International Journal of Advanced Artificial Intelligence Research

  1. Home
  2. Archives
  3. Vol. 2 No. 02 (2025): Volume 02 Issue 02
  4. Articles
International Journal of Advanced Artificial Intelligence Research

Article Details Page

ENHANCING AI-CYBERSECURITY EDUCATION: DEVELOPMENT OF AN AI-BASED CYBERHARASSMENT DETECTION LABORATORY EXERCISE

Authors

  • Prof. Michael T. Edwards School of Cybersecurity and Privacy, Georgia Institute of Technology, USA

DOI:

https://doi.org/10.55640/ijaair-v02i02-02

Abstract

The escalating prevalence of cyberharassment and online abuse poses significant challenges to digital safety and mental well-being, necessitating advanced detection and mitigation strategies. Artificial intelligence (AI), particularly machine learning and natural language processing (NLP), offers powerful tools for identifying such malicious content. However, effectively integrating AI concepts into cybersecurity education, especially concerning social-cybersecurity threats, remains an evolving field. This article details the design and pedagogical rationale behind an AI-based cyberharassment detection laboratory exercise aimed at enhancing AI-cybersecurity education. The lab emphasizes hands-on, experiential learning, guiding students through data preprocessing, model training (e.g., using BERT-based models), evaluation, and crucial analyses of model bias and vulnerability to adversarial attacks. The proposed laboratory serves to equip future cybersecurity professionals with practical skills in developing and critically evaluating AI systems for online safety, while simultaneously fostering an understanding of ethical implications, such as racial bias in detection algorithms. This approach addresses the growing demand for cybersecurity experts adept at leveraging AI, bridging the gap between theoretical knowledge and real-world application in combating complex online threats.

References

K. Thomas, D. Akhawe, M. Bailey, D. Boneh, E. Bursztein, S. Consolvo, N. Dell, Z. Durumeric, P. Kelley, D. Kumar, D. McCoy, S. Meiklejohn, T. Ristenpart, and G. Stringhini, “Sok: Hate, harassment, and the changing landscape of online abuse,” pp. 473–493, 2021.

D. E. S. Swearer, “Research on school bullying and victimization: What have we learned and where do we go from here?” School Psychology Review, p. 365–383, 2013.

S. Wachs, M. F. Wright, and A. T. Vazsonyi, “Understanding the overlap between cyberbullying and cyberhate perpetration: Moderating effects of toxic online disinhibition,” Criminal Behaviour and Mental Health, vol. 29, no. 3, pp. 179–188, 2019.

“Center for Informed Democracy & Social-Cybersecurity,” https://www.cmu.edu/ideas-social-cybersecurity/.

“Social-Cybersecurity,” http://www.casos.cs.cmu.edu/projects/projects/social_cyber_security.php.

J. W. Patchin, “Cyberbullying Statistics,” https://cyberbullying.org/2019-cyberbullying-data, 2019.

D. Ducharme, “Machine learning for the automated identification of cyberbullying and cyberharassment,” Ph.D. dissertation, University of Rhode Island, 2017.

“Hateful Memes Challenge and Data Set,” https://ai.facebook.com/tools/hatefulmemes/.

H. Zhong, H. Li, A. Squicciarini, S. Rajtmajer, C. Griffin, D. Miller, and Caragea, “Content-driven detection of cyberbullying on the instagram social network,” p. 3952–3958, 2016.

“AI advances to better detect hate speech,” https://ai.facebook.com/blog/ai-advances-to-better-detect-hate-speech/.

“Google’s Hate Speech Detection A.I. Has a Racial Bias Problem,” https://fortune.com/2019/08/16/google-jigsaw-perspective-racial-bias/.

I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,” 2015. [Online]. Available: https://arxiv.org/abs/1412.6572

J. Li, S. Ji, T. Du, B. Li, and T. Wang, “Textbugger: Generating adversarial text against real-world applications,” 2019. [Online]. Available: https://www.ndss-symposium.org/ndss-paper/textbugger-generating-adversarial-text-against-real-world-applications/

W. E. Zhang, Q. Z. Sheng, A. A. F. Alhazmi, and C. Li, “Adversarial attacks on deep-learning models in natural language processing: A survey,” ACM Trans. Intell. Syst. Technol., vol. 11, no. 3, pp. 1–41, 2020.

M. Sap, D. Card, S. Gabriel, Y. Choi, and N. A. Smith, “The risk of racial bias in hate speech detection,” pp. 1668–1678, Jul. 2019. [Online]. Available: https://www.aclweb.org/anthology/P19-1163

E. Okpala, L. Cheng, N. Mbwambo, and F. Luo, “Aaebert: Debiasing bert-based hate speech detection models via adversarial learning,” in 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 2022, pp. 1606–1612.

V. Nanda, S. Dooley, S. Singla, S. Feizi, and J. P. Dickerson, “Fairness through robustness: Investigating robustness disparity in deep learning,” CoRR, vol. abs/2006.12621, 2020. [Online]. Available: https://arxiv.org/abs/2006.12621

J. C. Nwokeji, R. Stachel, and T. Holmes, “Effect of instructional methods on student performance in flipped classroom,” pp. 1–9, 2019.

S. Eybers and M. Hattingh, “Teaching data science to postgraduate students: A preliminary study using a” flip” classroom approach.” International Association for Development of the Information Society, 2016.

J. C. Nwokeji and P. S. T. Frezza, “Cross-course project-based learning in requirements engineering: An eight-year retrospective,” pp. 1–9, 2017.

Y. Velaj, D. Dolezal, R. Ambros, C. Plant, and R. Motschnig, “Designing a data science course for non-computer science students: Practical considerations and findings,” pp. 1–9, 2022.

R. Matovu, J. C. Nwokeji, T. Holmes, and T. Rahman, “Teaching and learning cybersecurity awareness with gamification in smaller universities and colleges,” pp. 1–9, 2022.

L. Samavedham and K. Ragupathi, “Facilitating 21st century skills in engineering students,” The Journal of Engineering Education, vol. 26, no. 1, pp. 38–49, 2012.

A. Y. Kolb and D. A. Kolb, “Learning styles and learning spaces: Enhancing experiential learning in higher education,” Academy of management learning & education, vol. 4, no. 2, pp. 193–212, 2005.

D. A. Kolb, Experiential learning: Experience as the source of learning and development. FT press, 2014.

A. Barman, S. Chen, A. Chang, and G. Allen, “Experiential learning in data science through a novel client-facing consulting course,” pp. 1–9, 2022.

G. I. Allen, “Experiential learning in data science: Developing an interdisciplinary, client-sponsored capstone program,” pp. 516–522, 2021.

S. Rosenthal and T. Chung, “A data science major: Building skills and confidence,” pp. 178–184, 2020.

P. Anderson, J. Bowring, R. McCauley, G. Pothering, and C. Starr, “An undergraduate degree in data science: curriculum and a decade of implementation experience,” pp. 145–150, 2014.

E. Serrano, M. Molina, D. Manrique, and L. Baumela, “Experiential learning in data science: From the dataset repository to the platform of experiences,” pp. 122–130, 2017.

D. A. Martin and G. Bombaerts, “Enacting socio-technical responsibility through challenge based learning in an ethics and data analytics course,” pp. 1–7, 2022.

A. F. Salazar-Gomez, A. Bagiati, N. Minicucci, K. D. Kennedy, X. Du, and C. Breazeal, “Designing and implementing an ai education program for learners with diverse background at scale,” pp. 1–8, 2022.

H. A. Hashim, C. Tatarniuk, and B. Harasymchuk, “First year engineering design: Course design, projects, challenges, and outcomes,” pp. 1–9, 2022.

T. Lowe and C. Rackley, “Cybersecurity education employing experiential learning,” 2018.

A. Konak, “Experiential learning builds cybersecurity self-efficacy in k-12 students,” Journal of Cybersecurity Education, Research and Practice, vol. 2018, no. 1, p. 6, 2018.

C. M. B. Turner and C. F. Turner, “Analyzing the impact of experiential pedagogy in teaching socio-cybersecurity: Cybersecurity across the curriculum,” Journal of Computing Sciences in Colleges, vol. 34, no. 5, pp. 12–22, 2019.

“Qualtrics,” https://www.qualtrics.com/

J. Devlin, M.-W. Chang, K. Lee, and K. Toutanova, “Bert: Pre-training of deep bidirectional transformers for language understanding,” arXiv preprint arXiv:1810.04805, 2018.

Downloads

Published

2025-02-28

How to Cite

ENHANCING AI-CYBERSECURITY EDUCATION: DEVELOPMENT OF AN AI-BASED CYBERHARASSMENT DETECTION LABORATORY EXERCISE. (2025). International Journal of Advanced Artificial Intelligence Research, 2(02), 9-15. https://doi.org/10.55640/ijaair-v02i02-02

How to Cite

ENHANCING AI-CYBERSECURITY EDUCATION: DEVELOPMENT OF AN AI-BASED CYBERHARASSMENT DETECTION LABORATORY EXERCISE. (2025). International Journal of Advanced Artificial Intelligence Research, 2(02), 9-15. https://doi.org/10.55640/ijaair-v02i02-02