{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T21:21:02Z","timestamp":1768684862671,"version":"3.49.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,9,18]],"date-time":"2014-09-18T00:00:00Z","timestamp":1410998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/s13388-014-0003-7","type":"journal-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T13:58:14Z","timestamp":1410962294000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["\"Our Little Secret\": pinpointing potential predators"],"prefix":"10.1186","volume":"3","author":[{"given":"Anna","family":"Vartapetiance","sequence":"first","affiliation":[]},{"given":"Lee","family":"Gillam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,18]]},"reference":[{"key":"3_CR1","unstructured":"J Gentry, Ancient Pedophilia, The Ohio State University, 2009, [ https:\/\/kb.osu.edu\/dspace\/handle\/1811\/37221 ]"},{"key":"3_CR2","doi-asserted-by":"publisher","DOI":"10.1037\/11639-000","volume-title":"Pedophilia and Sexual Offending Against Children: Theory, Assessment, and Intervention","author":"MC Seto","year":"2008","unstructured":"Seto MC: Pedophilia and Sexual Offending Against Children: Theory, Assessment, and Intervention. American Psychological Association, Washington, DC, US; 2008."},{"key":"3_CR3","unstructured":"The Sexual Offence Act 2003 (c.42), [ http:\/\/www.legislation.gov.uk\/ukpga\/2003\/42\/contents ]"},{"key":"3_CR4","unstructured":"Classification of Mental and Behavioural Disorders Diagnostic Criteria for Research. World Health Organization, Geneva; 2010."},{"key":"3_CR5","unstructured":"Diagnostic and Statistical Manual of Mental Disorders (DSM-IV-TR). 2000."},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1080\/00224498609551297","volume":"22","author":"D Finkelhor","year":"1986","unstructured":"Finkelhor D, Araji S: Explanations of pedophilia: a four factor model. J. Sex Res. 1986, 22: 145\u2013161. 10.1080\/00224498609551297","journal-title":"J. Sex Res"},{"issue":"12","key":"3_CR7","first-page":"1","volume":"10","author":"L Chiang","year":"2012","unstructured":"Chiang L, Lin Y, Chan H, Chiang B: Differential manifestations of prepubescent, pubescent and postpubescent pediatric patients with systemic lupus erythematosus: a retrospective study of 96 Chinese children and adolescents. Pediatr. Rheumtol. 2012, 10(12):1\u20139.","journal-title":"Pediatr. Rheumtol"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10508-008-9399-9","volume":"38","author":"R Blanchard","year":"2009","unstructured":"Blanchard R, Lykins AD, Wherrett D, Kuban ME, Cantor JM, Blak T, Dickey R, Klassen PE: Pedophilia, hebephilia, and the DSM-V. Arch. Sex Behav. 2009, 38: 335\u2013350. 10.1007\/s10508-008-9399-9","journal-title":"Arch. Sex Behav"},{"key":"3_CR9","volume-title":"Sexual Assault of Young Children as Reported to Law Enforcement: Victim, Incident, and Offender Characteristics (Report No. NCJ 18399)","author":"HN Snyder","year":"2000","unstructured":"Snyder HN: Sexual Assault of Young Children as Reported to Law Enforcement: Victim, Incident, and Offender Characteristics (Report No. NCJ 18399). US: Department of Justice, Washington, DC; 2000."},{"key":"3_CR10","volume-title":"Child Molesters: A Behavioral Analysis. For Professionals Investigating the Sexual Exploitation of Children","author":"K Lanning","year":"2010","unstructured":"Lanning K: Child Molesters: A Behavioral Analysis. For Professionals Investigating the Sexual Exploitation of Children. National Center for Missing & Exploited Children, USA; 2010."},{"issue":"3","key":"3_CR11","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1111\/j.1468-2885.2007.00294.x","volume":"17","author":"LN Olson","year":"2007","unstructured":"Olson LN, Daggs JL, Ellevold BL, Rogers TKK: Entrapping the innocent: toward a theory of child sexual predators\u2019 luring communication. Comm. Theor. 2007, 17(3):231\u2013251. 10.1111\/j.1468-2885.2007.00294.x","journal-title":"Comm. Theor"},{"key":"3_CR12","volume-title":"The Socially Skilled Child Molester: Differentiating the Guilty from the Falsely Accused","author":"C Van Dam","year":"2006","unstructured":"Van Dam C: The Socially Skilled Child Molester: Differentiating the Guilty from the Falsely Accused. The Haworth Press, Binghamton, NY; 2006."},{"key":"3_CR13","volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory","author":"A Strauss","year":"1998","unstructured":"Strauss A, Corbin J: Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. Sage, Thousand Oaks, CA; 1998."},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1080\/08934210109367733","volume":"14","author":"BH Spitzberg","year":"2001","unstructured":"Spitzberg BH, Marshall L, Cupach WR: Obsessive relational intrusion, coping, and sexual coercion victimization. Comm. Rep. 2001, 14: 19\u201330. 10.1080\/08934210109367733","journal-title":"Comm. Rep"},{"issue":"1","key":"3_CR15","first-page":"1","volume":"8","author":"C Harms","year":"2007","unstructured":"Harms C: Grooming: an operational definition and coding scheme. Sex Offender Law Rep. 2007, 8(1):1\u20136.","journal-title":"Sex Offender Law Rep"},{"key":"3_CR16","first-page":"122","volume-title":"Proceedings of the Second International Workshop on Computational Forensics (IWCF \u201908)","author":"D Hughes","year":"2008","unstructured":"Hughes D, Rayson P, Walkerdine J, Lee K, Greenwood P, Rashid A, May-Chahal C, Brennan M: Supporting law enforcement in digital communities through natural language analysis. In Proceedings of the Second International Workshop on Computational Forensics (IWCF \u201908). Springer, Washington, DC; 2008:122\u2013134."},{"key":"3_CR17","unstructured":"L Ellison, Cyberstalking: Tackling Harassment on the Internet, in 14th BILETA Conference: CYBERSPACE 1999 (Crime, Criminal Justice and the Internet, 1999)"},{"key":"3_CR18","unstructured":"Office of Juvenile Justice and Delinquency Prevention (OJJDP), [ http:\/\/www.ojjdp.gov\/ ]"},{"key":"3_CR19","volume-title":"Online Victimization of Youth: Five Years Later. National Center for Missing & Exploited Children","author":"J Wolak","year":"2006","unstructured":"Wolak J, Mitchell K, Finkelhor D: Online Victimization of Youth: Five Years Later. National Center for Missing & Exploited Children. The Crimes Against Children Research Center, USA; 2006."},{"key":"3_CR20","unstructured":"Virtual Global Taskforce, [ http:\/\/www.virtualglobaltaskforce.com\/ ]"},{"key":"3_CR21","unstructured":"Child Exploitation & Online Protection Centre: Internet Safety (CEOP), [ http:\/\/ceop.police.uk\/ ]"},{"key":"3_CR22","unstructured":"Internet Watch Foundation, [ http:\/\/www.iwf.org.uk\/ ]"},{"issue":"3","key":"3_CR23","first-page":"14","volume":"61","author":"K Durkin","year":"1997","unstructured":"Durkin K: Misuse of the Internet by Pedophiles: implication for law enforcement and probation practice. Federal Probation 1997, 61(3):14\u201318.","journal-title":"Federal Probation"},{"issue":"4","key":"3_CR24","doi-asserted-by":"publisher","first-page":"457","DOI":"10.4065\/82.4.457","volume":"82","author":"RCW Hall","year":"2007","unstructured":"Hall RCW, Hall RCW: A profile of pedophilia: definition, characteristics of offenders, recidivism, treatment outcomes, and forensic issues. Mayo Clin Proc 2007, 82(4):457\u2013471. 10.4065\/82.4.457","journal-title":"Mayo Clin Proc"},{"key":"3_CR25","volume-title":"Challenges of Automating the Detection of Paedophile Activity on the Internet. First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE\u201905)","author":"L Penna","year":"2005","unstructured":"Penna L, Clark A, Mohay G: Challenges of Automating the Detection of Paedophile Activity on the Internet. First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE\u201905). IEEE Computer Society, 7\u20139 November 2005, Taipei, Taiwan; 2005."},{"key":"3_CR26","unstructured":"Perverted Justice, [ http:\/\/www.perverted-justice.com\/ ]"},{"key":"3_CR27","unstructured":"Net Nanny, [ https:\/\/www.netnanny.com\/products\/net-nanny-social\/ ]"},{"key":"3_CR28","unstructured":"ContentBarrier, [ http:\/\/www.intego.com\/manuals\/en\/cb\/1-welcome-to-contentbarrier.html ]"},{"key":"3_CR29","first-page":"104","volume-title":"Rethinking Language Pedagogy from a Corpus Perspective","author":"M Scott","year":"2000","unstructured":"Scott M: Focusing on the text and its key words. In Rethinking Language Pedagogy from a Corpus Perspective. Edited by: Burnard L, McEnery T. Peter Lang, Frankfurt; 2000:104\u2013121."},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/ICSC.2007.32","volume-title":"First IEEE International Conference on Semantic Computing (ICSC 2007)","author":"N Pendar","year":"2007","unstructured":"Pendar N: Toward spotting the pedophile: telling victim from predator in text chats. In First IEEE International Conference on Semantic Computing (ICSC 2007). IEEE Comput Society, 17\u201319 Sep 2007, Irvine, USA; 2007:235\u2013241. 10.1109\/ICSC.2007.32"},{"key":"3_CR31","first-page":"157","volume-title":"Australasian Language Technology Association Workshop 2011 (ALTA 2011)","author":"MW RahmanMiah","year":"2011","unstructured":"RahmanMiah MW, Yearwood J, Kulkarni S: Detection of Child Exploiting Chats from a Mixed Chat Dataset as a Text Classification Task. In Australasian Language Technology Association Workshop 2011 (ALTA 2011). Edited by: Molla D. Association for Computational Linguistics (ACL), 1\u20132 December 2011, Canberra, Australia; 2011:157\u2013165."},{"key":"3_CR32","unstructured":"R O\u2019Connell, A Typology of Child Cyber- sexploitation and Online Grooming Practices. In Cyberspace Research Unit (University of Central Lancashire, 2003)"},{"key":"3_CR33","unstructured":"JW Pennebaker, ME Francis, RJ Booth, Linguistic Inquiry and Word Count (LIWC) (Erlbaum Publishers, 2001)"},{"issue":"3","key":"3_CR34","doi-asserted-by":"publisher","first-page":"103","DOI":"10.2753\/JEC1086-4415150305","volume":"15","author":"I McGhee","year":"2011","unstructured":"McGhee I, Bayzick J, Kontostathis A, Edwards L, McBride A, Jakubowski E: Learning to identify internet sexual predation. Int J Electron Commerce 2011, 15(3):103\u2013122. 10.2753\/JEC1086-4415150305","journal-title":"Int J Electron Commerce"},{"key":"3_CR35","first-page":"864","volume-title":"IEEE Symposium on Computers and Communications (ISCC)","author":"D Michalopoulos","year":"2011","unstructured":"Michalopoulos D, Mavridis I: Utilizing document classification for grooming attack recognition. In IEEE Symposium on Computers and Communications (ISCC). IEEE, 28 June - 1July, 2011, Kerkira, Greece; 2011:864\u2013869."},{"key":"3_CR36","unstructured":"D Bogdanova, P Rosso, T Solorio, On the impact of sentiment and emotion based features in detecting online sexual predators, ed. by P Forner, R Navigli, D Tufis (Working Notes Papers of the CLEF 2012 Evaluation Labs, Rome, Italy, 2012), pp. 110\u2013118"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"C Strapparava, R Mihalcea, SemEval-2007 Task 14: Affective Text. The 4th International Workshop on Semantic Evaluations (SemEval \u201907), (Association for Computational Linguistics (ACL), 23\u201324 June, Prague, Czech Republic, 2007), pp. 70\u201374","DOI":"10.3115\/1621474.1621487"},{"issue":"2","key":"3_CR38","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/1461928.1461959","volume":"52","author":"S Argamon","year":"2009","unstructured":"Argamon S, Koppel M, Pennebaker J, Schler J: Automatically profiling the author of an anonymous text. Comm ACM 2009, 52(2):119\u2013123. 10.1145\/1461928.1461959","journal-title":"Comm ACM"},{"key":"3_CR39","unstructured":"C Peersman, F Vaassen, V Van Asch, W Daelemans, Conversation Level Constraints on Pedophile Detection in Chat Rooms - Notebook for PAN at CLEF 2012, ed. by P Forner, R Navigli, D Tufis (Working Notes Papers of the CLEF 2012 Evaluation Labs., 17\u201320 September 2012, Rome, Italy, 2012)"},{"key":"3_CR40","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1109\/ICSC.2008.61","volume-title":"Proceedings of the 2008 IEEE International Conference on Semantic Computing","author":"PH Adams","year":"2008","unstructured":"Adams PH, Martell CH: Topic detection and extraction in chat. In Proceedings of the 2008 IEEE International Conference on Semantic Computing. IEEE Computer Society Press, Los Alamitos; 2008:581\u2013588. 10.1109\/ICSC.2008.61"},{"key":"3_CR41","unstructured":"D Yin, Z Xue, L Hong, BD Davison, A Kontostathis, L Edwards, Detection of Harassment on Web 2.0 (2009). Paper presented at the first Content Analysis in Web 2.0 Workshop, Madrid, April 15"},{"key":"3_CR42","volume-title":"CLEF 2012 Evaluation Labs and Workshop - Working Notes Papers","author":"P Juola","year":"2012","unstructured":"Juola P: An overview of the traditional authorship attribution subtask. In CLEF 2012 Evaluation Labs and Workshop - Working Notes Papers. Edited by: Forner P, Karlgren J, Womser-Hacker C. Rome, Italy; 2012."},{"key":"3_CR43","unstructured":"Omegle: Talk to strangers! , [ http:\/\/omegle.inportb.com ]"},{"key":"3_CR44","unstructured":"The Omeglean Society, [ http:\/\/inportb.com\/2010\/02\/21\/the-omeglean-society\/ ]"},{"key":"3_CR45","unstructured":"IRC logs, [ http:\/\/irclog.org\/ ]"},{"key":"3_CR46","unstructured":"IRC Logs Archive, [ http:\/\/krijnhoetmer.nl\/irc-logs\/ ]"},{"key":"3_CR47","volume-title":"CLEF 2012 Evaluation Labs and Workshop - Working Notes Papers","author":"A Vartapetiance","year":"2012","unstructured":"Vartapetiance A, Gillam L: Quite Simple Approaches for Authorship Attribution, Intrinsic Plagiarism Detection and Sexual Predator Identification - Notebook for PAN at CLEF 2012. In CLEF 2012 Evaluation Labs and Workshop - Working Notes Papers. Edited by: Forner P, Navigli R, Tufis D. Working Notes Papers of the CLEF 2012 Evaluation Labs., 17\u201320 September 2012, Rome, Italy; 2012."},{"key":"3_CR48","unstructured":"G Sheldrick, D Churchill, Abducted schoolgirl is banned from visiting paedophile teacher Jeremy Forrest. (2013). 1 July., [ http:\/\/www.express.co.uk\/news\/uk\/411477\/Abducted-schoolgirl-is-banned-from-visiting-paedophile-teacher-Jeremy-Forrest ]"},{"key":"3_CR49","volume-title":"A Report on the Nation\u2019s Youth. National Center for Missing & Exploited Children","author":"D Finkelhor","year":"2000","unstructured":"Finkelhor D, Mitchell K, Wolak J: A Report on the Nation\u2019s Youth. National Center for Missing & Exploited Children. The Crimes Against Children Research Center, USA; 2000."},{"key":"3_CR50","unstructured":"S Livingstone, L Haddon, A G\u00f6rzig, K Olafsson, EU kids online final report. (2011). [ http:\/\/www2.lse.ac.uk\/media@lse\/research\/EUKidsOnline\/EU%20Kids%20II%20(2009\u201311)\/EUKidsOnlineIIReports\/Final%20report.pdf ]"},{"key":"3_CR51","volume-title":"CLEF 2012 Evaluation Labs and Workshop - Working Notes Papers","author":"G Inches","year":"2012","unstructured":"Inches G, Crestani F: Overview of the international sexual predator identification competition at pan-2012. In CLEF 2012 Evaluation Labs and Workshop - Working Notes Papers. Edited by: Forner P, Karlgren J, Womser-Hacker C. Rome, Italy; 2012."},{"key":"3_CR52","unstructured":"D Skillicorn, A Little, Spinning the Election, [ http:\/\/research.cs.queensu.ca\/home\/skill\/election\/election.html ]"},{"key":"3_CR53","unstructured":"Stopwords: Default English Stopwords List, [ http:\/\/www.ranks.nl\/resources\/stopwords.html ]"},{"issue":"2","key":"3_CR54","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/378881.378888","volume":"24","author":"C Fox","year":"1989","unstructured":"Fox C: A stop list for general text. ACM Sigir 1989, 24(2):19\u201321. 10.1145\/378881.378888","journal-title":"ACM Sigir"},{"issue":"166","key":"3_CR55","first-page":"1","volume":"4","author":"A Vartapetiance","year":"2013","unstructured":"Vartapetiance A, Gillam L: Deception detection: dependable or defective? Springer Journal of Social Network Analysis and Mining, Special Issue on Uncovering Deception in Social Media 2013, 4(166):1\u201314.","journal-title":"Springer Journal of Social Network Analysis and Mining, Special Issue on Uncovering Deception in Social Media"},{"key":"3_CR56","unstructured":"J Thorsten, Text Categorization with Support Vector Machines: Learning with Many Relevant Features, Technical Report LS VIIIReport, Universit'at Dortmund, Dortmund, Germany, (1997)., [ http:\/\/www.cs.cornell.edu\/people\/tj\/publications\/joachims_98a.pdf ]"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-014-0003-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0003-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0003-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0003-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T23:41:10Z","timestamp":1565826070000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/s13388-014-0003-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,18]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["3"],"URL":"https:\/\/doi.org\/10.1186\/s13388-014-0003-7","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,18]]},"assertion":[{"value":"29 April 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"3"}}