2,381 research outputs found

    Improving misspelled word solving for human trafficking detection in online advertising data

    Get PDF
    Social media is used by pimps to advertise their businesses for adult services due to easy accessibility. This requires the potentially computational model for law enforcement authorities to facilitate a detection of human trafficking activities. The machine learning (ML) models used to detect these activities mostly rely on text classification and often omit the correction of misspelled words, resulting in the risk of predictions error. Therefore, an improvement data processing approach is one of strategies to enhance an efficiency of human trafficking detection. This paper presents a novel approach to solving spelling mistakes. The approach is designed to select misspelled words, the replace them with the popular words having the same meaning based on an estimation of the probability of words and context used in human trafficking advertisements. The applicability of the proposed approach was demonstrated with the labeled human trafficking dataset using three classification models: k-nearest neighbor (KNN), naive Bayes (NB), and multilayer perceptron (MLP). The achievement of higher accuracy of the model predictions using the proposed method evidences an improved alert on human trafficking outperforming than the others. The proposed approach shows the potential applicability to other datasets and domains from the online advertisements

    CHORUS Deliverable 2.1: State of the Art on Multimedia Search Engines

    Get PDF
    Based on the information provided by European projects and national initiatives related to multimedia search as well as domains experts that participated in the CHORUS Think-thanks and workshops, this document reports on the state of the art related to multimedia content search from, a technical, and socio-economic perspective. The technical perspective includes an up to date view on content based indexing and retrieval technologies, multimedia search in the context of mobile devices and peer-to-peer networks, and an overview of current evaluation and benchmark inititiatives to measure the performance of multimedia search engines. From a socio-economic perspective we inventorize the impact and legal consequences of these technical advances and point out future directions of research

    A Framework to Reveal Clandestine Organ Trafficking in the Dark Web and Beyond

    Get PDF
    Due to the scarcity of transplantable organs, patients have to wait on long lists for many years to get a matching kidney. This scarcity has created an illicit market place for wealthy recipients to avoid long waiting times. Brokers arrange such organ transplants and collect most of the payment that is sometimes channeled to fund other illicit activities. In order to collect and disburse payments, they often resort to money laundering-like schemes of money transfers. As the low-cost Internet arrives in some of the affected countries, social media and the dark web are used to illegally trade human organs. This paper presents a model to assess the risk of human organ trafficking in specific areas and shows methods and tools to discover digital traces of organ trafficking using publicly available tools

    HUC-HISF: A Hybrid Intelligent Security Framework for Human-centric Ubiquitous Computing

    Get PDF
    制度:新 ; 報告番号:乙2336号 ; 学位の種類:博士(人間科学) ; 授与年月日:2012/1/18 ; 早大学位記番号:新584

    Neologisms in Modern English: study of word-formation processes

    Get PDF
    http://tartu.ester.ee/record=b2654513~S1*es

    Online Child Sex Solicitation: Exploring the Feasibility of a Research 'Sting'

    Get PDF
    A small scale test of the integrity of Internet Web 2.0 social network sites was undertaken over several weeks in 2007. The fictional identities of four female underage children where posted on three network sites and later introduced to relay chat forums in order to explore the impact of apparent vulnerability on potential selection of Internet victims. Only one of the three social network sites in the study recognised that the postings violated child protection policies and subsequently closed down the underage postings. Two basic identities were created: one that engendered a needy and vulnerable characterisation of a child while the other identity was created to represent a happy and attached child character. The number of contacts and suspicious contacts were monitored to test assumptions about child ‘vulnerability’ and risks of unwanted sexual solicitations. The characters created also included either an avatar and/or contact details. These variants of the experiment showed that the inclusion of an image or access details increased the likelihood of contacts, including suspicious contact regardless of ‘vulnerability’. This small experiment noted that although vulnerable children with additional cues maybe at more risk all children who posted details about themselves on social network sites faced the risk of contact by predators. The need for further research and better means of regulating such sites was suggested

    CONTACTLESS PAYMENTS FRAUD DETECTION METHODS AND IS SOCIETY PREPARED TO RESIST: A CASE STUDY

    Get PDF
    The ability to use contactless payment technologies, non-cash payments and credit card payments is becoming almost an essential requirement for consumers and merchants in today's economic conditions. Different market sectors are rapidly adapting to these technologies and looking for the most convenient, secure, and fastest possible solutions that combine intelligent data processing, security, and business management functions. Millions of debit and credit card holders care about secure payments, the businesses that receive these payments are secure in terms of security, and the operators that process such incoming and outgoing payments are interested in innovative solutions that set them apart from the competition. Amid the COVID-19 pandemic, when e-commerce was growing exponentially, the global market for fraud detection and prevention, currently stands at USD 20.9 billion, and is expected to grow, until 2025 will rise to USD 38.2 billion by the end of the year; holds the market at 12.8 % annually. The US remains the dominant region in this market segment, but European countries are also increasingly investing in fraud prevention and detection solutions, which are growing in demand in Europe due to an increase in cybercrime as well as advanced bots and cyber-attack.
    corecore