6,827 research outputs found

    The Language of Online Child Sexual Groomers - A Corpus Assisted Discourse Study of Intentions, Requests and Grooming Duration

    Get PDF
    Online grooming has become a wide-spread and worryingly fast increasing issue in society. This thesis analyses a corpus of online grooming communication, made available by the Perverted Justice (PJ) archive, a non-profit organisation that from 2004 until 2019 employed volunteers, who pretended to be children and entered chat rooms to catch and convict groomers, collaborating with law enforcement. The archive consists of 622 grooming chat logs and approx. 3.7 million words of groomer language. A corpus of this database was built, and a Corpus-Assisted Discourse Studies (CADS) approach used to analyse the language therein. Specifically, the language was compared to a reference corpus of general chat language data (PAN2012) and duration of online grooming and manipulative requesting behaviour were also investigated. The following research questions were answered: 1)What are the features of a corpus of online groomer language compared to that of a general digital chat language reference corpus? Is online groomer language distinct? How are online grooming intentions realised linguistically by online groomers?2)Does duration of grooming influence the grooming process/intentions? Is usage of specific words/specific grooming intentions associated with different duration of grooming? Can different duration profiles be established and, if so, what are the cut-off points for these duration profiles?3)How are requests realised in online grooming and how does duration influence this? How do groomers make requests and what support move functions do they use? Does duration influence how requests are made, and the type of support move function that are used?The thesis newly identifies nuanced linguistic realisations of groomers’ intentions and strategies, proposing a new working terminology for discourse-based models of online grooming. This is based on a review of the literature followed by an empirical analysis refining this terminology, which has not been done before. It finds evidence for two distinct duration-based grooming approaches and yields a fine-grained qualitative analysis of groomer requests, also influenced by grooming duration. There have only been very few studies using a CADS analysis of such a large dataset of groomer language and this thesis will lead to new insights, implications and significance for the successful analysis, detection and prevention of online grooming

    Characterizing Pedophile Conversations on the Internet using Online Grooming

    Full text link
    Cyber-crime targeting children such as online pedophile activity are a major and a growing concern to society. A deep understanding of predatory chat conversations on the Internet has implications in designing effective solutions to automatically identify malicious conversations from regular conversations. We believe that a deeper understanding of the pedophile conversation can result in more sophisticated and robust surveillance systems than majority of the current systems relying only on shallow processing such as simple word-counting or key-word spotting. In this paper, we study pedophile conversations from the perspective of online grooming theory and perform a series of linguistic-based empirical analysis on several pedophile chat conversations to gain useful insights and patterns. We manually annotated 75 pedophile chat conversations with six stages of online grooming and test several hypothesis on it. The results of our experiments reveal that relationship forming is the most dominant online grooming stage in contrast to the sexual stage. We use a widely used word-counting program (LIWC) to create psycho-linguistic profiles for each of the six online grooming stages to discover interesting textual patterns useful to improve our understanding of the online pedophile phenomenon. Furthermore, we present empirical results that throw light on various aspects of a pedophile conversation such as probability of state transitions from one stage to another, distribution of a pedophile chat conversation across various online grooming stages and correlations between pre-defined word categories and online grooming stages

    Computer-Mediated Deception: Collective Language-action Cues as Stigmergic Signals for Computational Intelligence

    Get PDF
    Collective intelligence is easily observable in group-based or interpersonal pairwise interaction, and is enabled by environment-mediated stigmertic signals. Based on innate ability, human sensors not only sense and coordinate, but also tend to solve problems through these signals. This paper argues the efficacy of computational intelligence for adopting the collective language-action cues of human intelligence as stigmertic signals to differentiate deception. A study was conducted in synchronous computer-mediated communication environment with a dataset collected from 2014 to 2015. An online game was developed to examine the accuracy of certain language-action cues (signs), deceptive actors (agents) during pairwise interaction (environment). The result of a logistic regression analysis demonstrates the computational efficacy of collective language-action cues in differentiating and sensing deception in spontaneous communication. This study contributes to the computational modeling in adapting human intelligence as a base to attribute computer-mediated deception

    Interpersonal deceit and lie-detection using computer-mediated communication

    Get PDF
    This thesis examines the use of computer-mediated communication for lie-detection and interpersonal deceit. The literature within the fields of lie-detection and mediated communication are reviewed and it is proposed that there is a lack of knowledge surrounding how people use CMC to deceive one another. Qualitative research was carried out in order to address this shortcoming, exploring the self-reported experiences of chat room users who have been exposed to online deceit. Reports were provided that describe the misrepresentation of age, gender, vocation, affection, and appearance. The importance of stereotypes in driving suspicions is also emphasised within the reports. It is suggested that this key characteristic has more dominance in CMC than it would do face-to-face because of the occlusion of the traditional nonstrategic clues to deceit. Evidence for an alternative set of nonstrategic leakage clues was examined further by conducting a variant of the Guilty-Knowledge test within the context of a CMC based crime. It was found that participants exhibited a response time inhibition effect when presented with 'guilty knowledge' and that this effect was detectable through a standard two-button mouse. The use of such nonstrategic cues to deceit was explored further in a study that examined how CMC might be used to add additional control to a Statement Validity Assessment truth-validation test. It was found that the content analysis technique used by SVA was unable in its present form to correctly distinguish between truthful and fabricated statements of participants interviewed using a CMC chat program. In addition, it was found that the deletion-behaviours of participants fabricating a story within CMC provided no quantitative or qualitative evidence that they were lying
    corecore