Challenges of automating the detection of paedophile activity on the Internet
Penna, Lyta, Clark, Andrew J., & Mohay, George M. (2005) Challenges of automating the detection of paedophile activity on the Internet. In The First International Workshop on Systematic Approaches to Digital Forensic Engineering, 7-9 November 2005, Taipei, Taiwan.
This review paper outlines the need for research into the process of automating the detection of paedophile activities on the Internet and identifies the associated challenges of the research area. The paper overviews and analyses technologies associated with the use of the Internet by paedophiles in terms of event information that each technology potentially provides. It also reviews the anonymity challenges presented by these technologies. The paper presents methods for currently uncharted research that would aid in the process of automating the detection of paedophile activities on the Internet.
Citation countsare sourced monthly fromand citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloadsdisplays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Conference Paper|
|Keywords:||paedophile detection, online safety, chat-room security, digital forensics|
|Subjects:||Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer System Security (080303)|
|Divisions:||Past > QUT Faculties & Divisions > Faculty of Science and Technology|
Past > Institutes > Information Security Institute
|Copyright Owner:||Copyright 2005 IEEE Computer Society|
|Copyright Statement:||Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.|
|Deposited On:||02 Jun 2009 14:26|
|Last Modified:||29 Feb 2012 23:13|
Repository Staff Only: item control page