SECURING CYBERSPACE AGAINST CYBERBULLYING: A WIRELESS NETWORK SECURITY PERSPECTIVE
Abstract
Cyberbullying has emerged as a pervasive issue in today''''s digitally connected society, with detrimental effects on individuals’ mental health and well-being. Despite increasing awareness and efforts to address cyberbullying, there remains a significant gap in utilizing wireless network security measures as a means of mitigation. The existing literature predominantly focuses on social and psychological aspects of cyberbullying, overlooking the potential role of wireless network security in prevention and intervention strategies. This research seeks to fill this gap by exploring the effectiveness of leveraging wireless network security to secure cyberspace against cyberbullying incidents. The research employs a multifaceted methodology, beginning with the estimation of expected rates and derivative risks of cyberbullying within wireless networks. These metrics are combined into a risk index value, which serves as a basis for prioritizing mitigation efforts. Additionally, the study explores the application of cyberspace modeling techniques, specifically Support Vector Machines (SVM), to enhance screening processes and identify potential cyberbullying incidents on Wireless Network Security (WNS). The findings of this research demonstrate the efficacy of integrating wireless network security measures into cyberbullying prevention strategies. By combining risk index values and leveraging SVM-based cyberspace modeling, the study identifies and prioritizes cyberbullying risks effectively. Furthermore, the implementation of wireless network security protocols contributes to a reduction in cyberbullying incidents, fostering safer digital environments for users.

Authors
Neerav Nishant1, Parul Saxena2, S.G. Surya3, Ullal Akshatha Nayak4, Subharun Pal5
Soban Singh Jeena University, India1,2,4, SCMS School of Engineering and Technology, India3, Swiss School of Management, Switzerland5

Keywords
Cyberbullying, Wireless Network Security, Risk Assessment, Support Vector Machines (SVM), Prevention Strategies
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
000700000000
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 15 , Issue: 1 , Pages: 3146 - 3152 )
Date of Publication :
March 2024
Page Views :
53
Full Text Views :
7

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.