Parameters to Determine Cyberbullying in Social Networks in the Ecuador

Segundo Moisés T. Toapanta, Kevin Enrique Yagual, Luis Enrique Mafla Gallegos

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

It was analyzed to different proposals about cyberbullying to identify online parameters through approaches, models, architecture, algorithm and assessments. The problem is the lack of a security algorithm when sharing information to a social network in Ecuador. The objective is to propose a parameter model to determine cyberbullying on Social Networks in Ecuador. It was used exploration and deductive method for the analysis of information from referenced articles. It resulted in a conceptual model of cyberbullying mitigation, four-layer architecture, indicator detection algorithm expressed in flowchart, and formula for measuring architecture. It was concluded that the algorithm determines indicators to identify harassment on social media, decreases impact at the national level and improves user management when browsing online, according to the simulations the architecture has 93.17% efficiency.

Original languageEnglish
Title of host publicationProceedings of the 2020 4th International Conference on Information System and Data Mining, ICISDM 2020
PublisherAssociation for Computing Machinery
Pages144-151
Number of pages8
ISBN (Electronic)9781450377652
DOIs
StatePublished - 15 May 2020
Event4th International Conference on Information System and Data Mining, ICISDM 2020 - Hilo, United States
Duration: 15 May 202017 May 2020

Publication series

NameACM International Conference Proceeding Series

Conference

Conference4th International Conference on Information System and Data Mining, ICISDM 2020
Country/TerritoryUnited States
CityHilo
Period15/05/2017/05/20

Bibliographical note

Publisher Copyright:
© 2020 ACM.

Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.

Keywords

  • Cyber bullying
  • cyber harassment
  • Information Security
  • Social Networks

Cite this