190 likes | 212 Views
This article discusses the risks that children face from online predators and the need for a smart approach to protect them. It reviews internet safety in Bahrain, explores the dangers of social networks, and proposes the use of data mining and visualization techniques to identify and prevent online victimization.
E N D
Smart Portal To Protect Child Online Who is Most at Risk to Online Predators Online Victimisation Techniques By Khalid Al-Mutawah Kalmutawah@uob.edu.bh University of Bahrain
Outline • Social Networks • Bahrain Review for Internet Safety • What is required • Smart approach • Discussion • Questions University of Bahrain
Social Networks • Web-based media to socialize (e.g. making friends, groups of interests, share experience, find someone to talk with) • It is a media where you can make followers • A place where you share your personal life with others • Build your profile online • E.g. Facebook, Twitter, Myspace, Friendster, Google +, …etc. University of Bahrain
What is wrong then? • Are the other side telling the truth? • Is there any law to protect your personal profile or information from misuse ? • Is it safe for you children? • Is there any organization to report suspicious behavior or abuse • Have we educate our children, or even ourselves of the impacts of social networks? University of Bahrain
Bahrain Review of Internet Safety • What do we know? • The usage of Internet is growing exponentially • Young people are eager to participate on social network • Children spend long time on Facebook without parental supervision • What do we need to know? • What are children doing on Facebook? • Are they safe? • Whom they are meeting and to what extent? • Is there a way to protect them? University of Bahrain
Bahrain Review of Internet Safety • What have we found? • There is no great understanding of what is personal information on social network • Many children set their profile to be accessible to public on social network • Many share personal information including photos with strangers • Many responded positively to the abuse acts on social networks, yet most of them do not share these unpleasant experiences University of Bahrain
Bahrain Review of Internet Safety • What have we learn? • Training and consultation are required • Specific legislation to protect children online • Engagement of schools, parents, NGOs, community groups on e-safety programme. • Tools and techniques to help prevent, protect, and assist children while surfing the internet University of Bahrain
What is required? • Assist families to protect their children online • With less intervention to child privacy • And more accuracy • Always (24/7) anywhere anytime • Develop a smart tool for social network that alerts parents of any grooming, bullying or suspicious behavior online University of Bahrain
Smart Approach University of Bahrain
Smart Approach • Data mining (knowledge discovery from data) • Extraction of interesting (non-trivial, implicit, previously unknown and potentially useful) patterns or knowledge from huge amount of data University of Bahrain
Smart Approach • Market analysis and management • Target marketing, customer relationship management (CRM), market basket analysis, market segmentation • Risk analysis and management • Forecasting, customer retention, quality control, competitive analysis • Fraud detection and detection of unusual patterns (outliers) • Text mining (news group, email, documents) and Web mining • DNA and bio-data analysis University of Bahrain
Interpretation/ Evaluation Data Mining Preprocessing Patterns Selection Preprocessed Data Data Target Data Smart Approach Knowledge adapted from: U. Fayyad, et al. (1995), “From Knowledge Discovery to Data Mining: An Overview,” Advances in Knowledge Discovery and Data Mining, U. Fayyad et al. (Eds.), AAAI/MIT Press University of Bahrain
Smart Approach Figure Clustering framework for Social Network University of Bahrain
Smart Approach: Network Spider • Network spider download the relevant pages from the social network website of predators. • After a member page is fetched, URLs are extracted and stored into a queue. However, only follow links that are of interest, e.g., links to a group’s members, other social networks, comment links, and so on. University of Bahrain
Smart Approach: Extractor • information Extractor component obtains data from user profiles, linkages, commenting, or subscription. • It then performs Patternmatching. For example, rule-based algorithms that rely on handcrafted rules can be used to extract useful information such as named entities. University of Bahrain
Smart: Community Analysis • Community analysis is to identify common patterns within members in a Social network to form community of interests. • In Community analysis a subset of nodes is considered a community if nodes have stronger or denser links with nodes within the community than with nodes outside of the community. University of Bahrain
Smart Approach: Visualization • The extracted network and analysis results can be visualized using various types of network layout methods. • Multidimensional scaling (MDS) is the most commonly used method for social network visualization. University of Bahrain
Discussion • Obtained results can help you identify predators’ behavior and characteristics • These characteristics then can be integrated into a web portal that installed at your Childs' computer • And set to alert you whenever a similar behavior is emerged • We are welcome any collaboration to this research University of Bahrain
Questions University of Bahrain