Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[KNJIGA][B] Cybercrime in progress: Theory and prevention of technology-enabled offenses
The emergence of the World Wide Web, smartphones, and computers has transformed the
world and enabled individuals to engage in crimes in a multitude of new ways …
world and enabled individuals to engage in crimes in a multitude of new ways …
Hate in the machine: Anti-Black and Anti-Muslim social media posts as predictors of offline racially and religiously aggravated crime
National governments now recognize online hate speech as a pernicious social problem. In
the wake of political votes and terror attacks, hate incidents online and offline are known to …
the wake of political votes and terror attacks, hate incidents online and offline are known to …
Towards an ethical framework for publishing Twitter data in social research: Taking into account users' views, online context and algorithmic estimation
New and emerging forms of data, including posts harvested from social media sites such as
Twitter, have become part of the sociologist's data diet. In particular, some researchers see …
Twitter, have become part of the sociologist's data diet. In particular, some researchers see …
Cyber hate speech on twitter: An application of machine classification and statistical modeling for policy and decision making
The use of “Big Data” in policy and decision making is a current topic of debate. The 2013
murder of Drummer Lee Rigby in Woolwich, London, UK led to an extensive public reaction …
murder of Drummer Lee Rigby in Woolwich, London, UK led to an extensive public reaction …
Digital forensics challenges and readiness for 6G Internet of Things (IoT) networks
AO Akinbi - Wiley Interdisciplinary Reviews: Forensic Science, 2023 - Wiley Online Library
The development of sixth‐generation (6G) wireless communication technology is expected
to provide super high‐speed data transmission, and advanced network performance than …
to provide super high‐speed data transmission, and advanced network performance than …
Embodied harms: Gender, shame, and technology-facilitated sexual violence
Criminality in cyberspace has been the subject of much debate since the 1990s, yet
comparatively little attention has been paid to technology-facilitated sexual violence and …
comparatively little attention has been paid to technology-facilitated sexual violence and …
Who tweets? Deriving the demographic characteristics of age, occupation and social class from Twitter user meta-data
This paper specifies, designs and critically evaluates two tools for the automated
identification of demographic data (age, occupation and social class) from the profile …
identification of demographic data (age, occupation and social class) from the profile …
[KNJIGA][B] Ethnography: Principles in practice
M Hammersley, P Atkinson - 2019 - taylorfrancis.com
Now in its fourth edition, this leading introduction to ethnography has been thoroughly
updated and substantially rewritten. The volume offers a systematic introduction to …
updated and substantially rewritten. The volume offers a systematic introduction to …
Online abuse of feminists as an emerging form of violence against women and girls
R Lewis, M Rowe, C Wiper - British journal of criminology, 2017 - academic.oup.com
Abuse directed at visible and audible women demonstrates that cyberspace, once heralded
as a new, democratic, public sphere, suffers similar gender inequalities as the offline world …
as a new, democratic, public sphere, suffers similar gender inequalities as the offline world …
Cyberhate on social media in the aftermath of Woolwich: A case study in computational criminology and big data
This paper presents the first criminological analysis of an online social reaction to a crime
event of national significance, in particular the detection and propagation of cyberhate on …
event of national significance, in particular the detection and propagation of cyberhate on …