The sexual exploitation of children online is seen as a global issue and has been addressed by both governments and private organizations. Efforts thus far have focused primarily on the use of image hash value databases to find content. However, recently researchers have begun to use keywords as a way to detect child exploitation content. Within the current study we explore both of these methodologies. Using a custom designed web-crawler, we create three networks using the hash value method, keywords method, and a hybrid method combining the first two. Results first show that the three million images found in our hash value database were not common enough on public websites for the hash value method to produce meaningful result. Second, the...
© 2021, Association for Information Systems. All rights reserved. This paper deals with the difficul...
Abstract This article explores the variety of ways in which the Internet is used to facilitate the c...
Despite an increase in research on child abuse images and sex offender risk, we still lack specific ...
The sexual exploitation of children online is seen as a global issue and has been addressed by both ...
BackgroundAutomated detection of child sexual abuse images (CSAI) often relies on image attributes, ...
The emergence of the Internet has provided people with the ability to find and communicate with othe...
Before the introduction of the internet, the availability of child pornography was reported as on th...
The continued growth of child pornography distribution online has resulted in the need for new innov...
The distribution of child sexual exploitation (CE) material has been transformed by the emergence of...
The Internet has been one of the greatest man made achievements of the 20th century. It has revoluti...
Child sexual abuse material (CSAM) activities are prevalent on the Dark Web to evade detection, posi...
Publically accessible, illegal, websites represent an additional challenge for control agencies, but...
Online markets for child exploitation materials (CEM) or child sex abuse images have developed in ta...
Before the introduction of the internet, the availability of child pornography was reported as on th...
Digital evidence plays a crucial role in child pornography investigations. However, in the following...
© 2021, Association for Information Systems. All rights reserved. This paper deals with the difficul...
Abstract This article explores the variety of ways in which the Internet is used to facilitate the c...
Despite an increase in research on child abuse images and sex offender risk, we still lack specific ...
The sexual exploitation of children online is seen as a global issue and has been addressed by both ...
BackgroundAutomated detection of child sexual abuse images (CSAI) often relies on image attributes, ...
The emergence of the Internet has provided people with the ability to find and communicate with othe...
Before the introduction of the internet, the availability of child pornography was reported as on th...
The continued growth of child pornography distribution online has resulted in the need for new innov...
The distribution of child sexual exploitation (CE) material has been transformed by the emergence of...
The Internet has been one of the greatest man made achievements of the 20th century. It has revoluti...
Child sexual abuse material (CSAM) activities are prevalent on the Dark Web to evade detection, posi...
Publically accessible, illegal, websites represent an additional challenge for control agencies, but...
Online markets for child exploitation materials (CEM) or child sex abuse images have developed in ta...
Before the introduction of the internet, the availability of child pornography was reported as on th...
Digital evidence plays a crucial role in child pornography investigations. However, in the following...
© 2021, Association for Information Systems. All rights reserved. This paper deals with the difficul...
Abstract This article explores the variety of ways in which the Internet is used to facilitate the c...
Despite an increase in research on child abuse images and sex offender risk, we still lack specific ...