Exploring Automatic Identification of Fantasy-Driven and Contact-Driven Sexual Solicitors

@article{Ringenberg2019ExploringAI,
  title={Exploring Automatic Identification of Fantasy-Driven and Contact-Driven Sexual Solicitors},
  author={Tatiana R. Ringenberg and Kanishka Misra and Kathryn C. Seigfried-Spellar and Julia Taylor Rayz},
  journal={2019 Third IEEE International Conference on Robotic Computing (IRC)},
  year={2019},
  pages={532-537}
}

Tables from this paper

Table of Contents
A Human-Centered Systematic Literature Review of the Computational Approaches for Online Sexual Risk Detection
TLDR
A comprehensive literature review to analyze 73 peer-reviewed articles on computational approaches utilizing text or meta-data/multimedia for online sexual risk detection found that the majority of work has focused on identifying sexual predators after-the-fact, rather than taking more nuanced approaches to identify potential victims and problematic patterns that could be used to prevent victimization before it occurs.
Authorship Analysis of Online Predatory Conversations using Character Level Convolution Neural Networks
TLDR
This work presents an authorship attribution model that trains on a corpus of online conversations involving predators, and performs subsequent analysis of the message representations to highlight differences between predatory and non-predatory message styles.

References

SHOWING 1-10 OF 30 REFERENCES
Detecting predatory conversations in social media by deep Convolutional Neural Networks
On Identifying Authors with Style
TLDR
A task to which stylometry is often applied: authorship attribution, the question of identifying or confirming the author of a text based on the known body of work is considered.
Exploring high-level features for detecting cyberpedophilia
Identifying Sexual Predators by SVM Classification with Lexical and Behavioral Features
TLDR
It is found that the most “predatory” messages are identified by calculating a score for each message equal to the average of the weights of the n-grams therein, as determined by a linear SVM model.
A Two-step Approach for Effective Detection of Misbehaving Users in Chats
TLDR
This paper describes the system jointly developed by the Language Technologies Lab from INAOE and the Language and Reasoning Group from UAM for the Sexual Predators Identification task at the PAN 2012, and demonstrates that it is possible to train a classifier to learn those particular terms that turn a chat conversation into a case of online child exploitation.
Linguistic analysis of chat transcripts from child predator undercover sex stings
Abstract We analyzed chat transcripts from 590 undercover Internet sex stings across the US, using the Linguistic Inquiry and Word Count software program to examine trends in sexual word usage, total
Sexual offenders contacting children online: an examination of transcripts of sexual grooming
ABSTRACT The present study investigated transcripts of adults sexually grooming decoy victims on the Internet. One hundred transcripts were coded for offender characteristics, victim characteristics,
Internet sexual solicitation of children: a proposed typology of offenders based on their chats, e-mails, and social network posts
ABSTRACT Although researchers have examined sexual solicitation of minors online, there is limited research on the content and patterns of victim-offender chats. These chats have potential use in
...
...