{"id":"https://openalex.org/W4399332763","doi":"https://doi.org/10.1145/3655693.3655694","title":"Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention","display_name":"Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention","publication_year":2024,"publication_date":"2024-06-04","ids":{"openalex":"https://openalex.org/W4399332763","doi":"https://doi.org/10.1145/3655693.3655694"},"language":"en","primary_location":{"id":"doi:10.1145/3655693.3655694","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3655693.3655694","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3655693.3655694","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"European Interdisciplinary Cybersecurity Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3655693.3655694","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094185873","display_name":"Ellie Prosser","orcid":"https://orcid.org/0000-0002-4414-1134"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ellie Prosser","raw_affiliation_strings":["University of Bristol, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003587835","display_name":"Matthew Edwards","orcid":"https://orcid.org/0000-0001-8099-0646"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Matthew Edwards","raw_affiliation_strings":["University of Bristol, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5094185873"],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":null,"apc_paid":null,"fwci":2.0285,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88184603,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10557","display_name":"Social Media and Politics","score":0.9445000290870667,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.7020596861839294},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6481056213378906},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5533249974250793},{"id":"https://openalex.org/keywords/generative-grammar","display_name":"Generative grammar","score":0.48936933279037476},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3740086555480957},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.36875149607658386},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13464030623435974}],"concepts":[{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.7020596861839294},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6481056213378906},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5533249974250793},{"id":"https://openalex.org/C39890363","wikidata":"https://www.wikidata.org/wiki/Q36108","display_name":"Generative grammar","level":2,"score":0.48936933279037476},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3740086555480957},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.36875149607658386},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13464030623435974},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3655693.3655694","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3655693.3655694","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3655693.3655694","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"European Interdisciplinary Cybersecurity Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3655693.3655694","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3655693.3655694","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3655693.3655694","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"European Interdisciplinary Cybersecurity Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4399332763.pdf"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1967022892","https://openalex.org/W2113109652","https://openalex.org/W2136583886","https://openalex.org/W2484944616","https://openalex.org/W2529427724","https://openalex.org/W2588759517","https://openalex.org/W3011574394","https://openalex.org/W3088409176","https://openalex.org/W3185341429","https://openalex.org/W3199400376","https://openalex.org/W3200209840","https://openalex.org/W4210403989","https://openalex.org/W4225095645","https://openalex.org/W4225165463","https://openalex.org/W4323037544","https://openalex.org/W4366249120","https://openalex.org/W4366548330","https://openalex.org/W4382246105","https://openalex.org/W4385570036","https://openalex.org/W4386867830","https://openalex.org/W4387801427","https://openalex.org/W6778883912"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2380075625","https://openalex.org/W4390718435","https://openalex.org/W4390549206","https://openalex.org/W2931662336","https://openalex.org/W3137171911","https://openalex.org/W2077865380","https://openalex.org/W4379540039","https://openalex.org/W4401768695"],"abstract_inverted_index":{"Powerful":[0],"generative":[1],"Large":[2],"Language":[3],"Models":[4],"(LLMs)":[5],"are":[6,18],"becoming":[7],"popular":[8],"tools":[9],"amongst":[10],"the":[11,41,63,83,95],"general":[12],"public":[13],"as":[14,25,55],"question-answering":[15],"systems,":[16],"and":[17,76,82,98,128,141,150],"being":[19],"utilised":[20],"by":[21,93],"vulnerable":[22],"groups":[23],"such":[24,54],"children.":[26],"With":[27],"children":[28],"increasingly":[29],"interacting":[30],"with":[31,120,162],"these":[32],"tools,":[33],"it":[34],"is":[35,71,91],"imperative":[36],"for":[37,46,67,74,116,130,148],"researchers":[38],"to":[39,51,168],"scrutinise":[40],"safety":[42,58],"of":[43,65,85,124],"LLMs,":[44],"especially":[45,134],"applications":[47],"that":[48,110,154,164],"could":[49],"lead":[50],"serious":[52],"outcomes,":[53],"online":[56,68,117],"child":[57],"queries.":[59],"In":[60,101],"this":[61],"paper,":[62],"efficacy":[64],"LLMs":[66],"grooming":[69,78,118],"prevention":[70],"explored":[72],"both":[73],"identifying":[75],"avoiding":[77],"through":[79],"advice":[80],"generation,":[81,133],"impact":[84],"prompt":[86,99,152],"design":[87],"on":[88],"model":[89,157],"performance":[90,158],"investigated":[92],"varying":[94],"provided":[96],"context":[97],"specificity.":[100],"results":[102],"reflecting":[103],"over":[104],"6,000":[105],"LLM":[106],"interactions,":[107],"we":[108],"find":[109],"no":[111],"models":[112,143],"were":[113],"clearly":[114],"appropriate":[115],"prevention,":[119],"an":[121],"observed":[122],"lack":[123],"consistency":[125],"in":[126,159],"behaviours,":[127],"potential":[129],"harmful":[131],"answer":[132],"from":[135],"open-source":[136],"models.":[137],"We":[138],"outline":[139],"where":[140],"how":[142],"fall":[144],"short,":[145],"providing":[146],"suggestions":[147],"improvement,":[149],"identify":[151],"designs":[153],"heavily":[155],"altered":[156],"troubling":[160],"ways,":[161],"findings":[163],"can":[165],"be":[166],"used":[167],"inform":[169],"best":[170],"practice":[171],"usage":[172],"guides.":[173]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
