Prediction of Cyberbullying in Social Media on Twitter Using Logistic Regression
DOI:
https://doi.org/10.30871/jaic.v9i4.9842Keywords:
Cyberbullying, Logistic Regression, SMOTE Method, TwitterAbstract
As cases of cyberbullying on social media increase, there is a need for efficient measures to detect the vice. This research aims to establish the application of machine learning algorithms in analyzing text on social media to determine potentially harmful comments using logistic regression. The first and most important research question of this study is to assess the extent to which the model is capable of correctly identifying the comments that contain features of cyberbullying and those that do not. The data set included comments from different social media sites and was preprocessed before further analysis was conducted on it. Exploratory Data Analysis was applied in the study to establish relationships and textual features with bullying behavior. As with any other model, after training and testing the model, the results were analyzed using parameters like precision, precision, gain, and F1 statistics. The outcomes of this study revealed that the use of logistic regression models can give a fairly satisfactory level of accuracy in identifying cyberbullying. In light of this, this study underscores the need to use machine learning algorithms to minimize negative actions in cyberspace.
Downloads
References
[1] A. S. G. Tabares, J. E. Restrepo, and G. Zapata-Lesmes, “The effect of bullying and cyberbullying on predicting suicide risk in adolescent females: The mediating role of depression,” Psychiatry Res, vol. 337, Jul. 2024, doi: 10.1016/j.psychres.2024.115968.
[2] N. Chamidah and R. Sahawaly, “Comparison Support Vector Machine and Naive Bayes Methods for Classifying Cyberbullying in Twitter,” Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, vol. 7, no. 2, p. 338, Sep. 2021, doi: 10.26555/jiteki.v7i2.21175.
[3] A. Almomani, K. Nahar, M. Alauthman, M. A. Al-Betar, Q. Yaseen, and B. B. Gupta, “Image cyberbullying detection and recognition using transfer deep machine learning,” International Journal of Cognitive Computing in Engineering, vol. 5, pp. 14–26, Jan. 2024, doi: 10.1016/j.ijcce.2023.11.002.
[4] C. Poh Theng, N. Fadzilah Othman, R. Syahirah Abdullah, S. Anawar, Z. Ayop, and S. Najwa Ramli, “Cyberbullying Detection in Twitter Using Sentiment Analysis,” IJCSNS International Journal of Computer Science and Network Security, vol. 21, no. 11, 2021, doi: 10.22937/IJCSNS.2021.21.11.1.
[5] D. Musleh et al., “AMachine Learning Approach to Cyberbullying Detection in Arabic Tweets,” Computers, Materials and Continua, vol. 80, no. 1, pp. 1033–1054, 2024, doi: 10.32604/cmc.2024.048003.
[6] W. Xiao and M. Cheng, “The Relationship between Internet Addiction and Cyberbullying Perpetration: A Moderated Mediation Model of Moral Disengagement and Internet Literacy,” International Journal of Mental Health Promotion, vol. 25, no. 12, pp. 1303–1311, 2023, doi: 10.32604/ijmhp.2023.042976.
[7] A. Muneer, A. Alwadain, M. G. Ragab, and A. Alqushaibi, “Cyberbullying Detection on Social Media Using Stacking Ensemble Learning and Enhanced BERT,” Information (Switzerland), vol. 14, no. 8, Aug. 2023, doi: 10.3390/info14080467.
[8] P. Yi and A. Zubiaga, “Session-based cyberbullying detection in social media: A survey,” Online Soc Netw Media, vol. 36, Jul. 2023, doi: 10.1016/j.osnem.2023.100250.
[9] C. Marinoni, M. Rizzo, and M. A. Zanetti, “Social Media, Online Gaming, and Cyberbullying during the COVID-19 Pandemic: The Mediation Effect of Time Spent Online,” Adolescents, vol. 4, no. 2, pp. 297–310, Jun. 2024, doi: 10.3390/adolescents4020021.
[10] A. Raza, M. Bilal, and M. Fahad Rauf, “Comparative Analysis Of Machine Learning Algorithms For Fake Review Detection,” International Journal of Computational Intelligence in Control Copyrights @Muk Publications, vol. 13, no. 1, 2021.
[11] A. Ali and A. M. Syed, “Cyberbullying Detection Using Machine Learning.”
[12] N. A. Azeez, S. O. Idiakose, C. J. Onyema, and C. Van Der Vyver, “Cyberbullying Detection in Social Networks: Artificial Intelligence Approach,” Journal of Cyber Security and Mobility, vol. 10, no. 4, pp. 745–774, 2021, doi: 10.13052/jcsm2245-1439.1046.
[13] P. Pranathi, V. Revathi, P. Varshitha, S. Shaik, and S. Bhutada, “Logistic Regression Based Cyber Harassment Identification,” Journal of Advances in Mathematics and Computer Science, vol. 38, no. 8, pp. 76–85, Jun. 2023, doi: 10.9734/jamcs/2023/v38i81792.
[14] K. M. O. Nahar, M. Alauthman, S. Yonbawi, and A. Almomani, “Cyberbullying Detection and Recognition with Type Determination Based on Machine Learning,” Computers, Materials and Continua, vol. 75, no. 3, pp. 5307–5319, 2023, doi: 10.32604/cmc.2023.031848.
[15] D. E. Kurniawan, A. Dzikri, E. Br. Sembiring, N. Ardi, H. Mochtoha, J. Friadi, and P. Prasetyawan, Kecerdasan Bisnis: Literasi Data untuk Pengambilan Keputusan. Media Sains Indonesia, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Santi Prayudani, Lilis Tiara Adha, Tika Ariyani, Arif Ridho Lubis

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).








