Artificial intelligence as a tool in social media content moderation
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
On social media, users engage with each other through consuming and creating user-generated content, the amount of which has increased alongside the growth of the userbase. This presents challenges to social media companies as some uploaded content can be harmful to users and the appeal of the service. Platforms rely on filtering systems and manual labour to remove inadmissible content in the process of moderation. Advancements in the capabilities of artificial intelligence have made it possible to harness the technology for the purposes of moderation. This thesis explores the potential uses of AI in content moderation through features enabled by machine learning. The study was con-ducted as a literature review. It was found that artificial intelligence can detect instances of toxicity and hate speech as well as harmful images and multimedia content through natural language processing and computer vision technologies. The use of AI enables the scaling of moderation systems, the expedient evaluation of content and expanded moderation capabilities in different languages. Limitations in the implementation of automated moderation systems include inaccuracies, lack of contextual awareness, slow pace of adaptation, and concerns surrounding biases, transparency and freedom of expression. ...
MetadataShow full item record
- Kandidaatintutkielmat 
Showing items with similar title or keywords.
Voutilainen, Janne; Kari, Martti (Academic Conferences International, 2020)In 2019, e-criminals adopted new tactics to demand enormous ransoms from large organizations by using ransomware, a phenomenon known as “big game hunting.” Big game hunting is an excellent example of a sophisticated and ...
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Peregrine Technical Solutions, 2020)Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine ...
Kiyoki, Yasushi; Thalheim, Bernhard; Duží, Marie; Jaakkola, Hannu; Chawakitchareon, Petchporn; Heimbürger, Anneli (IOS Press, 2020)Humankind faces a most crucial mission; we must endeavour, on a global scale, to restore and improve our natural and social environments. This is a big challenge for global information systems development and for their ...
Continuous Software Engineering Practices in AI/ML Development Past the Narrow Lens of MLOps : Adoption Challenges Vänskä, Sini; Kemell, Kai-Kristian; Mikkonen, Tommi; Abrahamsson, Pekka (Politechnika Wroclawska Oficyna Wydawnicza, 2024)Background: Continuous software engineering practices are currently considered state of the art in Software Engineering (SE). Recently, this interest in continuous SE has extended to ML system development as well, primarily ...
Wiafe, Isaac; Koranteng, Felix N.; Obeng, Emmanuel N.; Assyne, Nana; Wiafe, Abigail; Gulliver, Stephen R. (IEEE, 2020)Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can ...