Close Menu
5gantennas.org5gantennas.org
  • Home
  • 5G
    • 5G Technology
  • 6G
  • AI
  • Data
    • Global 5G
  • Internet
  • WIFI
  • 5G Antennas
  • Legacy

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
5gantennas.org5gantennas.org
  • Home
  • 5G
    1. 5G Technology
    2. View All

    Deutsche Telekom to operate 12,500 5G antennas over 3.6 GHz band

    August 28, 2024

    URCA Releases Draft “Roadmap” for 5G Rollout in the Bahamas – Eye Witness News

    August 23, 2024

    Smart Launches Smart ZTE Blade A75 5G » YugaTech

    August 22, 2024

    5G Drone Integration Denmark – DRONELIFE

    August 21, 2024

    Hughes praises successful private 5G demo for U.S. Navy

    August 29, 2024

    GSA survey reveals 5G FWA has become “mainstream”

    August 29, 2024

    China Mobile expands 5G Advanced, Chunghwa Telecom enters Europe

    August 29, 2024

    Ateme and ORS Boost 5G Broadcast Capacity with “World’s First Trial of IP-Based Statmux over 5G Broadcast” | TV Tech

    August 29, 2024
  • 6G

    India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

    August 29, 2024

    Vodafonewatch Weekly: Rural 4G, Industrial 5G, 6G Patents | Weekly Briefing

    August 29, 2024

    Southeast Asia steps up efforts to build 6G standards

    August 29, 2024

    Energy efficiency as an inherent attribute of 6G networks

    August 29, 2024

    Finnish working group launches push for 6G technology

    August 28, 2024
  • AI

    Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

    August 29, 2024

    Why Honeywell is betting big on Gen AI

    August 29, 2024

    Ethically questionable or creative genius? How artists are engaging with AI in their work | Art and Design

    August 29, 2024

    “Elon Musk and Trump” arrested for burglary in disturbing AI video

    August 29, 2024

    Nvidia CFO says ‘enterprise AI wave’ has begun and Fortune 100 companies are leading the way

    August 29, 2024
  • Data
    1. Global 5G
    2. View All

    Global 5G Enterprise Market is expected to be valued at USD 34.4 Billion by 2032

    August 12, 2024

    Counterpoint predicts 5G will dominate the smartphone market in early 2024

    August 5, 2024

    Qualcomm’s new chipsets will power affordable 5G smartphones

    July 31, 2024

    Best Super Fast Download Companies — TradingView

    July 31, 2024

    Crypto Markets Rise on Strong US Economic Data

    August 29, 2024

    Microsoft approves construction of third section of Mount Pleasant data center campus

    August 29, 2024

    China has invested $6.1 billion in state-run data center projects over two years, with the “East Data, West Computing” initiative aimed at capitalizing on the country’s untapped land.

    August 29, 2024

    What is the size of the clinical data analysis solutions market?

    August 29, 2024
  • Internet

    NATO believes Russia poses a threat to Western internet and GPS services

    August 29, 2024

    Mpeppe grows fast, building traction among Internet computer owners

    August 29, 2024

    Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

    August 29, 2024

    Long-term internet computer investor adds PEPE rival to holdings

    August 29, 2024

    Biden-Harris Administration Approves Initial Internet for All Proposals in Mississippi and South Dakota

    August 29, 2024
  • WIFI

    4 Best Wi-Fi Mesh Networking Systems in 2024

    September 6, 2024

    Best WiFi deal: Save $200 on the Starlink Standard Kit AX

    August 29, 2024

    Sonos Roam 2 review | Good Housekeeping UK

    August 29, 2024

    Popular WiFi extender that eliminates dead zones in your home costs just $12

    August 29, 2024

    North American WiFi 6 Mesh Router Market Size, Share, Forecast, [2030] – அக்னி செய்திகள்

    August 29, 2024
  • 5G Antennas

    Nokia and Claro bring 5G to Argentina

    August 27, 2024

    Nokia expands FWA portfolio with new 5G devices – SatNews

    July 25, 2024

    Deutsche Telekom to operate 12,150 5G antennas over 3.6 GHz band

    July 24, 2024

    Vodafone and Ericsson develop a compact 5G antenna in Germany

    July 12, 2024

    Vodafone and Ericsson unveil new small antennas to power Germany’s 5G network

    July 11, 2024
  • Legacy
5gantennas.org5gantennas.org
Home»Internet»Using AI to monitor terrorist content on the internet is inevitable, but it also comes with pitfalls
Internet

Using AI to monitor terrorist content on the internet is inevitable, but it also comes with pitfalls

5gantennas.orgBy 5gantennas.orgFebruary 7, 2024No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


<スパンクラス="キャプション">shutter stock</span> <スパンクラス="帰属"><a クラス="リンク " href="https://www.shutterstock.com/image-photo/technology-security-concept-personal-authentication-system-709257292" 相対="nofollowノーオープナー" ターゲット="_空白" データ-ylk="slk:metamorworks/Shutterstock;elm:context_link;itc:0;sec:content-canvas">metamorworks/Shutterstock</a></span>” src=”https://s.yimg.com/ny/api/res/1.2/rW1NiTgeQ6v9b5HykyXQ9A–/YXBwaWQ9aGlnaGxhbmRlcjt3PTk2MDtoPTY0NQ–/https://media.zenfs.com/en/the_conversation_464/4eeb1cadaa65e4ce891784 e861402fd8″ data-src= “https://s.yimg.com/ny/api/res/1.2/rW1NiTgeQ6v9b5HykyXQ9A–/YXBwaWQ9aGlnaGxhbmRlcjt3PTk2MDtoPTY0NQ–/https://media.zenfs.com/en/the_conversation_464/4eeb1cadaa65e4ce891784e861 402fd8″/></div>
</div>
</div>
</figure>
<p>Every minute, millions of social media posts, photos, and videos flood the internet. On average, Facebook users share 694,000 Stories, X (formerly Twitter) users post 360,000 posts, Snapchat users send 2.7 million Snaps, and YouTube users share over 500 of his I’m uploading a video.</p>
<p>This vast ocean of online material must be constantly monitored for harmful or illegal content, such as promoting terrorism or violence.</p>
<p>The sheer volume of content means it is impossible for a person to manually inspect and check everything. Automation tools, including artificial intelligence (AI), are therefore essential. However, such tools also have limitations.</p>
<p>Concerted efforts in recent years to develop tools to identify and remove terrorist content online have been fueled, in part, by the emergence of new laws and regulations. This includes the EU’s Terrorist Content Online Regulation, which requires hosting service providers to remove terrorist content from their platforms within one hour of receiving a takedown order from a competent national authority.</p>
<h2>Behavioral and content-based tools</h2>
<p>Broadly speaking, there are two types of tools used to root out terrorist content. First, look at specific account and message behavior. This includes things like how old the account is, the use of trending or unrelated hashtags, and an unusual amount of posts.</p>
<p>This is in many ways similar to spam detection in that it doesn’t pay attention to the content, and it helps detect the rapid spread of large amounts of content, often done by bots.</p>
<p>The second type of tool is content-based. It focuses on linguistic features, word usage, images, and web addresses. Automated content-based tools take one of two approaches.</p>
<p><strong>1.Matching</strong></p>
<p>The first approach is based on comparing new images and videos to an existing database of images and videos previously identified as terrorist in nature. One challenge here is that terrorist groups are known to try to circumvent such techniques by creating subtle variations of the same content.</p>
<p><button class=story continues

For example, after the Christchurch terrorist attack in New Zealand in 2019, hundreds of visually different versions of the livestream video of the atrocity circulated.

Therefore, to address this, matching-based tools typically use perceptual hashes rather than cryptographic hashes. A hash is similar to a digital fingerprint, and a cryptographic hash acts like a secure, unique ID tag. Changing just one pixel in an image significantly alters its fingerprint and prevents false matches.

Perceptual hashing, on the other hand, focuses on similarity. Small changes such as pixel color adjustments will be missed, but it will identify images that have the same core content. This makes perceptual hashing more resilient to small changes to a piece of content. But this also means that the hash is not completely random and can be used to recreate the original image.

A close-up of a mobile phone screen showing some social media apps.A close-up of a mobile phone screen showing some social media apps.
Millions of posts, images, and videos are uploaded to social media platforms every minute. Victorio/Shutterstock

2. Classification

The second approach relies on content classification. Machine learning and other forms of AI such as natural language processing are used. To achieve this, the AI ​​needs many examples, such as text that has been labeled as terrorist content or text that has not been labeled by human content or his moderators. By analyzing these examples, AI learns the features that distinguish different types of content and can uniquely classify new content.

Once trained, the algorithm will be able to predict whether a new content item belongs to one of the specified categories. These items may be removed or flagged for human review.

However, this approach also has its challenges. Collecting and preparing large datasets of terrorist content to train algorithms is time and resource intensive.

Training data can also quickly become outdated as terrorists use new terminology or discuss new world events and current events. Algorithms also have difficulty understanding context, such as subtlety or sarcasm. There is also a lack of cultural sensitivity, with different groups having different dialects and language usage.

These limitations can have important offline implications. Countries such as Ethiopia and Romania have documented failures to remove hate speech, while free speech activists in countries such as Egypt, Syria and Tunisia have reported having their content removed.

Human moderators still needed

So, despite advances in AI, human input remains essential. This is important for maintaining databases and datasets, evaluating content flagged for review, and operating an appeals process should you dispute a decision.

But it’s a grueling, back-breaking job, and many tech companies like Meta outsource this work to third-party vendors, leading to damning reports about moderators’ working conditions.

To address this, we recommend that companies hiring content moderators develop a set of minimum standards that include mental health provision. There is also the possibility of developing AI tools to protect the health of moderators. This works, for example, by blurring areas of the image, allowing moderators to reach decisions without directly looking at the disturbing content.

But at the same time, platforms that have the resources necessary to develop automated content moderation tools and hire a sufficient number of human reviewers with the necessary expertise are There are very few.

Many platforms are moving to off-the-shelf products. The content moderation solutions market is estimated to be worth $32 billion by 2031.

But you need to be careful here. Third-party providers currently do not receive the same level of oversight as the technology platforms themselves. Insufficient human input and lack of transparency regarding the datasets used to train algorithms can lead to over-reliance on automated tools.

Therefore, collaborative efforts between government and the private sector are essential. For example, the EU-funded Tech Against Terrorism Europe project has developed valuable resources for technology companies. In some cases, automated content moderation tools have been made publicly available, such as Meta’s Hasher-Matcher-Actioner, which companies can use to build their own databases of hashed terrorist content.

International organizations, governments, and technology platforms must prioritize the development of such collaborative resources. Without this, effectively combating online terrorist content will remain difficult.

This article is republished from The Conversation under a Creative Commons license. Read the original article.

conversationconversation

conversation

Stuart McDonald received funding from the EU Internal Security Fund for the Tech Against Terrorism Europe (ISF-2021-AG-TCO-101080101) project.

Ashley A. Mattheis receives funding from the EU Internal Security Fund for the Tech Against Terrorism Europe project (ISF-2021-AG-TCO-101080101).

David Wells received funding from the Council of Europe to carry out analysis of emerging patterns of misuse of technology by terrorists (ongoing)



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleConfirmed: Entrust acquires AI-based identity verification startup Onfido for more than $400 million, sources say
Next Article Más Móvil sees 5G benefits in Singtel’s Paragon, digital platforms and services
5gantennas.org
  • Website

Related Posts

NATO believes Russia poses a threat to Western internet and GPS services

August 29, 2024

Mpeppe grows fast, building traction among Internet computer owners

August 29, 2024

Internet Computer Whale Buys Mpeppe (MPEPE) at 340x ROI

August 29, 2024
Leave A Reply Cancel Reply

You must be logged in to post a comment.

Latest Posts

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024

Crypto Markets Rise on Strong US Economic Data

August 29, 2024
Don't Miss

Apple focuses on 6G for future iPhones

By 5gantennas.orgDecember 11, 2023

iPhone 15 Pro and Pro MaxWith Apple’s recent listing of cellular platform architects to work…

All connectivity technologies will be integrated in the 6G era, says Abhay Karandikar, DST Secretary, ET Telecom

January 31, 2024

5G-Advanced and 6G networks require additional spectrum

January 24, 2024

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to 5GAntennas.org, your reliable source for comprehensive information on 5G technology, artificial intelligence (AI), and data-related advancements. We are passionate about staying at the forefront of these cutting-edge fields and bringing you the latest insights, trends, and developments.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

4 Best Wi-Fi Mesh Networking Systems in 2024

September 6, 2024

India is on the brink of a new revolution in telecommunications and can lead the world with 6G: Jyotiraditya Scindia

August 29, 2024

Speaker Pelosi slams California AI bill headed to Governor Newsom as ‘ignorant’

August 29, 2024
Most Popular

Will 5G make 2024 the most connected year in the industry?

December 1, 2023

The current state of 5G in the US and how it can improve

September 28, 2023

How 5G technology will transform gaming on the go

January 31, 2024
© 2025 5gantennas. Designed by 5gantennas.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • About Creator

Type above and press Enter to search. Press Esc to cancel.