Document Type
Conference Proceeding
Publication Date
1-24-2025
Publication Title
Social Networks Analysis and Mining
Volume
15213
Pages
355–370
Publisher Name
Springer Nature Switzerland AG
Publisher Location
Cham, Switzerland
Abstract
Social media has revolutionized communication, allowing people worldwide to connect and interact instantly. However, it has also led to increases in cyberbullying, which poses a significant threat to children and adolescents globally, affecting their mental health and well-being. It is critical to accurately detect the roles of individuals involved in cyberbullying incidents to effectively address the issue on a large scale. This study explores the use of machine learning models to detect the roles involved in cyberbullying interactions. After examining the AMiCA dataset and addressing class imbalance issues, we evaluate the performance of various models built with four underlying LLMs (i.e. BERT, RoBERTa, T5, and GPT-2) for role detection. Our analysis shows that oversampling techniques help improve model performance. The best model, a fine-tuned RoBERTa using oversampled data, achieved an overall F1 score of 83.5%, increasing to 89.3% after applying a prediction threshold. The top-2 F1 score without thresholding was 95.7%. Our method outperforms previously proposed models. After investigating the per-class model performance and confidence scores, we show that the models perform well in classes with more samples and less contextual confusion (e.g. Bystander Other), but struggle with classes with fewer samples (e.g. Bystander Assistant) and more contextual ambiguity (e.g. Harasser and Victim). This work highlights current strengths and limitations in the development of accurate models with limited data and complex scenarios.
Recommended Citation
Sandoval, M., Abuhamad, M., Furman, P., Nazari, M., Hall, D.L., & Silva, Y.N. (2025). Identifying Cyberbullying Roles in Social Media. In L.M. Aiello, T. Chakraborty, & S. Gaito (Eds.), Social Networks Analysis and Mining (ASONAM 2024), Lecture Notes in Computer Science, vol. 15213 (pp. 355–370). Springer, Cham. https://doi.org/10.1007/978-3-031-78548-1_26
Creative Commons License

This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License.
Copyright Statement
© Springer Nature Switzerland AG, 2025.

Comments
Author Posting. © Springer Nature Switzerland AG, 2025. This is the author's version of the work. It is posted here by permission of Springer Nature for personal use, not for redistribution. The definitive version was published in Social Networks Analysis and Mining, January 24, 2025, http://dx.doi.org/10.1007/978-3-031-78548-1_26.
Published as part of the ASONAM 2024 conference proceedings in the Lecture Notes in Computer Science (LNCS) series.