Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Social and Behavioral Sciences
Ethical Considerations In Web 2.0 Archives, Antoinette E. Baker
Ethical Considerations In Web 2.0 Archives, Antoinette E. Baker
School of Information Student Research Journal
In April 2010, the Internet company Twitter announced that it had granted its entire archive of “Tweets” to the Library of Congress. These Tweets are typically generated by public users, who may or may not understand or expect that their submissions will be archived by a government agency. Archives of Web 2.0 material raise new ethical considerations for archivists, who must balance interests in preserving material with privacy interests of users who generated the content. Archivists can address these concerns by requiring corporate donors to fully disclose the nature of the archive to users and by allowing users to opt-out …
Strategies To Disrupt Online Child Pornography Networks, Kila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake
Strategies To Disrupt Online Child Pornography Networks, Kila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake
Bryce Garreth Westlake
This paper seeks to determine which attack strategies (hub, bridge, or fragmentation) are most effective at disrupting two online child pornography networks in terms of outcome measures that include density, clustering, compactness, and average path length. For this purpose, two networks were extracted using a web-crawler that recursively follows child exploitation sites. It was found that different attack strategies were warranted depending on the outcome measure and the network structure. Overall, hub attacks were most effective at reducing network density and clustering, whereas fragmentation attacks were most effective at reducing the network's distance-based cohesion and average path length. In certain …
Strategies To Disrupt Online Child Pornography Networks, Kila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake
Strategies To Disrupt Online Child Pornography Networks, Kila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake
Faculty Publications
This paper seeks to determine which attack strategies (hub, bridge, or fragmentation) are most effective at disrupting two online child pornography networks in terms of outcome measures that include density, clustering, compactness, and average path length. For this purpose, two networks were extracted using a web-crawler that recursively follows child exploitation sites. It was found that different attack strategies were warranted depending on the outcome measure and the network structure. Overall, hub attacks were most effective at reducing network density and clustering, whereas fragmentation attacks were most effective at reducing the network's distance-based cohesion and average path length. In certain …