Preliminary Considerations on Artificial Intelligence and Democratic Cyber Safety for the Protection of Children
Copyright (c) 2026 Michael M. Losavio

This work is licensed under a Creative Commons Attribution 4.0 International License.
Abstract
Pervasive computing has abused information and communication technologies and created new kinds of systemic risks and societal vulnerabilities. With the rise of artificial intelligence, deep learning, machine learning, and pattern recognition systems, all those petabytes of information can be analysed and used to seriously interfere with the rights and liberties of others, and, in particular, it can be used to reveal the most intimate aspects of the lives of others. This, in turn, has offered new and unheard means of criminality, ranging from financial offenses to child exploitation. Therefore, there is a social responsibility for developing systems capable of mitigating the risks that the development of information and communications technologies poses to society. Given that this particular threat involves expression, efforts to mitigate expression-related misconduct must attend to rules that protect expression from government regulation. This article considers one particular area of expression-related misconduct, namely the online abuse of children.
Keywords:
How to Cite
References
Bennett, N. & O’Donohue, W. (2014). The Construct of Grooming in Child Sexual Abuse: Conceptual and Measurement Issues. Journal of Child Sexual Abuse, 23(8), 957–976. Online: https://doi.org/10.1080/10538712.2014.960632
Black, P. J., Wollis, M., Woodworth, M. & Hancock, J. T. (2015). A Linguistic Analysis of Grooming Strategies of Online Child Sex Offenders: Implications for Our Understanding of Predatory Sexual Behavior in an Increasingly Computer-Mediated World. Child Abuse & Neglect, 44, 140–149. Online: https://doi.org/10.1016/j.chiabu.2014.12.004
Cohen, L. E. & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44(4), 588–608. Online: https://doi.org/10.2307/2094589
Craven, S., Brown, S. & Gilchrist, E. (2006). Sexual Grooming of Children: Review of Literature and Theoretical Considerations. Journal of Sexual Aggression, 12(3), 287–299. Online: https://doi.org/10.1080/13552600601069414
Electronic Privacy Information Center (2026, March 25). Jury Finds Meta and Google Negligent in Landmark Social Media Addiction Case. Online: https://epic.org/jury-finds-meta-and-google-negligent-in-landmarksocial-media-addiction-case/
Federal Bureau of Investigation (2025, August 19). Staying One Step Ahead: How to Protect Kids from Emerging Online Threats. Online: https://www.fbi.gov/contact-us/field-offices/jacksonville/news/staying-onestep-ahead-how-to-protect-kids-from-emerging-online-threats
Fowler, M. J., Lybert, K. A., M.A., Owens, J. N., M.A. & Waterfield, J. M. (2020, August 6). Undercover Chatting with Child Sex Offenders. United States Federal Bureau of Investigation, Featured Articles. Online: https://leb.fbi.gov/articles/featured-articles/undercover-chatting-with-child-sex-offenders
Fu, Y., Peng, H., Ou, L., Sabharwal, A. & Khot, T. (2023). Specializing Smaller Language Models Towards Multi-Step Reasoning. Proceedings of the 40th International Conference on Machine Learning, PMLR 202, 10421–10430. Online: https://proceedings.mlr.press/v202/fu23d/fu23d.pdf
Kramer, J. (2024, November 5). Louisiana Signs $3M Deal for High-Tech Investigations. The Times-Picayune. Online: https://tinyurl.com/43bpjnr8
Kyrik, Kelly (2005). Trolling for Predators: More and More Law Enforcement Officers Are Actively Working the Internet to Track, Apprehend, and Prosecute Pedophiles. Police: The Law Enforcement Magazine, 29(10), 32–40.
Lorenzo-Dus, N., Kinzel, A. & Di Cristofaro, M. (2020). The Communicative Modus Operandi of Online Child Sexual Groomers: Recurring Patterns in their Language Use. Journal of Pragmatics, 155, 15–27. Online: https://doi.org/10.1016/j.pragma.2019.09.010
Mavali, S., Ricker, J., Pape, D., Fischer, A. & Schönherr, L. (2024). Fake It until You Break It: On the Adversarial Robustness of AI-generated Image Detectors. arXiv. Online: https://doi.org/10.48550/arXiv.2410.01574
Mulvaney, E. & Bobrowsky, M. (2026, March 24). Landmark Verdict Says Meta Harmed Children, Allowing Adults to Prey on Them. The Wall Street Journal. Online: https://www.wsj.com/tech/landmark-verdictsays-meta-harmed-children-allowing-adults-to-prey-on-them-cb3ad674
National Institute of Justice (2024, May 8). Unconventional Wisdom: Research Shakes up Assumptions About Sex Trafficking Clues in Online Escort Ads. Online: https://tinyurl.com/pakavj8x
O’Connell, R. (2020). Freedom of Expression. In Law, Democracy and the European Court of Human Rights (pp. 84–119). Cambridge University Press. Online: https://doi.org/10.1017/9781139547246.007
O’Keeffe, K. & McWhirter, C. (2023, September 17). New Orleans DA Fights “Terrorism” on Streets with AI Spycraft. The Wall Street Journal. Online: https://tinyurl.com/5xsv9khd
Petroff, A. (2018, April 5). Yes, Facebook Is Scanning Your Messages for Abuse. CNN Business. Online: https://tinyurl.com/4cbm6crj
Plaisance, S. (2024, November 18). Tulane Researchers Partner with Court Watch NOLA to Boost Criminal Justice Transparency. Tulane University of Science and Engineering. Online: https://tinyurl.com/54xwd4jk
Pollack, D. & MacIver, A. (2015). Understanding Sexual Grooming in Child Abuse Cases. Child Law Practice, 34(11), 166–168.
Sartain, M. (2024, June 24). Large Language Models (LLMs) vs. Small Language Models (SLMs). Rackspace Technology. Online: https://tinyurl.com/3cv6vk8s
Shackelford, S., Hiller, J., Makridis, C., Nash, I., Kisska-Schulze, K. & Travis, H. (2025). Moving Slow and Fixing Things. Indiana Law Journal, 100(4), 1611–1671. Online: https://www.repository.law.indiana.edu/ilj/vol100/iss4/8/
United States Federal Trade Commission (s. a.). Protecting Kids Online. Online: https://consumer.ftc.gov/identity-theft-and-online-security/protecting-kids-online
Wachs, S., Wolf, K. D. & Pan, C. (2012). Cybergrooming: Risk Factors, Coping Strategies and Associations with Cyberbullying. Psicothema, 24(4), 628–633. Online: https://www.psicothema.com/pdf/4064.pdf
Winters, G. M. & Jeglic, E. L. (2017). Stages of Sexual Grooming: Recognizing Potentially Predatory Behaviors of Child Molesters. Deviant Behavior, 38(6), 724–733. Online: https://doi.org/10.1080/01639625.2016.1197656