9 research outputs found

    Online Sexual Predator Detection

    Get PDF
    Online sexual abuse is a concerning yet severely overlooked vice of modern society. With more children being on the Internet and with the ever-increasing advent of web-applications such as online chatrooms and multiplayer games, preying on vulnerable users has become more accessible for predators. In recent years, there has been work on detecting online sexual predators using Machine Learning and deep learning techniques. Such work has trained on severely imbalanced datasets, and imbalance is handled via manual trimming of over-represented labels. In this work, we propose an approach that first tackles the problem of imbalance and then improves the effectiveness of the underlying classifiers. Our evaluation of the proposed sampling approach on PAN benchmark dataset shows performance improvements on several classification metrics, compared to prior methods that otherwise require hands-crafted sampling of the data

    State of the art 2015: a literature review of social media intelligence capabilities for counter-terrorism

    Get PDF
    Overview This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it.  The paper is structured as follows: Part 1 is an overview of social media use, focused on how it is used by groups of interest to those involved in counter-terrorism. This includes new sections on trends of social media platforms; and a new section on Islamic State (IS). Part 2 provides an introduction to the key approaches of social media intelligence (henceforth ‘SOCMINT’) for counter-terrorism. Part 3 sets out a series of SOCMINT techniques. For each technique a series of capabilities and insights are considered, the validity and reliability of the method is considered, and how they might be applied to counter-terrorism work explored. Part 4 outlines a number of important legal, ethical and practical considerations when undertaking SOCMINT work

    Exploring Text Mining and Analytics for Applications in Public Security: An in-depth dive into a systematic literature review

    Get PDF
    Text mining and related analytics emerge as a technological approach to support human activities in extracting useful knowledge through texts in several formats. From a managerial point of view, it can help organizations in planning and decision-making processes, providing information that was not previously evident through textual materials produced internally or even externally. In this context, within the public/governmental scope, public security agencies are great beneficiaries of the tools associated with text mining, in several aspects, from applications in the criminal area to the collection of people's opinions and sentiments about the actions taken to promote their welfare. This article reports details of a systematic literature review focused on identifying the main areas of text mining application in public security, the most recurrent technological tools, and future research directions. The searches covered four major article bases (Scopus, Web of Science, IEEE Xplore, and ACM Digital Library), selecting 194 materials published between 2014 and the first half of 2021, among journals, conferences, and book chapters. There were several findings concerning the targets of the literature review, as presented in the results of this article

    Rhetorical moves and identity performance in online child sexual abuse interactions

    Get PDF
    Online child sexual abuse (OCSA) is a pervasive problem facilitated by the anonymity afforded to offenders online. From a largely social constructionist perspective, this thesis explores linguistic expressions of identity by participants across a range of OCSA interactions, including offenders and suspected offenders, victims, and undercover police officers. The thesis is structured around three individual studies, each involving a different abusive interaction type. Each study employs Swales’ (1981; 1990) move analysis framework, exploring how participants use rhetorical moves as a resource for identity performance. Study 1 concerns a convicted offender who strategically cycled through numerous adopted personas when interacting with victims online. It considers his performance of various identity positions through his use of rhetorical moves across different personas. One persona is found to diverge significantly from the rest, and is identified as a possible reflection of the offender’s ‘home identity’. Study 2 considers interactions between suspected offenders and undercover police officers posing as offenders. It compares the participants’ move use and explores linguistic realisations of supportive exchanges, finding that aside a few notable differences, undercover officers perform the offender identity similarly to genuine suspected offenders. Study 3 explores dark web forum posts authored by ‘newbies’ attempting to join existing online communities of suspected offenders. It examines the identity positions performed in the posts and considers how positions of competence and expertise contribute to the persuasive process of seeking membership into online offending communities. Taking findings from these studies, the thesis discusses the possible contributions of move analysis to OCSA research and how rhetorical moves are used as a resource for identity performance, and offers an approach to identity analysis based on rhetorical moves. It concludes by arguing for move analysis as a useful goal-centred approach to identity investigation and describes potential implications of this work for law-enforcement, education and research

    Detecting an Autobiographical Criminal: Investigating Gender Differences in Staged Suicide Notes

    Get PDF
    Suicide notes are valuable in assisting equivocal police investigations because they can provide access into the author’s mind. An abundance of research has already linguistically analysed genuine and simulated suicide notes and have identified significant differences between the two. However, this only provides limited assistance in discerning note authenticity. Suicidology research has not yet considered how authors can linguistically construct gender in order to disguise their own, which may underpin some equivocal cases. The present study endeavoured to explore linguistic gender construction in staged suicide notes by cross-referencing suicide, deception and gendered-language corpuses with participants’ self-produced staged suicide notes to determine whether authorship can be detected through language-use and contribute to evaluating suicide note veracity. Participants were student volunteers (n = 4: 2 males, 2 females), recruited from the University of Derby. A qualitative document-interview methodology was used to gain primary data and explore pragmatic meaning by thematically analysing participants’ staged suicide notes and interview transcripts in order to categorise linguistic themes and explore whether pre-existing mental representations can influence language-use. Societal stereotypes regarding suicide and gender were found and linguistic features remained largely consistent with previous research. Findings may improve equivocal suicide investigations

    Plataforma software para anĂĄlise textual de desordes mentais en Internet

    Get PDF
    [Resumo] A importancia dos mĂ©todos de prevenciĂłn secundaria para os trastornos mentais Ă© crucial xa que disto depende a calidade de vida futura das persoas que a sofren no presente. Os medios sociais poden favorecer un gran avance no desenvolvemento destes mĂ©todos debido a que son canles de comunicaciĂłn nos que os usuarios e usuarias da Internet participan de forma activa e prevese que isto vaia aumentando co paso dos anos. O obxectivo principal deste proxecto Ă© deseñar e implementar unha plataforma software que sirva de soporte aos especialistas da saĂșde mental, como psicĂłlogos ou psiquiatras, para etiquetar aos suxeitos de maneira mĂĄis ĂĄxil, rĂĄpida e sinxela. A aplicaciĂłn posibilitarĂĄ a persoa usuaria procesar colecciĂłns de documentos para ver as sĂșas estadĂ­sticas, buscar documentos e realizar consultas a travĂ©s delas. TamĂ©n permitirĂĄ ao usuario ou usuaria analizar os resultados dos agrupamentos por similitude dos documentos ou termos que as conforman. Para poder alcanzar os obxectivos marcados eficientemente, decidiuse usar unha metodoloxĂ­a iterativa e incremental debido ĂĄ flexibilidade e adaptaciĂłn que aporta ĂĄs distintas situaciĂłns polas que un proxecto atravesa. Finalmente, conseguiuse unha plataforma software que cumpre cos requisitos especificados.[Abstract] Methods of secondary prevention for mental disorders are of crucial relevance because these depend the quality of future life of the people who are suffering mental diseases at the moment. Social media can improve develop these methods for the reason that it is a channel of communication where a lot of Internet users are involved and it is expected to increase over the years. The main goal of this project is to design and implement a software plataform to give support to mental health specialists, as psychologists or psychiatrists, to tag subjects agilely, quickly and easily. The application will allow the user process document collections to check their statistics, search documents and search queries in them. It will also allow the user to analyze the clustering results by similarity of the documents or terms that make them up. In order to achieve the goals set efficiently, it has been decided to use an iterative and incremental methodology for its flexibility and adaptation to the different situations that a project goes through. Eventually, it has been achieved an application that meets with the mentioned requirements.Traballo fin de grao (UDC.FIC). EnxeñarĂ­a informĂĄtica. Curso 2019/202

    Design, Deployment, Identity, & Conformity: An Analysis of Children's Online Social Networks

    Get PDF
    Preadolescents (children aged 7 to 12 years) are participating in online social networks whether we, as a society, like it or not. The Children’s Online Privacy Protection Act, enacted by the United States Congress in 1998, made illegal the collection of online data about children under the age of 13 without express parental consent. As such, most mainstream social networks, such as Twitter, Facebook, and Instagram, limit their registration by requiring new users to agree that they are at least 13 years of age, an assertion which is often falsified. Researchers, bound by the same legal requirements regarding online data collection, have resorted to surveys and interviews to understand how and why children interact on social networks. While valuable, these prior works explain only what children say they do online, and not what they actually do on a daily basis. In this work, we describe the design, development, deployment, and analysis of our own online social network for children, KidGab. This work explores common social networking affordances for adults and their suitability for child audiences. It analyzes the participatory behaviors of our users (Girl Scouts from around central Texas) and describes how they shaped KidGab’s continuing growth. This work discusses our quantitative analysis of users’ tendencies and proclivities toward identity exploration leverages graph algorithms and link analysis techniques to understand the sociality of conformity on the network. Finally, this work describes the lessons we learned about children’s social networks and social networking throughout KidGab’s 450 days of active deployment

    Exploring vulnerability among children and young people who experience online sexual victimisation

    Get PDF
    Online grooming and sexual exploitation of children and young people is an increasing concern for parents, internet providers as well as professionals involved in safeguarding children and detecting offenders. The existing literature has reported online grooming processes as well as risk factors that are associated with victimisation and perpetration (O’Connell, 2003; Webster et al., 2012). However, there is little theoretical understanding of risk factors associated with children and young people being vulnerable to online sexual exploitation. The first part of the PhD programme included synthesising and critically appraising literature on: 1) factors that relate to adolescents engaging in risky internet use, 2) victim risk, resilience and protective factors, 3) online groomer characteristics, and 4) the process involved in an adult grooming an adolescent. These systematic reviews identified methodological and theoretical gaps in the literature and influenced the design of the subsequent empirical studies. The first empirical study explored the influence psychological, interpersonal, developmental and behavioural factors had on online sexual soliciation and exploitation. This study used a quantiative approach and collected data from university students using an online survey. The second empirical study adopted a qualitative approach and interviewed law enforcement personnel and professionals who had encountered at least one victim of online sexual exploitation. In addition, 2 victims of online grooming and sexual exploitation were also interviewed. The results highlighted that behavioural (i.e., online and offline risky behaviours), social, interpersonal and psychological factors increased the likelihood of online sexual soliciation and exploitation. This PhD also developed a typology of victims of online sexual exploitation and this includes ‘naïve / curious’, ‘chaotic’ and ‘situational vulnerability’ victims
    corecore