B27 CHAPTER 1
B27 CHAPTER 1
INTRODUCTION
Cyberbullying Detection based on SMSDA INTRODUCTION
INTRODUCTION
If you don't take basic steps to protect your work computer, you put it and all the
information on it at risk. You can potentially compromise the operation of other computers
on your organization's network, or even the functioning of the network as a whole.
1. Physical security:
Technical measures like login passwords, anti-virus are essential. However, a secure
physical space is the first and more important line of defense. Is the place you keep your
workplace computer secure enough to prevent theft or access to it while you are
away? While the Security Department provides coverage across the Medical center, it only
takes seconds to steal a computer, particularly a portable device like a laptop or a PDA. A
computer should be secured like any other valuable possession when you are not present.
Human threats are not the only concern. Computers can be compromised by environmental
mishaps (e.g., water, coffee) or physical trauma. Make sure the physical location
of your computer takes account of those risks as well.
2. Access passwords:
The University's networks and shared information systems are protected in part by login
credentials (user-IDs and passwords). Access passwords are also an essential protection
for personal computers in most circumstances. Offices are usually open and shared spaces,
so physical access to computers cannot be completely controlled. To protect your
computer, you should consider setting passwords for particularly sensitive applications
resident on the computer (e.g., data analysis software), if the software provides that
capability.
Because we deal with all facets of clinical, research, educational and administrative data
here on the medical campus, it is important to do everything possible to minimize exposure
of data to unauthorized individuals.
4. Anti-virus software:
5. Firewalls:
Anti-virus products inspect files on your computer and in email. Firewall software and
hardware monitor communications between your computer and the outside world. That is
essential for any networked computer.
6. Software updates:
It is critical to keep software up to date, especially the operating system, anti-virus and anti-
spyware, email and browser software. The newest versions will contain fixes for
discovered vulnerabilities. Almost all anti-virus have automatic update features.Keeping
the "signatures" (digital patterns) of malicious software detectors up-to-date is essential for
these products to be effective.
Even if you take all these security steps, bad things can still happen. Be prepared for the
worst by making backup copies of critical data, and keeping those backup copies in a
separate, secure location. For example, use supplemental hard drives, CDs/DVDs, or flash
drives to store critical, hard-to-replace data.
8. Report problems:
If you believe that your computer or any data on it has been compromised, you should make
the information security incident report. That is required by University policy for all data
on our systems, and legally required for health, education, financial and any other kind of
record containing identifiable personal information.
1.3 Goals
➢ To notify the person on whose wall, the post was blocked with accept and reject
options.
1.4 Motivation
Nowadays most of them on social media are using bullying words. And social media is
used by people of all age groups nowadays. So these kind of posts may have an impact on
them mentally. To avoid this kind of problems happening and to safeguard the majority of
the users from being exposed to such words, we got an idea of creating a healthy social
media environment free from posts containing bullying words. We have created an online
BMSIT&M, CSE 5 2017-18
Cyberbullying Detection based on SMSDA INTRODUCTION
social media which is an imitation of the social media already present and tried to block
posts containing bullying words.
➢ People of all ages can use the social media without being exposed to any kind of
bullying posts.
➢ Parents can be sure that their children are safe from being bullied over social media.
➢ Admin has the permissions to see the blocked users and their posts and hence can
decide what to do about the user posting more number of posts containing bullying
words.
1.6 Methodology
We have used SMSDA to detect Cyberbullying. In this technique, we search for any
bullying word, misspelled word or any word with Meta characters. If directly any bullying
word is found, it is blocked. In case of any misspelled word or word with meta character
such as #,$,* etc the word will be rebuilt and then checked with our bag of words and then
find the correlation of the constructed word with the remaining words in the sentence. If
the rebuilt word matches any word in our bag of words, then that particular post is blocked
and that appropriate user is notified about the post.