EPSRC logo

Details of Grant 

EPSRC Reference: EP/F035438/1
Title: ISIS: Protecting children in online social networks
Principal Investigator: Rashid, Professor A
Other Investigators:
May-Chahal, Professor CA Coulson, Professor G
Researcher Co-Investigators:
Mr DR Hughes Professor PE Rayson Dr J Walkerdine
Project Partners:
Department: Computing & Communications
Organisation: Lancaster University
Scheme: Standard Research
Starts: 01 June 2008 Ends: 18 October 2011 Value (£): 430,467
EPSRC Research Topic Classifications:
Human Communication in ICT
EPSRC Industrial Sector Classifications:
No relevance to Underpinning Sectors
Related Grants:
EP/F035071/1 EP/F035454/1
Panel History:
Panel DatePanel NameOutcome
24 Jan 2008 ICT Prioritisation Panel (Technology) Announced
Summary on Grant Application Form
The aim of the Isis project is to develop an ethics-centred monitoring framework and tools for supporting law enforcement agencies in policing online social networks for the purpose of protecting children. The project will develop natural language analysis techniques to help identify paedophiles from chat logs and monitoring mechanisms that can be non-invasively attached to file sharing systems for identifying the distributors of child abuse media. The ethical issues associated with such monitoring activities will be rigorously studied and consistently fed back into the development of the framework and tools. The project results will be used and evaluated by the Child Exploitation and Online Protection (CEOP) centre as part of their own policing activities.Recent years have seen a rapid rise in the number and use of online social networks, e.g., chat and file sharing systems. These social networks pose two significant risks in terms of child exploitation:1. Paedophiles predating on childrenChildren actively participate in chat rooms and web-based communities. Paedophiles can use such forums to predate on children (highlighted by the arrest and conviction of Lee Costi [Guardian, 23/06/06]), or even to plan paedophilia-related activities (illustrated by the conviction of paedophiles who were using such systems to plan child abuse [Guardian, 6/02/07]). These concerns are reflected by the formation of the Virtual Global Taskforce, the launch of the CEOP and Scottish legislation to criminalise the 'grooming' of children in chat rooms.2. Paedophiles distributing and sharing child abuse mediaPaedophiles can formulate their own social networks using mechanisms, such as file-sharing systems, in order to distribute and share child abuse media. A recent study at Lancaster University found that 1.6% of searches and 2.4% of responses on the Gnutella peer-to-peer network relate to illegal sexual content (including child abuse media). Given the system's scale, these results suggest that, on the Gnutella network alone, hundreds of searches for illegal images occur each second. Isis aims to address three major research challenges in this context:1. How to identify active paedophiles across online communities?Paedophiles often masquerade as children in order to establish contact with potential victims and gain their trust. Distinguishing the innocent interaction amongst children or amongst children and adults from such predatory advances is a non-trivial task. At the same time paedophiles may use multiple online identities and known paedophiles may move to other online social networks upon detection in one network. It is, therefore, vital that once a paedophile is detected in one network, s/he can be successfully detected in other networks which s/he may attempt to employ for grooming children. 2. How to identify the core distributors of child abuse media?The key research challenge is to accurately identify child abuse media from the plethora of perfectly legal material that exists within file sharing systems. Paedophiles often use specialised vocabulary to describe their shared media/a vocabulary that evolves and changes over time/and operate over different file sharing networks. Any monitoring framework must be non-invasively attachable to existing file sharing systems given the wealth of such systems and clients available today. Such monitoring tools must also be able to distinguish core distributors of such media from mere users to help law enforcement agencies in tackling the problem at its roots.3. How to ensure that such developments maintain ethical practices?The development of such monitoring and analysis techniques raises a number of ethical challenges pertaining to utilising the framework and tools in a beneficial way for child protection while protecting innocent users of online social networks and safeguarding their privacy.
Key Findings
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
Potential use in non-academic contexts
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
Impacts
Description This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
Summary
Date Materialised
Sectors submitted by the Researcher
This information can now be found on Gateway to Research (GtR) http://gtr.rcuk.ac.uk
Project URL:  
Further Information:  
Organisation Website: http://www.lancs.ac.uk