Skip to main content

Preventing and Detecting Molestation using Twitter



Crime on women has been increasing on an alarming rate especially cases of Molestation.We tried to do something that can actually make people aware about where they are and know about their surroundings. So, we took one of the most popular social media platforms i.e. Twitter to extract tweets regarding molestation. Domain – India

Objective:-

The main purpose was to extract locations (location of incidence) out of the tweets that we collected and flag those locations into 3 categories.



       Most Prone to Molestation: More than 800 cases per year.






         Relatively Less Prone but quite a few incidents have been reported.





        Relatively very safe - Very few or no incidents have been reported
 




Methodology :

1) Extracted more than 10K Tweets using HashTags.

#molested
#molesting
#YesAllWomen
#NotAllMen
#bengalurumolestation
#pedophile
#pedo
#sexually
#assault
#molest
#sexualabuse , etc

Challenge : Most of the tweets are not geo tagged .



We came up with a solution. We tried to explore the metadata of the tweets i.e. when
people use hashtags of in the tweet they sometimes mention the location like

#Bangalore
#ShameDelhi

We did some pre-processing on the tweet text and the metadata to extract locations
out of it. The preprocessed text which are supposed to be locations are passed to geocoderAPI and we got the latitude and longitude. Still Our Problem Is not Solved. This technique returned 1/5th of the tweets with locations in it. Hmmmm……..


Since most of the tweets contain images, news cutting etc. We used the technique OCR(Optical Character Recognition) for extracting text out of those images and extracting locations out of it.
Image is given Below 


The red circles indicate the locations. We got news clippings from the timeline of police handles and news handles in twitter.
Additionally we used web scraping on the news website to extract locations of certain incidents.We also used a google add on – > Twitter Archiver to actually extract tweets based on our hashtags and filtered location.


And here we are ---------------------------------



The 30 Km Radius shows around you , the place is quite unsafe. You can drag the purple marker to any place you want , and you can see whether you are
safe within the 30 Km radius.

Purple Marker denotes your current location .....


Improvements : Accuracy is low.  Many locations we retrieved suggests certain incidents did not occur at that place.  So to check manually all the posts is impossible . So we need to automate this thing.

Secondly , one thing that can be extended in this. If we can get street level data  precisely , we can provide an alternative walking/driving route to the user given the crime rate of a location. 

Thirdly, if we can find the time of the day when these incidents are occurring then it becomes more effective. 


Poster :


Us :  

 
Contributors:

Ritaban Basu
Harsh
Mayur Shingote
Saquib Mohd
Ronak Kumar





References: 

Images : -- google.

Comments

Popular posts from this blog

Identifying Tinder Profiles on Facebook

Identifying Tinder Profiles on Facebook In the online world, everything that you ever put is linked and connected. You might think that you’ve put some information on one platform and that’s it, you’re good to go. But you, my friend, are sadly mistaken. With this thought in mind and the privacy concerns linked with Online Social Media, we would like to introduce you to our problem statement: Identifying Facebook Profiles from Tinder Profiles. Given a tinder profile, our aim is to identify the corresponding Facebook profile of that person. We are addressing the linkability issue here and trying to highlight how more information than what you’ve mentioned on Tinder can be picked up from your Facebook profile. For those who don’t know, Tinder is a Dating Platform available for a Mobile Application and a Web App. It shows the geographically close profiles around you and you have an option to right swipe(Like) or left swipe(Dislike) them. When two people right swipe each other then it’

iFROOSN: Incentivised Fake Reviews On OSNs with Yelp as the reference

Yelp is an OSN primarily used to popularise the businesses and give reviews about those business. Yelp can be used as an efficient business expander for many upcoming restaurants/spas/saloons who always look for new customers. Problem Statement Our main objective of this course project was to target fake/incentivised reviews on yelp and give a credibility score using which a new user of Yelp can get an overall estimate about the restaurant he/she will visit .We developed an application which required an business ID of yelp as an input and it gave the credibility score as the output along with some inferred results in form of graphs Dataset The primary requirement before starting the project was collecting dataset for Yelp business and corresponding reviews and details about the user which post these reviews .The dataset was obtained through Yelp dataset challenge which was available for academic usage and result collections .The database had predefined schema and

Inference Attacks On OSN's

INTRODUCTION TWITTER is a popular online social network and microbloging service for exchanging messages (also known as tweets) among people, supported by a huge ecosystem. Twitter announces that it has over 140 million active users creating more than 340 million messages every day [26] and over one million registered applications built by more than 750,000 developers [25]. The third party applications include client applications for various platforms, such as Windows, Mac, iOS, and Android, and web-based applications such as URL shortening services, image-sharing services, and news feeds. Among the third party services, URL shortening services which provide a short alias of a long URL is an essential service for Twitter users who want to share long URLs via tweets having length restriction. Twitter allows users to post up to 140-character tweets containing only texts. Therefore, when users want to share complicated information (e.g., news and multimedia), they should include a UR