Comparing Methods for Detecting Child Exploitation Content Online

The sexual exploitation of children online is seen as a global issue and has been addressed by both governments and private organizations. Efforts thus far have focused primarily on the use of image hash value databases to find content. However, recently researchers have begun to use keywords as a w...

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
1. VerfasserIn: Bouchard, Martin (VerfasserIn)
Beteiligte: Westlake, Bryce ; Frank, Richard
Medienart: Elektronisch Buch
Sprache:Englisch
Veröffentlicht: 2012
In:Jahr: 2012
Online-Zugang: Volltext (kostenfrei)
Volltext (kostenfrei)
Verfügbarkeit prüfen: HBZ Gateway
Schlagwörter:

MARC

LEADER 00000cam a22000002c 4500
001 1866155598
003 DE-627
005 20250122054859.0
007 cr uuu---uuuuu
008 231018s2012 xx |||||o 00| ||eng c
024 7 |a 10.1109/eisic.2012.25  |2 doi 
035 |a (DE-627)1866155598 
035 |a (DE-599)KXP1866155598 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Bouchard, Martin  |e VerfasserIn  |4 aut 
109 |a Bouchard, Martin 
245 1 0 |a Comparing Methods for Detecting Child Exploitation Content Online 
264 1 |c 2012 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a The sexual exploitation of children online is seen as a global issue and has been addressed by both governments and private organizations. Efforts thus far have focused primarily on the use of image hash value databases to find content. However, recently researchers have begun to use keywords as a way to detect child exploitation content. Within the current study we explore both of these methodologies. Using a custom designed web-crawler, we create three networks using the hash value method, keywords method, and a hybrid method combining the first two. Results first show that the three million images found in our hash value database were not common enough on public websites for the hash value method to produce meaningful result. Second, the small sample of websites that were found to contain those images had little to no videos posted, suggesting a need for different criteria for finding each type of material. Third, websites with code words commonly known to be used by child pornographers to identify or discuss exploitative content, were found to be much larger than others, with extensive visual and textual content. Finally, boy-centered keywords were more commonly found on child exploitation websites than girl-centered keywords, though not at a statistically significant level. Applications for law enforcement and areas for future research are discussed 
650 4 |a Computer Science 
700 1 |a Westlake, Bryce  |e VerfasserIn  |4 aut 
700 1 |a Frank, Richard  |e VerfasserIn  |4 aut 
856 4 0 |u https://core.ac.uk/download/70422059.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
856 4 0 |u https://doi.org/10.1109/eisic.2012.25  |x Resolving-System  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4391836351 
LOK |0 003 DE-627 
LOK |0 004 1866155598 
LOK |0 005 20231018043723 
LOK |0 008 231018||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE9452675 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw