Faculty Publications

Document Type

Article

Publication Date

January 2012

Publication Title

European Intelligence and Security Informatics Conference

First Page

156

Last Page

163

Keywords

Databases, Videos, Organizations, Computer Crime, Internet, Educational Institutions, Materials, Web-crawler, Cybercrime, Online Child Exploitation, Image Hash Database

Disciplines

Criminology

Abstract

The sexual exploitation of children online is seen as a global issue and has been addressed by both governments and private organizations. Efforts thus far have focused primarily on the use of image hash value databases to find content. However, recently researchers have begun to use keywords as a way to detect child exploitation content. Within the current study we explore both of these methodologies. Using a custom designed web-crawler, we create three networks using the hash value method, keywords method, and a hybrid method combining the first two. Results first show that the three million images found in our hash value database were not common enough on public websites for the hash value method to produce meaningful result. Second, the small sample of websites that were found to contain those images had little to no videos posted, suggesting a need for different criteria for finding each type of material. Third, websites with code words commonly known to be used by child pornographers to identify or discuss exploitative content, were found to be much larger than others, with extensive visual and textual content. Finally, boy-centered keywords were more commonly found on child exploitation websites than girl-centered keywords, though not at a statistically significant level. Applications for law enforcement and areas for future research are discussed.

Comments

© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version of the article may be found online at: http://doi.ieeecomputersociety.org/10.1109/EISIC.2012.25

Included in

Criminology Commons

COinS