Skip to main content

Preventing and Detecting Molestation using Twitter



Crime on women has been increasing on an alarming rate especially cases of Molestation.We tried to do something that can actually make people aware about where they are and know about their surroundings. So, we took one of the most popular social media platforms i.e. Twitter to extract tweets regarding molestation. Domain – India

Objective:-

The main purpose was to extract locations (location of incidence) out of the tweets that we collected and flag those locations into 3 categories.



       Most Prone to Molestation: More than 800 cases per year.






         Relatively Less Prone but quite a few incidents have been reported.





        Relatively very safe - Very few or no incidents have been reported
 




Methodology :

1) Extracted more than 10K Tweets using HashTags.

#molested
#molesting
#YesAllWomen
#NotAllMen
#bengalurumolestation
#pedophile
#pedo
#sexually
#assault
#molest
#sexualabuse , etc

Challenge : Most of the tweets are not geo tagged .



We came up with a solution. We tried to explore the metadata of the tweets i.e. when
people use hashtags of in the tweet they sometimes mention the location like

#Bangalore
#ShameDelhi

We did some pre-processing on the tweet text and the metadata to extract locations
out of it. The preprocessed text which are supposed to be locations are passed to geocoderAPI and we got the latitude and longitude. Still Our Problem Is not Solved. This technique returned 1/5th of the tweets with locations in it. Hmmmm……..


Since most of the tweets contain images, news cutting etc. We used the technique OCR(Optical Character Recognition) for extracting text out of those images and extracting locations out of it.
Image is given Below 


The red circles indicate the locations. We got news clippings from the timeline of police handles and news handles in twitter.
Additionally we used web scraping on the news website to extract locations of certain incidents.We also used a google add on – > Twitter Archiver to actually extract tweets based on our hashtags and filtered location.


And here we are ---------------------------------



The 30 Km Radius shows around you , the place is quite unsafe. You can drag the purple marker to any place you want , and you can see whether you are
safe within the 30 Km radius.

Purple Marker denotes your current location .....


Improvements : Accuracy is low.  Many locations we retrieved suggests certain incidents did not occur at that place.  So to check manually all the posts is impossible . So we need to automate this thing.

Secondly , one thing that can be extended in this. If we can get street level data  precisely , we can provide an alternative walking/driving route to the user given the crime rate of a location. 

Thirdly, if we can find the time of the day when these incidents are occurring then it becomes more effective. 


Poster :


Us :  

 
Contributors:

Ritaban Basu
Harsh
Mayur Shingote
Saquib Mohd
Ronak Kumar





References: 

Images : -- google.

Comments

Popular posts from this blog

Identifying Tinder Profiles on Facebook

Identifying Tinder Profiles on Facebook In the online world, everything that you ever put is linked and connected. You might think that you’ve put some information on one platform and that’s it, you’re good to go. But you, my friend, are sadly mistaken. With this thought in mind and the privacy concerns linked with Online Social Media, we would like to introduce you to our problem statement: Identifying Facebook Profiles from Tinder Profiles. Given a tinder profile, our aim is to identify the corresponding Facebook profile of that person. We are addressing the linkability issue here and trying to highlight how more information than what you’ve mentioned on Tinder can be picked up from your Facebook profile. For those who don’t know, Tinder is a Dating Platform available for a Mobile Application and a Web App. It shows the geographically close profiles around you and you have an option to right swipe(Like) or left swipe(Dislike) them. When two people right swipe each other then it’

iFROOSN: Incentivised Fake Reviews On OSNs with Yelp as the reference

Yelp is an OSN primarily used to popularise the businesses and give reviews about those business. Yelp can be used as an efficient business expander for many upcoming restaurants/spas/saloons who always look for new customers. Problem Statement Our main objective of this course project was to target fake/incentivised reviews on yelp and give a credibility score using which a new user of Yelp can get an overall estimate about the restaurant he/she will visit .We developed an application which required an business ID of yelp as an input and it gave the credibility score as the output along with some inferred results in form of graphs Dataset The primary requirement before starting the project was collecting dataset for Yelp business and corresponding reviews and details about the user which post these reviews .The dataset was obtained through Yelp dataset challenge which was available for academic usage and result collections .The database had predefined schema and

Privacy Control

Online social networks have become an important part of our social lives, and their inherent privacy problems have become a major concern for users. As of March 2016, 142 million Indians maintain a social network profile on Facebook and 30 million on Twitter, which provides them with a convenient way to communicate with family, friends and even total strangers. The Services provided by social media though add convenience to our life to a great extent and have made the world a much closely connected, this boon comes with few hidden problems. Though social media lets users share a part of our life to the world, it also gives birth to the security threats to our personal information.  The users are confronted with a dichotomy between sharing information with their loved ones and friends and sharing information with everyone else on the internet. To help users tackle this dilemma, social networks provide a plethora of privacy settings which allow the user to control his/her pri