Spencer, 2023 - Google Patents
THE CHALLENGES FACING LAW ENFORCEMENT IN LIVE-STREAMED CHILD SEXUAL ABUSE CASESSpencer, 2023
View PDF- Document ID
- 6856143246089406767
- Author
- Spencer D
- Publication year
External Links
Snippet
THE CHALLENGES FACING LAW ENFORCEMENT IN LIVE- STREAMED CHILD SEXUAL
ABUSE CASES Page 1 THE CHALLENGES FACING LAW ENFORCEMENT IN LIVE-
STREAMED CHILD SEXUAL ABUSE CASES by Daniel Spencer A Thesis Submitted to the …
- 230000001568 sexual effect 0 title description 184
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rathore et al. | Social network security: Issues, challenges, threats, and solutions | |
Broadhurst | Child sex abuse images and exploitation materials | |
Wortley et al. | Internet child pornography: Causes, investigation, and prevention | |
Cohen‐Almagor | Online child sex offenders: Challenges and counter‐measures | |
Rawat et al. | Applications of social network analysis to managing the investigation of suspicious activities in social media platforms | |
Schell et al. | Cyber child pornography: A review paper of the social and legal issues and remedies—and a proposed technological solution | |
Balfe et al. | Internet child sex offenders' concerns about online security and their use of identity protection technologies: a review | |
Westlake | The past, present, and future of online child sexual exploitation: Summarizing the evolution of production, distribution, and detection | |
Law Commission | Abusive and offensive online communications: A scoping report | |
Marcum et al. | Social networking as a criminal enterprise | |
Bartlett et al. | State of the Art: A Literature Review of Social Media Intelligence Capabilities for Counter-terrorism | |
Henry | Beyond free speech: novel approaches to hate on the Internet in the United States | |
Dushi | The phenomenon of online live-streaming of child sexual abuse: Challenges and legal responses | |
Karabiyik et al. | A survey of social network forensics | |
Smyth | The new social media paradox: A symbol of self-determination or a boon for big brother? | |
Spencer | THE CHALLENGES FACING LAW ENFORCEMENT IN LIVE-STREAMED CHILD SEXUAL ABUSE CASES | |
Spicer | Cybercriminal profiling | |
Draper | Protecting Children in the Age of End-to-End Encryption | |
Shelton | The Role of Corporate and Government Surveillance in Shifting Journalistic Information Security Practices | |
Bidgoli | A Mixed Methods approach to understanding undergraduate Students' victimization, perceptions, and reporting of cybercrimes | |
Yu | Social Media Intelligence: AI Applications for Criminal Investigation and National Security | |
Brewer et al. | Designing and evaluating crime prevention solutions for the digital age | |
Dillard | Privacy and security implications of undergraduate students using Facebook: A quantitative examination | |
Duncan | Assessing the use of Social Media in a Revolutionary Environment | |
Sodhi | Social Media Law & Cybercrime |