Marcum et al., 2014 - Google Patents
Social networking as a criminal enterpriseMarcum et al., 2014
- Document ID
- 1302244839837832781
- Author
- Marcum C
- Higgins G
- Publication year
External Links
Snippet
As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With …
- 230000001568 sexual 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30716—Browsing or visualization
- G06F17/30719—Summarization for human users
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
- G06F17/30657—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/30707—Clustering or classification into predefined classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B19/00—Teaching not covered by other main groups of this subclass
- G09B19/06—Foreign languages
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B7/00—Electrically-operated teaching apparatus or devices working with questions and answers
- G09B7/02—Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
- G06Q50/205—Education administration or guidance
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B5/00—Electrically-operated educational appliances
- G09B5/02—Electrically-operated educational appliances with visual presentation of the material to be studied, e.g. using film strip
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Musto | Control and protect: Collaboration, carceral protection, and domestic sex trafficking in the United States | |
Kirwan et al. | Cybercrime: The psychology of online offenders | |
Steele et al. | Cyber crime investigations: Bridging the gaps between security professionals, law enforcement, and prosecutors | |
Ghernaouti-Helie | Cyber power: Crime, conflict and security in cyberspace | |
Stewart et al. | Social media and the law: A guidebook for communication students and professionals | |
Appel | Cybervetting: Internet searches for vetting, investigations, and open-source intelligence | |
Gragido et al. | Cybercrime and espionage: An analysis of subversive multi-vector threats | |
Granick | American spies: Modern surveillance, why you should care, and what to do about it | |
Marcum et al. | Social networking as a criminal enterprise | |
Oxley | A best practices guide for mitigating risk in the use of social media | |
Bossler | Contributions of criminological theory to the understanding of cybercrime offending and victimization | |
Schreider | Cybersecurity law, standards and regulations | |
Grabowski et al. | Cyber law and ethics: regulation of the connected world | |
Bowker | The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century | |
Shimonski | Cyber reconnaissance, surveillance and defense | |
Smith | How to protect your children on the internet: A road map for parents and teachers | |
Schell | The internet and society: A reference handbook | |
Tambe Ebot | Explaining two forms of internet crime from two perspectives: toward stage theories for phishing and internet scamming | |
Chon | Cybercrime precursors: towards a model of offender resources | |
Thierer | Social networking and age verification: Many hard questions; no easy solutions | |
Sirohi | Transformational Dimensions of Cyber Crime | |
Ziccardi et al. | Digital activism, Internet control, transparency, censorship, surveillance and human rights: An international perspective | |
Ozkaya | Cyber Security Challenges in Social Media | |
AlKaabi | Strategic framework to minimise information security risks in the UAE | |
Singh | The Cybercrime Spectrum: Understanding Digital Threats and Security |