SlideShare a Scribd company logo
“Improving
the digital
landscape
for our
children”
Harith Alani
Head of Social Data Science, KMi,
The Open University
http://people.kmi.open.ac.uk/harith/
SASIG workshop, London, 9 October 2019
@halani
harith-alani
Regulating Accounts Removal
• A hostile involuntary celibates (Incels) Reddit with
40K subscribers was finally banned on 7 Nov 2017.
• Many simply moved to a new forum, Braincels,
banned a year later in October 2018.
“… steps companies should
take to proactively identify
accounts showing indicators
of CSEA activity and ensure
children are protected from
them, including disabling
accounts and informing law
enforcement where
appropriate. “
“Steps to prevent banned
users creating new accounts
in order to continue to make
inappropriate content which
violates terms of service.”
Online Harms White Paper, April 2019
(7.10, 7.24)
Misogyny on Reddit
Farrell, T; Fernandez, M; Novotny, J; Alani, H. Exploring Misogyny across the Manosphere in Reddit. ACM Web Science Conf. (WebSci’19), 2019.
https://mashable.com/article/gab-pittsburgh-shooting-back-online/
“… we removed 8.7 million
pieces of content on
Facebook that violated our
child nudity or sexual
exploitation of children
policies, 99% of which was
removed before anyone
reported it. We also
remove accounts
that promote this type of
content.”
https://newsroom.fb.com/news/2018/10/fighting-child-exploitation/
“ .. find accounts that
engage in potentially
inappropriate interactions
with children on Facebook
so that we can remove
them and prevent
additional harm.”
Regulating Accounts Removal
• Is there a shared and agreed definition of
“inappropriate interactions with children”?
• How such interactions are detected and reported by
the different platforms?
• How could platforms cooperate to track cross-platform
interactions?
• How many of such interactions need to be present for
an account to be removed?
• What steps are taken to stop these accounts from
resurfacing?
• How many accounts were removed? For what offence?
• What can be reported? By whom?
• How safe do users, and especially children,
feel about reporting content and other users?
• What is best-practice in reporting service
design?
• How many reports were made? About what?
• How many reports were issued by children?
• How long did it take to process and act on
what type of reports?
• What information were given back to the
reporters?
Reporting Harm
27th August 2019
Children’s experiences of online harm and what they want to do about it
https://www.childrenscommissioner.gov.uk/2019/08/27/childrens-experiences-of-online-harm-and-what-they-want-to-do-about-it/
“The children were particularly keen to discuss the often violent nature of
many online gaming platforms, and the potential repercussions
of reporting abusive behaviour”
“The younger students told us that the reporting process could be difficult for them to navigate”
“In November 2018, the Home Secretary co-hosted a
‘hackathon’ event in the US with Microsoft and a range
of other tech companies, where they worked to develop
a new AI product to detect online grooming of children.
Hackathon participants analysed tens of thousands of
conversations to understand patterns used by predators.
This enabled engineers to develop technology to
automatically and accurately detect these patterns. “
Online Harms White Paper 2019
• Unclear how current detection methods were
developed, evaluated, on what data.
• How explainable the AI results are and how is the
AI-Human interaction managed on the platform?
• Such technology requires continuous
development and updating.
• Need agreed quality benchmarks and gold
standard datasets.
• Developing grooming-detection AI technology
that is accurate and work across multiple
platforms, languages, and harmful content and
scenarios, is quite challenging.
AI to Detect Online Grooming
Predator: hey whats up?…
Predator: I like your pic, very cute
Predator: so you're in san diego?
13-yr-old-girl: not far
Predator: ok, you like older guys?
13-yr-old-girl: thers nice or bad ppl all ages
Predator: have some pics if you want to see
Predator: do your parents look on your computer?
Predator: so are you by yourself or is someone else there with you?
Predator: so it should just be us, our little secret
Predator: so have you ever snuck out?
13-yr-old-girl: not rlly lol
Predator: yeah, what about tonight?
Predator: think you could sneak out tonight?
Predator: well if the wrong person found out then I'd be screwed
13-yr-old-girl: im not a teller lol
Predator: I know, just wouldn't want your dad to find out
Predator: if you are still up why not sneak out for a few minutes
Predator: but that's the fun of it
13-yr-old-girl: fun to sneak?
Predator: yes
Predator: so your dad doesn't know
Predator: would take a nap but I leave for bible study around 6:30
Predator: I know I'm bad, going to bible study and talking about sex with you
Predator: yeah, there's nothing wrong with us being friends, we have the same lord
remember ;)
Predator: would take me like an hour and a half to get there
Predator: see you in a little while
Extracts from ~700 message conversation over 5
months, between a groomer, and an adult pretending
to be a 13 year old girl
Cano, A., Fernández, M., Alani, H. Detecting child grooming behaviour patterns on social media. Int. Conf. Social Informatics (SocInfo), 2014, Barcelona, Spain
• Children often struggle to identify
complex grooming behaviour
• Most detection algorithms look for the
appearance of words, not behaviours
• Most methods check individual messages,
not threads
Stages of grooming
Olson, L. N., Daggs, J. L., Ellevold, B. L., and Rogers, T. K. K.. Entrapping the innocent: Toward a
theory of child sexual predators luring communication. Communication Theory, 17(3):231–251, 2007
Approach
Grooming
Trust
Development
Isolation
Physical
Approach
Physical
Approach
Isolation
Physical
Approach
Grooming Behaviour
Social Influence
The more
radicalisation
content a user
is exposed to
and shares, the
more likely for
them to adopt a
similar language
over time.
Fernandez, M.; Gonzalez-Pardo, A; Alani, H. Radicalisation Influence in Social Media. Journal of Web Science, 2019.
• The network is the essence of social media
platforms.
• Harm (e.g., anorexia, extremism,
misinformation, abuse) propagates across
the network, and influences recipients
over time.
• Need to protect and alert users to harmful
influences and influencers.
• Monitor and regulate the use of
networking recommendation algorithms.
Individual influence: similarity of own content to radicalisation terminology
Socialinfluence:similarityofretweeted
contenttoradicalisationterminology
Tools to measure radicalisation influence and behaviour
https://trivalent-project.eu
• How can we empower the children?
• What tools can we develop to help children,
and parents, assess vulnerability?
• How could platforms raise their users’
awareness to their own vulnerabilities?
https://coinform.eu/
Mensio, M., and Alani, H. MisinfoMe: Who’s Interacting with Misinformation? International Semantic Web Conference (ISWC 2019)
Exposing Vulnerability
“All users, children and adults, should be empowered
to understand and manage risks so that they can stay
safe online.” Online Harms White Paper 2019 (9.1)
“Offenders may target children based on
vulnerabilities such as mental health, or by exploiting
publicly available information from their social media
profiles.” Online Harms White Paper 2019 (Box 25)
• Viability study of chatbots as a
communication channel to tackle
online abuse
• Situations and context in which they
would consider using the chatbot
• Understanding socio-technical
requirements
• Acquiring users’ perspectives and
expectations
• Dialogues: vocabulary and formality
“When asked how they learn to stay safe
online, both groups were relatively critical of
their safety lessons, feeling disengaged by
lengthy and repetitive talks”
27th August 2019
Children’s experiences of online harm and
what they want to do about it
Chatbots for Tackling
Online Abuse
Summary
Vulnerable users are unaware of their
vulnerability
Need for more effective and
collaborative blocking of offenders
Regulating some platforms and not
others only shifts the problem
Continuous and collaborative
development of AI detection methods
Empower the children with better and
easier tools and procedures
Modern and engaging intelligent
educational tools

More Related Content

What's hot

Project report on fake is fake - identify fake
Project report on fake is fake - identify fakeProject report on fake is fake - identify fake
Project report on fake is fake - identify fake
Vikas Gupta
 
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Corey Olszewski
 
Misinformation management-tools
Misinformation management-toolsMisinformation management-tools
Misinformation management-tools
Ahmed-Refat Refat
 
You Are Being Tracked, Evaluated and Sold: an analysis of digital inequalit...
You Are Being Tracked,  Evaluated and Sold: an analysis  of digital inequalit...You Are Being Tracked,  Evaluated and Sold: an analysis  of digital inequalit...
You Are Being Tracked, Evaluated and Sold: an analysis of digital inequalit...
Alex Dunedin
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
LIFARS
 
Delivering Your News with Impact
Delivering Your News with ImpactDelivering Your News with Impact
Delivering Your News with Impact
CNW Group
 
Fake News in Digital Culture
Fake News in Digital CultureFake News in Digital Culture
Fake News in Digital Culture
Liliana Bounegru
 
Fake news and fact finding
Fake news and fact findingFake news and fact finding
Fake news and fact finding
Yumonomics
 
CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP
 
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
Nagarajan M
 
Social Media in Law Enforcement
Social Media in Law EnforcementSocial Media in Law Enforcement
Social Media in Law Enforcement
LKinoshita
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
grp4.ed451
 
COVID Infodemic & the AI-Driven Hype Machine
COVID Infodemic & the AI-Driven Hype MachineCOVID Infodemic & the AI-Driven Hype Machine
COVID Infodemic & the AI-Driven Hype Machine
Junaid Qadir
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
LightedCandle
 
10 trends in journalism for 2017
10 trends in journalism for 201710 trends in journalism for 2017
10 trends in journalism for 2017
Amy Weiss
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
Rebekah Cummings
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
Facebook danger
Facebook dangerFacebook danger
Facebook danger
rihabswilah
 
40 Questions & 12 Trends for the Future of News.
40 Questions & 12 Trends for the Future of News.40 Questions & 12 Trends for the Future of News.
40 Questions & 12 Trends for the Future of News.
Ezra Eeman
 
What to expect from Journalism Innovation in 2017?
What to expect from Journalism Innovation in 2017?What to expect from Journalism Innovation in 2017?
What to expect from Journalism Innovation in 2017?
Francesco Marconi
 

What's hot (20)

Project report on fake is fake - identify fake
Project report on fake is fake - identify fakeProject report on fake is fake - identify fake
Project report on fake is fake - identify fake
 
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
 
Misinformation management-tools
Misinformation management-toolsMisinformation management-tools
Misinformation management-tools
 
You Are Being Tracked, Evaluated and Sold: an analysis of digital inequalit...
You Are Being Tracked,  Evaluated and Sold: an analysis  of digital inequalit...You Are Being Tracked,  Evaluated and Sold: an analysis  of digital inequalit...
You Are Being Tracked, Evaluated and Sold: an analysis of digital inequalit...
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
 
Delivering Your News with Impact
Delivering Your News with ImpactDelivering Your News with Impact
Delivering Your News with Impact
 
Fake News in Digital Culture
Fake News in Digital CultureFake News in Digital Culture
Fake News in Digital Culture
 
Fake news and fact finding
Fake news and fact findingFake news and fact finding
Fake news and fact finding
 
CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...
 
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
 
Social Media in Law Enforcement
Social Media in Law EnforcementSocial Media in Law Enforcement
Social Media in Law Enforcement
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
COVID Infodemic & the AI-Driven Hype Machine
COVID Infodemic & the AI-Driven Hype MachineCOVID Infodemic & the AI-Driven Hype Machine
COVID Infodemic & the AI-Driven Hype Machine
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
10 trends in journalism for 2017
10 trends in journalism for 201710 trends in journalism for 2017
10 trends in journalism for 2017
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Facebook danger
Facebook dangerFacebook danger
Facebook danger
 
40 Questions & 12 Trends for the Future of News.
40 Questions & 12 Trends for the Future of News.40 Questions & 12 Trends for the Future of News.
40 Questions & 12 Trends for the Future of News.
 
What to expect from Journalism Innovation in 2017?
What to expect from Journalism Innovation in 2017?What to expect from Journalism Innovation in 2017?
What to expect from Journalism Innovation in 2017?
 

Similar to SASIG Workshop on “Improving the digital landscape for our children”

Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
beh yong hua
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
victoriahoo
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
Heather Dionne
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
hmorrell1
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)
sanju prasad
 
Strategies to Connect, Communicate and Collaborate with Youth in the Digital Age
Strategies to Connect, Communicate and Collaborate with Youth in the Digital AgeStrategies to Connect, Communicate and Collaborate with Youth in the Digital Age
Strategies to Connect, Communicate and Collaborate with Youth in the Digital Age
VickiLGray
 
JSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionJSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship Discussion
OCHS Librarian
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
Vanessa Assumpção
 
“Never go through our chats and phones without our consent!” The emerging i...
“Never go through our chats and phones without our consent!”   The emerging i...“Never go through our chats and phones without our consent!”   The emerging i...
“Never go through our chats and phones without our consent!” The emerging i...
University of Sydney
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
Barry Caplin
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social media
Mike North
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
Sumaiya Ismail
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Nzeih Chukwuemeka
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
amalgarn
 
Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
JULIETADIWATA1
 
Parent meeting
Parent meetingParent meeting
Parent meeting
lightb
 
Sept 23 presentation notes
Sept 23 presentation notesSept 23 presentation notes
Sept 23 presentation notes
Linda Raftree
 
Research seminar Queen Mary University of London (CogSci)
Research seminar Queen Mary University of London (CogSci)Research seminar Queen Mary University of London (CogSci)
Research seminar Queen Mary University of London (CogSci)
Miriam Fernandez
 
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docxDiscussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
cuddietheresa
 

Similar to SASIG Workshop on “Improving the digital landscape for our children” (20)

Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)
 
Strategies to Connect, Communicate and Collaborate with Youth in the Digital Age
Strategies to Connect, Communicate and Collaborate with Youth in the Digital AgeStrategies to Connect, Communicate and Collaborate with Youth in the Digital Age
Strategies to Connect, Communicate and Collaborate with Youth in the Digital Age
 
JSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionJSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship Discussion
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
“Never go through our chats and phones without our consent!” The emerging i...
“Never go through our chats and phones without our consent!”   The emerging i...“Never go through our chats and phones without our consent!”   The emerging i...
“Never go through our chats and phones without our consent!” The emerging i...
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social media
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
Sept 23 presentation notes
Sept 23 presentation notesSept 23 presentation notes
Sept 23 presentation notes
 
Research seminar Queen Mary University of London (CogSci)
Research seminar Queen Mary University of London (CogSci)Research seminar Queen Mary University of London (CogSci)
Research seminar Queen Mary University of London (CogSci)
 
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docxDiscussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
 

More from The Open University

Misinformation vs Fact-Checks: The Ongoing Battle
Misinformation vs Fact-Checks: The Ongoing BattleMisinformation vs Fact-Checks: The Ongoing Battle
Misinformation vs Fact-Checks: The Ongoing Battle
The Open University
 
knod22-Alani.pdf
knod22-Alani.pdfknod22-Alani.pdf
knod22-Alani.pdf
The Open University
 
COMRADES summary
COMRADES summaryCOMRADES summary
COMRADES summary
The Open University
 
COMRADES project introduction
COMRADES project introduction COMRADES project introduction
COMRADES project introduction
The Open University
 
Co-Inform (Co-Creating Misinformation Resilient Societies)
Co-Inform (Co-Creating Misinformation Resilient Societies)Co-Inform (Co-Creating Misinformation Resilient Societies)
Co-Inform (Co-Creating Misinformation Resilient Societies)
The Open University
 
COMRADES ICT2018
COMRADES ICT2018COMRADES ICT2018
COMRADES ICT2018
The Open University
 
Crisis Information Processing - with the power of A.I.
Crisis Information Processing - with the power of A.I.Crisis Information Processing - with the power of A.I.
Crisis Information Processing - with the power of A.I.
The Open University
 
H2020 COMRADES project introduction
H2020 COMRADES project introduction H2020 COMRADES project introduction
H2020 COMRADES project introduction
The Open University
 
Radicalisation detection on social media
Radicalisation detection on social mediaRadicalisation detection on social media
Radicalisation detection on social media
The Open University
 
Analysing the dark side of Social Media
Analysing the dark side of Social MediaAnalysing the dark side of Social Media
Analysing the dark side of Social Media
The Open University
 
Detecting online grooming and radicalisation
Detecting online grooming and radicalisationDetecting online grooming and radicalisation
Detecting online grooming and radicalisation
The Open University
 
Detecting Grooming Behaviour on Social Media
Detecting Grooming Behaviour on Social MediaDetecting Grooming Behaviour on Social Media
Detecting Grooming Behaviour on Social Media
The Open University
 
Making More Sense Out of Social Data
Making More Sense Out of Social DataMaking More Sense Out of Social Data
Making More Sense Out of Social Data
The Open University
 
Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...
Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...
Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...
The Open University
 
From smart meters to smart behaviour
From smart meters to smart behaviourFrom smart meters to smart behaviour
From smart meters to smart behaviour
The Open University
 
Social Media Analytics with a pinch of semantics
Social Media Analytics with a pinch of semanticsSocial Media Analytics with a pinch of semantics
Social Media Analytics with a pinch of semantics
The Open University
 
Ifip wg-galway-
Ifip wg-galway-Ifip wg-galway-
Ifip wg-galway-
The Open University
 
Monitoring and Analysis of Online Communities
Monitoring and Analysis of Online CommunitiesMonitoring and Analysis of Online Communities
Monitoring and Analysis of Online Communities
The Open University
 
SDoW2010 keynote
SDoW2010 keynoteSDoW2010 keynote
SDoW2010 keynote
The Open University
 
Semantics, Sensors, and the Social Web
Semantics, Sensors, and the Social WebSemantics, Sensors, and the Social Web
Semantics, Sensors, and the Social Web
The Open University
 

More from The Open University (20)

Misinformation vs Fact-Checks: The Ongoing Battle
Misinformation vs Fact-Checks: The Ongoing BattleMisinformation vs Fact-Checks: The Ongoing Battle
Misinformation vs Fact-Checks: The Ongoing Battle
 
knod22-Alani.pdf
knod22-Alani.pdfknod22-Alani.pdf
knod22-Alani.pdf
 
COMRADES summary
COMRADES summaryCOMRADES summary
COMRADES summary
 
COMRADES project introduction
COMRADES project introduction COMRADES project introduction
COMRADES project introduction
 
Co-Inform (Co-Creating Misinformation Resilient Societies)
Co-Inform (Co-Creating Misinformation Resilient Societies)Co-Inform (Co-Creating Misinformation Resilient Societies)
Co-Inform (Co-Creating Misinformation Resilient Societies)
 
COMRADES ICT2018
COMRADES ICT2018COMRADES ICT2018
COMRADES ICT2018
 
Crisis Information Processing - with the power of A.I.
Crisis Information Processing - with the power of A.I.Crisis Information Processing - with the power of A.I.
Crisis Information Processing - with the power of A.I.
 
H2020 COMRADES project introduction
H2020 COMRADES project introduction H2020 COMRADES project introduction
H2020 COMRADES project introduction
 
Radicalisation detection on social media
Radicalisation detection on social mediaRadicalisation detection on social media
Radicalisation detection on social media
 
Analysing the dark side of Social Media
Analysing the dark side of Social MediaAnalysing the dark side of Social Media
Analysing the dark side of Social Media
 
Detecting online grooming and radicalisation
Detecting online grooming and radicalisationDetecting online grooming and radicalisation
Detecting online grooming and radicalisation
 
Detecting Grooming Behaviour on Social Media
Detecting Grooming Behaviour on Social MediaDetecting Grooming Behaviour on Social Media
Detecting Grooming Behaviour on Social Media
 
Making More Sense Out of Social Data
Making More Sense Out of Social DataMaking More Sense Out of Social Data
Making More Sense Out of Social Data
 
Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...
Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...
Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...
 
From smart meters to smart behaviour
From smart meters to smart behaviourFrom smart meters to smart behaviour
From smart meters to smart behaviour
 
Social Media Analytics with a pinch of semantics
Social Media Analytics with a pinch of semanticsSocial Media Analytics with a pinch of semantics
Social Media Analytics with a pinch of semantics
 
Ifip wg-galway-
Ifip wg-galway-Ifip wg-galway-
Ifip wg-galway-
 
Monitoring and Analysis of Online Communities
Monitoring and Analysis of Online CommunitiesMonitoring and Analysis of Online Communities
Monitoring and Analysis of Online Communities
 
SDoW2010 keynote
SDoW2010 keynoteSDoW2010 keynote
SDoW2010 keynote
 
Semantics, Sensors, and the Social Web
Semantics, Sensors, and the Social WebSemantics, Sensors, and the Social Web
Semantics, Sensors, and the Social Web
 

Recently uploaded

办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 

Recently uploaded (20)

办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 

SASIG Workshop on “Improving the digital landscape for our children”

  • 1. “Improving the digital landscape for our children” Harith Alani Head of Social Data Science, KMi, The Open University http://people.kmi.open.ac.uk/harith/ SASIG workshop, London, 9 October 2019 @halani harith-alani
  • 2. Regulating Accounts Removal • A hostile involuntary celibates (Incels) Reddit with 40K subscribers was finally banned on 7 Nov 2017. • Many simply moved to a new forum, Braincels, banned a year later in October 2018. “… steps companies should take to proactively identify accounts showing indicators of CSEA activity and ensure children are protected from them, including disabling accounts and informing law enforcement where appropriate. “ “Steps to prevent banned users creating new accounts in order to continue to make inappropriate content which violates terms of service.” Online Harms White Paper, April 2019 (7.10, 7.24) Misogyny on Reddit Farrell, T; Fernandez, M; Novotny, J; Alani, H. Exploring Misogyny across the Manosphere in Reddit. ACM Web Science Conf. (WebSci’19), 2019.
  • 4. “… we removed 8.7 million pieces of content on Facebook that violated our child nudity or sexual exploitation of children policies, 99% of which was removed before anyone reported it. We also remove accounts that promote this type of content.” https://newsroom.fb.com/news/2018/10/fighting-child-exploitation/ “ .. find accounts that engage in potentially inappropriate interactions with children on Facebook so that we can remove them and prevent additional harm.” Regulating Accounts Removal • Is there a shared and agreed definition of “inappropriate interactions with children”? • How such interactions are detected and reported by the different platforms? • How could platforms cooperate to track cross-platform interactions? • How many of such interactions need to be present for an account to be removed? • What steps are taken to stop these accounts from resurfacing? • How many accounts were removed? For what offence?
  • 5. • What can be reported? By whom? • How safe do users, and especially children, feel about reporting content and other users? • What is best-practice in reporting service design? • How many reports were made? About what? • How many reports were issued by children? • How long did it take to process and act on what type of reports? • What information were given back to the reporters? Reporting Harm 27th August 2019 Children’s experiences of online harm and what they want to do about it https://www.childrenscommissioner.gov.uk/2019/08/27/childrens-experiences-of-online-harm-and-what-they-want-to-do-about-it/ “The children were particularly keen to discuss the often violent nature of many online gaming platforms, and the potential repercussions of reporting abusive behaviour” “The younger students told us that the reporting process could be difficult for them to navigate”
  • 6. “In November 2018, the Home Secretary co-hosted a ‘hackathon’ event in the US with Microsoft and a range of other tech companies, where they worked to develop a new AI product to detect online grooming of children. Hackathon participants analysed tens of thousands of conversations to understand patterns used by predators. This enabled engineers to develop technology to automatically and accurately detect these patterns. “ Online Harms White Paper 2019 • Unclear how current detection methods were developed, evaluated, on what data. • How explainable the AI results are and how is the AI-Human interaction managed on the platform? • Such technology requires continuous development and updating. • Need agreed quality benchmarks and gold standard datasets. • Developing grooming-detection AI technology that is accurate and work across multiple platforms, languages, and harmful content and scenarios, is quite challenging. AI to Detect Online Grooming
  • 7. Predator: hey whats up?… Predator: I like your pic, very cute Predator: so you're in san diego? 13-yr-old-girl: not far Predator: ok, you like older guys? 13-yr-old-girl: thers nice or bad ppl all ages Predator: have some pics if you want to see Predator: do your parents look on your computer? Predator: so are you by yourself or is someone else there with you? Predator: so it should just be us, our little secret Predator: so have you ever snuck out? 13-yr-old-girl: not rlly lol Predator: yeah, what about tonight? Predator: think you could sneak out tonight? Predator: well if the wrong person found out then I'd be screwed 13-yr-old-girl: im not a teller lol Predator: I know, just wouldn't want your dad to find out Predator: if you are still up why not sneak out for a few minutes Predator: but that's the fun of it 13-yr-old-girl: fun to sneak? Predator: yes Predator: so your dad doesn't know Predator: would take a nap but I leave for bible study around 6:30 Predator: I know I'm bad, going to bible study and talking about sex with you Predator: yeah, there's nothing wrong with us being friends, we have the same lord remember ;) Predator: would take me like an hour and a half to get there Predator: see you in a little while Extracts from ~700 message conversation over 5 months, between a groomer, and an adult pretending to be a 13 year old girl Cano, A., Fernández, M., Alani, H. Detecting child grooming behaviour patterns on social media. Int. Conf. Social Informatics (SocInfo), 2014, Barcelona, Spain • Children often struggle to identify complex grooming behaviour • Most detection algorithms look for the appearance of words, not behaviours • Most methods check individual messages, not threads Stages of grooming Olson, L. N., Daggs, J. L., Ellevold, B. L., and Rogers, T. K. K.. Entrapping the innocent: Toward a theory of child sexual predators luring communication. Communication Theory, 17(3):231–251, 2007 Approach Grooming Trust Development Isolation Physical Approach Physical Approach Isolation Physical Approach Grooming Behaviour
  • 8. Social Influence The more radicalisation content a user is exposed to and shares, the more likely for them to adopt a similar language over time. Fernandez, M.; Gonzalez-Pardo, A; Alani, H. Radicalisation Influence in Social Media. Journal of Web Science, 2019. • The network is the essence of social media platforms. • Harm (e.g., anorexia, extremism, misinformation, abuse) propagates across the network, and influences recipients over time. • Need to protect and alert users to harmful influences and influencers. • Monitor and regulate the use of networking recommendation algorithms. Individual influence: similarity of own content to radicalisation terminology Socialinfluence:similarityofretweeted contenttoradicalisationterminology Tools to measure radicalisation influence and behaviour https://trivalent-project.eu
  • 9. • How can we empower the children? • What tools can we develop to help children, and parents, assess vulnerability? • How could platforms raise their users’ awareness to their own vulnerabilities? https://coinform.eu/ Mensio, M., and Alani, H. MisinfoMe: Who’s Interacting with Misinformation? International Semantic Web Conference (ISWC 2019) Exposing Vulnerability “All users, children and adults, should be empowered to understand and manage risks so that they can stay safe online.” Online Harms White Paper 2019 (9.1) “Offenders may target children based on vulnerabilities such as mental health, or by exploiting publicly available information from their social media profiles.” Online Harms White Paper 2019 (Box 25)
  • 10. • Viability study of chatbots as a communication channel to tackle online abuse • Situations and context in which they would consider using the chatbot • Understanding socio-technical requirements • Acquiring users’ perspectives and expectations • Dialogues: vocabulary and formality “When asked how they learn to stay safe online, both groups were relatively critical of their safety lessons, feeling disengaged by lengthy and repetitive talks” 27th August 2019 Children’s experiences of online harm and what they want to do about it Chatbots for Tackling Online Abuse
  • 11. Summary Vulnerable users are unaware of their vulnerability Need for more effective and collaborative blocking of offenders Regulating some platforms and not others only shifts the problem Continuous and collaborative development of AI detection methods Empower the children with better and easier tools and procedures Modern and engaging intelligent educational tools