Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

San Jose State University

2011

Cyber-networks

Articles 1 - 2 of 2

Full-Text Articles in Social and Behavioral Sciences

Finding The Key Players In Online Child Exploitation Networks, Bryce Westlake, Martin Bouchard, Richard Frank May 2011

Finding The Key Players In Online Child Exploitation Networks, Bryce Westlake, Martin Bouchard, Richard Frank

Faculty Publications

The growth of the Internet has been paralleled with a similar growth in online child exploitation. Since completely shutting down child exploitation websites is difficult (or arguably impossible), the goal must be to find the most efficient way of identifying the key targets and then to apprehend them. Traditionally, online investigations have been manual and centered on images. However, we argue that target prioritization needs to take more than just images into consideration, and that the investigating process needs to become more systematic. Drawing from a web crawler we specifically designed for extracting child exploitation website networks, this study 1) …


Finding The Key Players In Online Child Exploitation Networks, Bryce Westlake, Martin Bouchard, Richard Frank May 2011

Finding The Key Players In Online Child Exploitation Networks, Bryce Westlake, Martin Bouchard, Richard Frank

Bryce Garreth Westlake

The growth of the Internet has been paralleled with a similar growth in online child exploitation. Since completely shutting down child exploitation websites is difficult (or arguably impossible), the goal must be to find the most efficient way of identifying the key targets and then to apprehend them. Traditionally, online investigations have been manual and centered on images. However, we argue that target prioritization needs to take more than just images into consideration, and that the investigating process needs to become more systematic. Drawing from a web crawler we specifically designed for extracting child exploitation website networks, this study 1) …