Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 154 tok/s
Gemini 2.5 Pro 48 tok/s Pro
GPT-5 Medium 36 tok/s Pro
GPT-5 High 33 tok/s Pro
GPT-4o 70 tok/s Pro
Kimi K2 184 tok/s Pro
GPT OSS 120B 437 tok/s Pro
Claude Sonnet 4.5 36 tok/s Pro
2000 character limit reached

AI-Cybersecurity Education Through Designing AI-based Cyberharassment Detection Lab (2405.08125v2)

Published 13 May 2024 in cs.CY, cs.AI, and cs.LG

Abstract: Cyberharassment is a critical, socially relevant cybersecurity problem because of the adverse effects it can have on targeted groups or individuals. While progress has been made in understanding cyber-harassment, its detection, attacks on AI based cyberharassment systems, and the social problems in cyberharassment detectors, little has been done in designing experiential learning educational materials that engage students in this emerging social cybersecurity in the era of AI. Experiential learning opportunities are usually provided through capstone projects and engineering design courses in STEM programs such as computer science. While capstone projects are an excellent example of experiential learning, given the interdisciplinary nature of this emerging social cybersecurity problem, it can be challenging to use them to engage non-computing students without prior knowledge of AI. Because of this, we were motivated to develop a hands-on lab platform that provided experiential learning experiences to non-computing students with little or no background knowledge in AI and discussed the lessons learned in developing this lab. In this lab used by social science students at North Carolina A&T State University across two semesters (spring and fall) in 2022, students are given a detailed lab manual and are to complete a set of well-detailed tasks. Through this process, students learn AI concepts and the application of AI for cyberharassment detection. Using pre- and post-surveys, we asked students to rate their knowledge or skills in AI and their understanding of the concepts learned. The results revealed that the students moderately understood the concepts of AI and cyberharassment.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (34)
  1. Allen, G. I. 2021. Experiential learning in data science: Developing an interdisciplinary, client-sponsored capstone program. 516–522.
  2. An undergraduate degree in data science: curriculum and a decade of implementation experience. 145–150.
  3. Experiential Learning in Data Science Through a Novel Client-Facing Consulting Course. 1–9.
  4. Challenge, H. M. 2020. Hateful Memes Challenge and Data Set. https://ai.facebook.com/tools/hatefulmemes/. Accessed: 2024-02-20.
  5. Ducharme, D. 2017. Machine Learning for the Automated Identification of Cyberbullying and Cyberharassment. Ph.D. thesis, University of Rhode Island.
  6. Teaching Data Science to Post Graduate Students: A Preliminary Study Using a” FLIP” Class Room Approach. International Association for Development of the Information Society.
  7. Facebook. 2023. AI advances to better detect hate speech. https://ai.facebook.com/blog/ai-advances-to-better-detect-hate-speech/. Accessed: 2023-11-01.
  8. Explaining and Harnessing Adversarial Examples.
  9. Google-Jigsaw. 2019. Google’s Hate Speech Detection A.I. Has a Racial Bias Problem. https://fortune.com/2019/08/16/google-jigsaw-perspective-racial-bias/. Accessed: 2023-11-01.
  10. First Year Engineering Design: Course Design, Projects, Challenges, and Outcomes. 1–9.
  11. Learning styles and learning spaces: Enhancing experiential learning in higher education. Academy of management learning & education, 4(2): 193–212.
  12. Kolb, D. A. 2014. Experiential learning: Experience as the source of learning and development. FT press.
  13. TextBugger: Generating Adversarial Text Against Real-world Applications.
  14. Enacting socio-technical responsibility through Challenge Based Learning in an Ethics and Data Analytics course. 1–7.
  15. Teaching and Learning Cybersecurity Awareness with Gamification in Smaller Universities and Colleges. 1–9.
  16. Fairness Through Robustness: Investigating Robustness Disparity in Deep Learning. CoRR, abs/2006.12621.
  17. Cross-course project-based learning in requirements engineering: An eight-year retrospective. 1–9.
  18. Effect of instructional methods on student performance in flipped classroom. 1–9.
  19. AAEBERT: Debiasing BERT-based Hate Speech Detection Models via Adversarial Learning. In 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), 1606–1612. IEEE.
  20. Patchin, J. W. 2019. Cyberbullying Statistics. https://cyberbullying.org/2019-cyberbullying-data.
  21. Qualtrics. 2024. Qualtrics. https://www.qualtrics.com/. Accessed: 2024-02-20.
  22. A data science major: Building skills and confidence. 178–184.
  23. Designing and implementing an AI education program for learners with diverse background at scale. 1–8.
  24. Facilitating 21st century skills in engineering students. The Journal of Engineering Education, 26(1): 38–49.
  25. The Risk of Racial Bias in Hate Speech Detection. 1668–1678.
  26. Experiential learning in data science: From the dataset repository to the platform of experiences. 122–130.
  27. Social-Cybersecurity. 2019a. Center for Informed Democracy & Social-Cybersecurity. https://www.cmu.edu/ideas-social-cybersecurity/. Accessed: 2023-11-01.
  28. Social-Cybersecurity, C. 2019b. CASOS. http://www.casos.cs.cmu.edu/projects/projects/social_cyber_security.php. Accessed: 2023-11-01.
  29. Swearer, D. E. S. 2013. Research on school bullying and victimization: What have we learned and where do we go from here? School Psychology Review, 365–383.
  30. SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. 473–493.
  31. Designing a Data Science Course for Non-Computer Science Students: Practical Considerations and Findings. 1–9.
  32. Understanding the overlap between cyberbullying and cyberhate perpetration: Moderating effects of toxic online disinhibition. Criminal Behaviour and Mental Health, 29(3): 179–188.
  33. Adversarial Attacks on Deep-learning Models in Natural Language Processing: A Survey. ACM Trans. Intell. Syst. Technol., 11(3): 1–41.
  34. Content-Driven Detection of Cyberbullying on the Instagram Social Network. 3952–3958.

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets

This paper has been mentioned in 2 tweets and received 1 like.

Upgrade to Pro to view all of the tweets about this paper: