Yahoo fights hate speech with abuse algorithm
The automated process can identify abuse in 90 per cent of cases
Yahoo has developed an algorithm that can detect if people are using hate speech online and in tests, which has been able to detect abuse in 90 per cent of cases in tests.
The algorithm is built upon machine learning technologies and crowdsourced abuse detection, analysing parameters such as comment length, number of insult words and punctuation on thousands of articles on Yahoo News and Finance to work out what can be classed as abusive.
Trained abuse-hunter humans also analysed these same pages, inputting them into the database and further training the algorithm to pick up what is classed as abuse.
The third aspect was using Amazon's Mechanical Turk website, which allows companies to pay people to use their own human intelligence to sort out which comments were classed as abusive and which weren't. Yahoo paid each member who wanted to identify abusive/non abusive comments $0.02 for each comment they categorised.
However, this second group of humans was much less successful at identifying the abusive comments, Yahoo said, which demonstrated people need to be trained to work out which comments were classed as hate speech and which were not.
Nonetheless, merging these processes managed to uncover the majority of abusive comments on the sites, making it one of the most accurate uses of machine learning to date.
Now Yahoo is releasing the database of hate speech to the wider world, hoping to stop the problem spreading.
However, Yahoo explained it has not tested the technology outside of its own sites, but it still represents a significant step forward in the field of natural language processing.
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now