Publisher
Springer International Publishing
Reference91 articles.
1. Adelson, W. J. (2008). Child prostitute or victim of trafficking. University of St. Thomas Law Journal, 6(1), 96–128.
2. Allsup, R., Thomas, E., Monk, B., Frank, R., & Bouchard, M. (August 2015). Networking in child exploitation: Assessing disruption strategies using registrant information. In Proceedings of the 2015 IEEE/ACM international conference on advances in social network analysis and mining 2015 (pp. 400–407). Paris, France: ACM.
3. Alsaleh, M., Alomar, N., & Alarifi, A. (2017). Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods. PLoS One, 12(3), e0173284. https://doi.org/10.1371/journal.pone.0173284.
4. Baluja, S. (2008, April 14). Building software tools to find child victims. Retrieved from http://googleblog.blogspot.com/2008/04/building-software-tools-to-find-child.html
5. Beech, A. R., Elliott, I. A., Birgden, A., & Findlater, D. (2008). The internet and child sexual offending: A criminological review. Aggression and Violent Behavior, 13(3), 216–228. https://doi.org/10.1016/j.avb.2008.03.007.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Understanding and deterring online child grooming: A qualitative study;Sexual Offending: Theory, Research, and Prevention;2024-02-15
2. Crowdsourcing to Tackle Online Child Sexual Exploitation;Advanced Sciences and Technologies for Security Applications;2023