Identification of key cyberbullies: A text mining and social network analysis approach

Yoon Jin Choi, Byeong Jin Jeon, Hee Woong Kim

Research output: Contribution to journalArticlepeer-review

15 Citations (Scopus)


Cyberbullying is a major problem in society, and the damage it causes is becoming increasingly significant. Previous studies on cyberbullying focused on detecting and classifying malicious comments. However, our study focuses on a substantive alternative to block malicious comments via identifying key offenders through the application of methods of text mining and social network analysis (SNA). Thus, we propose a practical method of identifying social network users who make high rates of insulting comments and analyzing their resultant influence on the community. We select the Korean online community of Daum Agora to validate our proposed method. We collect over 650,000 posts and comments via web crawling. By applying a text mining method, we calculate the Losada ratio, a ratio of positive-to-negative comments. We then propose a cyberbullying index and calculate it based on text mining. By applying the SNA method, we analyze relationships among users so as to ascertain the influence that the core users have on the community. We validate the proposed method of identifying key cyberbullies through a real-world application and evaluations. The proposed method has implications for managing online communities and reducing cyberbullying.

Original languageEnglish
Article number101504
JournalTelematics and Informatics
Publication statusPublished - 2021 Jan

Bibliographical note

Funding Information:
This work was supported by the Yonsei University Research Grant of 2020.

Publisher Copyright:
© 2020 Elsevier Ltd

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Identification of key cyberbullies: A text mining and social network analysis approach'. Together they form a unique fingerprint.

Cite this