Author
Listed:
- Chen Mengru
- Mohamad Rizal Abd Rahman
- Mohd Zamre Mohd Zahir
Abstract
This study evaluates the efficacy of AI-driven methodologies in detecting and managing cyberviolence on social media, with a particular focus on compliance with the General Data Protection Regulation (GDPR). It also addresses the compliance of AI cyberviolence detection tools with international legal frameworks like the GDPR, underscoring the balance between effective enforcement and respect for user privacy. We developed a multi-modal hierarchical model that integrates textual, user, and network-based features to discern patterns of cyberviolence. The model achieved an AUC-ROC score of 0.94 and an F1-score of 0.90, surpassing previous methods. Analysis of 10,234,567 social media posts revealed a cyberviolence prevalence rate of 7.8%, with notable variations across platforms and user demographics. Platforms permitting anonymous posts exhibited higher cyberviolence rates (12.3%) compared to those requiring user identification (5.6%). Temporal analysis highlighted peak cyberviolence activities during evening hours and weekends. Evaluation of intervention strategies indicated that personalized educational prompts significantly reduced repeat offenses by 47% among first-time aggressors. Age-specific responses to interventions were noted, with younger users (13-17) exhibiting a 52% reduction in repeat offenses, compared to a 29% reduction among adult users. These findings emphasize the potential of AI to foster safer online environments and highlight the necessity for context-aware, personalized interventions. This paper also discusses the effective suppression of cyberviolence, in addition to technical means, but also the participation of law. It advocates for improving relevant laws and policies and strengthening the standardization and legitimacy of cyberviolence governance.
Suggested Citation
Chen Mengru & Mohamad Rizal Abd Rahman & Mohd Zamre Mohd Zahir, 2025.
"Analysis of managing cyberviolence based on artificial intelligence technology,"
Edelweiss Applied Science and Technology, Learning Gate, vol. 9(2), pages 2341-2352.
Handle:
RePEc:ajp:edwast:v:9:y:2025:i:2:p:2341-2352:id:5087
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ajp:edwast:v:9:y:2025:i:2:p:2341-2352:id:5087. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Melissa Fernandes (email available below). General contact details of provider: https://learning-gate.com/index.php/2576-8484/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.