Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

A Human-Centered Systematic Literature Review of the Computational Approaches for Online Sexual Risk Detection

Published: 18 October 2021 Publication History

Abstract

In the era of big data and artificial intelligence, online risk detection has become a popular research topic. From detecting online harassment to the sexual predation of youth, the state-of-the-art in computational risk detection has the potential to protect particularly vulnerable populations from online victimization. Yet, this is a high-risk, high-reward endeavor that requires a systematic and human-centered approach to synthesize disparate bodies of research across different application domains, so that we can identify best practices, potential gaps, and set a strategic research agenda for leveraging these approaches in a way that betters society. Therefore, we conducted a comprehensive literature review to analyze 73 peer-reviewed articles on computational approaches utilizing text or meta-data/multimedia for online sexual risk detection. We identified sexual grooming (75%), sex trafficking (12%), and sexual harassment and/or abuse (12%) as the three types of sexual risk detection present in the extant literature. Furthermore, we found that the majority (93%) of this work has focused on identifying sexual predators after-the-fact, rather than taking more nuanced approaches to identify potential victims and problematic patterns that could be used to prevent victimization before it occurs. Many studies rely on public datasets (82%) and third-party annotators (33%) to establish ground truth and train their algorithms. Finally, the majority of this work (78%) mostly focused on algorithmic performance evaluation of their model and rarely (4%) evaluate these systems with real users. Thus, we urge computational risk detection researchers to integrate more human-centered approaches to both developing and evaluating sexual risk detection algorithms to ensure the broader societal impacts of this important work.

References

[1]
Trafficking Victims Protection Act. 2000. Victims of trafficking and violence protection act of 2000. United States (2000).
[2]
Amina Adadi and Mohammed Berrada. 2018. Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE access, Vol. 6 (2018), 52138--52160.
[3]
Hala Al Kuwatly, Maximilian Wich, and Georg Groh. 2020. Identifying and measuring annotator bias based on annotators' demographic characteristics. In Proceedings of the Fourth Workshop on Online Abuse and Harms. 184--190.
[4]
Ali Alkhatib and Michael Bernstein. 2019. Street-level algorithms: A theory at the gaps between policy and decisions. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--13.
[5]
Faith Amuchi, Ameer Al-Nemrat, Mamoun Alazab, and Robert Layton. 2012. Identifying cyber predators through forensic authorship analysis of chat logs. In 2012 Third Cybercrime and Trustworthy Computing Workshop. IEEE, 28--37.
[6]
Nazanin Andalibi, Oliver L. Haimson, Munmun De Choudhury, and Andrea Forte. 2016. Understanding Social Media Disclosures of Sexual Abuse Through the Lenses of Support Seeking and Anonymity. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI '16. ACM Press, Santa Clara, California, USA, 3906--3918. https://doi.org/10.1145/2858036.2858096
[7]
Philip Anderson, Zheming Zuo, Longzhi Yang, and Yanpeng Qu. 2019. An Intelligent Online Grooming Detection System Using AI Technologies. In 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). 1--6. https://doi.org/10.1109/FUZZ-IEEE.2019.8858973 ISSN: 1544--5615.
[8]
Alejandro Barredo Arrieta, Natalia D'iaz-Rodr'iguez, Javier Del Ser, Adrien Bennetot, Siham Tabik, Alberto Barbado, Salvador Garc'ia, Sergio Gil-López, Daniel Molina, Richard Benjamins, et al. 2020. Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI. Information Fusion, Vol. 58 (2020), 82--115.
[9]
M. Ashcroft, L. Kaati, and M. Meyer. 2015. A Step Towards Detecting Online Grooming -- Identifying Adults Pretending to be Children. In 2015 European Intelligence and Security Informatics Conference. 98--104. https://doi.org/10.1109/EISIC.2015.41
[10]
Karla Badillo-Urquiola, Afsaneh Razi, Jan Edwards, and Pamela Wisniewski. 2020. Children's Perspectives on Human Sex Trafficking Prevention Education. In Companion of the 2020 ACM International Conference on Supporting Group Work. 123--126.
[11]
Tadas Baltruvs aitis, Chaitanya Ahuja, and Louis-Philippe Morency. 2018. Multimodal machine learning: A survey and taxonomy. IEEE transactions on pattern analysis and machine intelligence, Vol. 41, 2 (2018), 423--443.
[12]
Rahaf Barakat, Sameer Abufardeh, and Kenneth Magel. 2016. Automated framework to improve users' awareness on Online Social Networks. In 2016 IEEE International Conference on Electro Information Technology (EIT). IEEE, 0428--0433.
[13]
Connie Barber and S.C. Bettez. 2014. Deconstructing the online grooming of youth: Toward improved information systems for detection of online sexual predators. (Jan. 2014).
[14]
Ravi Barreira, Vládia Pinheiro, and Vasco Furtado. 2017. A framework for digital forensics analysis based on semantic role labeling. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 66--71.
[15]
Eric PS Baumer. 2017. Toward human-centered algorithm design. Big Data & Society, Vol. 4, 2 (Dec. 2017), 2053951717718854. https://doi.org/10.1177/2053951717718854
[16]
Victoria Bellotti and Keith Edwards. 2001. Intelligibility and accountability: human considerations in context-aware systems. Human-Computer Interaction, Vol. 16, 2--4 (2001), 193--212.
[17]
Emily M Bender and Batya Friedman. 2018. Data statements for natural language processing: Toward mitigating system bias and enabling better science. Transactions of the Association for Computational Linguistics, Vol. 6 (2018), 587--604.
[18]
Wiebe E Bijker, Thomas P Hughes, Trevor Pinch, et al. 1987. The social construction of technological systems.
[19]
Pamela J. Black, Melissa Wollis, Michael Woodworth, and Jeffrey T. Hancock. 2015. A linguistic analysis of grooming strategies of online child sex offenders: Implications for our understanding of predatory sexual behavior in an increasingly computer-mediated world. Child Abuse & Neglect, Vol. 44 (June 2015), 140--149. https://doi.org/10.1016/j.chiabu.2014.12.004
[20]
Dasha Bogdanova, Paolo Rosso, and Thamar Solorio. 2012a. Modelling Fixated Discourse in Chats with Cyberpedophiles. In Proceedings of the Workshop on Computational Approaches to Deception Detection (EACL 2012). Association for Computational Linguistics, Stroudsburg, PA, USA, 86--90. http://dl.acm.org/citation.cfm?id=2388616.2388629 event-place: Avignon, France.
[21]
Dasha Bogdanova, Paolo Rosso, and Thamar Solorio. 2012b. On the Impact of Sentiment and Emotion Based Features in Detecting Online Sexual Predators. In Proceedings of the 3rd Workshop in Computational Approaches to Subjectivity and Sentiment Analysis (WASSA '12). Association for Computational Linguistics, Stroudsburg, PA, USA, 110--118. http://dl.acm.org/citation.cfm?id=2392963.2392986
[22]
Dasha Bogdanova, Paolo Rosso, and Thamar Solorio. 2014. Exploring high-level features for detecting cyberpedophilia. Computer speech & language, Vol. 28, 1 (2014), 108--120.
[23]
Tolga Bolukbasi, Kai-Wei Chang, James Y Zou, Venkatesh Saligrama, and Adam T Kalai. 2016. Man is to computer programmer as woman is to homemaker? debiasing word embeddings. Advances in Neural Information Processing Systems (2016).
[24]
Parisa Rezaee Borj and Patrick Bours. 2019. Predatory Conversation Detection. In 2019 International Conference on Cyber Security for Emerging Technologies (CSET). 1--6. https://doi.org/10.1109/CSET.2019.8904885 ISSN: null.
[25]
Patrick Bours and Halvor Kulsrud. 2019. Detection of Cyber Grooming in Online Conversation. In 2019 IEEE International Workshop on Information Forensics and Security (WIFS). 1--6. https://doi.org/10.1109/WIFS47025.2019.9035090 ISSN: 2157--4774.
[26]
Joy Buolamwini and Timnit Gebru. 2018. Gender shades: Intersectional accuracy disparities in commercial gender classification. In Conference on fairness, accountability and transparency. PMLR, 77--91.
[27]
Ángel Callejas-Rodríguez, Esaú Villatoro-Tello, Ivan Meza, and Gabriela Ramírez-de-la Rosa. 2016. From Dialogue Corpora to Dialogue Systems: Generating a Chatbot with Teenager Personality for Preventing Cyber-Pedophilia. In Text, Speech, and Dialogue, Petr Sojka, Ale? Horák, Ivan Kope?ek, and Karel Pala (Eds.). Vol. 9924. Springer International Publishing, Cham, 531--539. https://doi.org/10.1007/978--3--319--45510--5_61
[28]
Amparo Elizabeth Cano, Miriam Fernandez, and Harith Alani. 2014. Detecting Child Grooming Behaviour Patterns on Social Media. In Social Informatics: 6th International Conference, SocInfo 2014, Barcelona, Spain, November 11--13, 2014. Proceedings, Luca Maria Aiello and Daniel McFarland (Eds.). Springer International Publishing, Cham, 412--427. https://doi.org/10.1007/978--3--319--13734--6_30
[29]
Stevie Chancellor, Eric P. S. Baumer, and Munmun De Choudhury. 2019. Who is the "Human" in Human-Centered Machine Learning: The Case of Predicting Mental Health from Social Media. Proc. ACM Hum.-Comput. Interact., Vol. 3, CSCW, Article 147 (Nov. 2019), 32 pages. https://doi.org/10.1145/3359249
[30]
Jonathan H Chen and Abraham Verghese. 2020. Planning for the Known Unknown: Machine Learning for Human Healthcare Systems. The American Journal of Bioethics, Vol. 20, 11 (2020), 1--3.
[31]
Xue-Wen Chen and Xiaotong Lin. 2014. Big data deep learning: challenges and perspectives. IEEE access, Vol. 2 (2014), 514--525.
[32]
Lu Cheng, Ahmadreza Mosallanezhad, Yasin Silva, Deborah Hall, and Huan Liu. 2021. Mitigating Bias in Session-based Cyberbullying Detection: A Non-Compromising Approach. In Proceedings of ACL .
[33]
Y. Cheong, A. K. Jensen, E. R. Guðnadóttir, B. Bae, and J. Togelius. 2015. Detecting Predatory Behavior in Game Chats. IEEE Transactions on Computational Intelligence and AI in Games, Vol. 7, 3 (Sept. 2015), 220--232. https://doi.org/10.1109/TCIAIG.2015.2424932
[34]
Ming Ming Chiu, Kathryn C Seigfried-Spellar, and Tatiana R Ringenberg. 2018. Exploring detection of contact vs. fantasy online sexual offenders in chats with minors: Statistical discourse analysis of self-disclosure and emotion words. Child abuse & neglect, Vol. 81 (2018), 128--138.
[35]
Zeineb Dhouioui and Jalel Akaichi. 2016. Privacy Protection Protocol in Social Networks Based on Sexual Predators Detection. In Proceedings of the International Conference on Internet of Things and Cloud Computing (ICC '16). ACM, New York, NY, USA, 63:1--63:6. https://doi.org/10.1145/2896387.2896448
[36]
Mohammadreza Ebrahimi and Mohammadreza Ebrahimi. 2016. Automatic Identification of Online Predators in Chat Logs by Anomaly Detection and Deep Learning. Master's thesis. Concordia University. https://spectrum.library.concordia.ca/981404/
[37]
Mohammadreza Ebrahimi, Ching Y. Suen, and Olga Ormandjieva. 2016a. Detecting predatory conversations in social media by deep Convolutional Neural Networks. Digital Investigation, Vol. 18 (Sept. 2016), 33--49. https://doi.org/10.1016/j.diin.2016.07.001
[38]
Mohammadreza Ebrahimi, Ching Y. Suen, Olga Ormandjieva, and Adam Krzyzak. 2016b. Recognizing Predatory Chat Documents using Semi-supervised Anomaly Detection. https://www.ingentaconnect.com/content/ist/ei/2016/00002016/00000017/art00012#
[39]
Paul Elzinga, Karl Erich Wolff, and Jonas Poelmans. 2012. Analyzing Chat Conversations of Pedophiles with Temporal Relational Semantic Systems. In 2012 European Intelligence and Security Informatics Conference. 242--249. https://doi.org/10.1109/EISIC.2012.12
[40]
Hugo Jair Escalante, Esaú Villatoro-Tello, Antonio Juárez, Manuel Montes-y Gómez, and Luis Villaseñor. 2013. Sexual predator detection in chats with chained classifiers. In Proceedings of the 4th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis. Association for Computational Linguistics, Atlanta, Georgia, 46--54. http://www.aclweb.org/anthology/W13--1607
[41]
Muhammad Ali Fauzi and Patrick Bours. 2020. Ensemble Method for Sexual Predators Identification in Online Chats. In 2020 8th International Workshop on Biometrics and Forensics (IWBF). 1--6. https://doi.org/10.1109/IWBF49977.2020.9107945
[42]
Christiane Fellbaum. 2010. WordNet. In Theory and applications of ontology: computer applications. Springer, 231--243.
[43]
Joseph L Fleiss and Jacob Cohen. 1973. The equivalence of weighted kappa and the intraclass correlation coefficient as measures of reliability. Educational and psychological measurement, Vol. 33, 3 (1973), 613--619.
[44]
R. Fournier and M. Danisch. 2014. Mining bipartite graphs to improve semantic pedophile activity detection. In 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS). 1--4. https://doi.org/10.1109/RCIS.2014.6861035
[45]
Fencepost Frank and Von Erck Xavier. [n.d.]. Perverted-Justice. com - The largest and best anti-predator organization online. http://www.perverted-justice.com/
[46]
Nikhil Garg, Londa Schiebinger, Dan Jurafsky, and James Zou. 2018. Word embeddings quantify 100 years of gender and ethnic stereotypes. Proceedings of the National Academy of Sciences, Vol. 115, 16 (2018), E3635--E3644.
[47]
Arijit Ghosh Chowdhury, Ramit Sawhney, Puneet Mathur, Debanjan Mahata, and Rajiv Ratn Shah. 2019. Speak up, Fight Back! Detection of Social Media Disclosures of Sexual Harassment. In Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Student Research Workshop. Association for Computational Linguistics, Minneapolis, Minnesota, 136--146. https://doi.org/10.18653/v1/N19--3018
[48]
L. Gillam and A. Vartapetiance. 2012. Quite Simple Approaches for Authorship Attribution, Intrinsic Plagiarism Detection and Sexual Predator Identification. In LNCS. Rome, Italy. http://www.uni-weimar.de/medien/webis/research/events/pan-12/pan12-web/
[49]
Fergyanto E. Gunawan, Livia Ashianti, Sevenpri Candra, and Benfano Soewito. 2016. Detecting online child grooming conversation. In 2016 11th International Conference on Knowledge, Information and Creativity Support Systems (KICSS). 1--6. https://doi.org/10.1109/KICSS.2016.7951413
[50]
Heidi Hartikainen, Afsaneh Razi, and Pamela Wisniewski. 2021. Safe Sexting: The Advice and Support Adolescents Receive from Peers Regarding Online Sexual Risks. Proc. ACM Hum.-Comput. Interact., Vol. 5, CSCW1, Article 42 (April 2021), 31 pages. https://doi.org/10.1145/3449116
[51]
Rex Hartson and Pardha Pyla. 2019. Chapter 22 - Empirical UX Evaluation: UX Goals, Metrics, and Targets. In The UX Book (Second Edition) second edition ed.), Rex Hartson and Pardha Pyla (Eds.). Morgan Kaufmann, Boston, 453--481. https://doi.org/10.1016/B978-0--12--805342--3.00022--9
[52]
Naeemul Hassan, Amrit Poudel, Jason Hale, Claire Hubacek, Khandaker Tasnim Huq, Shubhra Kanti Karmaker Santu, and Syed Ishtiaque Ahmed. 2020. Towards Automated Sexual Violence Report Tracking. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 14. 250--259.
[53]
Feng He, Yu Deng, and Weina Li. 2020. Coronavirus disease 2019: What we know? Journal of medical virology, Vol. 92, 7 (2020), 719--725.
[54]
Nicola Henry and Anastasia Powell. 2018. Technology-facilitated sexual violence: A literature review of empirical research. Trauma, violence, & abuse, Vol. 19, 2 (2018), 195--208.
[55]
José María Gómez Hidalgo and Andrés Alfonso Caurcel Díaz. [n.d.]. Combining Predation Heuristics and Chat-Like Features in Sexual Predator Identi?cation. ( [n.,d.]), 6.
[56]
Laurie Collier Hillstrom. 2018. The# metoo movement .ABC-CLIO.
[57]
Michael Hind, Sameep Mehta, Aleksandra Mojsilovic, Ravi Nair, Karthikeyan Natesan Ramamurthy, Alexandra Olteanu, and Kush R Varshney. 2018. Increasing trust in ai services through supplier's declarations of conformity. arXiv preprint arXiv:1808.07261, Vol. 18 (2018), 2813--2869.
[58]
Robert R Hoffman, Shane T Mueller, Gary Klein, and Jordan Litman. 2018. Metrics for explainable AI: Challenges and prospects. arXiv preprint arXiv:1812.04608 (2018).
[59]
Andreas Holzinger. 2016. Interactive machine learning for health informatics: when do we need the human-in-the-loop? Brain Informatics, Vol. 3, 2 (2016), 119--131.
[60]
Aziz Z Huq. 2018. Racial equity in algorithmic criminal justice. Duke LJ, Vol. 68 (2018), 1043.
[61]
M. Ibanez and R. Gazan. 2016a. Detecting sex trafficking circuits in the U. S. through analysis of online escort advertisements. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 892--895. https://doi.org/10.1109/ASONAM.2016.7752344
[62]
Michelle Ibanez and Rich Gazan. 2016b. Virtual indicators of sex trafficking to identify potential victims in online advertisements. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 818--824.
[63]
Michelle Ibanez and Daniel D Suthers. 2014. Detection of domestic human trafficking indicators and movement trends using content available on open internet sources. In 2014 47th Hawaii international conference on system sciences. IEEE, 1556--1565.
[64]
M. Ibanez and D. D. Suthers. 2016. Detecting covert sex trafficking networks in virtual markets. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 876--879. https://doi.org/10.1109/ASONAM.2016.7752340
[65]
Giacomo Inches and Fabio Crestani. 2012. Overview of the International Sexual Predator Identification Competition at PAN-2012. In CLEF (Online working notes/labs/workshop), Vol. 30.
[66]
Giacomo Inches, Morgan Harvey, and Fabio Crestani. 2013. Finding participants in a chat: Authorship attribution for conversational documents. In 2013 International Conference on Social Computing. IEEE, 272--279.
[67]
F. Iqbal, B. C. M. Fung, M. Debbabi, R. Batool, and A. Marrington. 2019. Wordnet-Based Criminal Networks Mining for Cybercrime Investigation. IEEE Access, Vol. 7 (2019), 22740--22755. https://doi.org/10.1109/ACCESS.2019.2891694
[68]
Shunichi Ishihara. 2014. A comparative study of likelihood ratio based forensic text comparison procedures: Multivariate kernel density with lexical features vs. word N-grams vs. character N-grams. In 2014 Fifth Cybercrime and Trustworthy Computing Conference. IEEE, 1--11.
[69]
Alejandro Jaimes, Daniel Gatica-Perez, Nicu Sebe, and Thomas S Huang. 2007. Guest Editors' Introduction: Human-Centered Computing--Toward a Human Revolution. Computer, Vol. 40, 5 (2007), 30--34.
[70]
Eun Seo Jo and Timnit Gebru. 2020. Lessons from archives: Strategies for collecting sociocultural data in machine learning. In Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency. 306--316.
[71]
Sweta Karlekar and Mohit Bansal. 2018. SafeCity: Understanding Diverse Forms of Sexual Harassment Personal Stories. In Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, Brussels, Belgium, 2805--2811. https://doi.org/10.18653/v1/D18--1303
[72]
Michael Katell, Meg Young, Dharma Dailey, Bernease Herman, Vivian Guetler, Aaron Tam, Corinne Bintz, Daniella Raz, and PM Krafft. 2020. Toward situated interventions for algorithmic equity: lessons from the field. In Proceedings of the 2020 conference on fairness, accountability, and transparency. 45--55.
[73]
Aparup Khatua, Erik Cambria, and Apalak Khatua. 2018. Sounds of Silence Breakers: Exploring Sexual Violence on Twitter. In 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 397--400. https://doi.org/10.1109/ASONAM.2018.8508576 ISSN: 2473--9928.
[74]
Jinhwa Kim, Yoon Jo Kim, Mitra Behzadi, and Ian G. Harris. 2020. Analysis of Online Conversations to Detect Cyberpredators Using Recurrent Neural Networks. In Proceedings for the First International Workshop on Social Threats in Online Conversations: Understanding and Management. European Language Resources Association, Marseille, France, 15--20. https://www.aclweb.org/anthology/2020.stoc-1.3
[75]
Seunghyun Kim, Afsaneh Razi, Gianluca Stringhini, Pamela Wisniewski, and Munmun De Choudhury. 2021. You Don't Know How I Feel: Insider-Outsider Perspective Gaps in Cyberbullying Risk Detection. In Proceedings of the International AAAI Conference on Web and Social Media .
[76]
Rob Kling and Susan Leigh Star. 1998. Human Centered Systems in the Perspective of Organizational and Social Informatics. SIGCAS Comput. Soc., Vol. 28, 1 (March 1998), 22--29. https://doi.org/10.1145/277351.277356
[77]
April Kontostathis. 2009. ChatCoder: Toward the Tracking and Categorization of Internet Predators. In Proc. Text Mining Workshop 2009 Held in Conjunction with the Ninth Siam International Conference on Data Mining (sdm 2009). Sparks, Nv. May 2009.
[78]
April Kontostathis, Lynne Edwards, Jen Bayzick, Amanda Leatherman, and Kristina Moore. 2009. Comparison of rule-based to human analysis of chat logs. communication theory, Vol. 8, 2 (2009).
[79]
Panos Kostakos, Lucie ?práchalová, Abhinay Pandya, Mohamed Aboeleinen, and Mourad Oussalah. 2018. Covert Online Ethnography and Machine Learning for Detecting Individuals at Risk of Being Drawn into Online Sex Work. In 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 1096--1099. https://doi.org/10.1109/ASONAM.2018.8508276 ISSN: 2473--991X.
[80]
Michelle A Krieger. 2017. Unpacking "sexting": A systematic review of nonconsensual sexting in legal, educational, and psychological literatures. Trauma, Violence, & Abuse, Vol. 18, 5 (2017), 593--601.
[81]
Scott Krig. 2016. Ground truth data, content, metrics, and analysis. In Computer Vision Metrics. Springer, 247--271.
[82]
Carlos Laorden, Patxi Galán-García, Igor Santos, Borja Sanz, Jose Gomez Hidalgo, and Pablo Bringas. 2013. Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour. In Advances in Intelligent Systems and Computing. Vol. 189. 261--270. https://doi.org/10.1007/978--3--642--33018--6_27
[83]
Matthieu Latapy, Clémence Magnien, and Raphaël Fournier. 2011. Quantifying paedophile queries in a large P2P system. In 2011 Proceedings IEEE INFOCOM. 401--405. https://doi.org/10.1109/INFCOM.2011.5935191 ISSN: 0743--166X.
[84]
L. Li, O. Simek, A. Lai, M. Daggett, C. K. Dagli, and C. Jones. 2018. Detection and Characterization of Human Trafficking Networks Using Unsupervised Scalable Text Template Matching. In 2018 IEEE International Conference on Big Data (Big Data). 3111--3120. https://doi.org/10.1109/BigData.2018.8622189
[85]
Richard J Light. 1971. Measures of response agreement for qualitative data: some generalizations and alternatives. Psychological bulletin, Vol. 76, 5 (1971), 365.
[86]
Yingchi Liu, Quanzhi Li, Xiaozhong Liu, Qiong Zhang, and Luo Si. 2019. Sexual Harassment Story Classification and Key Information Identification. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management (CIKM '19). Association for Computing Machinery, Beijing, China, 2385--2388. https://doi.org/10.1145/3357384.3358146
[87]
Sonia Livingstone and Leslie Haddon. 2008. Risky experiences for children online: charting European research on children and the Internet. Children and Society, Vol. 22 (July 2008), 314--323. http://www.wiley.com/bw/journal.asp?ref=0951-0605
[88]
Nuria Lorenzo-Dus, Anina Kinzel, and Matteo Di Cristofaro. 2020. The communicative modus operandi of online child sexual groomers: Recurring patterns in their language use. Journal of Pragmatics, Vol. 155 (Jan. 2020), 15--27. https://doi.org/10.1016/j.pragma.2019.09.010
[89]
Adrian Pastor López-Monroy, Fabio A. González, Manuel Montes, Hugo Jair Escalante, and Thamar Solorio. 2018. Early Text Classification Using Multi-Resolution Concept Representations. In Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long Papers). Association for Computational Linguistics, New Orleans, Louisiana, 1216--1225. https://doi.org/10.18653/v1/N18--1110
[90]
Katrinna MacFarlane and Violeta Holmes. 2009. Agent-Mediated Information Exchange: Child Safety Online. In 2009 International Conference on Management and Service Science. 1--5. https://doi.org/10.1109/ICMSS.2009.5302027 ISSN: null.
[91]
Ann Majchrzak, Samer Faraj, Gerald C Kane, and Bijan Azad. 2013. The contradictory influence of social media affordances on online communal knowledge sharing. Journal of Computer-Mediated Communication, Vol. 19, 1 (2013), 38--55.
[92]
Nora McDonald, Karla Badillo-Urquiola, Morgan G Ames, Nicola Dell, Elizabeth Keneski, Manya Sleeper, and Pamela J Wisniewski. 2020. Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1--8.
[93]
India McGhee, Jennifer Bayzick, April Kontostathis, Lynne Edwards, Alexandra McBride, and Emma Jakubowski. 2011. Learning to Identify Internet Sexual Predation. International Journal of Electronic Commerce, Vol. 15, 3 (April 2011), 103--122. https://doi.org/10.2753/JEC1086--4415150305
[94]
Ninareh Mehrabi, Fred Morstatter, Nripsuta Saxena, Kristina Lerman, and Aram Galstyan. 2019. A survey on bias and fairness in machine learning. arXiv preprint arXiv:1908.09635 (2019).
[95]
Md. Waliur Rahman Miah, John Yearwood, and Sid Kulkarni. 2011. Detection of child exploiting chats from a mixed chat dataset as a text classification task. In Proceedings of the Australasian Language Technology Association Workshop 2011. Canberra, Australia, 157--165. https://www.aclweb.org/anthology/U11--1020
[96]
D. Michalopoulos and I. Mavridis. 2011. Utilizing document classification for grooming attack recognition. In 2011 IEEE Symposium on Computers and Communications (ISCC). 864--869. https://doi.org/10.1109/ISCC.2011.5983950
[97]
D. Michalopoulos, E. Papadopoulos, and I. Mavridis. 2012. Artemis: Protection from Sexual Exploitation Attacks via SMS. In 2012 16th Panhellenic Conference on Informatics. 19--24. https://doi.org/10.1109/PCi.2012.46
[98]
Pushkar Mishra, Helen Yannakoudakis, and Ekaterina Shutova. 2019. Tackling online abuse: A survey of automated abuse detection methods. arXiv preprint arXiv:1908.06024 (2019).
[99]
Kanishka Misra, Hemanth Devarapalli, Tatiana R. Ringenberg, and Julia Taylor Rayz. 2019. Authorship Analysis of Online Predatory Conversations using Character Level Convolution Neural Networks. In 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC). 623--628. https://doi.org/10.1109/SMC.2019.8914323 ISSN: 1062--922X.
[100]
Margaret Mitchell, Simone Wu, Andrew Zaldivar, Parker Barnes, Lucy Vasserman, Ben Hutchinson, Elena Spitzer, Inioluwa Deborah Raji, and Timnit Gebru. 2019. Model cards for model reporting. In Proceedings of the conference on fairness, accountability, and transparency. 220--229.
[101]
Miljana Mladenović, Vera Ovs mjanski, and Stavs a Vujivc ić Stanković. 2021. Cyber-aggression, Cyberbullying, and Cyber-grooming: A Survey and Research Challenges. ACM Computing Surveys (CSUR), Vol. 54, 1 (2021), 1--42.
[102]
Mehryar Mohri, Afshin Rostamizadeh, and Ameet Talwalkar. 2018. Foundations of machine learning .MIT press.
[103]
Sina Mohseni, Niloofar Zarei, and Eric D Ragan. 2018. A multidisciplinary survey and framework for design and evaluation of explainable AI systems. arXiv preprint arXiv:1811.11839 (2018).
[104]
Camille Mori, Jessica E Cooke, Jeff R Temple, Anh Ly, Yu Lu, Nina Anderson, Christina Rash, and Sheri Madigan. 2020. The prevalence of sexting behaviors among emerging adults: A meta-analysis. Archives of sexual behavior (2020), 1--17.
[105]
Ahmadreza Mosallanezhad, Ghazaleh Beigi, and Huan Liu. 2019. Deep reinforcement learning-based text anonymization against private-attribute inference. In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). 2360--2369.
[106]
C. H. Ngejane, G. Mabuza-Hocquet, J. H. P. Eloff, and S. Lefophane. 2018. Mitigating Online Sexual Grooming Cybercrime on Social Media Using Machine Learning: A Desktop Survey. In 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD). 1--6. https://doi.org/10.1109/ICABCD.2018.8465413
[107]
Giang Hoang Nguyen, Abdesselam Bouzerdoum, and Son Lam Phung. 2009. Learning pattern classification tasks with imbalanced data sets. Pattern recognition (2009), 193--208.
[108]
Loreen N. Olson, Joy L. Daggs, Barbara L. Ellevold, and Teddy K. K. Rogers. 2007. Entrapping the Innocent: Toward a Theory of Child Sexual Predators' Luring Communication. Communication Theory, Vol. 17, 3 (2007), 231--251. https://doi.org/10.1111/j.1468--2885.2007.00294.x //doi.org/10.1561/1500000066 arXiv: 1804.11192.
[109]
Z. Zuo, J. Li, P. Anderson, L. Yang, and N. Naik. 2018. Grooming Detection using Fuzzy-Rough Feature Selection and Text Classification. In 2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). 1--8. https://doi.org/10.1109/FUZZ-IEEE.2018.8491591
[110]
Ángel Callejas-Rodríguez, Esaú Villatoro-Tello, Ivan Meza, and Gabriela Ramírez-de-la Rosa. 2016. From Dialogue Corpora to Dialogue Systems: Generating a Chatbot with Teenager Personality for Preventing Cyber-Pedophilia. In Text, Speech, and Dialogue (Lecture Notes in Computer Science), Petr Sojka, Ale? Horák, Ivan Kope?ek, and Karel Pala (Eds.). Springer International Publishing, 531--539.

Cited By

View all
  • (2024)How Platform Exchange and Safeguards Matter: The Case of Sexual Risk in Airbnb and CouchsurfingProceedings of the ACM on Human-Computer Interaction10.1145/36536958:CSCW1(1-23)Online publication date: 26-Apr-2024
  • (2024)Towards Enforcing Good Digital Citizenship: Identifying Opportunities for Adolescent Online Safety NudgesProceedings of the ACM on Human-Computer Interaction10.1145/36374138:CSCW1(1-37)Online publication date: 26-Apr-2024
  • (2024)Toward Trauma-Informed Research Practices with Youth in HCI: Caring for Participants and Research Assistants When Studying Sensitive TopicsProceedings of the ACM on Human-Computer Interaction10.1145/36374118:CSCW1(1-31)Online publication date: 26-Apr-2024
  • Show More Cited By

Index Terms

  1. A Human-Centered Systematic Literature Review of the Computational Approaches for Online Sexual Risk Detection

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 5, Issue CSCW2
    CSCW2
    October 2021
    5376 pages
    EISSN:2573-0142
    DOI:10.1145/3493286
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 October 2021
    Published in PACMHCI Volume 5, Issue CSCW2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. artificial intelligence
    2. human-centered machine learning
    3. literature review
    4. online risks
    5. sexual risk detection
    6. social media

    Qualifiers

    • Research-article

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)745
    • Downloads (Last 6 weeks)110
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)How Platform Exchange and Safeguards Matter: The Case of Sexual Risk in Airbnb and CouchsurfingProceedings of the ACM on Human-Computer Interaction10.1145/36536958:CSCW1(1-23)Online publication date: 26-Apr-2024
    • (2024)Towards Enforcing Good Digital Citizenship: Identifying Opportunities for Adolescent Online Safety NudgesProceedings of the ACM on Human-Computer Interaction10.1145/36374138:CSCW1(1-37)Online publication date: 26-Apr-2024
    • (2024)Toward Trauma-Informed Research Practices with Youth in HCI: Caring for Participants and Research Assistants When Studying Sensitive TopicsProceedings of the ACM on Human-Computer Interaction10.1145/36374118:CSCW1(1-31)Online publication date: 26-Apr-2024
    • (2024)Missed Opportunities for Human-Centered AI Research: Understanding Stakeholder Collaboration in Mental Health AI ResearchProceedings of the ACM on Human-Computer Interaction10.1145/36373728:CSCW1(1-24)Online publication date: 26-Apr-2024
    • (2024)Personally Targeted Risk vs. Humor: How Online Risk Perceptions of Youth vs. Third-Party Annotators Differ based on Privately Shared Media on InstagramProceedings of the 23rd Annual ACM Interaction Design and Children Conference10.1145/3628516.3655799(1-13)Online publication date: 17-Jun-2024
    • (2024)Support in Short Form: Investigating TikTok Comments on Videos with #HarassmentExtended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613905.3650849(1-8)Online publication date: 11-May-2024
    • (2024)The Role of AI in Peer Support for Young People: A Study of Preferences for Human- and AI-Generated ResponsesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642574(1-18)Online publication date: 11-May-2024
    • (2024)Examining the Unique Online Risk Experiences and Mental Health Outcomes of LGBTQ+ versus Heterosexual YouthProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642509(1-21)Online publication date: 11-May-2024
    • (2024)"This is not a data problem": Algorithms and Power in Public Higher Education in CanadaProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642451(1-14)Online publication date: 11-May-2024
    • (2024)A Human-Centered Review of Algorithms in Homelessness ResearchProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642392(1-15)Online publication date: 11-May-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media