19 research outputs found

    Development of Technologies for the Detection of (Cyber)Bullying Actions: The BullyBuster Project

    Get PDF
    Bullying and cyberbullying are harmful social phenomena that involve the intentional, repeated use of power to intimidate or harm others. The ramifications of these actions are felt not just at the individual level but also pervasively throughout society, necessitating immediate attention and practical solutions. The BullyBuster project pioneers a multi-disciplinary approach, integrating artificial intelligence (AI) techniques with psychological models to comprehensively understand and combat these issues. In particular, employing AI in the project allows the automatic identification of potentially harmful content by analyzing linguistic patterns and behaviors in various data sources, including photos and videos. This timely detection enables alerts to relevant authorities or moderators, allowing for rapid interventions and potential harm mitigation. This paper, a culmination of previous research and advancements, details the potential for significantly enhancing cyberbullying detection and prevention by focusing on the system’s design and the novel application of AI classifiers within an integrated framework. Our primary aim is to evaluate the feasibility and applicability of such a framework in a real-world application context. The proposed approach is shown to tackle the pervasive issue of cyberbullying effectively

    Piattaforme criptate e prova penale

    No full text
    Ad oggi, le indagini penali sulle piattaforme criptate rappresentano una delle principali sfide che l’environment law enforcement si trova ad affrontare, ma da domani alle difficoltà di ordine tecnico – legate al fatto che si tratta di piattaforme dotate di importanti gradi di crittografia, con server spesso allocati in diversi Paesi del mondo – si affiancheranno criticità di natura giuridica in rapporto al corretto inquadramento delle attività espletate e alla conseguente diagnosi di utilizzabilità processuale dei dati raccolti. L’obiettivo dell’analisi è verificare la compatibilità delle investigazioni esperite sulle piattaforme criptate con le categorie probatorie già esistenti, al fine di accertare l’esistenza di una odierna copertura normativa idonea a garantire la tenuta costituzionale e codicistica degli elementi di prova acquisiti

    Cyber-Social Security Through Social Sensing: An Interdisciplinary Approach to Cyberbullying and Urban Security

    No full text
    The CSS – Cyber Social Security research project described in this abstract paper aims to tackle cyberbullying and urban security challenges through an innovative "Social Sensing" approach, leveraging data from social networks and urban sensors. By integrating diverse data sources, the project provides a comprehensive understanding of social dynamics and risky behaviors. Key partners, including Università Del Salento, Università LUM Giuseppe Degennaro, Politecnico di Bari, and Università degli Studi di Foggia, contribute specialized expertise in data extraction, analysis, and legal compliance. The project is structured into phases of data extraction, behavior analysis, and preventive measures, ensuring privacy compliance. This interdisciplinary effort combines computer science, psychology, law, and engineering to address cyber-social risks effectively. The outcomes of the project include advanced analytical tools, guidelines for data privacy, and strategies for early detection and prevention of cyberbullying

    Sustainable Development of the Minerals Sector in the APEC Region

    No full text
    当厂商选择成为跨国公司和建立国外生产企业时,厂商很少会建立工厂而只供应它所投资的国内市场。相反,厂商会建立一个供应周边国家消费者的基地。这种FDI行为可能是由为了努力提高在某个地区的国家之间的一体化水平而引起的,比如说现在的一体化组织:欧盟(EU),北美自由贸易区(NAFTA)和东盟国家(ASEAN)等。译者单位:厦门大学经济学院国际经济与贸易系(361005
    corecore