Online grooming detection: A comprehensive survey of child exploitation in chat logs

被引:14
作者
Borj, Parisa Rezaee [1 ]
Raja, Kiran [1 ]
Bours, Patrick [1 ]
机构
[1] NTNU, Teknol Vegen 22, N-2815 Gjovik, Norway
关键词
Cyber grooming; Child exploitation; Online predators; Chat analysis; Stylometry; Text analysis; Keystroke dynamics; STATISTICAL DISCOURSE ANALYSIS; KEYSTROKE DYNAMICS; SOCIAL MEDIA; NEURAL-NETWORK; SEX OFFENDERS; BEHAVIOR; FEATURES; MINORS; WORDS;
D O I
10.1016/j.knosys.2022.110039
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Social media platforms present significant threats against underage users targeted for predatory intents. Many early research works have applied the footprints left by online predators to investigate online grooming. While digital forensics tools provide security to online users, it also encounters some critical challenges, such as privacy issues and the lack of data for research in this field. Our literature review investigates all research papers on grooming detection in online conversations by looking at the psychological definitions and aspects of grooming. We study the psychological theories behind the grooming characteristics used by machine learning models that have led to predatory stage detection. Our survey broadly considers the authorship profiling research works used for grooming detection in online conversations, along with predatory conversation detection and predatory identification approaches. Various approaches for online grooming detection have been evaluated based on the metrics used in the grooming detection problem. We have also categorized the available datasets and used feature vectors to give readers a deep knowledge of the problem considering their constraints and open research gaps. Finally, this survey details the constraints that challenge grooming detection, unaddressed problems, and possible future solutions to improve the state-of-the-art and make the algorithms more reliable. (c) 2022 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
引用
收藏
页数:21
相关论文
共 159 条
[81]  
Li L, 2020, AAAI CONF ARTIF INTE, V34, P8220
[82]  
Lin J., 2007, AUTOMATIC AUTHOR PRO
[83]   Clustering-based undersampling in class-imbalanced data [J].
Lin, Wei-Chao ;
Tsai, Chih-Fong ;
Hu, Ya-Han ;
Jhang, Jing-Shang .
INFORMATION SCIENCES, 2017, 409 :17-26
[84]   Exploratory Undersampling for Class-Imbalance Learning [J].
Liu, Xu-Ying ;
Wu, Jianxin ;
Zhou, Zhi-Hua .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2009, 39 (02) :539-550
[85]   "cause ur special": Understanding trust and complimenting behaviour in online grooming discourse [J].
Lorenzo-Dus, Nuria ;
Izura, Cristina .
JOURNAL OF PRAGMATICS, 2017, 112 :68-82
[86]  
Mohammad SM, 2013, Arxiv, DOI arXiv:1308.6242
[87]  
MacFarlane K., 2009, 2009 INT C MANAGEMEN, P1
[88]  
Malm A., 2017, HDB CRIMINOLOGY TERR, P221
[89]  
Michalopoulos D., 2011, 2011 IEEE Symposium on Computers and Communications (ISCC 2011), P864, DOI 10.1109/ISCC.2011.5983950
[90]  
Michalopoulos D., 2012, 2012 16 PANH C INF I, P19