We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 342 results
  1. #MeToo and the Ethics of Doxing Sexual Transgressors

    The #MeToo movement sometimes uses extralegal means to secure justice for victims of sexual misconduct, including doxing. Doxing involves...
    Chapter 2022
  2. Antifa’s Political Violence on Twitter: a Grounded Theory Approach

    This paper explores antifa activists’ use of doxing on Twitter against individuals perceived as alt-right militants. Following the principles of...

    Lachlan Jaccoud, Lorena Molnar, Marcelo F. Aebi in European Journal on Criminal Policy and Research
    Article Open access 12 August 2023
  3. Doxing

    The most impressive attribution results are those that identify specific individuals, ideally with their real names and even photos. Objectively...
    Chapter 2020
  4. Doxing Racists

    Peter Brian Barry in The Journal of Value Inquiry
    Article 19 June 2020
  5. HATDO: hybrid Archimedes Tasmanian devil optimization CNN for classifying offensive comments and non-offensive comments

    The evolution of social media and online platforms created more opportunities to express one’s thoughts without any burden. This emergence paved the...

    B. Aarthi, Balika J. Chelliah in Neural Computing and Applications
    Article 22 June 2023
  6. Enhancing cyberbullying detection: a comparative study of ensemble CNN–SVM and BERT models

    Technological improvements have increased the number of people who use online social networking sites, resulting in an increase in cyberbullying....

    Hiteshi Saini, Himashri Mehra, ... Amita Dev in Social Network Analysis and Mining
    Article 02 December 2023
  7. Internet Crime Enabling: Stalking and Cyberstalking

    Cyberstalking is practiced by Internet abusers to harass, victimize and to mock peers, teachers, co-workers, neighbors and others. While typically...
    Raphael Cohen-Almagor, Daniel Trottier in Advances in Information and Communication
    Conference paper 2022
  8. 51. Kapitel. Gewaltdarstellung, -verherrlichung und -androhung

    Behandelt werden das Androhen der Begehung bestimmter (eigener) Straftaten (§ 126 I) oder das fälschliche Ankündigen (fremder oder eigener) Taten...
    Michael Heghmanns in Strafrecht Besonderer Teil
    Chapter 2021
  9. Cyberstalking in Nigeria: An Exploratory Study of Section 24 of the Nigerian Cybercrimes (Prohibition, Prevention, etc.) (Amendment) Act, 2024

    The increase in internet use, interconnectivity, and affordability of data have intensified online harms, including cyberstalking on social media...

    Article 01 July 2024
  10. Technology and Gender Violence: Victimization Model, Consequences and Measures

    The evolution of technology is playing a very vital role in the development of every sphere of life. This technical evolution is also contributing...
    Sita Rani, Jaskiran Kaur, Pankaj Bhambri in Communication Technology and Gender Violence
    Chapter 2024
  11. Privacy Risks in German Patient Forums: A NER-Based Approach to Enrich Digital Twins

    The online sharing of personal health data by individuals has raised privacy concerns. This paper presents a Named Entity Recognition (NER)-based...
    Sergej Schultenkämper, Frederik Simon Bäumer in Information and Software Technologies
    Conference paper 2024
  12. Research with User-Generated Book Review Data: Legal and Ethical Pitfalls and Contextualized Mitigations

    The growing quantity of user-generated book reviews has opened up unprecedented opportunities for empirical research on books, reading, and...
    Yuerong Hu, Glen Layne-Worthey, ... Jana Diesner in Information for a Better World: Normality, Virtuality, Physicality, Inclusivity
    Conference paper 2023
  13. A classification of Antifa Twitter accounts based on social network map** and linguistic analysis

    Where machine learning and other quantitative methods have been used for classification purposes in hel** researchers manually identify extremist...

    Article 29 November 2021
  14. Antifa: Anatomy of a Movement

    This chapter focuses on left-wing radicalism, with special focus on the movement known as Antifa. Over the past few years, this movement has gained...
    Chapter 2023
  15. Personenbezogene Recherchen – Doxing

    Die beeindruckendsten Attributions-Ergebnisse sind solche, die konkrete Personen identifizieren, im Idealfall mit ihren Klarnamen und sogar Fotos....
    Timo Steffens in Auf der Spur der Hacker
    Chapter 2018
  16. Too much information: exploring technology-mediated abuse in higher education online learning and teaching spaces resulting from COVID-19 and emergency remote education

    During COVID-19, universities across the globe experienced a rapid requirement to move to online learning and teaching provision. This rapid move has...

    Helen Bovill in Higher Education
    Article Open access 27 October 2022
  17. Postdigital Epistemic Violence

    Postdigital epistemic violence encompasses a large variety of harms that occur through speech acts about the lived experiences of knowers from...
    Living reference work entry 2023
  18. Introduction: Sex, Ethics, and Philosophy

    In this introductory chapter, David Boonin provides an overview of the substantive contributions that make up the remainder of the collection. The...
    Chapter 2022
  19. Gewalt gegen Frauen und ihre psychischen Auswirkungen

    Globally, 35% of girls and women have been subjected to physical and/or sexual violence. Structural inequalities and concepts of hegemonic...

    Nilufar Mossaheb in psychopraxis. neuropraxis
    Article Open access 08 May 2024
Did you find what you were looking for? Share feedback.