SlideShare a Scribd company logo
1 of 28
Download to read offline
DETECTING CHILD GROOMING 
BEHAVIOUR PATTERNS ON SOCIAL MEDIA 
Miriam Fernandez 
m.fernandez@open.ac.uk 
Harith Alani 
h.alani@open.ac.uk 
A. Elizabeth Cano 
amparo.cano@open.ac.uk
INTRODUCTION 
SOCIAL MEDIA PLATFORMS 
• Widely spread across the Internet. 
• Quick and inexpensive tools for 
personal and group communications. 
• No age, geographical and cultural 
boundaries. 
• Anonymity of the users is not 
compromised. 
http://i.huffpost.com/gen/1539078/thumbs/o-SOCIAL-MEDIA-facebook.jpg
INTRODUCTION 
ONLINE CHILDREN EXPOSURE TO 
PAEDOPHILES 
* Source: NSPCC 
• 12% of 11- 16 year olds in 
the UK received unwanted 
sexual messages*. 
• 8% of 11-16 year olds in 
the UK received requests to 
send or respond to a sexual 
message*. 
http://news.bbcimg.co.uk/media/images/58277000/jpg/_58277172_138045933.jpg
INTRODUCTION 
ONLINE CHILD GROOMING 
Premeditated behaviour intending to secure the trust of a minor as a first 
step towards future engagement in sexual conduct. 
http://www.saferinternet.at/uploads/pics/442916_web_R_K_by_Christian_Seidel_pixelio.de.jpg
INTRODUCTION 
ONLINE CHILD GROOMING 
Pseudo-victims 
posing as minors 
Predators seeking to 
groom minors 
Chat-conversations
INTRODUCTION 
ONLINE CHILD GROOMING 
Pseudo-victims 
posing as minors 
Predators seeking to 
groom minors 
Chat-conversations 
Archive chat conversation 
Convicted Predators
INTRODUCTION 
IDENTIFYING GROOMING STAGES 
PERVERTED JUSTICE 
Perverted Justice 
! 
• 530 chat-room conversations. 
• Involving: 
A. PJ volunteers posing as minors. 
B. Adults seeking to begin a 
sexual relationship with a 
minor. 
Perverted Justice, http://www.perverted-justice.com/Perverted Justice, http://www.perverted-justice.com/
INTRODUCTION 
ONLINE CHILD GROOMING 
OLSON’S THEORY OF LURING COMMUNICATION (LTC) 
Gain 
Access 
age, gender, likes, 
dislikes, family.. 
[1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al 
Time 
Approach 
predator: where are you from 
victim: where I from or 
where I am now? 
what’s your asl? 
Deceptive Trust 
Development
INTRODUCTION 
ONLINE CHILD GROOMING 
OLSON’S THEORY OF LURING COMMUNICATION (LTC) 
Gain 
Access 
[1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al 
Time 
Grooming 
Approach 
predatoCrO: sRoE do you masturbate? 
victim: not really that borin 
predator: what do you like in sex? 
raise victim’s 
curiosity, .
INTRODUCTION 
ONLINE CHILD GROOMING 
OLSON’S THEORY OF LURING COMMUNICATION (LTC) 
Gain 
Access 
Deceptive Trust 
Development 
[1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al 
Time 
Cycle of Entrapment 
Grooming 
Approach Isolation 
Physical 
Approach 
Sexual 
Conduct 
predator: do you like to meet sometime? 
victim: maybe you seem cool 
… 
predator: but i'm sorry your parents 
home all the time 
victim: no
MOTIVATION 
IDENTIFYING GROOMING STAGES 
PERVERTED JUSTICE 
• Sexually abused children driven to voluntarily 
agree to physically approach the predator [36]. 
• Understanding predator’s manipulative strategies 
could help in educating children on how to 
react when expose to such situations.
RELATED WORK 
IDENTIFYING GROOMING STAGES 
Predators/Victims chat-room conversations 
• Predator detection (Kontostathis et al. [15], Michalopoulos et al. 
[17], Escalante et al. [6]) 
Online Child Grooming 
• Annotation Tools (Kontostathis et al. [15]) 
• Empirical Analysis of child grooming stages (Gupta et al.[9]) 
• Discriminate child grooming from adults cyber-sex (Bogdanova 
et al.[2])
OBJECTIVES 
DETECTING ONLINE CHILD GROOMING 
IN ONLINE CHAT-ROOMS 
• Create classification models to identify online 
child grooming stages: 
1. Trust development 
2. Grooming 
3. Physical approach 
! 
• Analyse discriminative features characterising 
these stages.
APPROACH 
IDENTIFYING GROOMING STAGES 
PERVERTED JUSTICE DATA SET 
Annotated Chat-room Conversations (Kontostathis et al[15]) 
• 50 conversations transcripts 
• Conversations with 83 to 12K lines. 
• Predator’s sentences manually labelled by two 
annotators. 
• Annotations labels: 1)Trust development, 
2)Grooming, 3)Seek for physical approach, 4) 
Other.
APPROACH 
IDENTIFYING GROOMING STAGES 
ARCHITECTURE 
PJ Conversations Preprocessing 
Predator 
Victim 
Removing Stopwords 
Stemming 
N-gram 
Syntactical 
Content 
Sentiment Polarity 
Psycho-linguistic 
Discourse 
Translation 
Emoticon 
Chat-lingo 
Feature Extraction Feature Selection 
Info.Gain 
Build SVM Classifiers 
Trust Development 
Grooming 
Approach
APPROACH 
IDENTIFYING GROOMING STAGES 
DATA PREPROCESSING 
Challenges in processing chat-room conversations 
• Irregular and ill-formed words. 
• Chat slang and teen-lingo 
• Emoticons. 
! Generated a list of over 1K terms and definitions:
APPROACH 
IDENTIFYING GROOMING STAGES 
FEATURE EXTRACTION 
Feature Description 
n-grams n-grams (n=1,2,3) BoW extracted from a sentence. 
Syntactic (POS) POS tags extracted from a sentence. 
Sentiment Polarity Average sentiment polarity of terms contained in a 
sentence 
Content Complexity, Readability, Length. 
Psycho-linguistic LIWC dimensions, based on cosine similarity of a 
sentence to a dictionary 
Discourse Semantic Frames, describing lexical use of English in texts.
APPROACH 
IDENTIFYING GROOMING STAGES 
PSYCHO-LINGUISTIC FEATURES 
• Authorship profiling [12] shown that different groups of people 
writing about a particular genre use language differently. 
• E.g. frequency in the use of certain words. 
• LIWC dataset [26] covers 60 dimensions of language. 
STYLE PATTERNS 
prepositions e.g., for, beside 
conjunctions e.g., however, whereas 
cause e.g., cuz, hence 
PSYCHOLOGICAL 
swearing e.g., damn, bloody 
affect e.g., agree, dislike 
sexual e.g., naked, porn
APPROACH 
IDENTIFYING GROOMING STAGES 
DISCOURSE FEATURES 
• Qualitative analysis [5] of PJ’s predators transcripts revealed 
frequent use of fixated discourse (i.e predator unwillingness 
to change a topic). 
• FrameNet [1], incorporate semantic generalisations of a 
discourse. 
• Covers 1K patterns used in English (e.g.,Intentionality act, 
Causality, Grant Permission)
APPROACH 
IDENTIFYING GROOMING STAGES 
DISCOURSE FEATURES 
SEMAFOR [4] to extract semantic frames from sentences. 
Sentence: Your mom will let you stay home?, I’m happy 
FRAME SEMANTIC ROLE LABEL 
Grant Permission Target 
Action 
you 
stay home 
Grantee 
Grantor 
Action 
you 
your mom 
stay home 
Emotion Directed Target 
Experiencer 
happy 
I
EXPERIMENTS 
IDENTIFYING GROOMING STAGES
EXPERIMENTS 
IDENTIFYING GROOMING STAGES 
FEATURE ANALYSIS 
Top discriminative features
EXPERIMENTS 
IDENTIFYING GROOMING STAGES 
FEATURE ANALYSIS 
Top discriminative features 
predator: lots of luck right like 
your pictures i see you keep it in 
place and look
EXPERIMENTS 
IDENTIFYING GROOMING STAGES 
FEATURE ANALYSIS 
Top discriminative featuprreesdator: you ever had anyone 
run there fingers real litely over 
your body
EXPERIMENTS 
IDENTIFYING GROOMING STAGES 
FEATURE ANALYSIS 
Top discriminative features 
predator: do you want me to 
come ther ? good
EXPERIMENTS 
CONCLUSIONS 
• Psycho-linguistic and discourse features provide an insight of 
the mindset of predators in online grooming stages. 
• Discourse patterns are effective features for the automatic 
classification of sentences into online grooming stages. 
!
EXPERIMENTS 
ampaeli@gmail.com 
@pixarelli 
https://www.gradtouch.com/uploads/images/questions.jpg
EXPERIMENTS 
FUTURE WORK 
• Some stages of online grooming are not sequential (e.g. 
predator convincing child to meet in person during trust-development). 
- Adding temporal features to the analysis could aid in 
characterising such back-forth changes on these stages. 
• Characterise sexual content between teens and between 
adults (challenging since both involve the use of sexual 
content).

More Related Content

What's hot

What's hot (20)

Malware Detection using Machine Learning
Malware Detection using Machine Learning	Malware Detection using Machine Learning
Malware Detection using Machine Learning
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Splunk
SplunkSplunk
Splunk
 
Kheirkhabarov24052017_phdays7
Kheirkhabarov24052017_phdays7Kheirkhabarov24052017_phdays7
Kheirkhabarov24052017_phdays7
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
 
Effective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat IntelligenceEffective Threat Hunting with Tactical Threat Intelligence
Effective Threat Hunting with Tactical Threat Intelligence
 
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
How AI can Think Like an Attacker (Carlos Gray at DarkTrace)
 
Enhancing traffic analysis with elk and snort
Enhancing traffic analysis with elk and snortEnhancing traffic analysis with elk and snort
Enhancing traffic analysis with elk and snort
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Improve Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USMImprove Threat Detection with OSSEC and AlienVault USM
Improve Threat Detection with OSSEC and AlienVault USM
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
The dark web
The dark webThe dark web
The dark web
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 

Similar to Detecting child grooming behaviour patterns on social media

Howard Hendricks: The Law of Communication
Howard Hendricks: The Law of CommunicationHoward Hendricks: The Law of Communication
Howard Hendricks: The Law of Communication
Richard Chamberlain
 
Communication theories comm
Communication theories commCommunication theories comm
Communication theories comm
Tarek Mahmoud
 
1. Describe physical security threats to the United States as a re.docx
1. Describe physical security threats to the United States as a re.docx1. Describe physical security threats to the United States as a re.docx
1. Describe physical security threats to the United States as a re.docx
jeremylockett77
 

Similar to Detecting child grooming behaviour patterns on social media (20)

Elmwood Franklin Inclusive Communities
Elmwood Franklin Inclusive CommunitiesElmwood Franklin Inclusive Communities
Elmwood Franklin Inclusive Communities
 
Detecting online grooming and radicalisation
Detecting online grooming and radicalisationDetecting online grooming and radicalisation
Detecting online grooming and radicalisation
 
Howard Hendricks: The Law of Communication
Howard Hendricks: The Law of CommunicationHoward Hendricks: The Law of Communication
Howard Hendricks: The Law of Communication
 
WSAME Fall Conference Cross Cultural Communication
WSAME Fall Conference Cross Cultural CommunicationWSAME Fall Conference Cross Cultural Communication
WSAME Fall Conference Cross Cultural Communication
 
Cross Cultural Communication Workshop
Cross Cultural Communication WorkshopCross Cultural Communication Workshop
Cross Cultural Communication Workshop
 
Analysing the dark side of Social Media
Analysing the dark side of Social MediaAnalysing the dark side of Social Media
Analysing the dark side of Social Media
 
Social Engineering and importance in pentesting null OWASP G4H september meet
Social Engineering and importance in pentesting null OWASP G4H september meetSocial Engineering and importance in pentesting null OWASP G4H september meet
Social Engineering and importance in pentesting null OWASP G4H september meet
 
Advancing Leadership Diversity Day CCC
Advancing Leadership Diversity Day CCCAdvancing Leadership Diversity Day CCC
Advancing Leadership Diversity Day CCC
 
John Burroughs School CC Institute Day One 2018
John Burroughs School CC Institute Day One 2018John Burroughs School CC Institute Day One 2018
John Burroughs School CC Institute Day One 2018
 
John Burroughs School In-Service Day One
John Burroughs School In-Service Day OneJohn Burroughs School In-Service Day One
John Burroughs School In-Service Day One
 
JBS In Service 2017 Day One
JBS In Service 2017 Day OneJBS In Service 2017 Day One
JBS In Service 2017 Day One
 
Communication theories comm
Communication theories commCommunication theories comm
Communication theories comm
 
Rhetoric and logic and argumentation
Rhetoric and logic and argumentationRhetoric and logic and argumentation
Rhetoric and logic and argumentation
 
University of Washington Experimental Education Unit Cross Cultural Communica...
University of Washington Experimental Education Unit Cross Cultural Communica...University of Washington Experimental Education Unit Cross Cultural Communica...
University of Washington Experimental Education Unit Cross Cultural Communica...
 
1. Describe physical security threats to the United States as a re.docx
1. Describe physical security threats to the United States as a re.docx1. Describe physical security threats to the United States as a re.docx
1. Describe physical security threats to the United States as a re.docx
 
Division And Classification Essay About Friends
Division And Classification Essay About FriendsDivision And Classification Essay About Friends
Division And Classification Essay About Friends
 
Topic 1 TSLB3243.pptx
Topic 1 TSLB3243.pptxTopic 1 TSLB3243.pptx
Topic 1 TSLB3243.pptx
 
Hillcrest School Cross Cultural Communication
Hillcrest School Cross Cultural CommunicationHillcrest School Cross Cultural Communication
Hillcrest School Cross Cultural Communication
 
ISACS Division Heads Conference Cross Cultural Communication
ISACS Division Heads Conference Cross Cultural CommunicationISACS Division Heads Conference Cross Cultural Communication
ISACS Division Heads Conference Cross Cultural Communication
 
What did you say? interculture communication [HICSS 45 2012-01-04
What did you say? interculture communication [HICSS 45 2012-01-04What did you say? interculture communication [HICSS 45 2012-01-04
What did you say? interculture communication [HICSS 45 2012-01-04
 

More from Amparo Elizabeth Cano Basave

Volatile Classification of Point of Interests based on Social Activity Streams
Volatile Classification of Point of Interests based on Social Activity StreamsVolatile Classification of Point of Interests based on Social Activity Streams
Volatile Classification of Point of Interests based on Social Activity Streams
Amparo Elizabeth Cano Basave
 
Entity-Based Semantics Emerging from Personal Awareness Streams
Entity-Based Semantics Emerging from Personal Awareness Streams Entity-Based Semantics Emerging from Personal Awareness Streams
Entity-Based Semantics Emerging from Personal Awareness Streams
Amparo Elizabeth Cano Basave
 
Veracity- Modeling and Proving Trustworthiness of Web Resources
Veracity- Modeling and Proving Trustworthiness of Web ResourcesVeracity- Modeling and Proving Trustworthiness of Web Resources
Veracity- Modeling and Proving Trustworthiness of Web Resources
Amparo Elizabeth Cano Basave
 

More from Amparo Elizabeth Cano Basave (14)

A Study of the Impact of Persuasive Argumentation in Political Debates
A Study of the Impact of Persuasive Argumentation in Political DebatesA Study of the Impact of Persuasive Argumentation in Political Debates
A Study of the Impact of Persuasive Argumentation in Political Debates
 
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic GraphsStretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
 
Violence det ijcnlp13-slideshare
Violence det ijcnlp13-slideshareViolence det ijcnlp13-slideshare
Violence det ijcnlp13-slideshare
 
Harnessing Linked Knowledge Sources for Topic Classification in Social Media
Harnessing Linked Knowledge Sources for Topic Classification in Social MediaHarnessing Linked Knowledge Sources for Topic Classification in Social Media
Harnessing Linked Knowledge Sources for Topic Classification in Social Media
 
Volatile Classification of Point of Interests based on Social Activity Streams
Volatile Classification of Point of Interests based on Social Activity StreamsVolatile Classification of Point of Interests based on Social Activity Streams
Volatile Classification of Point of Interests based on Social Activity Streams
 
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
 
Topica
TopicaTopica
Topica
 
Does sizematter
Does sizematterDoes sizematter
Does sizematter
 
Entity-Based Semantics Emerging from Personal Awareness Streams
Entity-Based Semantics Emerging from Personal Awareness Streams Entity-Based Semantics Emerging from Personal Awareness Streams
Entity-Based Semantics Emerging from Personal Awareness Streams
 
Ekaw2010 tutorial3 practical
Ekaw2010 tutorial3 practicalEkaw2010 tutorial3 practical
Ekaw2010 tutorial3 practical
 
Ekaw2010 tutorial3
Ekaw2010 tutorial3Ekaw2010 tutorial3
Ekaw2010 tutorial3
 
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
 
Veracity poster
Veracity posterVeracity poster
Veracity poster
 
Veracity- Modeling and Proving Trustworthiness of Web Resources
Veracity- Modeling and Proving Trustworthiness of Web ResourcesVeracity- Modeling and Proving Trustworthiness of Web Resources
Veracity- Modeling and Proving Trustworthiness of Web Resources
 

Recently uploaded

Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
amitlee9823
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
amitlee9823
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
amitlee9823
 

Recently uploaded (20)

Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
ELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptxELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptx
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 

Detecting child grooming behaviour patterns on social media

  • 1. DETECTING CHILD GROOMING BEHAVIOUR PATTERNS ON SOCIAL MEDIA Miriam Fernandez m.fernandez@open.ac.uk Harith Alani h.alani@open.ac.uk A. Elizabeth Cano amparo.cano@open.ac.uk
  • 2. INTRODUCTION SOCIAL MEDIA PLATFORMS • Widely spread across the Internet. • Quick and inexpensive tools for personal and group communications. • No age, geographical and cultural boundaries. • Anonymity of the users is not compromised. http://i.huffpost.com/gen/1539078/thumbs/o-SOCIAL-MEDIA-facebook.jpg
  • 3. INTRODUCTION ONLINE CHILDREN EXPOSURE TO PAEDOPHILES * Source: NSPCC • 12% of 11- 16 year olds in the UK received unwanted sexual messages*. • 8% of 11-16 year olds in the UK received requests to send or respond to a sexual message*. http://news.bbcimg.co.uk/media/images/58277000/jpg/_58277172_138045933.jpg
  • 4. INTRODUCTION ONLINE CHILD GROOMING Premeditated behaviour intending to secure the trust of a minor as a first step towards future engagement in sexual conduct. http://www.saferinternet.at/uploads/pics/442916_web_R_K_by_Christian_Seidel_pixelio.de.jpg
  • 5. INTRODUCTION ONLINE CHILD GROOMING Pseudo-victims posing as minors Predators seeking to groom minors Chat-conversations
  • 6. INTRODUCTION ONLINE CHILD GROOMING Pseudo-victims posing as minors Predators seeking to groom minors Chat-conversations Archive chat conversation Convicted Predators
  • 7. INTRODUCTION IDENTIFYING GROOMING STAGES PERVERTED JUSTICE Perverted Justice ! • 530 chat-room conversations. • Involving: A. PJ volunteers posing as minors. B. Adults seeking to begin a sexual relationship with a minor. Perverted Justice, http://www.perverted-justice.com/Perverted Justice, http://www.perverted-justice.com/
  • 8. INTRODUCTION ONLINE CHILD GROOMING OLSON’S THEORY OF LURING COMMUNICATION (LTC) Gain Access age, gender, likes, dislikes, family.. [1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al Time Approach predator: where are you from victim: where I from or where I am now? what’s your asl? Deceptive Trust Development
  • 9. INTRODUCTION ONLINE CHILD GROOMING OLSON’S THEORY OF LURING COMMUNICATION (LTC) Gain Access [1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al Time Grooming Approach predatoCrO: sRoE do you masturbate? victim: not really that borin predator: what do you like in sex? raise victim’s curiosity, .
  • 10. INTRODUCTION ONLINE CHILD GROOMING OLSON’S THEORY OF LURING COMMUNICATION (LTC) Gain Access Deceptive Trust Development [1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al Time Cycle of Entrapment Grooming Approach Isolation Physical Approach Sexual Conduct predator: do you like to meet sometime? victim: maybe you seem cool … predator: but i'm sorry your parents home all the time victim: no
  • 11. MOTIVATION IDENTIFYING GROOMING STAGES PERVERTED JUSTICE • Sexually abused children driven to voluntarily agree to physically approach the predator [36]. • Understanding predator’s manipulative strategies could help in educating children on how to react when expose to such situations.
  • 12. RELATED WORK IDENTIFYING GROOMING STAGES Predators/Victims chat-room conversations • Predator detection (Kontostathis et al. [15], Michalopoulos et al. [17], Escalante et al. [6]) Online Child Grooming • Annotation Tools (Kontostathis et al. [15]) • Empirical Analysis of child grooming stages (Gupta et al.[9]) • Discriminate child grooming from adults cyber-sex (Bogdanova et al.[2])
  • 13. OBJECTIVES DETECTING ONLINE CHILD GROOMING IN ONLINE CHAT-ROOMS • Create classification models to identify online child grooming stages: 1. Trust development 2. Grooming 3. Physical approach ! • Analyse discriminative features characterising these stages.
  • 14. APPROACH IDENTIFYING GROOMING STAGES PERVERTED JUSTICE DATA SET Annotated Chat-room Conversations (Kontostathis et al[15]) • 50 conversations transcripts • Conversations with 83 to 12K lines. • Predator’s sentences manually labelled by two annotators. • Annotations labels: 1)Trust development, 2)Grooming, 3)Seek for physical approach, 4) Other.
  • 15. APPROACH IDENTIFYING GROOMING STAGES ARCHITECTURE PJ Conversations Preprocessing Predator Victim Removing Stopwords Stemming N-gram Syntactical Content Sentiment Polarity Psycho-linguistic Discourse Translation Emoticon Chat-lingo Feature Extraction Feature Selection Info.Gain Build SVM Classifiers Trust Development Grooming Approach
  • 16. APPROACH IDENTIFYING GROOMING STAGES DATA PREPROCESSING Challenges in processing chat-room conversations • Irregular and ill-formed words. • Chat slang and teen-lingo • Emoticons. ! Generated a list of over 1K terms and definitions:
  • 17. APPROACH IDENTIFYING GROOMING STAGES FEATURE EXTRACTION Feature Description n-grams n-grams (n=1,2,3) BoW extracted from a sentence. Syntactic (POS) POS tags extracted from a sentence. Sentiment Polarity Average sentiment polarity of terms contained in a sentence Content Complexity, Readability, Length. Psycho-linguistic LIWC dimensions, based on cosine similarity of a sentence to a dictionary Discourse Semantic Frames, describing lexical use of English in texts.
  • 18. APPROACH IDENTIFYING GROOMING STAGES PSYCHO-LINGUISTIC FEATURES • Authorship profiling [12] shown that different groups of people writing about a particular genre use language differently. • E.g. frequency in the use of certain words. • LIWC dataset [26] covers 60 dimensions of language. STYLE PATTERNS prepositions e.g., for, beside conjunctions e.g., however, whereas cause e.g., cuz, hence PSYCHOLOGICAL swearing e.g., damn, bloody affect e.g., agree, dislike sexual e.g., naked, porn
  • 19. APPROACH IDENTIFYING GROOMING STAGES DISCOURSE FEATURES • Qualitative analysis [5] of PJ’s predators transcripts revealed frequent use of fixated discourse (i.e predator unwillingness to change a topic). • FrameNet [1], incorporate semantic generalisations of a discourse. • Covers 1K patterns used in English (e.g.,Intentionality act, Causality, Grant Permission)
  • 20. APPROACH IDENTIFYING GROOMING STAGES DISCOURSE FEATURES SEMAFOR [4] to extract semantic frames from sentences. Sentence: Your mom will let you stay home?, I’m happy FRAME SEMANTIC ROLE LABEL Grant Permission Target Action you stay home Grantee Grantor Action you your mom stay home Emotion Directed Target Experiencer happy I
  • 22. EXPERIMENTS IDENTIFYING GROOMING STAGES FEATURE ANALYSIS Top discriminative features
  • 23. EXPERIMENTS IDENTIFYING GROOMING STAGES FEATURE ANALYSIS Top discriminative features predator: lots of luck right like your pictures i see you keep it in place and look
  • 24. EXPERIMENTS IDENTIFYING GROOMING STAGES FEATURE ANALYSIS Top discriminative featuprreesdator: you ever had anyone run there fingers real litely over your body
  • 25. EXPERIMENTS IDENTIFYING GROOMING STAGES FEATURE ANALYSIS Top discriminative features predator: do you want me to come ther ? good
  • 26. EXPERIMENTS CONCLUSIONS • Psycho-linguistic and discourse features provide an insight of the mindset of predators in online grooming stages. • Discourse patterns are effective features for the automatic classification of sentences into online grooming stages. !
  • 27. EXPERIMENTS ampaeli@gmail.com @pixarelli https://www.gradtouch.com/uploads/images/questions.jpg
  • 28. EXPERIMENTS FUTURE WORK • Some stages of online grooming are not sequential (e.g. predator convincing child to meet in person during trust-development). - Adding temporal features to the analysis could aid in characterising such back-forth changes on these stages. • Characterise sexual content between teens and between adults (challenging since both involve the use of sexual content).