Search
Search Results
-
#MeToo and the Ethics of Doxing Sexual Transgressors
The #MeToo movement sometimes uses extralegal means to secure justice for victims of sexual misconduct, including doxing. Doxing involves... -
Antifa’s Political Violence on Twitter: a Grounded Theory Approach
This paper explores antifa activists’ use of doxing on Twitter against individuals perceived as alt-right militants. Following the principles of...
-
Doxing
The most impressive attribution results are those that identify specific individuals, ideally with their real names and even photos. Objectively... -
HATDO: hybrid Archimedes Tasmanian devil optimization CNN for classifying offensive comments and non-offensive comments
The evolution of social media and online platforms created more opportunities to express one’s thoughts without any burden. This emergence paved the...
-
Enhancing cyberbullying detection: a comparative study of ensemble CNN–SVM and BERT models
Technological improvements have increased the number of people who use online social networking sites, resulting in an increase in cyberbullying....
-
Internet Crime Enabling: Stalking and Cyberstalking
Cyberstalking is practiced by Internet abusers to harass, victimize and to mock peers, teachers, co-workers, neighbors and others. While typically... -
51. Kapitel. Gewaltdarstellung, -verherrlichung und -androhung
Behandelt werden das Androhen der Begehung bestimmter (eigener) Straftaten (§ 126 I) oder das fälschliche Ankündigen (fremder oder eigener) Taten... -
Cyberstalking in Nigeria: An Exploratory Study of Section 24 of the Nigerian Cybercrimes (Prohibition, Prevention, etc.) (Amendment) Act, 2024
The increase in internet use, interconnectivity, and affordability of data have intensified online harms, including cyberstalking on social media...
-
Technology and Gender Violence: Victimization Model, Consequences and Measures
The evolution of technology is playing a very vital role in the development of every sphere of life. This technical evolution is also contributing... -
Privacy Risks in German Patient Forums: A NER-Based Approach to Enrich Digital Twins
The online sharing of personal health data by individuals has raised privacy concerns. This paper presents a Named Entity Recognition (NER)-based... -
Research with User-Generated Book Review Data: Legal and Ethical Pitfalls and Contextualized Mitigations
The growing quantity of user-generated book reviews has opened up unprecedented opportunities for empirical research on books, reading, and... -
A classification of Antifa Twitter accounts based on social network map** and linguistic analysis
Where machine learning and other quantitative methods have been used for classification purposes in hel** researchers manually identify extremist...
-
Antifa: Anatomy of a Movement
This chapter focuses on left-wing radicalism, with special focus on the movement known as Antifa. Over the past few years, this movement has gained... -
Personenbezogene Recherchen – Doxing
Die beeindruckendsten Attributions-Ergebnisse sind solche, die konkrete Personen identifizieren, im Idealfall mit ihren Klarnamen und sogar Fotos.... -
Too much information: exploring technology-mediated abuse in higher education online learning and teaching spaces resulting from COVID-19 and emergency remote education
During COVID-19, universities across the globe experienced a rapid requirement to move to online learning and teaching provision. This rapid move has...
-
Postdigital Epistemic Violence
Postdigital epistemic violence encompasses a large variety of harms that occur through speech acts about the lived experiences of knowers from... -
Introduction: Sex, Ethics, and Philosophy
In this introductory chapter, David Boonin provides an overview of the substantive contributions that make up the remainder of the collection. The... -
Gewalt gegen Frauen und ihre psychischen Auswirkungen
Globally, 35% of girls and women have been subjected to physical and/or sexual violence. Structural inequalities and concepts of hegemonic...