Perverted-Justice

Results: 9



#Item
1SafeChat: Using Open Source Software to Protect Minors from Internet Predation Brett Thom April Kontostathis  Lynne Edwards

SafeChat: Using Open Source Software to Protect Minors from Internet Predation Brett Thom April Kontostathis Lynne Edwards

Add to Reading List

Source URL: www.websci11.org

Language: English - Date: 2016-03-15 09:55:19
2JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBERDetecting Predatory Behaviour in Game Chats Yun-Gyung Cheong, Alaina K. Jensen, Elín Rut Guðnadóttir, Byung-Chull Bae, and Julian Togelius

JOURNAL OF LATEX CLASS FILES, VOL. 11, NO. 4, DECEMBERDetecting Predatory Behaviour in Game Chats Yun-Gyung Cheong, Alaina K. Jensen, Elín Rut Guðnadóttir, Byung-Chull Bae, and Julian Togelius

Add to Reading List

Source URL: julian.togelius.com

Language: English - Date: 2015-05-10 02:58:01
3Detection of child exploiting chats from a mixed chat dataset as a text classification task Md Waliur RahmanMiah John Yearwood School of Science, Information

Detection of child exploiting chats from a mixed chat dataset as a text classification task Md Waliur RahmanMiah John Yearwood School of Science, Information

Add to Reading List

Source URL: www.alta.asn.au

Language: English - Date: 2011-12-09 02:14:09
4Microsoft Word - N-JOV2 study methodology report _2-27-09_.doc

Microsoft Word - N-JOV2 study methodology report _2-27-09_.doc

Add to Reading List

Source URL: www.unh.edu

Language: English - Date: 2013-09-27 14:34:57
51 Communication without Frontiers: Public Relations and the Cyberspace from a European and Transatlantic Perspective. Oscar Bartoli Introduction We are living through very upsetting times. Globalization has created a

1 Communication without Frontiers: Public Relations and the Cyberspace from a European and Transatlantic Perspective. Oscar Bartoli Introduction We are living through very upsetting times. Globalization has created a

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2012-03-13 04:24:20
6TESTIMONY OF DAN JUDE PRESIDENT SECURITY SOFTWARE SYSTEMS Before the COPA COMMISSION

TESTIMONY OF DAN JUDE PRESIDENT SECURITY SOFTWARE SYSTEMS Before the COPA COMMISSION

Add to Reading List

Source URL: www.copacommission.org

Language: English - Date: 2013-02-05 12:44:00
7Microsoft Word - September-October 2007 Wkg Copy.doc

Microsoft Word - September-October 2007 Wkg Copy.doc

Add to Reading List

Source URL: www.naag.org

Language: English - Date: 2008-04-24 10:22:46
8Investigators using the Internet to apprehend sex offenders: findings from the Second National Juvenile Online Victimization Study

Investigators using the Internet to apprehend sex offenders: findings from the Second National Juvenile Online Victimization Study

Add to Reading List

Source URL: www.unh.edu

Language: English - Date: 2014-03-19 12:58:36
9Internet Predators: What You Need to Know to Protect Your Children By Von Saunders  There is an increasing number of children around the world who are routinely online,

Internet Predators: What You Need to Know to Protect Your Children By Von Saunders There is an increasing number of children around the world who are routinely online,

Add to Reading List

Source URL: wiki.uww.edu

Language: English - Date: 2009-04-28 22:10:05