Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (7)
- Criminology (4)
- Sociology (4)
- Broadcast and Video Studies (1)
- Business (1)
-
- Communication (1)
- Education (1)
- Information Literacy (1)
- Internet Law (1)
- Journalism Studies (1)
- Law (1)
- Library and Information Science (1)
- Management Information Systems (1)
- Management Sciences and Quantitative Methods (1)
- Nonprofit Administration and Management (1)
- Public Affairs, Public Policy and Public Administration (1)
- Social Control, Law, Crime, and Deviance (1)
- Transportation (1)
Articles 1 - 8 of 8
Full-Text Articles in Entire DC Network
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Faculty Publications
Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …
Impact Of Format On Evaluations Of Online News, August Grant, Jeffrey Wilkinson, Diane Guerrazzi
Impact Of Format On Evaluations Of Online News, August Grant, Jeffrey Wilkinson, Diane Guerrazzi
Faculty Publications
The emergence of online news offers journalists the opportunity to use a variety of formats to present news, including traditional text and video forms and emerging multimedia forms. This paper reports the results of a series of studies exploring these formats, two experiments and a survey. The first experiment compared three formats of video news delivery and found that format was related to time spent viewing a story, and time spent predicted recall of the story, but no direct relationship was observed between format and recall. The secondexperiment compared three different formats (text, text with pictures, and text with videos), …
Deer Herd Management Using The Internet: A Comparative Study Of California Targeted By Data Mining The Internet, G. Kent Webb
Deer Herd Management Using The Internet: A Comparative Study Of California Targeted By Data Mining The Internet, G. Kent Webb
Faculty Publications, Information Systems & Technology
An ongoing project to investigate the use of the internet as an information source for decision support identified the decline of the California deer population as a significant issue. Using Google Alerts, an automated keyword search tool, text and numerical data were collected from a daily internet search and categorized by region and topic to allow for identification of information trends. This simple data mining approach determined that California is one of only four states that do not currently report total, finalized deer harvest (kill) data online and that it is the only state that has reduced the amount of …
Comparing Methods For Detecting Child Exploitation Content Online, Bryce Westlake, Martin Bouchard, Richard Frank
Comparing Methods For Detecting Child Exploitation Content Online, Bryce Westlake, Martin Bouchard, Richard Frank
Faculty Publications
The sexual exploitation of children online is seen as a global issue and has been addressed by both governments and private organizations. Efforts thus far have focused primarily on the use of image hash value databases to find content. However, recently researchers have begun to use keywords as a way to detect child exploitation content. Within the current study we explore both of these methodologies. Using a custom designed web-crawler, we create three networks using the hash value method, keywords method, and a hybrid method combining the first two. Results first show that the three million images found in our …
Strategies To Disrupt Online Child Pornography Networks, Kila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake
Strategies To Disrupt Online Child Pornography Networks, Kila Joffres, Martin Bouchard, Richard Frank, Bryce Westlake
Faculty Publications
This paper seeks to determine which attack strategies (hub, bridge, or fragmentation) are most effective at disrupting two online child pornography networks in terms of outcome measures that include density, clustering, compactness, and average path length. For this purpose, two networks were extracted using a web-crawler that recursively follows child exploitation sites. It was found that different attack strategies were warranted depending on the outcome measure and the network structure. Overall, hub attacks were most effective at reducing network density and clustering, whereas fragmentation attacks were most effective at reducing the network's distance-based cohesion and average path length. In certain …
Situated Practices Of Information Use And Representation: An Ethnographic Study Of A Web Design Project For Boys, Kristen Rebmann
Situated Practices Of Information Use And Representation: An Ethnographic Study Of A Web Design Project For Boys, Kristen Rebmann
Faculty Publications
This article explores the production practices employed by children building personal webpages in a semi-structured afterschool program: the Fifth Dimension (5D). Following a critical Multiliteracies (CritMLs) approach to learning design, this ethnographic study introduced web-building practices to the children of the 5D and followed their production of personal webpages over a 9 month period. By structuring the intervention this way, it was possible to simultaneously observe the development of both the webpage as artifact as well as the child-participant. Along these lines, the study describes the unique and particular social contexts from which personal webpages emerge and develop over time. …
The Structure And Content Of Online Child Exploitation Networks, Richard Frank, Bryce Westlake, Martin Bouchard
The Structure And Content Of Online Child Exploitation Networks, Richard Frank, Bryce Westlake, Martin Bouchard
Faculty Publications
The emergence of the Internet has provided people with the ability to find and communicate with others of common interests. Unfortunately, those involved in the practices of child exploitation have also received the same benefits. Although law enforcement continues its efforts to shut down websites dedicated to child exploitation, the problem remains uncurbed. Despite this, law enforcement has yet to examine these websites as a network and determine their structure, stability and susceptibleness to attack. We extract the structure and features of four online child exploitation networks using a custom-written webpage crawler. Social network analysis is then applied with the …
Maintenance And Continued Development Of The Iistps Transportation Information System, Transweb, Mti Report 99-01, Sandra Belanger, Stephen Kwan
Maintenance And Continued Development Of The Iistps Transportation Information System, Transweb, Mti Report 99-01, Sandra Belanger, Stephen Kwan
Mineta Transportation Institute
The Norman Y. Mineta International Institute for Surface Transportation Policy Studies (IISTPS) at San José State University (SJSU) conducted this project to maintain and continue development of a transportation information system entitled TransWeb . The project elements included: 1) the maintenance and continued development of a World Wide Web site for IISTPS (TransWeb); 2) development and maintenance of a library resource database; and 3) a survey of transportation professionals, primarily in California, regarding their use of the Internet and TransWeb. Site statistics reported here show the extent to which the transportation community uses TransWeb. Standard maintenance procedures are employed, including …