Etiqa'a: An Android Mobile Application for Monitoring Teen's Private Messages on WhatsApp to Detect Harmful/Inappropriate Words in Arabic using Machine Learning
Received: 17 July 2023 | Revised: 21 August 2023 | Accepted: 30 August 2023 | Online: 4 November 2023
Corresponding author: Manar Ahmed Saeed Bajafar
Abstract
In today's world, social networks, such as WhatsApp, have become essential to daily life. An increasing number of Arab children use WhatsApp to communicate with others on a local and global scale, which has led to several negative consequences in their lives, including those associated with being bullied and harassed online. This study presents Etiqa'a, an application aiming to minimize risks and keep threats against minors from becoming a reality. Etiqa'a scans received WhatsApp messages which are then analyzed, and classified using a Logistic Regression (LR) machine learning model. The test results showed an accuracy of 81% in classifying messages as appropriate or inappropriate based on the text of the message. In the case of the latter, the application sends a detailed alert to parents.
Keywords:
machine learning, Artificial Intelligence (AI), Natural Language Processing (NLP), WhatsApp, private message monitoring , Arabic text classification, message classificationDownloads
References
S. Larabi Marie-Sainte, N. Alalyani, S. Alotaibi, S. Ghouzali, and I. Abunadi, "Arabic Natural Language Processing and Machine Learning-Based Systems," IEEE Access, vol. 7, pp. 7011–7020, 2019.
O. Oueslati, E. Cambria, M. B. HajHmida, and H. Ounelli, "A review of sentiment analysis research in Arabic language," Future Generation Computer Systems, vol. 112, pp. 408–430, Nov. 2020.
"Cyber Safety Report - Research into the online behaviour of Arab youth and the risks they face," ICDL Arabia, 2015.
F. A. Moafa, K. Ahmad, W. M. Al-Rahmi, N. Yahaya, Y. B. Kamin, and M. Alamri, "Cyber harassment prevention through user behavior analysis online in kingdom of Saudi Arabia (KSA)," Journal of Theoretical and Applied Information Technology, vol. 96, no. 6, pp. 1732–1746, Mar. 2018.
B. M. Fahmi, "Cyberbullying among Adolescents on Social Media Networks," Egyptian Journal of Public Opinion Research, vol. 20, no. 3, pp. 289–335, Jul. 2021.
H. Ameur, A. Rekik, S. Jamoussi, and A. B. Hamadou, "ChildProtect: A parental control application for tracking hostile surfing content," Entertainment Computing, vol. 44, Jan. 2023, Art. no. 100517.
F. Kateb and J. Kalita, "Classifying Short Text in Social Media: Twitter as Case Study," International Journal of Computer Applications, vol. 111, no. 9, pp. 1–12, Feb. 2015.
A. Farghaly and K. Shaalan, "Arabic Natural Language Processing: Challenges and Solutions," ACM Transactions on Asian Language Information Processing, vol. 8, no. 4, Sep. 2009, Art. no. 14.
T. Kanan et al., "A Review of Natural Language Processing and Machine Learning Tools Used to Analyze Arabic Social Media," in 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, Apr. 2019, pp. 622–628.
T. Alsubait and D. Alfageh, "Comparison of Machine Learning Techniques for Cyberbullying Detection on YouTube Arabic Comments," International Journal of Computer Science & Network Security, vol. 21, no. 1, 2021.
R. ALBayari and S. Abdallah, "Instagram-Based Benchmark Dataset for Cyberbullying Detection in Arabic Text," Data, vol. 7, no. 7, Jul. 2022, Art. no. 83.
A. Alshehri, E. M. B. Nagoudi, and M. Abdul-Mageed, "Understanding and Detecting Dangerous Speech in Social Media." arXiv, May 04, 2020.
S. A. Chowdhury, H. Mubarak, A. Abdelali, S. Jung, B. J. Jansen, and J. Salminen, "A Multi-Platform Arabic News Comment Dataset for Offensive Language Detection," in Proceedings of the Twelfth Language Resources and Evaluation Conference, Marseille, France, Feb. 2020, pp. 6203–6212.
H. Mubarak, A. Rashed, K. Darwish, Y. Samih, and A. Abdelali, "Arabic Offensive Language on Twitter: Analysis and Experiments." arXiv, Mar. 09, 2021.
T. Alqurashi, "Arabic Sentiment Analysis for Twitter Data: A Systematic Literature Review," Engineering, Technology & Applied Science Research, vol. 13, no. 2, pp. 10292–10300, Apr. 2023.
I. A. Kandhro, S. Z. Jumani, F. Ali, Z. U. Shaikh, M. A. Arain, and A. A. Shaikh, "Performance Analysis of Hyperparameters on a Sentiment Analysis Model," Engineering, Technology & Applied Science Research, vol. 10, no. 4, pp. 6016–6020, Aug. 2020.
W. M. S. Yafooz, E. A. Hizam, and W. A. Alromema, "Arabic Sentiment Analysis on Chewing Khat Leaves using Machine Learning and Ensemble Methods," Engineering, Technology & Applied Science Research, vol. 11, no. 2, pp. 6845–6848, Apr. 2021.
L. Cianci, "Best IDEs for Flutter in 2022," LogRocket Blog, Feb. 21, 2022. https://blog.logrocket.com/best-ides-flutter-2022/.
"What is Firebase Cloud Messaging (FCM)? | Definition from TechTarget," WhatIs.com. https://www.techtarget.com/whatis/definition/
Firebase-Cloud-Messaging-FCM.
M. Kofler, Ed., "phpMyAdmin," in The Definitive Guide to MySQL5, Berkeley, CA, USA: Apress, 2005, pp. 87–116.
"JSON." https://www.json.org/json-en.html.
"FastAPI vs Flask: Comparison Guide to Making a Better Decision." https://www.turing.com/kb/fastapi-vs-flask-a-detailed-comparison.
Downloads
How to Cite
License
Copyright (c) 2023 Faiza Mohammed Usman Baran, Lama Saleh Abdullah Alzughaybi, Manar Ahmed Saeed Bajafar, Maram Nasser Muslih Alsaedi, Thraa Freed Hassan Serdar, Olfat Meraj Nawab Mirza
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.