Shallow Knowledge as an Aid to Deep Understanding in Early Phase Requirements Engineering
IEEE Transactions on Software Engineering
Peer-to-Peer: Is Deviant Behavior the Norm on P2P File-Sharing Networks?
IEEE Distributed Systems Online
A Data Mining Approach Based on Grey Prediction Model in Web Environment
SKG '06 Proceedings of the Second International Conference on Semantics, Knowledge, and Grid
On the Penetration of Business Networks by P2P File Sharing
ICIMP '07 Proceedings of the Second International Conference on Internet Monitoring and Protection
Comparing corpora using frequency profiling
CompareCorpora '00 Proceedings of the Workshop on Comparing Corpora
Computational Forensics: An Overview
IWCF '08 Proceedings of the 2nd international workshop on Computational Forensics
Learning to Identify Internet Sexual Predation
International Journal of Electronic Commerce
Quantifying paedophile activity in a large P2P system
Information Processing and Management: an International Journal
The emotional wellbeing of researchers: considerations for practice
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Measurement and analysis of child pornography trafficking on P2P networks
Proceedings of the 22nd international conference on World Wide Web
Hi-index | 0.00 |
Recent years have seen an explosion in the number and scale of digital communities (e.g. peer-to-peer file sharing systems, chat applications and social networking sites). Unfortunately, digital communities are host to significant criminal activity including copyright infringement, identity theft and child sexual abuse. Combating this growing level of crime is problematic due to the ever increasing scale of today's digital communities. This paper presents an approach to provide automated support for the detection of child sexual abuse related activities in digital communities. Specifically, we analyze the characteristics of child sexual abuse media distribution in P2P file sharing networks and carry out an exploratory study to show that corpus-based natural language analysis may be used to automate the detection of this activity. We then give an overview of how this approach can be extended to police chat and social networking communities.