• Corpus ID: 16427462

Digital Detecting: New Resources for Determining Internet Authorship

@inproceedings{Edwards2012DigitalDN,
  title={Digital Detecting: New Resources for Determining Internet Authorship},
  author={Lynne Edwards},
  year={2012}
}
Current research on youths and cyber aggression falls into three general areas: rates of occurrence, effects, and prevention of cyberbullying and cyberpredation [6, 10]. One area that has received less scholarly attention is the detection, identification and tracking of 

References

SHOWING 1-10 OF 18 REFERENCES

Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress

Online communications can be cruel and vicious. They take place 24/7. Damaging text and images can be widely disseminated and impossible to fully remove. There are emerging reports of youth suicide,

Use of social networking sites in online sex crimes against minors: an examination of national incidence and means of utilization.

Internet-initiated sex crimes against minors: implications for prevention based on findings from a national study.

Exploring State-of-the-Art Software for Forensic Authorship Identification

TLDR
This article aims at presenting linguists and researchers in forensic linguistics with an exploration of the strengths, limitations and challenges of stateof-the-art software for forensic authorship identification.

ONLINE DOMAINS OF LANGUAGE USE: SECOND LANGUAGE LEARNERS' EXPERIENCES OF VIRTUAL COMMUNITY AND FOREIGNNESS

This paper examines the use of CMC in both Japanese and English dominated domains by Australian learners of Japanese. The natural, social online communication of 12 Australian university students

Citations

  • Engineering
    Distributed Renewable Energies for Off-Grid Communities
  • 2021
61.302(a) 65.82(a), (a)(1), (a)(2) Standards: equip each loading rack with a vapor collection system C Subpart BB uses the term "loading rack." The CAR uses "transfer rack" to be consistent with the

Entrapping the Innocent: Toward a Theory of Child Sexual Predators’ Luring Communication

This paper examines an unexplored form of communication deviance—the communicative process of entrapment used by child sexual predators to lure their victims into an ongoing sexual relationship.

Learning to Identify Internet Sexual Predation

TLDR
This work integrates communication theories and computer science algorithms to create a program that can detect the occurrence of sexual predation in an online social setting and uses machine learning algorithms to classify posts.

Text Mining and Cybercrime In Text Mining: Application and Theory

  • 2009

reflect the views of the National Science Foundation