Online Child Sexual Exploitation: A New MIS Challenge
暂无分享,去创建一个
[1] Tim C. Kietzmann,et al. Deepfakes: Trick or treat? , 2020, Business Horizons.
[2] Yannis Charalabidis,et al. Transforming the communication between citizens and government through AI-guided chatbots , 2019, Gov. Inf. Q..
[3] Judea Pearl,et al. The seven tools of causal inference, with reflections on machine learning , 2019, Commun. ACM.
[4] Christian V. Baccarella,et al. Social media? It's serious! Understanding the dark side of social media , 2018, European Management Journal.
[5] Dionysios S. Demetis. Fighting money laundering with technology: A case study of Bank X in the UK , 2018, Decis. Support Syst..
[6] Ganesan Ramachandran,et al. Cloud Based Big Data Platform for Image Analytics , 2017, 2017 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
[7] Jeanna Neefe Matthews,et al. Toward algorithmic transparency and accountability , 2017, Commun. ACM.
[8] D. Strong,et al. Affordance theory and how to use it in IS research , 2017 .
[9] R. Galliers,et al. The Routledge Companion to Management Information Systems , 2017 .
[10] Tia A. Hoffer,et al. Investigative aspects of crossover offending from a sample of FBI online child sexual exploitation cases , 2016 .
[11] Ahmad Diab,et al. Darknet and deepnet mining for proactive cybersecurity threat intelligence , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[12] Ya'akov Gal,et al. Behavioral Study of Users When Interacting with Active Honeytokens , 2016, TSEC.
[13] Thomas A. Weber. Product Pricing in a Peer-to-Peer Economy , 2016, J. Manag. Inf. Syst..
[14] Gurpreet Dhillon,et al. Interpreting information security culture: An organizational transformation case study , 2016, Comput. Secur..
[15] Ross M. Bartels,et al. The implicit theories of child sexual exploitation material users: an initial conceptualization , 2016 .
[16] Stefan Fenz,et al. A taxonomy for privacy enhancing technologies , 2015, Comput. Secur..
[17] E. Quayle,et al. The Role of Sexual Images in Online and Offline Sexual Behaviour With Minors , 2015, Current Psychiatry Reports.
[18] Steven Furnell,et al. Managing privacy settings: lots of options, but beyond control? , 2015 .
[19] Janis Wolak,et al. A Typology of Offenders Who Use Online Communications to Commit Sex Crimes Against Minors , 2015 .
[20] Amitai Etzioni. NSA: National Security vs. Individual Rights , 2015 .
[21] Josep Domingo-Ferrer,et al. Privacy and Data Protection by Design - from policy to engineering , 2014, ArXiv.
[22] Juriah Abd. Jalil. Combating child pornography in digital era: is Malaysian law adequate to meet the digital challenge? , 2015 .
[23] Jae Kyu Lee,et al. Research Framework for AIS Grand Vision of the Bright ICT Initiative , 2015 .
[24] Kim-Kwang Raymond Choo,et al. Online child exploitation: Challenges and future research directions , 2014, Comput. Law Secur. Rev..
[25] Ulrik Franke,et al. Cyber situational awareness - A systematic review of the literature , 2014, Comput. Secur..
[26] Jennifer Martin. “It's Just an Image, Right?”: Practitioners’ Understanding of Child Sexual Abuse Images Online and Effects on Victims , 2014 .
[27] Brian Neil Levine,et al. Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network. , 2014, Child abuse & neglect.
[28] Ivo Mhike. Trafficking in Slavery's Wake. Law and the Experience of Women and Children in Africa , 2014 .
[29] Diane M. Strong,et al. Critical Realism and Affordances: Theorizing IT-Associated Organizational Change Processes , 2013, MIS Q..
[30] Paul M. Leonardi,et al. When Does Technology Use Enable Network Change in Organizations? A Comparative Study of Feature Use and Shared Affordances , 2013, MIS Q..
[31] Giulio Calcara. The Role of INTERPOL and Europol in the Fight Against Cybercrime, with Reference to the Sexual Exploitation of Children Online and Child Pornography , 2013 .
[32] Giulio Calcara. THE ROLE OF INTERPOL AND EUROPOL IN THE FIGHT AGAINST CYBERCRIME , WITH PARTICULAR REFERENCE TO THE SEXUAL EXPLOITATION OF CHILDREN ONLINE AND CHILD PORNOGRAPHY , 2013 .
[33] James Backhouse,et al. Risk, trust and eID: Exploring public perceptions of digital identity systems , 2012, First Monday.
[34] K. Ribisl,et al. Understanding and Preventing Online Sexual Exploitation of Children , 2012 .
[35] Jade Guan,et al. Children in the digital age: exploring issues of cybersecurity , 2012, iConference '12.
[36] David Barnard-Wills,et al. E-safety education: Young people, surveillance and responsibility , 2012 .
[37] Jörgen Sandberg,et al. Generating Research Questions Through Problematization , 2011 .
[38] Janis Wolak,et al. Growth and change in undercover online child exploitation investigations, 2000–2006 , 2010 .
[39] Henri Barki,et al. User Participation in Information Systems Security Risk Management , 2010, MIS Q..
[40] Simson L. Garfinkel,et al. Digital forensics research: The next 10 years , 2010, Digit. Investig..
[41] J. McCarthy,et al. Internet sexual activity: A comparison between contact and non-contact child pornography offenders , 2010 .
[42] Julia von Weiler,et al. Care and treatment of child victims of child pornographic exploitation (CPE) in Germany , 2010 .
[43] Catherine D. Marcum,et al. Assessing Sex Experiences of Online Victimization: An Examination of Adolescent Online Behaviors Using Routine Activity Theory , 2010 .
[44] Alison M. Smith. Protection of Children Online: Federal and State Laws Addressing Cyberstalking, Cyberharassment, and Cyberbullying , 2009 .
[45] A. Beech,et al. Understanding online child pornography use: Applying sexual offense theory to internet offenders , 2009 .
[46] Luciano Floridi,et al. Information ethics: a reappraisal , 2008, Ethics and Information Technology.
[47] Sonia Livingstone,et al. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..
[48] Melissa Wells,et al. How Do High-Risk Youth Use the Internet? Characteristics and Implications for Prevention , 2008, Child maltreatment.
[49] M. Lynne Markus,et al. A Foundation for the Study of IT Effects: A New Look at DeSanctis and Poole's Concepts of Structural Features and Spirit , 2008, J. Assoc. Inf. Syst..
[50] L Alvin Malesky,et al. Predatory Online Behavior: Modus Operandi of Convicted Sex Offenders in Identifying Potential Victims and Contacting Minors Over the Internet , 2007, Journal of child sexual abuse.
[51] Bob Breeden,et al. Investigating 'Internet Crimes Against Children' (ICAC) cases in the state of Florida , 2006, SAC '06.
[52] Stuart E. Middleton,et al. Ontological user profiling in recommender systems , 2004, TOIS.
[53] Rob Kling,et al. Reconceptualizing Users as Social Actors in Information Systems Research , 2003, MIS Q..
[54] Miguel P Caldas,et al. Research design: qualitative, quantitative, and mixed methods approaches , 2003 .
[55] Steven Philippsohn,et al. Money Laundering on the Internet , 2001, Comput. Secur..
[56] Ian Hutchby,et al. Technologies, Texts and Affordances , 2001 .
[57] N. Hoffart. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .
[58] Michael D. Myers,et al. A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems , 1999, MIS Q..
[59] Geoff Walsham,et al. The Emergence of Interpretivism in IS Research , 1995, Inf. Syst. Res..
[60] Wanda J. Orlikowski,et al. CASE Tools as Organizational Change: Investigating Incremental and Radical Changes in Systems Development , 1993, MIS Q..
[61] A. Strauss. Basics Of Qualitative Research , 1992 .
[62] B. Turner,et al. Grounded Theory and Organizational Research , 1986 .
[63] B. Glaser. Theoretical Sensitivity: Advances in the Methodology of Grounded Theory , 1978 .
[64] R. Shaw,et al. Perceiving, Acting and Knowing : Toward an Ecological Psychology , 1978 .