Skip to main content

Review on the Social Media Management Techniques Against Kids Harmful Information

  • Chapter
  • First Online:
Kids Cybersecurity Using Computational Intelligence Techniques

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1080))

  • 383 Accesses

Abstract

The world is developing quickly, and new technological innovations are emerging like grotesque critters. Social media is one of the most powerful forces available to modern generation so, the ability of man to freely communicate his opinions on the internet cannot be ignored. The majority of people in our world are still unaware that social media is now considered to be not just something that adults use but also something that youngsters and kids must use. The information must then be screened to ensure that it doesn't negatively affect human cognition in any manner and to make the internet a safer place for everyone. People disseminate inaccurate information or inappropriate content to attract fans on various sites; they disseminate damaging information or improper material, such as violent photographs and videos, irrelevant or abusive material, sexual content, cyberbullying, etc. There are several methods available, some of which have been detailed below, to detect this hazardous material. Through several databases, information from earlier work in this field has been gathered to know the prior studies concerning this notion. Numerous techniques, including deep learning and machine learning algorithms, have been chosen as the finest alternatives. This chapter gives a review on the existing methods and the management’s tool on the kid’s cyber security and one may learn from this Chapter how to improve knowledge acquisition in the digital age. Finally, this Chapter examines the challenges that come up while endeavoring to detect the harmful information that has been affecting kids’ minds. And it would be helpful regarding the main concept of algorithm involved in content analysis in addition; this chapter will be beneficial to many researchers in area on kids’ cyber security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. P.M. Abhilash, Sustainability improvement of WEDM process by analyzing and classifying wire rupture using kernel-based naive Bayes classifier. J. Braz. Soc. Mech. Sci. Eng. 4–9 (2021)

    Google Scholar 

  2. W. Akram, R. Kumar, A study on positive and negative effects of social media on society. Int. J. Comput. Sci. Eng. 5(10), 351–354 (2017)

    Google Scholar 

  3. A. Alakrot, L. Murray, N.S. Nikolov, Towards accurate detection of offensive language in online communication in Arabic. Proc. Comput. Sci. 142, 315–320 (2018)

    Article  Google Scholar 

  4. R.M. Alhejaili, W.M. Yafooz, A.A. Alsaeedi, Hate speech and abusive laungage detection in twitter and challenges, in 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), (IEEE, 2022, May), pp. 86–94

    Google Scholar 

  5. I. Aljarah, M. Habib, N. Hijazi, H. Faris, R. Qaddoura, B. Hammo, M. Alfawareh, Intelligent detection of hate speech in Arabic social network: A machine learning approach. J. Inf. Sci. 47(4), 483–501 (2021)

    Article  Google Scholar 

  6. M. Alloghani, D. A.-J, A Systematic Review on Supervised and Unsupervised Machine Learning Algorithms for Data Science. (Springer, 2019)

    Google Scholar 

  7. A. Alsayat, H. El-Sayed, Social media analysis using optimized K-Means clustering, in IEEE Xplore (2016)

    Google Scholar 

  8. T.K. Balaji, C.S.R. Annavarapu, A. Bablani, Machine learning algorithms for social media analysis: a survey. Comput. Sci. Rev. 40, 100395 (2021)

    Article  Google Scholar 

  9. T.J. Banerjee, A system of content analysis of social media using AI and NLP. Int. J. Res. Eng. Sci. Manag. 4(6), 132–136 (2021)

    Google Scholar 

  10. C. Blava (45), A review and Content5 analysis intervention strategies, aggression and violent behavior. Sci. Direct, 163–172

    Google Scholar 

  11. N. Chandra, S.K. Khatri, S. Som, Anti social comment classification based on kNN algorithm, in 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), (IEEE, 2017, September), pp. 348–354

    Google Scholar 

  12. V.S. Chavan, S.S. Shylaja, Machine learning approach for detection of cyber-aggressive comments by peers on social media network, in 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), (IEEE, 2015, August), pp. 2354–2358

    Google Scholar 

  13. J.P. de Oliveira Lima, L.C.S. de Araújo Filho, F.S. da Siva,C.M.S. Figueiredo, Pigmented dermatological lesions classification using convolutional neural networks ensemble mediated by multilayer perceptron network. IEEE Lat. Am. Trans. 17(11),1902−1908 (2019)

    Google Scholar 

  14. N.B. Defersha, K.K. Tune, Detection of hate speech text in afan oromo social media using machine learning approach. Ind. J Sci Technol 14(31), 2567–2578 (2021)

    Article  Google Scholar 

  15. R. Dolan, J. Conduit, C. Frethey-Bentham, J. Fahy, S. Goodman, Social media engagement behavior: a framework for engaging customers through social media content. Eur. J. Mark. (2019)

    Google Scholar 

  16. L. Fatima Ezzahra, D. Samira, D. Khadija, H. Badr, Intrusion detection systems using long short-term memory (LSTM). J. Big Data, 8(1) (2021)

    Google Scholar 

  17. M.A. Fauzi, Ensemble method for indonesian twitter hate speech. Indones. J. Electr. Eng. Comput. Sci. (2018)

    Google Scholar 

  18. A. Giachanou, P. Rosso, The battle against online harmful information: the cases of fake news and hate speech, in Proceedings of the 29th ACM International Conference on Information & Knowledge Management, (2020, October), pp. 3503–3504

    Google Scholar 

  19. Y. Gong, W. Xu, Machine Learning For Multimedia Content Analysis, Vol. 30, (Springer Science & Business Media, 2007)

    Google Scholar 

  20. J.A. Hartigan, Bayes Theory, (Springer Science & Business Media, 2012)

    Google Scholar 

  21. N. Helberger, M. Van Drunen, S. Eskens, M, Bastian, J. Moeller, A freedom of expression perspective on AI in the media–with a special focus on editorial decision making on social media platforms and in the news media. Eur. J. Law Technol. 11(3) (2020)

    Google Scholar 

  22. W.H. Ho, P.A. Watters, Statistical and structural approaches to filtering internet pornography. in 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No. 04CH37583), Vol. 5 (IEEE, 2004, October), pp. 4792–4798

    Google Scholar 

  23. A. Hussain, E. Cambria, Semi-supervised learning for big social data analysis. Neurocomputing 275, 1662–1673 (2018)

    Article  Google Scholar 

  24. M. Imran, F. Ofli, D. Caragea, A. Torralba, Using AI and social media multimodal content for disaster response and management: opportunities, challenges, and future directions. Inf. Process. Manage. 57(5), 102261 (2020)

    Article  Google Scholar 

  25. F. Janjua, A. Masood, H. Abbas, I. Rashid, M.M.Z.M. Khan, Textual analysis of traitor-based dataset through semi supervised machine learning. Futur. Gener. Comput. Syst. 125, 652–660 (2021)

    Article  Google Scholar 

  26. T. Jiang, J.L. Gradus, A.J. Rosellini, Supervised machine learning: a brief primer. Behav. Ther. 51(5), 675–687 (2020)

    Article  Google Scholar 

  27. T.I. Kasatkina, A.V. Dushkin, V.A. Pavlov, R.R. Shatovkin, Algorithm for predicting the evolution of series of dynamics of complex systems in solving information problems. In J. Phys.: Conf. Ser. 973(1), 012035. IOP Publishing (2018, March)

    Google Scholar 

  28. Y. LeCun, Y. Bengio, G. Hinton, Deep learning. Nature 521(7553), 436–444 (2015)

    Google Scholar 

  29. N.T. Lee, P. Resnick, G. Barton, Algorithmic Bias Detection and Mitigation: Best Practices and Policies to Reduce Consumer Harms (Brookings Institute, Washington, DC, USA, 2019)

    Google Scholar 

  30. W. Lee, S.S. Lee, S. Chung, D. An, Harmful contents classification using the harmful word filtering and SVM, in International Conference on Computational Science, (Springer, Berlin, Heidelberg, 2007, May), pp. 18–25

    Google Scholar 

  31. D. Lewis, J. Moorkens, A rights-based approach to trustworthy AI in social media. Soc. Media+ Soc. 6(3), 2056305120954672 (2020)

    Google Scholar 

  32. M. Maktabar, A. Zainal, M.A. Maarof, M.N. Kassim, Content based fraudulent website detection using supervised machine learning techniques. In International Conference on Hybrid Intelligent Systems, (Springer, Cham, 2017, December), pp. 294–304

    Google Scholar 

  33. Marathe, Contextual features-based NB classifier for cyberbullying detection on youtube. Int. J. Sci. Eng. Res. 1109–1114 (2015)

    Google Scholar 

  34. N.S. Mullah, W.M.N.W. Zainon, Advances in machine learning algorithms for hate speech detection in social media: a review. IEEE Access (2021)

    Google Scholar 

  35. V. Nahar, S. Al-Maskari, X. Li, C. Pang, Semi-supervised learning for cyberbullying detection in social networks. in Australasian Database Conference, (Springer, Cham, 2014, July), pp. 160–171

    Google Scholar 

  36. R.N. Nandi, F. Alam, P. Nakov, Detecting the role of an entity in harmful memes: techniques and their limitations (2022). arXiv preprint arXiv:2205.04402

    Google Scholar 

  37. E. Papegnies, V. Labatut, R. Dufour, G. Linares, Impact of content features for automatic online abuse detection, in International Conference on Computational Linguistics and Intelligent Text Processing, (Springer, Cham, 2017, April), pp. 404–419

    Google Scholar 

  38. C.Y.J. Peng, K.L. Lee, G.M. Ingersoll, An introduction to logistic regression analysis and reporting. J. Educ. Res. 96(1), 3–14 (2002)

    Article  Google Scholar 

  39. M. Plaisime, C. Robertson-James, L. Mejia, A. Núñez, J. Wolf, S. Reels, Social media and teens: a needs assessment exploring the potential role of social media in promoting health. Soc. Media+ Soc. 6(1), 2056305119886025 (2020)

    Google Scholar 

  40. A.K. Rathore, P.V. Ilavarasan, Y.K. Dwivedi, Social media content and product co-creation: an emerging paradigm. J. Enterp. Inf. Manag. (2016)

    Google Scholar 

  41. S. Ray, A quick review of machine learning algorithms. In 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), (IEEE, 2019, February), pp. 35–39

    Google Scholar 

  42. J. Salminen, M. Hopf, S.A. Chowdhury, S.G. Jung, H. Almerekhi, B.J. Jansen, Developing an online hate classifier for multiple social media platforms. Hum.-Centric Comput. Inf. Sci. 10(1), 1–34. A. Wolfewicz, Deep Learning Vs Machine Learning (2020)

    Google Scholar 

  43. R. Saravanan, P. Sujatha, A state of art techniques on machine learning algorithms: a perspective of supervised learning approaches in data classification. in 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), (IEEE, 2018, June), pp. 945–949

    Google Scholar 

  44. M. Scharkow, Thematic content analysis using supervised machine learning: an empirical evaluation using German online news. Qual. Quant. 47(2), 761–773 (2013)

    Article  Google Scholar 

  45. K. Shah, H. Patel, D. Sanghvi, M. Shah, A comparative analysis of logistic regression, random forest and KNN models for the text classification. Augment. Hum. Res. 5(1), 1–16 (2020)

    Article  Google Scholar 

  46. A. Shrestha, A. Mahmood, Review of deep learning algorithms and architectures. IEEE access 7, 53040–53065 (2019)

    Article  Google Scholar 

  47. N.S. Siddiqui, A. Klein, A. Godara, C. Varga, R.J. Buchsbaum, M.C. Hughes, Supervised machine learning algorithms using patient related factors to predict in-hospital mortality following acute myeloid leukemia therapy. Blood 134, 3435 (2019)

    Article  Google Scholar 

  48. S. Subramani, H. Wang, H.Q. Vu, G. Li, Domestic violence crisis identification from facebook posts based on deep learning. IEEE access 6, 54075–54085 (2018)

    Article  Google Scholar 

  49. P.M. Valkenburg, I. Beyens, J.L. Pouwels, I.I. van Driel, L. Keijsers, Social media browsing and adolescent well-being: challenging the Passive Social Media Use Hypothesis. J. Comput.-Mediat. Commun. 27(1), zmab015 (2022)

    Google Scholar 

  50. J. Yang, Z. Fu, T. Tan, W. Hu, A novel approach to detecting adult images, in Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004, Vol. 4 (IEEE, 2004, August), pp. 479–482)

    Google Scholar 

  51. L. Zaadnoordijk, T.R. Besold, R. Cusack, Lessons from infant learning for unsupervised machine learning. Nat. Mach. Intell. 4(6), 510–520 (2022)

    Article  Google Scholar 

  52. Z. Zhang, L. Luo, Hate speech detection: a solved problem? the challenging case of long tail on twitter. Semantic Web 10(5), 925–945 (2019)

    Article  Google Scholar 

  53. D.X. Zheng, A.Y. Ning, M.A. Levoska, L. Xiang, C. Wong, J.F. Scott, TikTok™, teens and isotretinoin: recommendations for identifying trending acne-related content on the world’s most popular social media platform. Clin. Exp. Dermatol. 46(6), 1129–1130 (2021)

    Article  Google Scholar 

  54. B.Y. Kim, A. Sharafoddini, N. Tran, E.Y. Wen, J. Lee, Consumer mobile apps for potential drug-drug interaction check: systematic review and content analysis using the mobile app rating scale (MARS). JMIR mHealth uHealth 6(3), e8613 (2018)

    Google Scholar 

  55. S.B. Johnson, M. Parsons, T. Dorff, M.S. Moran, J.H. Ward, S.A. Cohen, A. Fagerlin, Cancer misinformation and harmful information on Facebook and other social media: a brief report. JNCI: J. Nat. Cancer Inst. 114(7), 1036–1039 (2022)

    Google Scholar 

  56. W. Gao, H. Deng, X. Zhu, Y. Fang, Topic-BERT: Detecting harmful information from social media. Intell. Decis. Technol. (Preprint) 1–10 (2021)

    Google Scholar 

  57. C.I. Sushmita, P. Pawito, A.N. Rahmanto, Rumours and infodemics. Journalist’s social media verification practices during the covid-19 pandemic. 14(1), 116–134 (2021)

    Google Scholar 

  58. D. Rao, X. Miao, Z. Jiang, R. Li, STANKER: Stacking network based on level-grained attention-masked BERT for rumor detection on social media. In Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing (pp 3347–3363) (2021, November)

    Google Scholar 

  59. F. Laghrissi, S. Douzi, K. Douzi, B. Hssina, Intrusion detection systems using long short-term memory (LSTM). J. Big Data 8(1), 1–16 (2021)

    Google Scholar 

  60. W. Lee, S.S. Lee, S. Chung, D. An, Harmful contents classification using the harmful word filtering and SVM. In International Conference on Computational Science (pp 18–25) (2007, May) Springer, Berlin, Heidelberg.

    Google Scholar 

  61. A. Shrestha, A. Mahmood, Review of deep learning algorithms and architectures. IEEE access, 7, 53040–53065 (2019)

    Google Scholar 

  62. D. Lanz, A. Eleiba, The good, the bad and the ugly: social media and peace mediation. (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zakarya Mohsen Al-Hodiany .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Al-Hodiany, Z.M. (2023). Review on the Social Media Management Techniques Against Kids Harmful Information. In: Yafooz, W.M.S., Al-Aqrabi, H., Al-Dhaqm, A., Emara, A. (eds) Kids Cybersecurity Using Computational Intelligence Techniques. Studies in Computational Intelligence, vol 1080. Springer, Cham. https://doi.org/10.1007/978-3-031-21199-7_4

Download citation

Publish with us

Policies and ethics