Faculty Publications

Document Type

Article

Publication Date

January 2010

Publication Title

Proceeings of ISI-KDD '10 ACM SIGKDD Workshop on Intelligence and Security Informatics

Keywords

Child Exploitation, Social Network Analysis, Target Prioritization, Internet

Disciplines

Criminology

Abstract

The emergence of the Internet has provided people with the ability to find and communicate with others of common interests. Unfortunately, those involved in the practices of child exploitation have also received the same benefits. Although law enforcement continues its efforts to shut down websites dedicated to child exploitation, the problem remains uncurbed. Despite this, law enforcement has yet to examine these websites as a network and determine their structure, stability and susceptibleness to attack. We extract the structure and features of four online child exploitation networks using a custom-written webpage crawler. Social network analysis is then applied with the purpose of finding key players – websites whose removal would result in the greatest fragmentation of the network and largest loss of hardcore material. Our results indicate that websites do not link based on the hardcore content of the target website; however, blogs do contain more hardcore content per page than non-blog websites.

Comments

© Frank, R., Westlake, B.G., & Bouchard, M. | ACM 2010. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Proceedings ISI-KDD '10 ACM SIGKDD Workshop on Intelligence and Security Informatics, http://dx.doi.org/10.1145/1938606.1938609.

SJSU users: use the following link to login and access the article via SJSU databases.

Included in

Criminology Commons

Share

COinS