Detecting child sexual abuse material: A comprehensive survey

HE Lee, T Ermakova, V Ververis, B Fabian - Forensic Science International …, 2020 - Elsevier
Victims of child sexual abuse suffer from physical, psychological, and emotional trauma. The
detection and deletion of illicit online child sexual abuse material (CSAM) helps in reducing …

Even “lurkers” download: the behavior and illegal activities of members on a child sexual exploitation TOR hidden service

M van der Bruggen, I van Balen… - Aggression and violent …, 2022 - Elsevier
Abstract Knowledge about online child sexual exploitation (CSE) offenders mostly remains
limited to offender populations known by the criminal justice system. Because of its hidden …

Harvesting and analysis of weak signals for detecting lone wolf terrorists

J Brynielsson, A Horndahl, F Johansson, L Kaati… - Security …, 2013 - Springer
Abstract Lone wolf terrorists pose a large threat to modern society. The current ability to
identify and stop these kinds of terrorists before they commit a terror act is limited since they …

The past, present, and future of online child sexual exploitation: Summarizing the evolution of production, distribution, and detection

BG Westlake - The Palgrave handbook of international cybercrime …, 2020 - Springer
The sexual exploitation of children has long been a component of society. With the advent of
the Internet, along with advancements of, and accessibility to, media-recording devices …

The ethics of web crawling and web scraping in cybercrime research: Navigating issues of consent, privacy, and other potential harms associated with automated data …

R Brewer, B Westlake, T Hart, O Arauza - … : methodologies, ethics, and …, 2021 - Springer
The abundance of data easily accessible on the internet has made it an appealing domain
for conducting social science research. Because of the volume of data available, automated …

[HTML][HTML] iCOP: Live forensics to reveal previously unknown criminal media on P2P networks

C Peersman, C Schulze, A Rashid, M Brennan… - Digital …, 2016 - Elsevier
The increasing levels of criminal media being shared in peer-to-peer (P2P) networks pose a
significant challenge to law enforcement agencies. One of the main priorities for P2P …

Searching for extremist content online using the dark crawler and sentiment analysis

R Scrivens, T Gaudette, G Davies… - Methods of criminology …, 2019 - emerald.com
Purpose–This chapter examines how sentiment analysis and web-crawling technology can
be used to conduct large-scale data analyses of extremist content online. Methods/approach …

Analysis of weak signals for detecting lone wolf terrorists

J Brynielsson, A Horndahl, F Johansson… - 2012 European …, 2012 - ieeexplore.ieee.org
Lone wolf terrorists pose a large threat to modern society. The current ability to identify and
stop these kind of terrorists before they commit a terror act is limited since they are very hard …

Assessing the validity of automated webcrawlers as data collection tools to investigate online child sexual exploitation

B Westlake, M Bouchard, R Frank - Sexual Abuse, 2017 - journals.sagepub.com
The distribution of child sexual exploitation (CE) material has been aided by the growth of
the Internet. The graphic nature and prevalence of the material has made researching and …

Comparing methods for detecting child exploitation content online

B Westlake, M Bouchard, R Frank - … European intelligence and …, 2012 - ieeexplore.ieee.org
The sexual exploitation of children online is seen as a global issue and has been addressed
by both governments and private organizations. Efforts thus far have focused primarily on …