Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Más filtros

Banco de datos
Tipo del documento
Asunto de la revista
País de afiliación
Intervalo de año de publicación
1.
Eur J Neurosci ; 53(3): 895-901, 2021 02.
Artículo en Inglés | MEDLINE | ID: mdl-33378593

RESUMEN

A key issue facing cybercrime investigations is connecting online identities to real-world identities. This paper shows that by combining the Fringe-P3 method with a concealed information test, we can detect a participant's familiarity with their own email address, thus connecting their real-world identity to their online one. Participants were shown Rapid Serial Visual Presentation (RSVP) streams of email addresses, some including their own email address (probe) or a target email address. Familiarity with the probe was accurately detected with significant results at the group level and for 7 of 11 participants at the individual level. These promising results demonstrate that the method can be successfully used to detect online identities. Factors that may affect how well an email address probe stands out in the RSVP streams are also discussed.


Asunto(s)
Correo Electrónico , Reconocimiento en Psicología , Humanos
2.
Front Psychol ; 12: 623668, 2021.
Artículo en Inglés | MEDLINE | ID: mdl-33897532

RESUMEN

International law enforcement have noted a rise in the use of the Dark Web to facilitate and commit sexual offenses against children, both prior to and since the start of the COVID-19 pandemic. The study presented here therefore aimed to investigate the characteristics and behaviors of anonymous users of Dark Web platforms who were suspected of engaging in the sexual abuse of children. Naturally-occurring data on 53 anonymous suspects, who were active on the Dark Web and had come to police attention in the United Kingdom (UK), were sampled. Analysis of the data yielded 462 features that could be coded reliably. Analysis of these features provided novel insights into suspects' characteristics, their motivations for using the Dark Web, the nature of the offending behavior they reported engaging in, their technical and security precautions, sexual interests, and the content of their interactions with one another. Findings are discussed in relation to theoretical and practical implications, as well as directions for future research.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA