Nothing Special   »   [go: up one dir, main page]

Spencer, 2023 - Google Patents

THE CHALLENGES FACING LAW ENFORCEMENT IN LIVE-STREAMED CHILD SEXUAL ABUSE CASES

Spencer, 2023

View PDF
Document ID
6856143246089406767
Author
Spencer D
Publication year

External Links

Snippet

THE CHALLENGES FACING LAW ENFORCEMENT IN LIVE- STREAMED CHILD SEXUAL ABUSE CASES Page 1 THE CHALLENGES FACING LAW ENFORCEMENT IN LIVE- STREAMED CHILD SEXUAL ABUSE CASES by Daniel Spencer A Thesis Submitted to the …
Continue reading at hammer.purdue.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/22Tracking the activity of the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services

Similar Documents

Publication Publication Date Title
Rathore et al. Social network security: Issues, challenges, threats, and solutions
Broadhurst Child sex abuse images and exploitation materials
Wortley et al. Internet child pornography: Causes, investigation, and prevention
Cohen‐Almagor Online child sex offenders: Challenges and counter‐measures
Rawat et al. Applications of social network analysis to managing the investigation of suspicious activities in social media platforms
Schell et al. Cyber child pornography: A review paper of the social and legal issues and remedies—and a proposed technological solution
Balfe et al. Internet child sex offenders' concerns about online security and their use of identity protection technologies: a review
Westlake The past, present, and future of online child sexual exploitation: Summarizing the evolution of production, distribution, and detection
Law Commission Abusive and offensive online communications: A scoping report
Marcum et al. Social networking as a criminal enterprise
Bartlett et al. State of the Art: A Literature Review of Social Media Intelligence Capabilities for Counter-terrorism
Henry Beyond free speech: novel approaches to hate on the Internet in the United States
Dushi The phenomenon of online live-streaming of child sexual abuse: Challenges and legal responses
Karabiyik et al. A survey of social network forensics
Smyth The new social media paradox: A symbol of self-determination or a boon for big brother?
Spencer THE CHALLENGES FACING LAW ENFORCEMENT IN LIVE-STREAMED CHILD SEXUAL ABUSE CASES
Spicer Cybercriminal profiling
Draper Protecting Children in the Age of End-to-End Encryption
Shelton The Role of Corporate and Government Surveillance in Shifting Journalistic Information Security Practices
Bidgoli A Mixed Methods approach to understanding undergraduate Students' victimization, perceptions, and reporting of cybercrimes
Yu Social Media Intelligence: AI Applications for Criminal Investigation and National Security
Brewer et al. Designing and evaluating crime prevention solutions for the digital age
Dillard Privacy and security implications of undergraduate students using Facebook: A quantitative examination
Duncan Assessing the use of Social Media in a Revolutionary Environment
Sodhi Social Media Law & Cybercrime