Slavery as a Social Institution
(2015)
Book Chapter
Bales, K. (2015). Slavery as a Social Institution. In International Encyclopedia of the Social and Behavioral Sciences, 43-48. (2nd). Elsevier
Outputs (91)
The Civil Rights Movement and the Literature of Social Protest (2015)
Book Chapter
Trodd, Z. (2015). The Civil Rights Movement and the Literature of Social Protest. In The Cambridge Companion to American Civil Rights Literature (17-34). Cambridge University Press. https://doi.org/10.1017/CCO9781107446618.003
Crawling Open-Source Data for Indicators of Human Trafficking (2014)
Presentation / Conference Contribution
Brewster, B., Ingle, T., & Rankin, G. (2014). Crawling Open-Source Data for Indicators of Human Trafficking. In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing. https://doi.org/10.1109/ucc.2014.116Information available from open-source mediums such as the web and social media are increasingly being used to aid the response to emergent crimes and reinforce existing Law Enforcement Agency intelligence capability. In this paper we discuss the rat... Read More about Crawling Open-Source Data for Indicators of Human Trafficking.
Social media and its role for LEAs: Review and applications (2014)
Book Chapter
Bayerl, P. S., Akhgar, B., Brewster, B., Domdouzis, K., & Gibson, H. (2014). Social media and its role for LEAs: Review and applications. In B. Akhgar, A. Staniforth, & F. Bosco (Eds.), Cyber Crime and Cyber Terrorism Investigator's Handbook (197-220). Elsevier. https://doi.org/10.1016/B978-0-12-800743-3.00016-5Social media has become a major aspect of online activity, and thus an essential part of cybercrime and cyber terrorism-related operations. As LEA’s (law enforcement agencies) focus upon cybercrime and cyber terrorism threats increase, so does the re... Read More about Social media and its role for LEAs: Review and applications.
Knowledge Management and Human Trafficking: Using Conceptual Knowledge Representation, Text Analytics and Open-Source Data to Combat Organized Crime (2014)
Presentation / Conference Contribution
Brewster, B., Polovina, S., Rankin, G., & Andrews, S. (2023). Knowledge Management and Human Trafficking: Using Conceptual Knowledge Representation, Text Analytics and Open-Source Data to Combat Organized Crime. In Graph-Based Representation and Reasoning: 21st International Conference on Conceptual Structures, ICCS 2014, Iaşi, Romania, July 27-30, 2014, Proceedings (104-117). https://doi.org/10.1007/978-3-319-08389-6_10Globalization, the ubiquity of mobile communications and the rise of the web have all expanded the environment in which organized criminal entities are conducting their illicit activities, and as a result the environment that law enforcement agencies... Read More about Knowledge Management and Human Trafficking: Using Conceptual Knowledge Representation, Text Analytics and Open-Source Data to Combat Organized Crime.
Environmental Scanning and Knowledge Representation for the Detection of Organised Crime Threats (2014)
Presentation / Conference Contribution
Brewster, B., Andrews, S., Polovina, S., Hirsch, L., & Akhgar, B. (2023). Environmental Scanning and Knowledge Representation for the Detection of Organised Crime Threats. In N. Hernandez, R. Jäschke, & M. Croitoru (Eds.), Graph-Based Representation and Reasoning: 21st International Conference on Conceptual Structures, ICCS 2014, Iaşi, Romania, July 27-30, 2014, Proceedings (275-280). https://doi.org/10.1007/978-3-319-08389-6_22ePOOLICE aims at developing an efficient and effective strategic early warning system that utilises environmental scanning for the early warning and detection of current, emergent and future organised crime threats. Central to this concept is the use... Read More about Environmental Scanning and Knowledge Representation for the Detection of Organised Crime Threats.
Slavery in Europe: Part 2, Testing a Predictive Model (2014)
Journal Article
Datta, M. N., & Bales, K. (2014). Slavery in Europe: Part 2, Testing a Predictive Model. Human Rights Quarterly, 36(2), 277-295. https://doi.org/10.1353/hrq.2014.0025Since the passage of the Victims of Trafficking and Violence Protection Act and the United Nations Palermo Protocols of 2000, there has been an increased focus on the magnitude and complexity of modern day slavery. Yet, surprisingly, little empirical... Read More about Slavery in Europe: Part 2, Testing a Predictive Model.
Towards a model for the integration of knowledge management in law enforcement agencies (2014)
Journal Article
Johnson, K., Brewster, B., Akhgar, B., Staniforth, A., Waddington, D., Andrews, S., & Mitchell, S. J. (2014). Towards a model for the integration of knowledge management in law enforcement agencies. International Journal of Electronic Security and Digital Forensics, 6(1), 1. https://doi.org/10.1504/ijesdf.2014.060169
A Framework for the Investigation and Modeling of Online Radicalization and the Identification of Radicalized Individuals (2013)
Book Chapter
Staniforth, A., Bayerl, P. S., Akhgar, B., Brewster, B., & Johnson, K. (2014). A Framework for the Investigation and Modeling of Online Radicalization and the Identification of Radicalized Individuals. In Emerging Trends in ICT Security (539-547). Elsevier. https://doi.org/10.1016/B978-0-12-411474-6.00033-5In this chapter we present an empirically-based theory-independent framework of online radicalization. The framework provides a systematic basis for (a) the representation of causal mechanisms of online radicalization and (b) the identification of ra... Read More about A Framework for the Investigation and Modeling of Online Radicalization and the Identification of Radicalized Individuals.
A Conceptual Framework for Information Security Awareness, Assessment, and Training (2013)
Book Chapter
Hassanzadeh, M., Jahangiri, N., & Brewster, B. (2014). A Conceptual Framework for Information Security Awareness, Assessment, and Training. In H. R. Arabnia, & B. Akhgar (Eds.), Emerging Trends in ICT Security (99-110). Elsevier. https://doi.org/10.1016/B978-0-12-411474-6.00006-2Information security has become a key issue. Human resources, including all people working with information technology, play a significant role in information security issues. The key factor for human resources in relation to information security is... Read More about A Conceptual Framework for Information Security Awareness, Assessment, and Training.
Am I still not a man and a brother?: protest memory in contemporary antislavery visual culture (2013)
Journal Article
Trodd, Z. (2013). Am I still not a man and a brother?: protest memory in contemporary antislavery visual culture. Slavery and Abolition, 34(2), https://doi.org/10.1080/0144039X.2013.791172This article examines the visual culture of the twenty-first century antislavery movement,
arguing that it adapts four main icons of eighteenth- and nineteenth-century abolitionism
for its contemporary campaigns against global slavery and human tra... Read More about Am I still not a man and a brother?: protest memory in contemporary antislavery visual culture.