Proceedings of the 7th Annual ISC Graduate Research Symposium ISC-GRS 2013 April 24, 2013, Rolla, Missouri Sai Preethi Vishwanathan Department of Computer Science Missouri University of Science and Technology, Rolla, MO 65409 LOGCHECK: AN API TO DETECT CYBER BULLYING ABSTRACT intentional exclusion is imperceptible and usually more difficult to detect. In the recent years, with the advent of high-speed internet and cell phone access, a proportion of teenagers took bullying from school hallways to cyberspace. Technology greatly benefits anyone by allowing immediate access to information. On the contrary, it is the same technology that allows the wrongdoers to exploit the innocent, commit crimes and used as a weapon to harass and stalk people. Therefore parents and caretakers should take up the responsibility to help their kids to stay safe online. Many researchers analyzed the prevalence of cyber bullying, it’s social and psychological effects on the minds of children and also provided ways to teach youngsters about the importance of healthy communication. But only a handful considered technology as a tool to detect and help teenagers from cyber bullying. In this paper, we proposed a dashboard like interface for parents to detect cyber bullying in the early stages and help their kids to psychologically tackle the problems that arise from a particular situation. In the recent years, apart from the traditional forms of bullying and violence, a new form of bullying emerged and is named cyber bullying. According to the National Crime Prevention Council, cyber bullying can be defined as: “when the Internet, cell phones or similar electronic devices are used to send or post text or images intended to hurt or embarrass any other person” [1] .In this new form of bullying one makes use of mediums such as mobile phones, websites, emails, instant messaging, text messages, and blogs. Keywords - cyberbullying, API, interface, Mobile application, intervention & detection 1. INTRODUCTION Since the nineties, bullying and violence is in the focus of public attention and there has been a growing awareness on the problem. According to one widespread definition, a person is 'being bullied or victimized when he or she is exposed repeatedly and over time, to negative actions on the part of one or more persons'. It also involves an imbalance of power, where the victim has difficulty defending him/ her. Bullying can be either direct or indirect. While direct bullying involves physical contact with the victim and can be detected easily, indirect bullying like social isolation, 1 Quantifying the use of technology, a recent study published that 93% of teenagers have a computer or access to one at home and 78% of them have a cell phone, 95% of teens use the internet [3]. With such a proliferated use of technology, many tragic incidents of bullying have been escalated. A survey reports [4, 5, 6] that 70% of the students experience frequent cyber bullying by using computers and smart phones to send rumors or post obscene messages. Of all the existing technologies, the usage of cell phones by 87% of teenagers makes it the most common medium for cyber bullying [figure 1]. Bullying by physical intimidation has been a difficult problem among teenagers for a long time. Despite the fact that there might not be any physical harm, cyber bullying leaves deep emotional scars on the victim. When compared to traditional forms of bullying, cyber bullying is considered to be more persistent. It stretches far beyond the boundaries of school or workplace. To begin with, cyber bullying gives a crime doer an unfair advantage to embarrass or hurt a victim before an entire community, especially in the social networking websites. Furthermore, cyber bullying can be done anonymously, which can take place at any time and considered to be hard to trace. Copyright 2013 © Missouri S&T roles of perpetrator, victim, and parent in the cyber bullying process. By introducing interactive storytelling with animated on-screen characters where the user gets to play one of the roles in the bullying scenario, this application tried to instill children with self-confidence. Even though the user is educated about the situations, they are artificially constructed and are not part of their real lives. For that reason, it suffers from the drawback that it cannot be applied in real life situations. Figure 1: Teens use of technology Cyber bullying will have extremely negative impact among teenagers. Nancy Willard, author of Cyber bullying and Cyber threats: Responding to the Challenge of Online Social Aggression, Threats, and Distress, indicates that the effects of cyber bullying may be more harmful. Victims of cyber bullying can experience symptoms of depression including sadness, loneliness, insecurity, poor self-esteem, and academic decline. The feeling of not belonging and suicidal thoughts behavior can also be an aftereffect. A disturbing statistic reveals that only 5 % of the children who attend middle-school actually told their parents when they were the victims of cyber bullying [5, 8] and only 15% of the parents polled knew what cyber bullying exactly was. Therefore there exists an extreme necessity to detect cyber bullying in early stages. Parents, family and friends should take up the responsibility to help kids to psychologically tackle the situation. 2. RELATED EFFORT Extensive research has been carried out to uncover the prevalence of cyber bullying; its social and psychological effects on victims, and consequences of the cyber bullying. But relatively very few researchers thrived to mitigate the cause behind it. Out of the many applications available in the market, very few applications have made an effort to concentrate the bullying problem directly with software-based solutions. One such project is The FearNot project [9].This project has studied the use of virtual learning environments to teach children coping strategies for bullying based on faux characters. The developers used virtual characters to play the 2 When a mobile application called LogCheck was proposed to be developed, the sole idea behind it was the widespread availability of smart phones among teenagers.(fig 1) As much as 75% of teenagers have cell phones and out of 54% of those who text daily , 26% have been harassed through their cellphone by voice call or text message besides sexting which is not a form of harassment in some states , however if images are shared, the action can lead to harassment and bullying. LogCheck facilitates parents to actively monitor the huge amount of mobile phone-based ‘texting’ communications that occur outside of the scope of social media networking and allow parents to handle decisively with acts of cyber bullying the instant they are detected. One approach that parents can exploit is filtering or blocking software to restrict teenagers from accessing social networking Web sites. The disadvantage with blocking software is that teenagers in due course will find a technique to outwit the blocking software. Unlike typical web filtering systems that block content, LogCheck assists parents to check if kids are subjected to harassment or not. With the intention to know what specific aspects of the aesthetics of the software and the kind of charts or graphs should be improved and also in order to give the end user the right cues for credibility and to ensure comprehensibility, we have explored many possible applications that focused on user experience and graphs. LogCheck illustrates message logs in the form of methodical charts and graphs[figure 2]. Complicated information like chat logs are difficult to understand and needs an illustration. Graphs or charts can help one to understand things visually and interpret then easily in less amount of time. With the aim of providing a highly effective, easy-to-use solution to monitor and guard kids against the dangers of the mobile world, partnering with mobile carrier companies or mobile internet platform provider is an appropriate solution. Mobile carrier companies are Copyright 2013 © Missouri S&T expected to capture relevant communication, redirecting it for inspection if any calls or text messages that indicate harassment, stalking, or hate are observed As a mobile carrier or mobile internet platform provider, when partnered with the proposed approach, carrier companies can benefit from increased business opportunities and an enhanced image as a socially responsible company, while giving a highly effective, easy-to-use solution with which to monitor and guard their families against the dangers of the mobile world. Figure 3: Components LogCheck colloborated with mobile career services provides network based solution allowing adults to save messages as evidence and identify bully by tracking through an internet service provider or cell phone carrier. Figure 2 : Visual Representation of messages Logcheck is a software based solution composed of following components(figure 3) LogCheckAPI: It is dashboard like interface where parents view reports about their child’s online chat activity, and review suspect content. LogCheck Inspector : Text messages transmitted via mobile devices are analyzed once inappropriate texting activity is detected Carrier Server: It deploys LogCheck Inspector that controls capturing of relevant communication, redirecting it for inspection The first step is to install LogCheck mobile application. So as to access functional system one has to authenticate with credentials set by carrier service provider. Understanding parents do not have the time to go through all of the recorded chat activity, we display top 5 summary of all of the recorded text activity for an in-depth, yet quick and easy overview of the most common persons their child chat with. To obtain the data for this proof-of-concept, we have generated chat messages in Google Chat which is available to any one that uses Gmail. We then downloaded the messages to my computer (in a text format) and wrote a Python script to parse the chat messages to produce a CSV file that can easily be parsed. The CSV files contains entries that correspond to a single message containing the fields From, To, Date/Time, and Message. With Scheme proposed, LogCheck provides real-time solution for online child safety adapted to providers of mobile services. Parents can now take an active part in their children’s online life and rest assured that they a re being protected from the dangers of the mobile world. 3. CONCLUSIONS With the proposed mobile application, our objective is not to a attain 100 % confidence in detecting cyber bullying but to decrease the odds of its happening. LogCheck likes to avoid directly accusing an individual of being a bully in any circumstances. If a pattern is recurring over time, or if it seems to be increasing and has a consistently negative tone, our confidence in detecting a potential threat might increase. 4. FUTURE WORK We concede that the best assessment of this application can be made if we : 3 Copyright 2013 © Missouri S&T Design intervention interface by exploring set of reflective user-interaction paradigms with the goal of promoting empathy for all participants (perpetrator, the victim, friends, family, and teachers ) in the cyber bullying practice. Introducing Action Delays that is alerting the end-user that their input might be hurtful and making them wait their comment before actually submitting could also be helpful. We are currently in the process of developing our work of updating dictionary of abusive words, given the propensity for youth to constantly update language by the use of new words , phrases and alterations to the meaning of existing words and phrases, on the site for a real-world, in-situ evaluation and remain excited about the practical nature of the research questions that this work has produced. 5. ACKNOWLEDGMENTS We wish to thank all the people involved in this research project We wish to acknowledge the support and cooperation extended to us by intelligent system center, Missouri University of Science and technology. 4 6. REFERENCES [1] Olweus Bullying prevention program, available at http://www.violencepreventionworks.org/publi c/bullying.page [2] cyberbullying, The National Crime Prevention, available at http://www.ncpc.org/cyberbullying [3] Lenhart, Arafeh, Smith, Rankin Macgill, 2008; USC Annenberg School Center for the Digital Future, 2005 [4] Reports available http://www.pewinternet.org/~/media//Files/Re ports/2013/PIP_TeensandTechnology2013.pdf [5] Stop cyberbullying available at http://www.stopcyberbullying.org/index2.html [6] Internet safety 101 available at http://www.internetsafety101.org/ [7] Endcyberbuylling available http://www.endcyberbullying.org/cyberbullying-statistics/ [8] Data based on 2005-06 iSafe survey of 13,000 students in grades 5 to 12. http://www.makeadifferenceforkids.org/index. php?id=89 [9] Information available at www.Parenting.com [10] Information available at http://fearnotproject.com/about.php Copyright 2013 © Missouri S&T