Development of Technologies for the Detection of (Cyber)Bullying Actions: The BullyBuster Project
Abstract
:1. Introduction
2. Related Work and Social Context Overview
2.1. Related Work
2.2. Overview of Bullying and Cyberbulling from a Psychological Perspective
2.3. Implications for the Italian Legal System
3. The BullyBuster framework
- Cutting-edge AI modules, each catering to a unique aspect of the detection and prevention solution: (1) crowd analysis for potential bullying incidents using video surveillance, (2) text analysis of social media accounts for possible verbal attacks, (3) keystroke dynamics analysis to gauge potential victims’ emotional states, and (4) deepfake detection to counter the spread of manipulated harmful content;
- Comprehensive psychological models, developed from a data collection phase involving the BullyBuster questionnaire, which serve as the foundation for understanding the behavioral dynamics involved in bullying and inform our AI modules’ functioning;
- Legal studies addressing privacy issues and other jurisdiction-specific regulations; BullyBuster pays significant attention to complying with legal constraints in the regions of its operation.
3.1. Physical Violence Detection
3.2. Manipulated Video Content Detection
- Visual Artifact-based Detector: This model employs a fine-tuned ResNet50 trained on artificially modified face images to simulate resolution inconsistencies. It detects visual anomalies in image content [29].
- General Network-based Detector: This model uses a fine-tuned XceptionNet that has been trained on deepfake images. It provides a broad baseline for detecting a variety of common deepfake manipulations [30].
- Frequency Analysis-based Detector: This model is built around Discrete Fourier Transform (DFT) for frequency analysis, making it adept at detecting manipulations that alter an image’s frequency characteristics [31].
- DCT-based Detector: This model, described in [32], utilizes Discrete Cosine Transform (DCT) and robustness-enhancing augmentation techniques. It helps to detect manipulation in different scaling variations.
3.3. Verbal Abuse Detection
- Number of negative words (BW): words that fall within a defined vocabulary “Bad- words”, containing 540 negative, vulgar words, insults, and humiliation [34].
- Number of “not/not” (NN): number of “not/not” within the comment.
- Uppercase (U): boolean value indicating whether the comment is capitalized. It can be interpreted as an attack on someone [35].
- Positive/negative comment weight (PW/NW): positive and negative comment weight in the range [0,1] (WordNet and SentiWordNet) [36].
- Use of the second person (SP): words that fall within a defined vocabulary, containing 24 words indicating the presence or absence of a second singular or plural form in the comment [37].
- Presence of threats (TR): words that fall within a defined vocabulary, containing 314 violent or inciting words [38].
- Presence of bullying terms (KW): words that fall within a defined vocabulary, containing 359 terms identified as insults and possible insults.
- Comment length (L): a value representing the length of the comment in terms of words.
3.4. Stress Detection
4. Experimental Evaluation
4.1. Preliminary Data Collection
- KeyLogger: everything that is typed on the keyboard.
- Touch and Multi-Touch coordinates on the cell phone display during the test (e.g., playing on video, scrolling back and forth on video, etc.).
- Questionnaire answers (date and time, question, answer).
- Sensor Values: gyroscope, accelerometer, proximity, atmospheric pressure, magnetometer, ambient brightness, step detector (some devices do not have all sensors).
- Range 1 (Low Risk): Individuals falling within Range 1 are considered to have a low risk of engaging in bullying behaviors or being victimized. They are less likely to display aggressive or harmful actions towards others and are relatively less vulnerable to being targeted by bullies.
- Range 2 (Moderate Risk): Participants falling within Range 2 have a moderate risk of either perpetrating bullying behaviors or becoming victims of bullying. They might exhibit occasional instances of aggressive behaviors or encounter some bullying experiences, but their involvement is not severe or pervasive.
- Range 3 (High Risk): Individuals in Range 3 are at a higher risk of either actively engaging in bullying behaviors or experiencing significant victimization. They might display frequent or intense aggressive actions or are prone to repeated victimization and distress due to bullying encounters.
4.2. Experimental Protocol and Results
4.2.1. Physical Violence Detection
4.2.2. Manipulated Video Content Detection
4.2.3. Verbal Abuse Detection
- Achille Lauro, an Italian rapper, whose social profiles and normal fan comments are studded with offensive and sexist comments. His Twitter profile has over 57k followers.
- Fabio Rovazzi, an Italian Youtuber and singer. His social media profiles are full of insults considering him a poor singer. His Twitter profile has over 37k followers.
- Matteo Renzi, an Italian politician. He is often criticized for his political choices and made fun of with goliardic videos on the web. His Twitter profile has 3.3 million followers.
- Giuseppe Conte, an Italian politician, jurist, and academic. Aggressive comments are directed at his political work culminating in a recent government crisis. His Twitter profile has around 1 million followers.
4.2.4. Stress Detection
5. BullyBuster Prototypes and Use Cases
5.1. Critical Issues and Solutions
5.2. Prototypes
- The BullyBuster Questionnaire (BullyBuster.pythonanywhere.com, accessed on 1 June 2023) was released as a mobile app and web app. This use case allowed data collection to develop psychological models based on tools to prevent bullying and cyberbullying behaviors. Students view animated videos depicting bullying scenarios before completing a questionnaire. The questions chosen by the BullyBuster team of psychologists are intended to estimate the extent to which the student’s real-life and online behaviors put them at risk of perpetuating, assisting, or being a victim of bullying and violence. The BullyBuster Questionnaire is currently being used in educational institutions to collect data that will be used to improve the BullyBuster models.
- The Teacher Tool is a desktop application that allows teachers to upload data from the class chat and videos from the video surveillance system. Several modules process the uploaded data, including a deepfake detector, a text analyzer, and a crowd analyzer. The system generates a report that includes each module’s risk percentages of bullying and cyberbullying actions and the overall risk percentage for the entire class. The GUI of the Teacher Tool includes a main window for data uploading and a results window for viewing the generated report.
- The Guided Discussion Tool is a desktop application addressed to students. In this use case, students must use the BullyBuster chat installed on desktop devices in the school’s computer room to discuss assigned topics (such as the environment, politics, current events, and so on). The system then analyzes the chat data to detect the presence of deepfakes, violent comments, and stress levels via keystroke analysis. The system generates a report that shows the percentage risk of cyberbullying actions for each module and the overall risk for the class. The GUI results window in the Guided Discussion Tool allows the teacher to access and review the generated report.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
AI | Artificial Intelligence |
BW | Number of negative words |
CNN | Convolutional Neural Network |
CW | Class weights |
DCT | Discrete Cosine Transform |
DFT | Discrete Fourier Transform |
DPIA | Data Protection Impact Assessment |
DT | Decision Tree |
EU | European Union |
FB | Fixed Bags |
FF | FaceForensics |
GDPR | General Data Protection Regulation |
GUI | Graphical User Interface |
IRCAI | International Research Centre on Artificial Intelligence under the auspices of UNESCO |
KW | Presence of bullying terms |
L | Comment Length |
MLP | Multi-Layer Perception |
MED | Motion Emotion Dataset |
MIL | Multi-Instance Learning |
NGO | Non-governmental Organization |
NN | Number of not |
PRIN | Projects of Relevant National Interest |
PW/NW | Positive/negative comment weight |
RF | Random Forest |
SP | Second Person |
SVM | Support Vector Machine |
TNR | True Negative Rate |
TPR | True Positive Rate |
TR | Presence of threats |
U | Capitalization |
UOS | Under-oversampling |
US | Undersampling |
References
- van der Maden, W.; Lomas, D.; Hekkert, P. A framework for designing AI systems that support community wellbeing. Front. Psychol. 2023, 13. [Google Scholar] [CrossRef]
- Li, X.; Li, J.; Zhang, Y.; Tiwari, P. Emotion recognition from multi-channel EEG data through a dual-pipeline graph attention network. In Proceedings of the 2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), Houston, TX, USA, 9–12 December 2021; pp. 3642–3647. [Google Scholar]
- D’Alfonso, S. AI in mental health. Curr. Opin. Psychol. 2020, 36, 112–117. [Google Scholar] [CrossRef] [PubMed]
- Faurholt-Jepsen, M.; Frost, M.; Ritz, C.; Christensen, E.M.; Jacoby, A.S.; Mikkelsen, R.L.; Knorr, U.; Bardram, J.E.; Vinberg, M.; Kessing, L.V.; et al. Daily electronic self-monitoring in bipolar disorder using smartphones—The MONARCA I trial: A randomized, placebo-controlled, single-blind, parallel group trial. Psychol. Med. 2015, 45, 2691–2704. [Google Scholar] [CrossRef] [PubMed]
- Guntuku, S.C.; Yaden, D.; Kern, M.; Ungar, L.; Eichstaedt, J. Detecting depression and mental illness on social media: An integrative review. Curr. Opin. Behav. Sci. 2017, 18, 43–49. [Google Scholar] [CrossRef]
- Vaidyam, A.; Wisniewski, H.; Halamka, J.; Keshavan, M.; Torous, J. Chatbots and Conversational Agents in Mental Health: A Review of the Psychiatric Landscape. Can. J. Psychiatry 2019, 64, 070674371982897. [Google Scholar] [CrossRef]
- Rescigno, M.; Spezialetti, M.; Rossi, S. Personalized models for facial emotion recognition through transfer learning. Multimed. Tools Appl. 2020, 79, 35811–35828. [Google Scholar] [CrossRef]
- Orrù, G.; Ghiani, D.; Pintor, M.; Marcialis, G.L.; Roli, F. Detecting anomalies from video-sequences: A novel descriptor. In Proceedings of the 2020 25th International Conference on Pattern Recognition (ICPR), Milan, Italy, 10–15 January 2021; pp. 4642–4649. [Google Scholar]
- Vestman, V.; Kinnunen, T.; Hautamäki, R.G.; Sahidullah, M. Voice Mimicry Attacks Assisted by Automatic Speaker Verification. Comput. Speech Lang. 2020, 59, 36–54. [Google Scholar] [CrossRef]
- Concas, S.; La Cava, S.M.; Orrù, G.; Cuccu, C.; Gao, J.; Feng, X.; Marcialis, G.L.; Roli, F. Analysis of Score-Level Fusion Rules for Deepfake Detection. Appl. Sci. 2022, 12, 7365. [Google Scholar] [CrossRef]
- Gattulli, V.; Impedovo, D.; Pirlo, G.; Sarcinella, L. Cyber Aggression and Cyberbullying Identification on Social Networks. In Proceedings of the 11th International Conference on Pattern Recognition Applications and Methods (ICPRAM 2022), Vienna, Austria, 3–5 February 2022; pp. 644–651. [Google Scholar]
- Marrone, S.; Sansone, C. Identifying Users’ Emotional States through Keystroke Dynamics. In Proceedings of the 3rd International Conference on Deep Learning Theory and Applications, DeLTA, INSTICC, Lisbon, Portugal, 12–14 July 2022; SciTePress: Setubal, Portugal, 2022; Volume 1, pp. 207–214. [Google Scholar] [CrossRef]
- Haberlin, K.A.; Atkin, D.J. Mobile gaming and Internet addiction: When is playing no longer just fun and games? Comput. Hum. Behav. 2022, 126, 106989. [Google Scholar] [CrossRef]
- Balducci, F.; Impedovo, D.; Macchiarulo, N.; Pirlo, G. Affective States Recognition through Touch Dynamics. Multimed. Tools Appl. 2020, 79, 35909–35926. [Google Scholar] [CrossRef]
- Wiertsema, M.; Vrijen, C.; van der Ploeg, R.; Sentse, M.; Kretschmer, T. Bullying perpetration and social status in the peer group: A meta-analysis. J. Adolesc. 2023, 95, 34–55. [Google Scholar] [CrossRef]
- Slonje, R.; Smith, P.K.; Frisén, A. The nature of cyberbullying, and strategies for prevention. Comput. Hum. Behav. 2013, 29, 26–32. [Google Scholar] [CrossRef]
- Smith, P.K.; Mahdavi, J.; Carvalho, M.; Fisher, S.; Russell, S.; Tippett, N. Cyberbullying: Its nature and impact in secondary school pupils. J. Child Psychol. Psychiatry 2008, 49, 376–385. [Google Scholar] [CrossRef] [PubMed]
- Chan, H.C.O.; Wong, D.S.W. Traditional School Bullying and Cyberbullying Perpetration: Examining the Psychosocial Characteristics of Hong Kong Male and Female Adolescents. Youth Soc. 2019, 51, 3–29. [Google Scholar] [CrossRef]
- Sticca, F.; Perren, S. Is Cyberbullying Worse than Traditional Bullying? Examining the Differential Roles of Medium, Publicity, and Anonymity for the Perceived Severity of Bullying. J. Youth Adolesc. 2012, 42, 739–750. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Kowalski, R.M.; Morgan, C.A.; Limber, S.P. Traditional bullying as a potential warning sign of cyberbullying. Sch. Psychol. Int. 2012, 33, 505–519. [Google Scholar] [CrossRef] [Green Version]
- Bauman, S.; Toomey, R.B.; Walker, J.L. Associations among bullying, cyberbullying, and suicide in high school students. J. Adolesc. 2013, 36, 341–350. [Google Scholar] [CrossRef]
- Hu, Y.; Bai, Y.; Pan, Y.; Li, S. Cyberbullying victimization and depression among adolescents: A meta-analysis. Psychiatry Res. 2021, 305, 114198. [Google Scholar] [CrossRef]
- Terrone, G.; Gori, A.; Topino, E.; Musetti, A.; Scarinci, A.; Guccione, C.; Caretti, V. The Link between Attachment and Gambling in Adolescence: A Multiple Mediation Analysis with Developmental Perspective, Theory of Mind (Friend) and Adaptive Response. J. Pers. Med. 2021, 11, 228. [Google Scholar] [CrossRef]
- Mantovani, M.O. Profili penali del cyberbullismo: La L. 71 del 2017. Indice Penale 2018, 2, 475. [Google Scholar]
- Zhan, B.; Monekosso, D.N.; Remagnino, P.; Velastin, S.A.; Xu, L.Q. Crowd analysis: A survey. Mach. Vis. Appl. 2008, 19, 345–357. [Google Scholar] [CrossRef]
- Chatlani, N.; Soraghan, J.J. Local binary patterns for 1-D signal processing. In Proceedings of the 2010 18th European Signal Processing Conference, Aalborg, Denmark, 23–27 August 2010; pp. 95–99. [Google Scholar]
- Zhang, T. Deepfake generation and detection, a survey. Multimed. Tools Appl. 2022, 81, 6259–6276. [Google Scholar] [CrossRef]
- Nadimpalli, A.V.; Rattani, A. On improving cross-dataset generalization of deepfake detectors. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, New Orleans, LA, USA, 20 June 2022; pp. 91–99. [Google Scholar]
- He, K.; Zhang, X.; Ren, S.; Sun, J. Deep Residual Learning for Image Recognition. In Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 27–30 June 2016; pp. 770–778. [Google Scholar] [CrossRef] [Green Version]
- Rössler, A.; Cozzolino, D.; Verdoliva, L.; Riess, C.; Thies, J.; Niessner, M. FaceForensics++: Learning to Detect Manipulated Facial Images. In Proceedings of the ICCV 2019, Seoul, Republic of Korea, 27 October–2 November 2019; pp. 1–11. [Google Scholar] [CrossRef] [Green Version]
- Durall, R.; Keuper, M.; Pfreundt, F.J.; Keuper, J. Unmasking DeepFakes with simple Features. arXiv 2020, arXiv:1911.00686. [Google Scholar]
- Concas, S.; Perelli, G.; Marcialis, G.L.; Puglisi, G. Tensor-Based Deepfake Detection in Scaled and Compressed Images. In Proceedings of the 2022 IEEE International Conference on Image Processing (ICIP), Bordeaux, France, 16–19 October 2022; pp. 3121–3125. [Google Scholar] [CrossRef]
- Dredge, R.; Gleeson, J.; de la Piedad Garcia, X. Presentation on Facebook and risk of cyberbullying victimisation. Comput. Hum. Behav. 2014, 40, 16–22. [Google Scholar] [CrossRef]
- Ishara Amali, H.M.A.; Jayalal, S. Classification of Cyberbullying Sinhala Language Comments on Social Media. In Proceedings of the 2020 Moratuwa Engineering Research Conference (MERCon), Moratuwa, Sri Lanka, 28–30 July 2020; pp. 266–271. [Google Scholar] [CrossRef]
- Chatzakou, D.; Kourtellis, N.; Blackburn, J.; Cristofaro, E.D.; Stringhini, G.; Vakali, A. Mean Birds: Detecting Aggression and Bullying on Twitter. arXiv 2017, arXiv:1702.06877. [Google Scholar]
- Raghavan, M.; Poongavanam, M.K.; Ramachandran, S.R.; Sridhar, R. Emotion and sarcasm identification of posts from facebook data using a hybrid approach. ICTACT J. Soft Comput. 2017, 7, 1427–1435. [Google Scholar] [CrossRef]
- Shtovba, S.; Petrychko, M.; Shtovba, O. Detection of Social Network Toxic Comments with Usage of Syntactic Dependencies in the Sentences. In Proceedings of the Conference the Second International Workshop on Computer Modeling and Intelligent Systems, CEUR Workshop 2353, Zaporizhzhia, Ukraine, 15–19 April 2019. [Google Scholar]
- Raza, M.; Memon, M.; Bhatti, S.; Bux, R. Detecting Cyberbullying in Social Commentary Using Supervised Machine Learning; Springer: New York, NY, USA, 2020; pp. 621–630. [Google Scholar] [CrossRef]
- Jain, A.; Hong, L.; Pankanti, S. Biometric identification. Commun. ACM 2000, 43, 90–98. [Google Scholar] [CrossRef]
- Mandryk, R.L.; Nacke, L.E. Biometrics in Gaming and Entertainment Technologies. In Biometrics in a Data Driven World; Chapman and Hall/CRC: London, UK, 2016; pp. 215–248. [Google Scholar]
- Karnan, M.; Akila, M.; Krishnaraj, N. Biometric personal authentication using keystroke dynamics: A review. Appl. Soft Comput. 2011, 11, 1565–1573. [Google Scholar] [CrossRef]
- Hinduja, S.; Patchin, J. Bullying, Cyberbullying, and Suicide. Arch. Suicide Res. Off. J. Int. Acad. Suicide Res. 2010, 14, 206–221. [Google Scholar] [CrossRef]
- Lopez-Fernandez, O.; Griffiths, M.D.; Kuss, D.J.; Dawes, C.; Pontes, H.M.; Justice, L.; Rumpf, H.J.; Bischof, A.; Gässler, A.K.; Suryani, E.; et al. Cross-cultural validation of the compulsive internet use scale in four forms and eight languages. Cyberpsychol. Behav. Soc. Netw. 2019, 22, 451–464. [Google Scholar] [CrossRef]
- Rabiee, H.; Haddadnia, J.; Mousavi, H.; Kalantarzadeh, M.; Nabi, M.; Murino, V. Novel dataset for fine-grained abnormal behavior understanding in crowd. In Proceedings of the 13th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Colorado Springs, CO, USA, 23–26 August 2016; pp. 95–101. [Google Scholar]
- Malik, A.; Kuribayashi, M.; Abdullahi, S.M.; Khan, A.N. DeepFake detection for human face images and videos: A survey. IEEE Access 2022, 10, 18757–18775. [Google Scholar] [CrossRef]
- Maalej, A.; Kallel, I. Does Keystroke Dynamics tell us about Emotions? A Systematic Literature Review and Dataset Construction. In Proceedings of the 2020 16th International Conference on Intelligent Environments (IE), Madrid, Spain, 20–23 July 2020; pp. 60–67. [Google Scholar] [CrossRef]
- Cuffaro, V.; Ciommo, F.D.; Gambini, M.L.; Alessandro, M.; D’Orazio, R. Trattamento dei dati personali e Regolamento UE n. 2016679. In Il Corriere Giuridico—Monografie; Ipsoa: Rome, Italy, 2018; ISBN 9788813366667. [Google Scholar]
- Veale, M.; Borgesius, F.Z. Adtech and real-time bidding under European data protection law. Ger. Law J. 2022, 23, 226–256. [Google Scholar] [CrossRef]
- Warren, S.; Brandeis, L. The right to privacy. In Killing the Messenger; Columbia University Press: New York, NY, USA, 1989; pp. 1–21. [Google Scholar]
- Costello, C.R.; McNiel, D.E.; Binder, R.L. Adolescents and social media: Privacy, brain development, and the law. J. Am. Acad. Psychiatry Law 2016, 44, 313–321. [Google Scholar] [PubMed]
TPR [%] | TNR [%] | ||||
---|---|---|---|---|---|
Model/Test Set | FaceSwap | Deepfakes | Face2Face | NeuralText. | |
ResNet50 | 97.29 | 99.88 | 96.00 | 12.66 | 97.35 |
XceptionNet | 33.76 | 81.26 | 34.20 | 31.13 | 67.20 |
DFT | 68.00 | 98.78 | 79.43 | 98.01 | 6.70 |
DCT | 91.86 | 82.80 | 81.53 | 67.28 | 74.85 |
ResNet50 + XceptionNet (mean) | 96.93 | 99.89 | 92.21 | 14.99 | 92.84 |
ResNet50 + XceptionNet (bayes) | 76.16 | 99.77 | 86.34 | 13.40 | 95.80 |
ResNet50 + XceptionNet (acc-based) | 97.39 | 99.94 | 95.20 | 12.08 | 97.61 |
ResNet50 + XceptionNet (MLP) | 98.57 | 100.00 | 98.51 | 25.86 | 92.79 |
all (mean) | 94.07 | 99.83 | 93.28 | 48.50 | 74.00 |
all (Bayes) | 76.88 | 99.88 | 89.11 | 28.02 | 93.25 |
all (acc-based) | 97.08 | 99.25 | 89.70 | 30.45 | 91.49 |
all (MLP) | 98.98 | 100.00 | 97.92 | 72.65 | 73.38 |
Average Results [%] | SVM | DT | RF | MLP | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
P | R | F1 | P | R | F1 | P | R | F1 | P | R | F1 | |
Not-aggressive class | 0.95 | 0.88 | 0.92 | 0.93 | 0.84 | 0.88 | 0.98 | 0.89 | 0.93 | 0.94 | 0.90 | 0.92 |
Aggressive class | 0.73 | 0.90 | 0.81 | 0.66 | 0.83 | 0.73 | 0.78 | 0.96 | 0.86 | 0.77 | 0.84 | 0.81 |
Accuracy | 0.90 | 0.85 | 0.93 | 0.90 |
Approach | Accuracy | Precision | Recall | F1-Score |
---|---|---|---|---|
CNN CW | 0.48 | 0.58 | 0.48 | 0.50 |
CNN US | 0.57 | 0.43 | 0.57 | 0.48 |
CNN OS | 0.46 | 0.45 | 0.46 | 0.43 |
CNN UOS | 0.52 | 0.48 | 0.52 | 0.49 |
MIL-SVM VB | 0.76 | 0.80 | 0.69 | 0.74 |
MIL-SVM FB | 0.52 | 0.6 | 0.52 | 0.53 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Orrù, G.; Galli, A.; Gattulli, V.; Gravina, M.; Micheletto, M.; Marrone, S.; Nocerino, W.; Procaccino, A.; Terrone, G.; Curtotti, D.; et al. Development of Technologies for the Detection of (Cyber)Bullying Actions: The BullyBuster Project. Information 2023, 14, 430. https://doi.org/10.3390/info14080430
Orrù G, Galli A, Gattulli V, Gravina M, Micheletto M, Marrone S, Nocerino W, Procaccino A, Terrone G, Curtotti D, et al. Development of Technologies for the Detection of (Cyber)Bullying Actions: The BullyBuster Project. Information. 2023; 14(8):430. https://doi.org/10.3390/info14080430
Chicago/Turabian StyleOrrù, Giulia, Antonio Galli, Vincenzo Gattulli, Michela Gravina, Marco Micheletto, Stefano Marrone, Wanda Nocerino, Angela Procaccino, Grazia Terrone, Donatella Curtotti, and et al. 2023. "Development of Technologies for the Detection of (Cyber)Bullying Actions: The BullyBuster Project" Information 14, no. 8: 430. https://doi.org/10.3390/info14080430
APA StyleOrrù, G., Galli, A., Gattulli, V., Gravina, M., Micheletto, M., Marrone, S., Nocerino, W., Procaccino, A., Terrone, G., Curtotti, D., Impedovo, D., Marcialis, G. L., & Sansone, C. (2023). Development of Technologies for the Detection of (Cyber)Bullying Actions: The BullyBuster Project. Information, 14(8), 430. https://doi.org/10.3390/info14080430