=Paper= {{Paper |id=Vol-3762/549 |storemode=property |title=Artificial intelligence tools in the ongoing fight against bullying and cyberbullying: a multidisciplinary approach |pdfUrl=https://ceur-ws.org/Vol-3762/549.pdf |volume=Vol-3762 |authors=Giulia Orrù,Vincenzo Gattulli,Guido Colaiacovo,Stefano Marrone,Giovanni Puglisi,Lucia Sarcinella,Grazia Terrone,Donatella Curtotti,Donato Impedovo,Gian Luca Marcialis,Carlo Sansone |dblpUrl=https://dblp.org/rec/conf/ital-ia/OrruGC0PSTCIMS24 }} ==Artificial intelligence tools in the ongoing fight against bullying and cyberbullying: a multidisciplinary approach== https://ceur-ws.org/Vol-3762/549.pdf
                                Artificial intelligence tools in the ongoing fight against
                                bullying and cyberbullying: a multidisciplinary approach
                                Giulia Orrù1,* , Vincenzo Gattulli2 , Guido Colaiacovo4 , Stefano Marrone3 , Giovanni Puglisi1 ,
                                Lucia Sarcinella2 , Grazia Terrone5 , Donatella Curtotti4 , Donato Impedovo2 ,
                                Gian Luca Marcialis1 and Carlo Sansone3
                                1
                                  University of Cagliari, piazza d’Armi, 09123, Cagliari, Italy
                                2
                                  University of Bari, Via Edorado Orabona 4, 70121, Bari, Italy
                                3
                                  University of Naples Federico II, Via Claudio 21, 80125 Naples, Italy
                                4
                                  University of Foggia, Via Antonio Gramsci 89, 71122 Foggia, Italy
                                5
                                  Tor Vergata University, Via Columbia 1, 00133 Roma, Italy


                                                Abstract
                                                The problem of bullying and cyberbullying is growing and is a phenomenon that negatively influences our society: for this
                                                reason, it requires advanced solutions aimed at prevention. Starting from a previous project called BullyBuster which paved
                                                the way for the application of artificial intelligence (AI) in this area, exploiting interdisciplinary skills to develop algorithms
                                                capable of identifying and mitigating bullying behaviours, in this paper, we present the follow-up, called BullyBuster 2
                                                (BB2). BB2 aims to broaden the spectrum of intervention to include adult populations, reflecting the universal nature of
                                                bullying across all age demographics. Furthermore, it updates and improves the original project’s methodologies with new
                                                psychological insights and broader AI applications, ensuring a more inclusive anti-bullying strategy. Furthermore, BB2 aims
                                                to form a large research consortium to set a new standard for interdisciplinary collaborations in preventive and response
                                                strategies against such social challenges.

                                                Keywords
                                                bullying, detection, cyberbullying, artificial intelligence, interdisciplinarity



                                1. Introduction                                                                                          bullying in both physical and virtual contexts and for
                                                                                                                                         this reason it has been included in the Global Top 100 list
                                The worrying rise in bullying and cyberbullying in re-                                                   of AI projects addressing the 17 United Nations Strate-
                                cent years has brought attention to the urgent need for                                                  gic Development Goals by the International Research
                                efficient prevention measures and solutions [1]. In fact,                                                Center for Artificial Intelligence under the auspices of
                                such violent behaviours not only compromise individual                                                   UNESCO1 .
                                feelings of security and dignity, but they also have signif-                                                This paper introduces “BullyBuster 2 – the ongo-
                                icant psychological effects that may reverberate across                                                  ing fight against bullying and cyberbullying with the
                                society. Bullying has changed throughout time and is                                                     help of artificial intelligence for the human wellbeing”
                                now prevalent in a variety of adult demographics and                                                     project (BB2, hereinafter), the follow-up to the Bully-
                                settings, which has made it clear that creative and flexible                                             Buster project. Funded by the European Union - NextGen-
                                solutions are required.                                                                                  erationEU and within the PRIN 2022 PNRR, it again in-
                                   In this context, the “BullyBuster - A framework for                                                   volves four multidisciplinary research groups belonging
                                bullying and cyberbullying action detection by computer                                                  to four universities in Southern Italy (University of Bari
                                vision and artificial intelligence methods and algorithms”                                               Aldo Moro, University of Cagliari, University of Foggia,
                                project [2](BB1 in the following) was proposed: funded                                                   University of Naples Federico II) with the aim of combin-
                                under the tender relating to Projects of Relevant National                                               ing artificial intelligence, technology, law and psychology
                                Interest (PRIN) in 2017 and recently concluded, it marked                                                skills to develop a comprehensive framework.
                                a pioneering effort by interdisciplinary teams from four                                                    BB2’s goal is to advance bullying and cyberbullying
                                universities in Southern Italy to tackle this threat through                                             detection capabilities by incorporating advanced models
                                cutting-edge artificial intelligence tools [3]. This initia-                                             that take into account a broader range of victim profiles
                                tive sought to combine psychological insights with tech-                                                 and refining its detection algorithms to accommodate
                                nological advances to create tools capable of identifying                                                new forms of interpersonal aggression and IT misconduct.
                                                                                                                                         BB2 also aims to broaden the objectives of the previous
                                Ital-IA 2024: 4th National Conference on Artificial Intelligence, orga-
                                nized by CINI, May 29-30, 2024, Naples, Italy
                                *
                                  Corresponding author.                                                                                  1
                                                                                                                                             https://ircai.org/top100/entry/bullybuster-a-framework-for-
                                $ giulia.orru@unica.it (G. Orrù)                                                                             bullying-and-cyberbullying-action-detection-by-computer-vision-
                                          © 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License
                                          Attribution 4.0 International (CC BY 4.0).                                                         and-artificial-intelligence-methods-and-algorithms/




CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings
                                                              2.1. Legal, juridical and psychological
                                                                   aspects
                                                            Bullying and cyberbullying activities, characterised by
                                                            aggressive and arrogant attitudes, repeated over time
                                                            and perpetrated to the harm of children, adolescents,
                                                            and even adults, have become a critical emergency [4].
                                                            Despite legislative efforts [5], research into protecting
                                                            individuals and their well-being prior to the occurrence
Figure 1: BullyBuster2 project logo.
                                                            of an incident through the prevention of bullying and cy-
                                                            berbullying behaviours is still in its early stages. In fact,
                                                            intervening in the preventative phase serves to protect
BB1 to include adults, reflecting the broader spectrum the subject’s psychophysical integrity and avert victimi-
of bullying victims. This initiative is driven by recent sation. To ensure the individual’s safety, law enforcement
social challenges and legislative demands, recognizing activities focused at punishing the perpetrator after the
that bullying is a pervasive threat not limited to young damaging event has happened are no longer sufficient.
people but a general public health issue.                   However, it is critical to respond before a potentially
   A further objective of the project is the creation of an detrimental or dangerous occurrence affects the victims.
interdisciplinary reference laboratory to combat the phe- The methodological approach that BullyBuster adopts
nomenon of bullying and cyberbullying. This laboratory, is based on the creation of technological tools to com-
in which expert technologists, jurists, psychologists, so- bat the phenomenon in an integrated approach, both
ciologists and economists will participate, will contribute teleologically oriented towards the protection of psycho-
to greater dissemination and expansion of the research logical profiles based on the well-being of the subject and
community in the field, including stakeholders such as attentive to legal aspects, with a view to prevention.
institutions and companies and subjects potentially in-
terested in the engineering of anti-bullying tools.
                                                              2.2. Multimedia contents artifacts
                                                              The term "deepfake" refers to any way of creating fake
2. The BullyBuster framework                                  multimedia material representing one or more individ-
                                                              uals [6]. The modification may specifically target the
In this section, we explore the key elements of Bully-
                                                              individual’s identity, speech, or expression. Although
Buster’s architectural framework (Fig. 2), which includes
                                                              this technology is of considerable appeal to some sectors
the tools created in BB1 as well as the enhancements
                                                              of society, such as the film and video game industries, the
planned for BB2. The architecture of the system is struc-
                                                              harmful applications are vast and particularly concerning.
tured into five primary modules: (1) a manipulated mul-
                                                              In fact, deepfakes may position a person in non-real hu-
timedia content detection module, to combat the spread
                                                              miliating or compromising situations, such as scenes of
of malicious and fake multimedia content, as deepfakes;
                                                              sex or violence, or force her/him to say something she/he
(2) a physical violence detection module, to monitor and
                                                              never said. Deepfake can thus be used to insult, stalk,
identify potential bullying incidents in the physical do-
                                                              propagate revenge pornography, and abuse or cyberbully
main; (3) a stress detection module, able to assesses the
                                                              someone. In BB1, we exploited the complementarity of
emotional state of individuals by analyzing the timing
                                                              several individual video deepfake detectors with appro-
and rhythm of keystrokes and other behavioral biomet-
                                                              priate fusion rules to increase the generalization ability
rics; (4) a verbal abuse detection module, focused on
                                                              of modern deepfake detection systems [7]. The goal of
the analysis of textual communications to detect verbal
                                                              BB2 is to extend the deepfake video detection capabili-
signs of bullying or cyberbullying; (5) a internet addic-
                                                              ties and add voice cloning detection to make multimedia
tion detection module, to detect psychological malaise by
                                                              content analysis complete.
automatic behavioral analyses. When combined, these
components provide a complete system that is suited to
address the complex problem of bullying in both physi-        2.3. Anomaly detection of events
cal and digital scenarios. In order to address the critical
                                                              The battle against bullying may be greatly aided by hav-
issues of privacy and data protection, this solutions have
                                                              ing a visual understanding of human behaviour through
been examined from a legal and juridical perspective.
                                                              video analysis. Behavioural "indicators," whether in the
Below, we describe the individual modules of the Bully-
                                                              form of victimisation or bullying, might include physi-
Buster framework.
                                                              cal aggression, seclusion, or other physical patterns like
                                                              encircling. In BB1, systems have been created that can
Figure 2: The BullyBuster 2 project framework.



use one or more surveillance cameras to monitor groups        [10]. The goal was to develop a system that automati-
of people who are not individually identifiable [8]. The      cally identified aggressive behaviour in texts, especially
data is then processed to report "anomalous" events like      in Italian-language comments. To do this, the language
violent or panicked episodes based on behavioural mod-        patterns used in aggressive comments were analyzed,
els that have been suitably codified. In BB2, the crowd       noting the frequent use of vulgar and negative language,
analytics model will specialize in bullying contexts by       insults, and offensive words. In addition, many of these
generating synthetic data: obtaining contextualised train-    comments began with "no/not," which is used to contra-
ing data proved to be a challenge during the creation of      dict or deny a statement. Based on these observations,
the crowd analyzer in BB1, made worse by the start of         several features were developed for feature engineering,
the COVID-19 epidemic, which made it impossible to            including the number of negative words, the number of
mimic actual bullying scenarios. In addition, a substan-      "no/not," use of capitalisation, positive/negative comment
tial amount of video is needed for deep-learning models.      weight calculated with WordNet and SentiWordNet, use
In BB2, we aim to generate a sufficient amount of data        of the second person, presence of threats and bullying
and to include the typical behaviours of bullies and vic-     terms [10]. These features were used to create several
tims, highlighted in the psychological analysis, through      dictionaries of terms and a dataset of aggressive and non-
the synthetic creation of this data.                          aggressive comments. Several shallow learning models
                                                              were tested to evaluate the effectiveness of these features
2.4. Verbale abuse models                                     in detecting verbal aggression [10].
                                                                 In the context of the BB2 project, this phenomenon
Cyberbullying is a widespread phenomenon involving            can also be analysed by considering different age groups,
the use of digital technologies to perpetrate aggressive      especially the preponderance of adults. Adults may re-
behavior, threats, or harassment toward other individu-       ceive significant criticism, fueling a cycle of online neg-
als. This bullying occurs primarily through online plat-      ativity and conflict that can also be reflected in real life.
forms, such as social media, instant messaging, and fo-       BB2 aims to address this problem by implementing and
rums. It can take many forms, including name-calling,         improving existing text models, with particular atten-
defamation, social exclusion, and disclosure of private       tion to the users’ ages. While BB1 primarily addressed
information. Cyberbullying can have serious emotional,        adolescents, BB2 includes an analysis of adult language,
psychological, and social consequences on victims and         recognizing that verbal aggression and communication
poses a significant challenge for parents, educators, and     dynamics are not limited exclusively to the younger gen-
mental health professionals in ensuring a safe and re-        eration. BB2’s approach is based on analyzing textual
spectful online environment for all users. One of the         dynamics found in social media comments, examining
most predominant vectors is textual language [9].             how different users interact and communicate. This ap-
   In the BB1 project, UNIBA focused on identifying ver-      proach allows for the identification of common linguistic
bal aggression, a crucial aspect of cyberbullying that pri-   and behavioral patterns. The categories used are simi-
marily involves texts and comments on online platforms
larly taken by assigning the label of cyberaggression or       2.6. Digital devices addiction
non-cyberaggression. Through this in-depth analysis,
                                                               Examining data from mobile devices has emerged as a
BB2 aims to provide users, social platforms, and mental
                                                               prominent approach for understanding individuals’ be-
health professionals with a better understanding of how
                                                               havior in today’s digital era [17]. However, the abun-
verbal aggression occurs online and the factors that in-
                                                               dance of features on these devices, such as web browsing,
fluence it. This can enable the development of targeted
                                                               online gaming, digital photography, GPS navigation, and
interventions to prevent and address cyberbullying, im-
                                                               various social applications, can easily engage users’ at-
prove online safety, and promote a healthier and more
                                                               tention, potentially causing significant distractions from
respectful virtual environment for all users.
                                                               real-world activities. Unfortunately, excessive engage-
   The text also fits within the framework of the Behav-
                                                               ment with these features can lead to various health is-
ioral Biometrics approach, in which touch-related fea-
                                                               sues, particularly psychological challenges, such as lack
tures, called Touch Dynamics, are extracted along with
                                                               of self-control, withdrawal symptoms, sleep disruptions,
textual output. This could be a starting point for future
                                                               social isolation, depression, and difficulties in maintain-
work [11].
                                                               ing focus. Additionally, users may display symptoms of
                                                               irritability, restlessness, stress, and mood fluctuations. In
2.5. Stress detection                                          response to these concerns, the goal of BB2 is to introduce
Biometrics involves the utilization of body measurements an innovative module aimed at assessing individuals from
and statistical analysis to extract and quantify human a psychological standpoint, based on their interactions
characteristics [12]. Initially utilized for user authentica- with different features of their mobile devices.
tion and identification purposes [13], , this technology is
now increasingly utilized across various domains, includ- 3. The interdisciplinary laboratory
ing entertainment and personalized user experiences [14].
Within the field of biometrics, there exist two distinct cat- Based on the results of the completed BB1 project and the
egories of approaches: i) Physiological biometrics, which ongoing BB2 project, an interlaboratory group named
involves the direct measurement of physical attributes "BullyBuster" is being formed with the goal of attracting
such as facial features, fingerprints, iris patterns, reti- membership and engagement from individuals who are
nal structures, and vocal characteristics; ii) Behavioral particularly interested in solving the issue of bullying and
biometrics, which focuses on capturing specific human cyberbullying. The interdisciplinary laboratory brings to-
behaviors such as handwriting, typing, or speaking.            gether specialists from various fields to develop strategies
   Among various forms of behavioral biometrics, for analyzing bullying and cyberbullying behaviours, ex-
keystroke dynamics has emerged as a highly efficient tending beyond just school-aged individuals. This team
and economical technique, easily deployable using read- includes: (1) experts in information security, computer
ily available hardware. In recent years, it has seen in- vision, and artificial intelligence, to create and propose
creased utilization for user authentication, analyzing the innovative models and methods to be implemented in
habitual rhythm patterns exhibited while typing on both appropriate demonstration products; (2) psychologists,
physical and virtual keyboards [15].                           to understand the behaviour patterns of individual in-
   In the context of combating cyberbullying, we employ volved in bullying events; (3) sociologists, to contribute
keystroke dynamics for user emotion recognition. The by examining the effects of bullying and aggressive be-
aim is to exploit its potential as a cost-effective and widely haviours in social media and other environments; (4) ju-
accessible method for emotion recognition, requiring ridical and legal professionals, to explore new legislation
only a standard keyboard as hardware [16]. Furthermore, that can address (cyber)bullying, enabling both preventa-
since a keystroke recorder can be implemented as hard- tive and punitive technological solutions; (5) economists
ware or software, with the latter being inconspicuous, and healthcare professionals, to assess the financial and
individuals using the keyboard must be made aware of health impacts of (cyber)bullying, whether stemming
the monitoring process. In BB2, keystroke dynamics will from the attacks themselves or from the origins of such
be examined in real-world settings, considering both key- behaviours. The laboratory aims to create a genuine sup-
board inputs and tapping habits to characterize a subject port system and reference services for preventing and
based on their mobile device usage behavior. Addition- fighting bullying.
ally, this analysis can incorporate touch dynamics on
mobile devices.
                                                               4. Conclusions
                                                               Bullying and cyberbullying are significant societal issues
                                                               that have an adverse impact on people and communities.
                                                                    URL: https://www.mdpi.com/2078-2489/14/8/430.
                                                                    doi:10.3390/info14080430.
                                                                [3] G. Orrù, A. Galli, V. Gattulli, M. Gravina, S. Mar-
                                                                    rone, M. Micheletto, A. Procaccino, W. Nocerino,
                                                                    G. Terrone, D. Curtotti, et al., Leveraging artifi-
                                                                    cial intelligence to fight (cyber) bullying for hu-
                                                                    man well-being: The bullybuster project, in: CEUR
                                                                    WORKSHOP PROCEEDINGS, volume 3486, CEUR-
                                                                    WS Team, Redaktion Sun SITE, 2023, pp. 189–194.
                                                                [4] M. Wiertsema, C. Vrijen, R. van der Ploeg, M. Sentse,
                                                                    T. Kretschmer, Bullying perpetration and social
Figure 3: The BullyBuster inter-laboratory group aims at            status in the peer group: A meta-analysis, Journal
gathering adhesions and participation of those who are par-         of Adolescence 95 (2023) 34–55. doi:10.1002/jad.
ticularly interested in addressing the issue of bullying and        12109.
cyberbullying according to an interdisciplinary declination.    [5] M. O. Mantovani, Profili penali del cyberbullismo:
                                                                    la l. 71 del 2017, Indice penale (2018) 475.
                                                                [6] M. S. Rana, M. N. Nobi, B. Murali, A. H. Sung, Deep-
                                                                    fake detection: A systematic literature review, IEEE
The BullyBuster (BB) framework, developed during two
                                                                    access 10 (2022) 25494–25513.
projects funded under the tender relating to Projects of
                                                                [7] S. Concas, S. M. La Cava, G. Orrù, C. Cuccu, J. Gao,
Relevant National Interest (PRIN), one completed and
                                                                    X. Feng, G. L. Marcialis, F. Roli, Analysis of score-
the other ongoing, combines advanced computer vision,
                                                                    level fusion rules for deepfake detection, Applied
artificial intelligence technology, legal aspects and psy-
                                                                    Sciences 12 (2022). doi:10.3390/app12157365.
chology concepts with a multidisciplinary approach to
                                                                [8] G. Orrù, D. Ghiani, M. Pintor, G. L. Marcialis, F. Roli,
provide a holistic response to these prevalent problems.
                                                                    Detecting anomalies from video-sequences: a novel
In this paper, we present the development objectives of
                                                                    descriptor, in: 2020 25th International Conference
the BullyBuster framework, which include the improve-
                                                                    on Pattern Recognition (ICPR), IEEE, 2021, pp. 4642–
ment of tools for the detection of bullying and cyberbully-
                                                                    4649.
ing, the extension of its application to include a target of
                                                                [9] S. Joksimovic, R. S. Baker, J. Ocumpaugh, J. M. L.
adults and the creation of an interdisciplinary reference
                                                                    Andres, I. Tot, E. Y. Wang, S. Dawson, Automated
laboratory.
                                                                    identification of verbally abusive behaviors in on-
                                                                    line discussions, in: Proceedings of the third work-
Acknowledgments                                                     shop on abusive language online, 2019, pp. 36–45.
                                                               [10] V. Gattulli, D. Impedovo, G. Pirlo, L. Sarcinella,
This work is supported by the European Union – Next                 Cyber aggression and cyberbullying identification
Generation EU under the PRIN 2022 PNRR project “Bully-              on social networks (2022) 644–651. doi:10.5220/
Buster 2 – the ongoing fight against bullying and cyber-            0010877600003122.
bullying with the help of artificial intelligence for the      [11] V. Gattulli, D. Impedovo, G. Pirlo, F. Volpe, Touch
human wellbeing” (CUP: P2022K39K8).                                 events and human activities for continuous authen-
                                                                    tication via smartphone, Scientific Reports 13 (2023)
                                                                    10515.
References                                                     [12] P. S. Teh, A. B. J. Teoh, S. Yue, et al., A survey
                                                                    of keystroke dynamics biometrics, The Scientific
 [1] P. K. Smith, J. Mahdavi, M. Carvalho, S. Fisher,
                                                                    World Journal 2013 (2013).
     S. Russell, N. Tippett, Cyberbullying: its na-
                                                               [13] A. Jain, L. Hong, S. Pankanti, Biometric identifica-
     ture and impact in secondary school pupils,
                                                                    tion, Communications of the ACM 43 (2000) 90–98.
     Journal of Child Psychology and Psychiatry
                                                               [14] R. L. Mandryk, L. E. Nacke, Biometrics in gaming
     49 (2008) 376–385. doi:https://doi.org/10.
                                                                    and entertainment technologies, in: Biometrics in a
     1111/j.1469-7610.2007.01846.x.
                                                                    Data Driven World, Chapman and Hall/CRC, 2016,
 [2] G. Orrù, A. Galli, V. Gattulli, M. Gravina,
                                                                    pp. 215–248.
     M. Micheletto, S. Marrone, W. Nocerino, A. Pro-
                                                               [15] M. Karnan, M. Akila, N. Krishnaraj, Biometric per-
     caccino, G. Terrone, D. Curtotti, D. Impedovo, G. L.
                                                                    sonal authentication using keystroke dynamics: A
     Marcialis, C. Sansone, Development of technolo-
                                                                    review, Applied soft computing 11 (2011) 1565–
     gies for the detection of (cyber)bullying actions:
                                                                    1573.
     The bullybuster project, Information 14 (2023).
                                                               [16] S. Marrone, C. Sansone, Identifying users’ emo-
     tional states through keystroke dynamics, in: Pro-
     ceedings of the 3rd International Conference on
     Deep Learning Theory and Applications - Volume
     1: DeLTA„ INSTICC, SciTePress, 2022, pp. 207–214.
     doi:10.5220/0011367300003277.
[17] F. S. Rahayu, L. E. Nugroho, R. Ferdiana, D. B. Se-
     tyohadi, Research trend on the use of it in digital
     addiction: An investigation using a systematic lit-
     erature review, Future Internet 12 (2020) 174.