YoVDO

Content-Oblivious Trust and Safety Techniques - Survey Results from Online Service Providers

Offered By: USENIX Enigma Conference via YouTube

Tags

Online Safety Courses Cybersecurity Courses End-to-End Encryption Courses Child Protection Courses Content Moderation Courses Metadata Analysis Courses

Course Description

Overview

Explore the findings of a survey on trust and safety techniques employed by major online service providers in this 20-minute conference talk from USENIX Enigma 2022. Delve into the distinction between content-dependent and content-oblivious techniques for policing harmful online content. Learn about the prevalence and effectiveness of various methods, including abuse-reporting features, metadata-based tools, and automated content scanning systems. Discover insights on the varying utility of these techniques across different types of online abuse, particularly in detecting child sex abuse imagery. Examine the implications of these findings for policy debates surrounding online service providers' anti-abuse obligations and the use of end-to-end encryption. Gain valuable perspective on the challenges and complexities of maintaining trust and safety in online environments serving billions of users.

Syllabus

USENIX Enigma 2022 - Content-Oblivious Trust and Safety Techniques: Results from a Survey of Online


Taught by

USENIX Enigma Conference

Related Courses

Convolutions for Text Classification with Keras
Coursera Project Network via Coursera
How Technology is Shaping Democracy and the 2020 Election
Stanford University via Coursera
Microsoft Azure Cognitive Services: Content Moderator
Pluralsight
Machine Learning and Microsoft Cognitive Services
Pluralsight
Deep Dive on Amazon Rekognition: Building Computer Visions Based Smart Applications (Italian)
Amazon Web Services via AWS Skill Builder