Content area
Full Text
Abstract - The efforts of education authorities to find ways to identify problems related to bullying, still have not considered ciberbullying, and have not taken the necessary measures to maintain proper control of the problem through computer applications. In this paper are proposed a security model based on agents, which can analyze the messages exchanged between children (ages 9 to 13) through chats that are used in classrooms, and emit warnings about the threats, which may be considered to address such problems. The information generated can be used for the detection of cyberbullying and offer psychological support to those that may be formed as aggressors, preventing that this behavior becomes a disease that could be avoided at an early age.
Keywords: Pattern recognition, Agent, Security, Ciberbullying.
1 Introduction
The problem of cyberbullying is defined by the fact that a person is abused, threatened or harassed through electronic means, and has recently generated great controversy, since this type of violence may increase as advances the use of new technologies [1, 2].
Because there are several forms of cyberbullying, this paper proposes a model based on the architecture of ARSEC-AMS agents [3] to detect threats and verbal abuse to which a child is usually exposed, taking into account the behavior of the aggressors and techniques of content analysis of messages exchanged through chats [4-6].
It is important to mention that the content analysis is applied to the spanish language, so that in the experimental examples section the analyzed sentences are presented in that language, since the result does not have the same structure or the same meaning in other languages.
Moreover, this paper is organized as follows: introduction, description of the model, components of content analysis, implementation of the architecture ARSEC-AMS, experimental tests, and finally is presented the conclusions and bibliographical references.
2 Model
This model focuses on the detection of threats and aggressions to which a child is exposed on having interacted with others through instant messaging, applying content analysis techniques to measure the dangerousness of the message. Moreover, it is used the software agent technology based on the architecture ARSEC-AMS [3] that allows to implement computer security concepts.
2.1 Content analysis
The analysis of content is a set of technologies that allow distinguishing...