[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kaplan et al., 2003 - Google Patents

Investigating hate crimes on the Internet

Kaplan et al., 2003

View PDF
Document ID
7733806817369878249
Author
Kaplan J
Moss M
Lieberman M
Wessler S
Publication year

External Links

Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers

Similar Documents

Publication Publication Date Title
Musto Control and protect: Collaboration, carceral protection, and domestic sex trafficking in the United States
Cole et al. Terrorism and the constitution: Sacrificing civil liberties in the name of national security
Posner Privacy, surveillance, and law
Wortley et al. Internet child pornography: Causes, investigation, and prevention
Klaaren et al. Inside illegality: migration policing in South Africa after apartheid
Flynn et al. Image-based sexual abuse: An Australian reflection
Schell et al. Cyber child pornography: A review paper of the social and legal issues and remedies—and a proposed technological solution
Casey Cyberpatterns
Donohue Functional Equivalence and Residual Rights Post-Carpenter: Framing a Test Consistent with Precedent and Original Meaning
Johnson Forensic computer crime investigation
Henry Beyond free speech: novel approaches to hate on the Internet in the United States
Dedel Witness intimidation
Gray et al. The Cambridge handbook of surveillance law
Shimonski Cyber reconnaissance, surveillance and defense
Kaplan et al. Investigating hate crimes on the Internet
Ong Confronting online social aggression in Hong Kong: A wake-up call
Blanch et al. An introduction to violent crime on the internet
Prichard et al. Transdisciplinary research in virtual space: can online warning messages reduce engagement with child exploitation material?
Piccato et al. Written in Black and Red: Murder as a Communicative Act in Mexico
Sumner et al. Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms
Herrera et al. Challenges to Identifying Labor Trafficking at the Local Level: A Qualitative Study of Service Providers and Stakeholders in California
Shiller Shooting in High Definition: How Having Tough Policies in Place Makes the Use of Body Cameras in Law Enforcement Comport with the Fourth Amendment
Ojedokun et al. Perception and attitude of Nigerian police personnel towards the adoption of spiritual security mechanism for police operations
Azriel The internet and hate speech: An examination of the Nuremberg files case
Slobogin Is the Fourth Amendment Relevant in a Technological Age?