A systematic survey of online data mining technology intended for law enforcement

M Edwards, A Rashid, P Rayson - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
As an increasing amount of crime takes on a digital aspect, law enforcement bodies must
tackle an online environment generating huge volumes of data. With manual inspections …

A crime script analysis of child sexual exploitation material fora on the darkweb

M Van Der Bruggen, A Blokland - Sexual Abuse, 2021 - journals.sagepub.com
This study's aim is to contribute to the knowledge on the steps involved in child sexual
exploitation material (CSEM) crimes committed in Darkweb CSEM communities. Due to the …

A social network analysis and comparison of six dark web forums

I Pete, J Hughes, YT Chua… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
With increasing monitoring and regulation by platforms, communities with criminal interests
are moving to the dark web, which hosts content ranging from whistle-blowing and privacy …

Characterizing pedophile conversations on the internet using online grooming

A Gupta, P Kumaraguru, A Sureka - arXiv preprint arXiv:1208.4324, 2012 - arxiv.org
Cyber-crime targeting children such as online pedophile activity are a major and a growing
concern to society. A deep understanding of predatory chat conversations on the Internet …

The past, present, and future of online child sexual exploitation: Summarizing the evolution of production, distribution, and detection

BG Westlake - The Palgrave handbook of international cybercrime …, 2020 - Springer
The sexual exploitation of children has long been a component of society. With the advent of
the Internet, along with advancements of, and accessibility to, media-recording devices …

Liking and hyperlinking: Community detection in online child sexual exploitation networks

BG Westlake, M Bouchard - Social science research, 2016 - Elsevier
The online sexual exploitation of children is facilitated by websites that form virtual
communities, via hyperlinks, to distribute images, videos, and other material. However, how …

Searching for extremist content online using the dark crawler and sentiment analysis

R Scrivens, T Gaudette, G Davies… - Methods of criminology …, 2019 - emerald.com
Purpose–This chapter examines how sentiment analysis and web-crawling technology can
be used to conduct large-scale data analyses of extremist content online. Methods/approach …

Understanding Dark Web: A Systematic Literature Review

TM Abdellatif, RA Said… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
Web evolution and Web 2.0 social media tools facilitate communication and support the
online economy. On the other hand, these tools are actively used by extremist, terrorist and …

[图书][B] Dealing with change through information sculpting

I Ruthven - 2022 - emerald.com
Abdelrahman, OH (2016). Use of library technology and services by the visually impaired
and the blind in the University of Khartoum, Sudan. DESIDOC Journal of Library & …

Finding the key players in online child exploitation networks

BG Westlake, M Bouchard, R Frank - Policy & Internet, 2011 - Wiley Online Library
The growth of the Internet has been paralleled with a similar growth in online child
exploitation. Since completely shutting down child exploitation websites is difficult (or …