{"id":"https://openalex.org/W6888050378","doi":"https://doi.org/10.18420/informatik2021-075","title":"Herausforderungen beim Einsatz Kunstlicher Intelligenz zur Erkennung von im Zusammenhang mit Kinderpornografie stehenden Mediendateien","display_name":"Herausforderungen beim Einsatz Kunstlicher Intelligenz zur Erkennung von im Zusammenhang mit Kinderpornografie stehenden Mediendateien","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W6888050378","doi":"https://doi.org/10.18420/informatik2021-075"},"language":"de","primary_location":{"id":"doi:10.18420/informatik2021-075","is_oa":true,"landing_page_url":"https://doi.org/10.18420/informatik2021-075","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/informatik2021-075","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Garbers, Nicole","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Garbers, Nicole","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Brodthage, Michael","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Brodthage, Michael","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34386612,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.21209999918937683,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.21209999918937683,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.15809999406337738,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.0714000016450882,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.27469998598098755},{"id":"https://openalex.org/keywords/qualitative-analysis","display_name":"Qualitative analysis","score":0.12129999697208405},{"id":"https://openalex.org/keywords/hyporeflexia","display_name":"Hyporeflexia","score":0.1120000034570694}],"concepts":[{"id":"https://openalex.org/C29456083","wikidata":"https://www.wikidata.org/wiki/Q1221899","display_name":"Gynecology","level":1,"score":0.6075000166893005},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.4032000005245209},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.27469998598098755},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.17419999837875366},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.15369999408721924},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.1518000066280365},{"id":"https://openalex.org/C3018587665","wikidata":"https://www.wikidata.org/wiki/Q7268696","display_name":"Qualitative analysis","level":3,"score":0.12129999697208405},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.11590000241994858},{"id":"https://openalex.org/C2777158700","wikidata":"https://www.wikidata.org/wiki/Q1419356","display_name":"Hyporeflexia","level":3,"score":0.1120000034570694},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.10740000009536743}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/informatik2021-075","is_oa":true,"landing_page_url":"https://doi.org/10.18420/informatik2021-075","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/informatik2021-075","is_oa":true,"landing_page_url":"https://doi.org/10.18420/informatik2021-075","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6656345129013062}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Der":[0],"Einsatz":[1,37],"Neuronaler":[2],"Netze":[3],"bietet":[4],"deutlich":[5],"bessere":[6],"Erkennungsraten":[7],"bei":[8,82],"kinderpornografischem":[9],"Bild-":[10],"und":[11,16,60,63],"Videomaterial":[12],"als":[13],"beispielsweise":[14],"Hautanteilfilter":[15],"stellt":[17],"daher":[18],"im":[19,86],"Rahmen":[20],"der":[21,56,61,83],"Strafverfolgung":[22],"ein":[23],"wichtiges":[24],"Werkzeug":[25],"zur":[26],"Vorselektierung":[27],"von":[28,66,85],"Massendaten":[29],"dar.":[30],"Trotz":[31],"aller":[32],"Erfolge":[33],"gibt":[34],"es":[35],"beim":[36],"in":[38,55],"deer":[39],"Praxis":[40],"Herausforderungen,":[41],"die":[42,72],"noch":[43],"detaillierter":[44],"betrachtet":[45],"werden":[46],"mu\u0308ssen.":[47],"Diese":[48],"Ver\u00f6ffentlichung":[49],"besch\u00e4ftigt":[50],"sich":[51],"mit":[52,88],"verschiedenen":[53],"Aspekten":[54],"Datenzusammenstellung":[57],"des":[58,75],"Trainingsmaterials":[59],"Datenvorverarbeitung":[62],"zeigt":[64],"anhand":[65],"Beispielen":[67],"deren":[68],"jeweiligen":[69],"Einfluss":[70],"auf":[71],"sp\u00e4tere":[73],"Klassifizierungsleistung":[74],"Neuronalen":[76],"Netzes":[77],"unter":[78],"den":[79],"besonderen":[80],"Herausforderungen":[81],"Verfolgung":[84],"Zusammenhang":[87],"Kinderpornografie":[89],"stehenden":[90],"Straftaten.":[91]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
