SlideShare a Scribd company logo
DETECTING CHILD GROOMING 
BEHAVIOUR PATTERNS ON SOCIAL MEDIA 
Miriam Fernandez 
m.fernandez@open.ac.uk 
Harith Alani 
h.alani@open.ac.uk 
A. Elizabeth Cano 
amparo.cano@open.ac.uk
INTRODUCTION 
SOCIAL MEDIA PLATFORMS 
• Widely spread across the Internet. 
• Quick and inexpensive tools for 
personal and group communications. 
• No age, geographical and cultural 
boundaries. 
• Anonymity of the users is not 
compromised. 
http://i.huffpost.com/gen/1539078/thumbs/o-SOCIAL-MEDIA-facebook.jpg
INTRODUCTION 
ONLINE CHILDREN EXPOSURE TO 
PAEDOPHILES 
* Source: NSPCC 
• 12% of 11- 16 year olds in 
the UK received unwanted 
sexual messages*. 
• 8% of 11-16 year olds in 
the UK received requests to 
send or respond to a sexual 
message*. 
http://news.bbcimg.co.uk/media/images/58277000/jpg/_58277172_138045933.jpg
INTRODUCTION 
ONLINE CHILD GROOMING 
Premeditated behaviour intending to secure the trust of a minor as a first 
step towards future engagement in sexual conduct. 
http://www.saferinternet.at/uploads/pics/442916_web_R_K_by_Christian_Seidel_pixelio.de.jpg
INTRODUCTION 
ONLINE CHILD GROOMING 
Pseudo-victims 
posing as minors 
Predators seeking to 
groom minors 
Chat-conversations
INTRODUCTION 
ONLINE CHILD GROOMING 
Pseudo-victims 
posing as minors 
Predators seeking to 
groom minors 
Chat-conversations 
Archive chat conversation 
Convicted Predators
INTRODUCTION 
IDENTIFYING GROOMING STAGES 
PERVERTED JUSTICE 
Perverted Justice 
! 
• 530 chat-room conversations. 
• Involving: 
A. PJ volunteers posing as minors. 
B. Adults seeking to begin a 
sexual relationship with a 
minor. 
Perverted Justice, http://www.perverted-justice.com/Perverted Justice, http://www.perverted-justice.com/
INTRODUCTION 
ONLINE CHILD GROOMING 
OLSON’S THEORY OF LURING COMMUNICATION (LTC) 
Gain 
Access 
age, gender, likes, 
dislikes, family.. 
[1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al 
Time 
Approach 
predator: where are you from 
victim: where I from or 
where I am now? 
what’s your asl? 
Deceptive Trust 
Development
INTRODUCTION 
ONLINE CHILD GROOMING 
OLSON’S THEORY OF LURING COMMUNICATION (LTC) 
Gain 
Access 
[1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al 
Time 
Grooming 
Approach 
predatoCrO: sRoE do you masturbate? 
victim: not really that borin 
predator: what do you like in sex? 
raise victim’s 
curiosity, .
INTRODUCTION 
ONLINE CHILD GROOMING 
OLSON’S THEORY OF LURING COMMUNICATION (LTC) 
Gain 
Access 
Deceptive Trust 
Development 
[1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al 
Time 
Cycle of Entrapment 
Grooming 
Approach Isolation 
Physical 
Approach 
Sexual 
Conduct 
predator: do you like to meet sometime? 
victim: maybe you seem cool 
… 
predator: but i'm sorry your parents 
home all the time 
victim: no
MOTIVATION 
IDENTIFYING GROOMING STAGES 
PERVERTED JUSTICE 
• Sexually abused children driven to voluntarily 
agree to physically approach the predator [36]. 
• Understanding predator’s manipulative strategies 
could help in educating children on how to 
react when expose to such situations.
RELATED WORK 
IDENTIFYING GROOMING STAGES 
Predators/Victims chat-room conversations 
• Predator detection (Kontostathis et al. [15], Michalopoulos et al. 
[17], Escalante et al. [6]) 
Online Child Grooming 
• Annotation Tools (Kontostathis et al. [15]) 
• Empirical Analysis of child grooming stages (Gupta et al.[9]) 
• Discriminate child grooming from adults cyber-sex (Bogdanova 
et al.[2])
OBJECTIVES 
DETECTING ONLINE CHILD GROOMING 
IN ONLINE CHAT-ROOMS 
• Create classification models to identify online 
child grooming stages: 
1. Trust development 
2. Grooming 
3. Physical approach 
! 
• Analyse discriminative features characterising 
these stages.
APPROACH 
IDENTIFYING GROOMING STAGES 
PERVERTED JUSTICE DATA SET 
Annotated Chat-room Conversations (Kontostathis et al[15]) 
• 50 conversations transcripts 
• Conversations with 83 to 12K lines. 
• Predator’s sentences manually labelled by two 
annotators. 
• Annotations labels: 1)Trust development, 
2)Grooming, 3)Seek for physical approach, 4) 
Other.
APPROACH 
IDENTIFYING GROOMING STAGES 
ARCHITECTURE 
PJ Conversations Preprocessing 
Predator 
Victim 
Removing Stopwords 
Stemming 
N-gram 
Syntactical 
Content 
Sentiment Polarity 
Psycho-linguistic 
Discourse 
Translation 
Emoticon 
Chat-lingo 
Feature Extraction Feature Selection 
Info.Gain 
Build SVM Classifiers 
Trust Development 
Grooming 
Approach
APPROACH 
IDENTIFYING GROOMING STAGES 
DATA PREPROCESSING 
Challenges in processing chat-room conversations 
• Irregular and ill-formed words. 
• Chat slang and teen-lingo 
• Emoticons. 
! Generated a list of over 1K terms and definitions:
APPROACH 
IDENTIFYING GROOMING STAGES 
FEATURE EXTRACTION 
Feature Description 
n-grams n-grams (n=1,2,3) BoW extracted from a sentence. 
Syntactic (POS) POS tags extracted from a sentence. 
Sentiment Polarity Average sentiment polarity of terms contained in a 
sentence 
Content Complexity, Readability, Length. 
Psycho-linguistic LIWC dimensions, based on cosine similarity of a 
sentence to a dictionary 
Discourse Semantic Frames, describing lexical use of English in texts.
APPROACH 
IDENTIFYING GROOMING STAGES 
PSYCHO-LINGUISTIC FEATURES 
• Authorship profiling [12] shown that different groups of people 
writing about a particular genre use language differently. 
• E.g. frequency in the use of certain words. 
• LIWC dataset [26] covers 60 dimensions of language. 
STYLE PATTERNS 
prepositions e.g., for, beside 
conjunctions e.g., however, whereas 
cause e.g., cuz, hence 
PSYCHOLOGICAL 
swearing e.g., damn, bloody 
affect e.g., agree, dislike 
sexual e.g., naked, porn
APPROACH 
IDENTIFYING GROOMING STAGES 
DISCOURSE FEATURES 
• Qualitative analysis [5] of PJ’s predators transcripts revealed 
frequent use of fixated discourse (i.e predator unwillingness 
to change a topic). 
• FrameNet [1], incorporate semantic generalisations of a 
discourse. 
• Covers 1K patterns used in English (e.g.,Intentionality act, 
Causality, Grant Permission)
APPROACH 
IDENTIFYING GROOMING STAGES 
DISCOURSE FEATURES 
SEMAFOR [4] to extract semantic frames from sentences. 
Sentence: Your mom will let you stay home?, I’m happy 
FRAME SEMANTIC ROLE LABEL 
Grant Permission Target 
Action 
you 
stay home 
Grantee 
Grantor 
Action 
you 
your mom 
stay home 
Emotion Directed Target 
Experiencer 
happy 
I
EXPERIMENTS 
IDENTIFYING GROOMING STAGES
EXPERIMENTS 
IDENTIFYING GROOMING STAGES 
FEATURE ANALYSIS 
Top discriminative features
EXPERIMENTS 
IDENTIFYING GROOMING STAGES 
FEATURE ANALYSIS 
Top discriminative features 
predator: lots of luck right like 
your pictures i see you keep it in 
place and look
EXPERIMENTS 
IDENTIFYING GROOMING STAGES 
FEATURE ANALYSIS 
Top discriminative featuprreesdator: you ever had anyone 
run there fingers real litely over 
your body
EXPERIMENTS 
IDENTIFYING GROOMING STAGES 
FEATURE ANALYSIS 
Top discriminative features 
predator: do you want me to 
come ther ? good
EXPERIMENTS 
CONCLUSIONS 
• Psycho-linguistic and discourse features provide an insight of 
the mindset of predators in online grooming stages. 
• Discourse patterns are effective features for the automatic 
classification of sentences into online grooming stages. 
!
EXPERIMENTS 
ampaeli@gmail.com 
@pixarelli 
https://www.gradtouch.com/uploads/images/questions.jpg
EXPERIMENTS 
FUTURE WORK 
• Some stages of online grooming are not sequential (e.g. 
predator convincing child to meet in person during trust-development). 
- Adding temporal features to the analysis could aid in 
characterising such back-forth changes on these stages. 
• Characterise sexual content between teens and between 
adults (challenging since both involve the use of sexual 
content).

More Related Content

What's hot

Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
ijtsrd
 
Speed Detecting Camera by Kandarp Tiwari
Speed Detecting Camera by Kandarp TiwariSpeed Detecting Camera by Kandarp Tiwari
Speed Detecting Camera by Kandarp Tiwari
Kandarp Tiwari
 
Smart Penalty System (SPS) in Traffic Signals
Smart Penalty System (SPS) in Traffic SignalsSmart Penalty System (SPS) in Traffic Signals
Smart Penalty System (SPS) in Traffic Signals
HCL Technologies
 
Mobile Phone Addiction
Mobile Phone Addiction Mobile Phone Addiction
Mobile Phone Addiction
kangus314
 
Adaptive Traffic Control System : The Smart and Imperative Traffic Monitoring...
Adaptive Traffic Control System : The Smart and Imperative Traffic Monitoring...Adaptive Traffic Control System : The Smart and Imperative Traffic Monitoring...
Adaptive Traffic Control System : The Smart and Imperative Traffic Monitoring...
KajalDubey13
 
Drowsiness Detection using machine learning (1).pptx
Drowsiness Detection using machine learning (1).pptxDrowsiness Detection using machine learning (1).pptx
Drowsiness Detection using machine learning (1).pptx
sathiyasowmi
 
Electronic toll system
Electronic toll systemElectronic toll system
Electronic toll system
Nishigandha Gawas
 
Driverless car - Rahul Gosai
Driverless car - Rahul GosaiDriverless car - Rahul Gosai
Driverless car - Rahul Gosai
Rahul Gosai
 
Driving simulators to support the design of autonomous vehicles
Driving simulators to support the design of autonomous vehiclesDriving simulators to support the design of autonomous vehicles
Driving simulators to support the design of autonomous vehicles
Institute for Transport Studies (ITS)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Naheelah Irving
 
Electronic Toll Collection System
Electronic Toll Collection SystemElectronic Toll Collection System
Electronic Toll Collection System
Arshad Shareef
 
Smart application for ams using face recognition
Smart application for ams using face recognitionSmart application for ams using face recognition
Smart application for ams using face recognition
cseij
 
Intelligent Bus Tracking System Using Android
Intelligent Bus Tracking System Using AndroidIntelligent Bus Tracking System Using Android
Intelligent Bus Tracking System Using Android
AM Publications
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
tdsparks3
 
ACCIDENT PREVENTION AND DETECTION SYSTEM
ACCIDENT PREVENTION AND DETECTION SYSTEMACCIDENT PREVENTION AND DETECTION SYSTEM
ACCIDENT PREVENTION AND DETECTION SYSTEM
anand bedre
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
Apostolos Syropoulos
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Veronica Alejandro
 
Presentation on driverless cars by shahin hussan
Presentation on driverless cars by shahin hussan Presentation on driverless cars by shahin hussan
Presentation on driverless cars by shahin hussan
Shahinhussan
 
Automatic water dispenser
Automatic water dispenserAutomatic water dispenser
Automatic water dispenser
JonahApagu
 
Vehicle tracking system using GSM and GPS
Vehicle tracking system using GSM and GPSVehicle tracking system using GSM and GPS
Vehicle tracking system using GSM and GPS
Bharath Chapala
 

What's hot (20)

Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...
 
Speed Detecting Camera by Kandarp Tiwari
Speed Detecting Camera by Kandarp TiwariSpeed Detecting Camera by Kandarp Tiwari
Speed Detecting Camera by Kandarp Tiwari
 
Smart Penalty System (SPS) in Traffic Signals
Smart Penalty System (SPS) in Traffic SignalsSmart Penalty System (SPS) in Traffic Signals
Smart Penalty System (SPS) in Traffic Signals
 
Mobile Phone Addiction
Mobile Phone Addiction Mobile Phone Addiction
Mobile Phone Addiction
 
Adaptive Traffic Control System : The Smart and Imperative Traffic Monitoring...
Adaptive Traffic Control System : The Smart and Imperative Traffic Monitoring...Adaptive Traffic Control System : The Smart and Imperative Traffic Monitoring...
Adaptive Traffic Control System : The Smart and Imperative Traffic Monitoring...
 
Drowsiness Detection using machine learning (1).pptx
Drowsiness Detection using machine learning (1).pptxDrowsiness Detection using machine learning (1).pptx
Drowsiness Detection using machine learning (1).pptx
 
Electronic toll system
Electronic toll systemElectronic toll system
Electronic toll system
 
Driverless car - Rahul Gosai
Driverless car - Rahul GosaiDriverless car - Rahul Gosai
Driverless car - Rahul Gosai
 
Driving simulators to support the design of autonomous vehicles
Driving simulators to support the design of autonomous vehiclesDriving simulators to support the design of autonomous vehicles
Driving simulators to support the design of autonomous vehicles
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Electronic Toll Collection System
Electronic Toll Collection SystemElectronic Toll Collection System
Electronic Toll Collection System
 
Smart application for ams using face recognition
Smart application for ams using face recognitionSmart application for ams using face recognition
Smart application for ams using face recognition
 
Intelligent Bus Tracking System Using Android
Intelligent Bus Tracking System Using AndroidIntelligent Bus Tracking System Using Android
Intelligent Bus Tracking System Using Android
 
Internet Safety Presentation
Internet Safety PresentationInternet Safety Presentation
Internet Safety Presentation
 
ACCIDENT PREVENTION AND DETECTION SYSTEM
ACCIDENT PREVENTION AND DETECTION SYSTEMACCIDENT PREVENTION AND DETECTION SYSTEM
ACCIDENT PREVENTION AND DETECTION SYSTEM
 
CYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTIONCYBER BULLYING AND PREVENTION
CYBER BULLYING AND PREVENTION
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Presentation on driverless cars by shahin hussan
Presentation on driverless cars by shahin hussan Presentation on driverless cars by shahin hussan
Presentation on driverless cars by shahin hussan
 
Automatic water dispenser
Automatic water dispenserAutomatic water dispenser
Automatic water dispenser
 
Vehicle tracking system using GSM and GPS
Vehicle tracking system using GSM and GPSVehicle tracking system using GSM and GPS
Vehicle tracking system using GSM and GPS
 

Similar to Detecting child grooming behaviour patterns on social media

Elmwood Franklin Inclusive Communities
Elmwood Franklin Inclusive CommunitiesElmwood Franklin Inclusive Communities
Elmwood Franklin Inclusive Communities
Rosetta Eun Ryong Lee
 
Detecting online grooming and radicalisation
Detecting online grooming and radicalisationDetecting online grooming and radicalisation
Detecting online grooming and radicalisation
The Open University
 
Howard Hendricks: The Law of Communication
Howard Hendricks: The Law of CommunicationHoward Hendricks: The Law of Communication
Howard Hendricks: The Law of Communication
Richard Chamberlain
 
WSAME Fall Conference Cross Cultural Communication
WSAME Fall Conference Cross Cultural CommunicationWSAME Fall Conference Cross Cultural Communication
WSAME Fall Conference Cross Cultural Communication
Rosetta Eun Ryong Lee
 
Cross Cultural Communication Workshop
Cross Cultural Communication WorkshopCross Cultural Communication Workshop
Cross Cultural Communication Workshop
Rosetta Eun Ryong Lee
 
Analysing the dark side of Social Media
Analysing the dark side of Social MediaAnalysing the dark side of Social Media
Analysing the dark side of Social Media
The Open University
 
Social Engineering and importance in pentesting null OWASP G4H september meet
Social Engineering and importance in pentesting null OWASP G4H september meetSocial Engineering and importance in pentesting null OWASP G4H september meet
Social Engineering and importance in pentesting null OWASP G4H september meet
prashsiv
 
Advancing Leadership Diversity Day CCC
Advancing Leadership Diversity Day CCCAdvancing Leadership Diversity Day CCC
Advancing Leadership Diversity Day CCC
Rosetta Eun Ryong Lee
 
John Burroughs School CC Institute Day One 2018
John Burroughs School CC Institute Day One 2018John Burroughs School CC Institute Day One 2018
John Burroughs School CC Institute Day One 2018
Rosetta Eun Ryong Lee
 
John Burroughs School In-Service Day One
John Burroughs School In-Service Day OneJohn Burroughs School In-Service Day One
John Burroughs School In-Service Day One
Rosetta Eun Ryong Lee
 
JBS In Service 2017 Day One
JBS In Service 2017 Day OneJBS In Service 2017 Day One
JBS In Service 2017 Day One
Rosetta Eun Ryong Lee
 
Communication theories comm
Communication theories commCommunication theories comm
Communication theories comm
Tarek Mahmoud
 
Rhetoric and logic and argumentation
Rhetoric and logic and argumentationRhetoric and logic and argumentation
Rhetoric and logic and argumentation
pvenglishteach
 
University of Washington Experimental Education Unit Cross Cultural Communica...
University of Washington Experimental Education Unit Cross Cultural Communica...University of Washington Experimental Education Unit Cross Cultural Communica...
University of Washington Experimental Education Unit Cross Cultural Communica...
Rosetta Eun Ryong Lee
 
1. Describe physical security threats to the United States as a re.docx
1. Describe physical security threats to the United States as a re.docx1. Describe physical security threats to the United States as a re.docx
1. Describe physical security threats to the United States as a re.docx
jeremylockett77
 
Division And Classification Essay About Friends
Division And Classification Essay About FriendsDivision And Classification Essay About Friends
Division And Classification Essay About Friends
Tasha Hernandez
 
Topic 1 TSLB3243.pptx
Topic 1 TSLB3243.pptxTopic 1 TSLB3243.pptx
Topic 1 TSLB3243.pptx
Felicitayii
 
Hillcrest School Cross Cultural Communication
Hillcrest School Cross Cultural CommunicationHillcrest School Cross Cultural Communication
Hillcrest School Cross Cultural Communication
Rosetta Eun Ryong Lee
 
ISACS Division Heads Conference Cross Cultural Communication
ISACS Division Heads Conference Cross Cultural CommunicationISACS Division Heads Conference Cross Cultural Communication
ISACS Division Heads Conference Cross Cultural Communication
Rosetta Eun Ryong Lee
 
What did you say? interculture communication [HICSS 45 2012-01-04
What did you say? interculture communication [HICSS 45 2012-01-04What did you say? interculture communication [HICSS 45 2012-01-04
What did you say? interculture communication [HICSS 45 2012-01-04
Frederick Zarndt
 

Similar to Detecting child grooming behaviour patterns on social media (20)

Elmwood Franklin Inclusive Communities
Elmwood Franklin Inclusive CommunitiesElmwood Franklin Inclusive Communities
Elmwood Franklin Inclusive Communities
 
Detecting online grooming and radicalisation
Detecting online grooming and radicalisationDetecting online grooming and radicalisation
Detecting online grooming and radicalisation
 
Howard Hendricks: The Law of Communication
Howard Hendricks: The Law of CommunicationHoward Hendricks: The Law of Communication
Howard Hendricks: The Law of Communication
 
WSAME Fall Conference Cross Cultural Communication
WSAME Fall Conference Cross Cultural CommunicationWSAME Fall Conference Cross Cultural Communication
WSAME Fall Conference Cross Cultural Communication
 
Cross Cultural Communication Workshop
Cross Cultural Communication WorkshopCross Cultural Communication Workshop
Cross Cultural Communication Workshop
 
Analysing the dark side of Social Media
Analysing the dark side of Social MediaAnalysing the dark side of Social Media
Analysing the dark side of Social Media
 
Social Engineering and importance in pentesting null OWASP G4H september meet
Social Engineering and importance in pentesting null OWASP G4H september meetSocial Engineering and importance in pentesting null OWASP G4H september meet
Social Engineering and importance in pentesting null OWASP G4H september meet
 
Advancing Leadership Diversity Day CCC
Advancing Leadership Diversity Day CCCAdvancing Leadership Diversity Day CCC
Advancing Leadership Diversity Day CCC
 
John Burroughs School CC Institute Day One 2018
John Burroughs School CC Institute Day One 2018John Burroughs School CC Institute Day One 2018
John Burroughs School CC Institute Day One 2018
 
John Burroughs School In-Service Day One
John Burroughs School In-Service Day OneJohn Burroughs School In-Service Day One
John Burroughs School In-Service Day One
 
JBS In Service 2017 Day One
JBS In Service 2017 Day OneJBS In Service 2017 Day One
JBS In Service 2017 Day One
 
Communication theories comm
Communication theories commCommunication theories comm
Communication theories comm
 
Rhetoric and logic and argumentation
Rhetoric and logic and argumentationRhetoric and logic and argumentation
Rhetoric and logic and argumentation
 
University of Washington Experimental Education Unit Cross Cultural Communica...
University of Washington Experimental Education Unit Cross Cultural Communica...University of Washington Experimental Education Unit Cross Cultural Communica...
University of Washington Experimental Education Unit Cross Cultural Communica...
 
1. Describe physical security threats to the United States as a re.docx
1. Describe physical security threats to the United States as a re.docx1. Describe physical security threats to the United States as a re.docx
1. Describe physical security threats to the United States as a re.docx
 
Division And Classification Essay About Friends
Division And Classification Essay About FriendsDivision And Classification Essay About Friends
Division And Classification Essay About Friends
 
Topic 1 TSLB3243.pptx
Topic 1 TSLB3243.pptxTopic 1 TSLB3243.pptx
Topic 1 TSLB3243.pptx
 
Hillcrest School Cross Cultural Communication
Hillcrest School Cross Cultural CommunicationHillcrest School Cross Cultural Communication
Hillcrest School Cross Cultural Communication
 
ISACS Division Heads Conference Cross Cultural Communication
ISACS Division Heads Conference Cross Cultural CommunicationISACS Division Heads Conference Cross Cultural Communication
ISACS Division Heads Conference Cross Cultural Communication
 
What did you say? interculture communication [HICSS 45 2012-01-04
What did you say? interculture communication [HICSS 45 2012-01-04What did you say? interculture communication [HICSS 45 2012-01-04
What did you say? interculture communication [HICSS 45 2012-01-04
 

More from Amparo Elizabeth Cano Basave

A Study of the Impact of Persuasive Argumentation in Political Debates
A Study of the Impact of Persuasive Argumentation in Political DebatesA Study of the Impact of Persuasive Argumentation in Political Debates
A Study of the Impact of Persuasive Argumentation in Political Debates
Amparo Elizabeth Cano Basave
 
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic GraphsStretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
Amparo Elizabeth Cano Basave
 
Violence det ijcnlp13-slideshare
Violence det ijcnlp13-slideshareViolence det ijcnlp13-slideshare
Violence det ijcnlp13-slideshare
Amparo Elizabeth Cano Basave
 
Harnessing Linked Knowledge Sources for Topic Classification in Social Media
Harnessing Linked Knowledge Sources for Topic Classification in Social MediaHarnessing Linked Knowledge Sources for Topic Classification in Social Media
Harnessing Linked Knowledge Sources for Topic Classification in Social Media
Amparo Elizabeth Cano Basave
 
Volatile Classification of Point of Interests based on Social Activity Streams
Volatile Classification of Point of Interests based on Social Activity StreamsVolatile Classification of Point of Interests based on Social Activity Streams
Volatile Classification of Point of Interests based on Social Activity Streams
Amparo Elizabeth Cano Basave
 
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
Amparo Elizabeth Cano Basave
 
Topica
TopicaTopica
Does sizematter
Does sizematterDoes sizematter
Entity-Based Semantics Emerging from Personal Awareness Streams
Entity-Based Semantics Emerging from Personal Awareness Streams Entity-Based Semantics Emerging from Personal Awareness Streams
Entity-Based Semantics Emerging from Personal Awareness Streams
Amparo Elizabeth Cano Basave
 
Ekaw2010 tutorial3 practical
Ekaw2010 tutorial3 practicalEkaw2010 tutorial3 practical
Ekaw2010 tutorial3 practical
Amparo Elizabeth Cano Basave
 
Ekaw2010 tutorial3
Ekaw2010 tutorial3Ekaw2010 tutorial3
Ekaw2010 tutorial3
Amparo Elizabeth Cano Basave
 
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
Amparo Elizabeth Cano Basave
 
Veracity- Modeling and Proving Trustworthiness of Web Resources
Veracity- Modeling and Proving Trustworthiness of Web ResourcesVeracity- Modeling and Proving Trustworthiness of Web Resources
Veracity- Modeling and Proving Trustworthiness of Web ResourcesAmparo Elizabeth Cano Basave
 

More from Amparo Elizabeth Cano Basave (14)

A Study of the Impact of Persuasive Argumentation in Political Debates
A Study of the Impact of Persuasive Argumentation in Political DebatesA Study of the Impact of Persuasive Argumentation in Political Debates
A Study of the Impact of Persuasive Argumentation in Political Debates
 
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic GraphsStretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
Stretching the Life of Twitter Classifiers with Time-Stamped Semantic Graphs
 
Violence det ijcnlp13-slideshare
Violence det ijcnlp13-slideshareViolence det ijcnlp13-slideshare
Violence det ijcnlp13-slideshare
 
Harnessing Linked Knowledge Sources for Topic Classification in Social Media
Harnessing Linked Knowledge Sources for Topic Classification in Social MediaHarnessing Linked Knowledge Sources for Topic Classification in Social Media
Harnessing Linked Knowledge Sources for Topic Classification in Social Media
 
Volatile Classification of Point of Interests based on Social Activity Streams
Volatile Classification of Point of Interests based on Social Activity StreamsVolatile Classification of Point of Interests based on Social Activity Streams
Volatile Classification of Point of Interests based on Social Activity Streams
 
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
Sensing 
Presence
(PreSense)
Ontology
–
 
User 
Modelling
 in 
the 
Semantic ...
 
Topica
TopicaTopica
Topica
 
Does sizematter
Does sizematterDoes sizematter
Does sizematter
 
Entity-Based Semantics Emerging from Personal Awareness Streams
Entity-Based Semantics Emerging from Personal Awareness Streams Entity-Based Semantics Emerging from Personal Awareness Streams
Entity-Based Semantics Emerging from Personal Awareness Streams
 
Ekaw2010 tutorial3 practical
Ekaw2010 tutorial3 practicalEkaw2010 tutorial3 practical
Ekaw2010 tutorial3 practical
 
Ekaw2010 tutorial3
Ekaw2010 tutorial3Ekaw2010 tutorial3
Ekaw2010 tutorial3
 
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
Representing, Proving and Sharing Trustworthiness of Web Resources Using Vera...
 
Veracity poster
Veracity posterVeracity poster
Veracity poster
 
Veracity- Modeling and Proving Trustworthiness of Web Resources
Veracity- Modeling and Proving Trustworthiness of Web ResourcesVeracity- Modeling and Proving Trustworthiness of Web Resources
Veracity- Modeling and Proving Trustworthiness of Web Resources
 

Recently uploaded

My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
rwarrenll
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
nyfuhyz
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
oz8q3jxlp
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
mzpolocfi
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
Roger Valdez
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 

Recently uploaded (20)

My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.My burning issue is homelessness K.C.M.O.
My burning issue is homelessness K.C.M.O.
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
一比一原版(Deakin毕业证书)迪肯大学毕业证如何办理
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
Everything you wanted to know about LIHTC
Everything you wanted to know about LIHTCEverything you wanted to know about LIHTC
Everything you wanted to know about LIHTC
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 

Detecting child grooming behaviour patterns on social media

  • 1. DETECTING CHILD GROOMING BEHAVIOUR PATTERNS ON SOCIAL MEDIA Miriam Fernandez m.fernandez@open.ac.uk Harith Alani h.alani@open.ac.uk A. Elizabeth Cano amparo.cano@open.ac.uk
  • 2. INTRODUCTION SOCIAL MEDIA PLATFORMS • Widely spread across the Internet. • Quick and inexpensive tools for personal and group communications. • No age, geographical and cultural boundaries. • Anonymity of the users is not compromised. http://i.huffpost.com/gen/1539078/thumbs/o-SOCIAL-MEDIA-facebook.jpg
  • 3. INTRODUCTION ONLINE CHILDREN EXPOSURE TO PAEDOPHILES * Source: NSPCC • 12% of 11- 16 year olds in the UK received unwanted sexual messages*. • 8% of 11-16 year olds in the UK received requests to send or respond to a sexual message*. http://news.bbcimg.co.uk/media/images/58277000/jpg/_58277172_138045933.jpg
  • 4. INTRODUCTION ONLINE CHILD GROOMING Premeditated behaviour intending to secure the trust of a minor as a first step towards future engagement in sexual conduct. http://www.saferinternet.at/uploads/pics/442916_web_R_K_by_Christian_Seidel_pixelio.de.jpg
  • 5. INTRODUCTION ONLINE CHILD GROOMING Pseudo-victims posing as minors Predators seeking to groom minors Chat-conversations
  • 6. INTRODUCTION ONLINE CHILD GROOMING Pseudo-victims posing as minors Predators seeking to groom minors Chat-conversations Archive chat conversation Convicted Predators
  • 7. INTRODUCTION IDENTIFYING GROOMING STAGES PERVERTED JUSTICE Perverted Justice ! • 530 chat-room conversations. • Involving: A. PJ volunteers posing as minors. B. Adults seeking to begin a sexual relationship with a minor. Perverted Justice, http://www.perverted-justice.com/Perverted Justice, http://www.perverted-justice.com/
  • 8. INTRODUCTION ONLINE CHILD GROOMING OLSON’S THEORY OF LURING COMMUNICATION (LTC) Gain Access age, gender, likes, dislikes, family.. [1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al Time Approach predator: where are you from victim: where I from or where I am now? what’s your asl? Deceptive Trust Development
  • 9. INTRODUCTION ONLINE CHILD GROOMING OLSON’S THEORY OF LURING COMMUNICATION (LTC) Gain Access [1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al Time Grooming Approach predatoCrO: sRoE do you masturbate? victim: not really that borin predator: what do you like in sex? raise victim’s curiosity, .
  • 10. INTRODUCTION ONLINE CHILD GROOMING OLSON’S THEORY OF LURING COMMUNICATION (LTC) Gain Access Deceptive Trust Development [1] Towards a Theory of Child Sexual Predator’s Luring Communication. L.N. Olson et al Time Cycle of Entrapment Grooming Approach Isolation Physical Approach Sexual Conduct predator: do you like to meet sometime? victim: maybe you seem cool … predator: but i'm sorry your parents home all the time victim: no
  • 11. MOTIVATION IDENTIFYING GROOMING STAGES PERVERTED JUSTICE • Sexually abused children driven to voluntarily agree to physically approach the predator [36]. • Understanding predator’s manipulative strategies could help in educating children on how to react when expose to such situations.
  • 12. RELATED WORK IDENTIFYING GROOMING STAGES Predators/Victims chat-room conversations • Predator detection (Kontostathis et al. [15], Michalopoulos et al. [17], Escalante et al. [6]) Online Child Grooming • Annotation Tools (Kontostathis et al. [15]) • Empirical Analysis of child grooming stages (Gupta et al.[9]) • Discriminate child grooming from adults cyber-sex (Bogdanova et al.[2])
  • 13. OBJECTIVES DETECTING ONLINE CHILD GROOMING IN ONLINE CHAT-ROOMS • Create classification models to identify online child grooming stages: 1. Trust development 2. Grooming 3. Physical approach ! • Analyse discriminative features characterising these stages.
  • 14. APPROACH IDENTIFYING GROOMING STAGES PERVERTED JUSTICE DATA SET Annotated Chat-room Conversations (Kontostathis et al[15]) • 50 conversations transcripts • Conversations with 83 to 12K lines. • Predator’s sentences manually labelled by two annotators. • Annotations labels: 1)Trust development, 2)Grooming, 3)Seek for physical approach, 4) Other.
  • 15. APPROACH IDENTIFYING GROOMING STAGES ARCHITECTURE PJ Conversations Preprocessing Predator Victim Removing Stopwords Stemming N-gram Syntactical Content Sentiment Polarity Psycho-linguistic Discourse Translation Emoticon Chat-lingo Feature Extraction Feature Selection Info.Gain Build SVM Classifiers Trust Development Grooming Approach
  • 16. APPROACH IDENTIFYING GROOMING STAGES DATA PREPROCESSING Challenges in processing chat-room conversations • Irregular and ill-formed words. • Chat slang and teen-lingo • Emoticons. ! Generated a list of over 1K terms and definitions:
  • 17. APPROACH IDENTIFYING GROOMING STAGES FEATURE EXTRACTION Feature Description n-grams n-grams (n=1,2,3) BoW extracted from a sentence. Syntactic (POS) POS tags extracted from a sentence. Sentiment Polarity Average sentiment polarity of terms contained in a sentence Content Complexity, Readability, Length. Psycho-linguistic LIWC dimensions, based on cosine similarity of a sentence to a dictionary Discourse Semantic Frames, describing lexical use of English in texts.
  • 18. APPROACH IDENTIFYING GROOMING STAGES PSYCHO-LINGUISTIC FEATURES • Authorship profiling [12] shown that different groups of people writing about a particular genre use language differently. • E.g. frequency in the use of certain words. • LIWC dataset [26] covers 60 dimensions of language. STYLE PATTERNS prepositions e.g., for, beside conjunctions e.g., however, whereas cause e.g., cuz, hence PSYCHOLOGICAL swearing e.g., damn, bloody affect e.g., agree, dislike sexual e.g., naked, porn
  • 19. APPROACH IDENTIFYING GROOMING STAGES DISCOURSE FEATURES • Qualitative analysis [5] of PJ’s predators transcripts revealed frequent use of fixated discourse (i.e predator unwillingness to change a topic). • FrameNet [1], incorporate semantic generalisations of a discourse. • Covers 1K patterns used in English (e.g.,Intentionality act, Causality, Grant Permission)
  • 20. APPROACH IDENTIFYING GROOMING STAGES DISCOURSE FEATURES SEMAFOR [4] to extract semantic frames from sentences. Sentence: Your mom will let you stay home?, I’m happy FRAME SEMANTIC ROLE LABEL Grant Permission Target Action you stay home Grantee Grantor Action you your mom stay home Emotion Directed Target Experiencer happy I
  • 22. EXPERIMENTS IDENTIFYING GROOMING STAGES FEATURE ANALYSIS Top discriminative features
  • 23. EXPERIMENTS IDENTIFYING GROOMING STAGES FEATURE ANALYSIS Top discriminative features predator: lots of luck right like your pictures i see you keep it in place and look
  • 24. EXPERIMENTS IDENTIFYING GROOMING STAGES FEATURE ANALYSIS Top discriminative featuprreesdator: you ever had anyone run there fingers real litely over your body
  • 25. EXPERIMENTS IDENTIFYING GROOMING STAGES FEATURE ANALYSIS Top discriminative features predator: do you want me to come ther ? good
  • 26. EXPERIMENTS CONCLUSIONS • Psycho-linguistic and discourse features provide an insight of the mindset of predators in online grooming stages. • Discourse patterns are effective features for the automatic classification of sentences into online grooming stages. !
  • 27. EXPERIMENTS ampaeli@gmail.com @pixarelli https://www.gradtouch.com/uploads/images/questions.jpg
  • 28. EXPERIMENTS FUTURE WORK • Some stages of online grooming are not sequential (e.g. predator convincing child to meet in person during trust-development). - Adding temporal features to the analysis could aid in characterising such back-forth changes on these stages. • Characterise sexual content between teens and between adults (challenging since both involve the use of sexual content).