Text Mining and CyberCrime
نویسندگان
چکیده
This chapter describes the state of technology for studying Internet crimes against children, specifically sexual predation and cyberbullying. We begin by presenting a survey of relevant research articles that are related to the study of cybercrime. This survey includes a discussion of our work on the classification of chat logs that contain bullying or predatory behavior. Many commercial enterprises have developed parental control software to monitor these behaviors, and the latest version of some of these tools provides features that profess to protect children against predators and bullies. The chapter concludes with a discussion of these products and offers suggestions for continued research in this interesting and timely sub-field of text mining.
منابع مشابه
1 Text Mining and Cybercrime
This chapter describes the state of technology for studying Internet crimes against children, specifically and . We begin by presenting a survey of relevant research articles that are related to the study of . This survey includes a discussion of our work on the classification of chat logs that contain or . Many commercial enterprises have developed to monitor these behaviors, and the latest ve...
متن کاملIdentifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System
The past few years have witnessed millions of credit/debit cards flowing through the underground economy and ultimately causing significant financial loss. Examining key underground economy sellers has both practical and academic significance for cybercrime forensics and criminology research. Drawing on social media analytics, we have developed the AZSecure text mining system for identifying an...
متن کاملData mining technology for countering cybercrime A computational intelligence perspective
Cybercrime is any IT-based criminal offense. Because freely accessing to the Internet, cybercriminal entities threaten everyone, everywhere, every day. From remote individuals to the most powerful governments, none is absolutely immune from cybercrime constantly-mutating and devastating operations. Fortunately, there are scientific methods and technological means to counter it. This paper attem...
متن کاملPredictive Models in Cybercrime Investigation: An Application of Data Mining Techniques
With increased access to computers across the world, cybercrime is becoming a major challenge to law enforcement agencies. Cybercrime investigation in India is in its infancy and there has been limited success in prosecuting the offenders; therefore, a need to understand and strengthen the existing investigation methods and systems for controlling cybercrimes is greatly needed. This study ident...
متن کاملA Study on Significance of Event Ontology Approach in Web Crime Mining
As most aspect of our life move to digital networks, crimes comes with them. Our lives increasingly depend on the internet and digital networks, but these create new vulnerabilities and new ways for criminals to exploits the digital environment. Not only can many existing crimes be replicated in online environments, but novel crimes that exploit specific features of digital networks have emerge...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009