SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
“Improving
the digital
landscape
for our
children”
Harith Alani
Head of Social Data Science, KMi,
The Open University
http://people.kmi.open.ac.uk/harith/
SASIG workshop, London, 9 October 2019
@halani
harith-alani
Regulating Accounts Removal
• A hostile involuntary celibates (Incels) Reddit with
40K subscribers was finally banned on 7 Nov 2017.
• Many simply moved to a new forum, Braincels,
banned a year later in October 2018.
“… steps companies should
take to proactively identify
accounts showing indicators
of CSEA activity and ensure
children are protected from
them, including disabling
accounts and informing law
enforcement where
appropriate. “
“Steps to prevent banned
users creating new accounts
in order to continue to make
inappropriate content which
violates terms of service.”
Online Harms White Paper, April 2019
(7.10, 7.24)
Misogyny on Reddit
Farrell, T; Fernandez, M; Novotny, J; Alani, H. Exploring Misogyny across the Manosphere in Reddit. ACM Web Science Conf. (WebSci’19), 2019.
https://mashable.com/article/gab-pittsburgh-shooting-back-online/
“… we removed 8.7 million
pieces of content on
Facebook that violated our
child nudity or sexual
exploitation of children
policies, 99% of which was
removed before anyone
reported it. We also
remove accounts
that promote this type of
content.”
https://newsroom.fb.com/news/2018/10/fighting-child-exploitation/
“ .. find accounts that
engage in potentially
inappropriate interactions
with children on Facebook
so that we can remove
them and prevent
additional harm.”
Regulating Accounts Removal
• Is there a shared and agreed definition of
“inappropriate interactions with children”?
• How such interactions are detected and reported by
the different platforms?
• How could platforms cooperate to track cross-platform
interactions?
• How many of such interactions need to be present for
an account to be removed?
• What steps are taken to stop these accounts from
resurfacing?
• How many accounts were removed? For what offence?
• What can be reported? By whom?
• How safe do users, and especially children,
feel about reporting content and other users?
• What is best-practice in reporting service
design?
• How many reports were made? About what?
• How many reports were issued by children?
• How long did it take to process and act on
what type of reports?
• What information were given back to the
reporters?
Reporting Harm
27th August 2019
Children’s experiences of online harm and what they want to do about it
https://www.childrenscommissioner.gov.uk/2019/08/27/childrens-experiences-of-online-harm-and-what-they-want-to-do-about-it/
“The children were particularly keen to discuss the often violent nature of
many online gaming platforms, and the potential repercussions
of reporting abusive behaviour”
“The younger students told us that the reporting process could be difficult for them to navigate”
“In November 2018, the Home Secretary co-hosted a
‘hackathon’ event in the US with Microsoft and a range
of other tech companies, where they worked to develop
a new AI product to detect online grooming of children.
Hackathon participants analysed tens of thousands of
conversations to understand patterns used by predators.
This enabled engineers to develop technology to
automatically and accurately detect these patterns. “
Online Harms White Paper 2019
• Unclear how current detection methods were
developed, evaluated, on what data.
• How explainable the AI results are and how is the
AI-Human interaction managed on the platform?
• Such technology requires continuous
development and updating.
• Need agreed quality benchmarks and gold
standard datasets.
• Developing grooming-detection AI technology
that is accurate and work across multiple
platforms, languages, and harmful content and
scenarios, is quite challenging.
AI to Detect Online Grooming
Predator: hey whats up?…
Predator: I like your pic, very cute
Predator: so you're in san diego?
13-yr-old-girl: not far
Predator: ok, you like older guys?
13-yr-old-girl: thers nice or bad ppl all ages
Predator: have some pics if you want to see
Predator: do your parents look on your computer?
Predator: so are you by yourself or is someone else there with you?
Predator: so it should just be us, our little secret
Predator: so have you ever snuck out?
13-yr-old-girl: not rlly lol
Predator: yeah, what about tonight?
Predator: think you could sneak out tonight?
Predator: well if the wrong person found out then I'd be screwed
13-yr-old-girl: im not a teller lol
Predator: I know, just wouldn't want your dad to find out
Predator: if you are still up why not sneak out for a few minutes
Predator: but that's the fun of it
13-yr-old-girl: fun to sneak?
Predator: yes
Predator: so your dad doesn't know
Predator: would take a nap but I leave for bible study around 6:30
Predator: I know I'm bad, going to bible study and talking about sex with you
Predator: yeah, there's nothing wrong with us being friends, we have the same lord
remember ;)
Predator: would take me like an hour and a half to get there
Predator: see you in a little while
Extracts from ~700 message conversation over 5
months, between a groomer, and an adult pretending
to be a 13 year old girl
Cano, A., Fernández, M., Alani, H. Detecting child grooming behaviour patterns on social media. Int. Conf. Social Informatics (SocInfo), 2014, Barcelona, Spain
• Children often struggle to identify
complex grooming behaviour
• Most detection algorithms look for the
appearance of words, not behaviours
• Most methods check individual messages,
not threads
Stages of grooming
Olson, L. N., Daggs, J. L., Ellevold, B. L., and Rogers, T. K. K.. Entrapping the innocent: Toward a
theory of child sexual predators luring communication. Communication Theory, 17(3):231–251, 2007
Approach
Grooming
Trust
Development
Isolation
Physical
Approach
Physical
Approach
Isolation
Physical
Approach
Grooming Behaviour
Social Influence
The more
radicalisation
content a user
is exposed to
and shares, the
more likely for
them to adopt a
similar language
over time.
Fernandez, M.; Gonzalez-Pardo, A; Alani, H. Radicalisation Influence in Social Media. Journal of Web Science, 2019.
• The network is the essence of social media
platforms.
• Harm (e.g., anorexia, extremism,
misinformation, abuse) propagates across
the network, and influences recipients
over time.
• Need to protect and alert users to harmful
influences and influencers.
• Monitor and regulate the use of
networking recommendation algorithms.
Individual influence: similarity of own content to radicalisation terminology
Socialinfluence:similarityofretweeted
contenttoradicalisationterminology
Tools to measure radicalisation influence and behaviour
https://trivalent-project.eu
• How can we empower the children?
• What tools can we develop to help children,
and parents, assess vulnerability?
• How could platforms raise their users’
awareness to their own vulnerabilities?
https://coinform.eu/
Mensio, M., and Alani, H. MisinfoMe: Who’s Interacting with Misinformation? International Semantic Web Conference (ISWC 2019)
Exposing Vulnerability
“All users, children and adults, should be empowered
to understand and manage risks so that they can stay
safe online.” Online Harms White Paper 2019 (9.1)
“Offenders may target children based on
vulnerabilities such as mental health, or by exploiting
publicly available information from their social media
profiles.” Online Harms White Paper 2019 (Box 25)
• Viability study of chatbots as a
communication channel to tackle
online abuse
• Situations and context in which they
would consider using the chatbot
• Understanding socio-technical
requirements
• Acquiring users’ perspectives and
expectations
• Dialogues: vocabulary and formality
“When asked how they learn to stay safe
online, both groups were relatively critical of
their safety lessons, feeling disengaged by
lengthy and repetitive talks”
27th August 2019
Children’s experiences of online harm and
what they want to do about it
Chatbots for Tackling
Online Abuse
Summary
Vulnerable users are unaware of their
vulnerability
Need for more effective and
collaborative blocking of offenders
Regulating some platforms and not
others only shifts the problem
Continuous and collaborative
development of AI detection methods
Empower the children with better and
easier tools and procedures
Modern and engaging intelligent
educational tools

Más contenido relacionado

La actualidad más candente

Project report on fake is fake - identify fake
Project report on fake is fake - identify fakeProject report on fake is fake - identify fake
Project report on fake is fake - identify fakeVikas Gupta
 
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Corey Olszewski
 
Misinformation management-tools
Misinformation management-toolsMisinformation management-tools
Misinformation management-toolsAhmed-Refat Refat
 
You Are Being Tracked, Evaluated and Sold: an analysis of digital inequalit...
You Are Being Tracked,  Evaluated and Sold: an analysis  of digital inequalit...You Are Being Tracked,  Evaluated and Sold: an analysis  of digital inequalit...
You Are Being Tracked, Evaluated and Sold: an analysis of digital inequalit...Alex Dunedin
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS
 
Delivering Your News with Impact
Delivering Your News with ImpactDelivering Your News with Impact
Delivering Your News with ImpactCNW Group
 
Fake News in Digital Culture
Fake News in Digital CultureFake News in Digital Culture
Fake News in Digital CultureLiliana Bounegru
 
Fake news and fact finding
Fake news and fact findingFake news and fact finding
Fake news and fact findingYumonomics
 
CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP
 
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...Nagarajan M
 
Social Media in Law Enforcement
Social Media in Law EnforcementSocial Media in Law Enforcement
Social Media in Law EnforcementLKinoshita
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentationgrp4.ed451
 
COVID Infodemic & the AI-Driven Hype Machine
COVID Infodemic & the AI-Driven Hype MachineCOVID Infodemic & the AI-Driven Hype Machine
COVID Infodemic & the AI-Driven Hype MachineJunaid Qadir
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesLightedCandle
 
10 trends in journalism for 2017
10 trends in journalism for 201710 trends in journalism for 2017
10 trends in journalism for 2017Amy Weiss
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 
40 Questions & 12 Trends for the Future of News.
40 Questions & 12 Trends for the Future of News.40 Questions & 12 Trends for the Future of News.
40 Questions & 12 Trends for the Future of News.Ezra Eeman
 
What to expect from Journalism Innovation in 2017?
What to expect from Journalism Innovation in 2017?What to expect from Journalism Innovation in 2017?
What to expect from Journalism Innovation in 2017?Francesco Marconi
 

La actualidad más candente (20)

Project report on fake is fake - identify fake
Project report on fake is fake - identify fakeProject report on fake is fake - identify fake
Project report on fake is fake - identify fake
 
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...
 
Misinformation management-tools
Misinformation management-toolsMisinformation management-tools
Misinformation management-tools
 
You Are Being Tracked, Evaluated and Sold: an analysis of digital inequalit...
You Are Being Tracked,  Evaluated and Sold: an analysis  of digital inequalit...You Are Being Tracked,  Evaluated and Sold: an analysis  of digital inequalit...
You Are Being Tracked, Evaluated and Sold: an analysis of digital inequalit...
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
 
Delivering Your News with Impact
Delivering Your News with ImpactDelivering Your News with Impact
Delivering Your News with Impact
 
Fake News in Digital Culture
Fake News in Digital CultureFake News in Digital Culture
Fake News in Digital Culture
 
Fake news and fact finding
Fake news and fact findingFake news and fact finding
Fake news and fact finding
 
CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...
 
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...Social Media and Law Enforcement  - Presentation by Central Bureau of Investi...
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...
 
Social Media in Law Enforcement
Social Media in Law EnforcementSocial Media in Law Enforcement
Social Media in Law Enforcement
 
Cyber Predator Presentation
Cyber Predator PresentationCyber Predator Presentation
Cyber Predator Presentation
 
COVID Infodemic & the AI-Driven Hype Machine
COVID Infodemic & the AI-Driven Hype MachineCOVID Infodemic & the AI-Driven Hype Machine
COVID Infodemic & the AI-Driven Hype Machine
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
10 trends in journalism for 2017
10 trends in journalism for 201710 trends in journalism for 2017
10 trends in journalism for 2017
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Facebook danger
Facebook dangerFacebook danger
Facebook danger
 
40 Questions & 12 Trends for the Future of News.
40 Questions & 12 Trends for the Future of News.40 Questions & 12 Trends for the Future of News.
40 Questions & 12 Trends for the Future of News.
 
What to expect from Journalism Innovation in 2017?
What to expect from Journalism Innovation in 2017?What to expect from Journalism Innovation in 2017?
What to expect from Journalism Innovation in 2017?
 

Similar a SASIG Workshop on “Improving the digital landscape for our children”

Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internetbeh yong hua
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftHeather Dionne
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)sanju prasad
 
Strategies to Connect, Communicate and Collaborate with Youth in the Digital Age
Strategies to Connect, Communicate and Collaborate with Youth in the Digital AgeStrategies to Connect, Communicate and Collaborate with Youth in the Digital Age
Strategies to Connect, Communicate and Collaborate with Youth in the Digital AgeVickiLGray
 
JSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionJSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionOCHS Librarian
 
“Never go through our chats and phones without our consent!” The emerging i...
“Never go through our chats and phones without our consent!”   The emerging i...“Never go through our chats and phones without our consent!”   The emerging i...
“Never go through our chats and phones without our consent!” The emerging i...University of Sydney
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social mediaMike North
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)Sumaiya Ismail
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachNzeih Chukwuemeka
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)amalgarn
 
Parent meeting
Parent meetingParent meeting
Parent meetinglightb
 
Sept 23 presentation notes
Sept 23 presentation notesSept 23 presentation notes
Sept 23 presentation notesLinda Raftree
 
Research seminar Queen Mary University of London (CogSci)
Research seminar Queen Mary University of London (CogSci)Research seminar Queen Mary University of London (CogSci)
Research seminar Queen Mary University of London (CogSci)Miriam Fernandez
 
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docxDiscussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docxcuddietheresa
 

Similar a SASIG Workshop on “Improving the digital landscape for our children” (20)

Cyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of InternetCyberwellness Refers To The Positive Well Being Of Internet
Cyberwellness Refers To The Positive Well Being Of Internet
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Social media (sanju)
Social media (sanju)Social media (sanju)
Social media (sanju)
 
Strategies to Connect, Communicate and Collaborate with Youth in the Digital Age
Strategies to Connect, Communicate and Collaborate with Youth in the Digital AgeStrategies to Connect, Communicate and Collaborate with Youth in the Digital Age
Strategies to Connect, Communicate and Collaborate with Youth in the Digital Age
 
JSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship DiscussionJSCHS / Digital Citizenship Discussion
JSCHS / Digital Citizenship Discussion
 
Cybersafey
Cybersafey Cybersafey
Cybersafey
 
“Never go through our chats and phones without our consent!” The emerging i...
“Never go through our chats and phones without our consent!”   The emerging i...“Never go through our chats and phones without our consent!”   The emerging i...
“Never go through our chats and phones without our consent!” The emerging i...
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Aurora - Social media
Aurora - Social mediaAurora - Social media
Aurora - Social media
 
Safe Internet (Art 203)
Safe Internet (Art 203)Safe Internet (Art 203)
Safe Internet (Art 203)
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
 
Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)Digital citizenship (cyberbullying)
Digital citizenship (cyberbullying)
 
Lesson1.pptx
Lesson1.pptxLesson1.pptx
Lesson1.pptx
 
Parent meeting
Parent meetingParent meeting
Parent meeting
 
Sept 23 presentation notes
Sept 23 presentation notesSept 23 presentation notes
Sept 23 presentation notes
 
Research seminar Queen Mary University of London (CogSci)
Research seminar Queen Mary University of London (CogSci)Research seminar Queen Mary University of London (CogSci)
Research seminar Queen Mary University of London (CogSci)
 
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docxDiscussion 1 By Karthik KondlaThe capability to connect indivi.docx
Discussion 1 By Karthik KondlaThe capability to connect indivi.docx
 

Más de The Open University

Misinformation vs Fact-Checks: The Ongoing Battle
Misinformation vs Fact-Checks: The Ongoing BattleMisinformation vs Fact-Checks: The Ongoing Battle
Misinformation vs Fact-Checks: The Ongoing BattleThe Open University
 
Co-Inform (Co-Creating Misinformation Resilient Societies)
Co-Inform (Co-Creating Misinformation Resilient Societies)Co-Inform (Co-Creating Misinformation Resilient Societies)
Co-Inform (Co-Creating Misinformation Resilient Societies)The Open University
 
Crisis Information Processing - with the power of A.I.
Crisis Information Processing - with the power of A.I.Crisis Information Processing - with the power of A.I.
Crisis Information Processing - with the power of A.I.The Open University
 
H2020 COMRADES project introduction
H2020 COMRADES project introduction H2020 COMRADES project introduction
H2020 COMRADES project introduction The Open University
 
Radicalisation detection on social media
Radicalisation detection on social mediaRadicalisation detection on social media
Radicalisation detection on social mediaThe Open University
 
Analysing the dark side of Social Media
Analysing the dark side of Social MediaAnalysing the dark side of Social Media
Analysing the dark side of Social MediaThe Open University
 
Detecting online grooming and radicalisation
Detecting online grooming and radicalisationDetecting online grooming and radicalisation
Detecting online grooming and radicalisationThe Open University
 
Detecting Grooming Behaviour on Social Media
Detecting Grooming Behaviour on Social MediaDetecting Grooming Behaviour on Social Media
Detecting Grooming Behaviour on Social MediaThe Open University
 
Making More Sense Out of Social Data
Making More Sense Out of Social DataMaking More Sense Out of Social Data
Making More Sense Out of Social DataThe Open University
 
Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...
Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...
Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...The Open University
 
From smart meters to smart behaviour
From smart meters to smart behaviourFrom smart meters to smart behaviour
From smart meters to smart behaviourThe Open University
 
Social Media Analytics with a pinch of semantics
Social Media Analytics with a pinch of semanticsSocial Media Analytics with a pinch of semantics
Social Media Analytics with a pinch of semanticsThe Open University
 
Monitoring and Analysis of Online Communities
Monitoring and Analysis of Online CommunitiesMonitoring and Analysis of Online Communities
Monitoring and Analysis of Online CommunitiesThe Open University
 
Semantics, Sensors, and the Social Web
Semantics, Sensors, and the Social WebSemantics, Sensors, and the Social Web
Semantics, Sensors, and the Social WebThe Open University
 

Más de The Open University (20)

Misinformation vs Fact-Checks: The Ongoing Battle
Misinformation vs Fact-Checks: The Ongoing BattleMisinformation vs Fact-Checks: The Ongoing Battle
Misinformation vs Fact-Checks: The Ongoing Battle
 
knod22-Alani.pdf
knod22-Alani.pdfknod22-Alani.pdf
knod22-Alani.pdf
 
COMRADES summary
COMRADES summaryCOMRADES summary
COMRADES summary
 
COMRADES project introduction
COMRADES project introduction COMRADES project introduction
COMRADES project introduction
 
Co-Inform (Co-Creating Misinformation Resilient Societies)
Co-Inform (Co-Creating Misinformation Resilient Societies)Co-Inform (Co-Creating Misinformation Resilient Societies)
Co-Inform (Co-Creating Misinformation Resilient Societies)
 
COMRADES ICT2018
COMRADES ICT2018COMRADES ICT2018
COMRADES ICT2018
 
Crisis Information Processing - with the power of A.I.
Crisis Information Processing - with the power of A.I.Crisis Information Processing - with the power of A.I.
Crisis Information Processing - with the power of A.I.
 
H2020 COMRADES project introduction
H2020 COMRADES project introduction H2020 COMRADES project introduction
H2020 COMRADES project introduction
 
Radicalisation detection on social media
Radicalisation detection on social mediaRadicalisation detection on social media
Radicalisation detection on social media
 
Analysing the dark side of Social Media
Analysing the dark side of Social MediaAnalysing the dark side of Social Media
Analysing the dark side of Social Media
 
Detecting online grooming and radicalisation
Detecting online grooming and radicalisationDetecting online grooming and radicalisation
Detecting online grooming and radicalisation
 
Detecting Grooming Behaviour on Social Media
Detecting Grooming Behaviour on Social MediaDetecting Grooming Behaviour on Social Media
Detecting Grooming Behaviour on Social Media
 
Making More Sense Out of Social Data
Making More Sense Out of Social DataMaking More Sense Out of Social Data
Making More Sense Out of Social Data
 
Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...
Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...
Mining and Comparing Engagement Dynamics Across Multiple Social Media Platfor...
 
From smart meters to smart behaviour
From smart meters to smart behaviourFrom smart meters to smart behaviour
From smart meters to smart behaviour
 
Social Media Analytics with a pinch of semantics
Social Media Analytics with a pinch of semanticsSocial Media Analytics with a pinch of semantics
Social Media Analytics with a pinch of semantics
 
Ifip wg-galway-
Ifip wg-galway-Ifip wg-galway-
Ifip wg-galway-
 
Monitoring and Analysis of Online Communities
Monitoring and Analysis of Online CommunitiesMonitoring and Analysis of Online Communities
Monitoring and Analysis of Online Communities
 
SDoW2010 keynote
SDoW2010 keynoteSDoW2010 keynote
SDoW2010 keynote
 
Semantics, Sensors, and the Social Web
Semantics, Sensors, and the Social WebSemantics, Sensors, and the Social Web
Semantics, Sensors, and the Social Web
 

Último

Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 

Último (20)

Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 

SASIG Workshop on “Improving the digital landscape for our children”

  • 1. “Improving the digital landscape for our children” Harith Alani Head of Social Data Science, KMi, The Open University http://people.kmi.open.ac.uk/harith/ SASIG workshop, London, 9 October 2019 @halani harith-alani
  • 2. Regulating Accounts Removal • A hostile involuntary celibates (Incels) Reddit with 40K subscribers was finally banned on 7 Nov 2017. • Many simply moved to a new forum, Braincels, banned a year later in October 2018. “… steps companies should take to proactively identify accounts showing indicators of CSEA activity and ensure children are protected from them, including disabling accounts and informing law enforcement where appropriate. “ “Steps to prevent banned users creating new accounts in order to continue to make inappropriate content which violates terms of service.” Online Harms White Paper, April 2019 (7.10, 7.24) Misogyny on Reddit Farrell, T; Fernandez, M; Novotny, J; Alani, H. Exploring Misogyny across the Manosphere in Reddit. ACM Web Science Conf. (WebSci’19), 2019.
  • 4. “… we removed 8.7 million pieces of content on Facebook that violated our child nudity or sexual exploitation of children policies, 99% of which was removed before anyone reported it. We also remove accounts that promote this type of content.” https://newsroom.fb.com/news/2018/10/fighting-child-exploitation/ “ .. find accounts that engage in potentially inappropriate interactions with children on Facebook so that we can remove them and prevent additional harm.” Regulating Accounts Removal • Is there a shared and agreed definition of “inappropriate interactions with children”? • How such interactions are detected and reported by the different platforms? • How could platforms cooperate to track cross-platform interactions? • How many of such interactions need to be present for an account to be removed? • What steps are taken to stop these accounts from resurfacing? • How many accounts were removed? For what offence?
  • 5. • What can be reported? By whom? • How safe do users, and especially children, feel about reporting content and other users? • What is best-practice in reporting service design? • How many reports were made? About what? • How many reports were issued by children? • How long did it take to process and act on what type of reports? • What information were given back to the reporters? Reporting Harm 27th August 2019 Children’s experiences of online harm and what they want to do about it https://www.childrenscommissioner.gov.uk/2019/08/27/childrens-experiences-of-online-harm-and-what-they-want-to-do-about-it/ “The children were particularly keen to discuss the often violent nature of many online gaming platforms, and the potential repercussions of reporting abusive behaviour” “The younger students told us that the reporting process could be difficult for them to navigate”
  • 6. “In November 2018, the Home Secretary co-hosted a ‘hackathon’ event in the US with Microsoft and a range of other tech companies, where they worked to develop a new AI product to detect online grooming of children. Hackathon participants analysed tens of thousands of conversations to understand patterns used by predators. This enabled engineers to develop technology to automatically and accurately detect these patterns. “ Online Harms White Paper 2019 • Unclear how current detection methods were developed, evaluated, on what data. • How explainable the AI results are and how is the AI-Human interaction managed on the platform? • Such technology requires continuous development and updating. • Need agreed quality benchmarks and gold standard datasets. • Developing grooming-detection AI technology that is accurate and work across multiple platforms, languages, and harmful content and scenarios, is quite challenging. AI to Detect Online Grooming
  • 7. Predator: hey whats up?… Predator: I like your pic, very cute Predator: so you're in san diego? 13-yr-old-girl: not far Predator: ok, you like older guys? 13-yr-old-girl: thers nice or bad ppl all ages Predator: have some pics if you want to see Predator: do your parents look on your computer? Predator: so are you by yourself or is someone else there with you? Predator: so it should just be us, our little secret Predator: so have you ever snuck out? 13-yr-old-girl: not rlly lol Predator: yeah, what about tonight? Predator: think you could sneak out tonight? Predator: well if the wrong person found out then I'd be screwed 13-yr-old-girl: im not a teller lol Predator: I know, just wouldn't want your dad to find out Predator: if you are still up why not sneak out for a few minutes Predator: but that's the fun of it 13-yr-old-girl: fun to sneak? Predator: yes Predator: so your dad doesn't know Predator: would take a nap but I leave for bible study around 6:30 Predator: I know I'm bad, going to bible study and talking about sex with you Predator: yeah, there's nothing wrong with us being friends, we have the same lord remember ;) Predator: would take me like an hour and a half to get there Predator: see you in a little while Extracts from ~700 message conversation over 5 months, between a groomer, and an adult pretending to be a 13 year old girl Cano, A., Fernández, M., Alani, H. Detecting child grooming behaviour patterns on social media. Int. Conf. Social Informatics (SocInfo), 2014, Barcelona, Spain • Children often struggle to identify complex grooming behaviour • Most detection algorithms look for the appearance of words, not behaviours • Most methods check individual messages, not threads Stages of grooming Olson, L. N., Daggs, J. L., Ellevold, B. L., and Rogers, T. K. K.. Entrapping the innocent: Toward a theory of child sexual predators luring communication. Communication Theory, 17(3):231–251, 2007 Approach Grooming Trust Development Isolation Physical Approach Physical Approach Isolation Physical Approach Grooming Behaviour
  • 8. Social Influence The more radicalisation content a user is exposed to and shares, the more likely for them to adopt a similar language over time. Fernandez, M.; Gonzalez-Pardo, A; Alani, H. Radicalisation Influence in Social Media. Journal of Web Science, 2019. • The network is the essence of social media platforms. • Harm (e.g., anorexia, extremism, misinformation, abuse) propagates across the network, and influences recipients over time. • Need to protect and alert users to harmful influences and influencers. • Monitor and regulate the use of networking recommendation algorithms. Individual influence: similarity of own content to radicalisation terminology Socialinfluence:similarityofretweeted contenttoradicalisationterminology Tools to measure radicalisation influence and behaviour https://trivalent-project.eu
  • 9. • How can we empower the children? • What tools can we develop to help children, and parents, assess vulnerability? • How could platforms raise their users’ awareness to their own vulnerabilities? https://coinform.eu/ Mensio, M., and Alani, H. MisinfoMe: Who’s Interacting with Misinformation? International Semantic Web Conference (ISWC 2019) Exposing Vulnerability “All users, children and adults, should be empowered to understand and manage risks so that they can stay safe online.” Online Harms White Paper 2019 (9.1) “Offenders may target children based on vulnerabilities such as mental health, or by exploiting publicly available information from their social media profiles.” Online Harms White Paper 2019 (Box 25)
  • 10. • Viability study of chatbots as a communication channel to tackle online abuse • Situations and context in which they would consider using the chatbot • Understanding socio-technical requirements • Acquiring users’ perspectives and expectations • Dialogues: vocabulary and formality “When asked how they learn to stay safe online, both groups were relatively critical of their safety lessons, feeling disengaged by lengthy and repetitive talks” 27th August 2019 Children’s experiences of online harm and what they want to do about it Chatbots for Tackling Online Abuse
  • 11. Summary Vulnerable users are unaware of their vulnerability Need for more effective and collaborative blocking of offenders Regulating some platforms and not others only shifts the problem Continuous and collaborative development of AI detection methods Empower the children with better and easier tools and procedures Modern and engaging intelligent educational tools