Nothing Special   »   [go: up one dir, main page]

Marcum et al., 2014 - Google Patents

Social networking as a criminal enterprise

Marcum et al., 2014

Document ID
1302244839837832781
Author
Marcum C
Higgins G
Publication year

External Links

Snippet

As social networking continues to evolve and expand, the opportunities for deviant and criminal behavior have multiplied. Social Networking as a Criminal Enterprise explores how new avenues for social networking criminality have affected our criminal justice system. With …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30716Browsing or visualization
    • G06F17/30719Summarization for human users
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • G06F17/30657Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/30707Clustering or classification into predefined classes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/27Automatic analysis, e.g. parsing
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B19/00Teaching not covered by other main groups of this subclass
    • G09B19/06Foreign languages
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B7/00Electrically-operated teaching apparatus or devices working with questions and answers
    • G09B7/02Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B5/00Electrically-operated educational appliances
    • G09B5/02Electrically-operated educational appliances with visual presentation of the material to be studied, e.g. using film strip

Similar Documents

Publication Publication Date Title
Musto Control and protect: Collaboration, carceral protection, and domestic sex trafficking in the United States
Kirwan et al. Cybercrime: The psychology of online offenders
Steele et al. Cyber crime investigations: Bridging the gaps between security professionals, law enforcement, and prosecutors
Ghernaouti-Helie Cyber power: Crime, conflict and security in cyberspace
Stewart et al. Social media and the law: A guidebook for communication students and professionals
Appel Cybervetting: Internet searches for vetting, investigations, and open-source intelligence
Gragido et al. Cybercrime and espionage: An analysis of subversive multi-vector threats
Granick American spies: Modern surveillance, why you should care, and what to do about it
Marcum et al. Social networking as a criminal enterprise
Oxley A best practices guide for mitigating risk in the use of social media
Bossler Contributions of criminological theory to the understanding of cybercrime offending and victimization
Schreider Cybersecurity law, standards and regulations
Grabowski et al. Cyber law and ethics: regulation of the connected world
Bowker The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century
Shimonski Cyber reconnaissance, surveillance and defense
Smith How to protect your children on the internet: A road map for parents and teachers
Schell The internet and society: A reference handbook
Tambe Ebot Explaining two forms of internet crime from two perspectives: toward stage theories for phishing and internet scamming
Chon Cybercrime precursors: towards a model of offender resources
Thierer Social networking and age verification: Many hard questions; no easy solutions
Sirohi Transformational Dimensions of Cyber Crime
Ziccardi et al. Digital activism, Internet control, transparency, censorship, surveillance and human rights: An international perspective
Ozkaya Cyber Security Challenges in Social Media
AlKaabi Strategic framework to minimise information security risks in the UAE
Singh The Cybercrime Spectrum: Understanding Digital Threats and Security