Cloud Computing and AI for Cyberstalking Prevention: A Comprehensive Approach
Meena Tiwari, Vivek Kumar Patel
DOI: http://dx.doi.org/10.15439/2024R74
Citation: Proceedings of the 2024 Ninth International Conference on Research in Intelligent Computing in Engineering, Vijender Kumar Solanki, Tran Duc Tan, Pradeep Kumar, Manuel Cardona (eds). ACSIS, Vol. 42, pages 139–146 (2024)
Abstract. Cyberstalking has become an increasingly prevalent and concerning issue in today's digital landscape. The widespread use of online platforms and social media has made individuals more susceptible to predatory behavior. This study delves into the potential of utilizing cloud computing and artificial intelligence (AI) to improve the identification, prevention, and reduction of cyberstalking. It investigates how AI-driven models and cloud infrastructure can work together to provide scalable, real-time solutions to combat this problem. The research also delves into the ethical considerations, technological frameworks, and legal ramifications of integrating AI into the battle against cyberstalking, with the goal of presenting a comprehensive strategy for future implementations.
References
- Marinos, A., & Briscoe, G. (2009). Community cloud computing. In Cloud Computing (pp. 472-484).
- Armbrust, M., et al. (2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
- Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys (CSUR), 41(3), 1-58.
- Cambria, E., & White, B. (2014). Jumping NLP curves: A review of natural language processing research. IEEE Computational Intelligence Magazine, 9(2), 48-57.
- Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications, 1, 7-18.
- Liu, B. (2012). Sentiment analysis and opinion mining. Synthesis Lectures on Human Language Technologies, 5(1), 1-167.
- Bishop, C. M. (2006). Pattern recognition and machine learning. Springer.
- Gillespie, T. (2018). Custodians of the internet: Platforms, content moderation, and the hidden decisions that shape social media. Yale University Press.
- Chawla, N. V., & Davis, D. A. (2013). Bringing big data to personalized healthcare: A patient-centered framework. Journal of General Internal Medicine, 28(3), 660-665.
- Kumar, S., & Sachdeva, M. (2020). Cyberbullying and cyberstalking detection on social media: A comprehensive survey.
- Gursoy, F., Yildirim, I., Demirbas, M., & Akbas, M. (2021). Cyberbullying detection with BERT and LSTM models. IEEE Access, 9, 104257-104267.
- Basu, M., Mukherjee, A., & Pal, R. (2022). Using AI for detecting and mitigating cyberstalking in real-time. Journal of Computational Social Science, 5(2), 345-367.
- Gupta, A., & Rathore, V. (2023). Deep learning approaches for cyberstalking detection on social media platforms. IEEE Transactions on Computational Social Systems, 10(1), 58-69.
- Lin, Y., Zhao, J., & Li, P. (2024). A cloud-based framework for cyberstalking detection in social media. Journal of Cloud Computing, 13(4), 123-134.
- Alsuhibany, S.A. (2023). "A Machine Learning Approach for Cyberbullying and Cyberstalking Detection." Journal of Information Security Research, 11(3), 45-55.
- Chandrasekaran, R., Ahluwalia, P., & Seth, V. (2023). "Leveraging Cloud-based AI Tools for Cybercrime Detection and Prevention." International Journal of Cybersecurity, 18(4), 221-234.
- Kumar, P., & Kumari, P. (2022). "AI-Driven Solutions for Cyberstalking Prevention." Journal of Cybersecurity Research, 15(2), 112-125.
- Martin, J., & Zulfikar, F. (2022). "Cyberstalking Prevention with Cloud AI: A Comparative Study." Cloud Computing and AI Applications, 20(1), 35-47.
- Smith, A., Brown, T., & Wilson, R. (2021). "Utilizing AI for Cybercrime Prevention: A Focus on Cyberstalking." Journal of AI and Security Studies, 19(3), 174-187.
- Johnson, R., & Patel, M. (2023). "AI-Powered Social Media Monitoring for Cyberstalking Detection." Journal of Digital Security and Privacy, 12(1), 55-67.
- Nasir, Q., Arshad, H., Ullah, A., & Haider, S. (2020). A Survey of Cybersecurity in Cloud Computing: Issues, Threats, and Solutions. The Computer Journal, 63(1), 78-100.
- Reis, J., Benevenuto, F., Melo, P., Prates, R., Kwak, H., & An, J. (2020). Can Machine Learning Automate Moderation? A Study on Abusive Language Detection in Online Social Networks. ACM Transactions on the Web (TWEB), 14(4), 1-30.
- Verma, R., & Hossain, N. (2017). Exploring Cyberstalking Behaviors Using Machine Learning. IEEE Conference on Big Data Security on Cloud (BigDataSecurity), 12-16.
- Sood, A. K., & Enbody, R. J. (2013). Targeted Cyberattacks: A Superset of Advanced Persistent Threats. IEEE Security & Privacy, 11(1), 54-61.