199 results on '"Seigfried-Spellar, Kathryn C."'
Search Results
2. Students' Perceptions of a Cyber Enrichment Program
3. Are you a cop?: Identifying suspicion in online chat operations with online groomers
4. Testing a hybrid risk assessment model: Predicting CSAM offender risk from digital forensic artifacts
5. A multi-factor knuckle and nail bed verification tool for forensic imagery analysis
6. Criminological differences between contact-driven and online-focused suspects in online child sexual grooming police reports
7. The role of community healthcare professionals in discussing sexual assault experiences during obstetrics and gynecological healthcare appointments
8. AME+Cyber: Evaluating the Online Delivery of a Holistic Cyber-Related Talent Development Program
9. A scoping review of child grooming strategies: pre- and post-internet
10. Acquisition and Examination of Forensic Evidence
11. Cyberbullying, Online Harassment, and Cyberstalking
12. Computer Hackers and Hacking
13. Legal Challenges in Digital Forensic Investigations
14. The Future of Cybercrime, Terror, and Policy
15. Cyberwarfare Andinformation Operations Online
16. Online Extremism and Cyberterror
17. Technology and Cybercrime
18. Illicit Market Operations Online
19. Malware and Automated Computer Attacks
20. Cybercrime and Criminological Theories
21. Pornography, Image-Based Sexual Abuse, and Prostitution
22. Lawenforcement, Privacy, and Security in Dealing with Cybercrime
23. Child Sexual Exploitation Material Offenses
24. Online Fraud
25. Digital Piracy and Intellectual Property Theft
26. Evolution of Digital Forensics
27. Child Sexual Exploitation: Introduction to a Global Problem
28. Criminological differences between child pornography offenders arrested in Spain
29. Exploring detection of contact vs. fantasy online sexual offenders in chats with minors: Statistical discourse analysis of self-disclosure and emotion words
30. Computer criminal behavior is related to psychopathy and other antisocial behavior
31. Deviant Pornography Use
32. Child Sexual Exploitation: Introduction to a Global Problem
33. Measuring the Preference of Image Content for Self-reported Consumers of Child Pornography
34. Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-psychological and Communication Perspectives
35. Assessing the Psychological Well-being and Coping Mechanisms of Law Enforcement Investigators vs. Digital Forensic Examiners of Child Pornography Investigations
36. Applying risk assessment methods to the sex trafficking process: A feasibility study
37. Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers
38. Distinguishing the viewers, downloaders, and exchangers of Internet child pornography by individual differences: Preliminary findings
39. The role of community healthcare professionals in discussing sexual assault experiences during obstetrics and gynecological healthcare appointments
40. Peer attachment, sexual experiences, and risky online behaviors as predictors of sexting behaviors among undergraduate students
41. Child Pornography and Sexual Exploitation
42. Law Enforcement, Privacy, and Security in Dealing with Cybercrime
43. Acquisition And Examination of Forensic Evidence
44. Pornography, Prostitution, and Sex Crimes
45. The Future of Cybercrime, Terror, and Policy
46. Cybercrime and Criminological Theories
47. Legal Challenges in Digital Forensic Investigations
48. Cybercrime and Digital Forensics
49. Economic Crimes and Online Fraud
50. Evolution of Digital Forensics
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.