1 / 19

Smart Portal To Protect Child Online

This article discusses the risks that children face from online predators and the need for a smart approach to protect them. It reviews internet safety in Bahrain, explores the dangers of social networks, and proposes the use of data mining and visualization techniques to identify and prevent online victimization.

engel
Download Presentation

Smart Portal To Protect Child Online

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Smart Portal To Protect Child Online Who is Most at Risk to Online Predators Online Victimisation Techniques By Khalid Al-Mutawah Kalmutawah@uob.edu.bh University of Bahrain

  2. Outline • Social Networks • Bahrain Review for Internet Safety • What is required • Smart approach • Discussion • Questions University of Bahrain

  3. Social Networks • Web-based media to socialize (e.g. making friends, groups of interests, share experience, find someone to talk with) • It is a media where you can make followers • A place where you share your personal life with others • Build your profile online • E.g. Facebook, Twitter, Myspace, Friendster, Google +, …etc. University of Bahrain

  4. What is wrong then? • Are the other side telling the truth? • Is there any law to protect your personal profile or information from misuse ? • Is it safe for you children? • Is there any organization to report suspicious behavior or abuse • Have we educate our children, or even ourselves of the impacts of social networks? University of Bahrain

  5. Bahrain Review of Internet Safety • What do we know? • The usage of Internet is growing exponentially • Young people are eager to participate on social network • Children spend long time on Facebook without parental supervision • What do we need to know? • What are children doing on Facebook? • Are they safe? • Whom they are meeting and to what extent? • Is there a way to protect them? University of Bahrain

  6. Bahrain Review of Internet Safety • What have we found? • There is no great understanding of what is personal information on social network • Many children set their profile to be accessible to public on social network • Many share personal information including photos with strangers • Many responded positively to the abuse acts on social networks, yet most of them do not share these unpleasant experiences University of Bahrain

  7. Bahrain Review of Internet Safety • What have we learn? • Training and consultation are required • Specific legislation to protect children online • Engagement of schools, parents, NGOs, community groups on e-safety programme. • Tools and techniques to help prevent, protect, and assist children while surfing the internet University of Bahrain

  8. What is required? • Assist families to protect their children online • With less intervention to child privacy • And more accuracy • Always (24/7) anywhere anytime • Develop a smart tool for social network that alerts parents of any grooming, bullying or suspicious behavior online University of Bahrain

  9. Smart Approach University of Bahrain

  10. Smart Approach • Data mining (knowledge discovery from data) • Extraction of interesting (non-trivial, implicit, previously unknown and potentially useful) patterns or knowledge from huge amount of data University of Bahrain

  11. Smart Approach • Market analysis and management • Target marketing, customer relationship management (CRM), market basket analysis, market segmentation • Risk analysis and management • Forecasting, customer retention, quality control, competitive analysis • Fraud detection and detection of unusual patterns (outliers) • Text mining (news group, email, documents) and Web mining • DNA and bio-data analysis University of Bahrain

  12. Interpretation/ Evaluation Data Mining Preprocessing Patterns Selection Preprocessed Data Data Target Data Smart Approach Knowledge adapted from: U. Fayyad, et al. (1995), “From Knowledge Discovery to Data Mining: An Overview,” Advances in Knowledge Discovery and Data Mining, U. Fayyad et al. (Eds.), AAAI/MIT Press University of Bahrain

  13. Smart Approach Figure Clustering framework for Social Network University of Bahrain

  14. Smart Approach: Network Spider • Network spider download the relevant pages from the social network website of predators. • After a member page is fetched, URLs are extracted and stored into a queue. However, only follow links that are of interest, e.g., links to a group’s members, other social networks, comment links, and so on. University of Bahrain

  15. Smart Approach: Extractor • information Extractor component obtains data from user profiles, linkages, commenting, or subscription. • It then performs Patternmatching. For example, rule-based algorithms that rely on handcrafted rules can be used to extract useful information such as named entities. University of Bahrain

  16. Smart: Community Analysis • Community analysis is to identify common patterns within members in a Social network to form community of interests. • In Community analysis a subset of nodes is considered a community if nodes have stronger or denser links with nodes within the community than with nodes outside of the community. University of Bahrain

  17. Smart Approach: Visualization • The extracted network and analysis results can be visualized using various types of network layout methods. • Multidimensional scaling (MDS) is the most commonly used method for social network visualization. University of Bahrain

  18. Discussion • Obtained results can help you identify predators’ behavior and characteristics • These characteristics then can be integrated into a web portal that installed at your Childs' computer • And set to alert you whenever a similar behavior is emerged • We are welcome any collaboration to this research University of Bahrain

  19. Questions University of Bahrain

More Related