Integrated-system to minimizing cyber harassment in kingdom of Saudi Arabia (KSA)

  • Authors

    • Fahad Abdullah Moafa Universiti Teknologi Malaysia
    • kamsuriah Ahmad
    • Waleed Mugahed Al-Rahmi
    • Noraffandy Yahaya
    • Yusri Bin Kamin
    • Mahdi Alamri
    2018-09-16
    https://doi.org/10.14419/ijet.v7i4.15149
  • Integrated System, Cyber Harassment, Students’ in (KSA
  • The proposed system framework consists two main databases: Lexicon dictionary and Summarized previous cases, by depending on Senti-ment analysis and N-Gram algorithms to match the terms and documents. In the first branch, the judge opens the cyber case and therefore the system will highlight the technical terms automatically. Furthermore, the technical terms matched with Lexicon dictionary will be high-lighted. After that, the judge opens the highlighted terms (as links), and description page will be appeared. The description page contains details about the technical terms (definitions, explanations, examples, etc). On the other side, the second branch aims to retrieve the related legal cases (from the database) judged by courts in UK and KSA. The related cases are the most closed cases to the current legal case by inserting keywords based on the current case. The judge benefits from these cases through the judgment issued to give the fair judgment. N-gram algorithm is used to find the related cases because it has smart approach to expect the most closed document and texts. The system provides the judge with laws used in issuing the judgment in KSA and UK courts.

     

     

  • References

    1. [1] Author,â€Title of the Paperâ€, Journal name, Vol.X, No.X, (200X), Nahar, V., Li, X., Pang, C., (2013) An Effective Approach for Cyberbullying Detection, Vol. 3 ISSN.5, PP. 238-247.

      [2] Laorden, C., Galán-García, P., Santos, I., Sanz, B., Hidalgo, J. M. G., & Bringas, P. G. (2013, January). Negobot: A conversational agent based on game theory for the detection of paedophile behaviour. In International Joint Conference CISIS’12-ICEUTE´ 12-SOCO´ 12 Special Sessions (pp. 261-270). Springer Berlin Heidelberg.

      [3] Laorden, C., Sanz, B., Alvarez, G., Bringas, P.G. (2010) A threat model approach to threats and vulnerabilities in on-line social networks. In: Computational Intelligence in Security for Information Systems. Volume 85 of Advances in Intelligent and Soft Computing.

      [4] Al-rahmi, W. M., Othman, M. S., & Yusuf, L. M. (2015). Social media for collaborative learning and engagement: Adoption framework in higher education institutions in Malaysia. Mediterranean Journal of Social Sciences, 6 (3 S1), 246-252. https://doi.org/10.5901/mjss.2015.v6n3s1p246.

      [5] Al-Rahmi W. M, & Zeki, A. M (2017). A model of using social media for collaborative learning to enhance learners’ performance on learning. Journal of King Saud University-Computer and Information Sciences, 29(4): 526-535 https://doi.org/10.1016/j.jksuci.2016.09.002.

      [6] Al-rahmi, W. M., Othman, M. S., & Yusuf, L. M. (2015). The effectiveness of using e learning in Malaysian higher education: A case study Universiti Teknologi Malaysia. Mediterranean Journal of Social Sciences, 6(5), 625- 637. https://doi.org/10.5901/mjss.2015.v6n5s2p625.

      [7] Dadvar, M. and De Jong, F. (2012) Cyberbullying detection: a step toward a safer Internet yard. In Proceedings of the 21st international conference companion on World Wide Web.121-126.

      [8] Moafa, F. A., Ahmad, K., Al-Rahmi, W. M., Alias, N., & Obaid, M. A. M. (2018). Factors for Minimizing Cyber Harassment among University Students: Case Study in Kingdom of Saudi Arabia (KSA). Journal of Theoretical & Applied Information Technology, 96(6).

      [9] Turney, P. (2002) Thumbs up or Thumbs down? Semantic Orientation Applied to Unsupervised Classification of Reviews. In Proceedings of the 40th Annual Meeting on Association for Computational Linguistics, pages 417_424. Association for Computational Linguistics.

      [10] Al-rahmi, W. M., Othman, M. S., & Yusuf, L. M. (2015). Exploring the factors that affect student satisfaction through using e learning in Malaysian higher education institutions. Mediterranean Journal of Social Sciences, 6(4), 299. https://doi.org/10.5901/mjss.2015.v6n4s1p299.

      [11] Al-rahmi, W. M., Othman, M. S., & Yusuf, L. M. (2015). The effect of social media on researchers’ academic performance through collaborative learning in Malaysian higher education. Mediterranean Journal of Social Sciences, 6(4), 193-203. https://doi.org/10.5901/mjss.2015.v6n4s1p193.

      [12] Kontostathis, A., Reynolds, K., Garron, A. and Edwards, L. (2013) Detecting cyberbullying: query terms and techniques. In Proceedings of the fifth Annual ACM Web Science Conference. 195-204. https://doi.org/10.1145/2464464.2464499.

      [13] Kim, T. Y., Jung, M. A., Kim, E. and Heo, E. (2014) the Faster Accelerating Growth of the Knowledge-Based Society. In Economic Growth. 193-235. Springer Berlin Heidelberg.

      [14] Moafa, F. A., Ahmad, K., Al-Rahmi, W. M., Yahaya, N., Kamin, Y. B., & Alamri, M. M. (2018). Cyber Harassment Prevention through User Behavior Analysis Online In Kingdom of Saudi Arabia (KSA). Journal of Theoretical & Applied Information Technology, 96(6).

      [15] Margono, H., Yi, X. and Raikundalia, G. (2014) Mining Indonesian Cyber Bullying Patterns in Social Networks.

      [16] Church, K. and Hanks, P., (2000) Word association norms, mutal information and lexicography. Paper presented at 27th Annual Conference of the ACL, New Brunswick, NJ, [online]: 1 April 2013, available at: http://acl.ldc.upenn.edu/J/J90/J90-1003.pdf.

      [17] Chen, Y., Zhou, Y., Xu, H., (2012) Detecting Offensive Language in Social Media to Protect Adolescent Online Safety. International Conference on Social Computing, IEEE Journal.

      [18] Aggarwal, S., Burmester, M., Henry, P., Kermes, L., (2005) Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System. Journal of IEEE.

      [19] Garcia, P., Gaviria, J., (2011) Supervised Machine Learning for the Detection of Troll Profiles in Twitter Social Network: Application to a Real Case of Cyberbullying.

      [20] Jaishankar, K. (Ed.). (2011) Cyber criminology: exploring internet crimes and criminal behavior. CRC Press. https://doi.org/10.1201/b10718.

      [21] Chambers, N., Tetreault, J. and Allen, J. (2004) Approaches for automatically tagging affect. In Proceedings of the AAAI Spring Symposium on Exploring Attitude and Affect in Text: Theories and Applications.

  • Downloads

  • How to Cite

    Abdullah Moafa, F., Ahmad, kamsuriah, Mugahed Al-Rahmi, W., Yahaya, N., Bin Kamin, Y., & Alamri, M. (2018). Integrated-system to minimizing cyber harassment in kingdom of Saudi Arabia (KSA). International Journal of Engineering & Technology, 7(4), 2192-2196. https://doi.org/10.14419/ijet.v7i4.15149