61
CYBER BULLY IDENTIFICATION SYSTEM IRRNA IZZATE MOHD ALI BACHELOR OF COMPUTER SCIENCE (SOFTWARE DEVELOPMENT) WITH HONOURS UNIVERSITI SULTAN ZAINAL ABIDIN 2018

CYBER BULLY IDENTIFICATION SYSTEM IRRNA IZZATE ......banyak kes yang berlaku kerana siber buli. Oleh itu, ia boleh menyebabkan masalah mental seperti fobia, tekanan, dan tertekan

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

  • i

    CYBER BULLY IDENTIFICATION

    SYSTEM

    IRRNA IZZATE MOHD ALI

    BACHELOR OF COMPUTER SCIENCE (SOFTWARE

    DEVELOPMENT)

    WITH HONOURS

    UNIVERSITI SULTAN ZAINAL ABIDIN

    2018

  • ii

    CYBER BULLY IDENTIFICATION

    SYSTEM

    IRRNA IZZATE MOHD ALI

    Bachelor of Computer Science (Software Development)

    With Honours

    Faculty of Informatics and Computing

    Universiti Sultan Zainal Abidin

    May 2018

  • i

    DECLARATION

    I hereby declare that this report is based on my original work except for quotations and

    citations, which have been duly acknowledged. I also declare that it has not been previously

    or concurrently submitted for any other degree at Universiti Sultan Zainal Abidin or other

    institutions.

    Signature : ________________________________

    Name : IRRNA IZZATE BT MOHD ALI

    Date : ..................................................

  • ii

    CONFIRMATION

    This is to confirm that:

    The research conducted and the writing of this report was under my supervision.

    Signature : ________________________________

    Supervisor : DR. WAN AEZWANI BT WAN ABU

    BAKAR

    Date : ..................................................

  • iii

    DEDICATION

    I would like to take this opportunity to express my heartfelt gratitude to all those who helped

    me to make my thesis work a success. First and foremost I would like to thank ALMIGHTY

    who has provided me the strength to do justice to my work and contribute my best to it so that

    it has turned out to be a successful work.

    I express my sincere and whole hearted thanks, to my supervisior Dr. Wan Aezwani bt. Wan

    Abu Bakar, Lecturer of Universiti Sultan Zainal Abidin for her regular advice, guidance,

    suggestion and encouragement throughout the course of present research. I am highly

    indebted to his untiresome perseverance, which helped me to present this work in the right

    perspective, assuming the full form of the thesis.

    There are no words to express my gratitude and thanks to my beloved mother, family

    members and friends for always standing by me. Their love has been the major spiritual

    support in my life. As a final word, I would like to thank each and every individual who have

    been a source of support and encouragement and helped me to achieve my goal and complete

    my work successfully.

  • iv

    ABSTRACT

    Cyberbullying is the action that takes place over digital devices. It can occur through

    social media, forums, apps and others. It can include sharing personal or private

    information about someone else causing embarrassment or humiliation. In Malaysia,

    there are many cases that happened because of the cyber bully. Hence, it can cause

    mental problems such as phobia, stress, and depressed. Generally, the generation that

    commonly involve with cyber bully is young generation which is university′s student.

    Student did not know whether their actions such as comment, post status, share post

    and also personal message become as a threat toward others. Unfortunately, most of

    students have depression on using social media because of the cyber bully. The cyber

    bully itself can give negative effect toward students′ performance in academic.

    Sometimes student that been cyber bullied take suicide as a solution. The importance

    of the system is to analyse the status of the student whether the student is being cyber

    bullies or cyber bullied or in the middle between being cyber bullies and cyber

    bullied. Through this identification system, the students can know their category of

    cyber bully and they can gain with the tips and also consultation to overcome the

    cyber bully′s problem.

  • v

    ABSTRAK

    Siber buli adalah tindakan yang berlaku di atas peranti digital. Ia boleh berlaku melalui media

    sosial, forum, aplikasi dan lain-lain. Ia boleh termasuk berkongsi maklumat peribadi atau

    peribadi tentang orang lain yang menyebabkan malu atau penghinaan. Di Malaysia, terdapat

    banyak kes yang berlaku kerana siber buli. Oleh itu, ia boleh menyebabkan masalah mental

    seperti fobia, tekanan, dan tertekan. Umumnya, generasi yang sering terlibat dengan pembuli

    siber adalah generasi muda yang merupakan pelajar universiti.

    Pelajar tidak tahu sama ada tindakan mereka seperti komen, status pos, jawatan berkongsi

    dan juga mesej peribadi menjadi ancaman terhadap orang lain. Malangnya, kebanyakan

    pelajar mengalami kemurungan menggunakan media sosial kerana siber buli. Siber buli itu

    sendiri boleh memberi kesan negatif terhadap prestasi pelajar dalam akademik. Kadang-

    kadang pelajar yang telah dibuli siber membunuh diri sebagai penyelesaian. Kepentingan

    sistem ini adalah untuk menganalisis status pelajar sama ada pelajar itu adalah pembuli siber

    atau dibuli siber atau di tengah-tengah antara pembuli siber dan dibuli siber. Melalui sistem

    pengenalan ini, pelajar dapat mengetahui kategori siber buli mereka dan mereka boleh

    mendapatkan dengan tip dan juga perundingan untuk mengatasi masalah siber buli.

  • vi

    CONTENTS

    SubTopic No Content Page

    DECLARATION i

    CONFIRMATION ii

    DEDICATION iii

    ABSTRACT iv

    ABSTRAK v

    CONTENTS vi-vii

    LIST OF TABLES viii

    LIST OF FIGURES ix

    LIST OF ABBREVIATIONS x

    CHAPTER 1 INTRODUCTION

    1.1 Project Background 2

    1.2 Problem Statement 3

    1.3 Objectives 4

    1.4 Scope 4-5

    1.5 Limitation 6

    1.6 Strength 6

    1.7 Thesis Organization 7

    CHAPTER 2 LITERATURE REVIEW

    2.1 Introduction 9

    2.2 Related Research 9-12

    2.3 Rule Based algorithm 12

    2.4 Summary 13

    CHAPTER 3 METHODOLOGY

    3.1 Introduction 15

    3.2 Research Analysis 15-16

    3.3 Methodology for CBIS 16-18

    3.4 Software and Hardware Requirements 19-20

    3.5 Summary 20

  • vii

    CONTENTS

    SubTopic No Content Page CHAPTER 4 DESIGN

    4.1 Introduction 22

    4.2 System Design and Modelling 22

    4.2.1 Context Diagram 23

    4.2.2 Data Flow Diagram 24-33

    4.2.3 Entity Relationship Diagram 34

    4.3 Data Dictionary 35-47

    REFERENCES 48-49

  • viii

    LIST OF TABLES

    TABLE

    TITLE

    PAGE

    2.1 Comparison of Journals 11-12

    3.1 CBIS Software Requirements 19

    3.2 CBIS Hardware Requirements 20

    4.1 CBIS USER Data Dictionary 35

    4.2 CBIS STUDENT Data Dictionary 36

    4.3 CBIS ADMIN Data Dictionary 38

    4.4 CBIS PSYCHOLOGIST Data Dictionary 40

    4.5 CBIS QUESTION Data Dictionary 42

    4.6 CBIS ANSWER Data Dictionary 43

    4.7 CBIS CATEGORY Data Dictionary 44

    4.8 CBIS APPOINTMENT Data Dictionary 45

    4.9 CBIS CONSULTATION Data Dictionary 46

    4.10 CBIS TIPS Data Dictionary 47

  • ix

    LIST OF FIGURES

    FIGURES

    TITLE

    PAGE

    3.1 Waterfall Model 16

    4.1 CBIS Context Diagram 23

    4.2 CBIS DFD Level 0 24

    4.3 CBIS DFD Level 1 Manage User 27

    4.4 CBIS DFD Level 1 Manage Profile 28

    4.5 CBIS DFD Level 1 Manage Questions 28

    4.6 CBIS DFD Level 1 Manage Category 30

    4.7 CBIS DFD Level 1 Manage Appointment 31

    4.8 CBIS DFD Level 1 Manage Tips 32

    4.9 CBIS DFD Level 1 Manage Consultation 33

    4.10 CBIS ERD 34

  • x

    LIST OF FIGURES

    CD Context Diagram

    DFD Data Flow Diagram

    ERD Entity Relationship Diagram

    FYP Final Year Project

    HCI Human Computer Interface

    GUI Graphical User Interface

  • 1

    CHAPTER 1:

    INTRODUCTION

  • 2

    1.1 PROJECT BACKGROUND

    Cyber bullying is any behaviour that is performed through electronic or digital media by

    individuals or groups that repeatedly communicates aggressive messages intended to impose

    harm or discomfort on others.1 Nowadays, there are many cyber bullying cases happened in

    the world of technology. One of the main platforms that cyber bullying is occurs in social

    media. Through social media itself, most of society opens to share their opinions with others.

    Sometimes there are few people dislike and uncomfortable with the opinion that been shared

    and they preferred to humiliate people without thinking others feeling.

    Cyber bullying also can include sharing personal or private information about someone else

    causing embarrassment or humiliation. Sometimes cyber bullying also can be easy to spot by

    text, tweet or response that is harsh, mean or cruel. Cyber bullying also can happen

    accidentally by impersonal nature of text message or email that is very hard to detect the

    senders’ intention.

    The examples of forms of cyber bullying are exclusion, trolling, catfishing, cyberstalking

    and many more.4 Exclusion means rejection of a person from an online group provoking

    his/her social depreciates. Next, trolling is the deliberate act of provoking a response through

    the use of insults or bad language on online forums and social networking sites. Meanwhile,

    the meaning of catfishing is when another person steals your online identity, usually photos,

    and re-creates social networking profiles for deceptive purposes. Cyberstalking refers to the

    practice of adults using the Internet to contact and attempt to meet with young people for

    sexual purposes.

    Generally, the generation that commonly that had been targeted with cyber bullying is

    young generation which is among students. Students are tends to expose with cyber bullying.

    Most of the students that are experienced cyber bully problems do not know how to manage

    it. As a result, it can distract student and can cause the students at greater risks in mental

    disorder problems such as depression, stress, anxiety and other related disorder.

  • 3

    1.2 PROBLEM STATEMENT

    The problem that usually arise when students did not know whether their actions such

    as comment, post status, share post and also personal message on the social media

    become as a threat toward others.

    Besides, students also did not how to overcome the cyber bullying problems. Most of

    the student that been experienced cyber bully feels embarrassed to share with others about

    being cyber bully and they tend not to give attention about it.

    Therefore, based on all problem statements it is important to develop a web based

    system to help student overcome the cyber bullying.

  • 4

    1.3 OBJECTIVE

    The objectives of Cyber Bully Identification System are to solve the problems that

    experienced by students.

    o To develop an efficient system for cyber bully identification among the students.

    o To analyse the category of the student whether the student is being cyber bullies or

    cyber bullied or in the middle between being cyber bullies and cyber bullied.

    o To provide tips and consultation based on the student category.

    1.4 SCOPE

    The scopes for this system are identified to make the development of process easier. The

    scope is users that are divided into three which are admin, students and psychologist.

    1.4.1 Admin

    Login

    Manage profile

    Manage question

    Manage category

    View report

    Student list.

    List of student based on category of cyber bullying.

  • 5

    1.4.2 Student

    Register.

    Manage profile.

    Follow the cyber bully questionnaires.

    View the category of student.

    View tips or deal appointment.

    1.4.3 Psychologist

    Login

    Manage profile

    Manage tips

    Manage consultation

    View Report

    List of student based on category of cyber bullying.

    List of consultation.

  • 6

    1.5 LIMITATION

    Limitation of work for this Cyber Bully Identification System is the system is only

    useful for the students who that experienced the cyber bullying and this system not

    available for others.

    Besides, this system cannot prevent the cyber bullying from happened, but it can

    reduce the cyber bullying from occur among the students by gaining the consultation.

    1.6 STRENGTH

    The strength of the system is to analyse the category of the student whether the student

    is being cyber bullies or cyber bullied or in the middle between being cyber bullies

    and cyber bullied. Through this identification system, the students can know their

    category and they can gain with the tips and make appointment for the consultation to

    overcome the cyber bullying problem. The psychologist can manage the tips and

    consultation.

  • 7

    1.7 THESIS ORGANIZATION

    This thesis consists of six chapters. In chapter 1, the content consists of system

    background, problem statement, objective, scope, limitation, strength of the system and also

    thesis organization.

    In chapter 2, consist of the literature review. Literature review itself is about reviewing the

    previous system. It is require study the related things about the system to gain better

    understanding and knowledge based on the system. For this proposed system is using rule

    based algorithm.

    In chapter 3, consist of the methodology. There has been having the description of the

    methodology and also about what model is used for the development. In chapter 4 which is

    system design, there are context diagram (CD), data flow diagram (DFD) and also entity-

    relationship diagram (ERD).

    In chapter 5, the implementation of system, testing and result that describe all of the

    processes involved during the development of the system. This chapter also consist of the

    interface of the system. For the last chapter which is chapter 6 consist of the conclusion of the

    whole system.

  • 8

    CHAPTER 2:

    LITERATURE

    REVIEW

  • 9

    2.1 INTRODUCTION

    Basically, in this chapter is reviewing about the previous projects. The related journals and

    articles were analysed to find out what are the differences between the previous system and

    the proposed system. The related system to cyber bullying identification is studied to gain the

    understanding about the development of this research and also gain knowledge to implement

    the system in the real situation. This proposed system is using rule based algorithm

    2.2 RELATED RESEARCH

    Based on the literature review, a few existing system related to proposed system are found.

    First, Cyberbullying Detection: A Step Toward a Safer Internet Yard (Lyon, France - April

    2012) is about cyberbullying detection system in a social network is to prevent or at least

    decrease the harassing and bullying incidents in cyberspace. This system is using rule based

    algorithm. The detection system will gives warnings if something suspicious is detected

    would greatly help the moderator to only focus on these. It will compared the foul words used

    most frequently by each gender and, based on a Wilcoxon signed rank test, determined that

    male and female authors used significantly. The system used a supervised learning approach,

    Support Vector Machine classifier using WEKA to detect cyberbullying.

    Next system is a Cyberbullying Detection using Time Series Modeling (Nektaria Potha,

    Manolis Maragoudakis – 2014). This cyberbullying detection system is about study the

    accuracy of predicting the level of cyberbullying attack using classification methods and also

    to examine potential patterns between the lingustic style of each predator. The method that

    been used by this system is Dynamic Time Warping (DTW). The identification of such a

    correlation between the aforementioned signals could assist the dialogue annotation process

    or even be used to identify repeated offenders that use the same dialogue style in their

    attacks. Particularity of DTW is that it compares two time series together by allowing a given

    point from one time series to be matched with one or several points from the other. There

    were two more methods that apply in this system which is Support Vector Machines (SVM)

    and Singular Value Decomposition (SVD). SVM is derived from statistical learning theory

    by Vapnik and Chervonenkis. It builds a model that assigns new examples into one category

  • 10

    or the other, making it a non-probabilistic a binary linear or non-linear classifier. SVD is

    mathematical technique called singular value decomposition (SVD) to identify patterns in the

    relationships between the terms and concepts contained in an unstructured collection of text.

    The last existing system that been research is Cyberbullying Identification Using Participant-

    Vocabulary Consistency (Elaheh Raisi, Bert Huang – 2016) is about Machine learning

    methods can potentially help provide better understanding of this phenomenon, but they must

    address several key challenges: the rapidly changing vocabulary involved in cyberbullying,

    the role of social network structure, and the scale of the data. The Ranking algorithm is been

    used in the system. This system introduces an automated, data-driven method for

    cyberbullying identification. The eventual goal of such work is to detect such harmful

    behaviors in social media and intervene, either by filtering or by providing advice to those

    involved. For each user ui, the system assign a bully score bi and a victim score vi. The bully

    score measures how much a user tends to bully others; likewise, victim score indicates how

    much a user tends to be bullied by other users. For each feature wk, the system associate a

    feature-indicator score that represents how much the feature is an indicator of a bullying

    interaction.

  • 11

    Table 2.1: Comparison of Journals

    Author/Journal/Yea

    r

    System Name Method Description Advantages

    Lyon, France - April 2012

    Cyberbullying Detection: A Step Toward a Safer Internet Yard

    Rule based Algorithm

    This research is about the main application of an effective cyberbullying detection system in a social network. It is used to prevent or at least decrease the harassing and bullying incidents in cyberspace.

    1. Cyberbullying detection can be used to provide better support and advice for the victim as well as monitoring and tracking the bully.

    2. allows the people in charge (for instance, teachers) to provide the required help and guidance for the victim or the bully.

    Nektaria Potha, Manolis Maragoudakis - 2014

    Cyberbullying Detection using Time Series Modeling

    Dynamic Time Warping (DTW)

    This research is about study the accuracy of predicting the level of cyberbullying attack using classification methods and also to examine potential patterns between the lingustic style of each predator. By using feature weighting and dimensionality reduction techniques, each signal is straightforwardly parsed by a neural network that forecasts the level of insult within a question given a window between two and three previous questions.

    1. By applying a Dynamic Time Warping algorithm, the similarity of the aforementioned signals was proved to exist, providing an immediate indicator for the severity of cyberbullying within a given dialogue.

    Elaheh Raisi, Bert Huang - 2016

    Cyberbullying Identification Using Participant-Vocabulary Consistency

    Ranking Algorithm

    This research is about Machine learning that can be useful in addressing the cyberbullying problem. The system identify three significant challenges for supervised cyberbullying detection. First, annotation requires expertise about culture, examination of the social structure of the individuals involved in each interaction. Second, reasoning about which individuals are involved in bullying should do joint, or collective, classification. Third, language

    1. To detect such harmful behaviors in social media and intervene, either by filtering or by providing advice to those involved.

  • 12

    is rapidly changing, especially among young populations, making the use of static text indicators prone to becoming outdated.

    2.3 RULE BASED ALGORITHM

    A rule based system is a set of “if-then” statements that are used as a way to store and

    manipulate knowledge to interpret information in a useful way. In software development, rule

    based algorithm can be used to create software that can provide solution. For example, there

    is a person that has been experienced cyber bullying. That person used the system and the

    system can provide the solution or consultation toward that person. Rule based algorithm

    itself is corresponding with the problem in place of human experts2.

    Machine learning rule based can be used in this proposed system because the data sets are

    provided to these algorithms, termed training sets, are used to learn a predictive model based

    on the observations within the data. The annotation of training sets may be used with

    supervised Machine Learning Rule Based is by using a categorical output describing the

    sample as belonging to a given category. The students need to answer question before can

    analysis their result. Due to the result, the system give the status of the students that are

    corresponding with category of cyber bullying.

    The partitioning process used by rule-based learning methods focuses on identifying

    subgroups of samples contained within the training set. In the context of the analysis of large-

    scale biological data sets, discrete developmental states can be identified within the training

    set given that samples belonging to a given state are likely to have similar characteristics. An

    additional benefit of rule-based learning methods is that they produce human-readable rules.

  • 13

    2.4 SUMMARY

    This chapter provide an overview regarding the concept to the proposed system. Based on the

    study that has been made, it shows that the literature review is the one of the important part in

    research or study of new idea. Through literature review, the researcher may know whether

    the idea has been studied or not.

  • 14

    CHAPTER 3:

    METHODOLOGY

  • 15

    3.1 INTRODUCTION

    In this chapter, it has cover the details of explanations of methodology that used in this

    project. This project use waterfall model consists of a detailed plan describing how to

    develop, maintain, replace and alter also enhance specific software. The life cycle of SDLC

    defines a methodology for improving the quality of software and the overall development

    process.

    3.2 RESEARCH ANALYSIS

    In developing the system, the Software Developing Life Cycle (SDLC) model chosen is

    Waterfall Model. The model also referred to as a linear-sequence life cycle model as shown

    in Figure 3.1. It is very simple to use and understand the model itself. In a Waterfall model,

    each phase must be completed fully before the next phase can begin. If there is any change, it

    cannot turn since it must follow the sequence phase. Usually, this model is useful for the

    small project and there is no uncertain requirement.

  • 16

    Figure 3.1: Waterfall Model

    The phases that involve in waterfall model are system and software requirements, analysis,

    program design, implementation or coding, testing and operations.

    3.3 METHODOLOGY for CBIS

    In this section, each phases of Waterfall Model is briefly described in developing

    Cyberbully Identification System (CBIS).

    3.3.1 System Requirements Phase

    In this phase, determine the problem that facing in cyberbully and determine the objective

    to overcome the problem. Identify the CBIS features and also the requirements. The features

    that are relevant to the CBIS are study through the use of similarities system. Besides, the

    references from the related journals also act as a guideline to develop the CBIS. For the time

    planning, a Gantt chart is created as the project planning timeline of CBIS.

  • 17

    3.3.2 Software Requirement and Analysis Phase

    The system requirement acquired and analysed. The problem statement, objective, system

    scope, limitation, strength and also literature review are also defined. For this phase, it can be

    referred in Chapter 1 and Chapter 2 in this report. Data related to CBIS is collected by

    referring to selected articles, journals and internet surfings. Based on the research study, the

    selected criteria pertaining to cyberbully issues have been rectified. The detail of system’s

    software also hardware requirements is illustrated in Chapter 3.4.

    3.3.3 Program Design Phase

    In this phase, the design of the system is identified and the prototype is developed based on

    the system functionalities. The data or requirement that is obtained during requirement

    analysis phase is converted into the system design. Few diagrams have been built such as

    Context Diagram (CD), Data Flow Diagram (DFD) level 0 and 1, Entity Relationship

    Diagram (ERD), Data Dictionary and also Interface Design. The detail of design phase is

    depicted in Chapter 4.

  • 18

    3.3.4 Implementation Phase

    For implementation or coding phase, the CBIS need to be developed using PHP and

    MySQL for the web based system. The editor tools to write the programming part is

    Notepad++ by using PHP language and MySQL for the database. In this phase, the Rule

    Based method provide the category to the students as the students need to answer the

    questionnaires first. Based on the category, the students can choose whether want to make

    appointment with psychologist or not. Xampp is run as localhost server to connect between

    the coding and databases. This phase is critical phase where based on the user requirement

    need to be developed.

    3.3.4 Testing Phase

    Testing of CBIS is vital to ensure the functionality of cyberbully identification module.

    Intention of testing is to discover error so that the error found can be corrected and thus lead

    to a better system built. This process helps in discovering the vulnerabilities that are not

    discovered in the previous phase.

  • 19

    3.4 Software and Hardware Requirements

    When developing the system, the standard requirement would use in software and

    hardware. Each of these requirements is related one to another to ensure the system could be

    done smoothly.

    3. 4.1 Software Requirements

    The list of the software used in CBIS is as below.

    Table 3.1: CBIS Software Requirements

    SOFTWARE DESCRIPTION

    Microsoft Office 2010 As the platform for the documentation and

    presentation.

    NotePad ++ Editor write coding using PHP language for

    develop a system.

    Microsoft Edge, Google Chrome Browser for run a system and fine research

    about the system.

    Xampp Server version 3.2.2 Act as local server to run and test the system.

    It contains Apache and MySQL.

    phpMyAdmin Open source relational database management

    system that uses structured Query and stored

    the data of the system.

    Dropbox version 48.4.58 Application for backup the file system and

    the data.

  • 20

    3. 4.2 Hardware Requirements

    The list of the hardware requirements is illustrated in Table 3.2

    Table 3.2: CBIS Hardware Requirements

    HARDWARE DESCRIPTION

    Laptop ASUS Processor: Intel BYT-M4Core @ 2.66GHz

    RAM: 2GB

    OS: Windows 10

    Printer Canon

    3.5 SUMMARY

    This chapter discusses the methodology used for the system development, hardware and

    software required to develop this system. Each methodology can be chose according to the

    complexity of the system. Choosing the right development methodology is important since it

    can affect the development process. The right methodology can help to accomplish the

    project timely manner as referred to project Gantt chart and also fulfil the requirement of the

    system.

  • 21

    CHAPTER 4:

    DESIGN

  • 22

    4.1 INTRODUCTION

    Design is the method that is used to define and analyse data requirements to support the

    software development project. The main function of this section is to show the flow how the

    system goes during the design phase. Modelling of the project can be explained by Context

    Diagram (CD), Data Flow Diagram (DFD) and Entity Relationship Diagram (ERD).

    4.2 SYSTEM DESIGN AND MODELLING

    In this subtopic, the flow of the system is organized so that the system development can

    progress smoothly. Conceptual data modelling is the representation of data available in the

    organization and also display the overall structure of the data available, regardless of the

    physical technology involved. Modelling process involves graphical representation of the

    functions and processes for the development of the system before the system was developed.

  • 23

    4.2.1 CONTEXT DIAGRAM

    Figure 4.1: CBIS Context Diagram

    The Figure 4.1 shows the context diagram for Cyberbully Identification System which

    includes 3 entities which are STUDENT, ADMIN and PSYCHOLOGIST. There are twelve

    data flows involved in the interaction between the entities and the central process. The

    STUDENT entity has one incoming data flow; category details and also has one outgoing

    data flow; user details. The ADMIN entity has two incoming data flow; student report and

    student-category report. There are three outgoing data flows which are user details, category

    details and question details. The PSYCHOLOGIST entity has three incoming data flows and

    two outgoing data flows. The three incoming data flows are appointment details, consultation

    report and student-category report. The two outgoing data flows are user details and

    consultation details.

  • 24

    4.2.2 DATA FLOW DIAGRAM

    Data Flow Diagram (DFD) is a process that all users have to face.

    4.2.2.1 DATA FLOW DIAGRAM Level 0

    Figure 4.2: CBIS DFD Level 0

  • 25

    The Figure 4.2 shows the data flow diagram (DFD) of level 0 for Cyberbully Identification

    System. The data flow diagram has three entities which are STUDENT, ADMIN and

    PSYCHOLOGIST. The processes that involved in Cyberbully Identification System are

    MANAGE USER, MANAGE PROFILE, MANAGE QUESTION, MANAGE CATEGORY,

    MANAGE APPOINTMENT, MANAGE TIPS, MANAGE CONSULTATION and

    GENERATE REPORT. There were nine data stores created in the system which are USER,

    STUDENT, ADMIN, PSYCHOLOGIST, QUESTION, CATEGORY, APPOINTMENT,

    TIPS and CONSULTATION.

    1. USER enters IC number and password to MANAGE USER process which outputs IC

    number and password into USER data store.

    2. The USER whether the STUDENT, ADMIN or PSYCHOLOGIST can manage their

    profile with input such as student, admin and psychologist details to MANAGE

    PROFILE process which outputs student, admin and psychologist record into three

    data store that are STUDENT, ADMIN and PSYCHOLOGIST data store. The three

    data stores do store all information about the STUDENT, ADMIN and

    PSYCHOLOGIST.

    3. The ADMIN can manage the questions by insert the question details into MANAGE

    QUESTION process and become output question record then store in QUESTION

    data store.

    4. The ADMIN can manage the category by insert category details into MANAGE

    CATEGORY process and become output category record then store in CATEGORY

    data store.

    5. The STUDENT can manage the appointment by insert appointment details using

    category details into MANAGE APPOINTMENT process and become output

  • 26

    appointment record then store in APPOINTMENT data store. The PSYCHOLOGIST

    also does receive the appointment details from the process.

    6. The PSYCHOLOGIST can manage the tips by insert tips details into MANAGE TIPS

    process and become output tips record then store in TIPS data store. Meanwhile, the

    PSYCHOLOGIST also manage the consultation by insert the consultation details into

    MANAGE CONSULTATION process and become output consultation record then

    store in CONSULTATION data store.

    7. There are a few reports that output by process GENERATE REPORT by input all

    details in all data store.

  • 27

    4.2.2.2 DATA FLOW DIAGRAM Level 1

    4.2.2.2.1 DFD Level 1 Process 1: Manage User

    Figure 4.3: CBIS DFD Level 1 Manage User

    Description:

    1. The STUDENT, ADMIN and PSYCHOLOGIST can inputs user details and ADD

    USER process send the user record to the USER data store.

    2. STUDENT, ADMIN and PSYCHOLOGIST can update their details by input student

    details, admin details and psychologist details into UPDATE USER process and the

    process send all of the records to the USER data store.

  • 28

    4.2.2.2.2 DFD Level 1 Process 2: Manage Profile

    Figure 4.4: CBIS DFD Level 1 Manage Profile

    Description:

    1. STUDENT, ADMIN and PSYCHOLOGIST can edit their profile by input their

    details; student details, admin details and psychologist details into EDIT PROFILE

    process. The process sends all of the records to the STUDENT, ADMIN and

    PSYCHOLOGIST data stores.

    2. VIEW PROFILE process can be accessed by the STUDENT, ADMIN and

    PSYCHOLOGIST after they make any changes in the EDIT PROFILE process.

  • 29

    4.2.2.2.3 DFD Level 1 Process 3: Manage Question

    Figure 4.5: CBIS DFD Level 1 Manage Questions

    Description:

    1. The ADMIN can input the question details to the ADD QUESTION process. The

    process sends the question record to QUESTION data store. Then, data store send

    back the question record to the ADD QUESTION process.

    2. The ADMIN can edit question details by input question details to EDIT QUESTION

    process and the process sends the question record to QUESTION data store. The data

    store send back about the question record.

    3. The ADMIN can also delete about question details by input the question details to

    DELETE QUESTION process and the process send the record to QUESTION data

    store. Then, data store send back about the record.

  • 30

    4.2.2.2.4 DFD Level 1 Process 4: Manage Category

    Figure 4.6: CBIS DFD Level 1 Manage Category

    Description:

    1. The ADMIN can input the category details to the ADD CATEGORY process. The

    process sends the category record to CATEGORY data store. Then, data store send

    back the category record to the ADD CATEGORY process.

    2. The ADMIN can edit category details by input category details to EDIT CATEGORY

    process and the process sends the category record to CATEGORY data store. The

    data store send back about the category record.

  • 31

    4.2.2.2.5 DFD Level 1 Process 5: Manage Appointment

    Figure 4.7: CBIS DFD Level 1 Manage Appointment

    Description:

    1. The STUDENT can input the appointment details to the ADD APPOINTMENT

    process. The process sends the appointment record to APPOINTMENT data store.

    The appointment has made is based on the category that the student gain. Then, data

    store send back the appointment record to the ADD APPOINTMENT process.

    2. The STUDENT also can edit appointment details by input appointment details to

    EDIT APPOINTMENT process and the process sends the appointment record to

    APPOINTMENT data store. The data store send back about the appointment record.

    3. The PSYCHOLOGIST does receive the appointment details after process ADD

    APPOINTMENT and EDIT APPOINTMENT had been done.

  • 32

    4.2.2.2.6 DFD Level 1 Process 6: Manage Tips

    Figure 4.8: CBIS DFD Level 1 Manage Tips

    Description:

    1. The PSYCHOLOGIST can input the tips details to the ADD TIPS process. The

    process sends the tips record to TIPS data store. Then, data store send back the tips

    record to the ADD TIPS process.

    2. The PSYCHOLOGIST can edit tips details by input tips details to EDIT TIPS process

    and the process sends the tips record to TIPS data store. The data store send back

    about the tips record.

    3. The PSYCHOLOGIST can also delete about tips details by input the tips details to

    DELETE TIPS process and the process sends the record to TIPS data store. Then,

    data store send back about the record.

  • 33

    4.2.2.2.7 DFD Level 1 Process 7: Manage Consultation

    Figure 4.9: CBIS DFD Level 1 Manage Consultation

    Description:

    1. The PSYCHOLOGIST can input the consultation details to the ADD

    CONSULTATION process. The process sends the consultation record to

    CONSULTATION data store. Then, data store send back the consultation record to

    the ADD CONSULTATION process.

    2. The PSYCHOLOGIST can edit consultation details by input consultation details to

    EDIT CONSULTATION process and the process sends the consultation record to

    CONSULTATION data store. The data store send back about the consultation record.

    3. The PSYCHOLOGIST can also delete about consultation details by input the

    consultation details to DELETE CONSULTATION process and the process send the

    record to CONSULTATION data store. Then, data store send back about the record.

  • 34

    4.2.3 ENTITY RELATIONSHIP DIAGRAM

    Figure 4.10: CBIS ERD

    The Figure 4.10 shows the entity relationship diagram for Cyberbully Identification System

    which includes 10 entities. There are user, admin, student, psychologist, question, answer,

    category, appointment, tips, and consultation.

  • 35

    4.3 DATA DICTIONARY

    Data dictionary shows how the data been stored in the database of the system.

    1. Table USER

    Table 4.1: CBIS USER Data Dictionary

    No. ATTRIBUTE DESCRIPTION TYPE KEY LENGTH DEFAULT NULL

    1. USER_username Unique id that holds by user. It can be used to verify their authorization to the system.

    VARCHAR (12)

    Foreign key

    12 - -

    2. USER_password The key to allowed authorized admin to login into the system. e.g password in the system is ‘123’

    VARCHAR (40)

    - 40 NULL YES

    Table 4.1 shows that the attributes of table USER in the database. There are two attributes

    which is USER_username and USER_password.

  • 36

    2. Table STUDENT

    Table 4.2: CBIS STUDENT Data Dictionary

    No. ATTRIBUTE DESCRIPTION TYPE KEY LENGTH DEFAULT NULL

    1. STUDENT_IC Unique id that holds by user. It can be used to verify their authorization to the system.

    VARCHAR (12)

    Primary key

    12 - -

    2. STUDENT_name Represent the name of the student of the system. e.g: STUDENT_name in the system is ‘Ahmad Fulan’

    VARCHAR (50)

    - 50 - -

    3. STUDENT_gender Represent the student gender. e.g: STUDENT_gender in the system is ‘male’

    VARCHAR (10)

    - 10 - -

    4. STUDENT_address Represent the email of the student. e.g: STUDENT_email in the system is ‘[email protected]

    VARCHAR (100)

    - 100 - -

    5. STUDENT_dob Represent the date of birth of the student.

    DATE - - - -

    6. STUDENT_email Represent the email of the student. e.g: STUDENT_email in the system is ‘[email protected]

    VARCHAR (50)

    - 50 - -

    7. STUDENT_contactNo Represent the contact number of each student in the system e.g: STUDENT_contactNo in the system is ‘012323211’

    VARCHAR (13)

    - 13 - -

    8. STUDENT_ universityName

    Represent the name of university for each student in the system e.g STUDENT_ universityName in the system is ‘UKM’

    VARCHAR (150)

    - 150 - -

  • 37

    Table 4.2 shows that the attributes of table STUDENT in the database. There are eight

    attributes which is STUDENT_IC, STUDENT_name, STUDENT_gender,

    STUDENT_address, STUDENT_dob, STUDENT_email, STUDENT_contactNo and

    STUDENT_universityName.

  • 38

    3. Table ADMIN

    Table 4.3: CBIS ADMIN Data Dictionary

    No. ATTRIBUTE DESCRIPTION TYPE KEY LENGTH DEFAULT NULL

    1. ADMIN_IC Unique id that holds by user. It can be used to verify their authorization to the system.

    VARCHAR (12)

    Primary key

    12 - -

    2. ADMIN _name Represent the name of the admin of the system. e.g: ADMIN _name in the system is ‘Ahmad Fulan’

    VARCHAR (50)

    - 50 - -

    3. ADMIN _gender Represent the admin gender. e.g: ADMIN _gender in the system is ‘male’

    VARCHAR (10)

    - 10 - -

    4. ADMIN _address Represent the email of the admin. e.g: ADMIN _email in the system is ‘[email protected]

    VARCHAR (100)

    - 100 - -

    5. ADMIN _dob Represent the date of birth of the admin.

    DATE - - - -

    6. ADMIN _email Represent the email of the admin. e.g: ADMIN _email in the system is ‘[email protected]

    VARCHAR (50)

    - 50 - -

    7. ADMIN _contactNo Represent the contact number of each admin in the system e.g: ADMIN _contactNo in the system is ‘012323211’

    VARCHAR (13)

    - 13 - -

  • 39

    Table 4.3 shows that the attributes of table ADMIN in the database. There are seven

    attributes which is ADMIN_IC, ADMIN_name, ADMIN_gender, ADMIN_address,

    ADMIN_dob, ADMIN_email and ADMIN_contactNo.

  • 40

    4. Table PSYCHOLOGIST

    Table 4.4: CBIS PSYCHOLOGIST Data Dictionary

    No. ATTRIBUTE DESCRIPTION TYPE KEY LENGTH DEFAULT NULL

    1. PSYCHOLOGIST _IC

    Unique id that holds by user. It can be used to verify their authorization to the system.

    VARCHAR (12)

    Primary key

    12 - -

    2. PSYCHOLOGIST _name

    Represent the name of the psychologist in the system. e.g: PSYCHOLOGIST _name in the system is ‘Ahmad Fulan’

    VARCHAR (50)

    - 50 - -

    3. PSYCHOLOGIST _gender

    Represent the psychologist gender. e.g: PSYCHOLOGIST _gender in the system is ‘male’

    VARCHAR (10)

    - 10 - -

    4. PSYCHOLOGIST _address

    Represent the email of the psychologist. e.g: PSYCHOLOGIST _email in the system is ‘[email protected]

    VARCHAR (100)

    - 100 - -

    5. PSYCHOLOGIST _dob

    Represent the date of birth of the psychologist.

    DATE - - - -

    6. PSYCHOLOGIST _email

    Represent the email of the psychologist. e.g: PSYCHOLOGIST _email in the system is ‘[email protected]

    VARCHAR (50)

    - 50 - -

    7. PSYCHOLOGIST _contactNo

    Represent the contact number of each psychologist in the system e.g: PSYCHOLOGIST _contactNo in the system is ‘012323211’

    VARCHAR (13)

    - 13 - -

  • 41

    Table 4.4 shows that the attributes of table PSYCHOLOGIST in the database. There are

    seven attributes which is PSYCHOLOGIST_IC, PSYCHOLOGIST_name,

    PSYCHOLOGIST_gender, PSYCHOLOGIST_address, PSYCHOLOGIST_dob,

    PSYCHOLOGIST_email and PSYCHOLOGIST_contactNo.

  • 42

    5. Table QUESTION

    Table 4.5: CBIS QUESTION Data Dictionary

    No. ATTRIBUTE DESCRIPTION TYPE KEY LENGTH DEFAULT NULL

    1. QUESTION_questionID

    Unique id that holds by question.

    VARCHAR (10)

    Primary key

    10 - -

    2. QUESTION_description

    Represent the description of each question in the system.

    VARCHAR (100)

    - 100 - -

    3. QUESTION_marks Represent the marks of each question in the system.

    INT(10) - 10 - -

    4. QUESTION_IC Represent of the unique id that holds by student.

    VARCHAR(12)

    Foreign Key

    12 - -

    Table 4.5 shows that the attributes of table QUESTION in the database. There are four

    attributes which is QUESTION_questionID, QUESTION_description, QUESTION_marks,

    and QUESTION_IC.

  • 43

    6. Table ANSWER

    Table 4.6: CBIS ANSWER Data Dictionary

    No. ATTRIBUTE DESCRIPTION TYPE KEY LENGTH DEFAULT NULL

    1. ANSWER_IC Represent of the unique id that holds by student.

    VARCHAR (12)

    Primary key

    12 - -

    2. ANSWER_Marks Represent the marks of question in the system.

    INT(10) - 10 - -

    3. ANSWER_Date Represent the date of the student answer the question in the system.

    DATE - - - -

    Table 4.6 shows that the attributes of table ANSWER in the database. There are three

    attributes which is ANSWER_IC, ANSWER_Marks, and ANSWER_Date.

  • 44

    7. Table CATEGORY

    Table 4.7: CBIS CATEGORY Data Dictionary

    No. ATTRIBUTE DESCRIPTION TYPE KEY LENGTH DEFAULT NULL

    1. CATEGORY_categoryID

    Represent of the

    unique id that holds by each category.

    VARCHAR (10)

    Primary key

    10 - -

    2. CATEGORY_IC Represent of the unique id that holds by admin.

    VARCHAR(12)

    Foreign Key

    12 - -

    3. CATEGORY_minMarks

    Represent the min marks of each category in the system.

    INT(10) - 10 - -

    4. CATEGORY_maxMarks

    Represent the max marks of each category in the system.

    INT(10) - 10 - -

    Table 4.7 shows that the attributes of table CATEGORY in the database. There are four

    attributes which is CATEGORY_categoryID, CATEGORY_IC, CATEGORY_minMarks

    and CATEGORY_maxMarks.

  • 45

    8. Table APPOINTMENT

    Table 4.8: CBIS APPOINTMENT Data Dictionary

    No. ATTRIBUTE DESCRIPTION TYPE KEY LENGTH DEFAULT NULL

    1. APPOINTMENT _appointmentID

    Represent of the

    unique id that holds by appointment in the system.

    VARCHAR (10)

    Primary Key

    10 - -

    2. APPOINTMENT _categoryID

    Represent of the

    unique id that holds by each category.

    VARCHAR (10)

    Foreign Key

    10 - -

    3. APPOINTMENT_IC Represent of the unique id that holds by student.

    VARCHAR(12)

    Foreign Key

    12 - -

    4. APPOINTMENT _appDate

    Represent the date of the student make the appointment in the system.

    DATE - - - -

    Table 4.8 shows that the attributes of table APPOINTMENT in the database. There are four

    attributes which is APPOINTMENT_appointmentID, APPOINTMENT_categoryID,

    APPOINTMENT_IC and APPOINTMENT_appDate.

  • 46

    9. Table CONSULTATION

    Table 4.9: CBIS CONSULTATION Data Dictionary

    No. ATTRIBUTE DESCRIPTION TYPE KEY LENGTH DEFAULT NULL

    1. CONSULTATION _consultationID

    Unique id that holds by consultation.

    VARCHAR (10)

    Primary key

    10 - -

    2. CONSULTATION _description

    Represent the description of each consultation in the system.

    VARCHAR (50)

    - 50 - -

    3. CONSULTATION _consDate

    Represent the date of the consultation in the system.

    DATE - - - -

    4. CONSULTATION _categoryID

    Represent of the

    unique id that holds by each category.

    VARCHAR (10)

    Foreign Key

    10 - -

    5. CONSULTATION _IC

    Represent of the

    unique id that holds by student.

    VARCHAR(12)

    Foreign Key

    12 - -

    Table 4.9 shows that the attributes of table CONSULTATION in the database. There are five

    attributes which is CONSULTATION_consultationID, CONSULTATION_description,

    CONSULTATION_consDate, CONSULTATION_categoryID and CONSULTATION_IC.

  • 47

    10. Table TIPS

    Table 4.10: CBIS TIPS Data Dictionary

    No. ATTRIBUTE DESCRIPTION TYPE KEY LENGTH DEFAULT NULL

    1. TIPS_tipsID Unique id that holds by tips.

    VARCHAR (10)

    Primary key

    10 - -

    2. TIPS_description Represent the description of each tips in the system.

    VARCHAR (50)

    - 50 - -

    3. TIPS_categoryID Represent of the unique id that holds by each category.

    VARCHAR (10)

    Foreign Key

    10 - -

    4. TIPS_IC Represent of the unique id that holds by student.

    VARCHAR(12)

    Foreign Key

    12 - -

    Table 4.10 shows that the attributes of table TIPS in the database. There are four attributes

    which is TIPS_tipsID, TIPS_description, TIPS_categoryID and TIPS_IC.

  • 48

    REFERENCES

  • 49

    JOURNALS AND ARTICLES

    1. Cyberbullying Detection: A Step Toward a Safer Internet Yard ( Lyon, France - April 2012)

    2. Cyberbullying Detection using Time Series Modeling ( Nektaria Potha, Manolis Maragoudakis – 2014)

    3. Cyberbullying Identification Using Participant-Vocabulary Consistency (Elaheh Raisi, Bert Huang –

    2016)

    4. Thesis Final Year Project Early Prediction of Lung Cancer System By Using Rule-Based ( Nurul

    Athirah Bt. Aziz – August 2016)

    INTERNET SURFINGS

    1. https://www.stopbullying.gov/cyberbullying/what-is-it/index.html

    2. http://www.endcyberbullying.org/5-different-types-of-cyberbullying/

    3. https://kids.kaspersky.com/10-forms-of-cyberbullying/

    4. http://www.plantcell.org/content/23/9/3101

    http://www.endcyberbullying.org/5-different-types-of-cyberbullying/http://www.plantcell.org/content/23/9/3101