Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation Materials
A number of proposals have been made over the years to implement notification systems to modify user behaviour, by sensitising users to the fact that their activities are not anonymous, and that further consequences may follow from future detections of illicit activity. While these systems can be automated to a large extent, there is a degree of manual processing required, so the cost-effectiveness and potential user coverage of such controls is critical. In this paper, we consider the problem of sensitising entrenched paedophiles who search for and download large amounts of Child Exploitation Material (CEM). Some countries, like New Zealand, operate a centralised censorship system which could be used to issue notifications when entrenched paedophiles search for CEM. We develop a statistical model to determine how many notices would need to be sent to entrenched paedophiles to ensure that they receive at least one notification over a 12 month period. The estimate of CEM viewers is based on actual data from the New Zealand internet filter. The modelling results indicate that sending 9,880 notices would result in entrenched paedophiles receiving at least one notice; for average CEM users, 53.27% of users would receive at least one notice within 12 months.
KeywordsChild exploitation Cost benefit analysis Habituation
This project is supported by DP160100601 “Automated internet warnings to prevent viewing of minor-adult sex images” - with J.Prichard, C. Spiranovic, T. Krone and R. Wortley. I would like to acknowledge the valuable feedback and contributions of Drs Prichard, Spiranovic, Krone and Wortley in the preparation of this manuscript.
- Alazab, M., Venkatraman, S., Watters, P.A., Alazab, M.: Zero-day malware detection based on supervised learning algorithms of API call signatures. In: Proceedings of the 9th Australian Data Mining Conference (2011)Google Scholar
- Bouton, M.E.: Learning and Behavior: A Contemporary Synthesis. Sunderland, Sinauer, MA (2007)Google Scholar
- Clarke, R.: Situational crime prevention. In: Wortley, R., Mazerolle, L. (eds.) Environmental Criminology and Crime Analysis. Willan Publishing, Cullompton (2008)Google Scholar
- Fraenkel, J., Wallen, N.: How to Design and Evaluate Research in Education. McGraw Hill, New York (2005)Google Scholar
- Ho, W.H., Watters, P.A.: Statistical and structural approaches to filtering internet pornography. In: 2004 IEEE International Conference on Systems, Man and Cybernetics, vol. 5, pp. 4792–4798. IEEE (2004)Google Scholar
- Layton, R., Watters, P.A., Dazeley, R.: Automatically determining phishing campaigns using the USCAP methodology. In: Proceedings of the 5th APWG E-crime Research Summit (2010)Google Scholar
- Neisser, U.: Rising scores on intelligence tests. Am. Sci. 85, 440–447 (1997)Google Scholar
- Prichard, J., Spiranovic, C., Gelb, K., Watters, P.A., Krone, T.: Tertiary Education Students’ Attitudes to the harmfulness of viewing and distributing child pornography. Psychiatry Psychol. Law (ahead-of-print), 23(2), 224–239 (2015)Google Scholar
- Quayle, E.: Over the internet, under the radar: online child sexual abuse and exploitation–a brief (2017)Google Scholar
- Watters, P.A.: Why do users trust the wrong messages? A behavioural model of phishing. In: Proceedings of the 5th eCrime Researchers Summit, pp. 1–7 (2009). https://doi.org/10.1109/ecrime.2009.5342611
- Wolak, J., Finkelhor, D., Mitchell, K.J.: Trends in arrests for child pornography possession: the third national juvenile online victimization study (NJOV-3). Crimes against Children Research Center, University of New Hampshire, Durham, NH (2012)Google Scholar
- Whingham, N.: Rights holders abandon ‘three strikes’ notice scheme as fresh piracy fight looms (2016). http://www.news.com.au/technology/online/piracy/rights-holders-abandon-three-strikes-notice-scheme-as-fresh-piracy-fight-looms/news-story/a0590bf35b9fc1c6d0e847b12b2cacf1