2019). Standing up to bullying: A social ecological review of peer defending in offline and online contexts. Aggression and Violent Behavior, 10.1016/j.avb.2018.05.007
Levy, M. & Gumpel, T. P. (2018). The interplay between bystanders’ intervention styles: An examination of the “bullying circle” approach, Journal of School Violence, 17(3), 339-353.
Katz, E., Blumler, J. G., & Gurevitch, M. (1973). Uses and Gratifications Research. The Public Opinion Quarterly, 37(4), 509–523.
Katzer, C., Fetchenhauer, D., & Belschak, F. (2009). Cyberbullying: Who are the victims? A comparison of victimization in Internet chatrooms and victimization in school. Journal of Media Psychology, 21, 25–36. doi:10.1027/1864-1188.8.131.52
Kırcaburun, K., Kokkinos, C.M., Demetrovics, Z. Király, O., Griffiths, M.D., & Seda Çolak, T. (2019). Problematic online behaviors among adolescents and emerging adults: Associations between cyberbullying perpetration, problematic social Media Use, and psychosocial Factors. International Journal of Mental Health and Addiction 17, 891–908.
Kowalski, R. M., & Limber, S. P. (2007). Electronic bullying among middle school students. Journal of Adolescent Health, 41(6), S22–S30. doi:10.1016/j.jadohealth.2007.08.017
Kowalski, R., Giumetti, G.W., Schroeder, A.N., & Lattanner, M.R. (2014). Bullying in the
digital age: A critical review and meta-analysis of cyberbullying research among youth. Psychological Bulletin, 140(4), 1073-1137.
Marwick, A. C., & Boyd, D. (2011). I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, 13(1), 114–133.
McCurry, J. (2019). K-pop under scrutiny over 'toxic fandom' after death of Sulli. The Guardian. Retrieved from https://www.theguardian.com/music/2019/oct/18/k-pop-under-scrutiny-over-toxic-fandom-after-death-of-sulli
McHugh, M.C., Saperstein, S.L., & Gold, R.S. (2019). OMG U #Cyberbully! An exploration
of public discourse about cyberbullying on Twitter. Health Education & Behavior, 46(1) 97–105.
McIntire, M., Yourish, K., & Buchanan, L. (2019). Trump’s twitter feed: Conspiracymongers, racists, and spies. The New York Times. Retrieved from https://www.nytimes.com/interactive/2019/11/02/us/politics/trump-twitter-disinformation.html.
Mundt, M., Ross, K., & Burnett, C.M. Scaling Social Movements Through Social Media: The Case of Black Lives Matter. Social Media + Society, 4, 2056305118807911
Newall, M. (2018). Global Views on Cyberbullying. Ipsos. Retrieved from https://www.ipsos.com/en/global-views-cyberbullying
NLTK Project. (2020). NLTK 3.5 documentation. Source code for nltk.stem.wordnet. Retrieved from https://www.nltk.org/_modules/nltk/stem/wordnet.html.
Nocentini, A., Calmaestra, J., Schultze-Krumbholz, A., Scheithauer, H., Ortega, R., & Menesini, E. (2010). Cyberbullying: Labels, Behaviours and Definition in Three European Countries. Australian Journal of Guidance & Counselling, 20(2), 129–142.
Olweus, D. (1993). Bullying at School: What We Know and What We Can Do. Blackwell Publishers. Cambridge, MA.
Ortiz-Ospina, E. (2019). The rise of social media. Our World in Data. Retrieved from https://ourworldindata.org/rise-of-social-media
O’Sullivan, P. B., & Flanagin, A. J. (2003). Reconceptualizing ‘flaming’ and other problematic messages. New Media & Society, 5(1), 69–94.
Padgett, S., & Notar, C. E. (2013). Bystanders are the key to stopping bullying. Universal Journal of Educational Research, 1(2), 33–41. doi:10.13189/ujer.2013.010201
Park, S., Na, E., & Kim, E. (2014). The relationship between online activities, netiquette and cyberbullying. Children and Youth Services Review, 42, 74-81.
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., & Duchesnay, E. (2011). Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12, 2825–2830.
Picheta, R. (2020). Caroline Flack, ‘Love Island,’ and the industry of outrage surrounding the star’s death. CNN. Retreived from https://www.cnn.com/2020/02/17/media/caroline-flack-death-reaction-scli-gbr-intl/index.html
Polanin, J. R., Espelage, D. L., & Pigott, T. D. (2012). A Meta-Analysis of School-Based Bullying Prevention Programs’ Effects on Bystander Intervention Behavior. School Psychology Review, 41(1), 47–65.
Pyzalski, J. (2011). Electronic aggression among adolescents: An old house with a new façade (or even a number of houses). In Youth culture and net culture: Online social practices, ed. C. Hällgren, E. Dunkels and G.-M. Frånberg, 278–95. Hershey, PA: IGI Global.
Pyzalski, J. (2012). From cyberbullying to electronic aggression: typology of the phenomenon.Emotional and Behavioural Difficulties, 17(3–4), 305–317.
Romano, A. (2019). Why we can’t stop fighting about cancel culture. Vox. Retrieved from https://www.vox.com/culture/2019/12/30/20879720/what-is-cancel-culture-explained-history-debate
Salmivalli, C., Lagerspetz, K. M. J., BjoÈrkqvist, K., OÈ sterman, K. & Kaukiainen, A. (1996). Bullying as a group process: participant roles and their relations to social status within the class. Aggressive Behavior, 22, 1-15.
Salmivalli, C. (2010). Bullying and the peer group: A review. Aggression and Violent Behavior, 15(2), 112-120, 10.1016/j.avb.2009.08.007
Salmivalli, C. (2014). Participant roles in bullying: How can peer bystanders be utilized in interventions? Theory Into Practice, 53(4), 286–292.
Securly. (2020). The 10 types of cyberbullying. Retrieved from https://blog.securly.com/2018/10/04/the-10-types-of-cyberbullying/
Shenk, C. E., & Fruzzetti, A. E. (2011). The impact of validating and invalidating responses on emotional reactivity. Journal of Social and Clinical Psychology, 30(2), 163-183.
Smith, P.K., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S., & Tippett, N. (2008). Cyberbullying: Its nature and impact in secondary school pupils, Journal of Child Psychology and Psychiatry, 49 (4), 376-385
Staude-Müller, F., Hansen, B., & Voss, M. (2012). How stressful is online victimization? Effects of victim's personality and properties of the incident. European Journal of Developmental Psychology, 9(2), 260-274, DOI: 10.1080/17405629.2011.643170
Stever, G. S., & Lawson, K. (2013). Twitter as a way for celebrities to communicate with fans: Implications for the study of parasocial interaction. North American Journal of Psychology, 15(2), 339-354.
Tokunaga, R.S. (2010). Following you home from school: A critical review and synthesis of research on cyberbullying victimization, Computers in Human Behavior, 26(3), 277-287.
Twyman, K., Saylor, C., Taylor, L.A., & Comeaux, C. (2010). Comparing children and adolescents engaged in cyberbullying to matched peers. Cyberpsychology, Behavior, and Social Networking, 13(2):195-199. doi:10.1089/cyber.2009.0137
UNESCO (2019). Behind the numbers: Ending school violence and bullying. United Nations Educational, Scientific and Cultural Organization. Paris, France.
UNICEF. (2019). UNICEF poll: More than a third of young people in 30 countries report being a victim of online bullying. Retrieved from https://www.unicef.org/press-releases/unicef-poll-more-third-young-people-30-countries-report-being-victim-online-bullying
Vanderberg, M. (2020). 18 celebrities who have quit social media and why. Insider. Retrieved from https://www.insider.com/celebrities-who-quit-social-media-twitter-2018-8
Viner, R.M., Gireesh, A., Stiglic, N., Hudson, L.D., Goddings, A-L., Ward, J.L., & Nicholls, D.E. (2019). Roles of cyberbullying, sleep, & physical activity in mediating the effects of social media use on mental health & wellbeing among young people in England: a secondary analysis of longitudinal data, The Lancet Child & Adolescent Health, 3(10), 685-696.
Waasdorp, T.E. & Bradshaw, C.P. (2015). The overlap between cyberbullying and traditional bullying. Journal of Adolescent Health, 56(5), 483-488.
Wagner, U., Galli, L., Schott, B.H., Wold, A., van der Schalk, J., Manstead, A.S.R., Scherer, K., & Walter, H. (2015). Beautiful friendship: Social sharing of emotions improves subjective feelings and activates the neural reward circuitry. Social Cognitive and Affective Neuroscience, 10(6), 801–808.
Wójcik, M., & Flak, W. (2019). Frenemy: A New Addition to the Bullying Circle. Journal of Interpersonal Violence. https://doi.org/10.1177/0886260519880168
Wolak, J., Mitchell, K. J., & Finkelhor, D. (2007). Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. The Journal of Adolescent Health : official publication of the Society for Adolescent Medicine, 41(6 Suppl 1), S51–S58. https://doi.org/10.1016/j.jadohealth.2007.08.019
Waseem, Z. & Hovy, D. (2016). Hateful symbols or hateful people? Predictive features for hate speech detection on twitter. Proceedings of North American Chapter of the Association for Computational Linguistics: Human Language Technologies 2016, 88–93.
Whiting, A. & Williams, D. (2013). Why people use social media: A uses and gratifications approach. Qualitative Market Research: An International Journal, 16(4), 362-369.
Whittaker, E. & Kowalski, R.M. (2015). Cyberbullying via social media. Journal of School Violence, 14, 11-29.
Willard, N. (2007). Cyberbullying and cyberthreats. Effectively managing internet use risks in schools. Center for Safe and Responsible Use of the Internet. Retrieved from https://www.cforks.org/Downloads/cyber_bullying.pdf
Xu, J.-M., Jun, K.-S., Zhu, X., & Bellmore, A. (2012). Learning from bullying traces in social media. In Proceedings of the conference of the North American chapter of the association for computational linguistics: human language technologies (pp. 656–666). Montreal, Quebec, Canada: Association for Computational Linguistics. Retrieved from http://www.proceedings.com/15547.html.
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).