Why do users continue to contribute to darknet Child Sexual Abuse Material forums? Examining social exchange, social capital, and social learning explanations using digital forensic artifacts
The darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM to the forum members subject themselves to criminal prosecution, questions regarding the motivation for members contributing to darknet CSAM...
Saved in:
Published in | Child abuse & neglect Vol. 153; p. 106815 |
---|---|
Main Authors | , , , , , , , , , , |
Format | Journal Article |
Language | English |
Published |
England
Elsevier Ltd
01.07.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM to the forum members subject themselves to criminal prosecution, questions regarding the motivation for members contributing to darknet CSAM forums arise.
Building on insights gained from research into clearnet communities, here we examine the extent to which social incentives generated by the online CSAM community may explain members' posting behavior on darknet CSAM forums.
We analyze digital forensic artifacts on the online behavior of members of a darknet CSAM forum that was shut down by law enforcement agencies in July 2015.
We apply group-based trajectory modelling (GBTM), social network analysis, and mixed-effect survival models.
Applying GBTM three posting trajectories can be distinguished. Social network analyses finds the reply network to be more centralized than predicted by chance. Mixed-effect survival models show positive associations between the length of members' first post and the time since members' first registration on the forum and subsequent posting. Contrarily, the number of replies received appears to mitigate subsequent posting.
Findings show posting activity on the forum to be concentrated in a minority of forum members who show posting trajectories that are both frequent and persistent. Results further suggest persistence in posting is motivated by social identity and, to a lesser extent, differential association processes.
•Only a minority of darknet CSAM forum members participates in public forum communications.•Even among active forum members, a minority of members generates the bulk of public communications.•Forum members’ continued contributing is associated with self-presentation and prolonged exposure to the forum environment.•Unexpectedly, peer feedback seems to mitigate continued participation. |
---|---|
AbstractList | The darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM to the forum members subject themselves to criminal prosecution, questions regarding the motivation for members contributing to darknet CSAM forums arise.
Building on insights gained from research into clearnet communities, here we examine the extent to which social incentives generated by the online CSAM community may explain members' posting behavior on darknet CSAM forums.
We analyze digital forensic artifacts on the online behavior of members of a darknet CSAM forum that was shut down by law enforcement agencies in July 2015.
We apply group-based trajectory modelling (GBTM), social network analysis, and mixed-effect survival models.
Applying GBTM three posting trajectories can be distinguished. Social network analyses finds the reply network to be more centralized than predicted by chance. Mixed-effect survival models show positive associations between the length of members' first post and the time since members' first registration on the forum and subsequent posting. Contrarily, the number of replies received appears to mitigate subsequent posting.
Findings show posting activity on the forum to be concentrated in a minority of forum members who show posting trajectories that are both frequent and persistent. Results further suggest persistence in posting is motivated by social identity and, to a lesser extent, differential association processes.
•Only a minority of darknet CSAM forum members participates in public forum communications.•Even among active forum members, a minority of members generates the bulk of public communications.•Forum members’ continued contributing is associated with self-presentation and prolonged exposure to the forum environment.•Unexpectedly, peer feedback seems to mitigate continued participation. The darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM to the forum members subject themselves to criminal prosecution, questions regarding the motivation for members contributing to darknet CSAM forums arise.BACKGROUNDThe darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM to the forum members subject themselves to criminal prosecution, questions regarding the motivation for members contributing to darknet CSAM forums arise.Building on insights gained from research into clearnet communities, here we examine the extent to which social incentives generated by the online CSAM community may explain members' posting behavior on darknet CSAM forums.OBJECTIVEBuilding on insights gained from research into clearnet communities, here we examine the extent to which social incentives generated by the online CSAM community may explain members' posting behavior on darknet CSAM forums.We analyze digital forensic artifacts on the online behavior of members of a darknet CSAM forum that was shut down by law enforcement agencies in July 2015.PARTICIPANTS AND SETTINGWe analyze digital forensic artifacts on the online behavior of members of a darknet CSAM forum that was shut down by law enforcement agencies in July 2015.We apply group-based trajectory modelling (GBTM), social network analysis, and mixed-effect survival models.METHODSWe apply group-based trajectory modelling (GBTM), social network analysis, and mixed-effect survival models.Applying GBTM three posting trajectories can be distinguished. Social network analyses finds the reply network to be more centralized than predicted by chance. Mixed-effect survival models show positive associations between the length of members' first post and the time since members' first registration on the forum and subsequent posting. Contrarily, the number of replies received appears to mitigate subsequent posting.RESULTSApplying GBTM three posting trajectories can be distinguished. Social network analyses finds the reply network to be more centralized than predicted by chance. Mixed-effect survival models show positive associations between the length of members' first post and the time since members' first registration on the forum and subsequent posting. Contrarily, the number of replies received appears to mitigate subsequent posting.Findings show posting activity on the forum to be concentrated in a minority of forum members who show posting trajectories that are both frequent and persistent. Results further suggest persistence in posting is motivated by social identity and, to a lesser extent, differential association processes.CONCLUSIONSFindings show posting activity on the forum to be concentrated in a minority of forum members who show posting trajectories that are both frequent and persistent. Results further suggest persistence in posting is motivated by social identity and, to a lesser extent, differential association processes. The darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM to the forum members subject themselves to criminal prosecution, questions regarding the motivation for members contributing to darknet CSAM forums arise. Building on insights gained from research into clearnet communities, here we examine the extent to which social incentives generated by the online CSAM community may explain members' posting behavior on darknet CSAM forums. We analyze digital forensic artifacts on the online behavior of members of a darknet CSAM forum that was shut down by law enforcement agencies in July 2015. We apply group-based trajectory modelling (GBTM), social network analysis, and mixed-effect survival models. Applying GBTM three posting trajectories can be distinguished. Social network analyses finds the reply network to be more centralized than predicted by chance. Mixed-effect survival models show positive associations between the length of members' first post and the time since members' first registration on the forum and subsequent posting. Contrarily, the number of replies received appears to mitigate subsequent posting. Findings show posting activity on the forum to be concentrated in a minority of forum members who show posting trajectories that are both frequent and persistent. Results further suggest persistence in posting is motivated by social identity and, to a lesser extent, differential association processes. |
ArticleNumber | 106815 |
Author | Shäfer, Thomas Gannon, Colm Reichel, Rebecca Gnielka, Frederic Blokland, Arjan de Boer, Meike Huikuri, Salla Schmidt, Alexander F. Staciwa, Katarzyna Lehmann, Robert Daser, Anton |
Author_xml | – sequence: 1 givenname: Arjan orcidid: 0000-0003-0366-2205 surname: Blokland fullname: Blokland, Arjan email: ablokland@nscr.nl organization: Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), and Leiden Law School, Institute of Criminal Law and Criminology, Leiden University, Leiden, the Netherlands – sequence: 2 givenname: Anton surname: Daser fullname: Daser, Anton organization: Institute of Psychology, Social & Legal Psychology, Johannes Gutenberg University Mainz, Mainz, Germany – sequence: 3 givenname: Meike surname: de Boer fullname: de Boer, Meike organization: Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), and Leiden Law School, Institute of Criminal Law and Criminology, Leiden University, Leiden, the Netherlands – sequence: 4 givenname: Colm surname: Gannon fullname: Gannon, Colm organization: School of Computing, Engineering and Mathematical Science, La Trobe University, Melbourne, Australia – sequence: 5 givenname: Frederic surname: Gnielka fullname: Gnielka, Frederic organization: Department of Psychology, MSB Medical School Berlin, Berlin, Germany – sequence: 6 givenname: Salla surname: Huikuri fullname: Huikuri, Salla organization: Strategic Steering and Development, Ministry of the Interior, Helsinki, Finland – sequence: 7 givenname: Rebecca surname: Reichel fullname: Reichel, Rebecca organization: Department of Psychology, MSB Medical School Berlin, Berlin, Germany – sequence: 8 givenname: Thomas surname: Shäfer fullname: Shäfer, Thomas organization: Department of Psychology, MSB Medical School Berlin, Berlin, Germany – sequence: 9 givenname: Alexander F. orcidid: 0000-0001-6449-2946 surname: Schmidt fullname: Schmidt, Alexander F. organization: Institute of Psychology, Social & Legal Psychology, Johannes Gutenberg University Mainz, Mainz, Germany – sequence: 10 givenname: Katarzyna surname: Staciwa fullname: Staciwa, Katarzyna organization: Polish Platform for Homeland Security, Poznan, Poland – sequence: 11 givenname: Robert surname: Lehmann fullname: Lehmann, Robert organization: Department of Psychology, MSB Medical School Berlin, Berlin, Germany |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/38735124$$D View this record in MEDLINE/PubMed |
BookMark | eNqFUcFuEzEUtFARTQt_gJCPHJqw3vWuF4RAVdQWpCIOgDhab-3nxOnGDrYXJV_Hr-FNmksv8cV-45nxe54Lcua8Q0Jes2LGCta8W83U0kI3zMqi5BlqWlY_IxPWimoqRC3OyKRgvJ6WrOLn5CLGVZFXLeoX5LzKpJqVfEL-_V7uqPZ0iBgiVd4l6wakye_PwXZD2lcawoPDROdL22v6A7cD9PS6yzL6DRIGm0vjw7COn-nNFtbWWbeg0avxArdqCW6BV0dAwcYm6K8oOH3EeoSwF-F204ODZL2Lua8R0nYx8scX0EWrKIRkDagUX5LnBvqIrx73S_Lr9ubn_Mv0_vvd1_n1_VTxhqUpM8BNCTXvBKsQTccZtroqQBgjWgNMGdBNpQqGHLmom5aDZrqouSq5KMrqkrw9-G6C_zNgTHJto8I-d4p-iLLKVF5x8Z5l6ptH6tCtUctNsGsIO3n89Ez4cCCo4GMMaKTK043zpgC2l6yQY8JyJQ8JyzFheUg4i_kT8dH_hOzTQYb5k_5aDDIqi06htgFVktrbUwYfnxioPoesoH_A3Wn5f5ZA2k8 |
CitedBy_id | crossref_primary_10_25205_2542_0410_2024_20_4_50_59 crossref_primary_10_1057_s41599_024_03954_x crossref_primary_10_1080_01639625_2025_2453813 |
Cites_doi | 10.1177/0011128714526499 10.1177/1079063220981063 10.1287/isre.1110.0411 10.3389/fpsyg.2021.623668 10.1016/j.avb.2022.101793 10.1016/S0740-8188(03)00031-8 10.1111/j.1083-6101.2006.00033.x 10.1016/j.diin.2014.07.003 10.7560/JHS31202 10.1177/15248380211057274 10.1080/13552601003760006 10.1016/j.socnet.2006.05.001 10.1007/s12144-022-03307-4 10.1111/j.1745-9125.2010.00185.x 10.1080/03610926.2012.719986 10.1089/109493103321168009 10.1016/j.avb.2022.101809 10.1038/s41598-019-56704-4 10.54501/jots.v1i2.29 10.1111/1556-4029.14820 10.1016/j.avb.2022.101808 10.1016/j.im.2015.07.005 10.1080/01449290110084683 10.1016/j.avb.2009.08.006 10.1177/0894439321994894 10.1037/0022-3514.89.5.747 10.1177/1536867X19893639 10.1007/s11757-023-00790-8 10.1111/j.1083-6101.2012.01582.x 10.1080/01639620290086413 10.1080/0144929X.2022.2073472 |
ContentType | Journal Article |
Copyright | 2024 The Author(s) Copyright © 2024 The Author(s). Published by Elsevier Ltd.. All rights reserved. |
Copyright_xml | – notice: 2024 The Author(s) – notice: Copyright © 2024 The Author(s). Published by Elsevier Ltd.. All rights reserved. |
DBID | 6I. AAFTH AAYXX CITATION CGR CUY CVF ECM EIF NPM 7X8 |
DOI | 10.1016/j.chiabu.2024.106815 |
DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef Medline MEDLINE MEDLINE (Ovid) MEDLINE MEDLINE PubMed MEDLINE - Academic |
DatabaseTitle | CrossRef MEDLINE Medline Complete MEDLINE with Full Text PubMed MEDLINE (Ovid) MEDLINE - Academic |
DatabaseTitleList | MEDLINE - Academic MEDLINE |
Database_xml | – sequence: 1 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 2 dbid: EIF name: MEDLINE url: https://proxy.k.utb.cz/login?url=https://www.webofscience.com/wos/medline/basic-search sourceTypes: Index Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Social Welfare & Social Work |
EISSN | 1873-7757 |
ExternalDocumentID | 38735124 10_1016_j_chiabu_2024_106815 S0145213424002059 |
Genre | Research Support, Non-U.S. Gov't Journal Article |
GroupedDBID | --- --K --M -~X ..I .1- .FO .GJ .~1 0R~ 186 1B1 1P~ 1RT 1VV 1~. 1~5 29B 2KS 4.4 457 4G. 53G 5GY 5VS 7-5 71M 85S 8P~ 9JM 9JO 9M8 AABNK AADFP AAEDT AAEDW AAFJI AAGJA AAGUQ AAIKC AAIKJ AAKOC AALRI AAMNW AAOAW AAQFI AAQXK AATTM AAWTL AAXKI AAXUO AAYJJ AAYWO ABBQC ABFNM ABIVO ABJNI ABMAC ABMMH ABMZM ABOYX ABPPZ ABWVN ABXDB ACDAQ ACGFO ACGFS ACHQT ACIEU ACNCT ACRLP ACRPL ACVFH ACXNI ADBBV ADCNI ADEZE ADMHG ADMUD ADNMO ADVLN ADXHL AEBSH AEIPS AEKER AETEA AEUPX AEVXI AFFNX AFJKZ AFPUW AFRHN AFTJW AFXIZ AGCQF AGHFR AGQPQ AGUBO AGYEJ AHHHB AHMBA AIEXJ AIGII AIIUN AIKHN AITUG AJRQY AJUYK AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU ANZVX AOMHK APXCP ASPBG AVARZ AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC BNPGV CS3 D0S DU5 EBS EFJIC EFKBS EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA HEG HF~ HMK HMO HMW HMY HVGLF HZ~ H~9 IHE J1W KOM L7B LPU M29 M39 M3V M3Y M41 MO0 MVM N9A NEJ NHB O-L O9- OAUVE OH0 OHT OKEIE OMK OU- OZT P-8 P-9 P2P PC. PQQKQ PRBVW Q38 R2- ROL RPZ RXW SAE SCC SCU SDF SDG SDP SES SEW SKT SPCBC SPS SSB SSH SSO SSS SSY SSZ T5K TAE TAF TN5 TWZ UBW UMD WH7 WUQ X6Y XOL XPP XSW YQR YYQ Z5R ZCG ZGI ZY4 ~G- 6I. AACTN AAFTH AAIAV AAYOK ABTAH AFCTW AFKWA AJOXV AMFUW B-7 RIG AAYXX AGRNS CITATION CGR CUY CVF ECM EIF NPM 7X8 |
ID | FETCH-LOGICAL-c461t-1fa4f2a54b713eefb41e8d30a7ff78fa1cfad63c01e4e475684ad1d054c247023 |
IEDL.DBID | .~1 |
ISSN | 0145-2134 1873-7757 |
IngestDate | Fri Jul 11 10:27:54 EDT 2025 Wed Aug 13 02:09:44 EDT 2025 Tue Jul 01 01:04:30 EDT 2025 Thu Apr 24 23:13:11 EDT 2025 Sat Jul 13 15:32:55 EDT 2024 Tue Aug 26 18:19:09 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Online community Differential association Self-presentation Reciprocity Lawless space |
Language | English |
License | This is an open access article under the CC BY license. Copyright © 2024 The Author(s). Published by Elsevier Ltd.. All rights reserved. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c461t-1fa4f2a54b713eefb41e8d30a7ff78fa1cfad63c01e4e475684ad1d054c247023 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ORCID | 0000-0001-6449-2946 0000-0003-0366-2205 |
OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S0145213424002059 |
PMID | 38735124 |
PQID | 3054434791 |
PQPubID | 23479 |
ParticipantIDs | proquest_miscellaneous_3054434791 pubmed_primary_38735124 crossref_citationtrail_10_1016_j_chiabu_2024_106815 crossref_primary_10_1016_j_chiabu_2024_106815 elsevier_sciencedirect_doi_10_1016_j_chiabu_2024_106815 elsevier_clinicalkey_doi_10_1016_j_chiabu_2024_106815 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | July 2024 2024-07-00 20240701 |
PublicationDateYYYYMMDD | 2024-07-01 |
PublicationDate_xml | – month: 07 year: 2024 text: July 2024 |
PublicationDecade | 2020 |
PublicationPlace | England |
PublicationPlace_xml | – name: England |
PublicationTitle | Child abuse & neglect |
PublicationTitleAlternate | Child Abuse Negl |
PublicationYear | 2024 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Gannon, Blokland, Huikuri, Babchishin, Lehmann (bb0030) 2023; 17 Hsieh, Hou, Chen, Truong (bb0050) 2013 Nagin (bb0135) 2005 Karremann (bb0085) 2007 Kloess, van der Bruggen (bb0095) 2023; 24 Harkins, Dixon (bb0040) 2010; 15 Kim, Chan, Kankanhalli (bb0090) 2012; 23 Nielsen, Rosenthal, Sun, Day, Bevc, Duchesne (bb0140) 2014; 43 Postmes, Spears, Lee, Novak (bb0150) 2005; 89 van der Bruggen, van Balen, van Bunningen, Talens, Owens, Clapp (bb0215) 2022; 67 Owens, Clapp, Craun, van der Bruggen, van Balen, van Bunningen, Talens (bb0145) 2023 Insoll, Ovaska, Nurmi, Aaltonen, Vaaranen-Valkonen (bb0060) 2022; 1 McCarthy (bb0110) 2010; 16 Quayle, Taylor (bb0165) 2003; 6 von Lampe (bb0220) 2016 Joyce, Kraut (bb0080) 2006; 11 Quayle, Taylor (bb0160) 2002; 23 Akers (bb0005) 1973 Herring (bb0045) 2004; 338 Huikuri (bb0055) 2023 Miller, Morris (bb0120) 2016; 62 van der Bruggen, Blokland (bb0210) 2022; 40 Woodhams, Kloess, Jose, Hamilton-Giachritsis (bb0230) 2021; 12 Skrondal, Rabe-Hesketh (bb0190) 2004 van der Bruggen, Blokland (bb0205) 2021; 33 Friedrichs (bb0025) 2022; 31 Morselli, Giguère, Petit (bb0125) 2007; 29 Sutherland (bb0200) 1947 Skardhamar (bb0185) 2010; 48 Hall (bb0035) 2003; 25 IWF (bb0065) 2023 Jin, Li, Zhong, Zhai (bb0075) 2015; 52 Crowther (bb0010) 2019; 19 Rogers, Seigfried-Spellar, Bates, Rux (bb0170) 2021; 66 Seigfried-Spellar (bb0180) 2014; 11 da Cunha, MacCarron, Passold, dos Santos Jr, Oliveira, Gleeson (bb0015) 2020; 10 Li (bb0105) 2015; 8 Merdian (bb0115) 2012 Jenkins (bb0070) 2001 Schwämmlein, Wodzicki (bb0175) 2012; 17 Steel, Newman, O’Rourke, Quayle (bb0195) 2023; 68 Mustafa, Zhang, Naveed (bb0130) 2023; 42 Preece (bb0155) 2001; 20 Krone (bb0100) 2004 Wang, Majeed (bb0225) 2023; 42 Fonhof, van der Bruggen, Takes (bb0020) 2019 Miller (10.1016/j.chiabu.2024.106815_bb0120) 2016; 62 Gannon (10.1016/j.chiabu.2024.106815_bb0030) 2023; 17 Huikuri (10.1016/j.chiabu.2024.106815_bb0055) 2023 Merdian (10.1016/j.chiabu.2024.106815_bb0115) 2012 Schwämmlein (10.1016/j.chiabu.2024.106815_bb0175) 2012; 17 Krone (10.1016/j.chiabu.2024.106815_bb0100) 2004 Joyce (10.1016/j.chiabu.2024.106815_bb0080) 2006; 11 Rogers (10.1016/j.chiabu.2024.106815_bb0170) 2021; 66 McCarthy (10.1016/j.chiabu.2024.106815_bb0110) 2010; 16 van der Bruggen (10.1016/j.chiabu.2024.106815_bb0210) 2022; 40 Karremann (10.1016/j.chiabu.2024.106815_bb0085) 2007 Friedrichs (10.1016/j.chiabu.2024.106815_bb0025) 2022; 31 Seigfried-Spellar (10.1016/j.chiabu.2024.106815_bb0180) 2014; 11 Kloess (10.1016/j.chiabu.2024.106815_bb0095) 2023; 24 Nagin (10.1016/j.chiabu.2024.106815_bb0135) 2005 Preece (10.1016/j.chiabu.2024.106815_bb0155) 2001; 20 von Lampe (10.1016/j.chiabu.2024.106815_bb0220) 2016 IWF (10.1016/j.chiabu.2024.106815_bb0065) Insoll (10.1016/j.chiabu.2024.106815_bb0060) 2022; 1 Li (10.1016/j.chiabu.2024.106815_bb0105) 2015; 8 Hall (10.1016/j.chiabu.2024.106815_bb0035) 2003; 25 Skardhamar (10.1016/j.chiabu.2024.106815_bb0185) 2010; 48 Postmes (10.1016/j.chiabu.2024.106815_bb0150) 2005; 89 Jenkins (10.1016/j.chiabu.2024.106815_bb0070) 2001 Kim (10.1016/j.chiabu.2024.106815_bb0090) 2012; 23 Steel (10.1016/j.chiabu.2024.106815_bb0195) 2023; 68 da Cunha (10.1016/j.chiabu.2024.106815_bb0015) 2020; 10 Skrondal (10.1016/j.chiabu.2024.106815_bb0190) 2004 van der Bruggen (10.1016/j.chiabu.2024.106815_bb0215) 2022; 67 Morselli (10.1016/j.chiabu.2024.106815_bb0125) 2007; 29 van der Bruggen (10.1016/j.chiabu.2024.106815_bb0205) 2021; 33 Fonhof (10.1016/j.chiabu.2024.106815_bb0020) 2019 Woodhams (10.1016/j.chiabu.2024.106815_bb0230) 2021; 12 Owens (10.1016/j.chiabu.2024.106815_bb0145) 2023 Sutherland (10.1016/j.chiabu.2024.106815_bb0200) 1947 Herring (10.1016/j.chiabu.2024.106815_bb0045) 2004; 338 Jin (10.1016/j.chiabu.2024.106815_bb0075) 2015; 52 Harkins (10.1016/j.chiabu.2024.106815_bb0040) 2010; 15 Hsieh (10.1016/j.chiabu.2024.106815_bb0050) 2013 Wang (10.1016/j.chiabu.2024.106815_bb0225) 2023; 42 Quayle (10.1016/j.chiabu.2024.106815_bb0160) 2002; 23 Crowther (10.1016/j.chiabu.2024.106815_bb0010) 2019; 19 Nielsen (10.1016/j.chiabu.2024.106815_bb0140) 2014; 43 Quayle (10.1016/j.chiabu.2024.106815_bb0165) 2003; 6 Akers (10.1016/j.chiabu.2024.106815_bb0005) 1973 Mustafa (10.1016/j.chiabu.2024.106815_bb0130) 2023; 42 |
References_xml | – year: 2001 ident: bb0070 article-title: Beyond tolerance: Child pornography on the Internet – volume: 11 start-page: 723 year: 2006 end-page: 747 ident: bb0080 article-title: Predicting continued participation in newsgroups publication-title: Journal of Computer-Mediated Communication – volume: 6 start-page: 93 year: 2003 end-page: 106 ident: bb0165 article-title: Model of problematic Internet use in people with a sexual interest in children publication-title: Cyberpsychology & Behavior – volume: 42 start-page: 10468 year: 2023 end-page: 10481 ident: bb0130 article-title: What motivates online community contributors to contribute consistently? A case study on Stackoverflow netizens publication-title: Current Psychology – year: 2012 ident: bb0115 article-title: Offenders who use child sexual exploitation material: Development of an integrated model for their classification, assessment, and treatment – year: 2023 ident: bb0065 article-title: #BehindTheScreens. A deep dive into the digital and social emergency happening #BehindTheScreens, in children's bedrooms. The annual report 2022 – volume: 29 start-page: 143 year: 2007 end-page: 153 ident: bb0125 article-title: The efficiency/security trade-off in criminal networks publication-title: Social Networks – year: 2005 ident: bb0135 article-title: Group-based modeling of development – volume: 25 start-page: 287 year: 2003 end-page: 306 ident: bb0035 article-title: Borrowed theory: Applying exchange theories in information science research publication-title: Library & Information Science Research – volume: 16 start-page: 181 year: 2010 end-page: 195 ident: bb0110 article-title: Internet sexual activity: A comparison between contact and non-contact child pornography offenders publication-title: Journal of Sexual Aggression – volume: 11 start-page: 252 year: 2014 end-page: 260 ident: bb0180 article-title: Distinguishing the viewers, downloaders, and exchangers of Internet child pornography by individual differences: Preliminary findings publication-title: Digital Investigation – volume: 10 start-page: 73 year: 2020 ident: bb0015 article-title: Assessing police topological efficiency in a major sting operation on the dark web publication-title: Scientific Reports – volume: 23 start-page: 365 year: 2002 end-page: 395 ident: bb0160 article-title: Child pornography and the Internet: Perpetuating a cycle of abuse publication-title: Deviant Behaviour: An Interdisciplinary Journal – year: 2004 ident: bb0100 article-title: A typology of online child pornography offending publication-title: Trends & issues in crime and criminal justice – year: 2004 ident: bb0190 article-title: Generalized latent variable modeling: Multilevel, longitudinal, and structural equation models – year: 2023 ident: bb0145 article-title: Analysis of topic popularity within a child sexual exploitation Tor hidden service publication-title: Aggression and Violent Behavior – volume: 67 year: 2022 ident: bb0215 article-title: Even “lurkers” download: The behavior and illegal activities of members on a child sexual exploitation TOR hidden service publication-title: Aggression and Violent Behavior – volume: 19 start-page: 931 year: 2019 end-page: 949 ident: bb0010 article-title: Multilevel mixed-effects parametric survival analysis: Estimation, simulation, and application publication-title: The Stata Journal – volume: 68 year: 2023 ident: bb0195 article-title: Lawless space theory for online child sexual exploitation material offending publication-title: Aggression and Violent Behavior – volume: 40 start-page: 865 year: 2022 end-page: 891 ident: bb0210 article-title: Profiling darkweb child sexual exploitation material forum members using longitudinal posting history data publication-title: Social Science Computer Review – year: 1947 ident: bb0200 article-title: Principles of criminology – volume: 31 start-page: 169 year: 2022 end-page: 191 ident: bb0025 article-title: Transnational networks of child sexual abuse and consumerism: Edward Brongersma and the pedophilia debate of the 1970s and 1980s publication-title: Journal of the History of Sexuality – volume: 17 start-page: 353 year: 2023 end-page: 365 ident: bb0030 article-title: Child sexual abuse material on the darknet publication-title: Forensische Psychiatrie, Psychologie, Kriminologie – volume: 1 start-page: 2 year: 2022 ident: bb0060 article-title: Risk factors for child sexual abuse material users contacting children online: Results of an anonymous multilingual survey on the dark web publication-title: Journal of Online Trust and Safety – volume: 15 start-page: 87 year: 2010 end-page: 99 ident: bb0040 article-title: Sexual offending in groups: An evaluation publication-title: Aggression and Violent Behavior – start-page: 1 year: 2023 end-page: 10 ident: bb0055 article-title: Users of online child sexual abuse material publication-title: Journal of Police and Criminal Psychology – volume: 20 start-page: 347 year: 2001 end-page: 356 ident: bb0155 article-title: Sociability and usability in online communities: Determining and measuring success publication-title: Behaviour & Information Technology – volume: 89 start-page: 747 year: 2005 ident: bb0150 article-title: Individuality and social influence in groups: Inductive and deductive routes to group identity publication-title: Journal of Personality and Social Psychology – volume: 23 start-page: 1232 year: 2012 end-page: 1245 ident: bb0090 article-title: What motivates people to purchase digital items on virtual community websites? The desire for online self-presentation publication-title: Information Systems Research – volume: 48 start-page: 295 year: 2010 end-page: 320 ident: bb0185 article-title: Distinguishing facts and artifacts in group-based modeling publication-title: Criminology – volume: 42 start-page: 1357 year: 2023 end-page: 1373 ident: bb0225 article-title: How do users’ feedback influence creators’ contributions: An empirical study of an online music community publication-title: Behaviour & Information Technology – year: 2007 ident: bb0085 article-title: Es geschieht am helllichten Tag. Die verborgene Welt der Pädophilen und wie wir unsere Kinder vor Missbrauch schützen – volume: 17 start-page: 387 year: 2012 end-page: 407 ident: bb0175 article-title: What to tell about me? Self-presentation in online communities publication-title: Journal of Computer-Mediated Communication – volume: 33 start-page: 950 year: 2021 end-page: 974 ident: bb0205 article-title: A crime script analysis of child sexual exploitation material fora on the darkweb publication-title: Sexual Abuse – start-page: 827 year: 2013 end-page: 838 ident: bb0050 article-title: “Welcome!” social and psychological predictors of volunteer socializers in online communities publication-title: Proceedings of the 2013 conference on Computer supported cooperative work – year: 1973 ident: bb0005 article-title: Deviant behavior: A social learning approach – volume: 338 start-page: 376 year: 2004 ident: bb0045 article-title: Computer-mediated discourse analysis: An approach to researching online behavior publication-title: Designing for virtual communities in the service of learning – volume: 52 start-page: 840 year: 2015 end-page: 849 ident: bb0075 article-title: Why users contribute knowledge to online communities: An empirical study of an online social Q&A community publication-title: Information & Management – volume: 62 start-page: 1543 year: 2016 end-page: 1569 ident: bb0120 article-title: Virtual peer effects in social learning theory publication-title: Crime and Delinquency – year: 2016 ident: bb0220 article-title: Organized crime: Analyzing illegal activities, criminal structures, and extra-legal governance – start-page: 412 year: 2019 end-page: 423 ident: bb0020 article-title: Characterizing key players in child exploitation networks on the dark net publication-title: Complex networks and their applications VII: Volume 2 proceedings the 7th international conference on Complex networks and their applications COMPLEX NETWORKS 2018 7 – volume: 43 start-page: 4337 year: 2014 end-page: 4356 ident: bb0140 article-title: Group-based criminal trajectory analysis using cross-validation criteria publication-title: Communications in Statistics-Theory and Methods – volume: 66 start-page: 2354 year: 2021 end-page: 2361 ident: bb0170 article-title: Online child pornography offender risk assessment using digital forensic artifacts: The need for a hybrid model publication-title: Journal of Forensic Sciences – volume: 12 year: 2021 ident: bb0230 article-title: Characteristics and behaviors of anonymous users of dark web platforms suspected of child sexual offenses publication-title: Frontiers in Psychology – volume: 24 start-page: 1220 year: 2023 end-page: 1237 ident: bb0095 article-title: Trust and relationship development among users in Dark Web child sexual exploitation and abuse networks: A literature review from a psychological and criminological perspective publication-title: Trauma, Violence, & Abuse – volume: 8 start-page: 170 year: 2015 end-page: 183 ident: bb0105 article-title: Knowledge sharing in virtual communities: A social exchange theory perspective publication-title: Journal of Industrial Engineering and Management – volume: 62 start-page: 1543 year: 2016 ident: 10.1016/j.chiabu.2024.106815_bb0120 article-title: Virtual peer effects in social learning theory publication-title: Crime and Delinquency doi: 10.1177/0011128714526499 – volume: 33 start-page: 950 year: 2021 ident: 10.1016/j.chiabu.2024.106815_bb0205 article-title: A crime script analysis of child sexual exploitation material fora on the darkweb publication-title: Sexual Abuse doi: 10.1177/1079063220981063 – year: 2016 ident: 10.1016/j.chiabu.2024.106815_bb0220 – volume: 23 start-page: 1232 year: 2012 ident: 10.1016/j.chiabu.2024.106815_bb0090 article-title: What motivates people to purchase digital items on virtual community websites? The desire for online self-presentation publication-title: Information Systems Research doi: 10.1287/isre.1110.0411 – volume: 12 year: 2021 ident: 10.1016/j.chiabu.2024.106815_bb0230 article-title: Characteristics and behaviors of anonymous users of dark web platforms suspected of child sexual offenses publication-title: Frontiers in Psychology doi: 10.3389/fpsyg.2021.623668 – year: 2004 ident: 10.1016/j.chiabu.2024.106815_bb0190 – volume: 67 year: 2022 ident: 10.1016/j.chiabu.2024.106815_bb0215 article-title: Even “lurkers” download: The behavior and illegal activities of members on a child sexual exploitation TOR hidden service publication-title: Aggression and Violent Behavior doi: 10.1016/j.avb.2022.101793 – volume: 25 start-page: 287 year: 2003 ident: 10.1016/j.chiabu.2024.106815_bb0035 article-title: Borrowed theory: Applying exchange theories in information science research publication-title: Library & Information Science Research doi: 10.1016/S0740-8188(03)00031-8 – volume: 338 start-page: 376 year: 2004 ident: 10.1016/j.chiabu.2024.106815_bb0045 article-title: Computer-mediated discourse analysis: An approach to researching online behavior – ident: 10.1016/j.chiabu.2024.106815_bb0065 – volume: 11 start-page: 723 year: 2006 ident: 10.1016/j.chiabu.2024.106815_bb0080 article-title: Predicting continued participation in newsgroups publication-title: Journal of Computer-Mediated Communication doi: 10.1111/j.1083-6101.2006.00033.x – volume: 11 start-page: 252 year: 2014 ident: 10.1016/j.chiabu.2024.106815_bb0180 article-title: Distinguishing the viewers, downloaders, and exchangers of Internet child pornography by individual differences: Preliminary findings publication-title: Digital Investigation doi: 10.1016/j.diin.2014.07.003 – year: 2005 ident: 10.1016/j.chiabu.2024.106815_bb0135 – start-page: 412 year: 2019 ident: 10.1016/j.chiabu.2024.106815_bb0020 article-title: Characterizing key players in child exploitation networks on the dark net – start-page: 1 year: 2023 ident: 10.1016/j.chiabu.2024.106815_bb0055 article-title: Users of online child sexual abuse material publication-title: Journal of Police and Criminal Psychology – volume: 31 start-page: 169 year: 2022 ident: 10.1016/j.chiabu.2024.106815_bb0025 article-title: Transnational networks of child sexual abuse and consumerism: Edward Brongersma and the pedophilia debate of the 1970s and 1980s publication-title: Journal of the History of Sexuality doi: 10.7560/JHS31202 – volume: 24 start-page: 1220 year: 2023 ident: 10.1016/j.chiabu.2024.106815_bb0095 article-title: Trust and relationship development among users in Dark Web child sexual exploitation and abuse networks: A literature review from a psychological and criminological perspective publication-title: Trauma, Violence, & Abuse doi: 10.1177/15248380211057274 – volume: 16 start-page: 181 year: 2010 ident: 10.1016/j.chiabu.2024.106815_bb0110 article-title: Internet sexual activity: A comparison between contact and non-contact child pornography offenders publication-title: Journal of Sexual Aggression doi: 10.1080/13552601003760006 – volume: 29 start-page: 143 year: 2007 ident: 10.1016/j.chiabu.2024.106815_bb0125 article-title: The efficiency/security trade-off in criminal networks publication-title: Social Networks doi: 10.1016/j.socnet.2006.05.001 – volume: 42 start-page: 10468 year: 2023 ident: 10.1016/j.chiabu.2024.106815_bb0130 article-title: What motivates online community contributors to contribute consistently? A case study on Stackoverflow netizens publication-title: Current Psychology doi: 10.1007/s12144-022-03307-4 – volume: 8 start-page: 170 year: 2015 ident: 10.1016/j.chiabu.2024.106815_bb0105 article-title: Knowledge sharing in virtual communities: A social exchange theory perspective publication-title: Journal of Industrial Engineering and Management – volume: 48 start-page: 295 year: 2010 ident: 10.1016/j.chiabu.2024.106815_bb0185 article-title: Distinguishing facts and artifacts in group-based modeling publication-title: Criminology doi: 10.1111/j.1745-9125.2010.00185.x – volume: 43 start-page: 4337 year: 2014 ident: 10.1016/j.chiabu.2024.106815_bb0140 article-title: Group-based criminal trajectory analysis using cross-validation criteria publication-title: Communications in Statistics-Theory and Methods doi: 10.1080/03610926.2012.719986 – volume: 6 start-page: 93 year: 2003 ident: 10.1016/j.chiabu.2024.106815_bb0165 article-title: Model of problematic Internet use in people with a sexual interest in children publication-title: Cyberpsychology & Behavior doi: 10.1089/109493103321168009 – year: 2007 ident: 10.1016/j.chiabu.2024.106815_bb0085 – volume: 68 year: 2023 ident: 10.1016/j.chiabu.2024.106815_bb0195 article-title: Lawless space theory for online child sexual exploitation material offending publication-title: Aggression and Violent Behavior doi: 10.1016/j.avb.2022.101809 – volume: 10 start-page: 73 year: 2020 ident: 10.1016/j.chiabu.2024.106815_bb0015 article-title: Assessing police topological efficiency in a major sting operation on the dark web publication-title: Scientific Reports doi: 10.1038/s41598-019-56704-4 – volume: 1 start-page: 2 year: 2022 ident: 10.1016/j.chiabu.2024.106815_bb0060 article-title: Risk factors for child sexual abuse material users contacting children online: Results of an anonymous multilingual survey on the dark web publication-title: Journal of Online Trust and Safety doi: 10.54501/jots.v1i2.29 – year: 1973 ident: 10.1016/j.chiabu.2024.106815_bb0005 – volume: 66 start-page: 2354 year: 2021 ident: 10.1016/j.chiabu.2024.106815_bb0170 article-title: Online child pornography offender risk assessment using digital forensic artifacts: The need for a hybrid model publication-title: Journal of Forensic Sciences doi: 10.1111/1556-4029.14820 – year: 2023 ident: 10.1016/j.chiabu.2024.106815_bb0145 article-title: Analysis of topic popularity within a child sexual exploitation Tor hidden service publication-title: Aggression and Violent Behavior doi: 10.1016/j.avb.2022.101808 – volume: 52 start-page: 840 year: 2015 ident: 10.1016/j.chiabu.2024.106815_bb0075 article-title: Why users contribute knowledge to online communities: An empirical study of an online social Q&A community publication-title: Information & Management doi: 10.1016/j.im.2015.07.005 – year: 2004 ident: 10.1016/j.chiabu.2024.106815_bb0100 article-title: A typology of online child pornography offending – volume: 20 start-page: 347 year: 2001 ident: 10.1016/j.chiabu.2024.106815_bb0155 article-title: Sociability and usability in online communities: Determining and measuring success publication-title: Behaviour & Information Technology doi: 10.1080/01449290110084683 – volume: 15 start-page: 87 year: 2010 ident: 10.1016/j.chiabu.2024.106815_bb0040 article-title: Sexual offending in groups: An evaluation publication-title: Aggression and Violent Behavior doi: 10.1016/j.avb.2009.08.006 – year: 2001 ident: 10.1016/j.chiabu.2024.106815_bb0070 – start-page: 827 year: 2013 ident: 10.1016/j.chiabu.2024.106815_bb0050 article-title: “Welcome!” social and psychological predictors of volunteer socializers in online communities – volume: 40 start-page: 865 year: 2022 ident: 10.1016/j.chiabu.2024.106815_bb0210 article-title: Profiling darkweb child sexual exploitation material forum members using longitudinal posting history data publication-title: Social Science Computer Review doi: 10.1177/0894439321994894 – volume: 89 start-page: 747 year: 2005 ident: 10.1016/j.chiabu.2024.106815_bb0150 article-title: Individuality and social influence in groups: Inductive and deductive routes to group identity publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.89.5.747 – volume: 19 start-page: 931 year: 2019 ident: 10.1016/j.chiabu.2024.106815_bb0010 article-title: Multilevel mixed-effects parametric survival analysis: Estimation, simulation, and application publication-title: The Stata Journal doi: 10.1177/1536867X19893639 – volume: 17 start-page: 353 year: 2023 ident: 10.1016/j.chiabu.2024.106815_bb0030 article-title: Child sexual abuse material on the darknet publication-title: Forensische Psychiatrie, Psychologie, Kriminologie doi: 10.1007/s11757-023-00790-8 – volume: 17 start-page: 387 year: 2012 ident: 10.1016/j.chiabu.2024.106815_bb0175 article-title: What to tell about me? Self-presentation in online communities publication-title: Journal of Computer-Mediated Communication doi: 10.1111/j.1083-6101.2012.01582.x – year: 1947 ident: 10.1016/j.chiabu.2024.106815_bb0200 – volume: 23 start-page: 365 year: 2002 ident: 10.1016/j.chiabu.2024.106815_bb0160 article-title: Child pornography and the Internet: Perpetuating a cycle of abuse publication-title: Deviant Behaviour: An Interdisciplinary Journal doi: 10.1080/01639620290086413 – year: 2012 ident: 10.1016/j.chiabu.2024.106815_bb0115 – volume: 42 start-page: 1357 year: 2023 ident: 10.1016/j.chiabu.2024.106815_bb0225 article-title: How do users’ feedback influence creators’ contributions: An empirical study of an online music community publication-title: Behaviour & Information Technology doi: 10.1080/0144929X.2022.2073472 |
SSID | ssj0000575 |
Score | 2.444783 |
Snippet | The darknet hosts an increasing number of hidden services dedicated to the distribution of child sexual abuse material (CSAM). Given that by contributing CSAM... |
SourceID | proquest pubmed crossref elsevier |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 106815 |
SubjectTerms | Child Child Abuse, Sexual - psychology Child Abuse, Sexual - statistics & numerical data Differential association Female Humans Law Enforcement - methods Lawless space Male Online community Reciprocity Self-presentation Social Capital Social Learning Social Media - statistics & numerical data Social Network Analysis Social Networking |
Title | Why do users continue to contribute to darknet Child Sexual Abuse Material forums? Examining social exchange, social capital, and social learning explanations using digital forensic artifacts |
URI | https://www.clinicalkey.com/#!/content/1-s2.0-S0145213424002059 https://dx.doi.org/10.1016/j.chiabu.2024.106815 https://www.ncbi.nlm.nih.gov/pubmed/38735124 https://www.proquest.com/docview/3054434791 |
Volume | 153 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELaqcuGCKM-FUg0S4tSwm8SxzQmtqlYLqL1A1d4sv7IsXZLVJiu1F_4afw2PHS9CAhVxi0czymPG47HzzQwhr5TwrpGrMnOuLjKqijoTxm9WtPOrpapUyUJ1_tMzNjunHy6ryx1ylHJhEFY5-P7o04O3Hijj4WuOV4vFGGFJFdYjQxRk4aMEzGCnHK38zfdfMA-MRyKMscqQO6XPBYwXwon1xu8SC-pJTGBz3D8vT38LP8MydHKf3BviR5jGR9wjO655QPZjki1cuGWt1g5eQyK066uH5MfFlxuwLeCBRAcITl80Gwd9G65Dx6swsmp91bgeQrlj-BSKMcNUezE4VX0wVQjFG7p3cHytvoXeEhBP3cFdxxziw0QwKjQkOQTV2EQbelTMPfdqqeJBZAeIvZ-DXcyRH--AoHoDqAbMu-gekfOT489Hs2xo3JAZyvI-y2tFa69pqv0W2BuBprkTtpwoXtdc1Co3tbKsNJPcUUd5xQRVNrc-ejQF5T6KeEx2m7ZxTwm8LazmmglLtaC5YUJPKssZV46ZQhfliJRJX9IMVc2xucZSJvjaVxm1LFHLMmp5RLKt1CpW9biFv0qmIFPGqvex0i87t8jxrdxvVv0Pki-TxUk_4fEvjmpcu-mkd9CUYv5vPiJPoilu36EUvPQRHH323_d9Tu7iKAKS98luv964Fz7s6vVBmFcH5M70_cfZ2U8vdi-s |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NbtQwELaqcoAL4p-FAoMEnBp2kzhOOCBUQast7fZCq_Zm_Jdl6ZJdbbKivfBSPACvxoydLEICFSH1lkw8iuOxZ8bONzOMPVMFqsZcpZFzZRJxlZRRYXCzoh1aS5WpVPjs_KMDMTzi70-ykzX2vYuFIVhlq_uDTvfauqX029HszyeTPsGSMspHRijIBL2EFlm5586_4r6tfr37DoX8PEl2tg_fDqO2tEBkuIibKC4VL7EvXOMmDbupeewKmw5UXpZ5UarYlMqK1Axixx3PM1FwZWOL_o1JeO6zHaDev8JRXVDZhJfffuFKyAEKuMksou518XoeVEb4Zb3EbWnCkSQKqsb7Z3v4N3_X272dG-x667DCVhiTm2zNVbfYRojqhWM3LdXCwQvoCLPF6W324_jTOdgZ0AlIDYSGn1RLB83MX_sSW_7OqsVp5Rrw-ZXhg8_-DFsa2WCkGr82wGeLqN_A9pn64otZQDjmB3cWgpY3O4JRvgLKJqjKdrS2KMYYW8-nKpx81kBg_zHYyZja0xsIxW-A5E6BHvUddnQp4rzL1qtZ5e4zeJVYnWtRWK4LHhtR6EFmc5ErJ0yik7TH0k5e0rRp1Kmax1R2eLnPMkhZkpRlkHKPRSuueUgjckH7rJsKsguRRaUu0c5dwJev-H5bRv_A-bSbcRI1DP02UpWbLWuJFoFzCjiOe-xemIqrb0iLPEWXkT_47_c-YVeHh6N9ub97sPeQXaMnAQ29wdabxdI9Qp-v0Y_9GgP28bIX9U-8zmwI |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Why+do+users+continue+to+contribute+to+darknet+Child+Sexual+Abuse+Material+forums%3F+Examining+social+exchange%2C+social+capital%2C+and+social+learning+explanations+using+digital+forensic+artifacts&rft.jtitle=Child+abuse+%26+neglect&rft.au=Blokland%2C+Arjan&rft.au=Daser%2C+Anton&rft.au=de+Boer%2C+Meike&rft.au=Gannon%2C+Colm&rft.date=2024-07-01&rft.issn=1873-7757&rft.eissn=1873-7757&rft.volume=153&rft.spage=106815&rft_id=info:doi/10.1016%2Fj.chiabu.2024.106815&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0145-2134&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0145-2134&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0145-2134&client=summon |