Kids Cybersecurity Using Computational Intelligence Techniques /
This book introduces and presents the newest up-to-date methods, approaches and technologies on how to detect child cyberbullying on social media as well as monitor kids E-learning, monitor games designed and social media activities for kids. On a daily basis, children are exposed to harmful content...
Main Authors: | , , , , |
---|---|
Format: | software, multimedia |
Language: | eng |
Published: |
Cham, Switzerland : Springer International Publishing,
2023
|
Subjects: | |
Online Access: | https://link-springer-com.ezproxy.utm.my/openurl?genre=book&isbn=978-3-031-21199-7 |
_version_ | 1826473222705512448 |
---|---|
author | Yafooz, Wael M. S., editor 652525 Al-Aqrabi, Hussain, editor 652526 Al-Dhaqm, Arafat, editor 652527 Emara, Abdelhamid, editor 652528 SpringerLink (Online service) |
author_facet | Yafooz, Wael M. S., editor 652525 Al-Aqrabi, Hussain, editor 652526 Al-Dhaqm, Arafat, editor 652527 Emara, Abdelhamid, editor 652528 SpringerLink (Online service) |
author_sort | Yafooz, Wael M. S., editor 652525 |
collection | OCEAN |
description | This book introduces and presents the newest up-to-date methods, approaches and technologies on how to detect child cyberbullying on social media as well as monitor kids E-learning, monitor games designed and social media activities for kids. On a daily basis, children are exposed to harmful content online. There have been many attempts to resolve this issue by conducting methods based on rating and ranking as well as reviewing comments to show the relevancy of these videos to children; unfortunately, there still remains a lack of supervision on videos dedicated to kids. This book also introduces a new algorithm for content analysis against harmful information for kids. Furthermore, it establishes the goal to track useful information of kids and institutes detection of kid’s textual aggression through methods of machine and deep learning and natural language processing for a safer space for children on social media and online and to combat problems, such as lack of supervision, cyberbullying, kid’s exposure to harmful content. This book is beneficial to postgraduate students and researchers' concerns on recent methods and approaches to kids' cybersecurity. |
first_indexed | 2024-03-05T17:30:01Z |
format | software, multimedia |
id | KOHA-OAI-TEST:609837 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-12-08T04:39:28Z |
publishDate | 2023 |
publisher | Cham, Switzerland : Springer International Publishing, |
record_format | dspace |
spelling | KOHA-OAI-TEST:6098372024-10-05T02:13:46ZKids Cybersecurity Using Computational Intelligence Techniques / Yafooz, Wael M. S., editor 652525 Al-Aqrabi, Hussain, editor 652526 Al-Dhaqm, Arafat, editor 652527 Emara, Abdelhamid, editor 652528 SpringerLink (Online service) software, multimedia Electronic books 631902 Cham, Switzerland : Springer International Publishing,2023©2023engThis book introduces and presents the newest up-to-date methods, approaches and technologies on how to detect child cyberbullying on social media as well as monitor kids E-learning, monitor games designed and social media activities for kids. On a daily basis, children are exposed to harmful content online. There have been many attempts to resolve this issue by conducting methods based on rating and ranking as well as reviewing comments to show the relevancy of these videos to children; unfortunately, there still remains a lack of supervision on videos dedicated to kids. This book also introduces a new algorithm for content analysis against harmful information for kids. Furthermore, it establishes the goal to track useful information of kids and institutes detection of kid’s textual aggression through methods of machine and deep learning and natural language processing for a safer space for children on social media and online and to combat problems, such as lack of supervision, cyberbullying, kid’s exposure to harmful content. This book is beneficial to postgraduate students and researchers' concerns on recent methods and approaches to kids' cybersecurity.Includes index.Part 1: State-of-the-art -- Everyday Cyber Safety for Students -- Machine Learning Approaches for Kids E-learning Monitoring -- Factors influencing on online education outcomes an empirical study based on Kids parents -- Review on the Social Media Management Techniques against kids Harmful Information -- Review of Information Security Management Frameworks -- Database Forensics Field and Children Crimes -- From exhibitionism to addiction, or cyber threats among children and adolescents -- Part II: Cyberbullying and Kids cyber security -- Protection of Users Kids on Twitter Platform using Naive Bayes -- The Impact of Fake News Spread on Social Media on The Children in Indonesia During Covid-19 -- A Preventive Approach to Weapons Detection for Children Using Quantum Deep Learning -- Learning Arabic for Kids online Using Google Classroom -- Child Emotion Recognition Via Custom Lightweight CNN Architecture -- Cybercrime Sentimental Analysis for Child YouTube Video Dataset Using Hybrid Support Vector Machine With Ant Colony Optimization Algorithm -- Cyberbullying Awareness Through Sentiment Analysis Based On Twitter -- The Impact of Fake News on Kids Life from the Holy Al-Qur'an Perspective -- Early Prediction of Dyslexia Risk Factors in Kids through Machine Learning Techniques -- Development of Metamodel for Information Security Risk Management -- Detecting Kids Cyberbullying Using Transfer Learning Approach from Transformer Fine-Tuning Models -- YouTube Sentiment Analysis: Performance Model EvaluationThis book introduces and presents the newest up-to-date methods, approaches and technologies on how to detect child cyberbullying on social media as well as monitor kids E-learning, monitor games designed and social media activities for kids. On a daily basis, children are exposed to harmful content online. There have been many attempts to resolve this issue by conducting methods based on rating and ranking as well as reviewing comments to show the relevancy of these videos to children; unfortunately, there still remains a lack of supervision on videos dedicated to kids. This book also introduces a new algorithm for content analysis against harmful information for kids. Furthermore, it establishes the goal to track useful information of kids and institutes detection of kid’s textual aggression through methods of machine and deep learning and natural language processing for a safer space for children on social media and online and to combat problems, such as lack of supervision, cyberbullying, kid’s exposure to harmful content. This book is beneficial to postgraduate students and researchers' concerns on recent methods and approaches to kids' cybersecurity.CyberbullyingComputational intelligenceInternet and childrenhttps://link-springer-com.ezproxy.utm.my/openurl?genre=book&isbn=978-3-031-21199-7URN:ISBN:9783031211997 |
spellingShingle | Cyberbullying Computational intelligence Internet and children Yafooz, Wael M. S., editor 652525 Al-Aqrabi, Hussain, editor 652526 Al-Dhaqm, Arafat, editor 652527 Emara, Abdelhamid, editor 652528 SpringerLink (Online service) Kids Cybersecurity Using Computational Intelligence Techniques / |
title | Kids Cybersecurity Using Computational Intelligence Techniques / |
title_full | Kids Cybersecurity Using Computational Intelligence Techniques / |
title_fullStr | Kids Cybersecurity Using Computational Intelligence Techniques / |
title_full_unstemmed | Kids Cybersecurity Using Computational Intelligence Techniques / |
title_short | Kids Cybersecurity Using Computational Intelligence Techniques / |
title_sort | kids cybersecurity using computational intelligence techniques |
topic | Cyberbullying Computational intelligence Internet and children |
url | https://link-springer-com.ezproxy.utm.my/openurl?genre=book&isbn=978-3-031-21199-7 |
work_keys_str_mv | AT yafoozwaelmseditor652525 kidscybersecurityusingcomputationalintelligencetechniques AT alaqrabihussaineditor652526 kidscybersecurityusingcomputationalintelligencetechniques AT aldhaqmarafateditor652527 kidscybersecurityusingcomputationalintelligencetechniques AT emaraabdelhamideditor652528 kidscybersecurityusingcomputationalintelligencetechniques AT springerlinkonlineservice kidscybersecurityusingcomputationalintelligencetechniques |