191 results on '"Seigfried-Spellar, Kathryn C."'
Search Results
2. Students' Perceptions of a Cyber Enrichment Program
3. Are you a cop?: Identifying suspicion in online chat operations with online groomers
4. Testing a hybrid risk assessment model: Predicting CSAM offender risk from digital forensic artifacts
5. A multi-factor knuckle and nail bed verification tool for forensic imagery analysis
6. The role of community healthcare professionals in discussing sexual assault experiences during obstetrics and gynecological healthcare appointments
7. Criminological differences between contact-driven and online-focused suspects in online child sexual grooming police reports
8. AME+Cyber: Evaluating the Online Delivery of a Holistic Cyber-Related Talent Development Program
9. A scoping review of child grooming strategies: pre- and post-internet
10. Acquisition and Examination of Forensic Evidence
11. Cyberbullying, Online Harassment, and Cyberstalking
12. Computer Hackers and Hacking
13. Legal Challenges in Digital Forensic Investigations
14. The Future of Cybercrime, Terror, and Policy
15. Cyberwarfare Andinformation Operations Online
16. Online Extremism and Cyberterror
17. Technology and Cybercrime
18. Illicit Market Operations Online
19. Malware and Automated Computer Attacks
20. Cybercrime and Criminological Theories
21. Pornography, Image-Based Sexual Abuse, and Prostitution
22. Lawenforcement, Privacy, and Security in Dealing with Cybercrime
23. Child Sexual Exploitation Material Offenses
24. Online Fraud
25. Digital Piracy and Intellectual Property Theft
26. Evolution of Digital Forensics
27. Child Sexual Exploitation: Introduction to a Global Problem
28. Criminological differences between child pornography offenders arrested in Spain
29. Students’ Perceptions of a Cyber Enrichment Program
30. Exploring detection of contact vs. fantasy online sexual offenders in chats with minors: Statistical discourse analysis of self-disclosure and emotion words
31. Computer criminal behavior is related to psychopathy and other antisocial behavior
32. Deviant Pornography Use
33. Child Sexual Exploitation: Introduction to a Global Problem
34. Measuring the Preference of Image Content for Self-reported Consumers of Child Pornography
35. Explanatory Case Study of the Authur Pendragon Cyber Threat: Socio-psychological and Communication Perspectives
36. Assessing the Psychological Well-being and Coping Mechanisms of Law Enforcement Investigators vs. Digital Forensic Examiners of Child Pornography Investigations
37. Applying risk assessment methods to the sex trafficking process: A feasibility study
38. Distinguishing the viewers, downloaders, and exchangers of Internet child pornography by individual differences: Preliminary findings
39. Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers
40. The role of community healthcare professionals in discussing sexual assault experiences during obstetrics and gynecological healthcare appointments
41. Peer attachment, sexual experiences, and risky online behaviors as predictors of sexting behaviors among undergraduate students
42. Child Pornography and Sexual Exploitation
43. Law Enforcement, Privacy, and Security in Dealing with Cybercrime
44. Acquisition And Examination of Forensic Evidence
45. Pornography, Prostitution, and Sex Crimes
46. The Future of Cybercrime, Terror, and Policy
47. Cybercrime and Criminological Theories
48. Legal Challenges in Digital Forensic Investigations
49. Cybercrime and Digital Forensics
50. Economic Crimes and Online Fraud
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.