Kaplan et al., 2003 - Google Patents
Investigating hate crimes on the InternetKaplan et al., 2003
View PDF- Document ID
- 7733806817369878249
- Author
- Kaplan J
- Moss M
- Lieberman M
- Wessler S
- Publication year
External Links
- 230000000694 effects 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Musto | Control and protect: Collaboration, carceral protection, and domestic sex trafficking in the United States | |
Cole et al. | Terrorism and the constitution: Sacrificing civil liberties in the name of national security | |
Posner | Privacy, surveillance, and law | |
Wortley et al. | Internet child pornography: Causes, investigation, and prevention | |
Klaaren et al. | Inside illegality: migration policing in South Africa after apartheid | |
Flynn et al. | Image-based sexual abuse: An Australian reflection | |
Schell et al. | Cyber child pornography: A review paper of the social and legal issues and remedies—and a proposed technological solution | |
Casey | Cyberpatterns | |
Donohue | Functional Equivalence and Residual Rights Post-Carpenter: Framing a Test Consistent with Precedent and Original Meaning | |
Johnson | Forensic computer crime investigation | |
Henry | Beyond free speech: novel approaches to hate on the Internet in the United States | |
Dedel | Witness intimidation | |
Gray et al. | The Cambridge handbook of surveillance law | |
Shimonski | Cyber reconnaissance, surveillance and defense | |
Kaplan et al. | Investigating hate crimes on the Internet | |
Ong | Confronting online social aggression in Hong Kong: A wake-up call | |
Blanch et al. | An introduction to violent crime on the internet | |
Prichard et al. | Transdisciplinary research in virtual space: can online warning messages reduce engagement with child exploitation material? | |
Piccato et al. | Written in Black and Red: Murder as a Communicative Act in Mexico | |
Sumner et al. | Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms | |
Herrera et al. | Challenges to Identifying Labor Trafficking at the Local Level: A Qualitative Study of Service Providers and Stakeholders in California | |
Shiller | Shooting in High Definition: How Having Tough Policies in Place Makes the Use of Body Cameras in Law Enforcement Comport with the Fourth Amendment | |
Ojedokun et al. | Perception and attitude of Nigerian police personnel towards the adoption of spiritual security mechanism for police operations | |
Azriel | The internet and hate speech: An examination of the Nuremberg files case | |
Slobogin | Is the Fourth Amendment Relevant in a Technological Age? |