Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Child sexual abuse and the internet—a systematic review
S Ali, HA Haykal, EYM Youssef - Human Arenas, 2023 - Springer
Child sexual abuse is a growing social concern. Today, online communication chiefly
facilitates access to vulnerable children and increases cases of child sexual abuse. The …
facilitates access to vulnerable children and increases cases of child sexual abuse. The …
An integrative review of historical technology and countermeasure usage trends in online child sexual exploitation material offenders
Abstract Starting with electronic Bulletin Board Systems (BBSs), Usenet and email, the
adoption and continued use of technology to facilitate the viewing and possession of child …
adoption and continued use of technology to facilitate the viewing and possession of child …
Rethinking the detection of child sexual abuse imagery on the internet
E Bursztein, E Clarke, M DeLaune, DM Elifff… - The world wide web …, 2019 - dl.acm.org
Over the last decade, the illegal distribution of child sexual abuse imagery (CSAI) has
transformed alongside the rise of online sharing platforms. In this paper, we present the first …
transformed alongside the rise of online sharing platforms. In this paper, we present the first …
Measuring a year of child pornography trafficking by US computers on a peer-to-peer network
J Wolak, M Liberatore, BN Levine - Child Abuse & Neglect, 2014 - Elsevier
We used data gathered via investigative “RoundUp” software to measure a year of online
child pornography (CP) trafficking activity by US computers on the Gnutella peer-to-peer …
child pornography (CP) trafficking activity by US computers on the Gnutella peer-to-peer …
Ethical tensions in applications of ai for addressing human trafficking: A human rights perspective
In the last two decades, human trafficking (where individuals are forcibly exploited for the
profits of another) has seen increased attention from the artificial intelligence (AI) community …
profits of another) has seen increased attention from the artificial intelligence (AI) community …
Lawless space theory for online child sexual exploitation material offending
Deterrence, treatment and legal response to online child sexual exploitation material
(CSEM) offenders is enhanced by the joint consideration of technological behaviours and …
(CSEM) offenders is enhanced by the joint consideration of technological behaviours and …
A systematic survey of online data mining technology intended for law enforcement
As an increasing amount of crime takes on a digital aspect, law enforcement bodies must
tackle an online environment generating huge volumes of data. With manual inspections …
tackle an online environment generating huge volumes of data. With manual inspections …
Liking and hyperlinking: Community detection in online child sexual exploitation networks
BG Westlake, M Bouchard - Social science research, 2016 - Elsevier
The online sexual exploitation of children is facilitated by websites that form virtual
communities, via hyperlinks, to distribute images, videos, and other material. However, how …
communities, via hyperlinks, to distribute images, videos, and other material. However, how …
[HTML][HTML] iCOP: Live forensics to reveal previously unknown criminal media on P2P networks
The increasing levels of criminal media being shared in peer-to-peer (P2P) networks pose a
significant challenge to law enforcement agencies. One of the main priorities for P2P …
significant challenge to law enforcement agencies. One of the main priorities for P2P …
Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks
We provide detailed measurement of the illegal trade in child exploitation material (CEM,
also known as child pornography) from mid-2011 through 2014 on five popular peer-to-peer …
also known as child pornography) from mid-2011 through 2014 on five popular peer-to-peer …