SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
DETECTING CHILD GROOMING 
BEHAVIOUR PATTERNS ON SOCIAL MEDIA 
Miriam Fernandez 
m.fernandez@open.ac.uk 
Harith Alani 
h.alani@open.ac.uk 
A. Elizabeth Cano 
amparo.cano@open.ac.uk
INTRODUCTION 
SOCIAL MEDIA PLATFORMS 
• Widely spread across the Internet. 
• Quick and inexpensive tools for 
personal and group communications. 
• No age, geographical and cultural 
boundaries. 
• Anonymity of the users is not 
compromised. 
http://i.huffpost.com/gen/1539078/thumbs/o-SOCIAL-MEDIA-facebook.jpg
INTRODUCTION 
ONLINE CHILDREN EXPOSURE TO 
PAEDOPHILES 
* Source: NSPCC 
• 12% of 11- 16 year olds in 
the UK received unwanted 
sexual messages*. 
• 8% of 11-16 year olds in 
the UK received requests to 
send or respond to a sexual 
message*. 
http://news.bbcimg.co.uk/media/images/58277000/jpg/_58277172_138045933.jpg
INTRODUCTION 
ONLINE CHILD GROOMING 
Premeditated behaviour intending to secure the trust of a minor as a first 
step towards future engagement in sexual conduct. 
http://www.saferinternet.at/uploads/pics/442916_web_R_K_by_Christian_Seidel_pixelio.de.jpg
INTRODUCTION 
ONLINE CHILD GROOMING 
Pseudo-victims 
posing as minors 
Predators seeking to 
groom minors 
Chat-conversations
INTRODUCTION 
ONLINE CHILD GROOMING 
Pseudo-victims 
posing as minors 
Predators seeking to 
groom minors 
Chat-conversations 
Archive chat conversation 
Convicted Predators
INTRODUCTION 
IDENTIFYING GROOMING STAGES 
PERVERTED JUSTICE 
Perverted Justice 
! 
• 530 chat-room conversations. 
• Involving: 
A. PJ volunteers posing as minors. 
B. Adults seeking to begin a 
sexual relationship with a 
minor. 
Perverted Justice, http://www.perverted-justice.com/Perverted Justice, http://www.perverted-justice.com/
INTRODUCTION 
ONLINE CHILD GROOMING 
OLSON’S THEORY OF LURING COMMUNICATION (LTC) 
Gain 
Access 
age, gender, likes, 
dislikes, family.. 
[1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al 
Time 
Approach 
predator: where are you from 
victim: where I from or 
where I am now? 
what’s your asl? 
Deceptive Trust 
Development
INTRODUCTION 
ONLINE CHILD GROOMING 
OLSON’S THEORY OF LURING COMMUNICATION (LTC) 
Gain 
Access 
[1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al 
Time 
Grooming 
Approach 
predatoCrO: sRoE do you masturbate? 
victim: not really that borin 
predator: what do you like in sex? 
raise victim’s 
curiosity, .
INTRODUCTION 
ONLINE CHILD GROOMING 
OLSON’S THEORY OF LURING COMMUNICATION (LTC) 
Gain 
Access 
Deceptive Trust 
Development 
[1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al 
Time 
Cycle of Entrapment 
Grooming 
Approach Isolation 
Physical 
Approach 
Sexual 
Conduct 
predator: do you like to meet sometime? 
victim: maybe you seem cool 
… 
predator: but i'm sorry your parents 
home all the time 
victim: no
MOTIVATION 
IDENTIFYING GROOMING STAGES 
PERVERTED JUSTICE 
• Sexually abused children driven to voluntarily 
agree to physically approach the predator [36]. 
• Understanding predator’s manipulative strategies 
could help in educating children on how to 
react when expose to such situations.
RELATED WORK 
IDENTIFYING GROOMING STAGES 
Predators/Victims chat-room conversations 
• Predator detection (Kontostathis et al. [15], Michalopoulos et al. 
[17], Escalante et al. [6]) 
Online Child Grooming 
• Annotation Tools (Kontostathis et al. [15]) 
• Empirical Analysis of child grooming stages (Gupta et al.[9]) 
• Discriminate child grooming from adults cyber-sex (Bogdanova 
et al.[2])
OBJECTIVES 
DETECTING ONLINE CHILD GROOMING 
IN ONLINE CHAT-ROOMS 
• Create classification models to identify online 
child grooming stages: 
1. Trust development 
2. Grooming 
3. Physical approach 
! 
• Analyse discriminative features characterising 
these stages.
APPROACH 
IDENTIFYING GROOMING STAGES 
PERVERTED JUSTICE DATA SET 
Annotated Chat-room Conversations (Kontostathis et al[15]) 
• 50 conversations transcripts 
• Conversations with 83 to 12K lines. 
• Predator’s sentences manually labelled by two 
annotators. 
• Annotations labels: 1)Trust development, 
2)Grooming, 3)Seek for physical approach, 4) 
Other.
APPROACH 
IDENTIFYING GROOMING STAGES 
ARCHITECTURE 
PJ Conversations Preprocessing 
Predator 
Victim 
Removing Stopwords 
Stemming 
N-gram 
Syntactical 
Content 
Sentiment Polarity 
Psycho-linguistic 
Discourse 
Translation 
Emoticon 
Chat-lingo 
Feature Extraction Feature Selection 
Info.Gain 
Build SVM Classifiers 
Trust Development 
Grooming 
Approach
APPROACH 
IDENTIFYING GROOMING STAGES 
DATA PREPROCESSING 
Challenges in processing chat-room conversations 
• Irregular and ill-formed words. 
• Chat slang and teen-lingo 
• Emoticons. 
! Generated a list of over 1K terms and definitions:
APPROACH 
IDENTIFYING GROOMING STAGES 
FEATURE EXTRACTION 
Feature Description 
n-grams n-grams (n=1,2,3) BoW extracted from a sentence. 
Syntactic (POS) POS tags extracted from a sentence. 
Sentiment Polarity Average sentiment polarity of terms contained in a 
sentence 
Content Complexity, Readability, Length. 
Psycho-linguistic LIWC dimensions, based on cosine similarity of a 
sentence to a dictionary 
Discourse Semantic Frames, describing lexical use of English in texts.
APPROACH 
IDENTIFYING GROOMING STAGES 
PSYCHO-LINGUISTIC FEATURES 
• Authorship profiling [12] shown that different groups of people 
writing about a particular genre use language differently. 
• E.g. frequency in the use of certain words. 
• LIWC dataset [26] covers 60 dimensions of language. 
STYLE PATTERNS 
prepositions e.g., for, beside 
conjunctions e.g., however, whereas 
cause e.g., cuz, hence 
PSYCHOLOGICAL 
swearing e.g., damn, bloody 
affect e.g., agree, dislike 
sexual e.g., naked, porn
APPROACH 
IDENTIFYING GROOMING STAGES 
DISCOURSE FEATURES 
• Qualitative analysis [5] of PJ’s predators transcripts revealed 
frequent use of fixated discourse (i.e predator unwillingness 
to change a topic). 
• FrameNet [1], incorporate semantic generalisations of a 
discourse. 
• Covers 1K patterns used in English (e.g.,Intentionality act, 
Causality, Grant Permission)
APPROACH 
IDENTIFYING GROOMING STAGES 
DISCOURSE FEATURES 
SEMAFOR [4] to extract semantic frames from sentences. 
Sentence: Your mom will let you stay home?, I’m happy 
FRAME SEMANTIC ROLE LABEL 
Grant Permission Target 
Action 
you 
stay home 
Grantee 
Grantor 
Action 
you 
your mom 
stay home 
Emotion Directed Target 
Experiencer 
happy 
I
EXPERIMENTS 
IDENTIFYING GROOMING STAGES
EXPERIMENTS 
IDENTIFYING GROOMING STAGES 
FEATURE ANALYSIS 
Top discriminative features
EXPERIMENTS 
IDENTIFYING GROOMING STAGES 
FEATURE ANALYSIS 
Top discriminative features 
predator: lots of luck right like 
your pictures i see you keep it in 
place and look
EXPERIMENTS 
IDENTIFYING GROOMING STAGES 
FEATURE ANALYSIS 
Top discriminative featuprreesdator: you ever had anyone 
run there fingers real litely over 
your body
EXPERIMENTS 
IDENTIFYING GROOMING STAGES 
FEATURE ANALYSIS 
Top discriminative features 
predator: do you want me to 
come ther ? good
EXPERIMENTS 
CONCLUSIONS 
• Psycho-linguistic and discourse features provide an insight of 
the mindset of predators in online grooming stages. 
• Discourse patterns are effective features for the automatic 
classification of sentences into online grooming stages. 
!
EXPERIMENTS 
ampaeli@gmail.com 
@pixarelli 
https://www.gradtouch.com/uploads/images/questions.jpg
EXPERIMENTS 
FUTURE WORK 
• Some stages of online grooming are not sequential (e.g. 
predator convincing child to meet in person during trust-development). 
- Adding temporal features to the analysis could aid in 
characterising such back-forth changes on these stages. 
• Characterise sexual content between teens and between 
adults (challenging since both involve the use of sexual 
content).

Contenu connexe

Tendances

The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response Darren Pauli
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringPrem Lamsal
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Detection of cyber-bullying
Detection of cyber-bullying Detection of cyber-bullying
Detection of cyber-bullying Ziar Khan
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics Avinash Mavuru
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareAshish Arora
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 

Tendances (20)

The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Dark web
Dark webDark web
Dark web
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Ppt123
Ppt123Ppt123
Ppt123
 
Introduction to Police Technology
Introduction to Police TechnologyIntroduction to Police Technology
Introduction to Police Technology
 
Spyware
SpywareSpyware
Spyware
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Detection of cyber-bullying
Detection of cyber-bullying Detection of cyber-bullying
Detection of cyber-bullying
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer software
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 

Similaire à Detecting child grooming behaviour patterns on social media

Elmwood Franklin Inclusive Communities
Elmwood Franklin Inclusive CommunitiesElmwood Franklin Inclusive Communities
Elmwood Franklin Inclusive CommunitiesRosetta Eun Ryong Lee
 
Detecting online grooming and radicalisation
Detecting online grooming and radicalisationDetecting online grooming and radicalisation
Detecting online grooming and radicalisationThe Open University
 
Howard Hendricks: The Law of Communication
Howard Hendricks: The Law of CommunicationHoward Hendricks: The Law of Communication
Howard Hendricks: The Law of CommunicationRichard Chamberlain
 
WSAME Fall Conference Cross Cultural Communication
WSAME Fall Conference Cross Cultural CommunicationWSAME Fall Conference Cross Cultural Communication
WSAME Fall Conference Cross Cultural CommunicationRosetta Eun Ryong Lee
 
Cross Cultural Communication Workshop
Cross Cultural Communication WorkshopCross Cultural Communication Workshop
Cross Cultural Communication WorkshopRosetta Eun Ryong Lee
 
Analysing the dark side of Social Media
Analysing the dark side of Social MediaAnalysing the dark side of Social Media
Analysing the dark side of Social MediaThe Open University
 
Social Engineering and importance in pentesting null OWASP G4H september meet
Social Engineering and importance in pentesting null OWASP G4H september meetSocial Engineering and importance in pentesting null OWASP G4H september meet
Social Engineering and importance in pentesting null OWASP G4H september meetprashsiv
 
Advancing Leadership Diversity Day CCC
Advancing Leadership Diversity Day CCCAdvancing Leadership Diversity Day CCC
Advancing Leadership Diversity Day CCCRosetta Eun Ryong Lee
 
John Burroughs School CC Institute Day One 2018
John Burroughs School CC Institute Day One 2018John Burroughs School CC Institute Day One 2018
John Burroughs School CC Institute Day One 2018Rosetta Eun Ryong Lee
 
John Burroughs School In-Service Day One
John Burroughs School In-Service Day OneJohn Burroughs School In-Service Day One
John Burroughs School In-Service Day OneRosetta Eun Ryong Lee
 
Communication theories comm
Communication theories commCommunication theories comm
Communication theories commTarek Mahmoud
 
Rhetoric and logic and argumentation
Rhetoric and logic and argumentationRhetoric and logic and argumentation
Rhetoric and logic and argumentationpvenglishteach
 
University of Washington Experimental Education Unit Cross Cultural Communica...
University of Washington Experimental Education Unit Cross Cultural Communica...University of Washington Experimental Education Unit Cross Cultural Communica...
University of Washington Experimental Education Unit Cross Cultural Communica...Rosetta Eun Ryong Lee
 
1. Describe physical security threats to the United States as a re.docx
1. Describe physical security threats to the United States as a re.docx1. Describe physical security threats to the United States as a re.docx
1. Describe physical security threats to the United States as a re.docxjeremylockett77
 
Division And Classification Essay About Friends
Division And Classification Essay About FriendsDivision And Classification Essay About Friends
Division And Classification Essay About FriendsTasha Hernandez
 
Topic 1 TSLB3243.pptx
Topic 1 TSLB3243.pptxTopic 1 TSLB3243.pptx
Topic 1 TSLB3243.pptxFelicitayii
 
Hillcrest School Cross Cultural Communication
Hillcrest School Cross Cultural CommunicationHillcrest School Cross Cultural Communication
Hillcrest School Cross Cultural CommunicationRosetta Eun Ryong Lee
 
ISACS Division Heads Conference Cross Cultural Communication
ISACS Division Heads Conference Cross Cultural CommunicationISACS Division Heads Conference Cross Cultural Communication
ISACS Division Heads Conference Cross Cultural CommunicationRosetta Eun Ryong Lee
 
What did you say? interculture communication [HICSS 45 2012-01-04
What did you say? interculture communication [HICSS 45 2012-01-04What did you say? interculture communication [HICSS 45 2012-01-04
What did you say? interculture communication [HICSS 45 2012-01-04Frederick Zarndt
 

Similaire à Detecting child grooming behaviour patterns on social media (20)

Elmwood Franklin Inclusive Communities
Elmwood Franklin Inclusive CommunitiesElmwood Franklin Inclusive Communities
Elmwood Franklin Inclusive Communities
 
Detecting online grooming and radicalisation
Detecting online grooming and radicalisationDetecting online grooming and radicalisation
Detecting online grooming and radicalisation
 
Howard Hendricks: The Law of Communication
Howard Hendricks: The Law of CommunicationHoward Hendricks: The Law of Communication
Howard Hendricks: The Law of Communication
 
WSAME Fall Conference Cross Cultural Communication
WSAME Fall Conference Cross Cultural CommunicationWSAME Fall Conference Cross Cultural Communication
WSAME Fall Conference Cross Cultural Communication
 
Cross Cultural Communication Workshop
Cross Cultural Communication WorkshopCross Cultural Communication Workshop
Cross Cultural Communication Workshop
 
Analysing the dark side of Social Media
Analysing the dark side of Social MediaAnalysing the dark side of Social Media
Analysing the dark side of Social Media
 
Social Engineering and importance in pentesting null OWASP G4H september meet
Social Engineering and importance in pentesting null OWASP G4H september meetSocial Engineering and importance in pentesting null OWASP G4H september meet
Social Engineering and importance in pentesting null OWASP G4H september meet
 
Advancing Leadership Diversity Day CCC
Advancing Leadership Diversity Day CCCAdvancing Leadership Diversity Day CCC
Advancing Leadership Diversity Day CCC
 
John Burroughs School CC Institute Day One 2018
John Burroughs School CC Institute Day One 2018John Burroughs School CC Institute Day One 2018
John Burroughs School CC Institute Day One 2018
 
John Burroughs School In-Service Day One
John Burroughs School In-Service Day OneJohn Burroughs School In-Service Day One
John Burroughs School In-Service Day One
 
JBS In Service 2017 Day One
JBS In Service 2017 Day OneJBS In Service 2017 Day One
JBS In Service 2017 Day One
 
Communication theories comm
Communication theories commCommunication theories comm
Communication theories comm
 
Rhetoric and logic and argumentation
Rhetoric and logic and argumentationRhetoric and logic and argumentation
Rhetoric and logic and argumentation
 
University of Washington Experimental Education Unit Cross Cultural Communica...
University of Washington Experimental Education Unit Cross Cultural Communica...University of Washington Experimental Education Unit Cross Cultural Communica...
University of Washington Experimental Education Unit Cross Cultural Communica...
 
1. Describe physical security threats to the United States as a re.docx
1. Describe physical security threats to the United States as a re.docx1. Describe physical security threats to the United States as a re.docx
1. Describe physical security threats to the United States as a re.docx
 
Division And Classification Essay About Friends
Division And Classification Essay About FriendsDivision And Classification Essay About Friends
Division And Classification Essay About Friends
 
Topic 1 TSLB3243.pptx
Topic 1 TSLB3243.pptxTopic 1 TSLB3243.pptx
Topic 1 TSLB3243.pptx
 
Hillcrest School Cross Cultural Communication
Hillcrest School Cross Cultural CommunicationHillcrest School Cross Cultural Communication
Hillcrest School Cross Cultural Communication
 
ISACS Division Heads Conference Cross Cultural Communication
ISACS Division Heads Conference Cross Cultural CommunicationISACS Division Heads Conference Cross Cultural Communication
ISACS Division Heads Conference Cross Cultural Communication
 
What did you say? interculture communication [HICSS 45 2012-01-04
What did you say? interculture communication [HICSS 45 2012-01-04What did you say? interculture communication [HICSS 45 2012-01-04
What did you say? interculture communication [HICSS 45 2012-01-04
 

Plus de Amparo Elizabeth Cano Basave

A Study of the Impact of Persuasive Argumentation in Political Debates
A Study of the Impact of Persuasive Argumentation in Political DebatesA Study of the Impact of Persuasive Argumentation in Political Debates
A Study of the Impact of Persuasive Argumentation in Political DebatesAmparo Elizabeth Cano Basave
 
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic GraphsStretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic GraphsAmparo Elizabeth Cano Basave
 
Harnessing Linked Knowledge Sources for Topic Classification in Social Media
Harnessing Linked Knowledge Sources for Topic Classification in Social MediaHarnessing Linked Knowledge Sources for Topic Classification in Social Media
Harnessing Linked Knowledge Sources for Topic Classification in Social MediaAmparo Elizabeth Cano Basave
 
Volatile Classification of Point of Interests based on Social Activity Streams
Volatile Classification of Point of Interests based on Social Activity StreamsVolatile Classification of Point of Interests based on Social Activity Streams
Volatile Classification of Point of Interests based on Social Activity StreamsAmparo Elizabeth Cano Basave
 
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...Amparo Elizabeth Cano Basave
 
Entity-Based Semantics Emerging from Personal Awareness Streams
Entity-Based Semantics Emerging from Personal Awareness Streams Entity-Based Semantics Emerging from Personal Awareness Streams
Entity-Based Semantics Emerging from Personal Awareness Streams Amparo Elizabeth Cano Basave
 
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...Amparo Elizabeth Cano Basave
 
Veracity- Modeling and Proving Trustworthiness of Web Resources
Veracity- Modeling and Proving Trustworthiness of Web ResourcesVeracity- Modeling and Proving Trustworthiness of Web Resources
Veracity- Modeling and Proving Trustworthiness of Web ResourcesAmparo Elizabeth Cano Basave
 

Plus de Amparo Elizabeth Cano Basave (14)

A Study of the Impact of Persuasive Argumentation in Political Debates
A Study of the Impact of Persuasive Argumentation in Political DebatesA Study of the Impact of Persuasive Argumentation in Political Debates
A Study of the Impact of Persuasive Argumentation in Political Debates
 
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic GraphsStretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
 
Violence det ijcnlp13-slideshare
Violence det ijcnlp13-slideshareViolence det ijcnlp13-slideshare
Violence det ijcnlp13-slideshare
 
Harnessing Linked Knowledge Sources for Topic Classification in Social Media
Harnessing Linked Knowledge Sources for Topic Classification in Social MediaHarnessing Linked Knowledge Sources for Topic Classification in Social Media
Harnessing Linked Knowledge Sources for Topic Classification in Social Media
 
Volatile Classification of Point of Interests based on Social Activity Streams
Volatile Classification of Point of Interests based on Social Activity StreamsVolatile Classification of Point of Interests based on Social Activity Streams
Volatile Classification of Point of Interests based on Social Activity Streams
 
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
 
Topica
TopicaTopica
Topica
 
Does sizematter
Does sizematterDoes sizematter
Does sizematter
 
Entity-Based Semantics Emerging from Personal Awareness Streams
Entity-Based Semantics Emerging from Personal Awareness Streams Entity-Based Semantics Emerging from Personal Awareness Streams
Entity-Based Semantics Emerging from Personal Awareness Streams
 
Ekaw2010 tutorial3 practical
Ekaw2010 tutorial3 practicalEkaw2010 tutorial3 practical
Ekaw2010 tutorial3 practical
 
Ekaw2010 tutorial3
Ekaw2010 tutorial3Ekaw2010 tutorial3
Ekaw2010 tutorial3
 
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
 
Veracity poster
Veracity posterVeracity poster
Veracity poster
 
Veracity- Modeling and Proving Trustworthiness of Web Resources
Veracity- Modeling and Proving Trustworthiness of Web ResourcesVeracity- Modeling and Proving Trustworthiness of Web Resources
Veracity- Modeling and Proving Trustworthiness of Web Resources
 

Dernier

Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max PrincetonTimothy Spann
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
Business Analytics using Microsoft Excel
Business Analytics using Microsoft ExcelBusiness Analytics using Microsoft Excel
Business Analytics using Microsoft Excelysmaelreyes
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一F La
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxUnduhUnggah1
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...ttt fff
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 

Dernier (20)

Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max Princeton
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
Business Analytics using Microsoft Excel
Business Analytics using Microsoft ExcelBusiness Analytics using Microsoft Excel
Business Analytics using Microsoft Excel
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docx
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 

Detecting child grooming behaviour patterns on social media

  • 1. DETECTING CHILD GROOMING BEHAVIOUR PATTERNS ON SOCIAL MEDIA Miriam Fernandez m.fernandez@open.ac.uk Harith Alani h.alani@open.ac.uk A. Elizabeth Cano amparo.cano@open.ac.uk
  • 2. INTRODUCTION SOCIAL MEDIA PLATFORMS • Widely spread across the Internet. • Quick and inexpensive tools for personal and group communications. • No age, geographical and cultural boundaries. • Anonymity of the users is not compromised. http://i.huffpost.com/gen/1539078/thumbs/o-SOCIAL-MEDIA-facebook.jpg
  • 3. INTRODUCTION ONLINE CHILDREN EXPOSURE TO PAEDOPHILES * Source: NSPCC • 12% of 11- 16 year olds in the UK received unwanted sexual messages*. • 8% of 11-16 year olds in the UK received requests to send or respond to a sexual message*. http://news.bbcimg.co.uk/media/images/58277000/jpg/_58277172_138045933.jpg
  • 4. INTRODUCTION ONLINE CHILD GROOMING Premeditated behaviour intending to secure the trust of a minor as a first step towards future engagement in sexual conduct. http://www.saferinternet.at/uploads/pics/442916_web_R_K_by_Christian_Seidel_pixelio.de.jpg
  • 5. INTRODUCTION ONLINE CHILD GROOMING Pseudo-victims posing as minors Predators seeking to groom minors Chat-conversations
  • 6. INTRODUCTION ONLINE CHILD GROOMING Pseudo-victims posing as minors Predators seeking to groom minors Chat-conversations Archive chat conversation Convicted Predators
  • 7. INTRODUCTION IDENTIFYING GROOMING STAGES PERVERTED JUSTICE Perverted Justice ! • 530 chat-room conversations. • Involving: A. PJ volunteers posing as minors. B. Adults seeking to begin a sexual relationship with a minor. Perverted Justice, http://www.perverted-justice.com/Perverted Justice, http://www.perverted-justice.com/
  • 8. INTRODUCTION ONLINE CHILD GROOMING OLSON’S THEORY OF LURING COMMUNICATION (LTC) Gain Access age, gender, likes, dislikes, family.. [1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al Time Approach predator: where are you from victim: where I from or where I am now? what’s your asl? Deceptive Trust Development
  • 9. INTRODUCTION ONLINE CHILD GROOMING OLSON’S THEORY OF LURING COMMUNICATION (LTC) Gain Access [1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al Time Grooming Approach predatoCrO: sRoE do you masturbate? victim: not really that borin predator: what do you like in sex? raise victim’s curiosity, .
  • 10. INTRODUCTION ONLINE CHILD GROOMING OLSON’S THEORY OF LURING COMMUNICATION (LTC) Gain Access Deceptive Trust Development [1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al Time Cycle of Entrapment Grooming Approach Isolation Physical Approach Sexual Conduct predator: do you like to meet sometime? victim: maybe you seem cool … predator: but i'm sorry your parents home all the time victim: no
  • 11. MOTIVATION IDENTIFYING GROOMING STAGES PERVERTED JUSTICE • Sexually abused children driven to voluntarily agree to physically approach the predator [36]. • Understanding predator’s manipulative strategies could help in educating children on how to react when expose to such situations.
  • 12. RELATED WORK IDENTIFYING GROOMING STAGES Predators/Victims chat-room conversations • Predator detection (Kontostathis et al. [15], Michalopoulos et al. [17], Escalante et al. [6]) Online Child Grooming • Annotation Tools (Kontostathis et al. [15]) • Empirical Analysis of child grooming stages (Gupta et al.[9]) • Discriminate child grooming from adults cyber-sex (Bogdanova et al.[2])
  • 13. OBJECTIVES DETECTING ONLINE CHILD GROOMING IN ONLINE CHAT-ROOMS • Create classification models to identify online child grooming stages: 1. Trust development 2. Grooming 3. Physical approach ! • Analyse discriminative features characterising these stages.
  • 14. APPROACH IDENTIFYING GROOMING STAGES PERVERTED JUSTICE DATA SET Annotated Chat-room Conversations (Kontostathis et al[15]) • 50 conversations transcripts • Conversations with 83 to 12K lines. • Predator’s sentences manually labelled by two annotators. • Annotations labels: 1)Trust development, 2)Grooming, 3)Seek for physical approach, 4) Other.
  • 15. APPROACH IDENTIFYING GROOMING STAGES ARCHITECTURE PJ Conversations Preprocessing Predator Victim Removing Stopwords Stemming N-gram Syntactical Content Sentiment Polarity Psycho-linguistic Discourse Translation Emoticon Chat-lingo Feature Extraction Feature Selection Info.Gain Build SVM Classifiers Trust Development Grooming Approach
  • 16. APPROACH IDENTIFYING GROOMING STAGES DATA PREPROCESSING Challenges in processing chat-room conversations • Irregular and ill-formed words. • Chat slang and teen-lingo • Emoticons. ! Generated a list of over 1K terms and definitions:
  • 17. APPROACH IDENTIFYING GROOMING STAGES FEATURE EXTRACTION Feature Description n-grams n-grams (n=1,2,3) BoW extracted from a sentence. Syntactic (POS) POS tags extracted from a sentence. Sentiment Polarity Average sentiment polarity of terms contained in a sentence Content Complexity, Readability, Length. Psycho-linguistic LIWC dimensions, based on cosine similarity of a sentence to a dictionary Discourse Semantic Frames, describing lexical use of English in texts.
  • 18. APPROACH IDENTIFYING GROOMING STAGES PSYCHO-LINGUISTIC FEATURES • Authorship profiling [12] shown that different groups of people writing about a particular genre use language differently. • E.g. frequency in the use of certain words. • LIWC dataset [26] covers 60 dimensions of language. STYLE PATTERNS prepositions e.g., for, beside conjunctions e.g., however, whereas cause e.g., cuz, hence PSYCHOLOGICAL swearing e.g., damn, bloody affect e.g., agree, dislike sexual e.g., naked, porn
  • 19. APPROACH IDENTIFYING GROOMING STAGES DISCOURSE FEATURES • Qualitative analysis [5] of PJ’s predators transcripts revealed frequent use of fixated discourse (i.e predator unwillingness to change a topic). • FrameNet [1], incorporate semantic generalisations of a discourse. • Covers 1K patterns used in English (e.g.,Intentionality act, Causality, Grant Permission)
  • 20. APPROACH IDENTIFYING GROOMING STAGES DISCOURSE FEATURES SEMAFOR [4] to extract semantic frames from sentences. Sentence: Your mom will let you stay home?, I’m happy FRAME SEMANTIC ROLE LABEL Grant Permission Target Action you stay home Grantee Grantor Action you your mom stay home Emotion Directed Target Experiencer happy I
  • 22. EXPERIMENTS IDENTIFYING GROOMING STAGES FEATURE ANALYSIS Top discriminative features
  • 23. EXPERIMENTS IDENTIFYING GROOMING STAGES FEATURE ANALYSIS Top discriminative features predator: lots of luck right like your pictures i see you keep it in place and look
  • 24. EXPERIMENTS IDENTIFYING GROOMING STAGES FEATURE ANALYSIS Top discriminative featuprreesdator: you ever had anyone run there fingers real litely over your body
  • 25. EXPERIMENTS IDENTIFYING GROOMING STAGES FEATURE ANALYSIS Top discriminative features predator: do you want me to come ther ? good
  • 26. EXPERIMENTS CONCLUSIONS • Psycho-linguistic and discourse features provide an insight of the mindset of predators in online grooming stages. • Discourse patterns are effective features for the automatic classification of sentences into online grooming stages. !
  • 27. EXPERIMENTS ampaeli@gmail.com @pixarelli https://www.gradtouch.com/uploads/images/questions.jpg
  • 28. EXPERIMENTS FUTURE WORK • Some stages of online grooming are not sequential (e.g. predator convincing child to meet in person during trust-development). - Adding temporal features to the analysis could aid in characterising such back-forth changes on these stages. • Characterise sexual content between teens and between adults (challenging since both involve the use of sexual content).