2,481 research outputs found
Deceptive identity performance:Offender moves and multiple identities in online child abuse conversations
This article provides a case study of deceptive online identity performance by a convicted child sex offender. Most prior linguistic and psychological research into online sexual abuse analyses transcripts involving adult decoys posing as children. In contrast, our data comprise genuine online conversations between the offender and 20 victims. Using move analysis (Swales 1981, 1990), we explore the offenderâs numerous presented personas. The offenderâs use of rhetorical moves is investigated, as is the extent to which the frequency and structure of these moves contribute to and discriminate between the various online personas he adopts. We find from eight frequently adopted personas that two divergent identity positions emerge: the sexual pursuer/aggressor, performed by the majority of his online personas, and the friend/boyfriend, performed by a single persona. Analysis of the offenderâs self-describing assertives suggests this distinctive persona shares most attributes with the offenderâs âhome identityâ. This article importantly raises the question of whether move analysis might be useful in identifying the âoffline personaâ in cases where offenders are known to operate multiple online personas in the pursuit of child victims
âgo on cam but dnt be dirtyâ: linguistic levels of identity assumption in undercover online operations against child sex abusers
One way in which linguists have been able to offer their expertise to undercover online policing in England and Wales is assisting police officers in the assumption of alternative identities in order to apprehend offenders in the context of the online sexual abuse and grooming of children. With reference to the historical Instant Messaging (IM) logs of a teenage female victim in a closed case of online sexual abuse, and the IM logs of trainee undercover officers (UCOs) as they attempt to impersonate her during a training task, we report here on work that draws on analyses of online interactions to develop a linguistic model that can be used to improve performance in identity disguise. We compare traineesâ performance before and after input from linguists in order to show how analysis at a number of linguistic levels can contribute to the training and support of specialist investigators of online child sex abuse
Online grooming:moves and strategies
Using transcripts of chatroom grooming interactions, this paper explores and evaluates the usefulness of Swalesâ (1981) move analysis framework in contributing to the current understanding of online grooming processes. The framework is applied to seven transcripts of grooming interactions taken from perverted-justice.com. The paper presents 14 identified rhetorical moves used in chatroom grooming and explores the broad structures that grooming conversations take by presenting these structures as colour-coded visualisations which we have termed âmove mapsâ. It also examines how some individual linguistic features are used to realise a single move termed âAssessing and Managing Riskâ. The findings suggest that move analysis can usefully contribute in two key ways: determining communicative functions associated with 'grooming language' and the visualisation of variation between grooming interactions
Non-Destructive Testing of Carbon Fiber Crank Arms
Carbon fiber components present unique challenges for detecting defects, damage, and fatigue. Nondestructive methods exist for testing and locating defects. However, most of these methods are expensive, not versatile enough for practical use on non-idealized parts, or both. Vibrothermography can be an affordable option and has shown promising results with thin rectangular panels. The goal of this senior project was to assess the feasibility of using vibrothermography to find defects in SRAM carbon fiber crank arms. Our team found vibrothermography to be a feasible method of non-destructive testing for carbon fiber crank arms, and this report discusses the development and implementation of the necessary theory, fixturing, and testing procedures
Labeless and reversible immunosensor assay based upon an electrochemical current-transient protocol
A novel labeless and reversible immunoassay based upon an electrochemical
current-transient protocol is reported which offers many advantages in
comparison to classical immuno-biochemical analyses in terms of simplicity,
speed of response, reusability and possibility of multiple determinations.
Conducting polypyrrole films containing antibodies against 1) Bovine Serum
Albumin (BSA) and 2) Digoxin were deposited on the surface of platinum
electrodes to produce conductive affinity matrices having clearly defined
binding characteristics. The deposition process has been investigated using 125I
labelled anti-digoxin to determine optimal fabrication protocols. Antibody
integrity and activity, together with non-specific binding of antigen on the
conducting matrix have also been investigated using tritiated digoxin to probe
polypyrrole/anti-digoxin films. Amperometric responses to digoxin were recorded
in flow conditions using these films, but the technique was limited in use
mainly due to baseline instability. Anti-BSA - polypyrrole matrices were
investigated in more detail in both flow and quiescent conditions. No observable
response was found in flow conditions, however under quiescent conditions (in
non-stirred batch cell), anti-BSA â polypyrrole films have been demonstrated to
function as novel quantitative chronoamperometric immuno-biosensors when
interrogated using a pulsed potential waveform. The behaviour of the electrodes
showed that the antibody/antigen binding and/or interaction process underlying
the response observed was reversible in nature, indicating that the electrodes
could be used for multiple sensing protocols. Calibration profiles for BSA
demonstrated linearity for a concentration range of 0-50 ppm but tended towards
a plateau at higher concentrations. Factors relating to replicate sensor
production, sample measurement and reproducibility are discuss
Enabling Explainable Fusion in Deep Learning with Fuzzy Integral Neural Networks
Information fusion is an essential part of numerous engineering systems and
biological functions, e.g., human cognition. Fusion occurs at many levels,
ranging from the low-level combination of signals to the high-level aggregation
of heterogeneous decision-making processes. While the last decade has witnessed
an explosion of research in deep learning, fusion in neural networks has not
observed the same revolution. Specifically, most neural fusion approaches are
ad hoc, are not understood, are distributed versus localized, and/or
explainability is low (if present at all). Herein, we prove that the fuzzy
Choquet integral (ChI), a powerful nonlinear aggregation function, can be
represented as a multi-layer network, referred to hereafter as ChIMP. We also
put forth an improved ChIMP (iChIMP) that leads to a stochastic gradient
descent-based optimization in light of the exponential number of ChI inequality
constraints. An additional benefit of ChIMP/iChIMP is that it enables
eXplainable AI (XAI). Synthetic validation experiments are provided and iChIMP
is applied to the fusion of a set of heterogeneous architecture deep models in
remote sensing. We show an improvement in model accuracy and our previously
established XAI indices shed light on the quality of our data, model, and its
decisions.Comment: IEEE Transactions on Fuzzy System
Do Perverted Justice chat logs contain examples of Overt Persuasion and Sexual Extortion?:A research note responding to Chiang and Grant 2017 and 2018.
Studies by Chiang and Grant (2017, 2018) on the rhetorical moves of online child sexual abusers suggest that interactions between offenders and adults posing as children differ in various ways from those between offenders and genuine child victims. They point specifically to the use by one offender of moves identified as Overt persuasion and Extortion in his interactions with real children noting that these were absent from data featuring adults posing as children. The current study in-vestigates whether these more coercive and forceful moves are in fact absent in sexualised inter-actions between offenders and adult decoys by applying corpus linguistic techniques to a corpus of 622 chat logs. It is shown that overtly persuasive language is rare in the texts, and that no extortion occurred. This finding supportâs Chiang and Grantâs claim and their assertion that data featuring adult decoys is not truly representative of interactions between child victims and their abusers
- âŠ