id sid tid token lemma pos work_df3svrqaezdklfstxiwkq7kydu 1 1 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 1 2 ] ] -RRB- work_df3svrqaezdklfstxiwkq7kydu 1 3 Cybercrime Cybercrime NNP work_df3svrqaezdklfstxiwkq7kydu 1 4 and and CC work_df3svrqaezdklfstxiwkq7kydu 1 5 You -PRON- PRP work_df3svrqaezdklfstxiwkq7kydu 1 6 : : : work_df3svrqaezdklfstxiwkq7kydu 1 7 How how WRB work_df3svrqaezdklfstxiwkq7kydu 1 8 Criminals Criminals NNPS work_df3svrqaezdklfstxiwkq7kydu 1 9 Attack Attack NNP work_df3svrqaezdklfstxiwkq7kydu 1 10 and and CC work_df3svrqaezdklfstxiwkq7kydu 1 11 the the DT work_df3svrqaezdklfstxiwkq7kydu 1 12 Human Human NNP work_df3svrqaezdklfstxiwkq7kydu 1 13 Factors Factors NNPS work_df3svrqaezdklfstxiwkq7kydu 1 14 That that IN work_df3svrqaezdklfstxiwkq7kydu 1 15 They -PRON- PRP work_df3svrqaezdklfstxiwkq7kydu 1 16 Seek seek VBP work_df3svrqaezdklfstxiwkq7kydu 1 17 to to TO work_df3svrqaezdklfstxiwkq7kydu 1 18 Exploit exploit VB work_df3svrqaezdklfstxiwkq7kydu 1 19 | | NNP work_df3svrqaezdklfstxiwkq7kydu 1 20 Semantic Semantic NNP work_df3svrqaezdklfstxiwkq7kydu 1 21 Scholar Scholar NNP work_df3svrqaezdklfstxiwkq7kydu 1 22 Skip Skip NNP work_df3svrqaezdklfstxiwkq7kydu 1 23 to to TO work_df3svrqaezdklfstxiwkq7kydu 1 24 search search VB work_df3svrqaezdklfstxiwkq7kydu 1 25 formSkip formSkip NNS work_df3svrqaezdklfstxiwkq7kydu 1 26 to to IN work_df3svrqaezdklfstxiwkq7kydu 1 27 main main JJ work_df3svrqaezdklfstxiwkq7kydu 1 28 content content NN work_df3svrqaezdklfstxiwkq7kydu 1 29 > > NFP work_df3svrqaezdklfstxiwkq7kydu 1 30 Semantic Semantic NNP work_df3svrqaezdklfstxiwkq7kydu 1 31 Scholar Scholar NNP work_df3svrqaezdklfstxiwkq7kydu 1 32 's 's POS work_df3svrqaezdklfstxiwkq7kydu 1 33 Logo Logo NNP work_df3svrqaezdklfstxiwkq7kydu 1 34 Search Search NNP work_df3svrqaezdklfstxiwkq7kydu 1 35 Sign Sign NNP work_df3svrqaezdklfstxiwkq7kydu 1 36 InCreate InCreate NNP work_df3svrqaezdklfstxiwkq7kydu 1 37 Free Free NNP work_df3svrqaezdklfstxiwkq7kydu 1 38 Account Account NNP work_df3svrqaezdklfstxiwkq7kydu 1 39 You -PRON- PRP work_df3svrqaezdklfstxiwkq7kydu 1 40 are be VBP work_df3svrqaezdklfstxiwkq7kydu 1 41 currently currently RB work_df3svrqaezdklfstxiwkq7kydu 1 42 offline offline JJ work_df3svrqaezdklfstxiwkq7kydu 1 43 . . . work_df3svrqaezdklfstxiwkq7kydu 2 1 Some some DT work_df3svrqaezdklfstxiwkq7kydu 2 2 features feature NNS work_df3svrqaezdklfstxiwkq7kydu 2 3 of of IN work_df3svrqaezdklfstxiwkq7kydu 2 4 the the DT work_df3svrqaezdklfstxiwkq7kydu 2 5 site site NN work_df3svrqaezdklfstxiwkq7kydu 2 6 may may MD work_df3svrqaezdklfstxiwkq7kydu 2 7 not not RB work_df3svrqaezdklfstxiwkq7kydu 2 8 work work VB work_df3svrqaezdklfstxiwkq7kydu 2 9 correctly correctly RB work_df3svrqaezdklfstxiwkq7kydu 2 10 . . . work_df3svrqaezdklfstxiwkq7kydu 3 1 DOI:10.1093 DOI:10.1093 NNP work_df3svrqaezdklfstxiwkq7kydu 3 2 / / SYM work_df3svrqaezdklfstxiwkq7kydu 3 3 oxfordhb/9780198812746.013.35 oxfordhb/9780198812746.013.35 NNP work_df3svrqaezdklfstxiwkq7kydu 3 4 Corpus Corpus NNP work_df3svrqaezdklfstxiwkq7kydu 3 5 ID ID NNP work_df3svrqaezdklfstxiwkq7kydu 3 6 : : : work_df3svrqaezdklfstxiwkq7kydu 3 7 53669814Cybercrime 53669814cybercrime CD work_df3svrqaezdklfstxiwkq7kydu 3 8 and and CC work_df3svrqaezdklfstxiwkq7kydu 3 9 You -PRON- PRP work_df3svrqaezdklfstxiwkq7kydu 3 10 : : : work_df3svrqaezdklfstxiwkq7kydu 3 11 How how WRB work_df3svrqaezdklfstxiwkq7kydu 3 12 Criminals Criminals NNPS work_df3svrqaezdklfstxiwkq7kydu 3 13 Attack Attack NNP work_df3svrqaezdklfstxiwkq7kydu 3 14 and and CC work_df3svrqaezdklfstxiwkq7kydu 3 15 the the DT work_df3svrqaezdklfstxiwkq7kydu 3 16 Human Human NNP work_df3svrqaezdklfstxiwkq7kydu 3 17 Factors Factors NNPS work_df3svrqaezdklfstxiwkq7kydu 3 18 That that IN work_df3svrqaezdklfstxiwkq7kydu 3 19 They -PRON- PRP work_df3svrqaezdklfstxiwkq7kydu 3 20 Seek seek VBP work_df3svrqaezdklfstxiwkq7kydu 3 21 to to TO work_df3svrqaezdklfstxiwkq7kydu 3 22 Exploit exploit VB work_df3svrqaezdklfstxiwkq7kydu 3 23 @article{Nurse2018CybercrimeAY @article{Nurse2018CybercrimeAY NNP work_df3svrqaezdklfstxiwkq7kydu 3 24 , , , work_df3svrqaezdklfstxiwkq7kydu 3 25 title={Cybercrime title={cybercrime UH work_df3svrqaezdklfstxiwkq7kydu 3 26 and and CC work_df3svrqaezdklfstxiwkq7kydu 3 27 You -PRON- PRP work_df3svrqaezdklfstxiwkq7kydu 3 28 : : : work_df3svrqaezdklfstxiwkq7kydu 3 29 How how WRB work_df3svrqaezdklfstxiwkq7kydu 3 30 Criminals Criminals NNPS work_df3svrqaezdklfstxiwkq7kydu 3 31 Attack Attack NNP work_df3svrqaezdklfstxiwkq7kydu 3 32 and and CC work_df3svrqaezdklfstxiwkq7kydu 3 33 the the DT work_df3svrqaezdklfstxiwkq7kydu 3 34 Human Human NNP work_df3svrqaezdklfstxiwkq7kydu 3 35 Factors Factors NNPS work_df3svrqaezdklfstxiwkq7kydu 3 36 That that IN work_df3svrqaezdklfstxiwkq7kydu 3 37 They -PRON- PRP work_df3svrqaezdklfstxiwkq7kydu 3 38 Seek seek VBP work_df3svrqaezdklfstxiwkq7kydu 3 39 to to TO work_df3svrqaezdklfstxiwkq7kydu 3 40 Exploit exploit VB work_df3svrqaezdklfstxiwkq7kydu 3 41 } } -RRB- work_df3svrqaezdklfstxiwkq7kydu 3 42 , , , work_df3svrqaezdklfstxiwkq7kydu 3 43 author={Jason author={Jason NNP work_df3svrqaezdklfstxiwkq7kydu 3 44 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 3 45 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 3 46 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 3 47 } } -RRB- work_df3svrqaezdklfstxiwkq7kydu 3 48 , , , work_df3svrqaezdklfstxiwkq7kydu 3 49 journal={ArXiv journal={ArXiv NNP work_df3svrqaezdklfstxiwkq7kydu 3 50 } } -RRB- work_df3svrqaezdklfstxiwkq7kydu 3 51 , , , work_df3svrqaezdklfstxiwkq7kydu 3 52 year={2018 year={2018 NNP work_df3svrqaezdklfstxiwkq7kydu 3 53 } } -RRB- work_df3svrqaezdklfstxiwkq7kydu 3 54 , , , work_df3svrqaezdklfstxiwkq7kydu 3 55 volume={abs/1811.06624 volume={abs/1811.06624 VBZ work_df3svrqaezdklfstxiwkq7kydu 3 56 } } -RRB- work_df3svrqaezdklfstxiwkq7kydu 3 57 } } -RRB- work_df3svrqaezdklfstxiwkq7kydu 3 58 Jason Jason NNP work_df3svrqaezdklfstxiwkq7kydu 3 59 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 3 60 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 3 61 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 3 62 Published publish VBD work_df3svrqaezdklfstxiwkq7kydu 3 63 2018 2018 CD work_df3svrqaezdklfstxiwkq7kydu 3 64 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 3 65 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 3 66 , , , work_df3svrqaezdklfstxiwkq7kydu 3 67 Political Political NNP work_df3svrqaezdklfstxiwkq7kydu 3 68 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 3 69 ArXiv ArXiv NNP work_df3svrqaezdklfstxiwkq7kydu 3 70 Cybercrime Cybercrime NNP work_df3svrqaezdklfstxiwkq7kydu 3 71 is be VBZ work_df3svrqaezdklfstxiwkq7kydu 3 72 a a DT work_df3svrqaezdklfstxiwkq7kydu 3 73 significant significant JJ work_df3svrqaezdklfstxiwkq7kydu 3 74 challenge challenge NN work_df3svrqaezdklfstxiwkq7kydu 3 75 to to IN work_df3svrqaezdklfstxiwkq7kydu 3 76 society society NN work_df3svrqaezdklfstxiwkq7kydu 3 77 , , , work_df3svrqaezdklfstxiwkq7kydu 3 78 but but CC work_df3svrqaezdklfstxiwkq7kydu 3 79 it -PRON- PRP work_df3svrqaezdklfstxiwkq7kydu 3 80 can can MD work_df3svrqaezdklfstxiwkq7kydu 3 81 be be VB work_df3svrqaezdklfstxiwkq7kydu 3 82 particularly particularly RB work_df3svrqaezdklfstxiwkq7kydu 3 83 harmful harmful JJ work_df3svrqaezdklfstxiwkq7kydu 3 84 to to IN work_df3svrqaezdklfstxiwkq7kydu 3 85 the the DT work_df3svrqaezdklfstxiwkq7kydu 3 86 individuals individual NNS work_df3svrqaezdklfstxiwkq7kydu 3 87 who who WP work_df3svrqaezdklfstxiwkq7kydu 3 88 become become VBP work_df3svrqaezdklfstxiwkq7kydu 3 89 victims victim NNS work_df3svrqaezdklfstxiwkq7kydu 3 90 . . . work_df3svrqaezdklfstxiwkq7kydu 4 1 This this DT work_df3svrqaezdklfstxiwkq7kydu 4 2 chapter chapter NN work_df3svrqaezdklfstxiwkq7kydu 4 3 engages engage VBZ work_df3svrqaezdklfstxiwkq7kydu 4 4 in in IN work_df3svrqaezdklfstxiwkq7kydu 4 5 a a DT work_df3svrqaezdklfstxiwkq7kydu 4 6 comprehensive comprehensive JJ work_df3svrqaezdklfstxiwkq7kydu 4 7 and and CC work_df3svrqaezdklfstxiwkq7kydu 4 8 topical topical JJ work_df3svrqaezdklfstxiwkq7kydu 4 9 analysis analysis NN work_df3svrqaezdklfstxiwkq7kydu 4 10 of of IN work_df3svrqaezdklfstxiwkq7kydu 4 11 the the DT work_df3svrqaezdklfstxiwkq7kydu 4 12 cybercrimes cybercrime NNS work_df3svrqaezdklfstxiwkq7kydu 4 13 that that WDT work_df3svrqaezdklfstxiwkq7kydu 4 14 target target VBP work_df3svrqaezdklfstxiwkq7kydu 4 15 individuals individual NNS work_df3svrqaezdklfstxiwkq7kydu 4 16 . . . work_df3svrqaezdklfstxiwkq7kydu 5 1 It -PRON- PRP work_df3svrqaezdklfstxiwkq7kydu 5 2 also also RB work_df3svrqaezdklfstxiwkq7kydu 5 3 examines examine VBZ work_df3svrqaezdklfstxiwkq7kydu 5 4 the the DT work_df3svrqaezdklfstxiwkq7kydu 5 5 motivation motivation NN work_df3svrqaezdklfstxiwkq7kydu 5 6 of of IN work_df3svrqaezdklfstxiwkq7kydu 5 7 criminals criminal NNS work_df3svrqaezdklfstxiwkq7kydu 5 8 that that WDT work_df3svrqaezdklfstxiwkq7kydu 5 9 perpetrate perpetrate VBP work_df3svrqaezdklfstxiwkq7kydu 5 10 such such JJ work_df3svrqaezdklfstxiwkq7kydu 5 11 attacks attack NNS work_df3svrqaezdklfstxiwkq7kydu 5 12 and and CC work_df3svrqaezdklfstxiwkq7kydu 5 13 the the DT work_df3svrqaezdklfstxiwkq7kydu 5 14 key key JJ work_df3svrqaezdklfstxiwkq7kydu 5 15 human human JJ work_df3svrqaezdklfstxiwkq7kydu 5 16 factors factor NNS work_df3svrqaezdklfstxiwkq7kydu 5 17 and and CC work_df3svrqaezdklfstxiwkq7kydu 5 18 psychological psychological JJ work_df3svrqaezdklfstxiwkq7kydu 5 19 aspects aspect NNS work_df3svrqaezdklfstxiwkq7kydu 5 20 that that WDT work_df3svrqaezdklfstxiwkq7kydu 5 21 help help VBP work_df3svrqaezdklfstxiwkq7kydu 5 22 to to TO work_df3svrqaezdklfstxiwkq7kydu 5 23 make make VB work_df3svrqaezdklfstxiwkq7kydu 5 24 cybercriminals cybercriminal NNS work_df3svrqaezdklfstxiwkq7kydu 5 25 successful successful JJ work_df3svrqaezdklfstxiwkq7kydu 5 26 . . . work_df3svrqaezdklfstxiwkq7kydu 6 1 Key key JJ work_df3svrqaezdklfstxiwkq7kydu 6 2 areas area NNS work_df3svrqaezdklfstxiwkq7kydu 6 3 assessed assess VBD work_df3svrqaezdklfstxiwkq7kydu 6 4 include include VBP work_df3svrqaezdklfstxiwkq7kydu 6 5 social social JJ work_df3svrqaezdklfstxiwkq7kydu 6 6 engineering engineering NN work_df3svrqaezdklfstxiwkq7kydu 6 7 ( ( -LRB- work_df3svrqaezdklfstxiwkq7kydu 6 8 e.g. e.g. RB work_df3svrqaezdklfstxiwkq7kydu 6 9 , , , work_df3svrqaezdklfstxiwkq7kydu 6 10 phishing phishing NN work_df3svrqaezdklfstxiwkq7kydu 6 11 , , , work_df3svrqaezdklfstxiwkq7kydu 6 12 romance romance NN work_df3svrqaezdklfstxiwkq7kydu 6 13 scams scam NNS work_df3svrqaezdklfstxiwkq7kydu 6 14 , , , work_df3svrqaezdklfstxiwkq7kydu 6 15 catfishing catfishe VBG work_df3svrqaezdklfstxiwkq7kydu 6 16 ) ) -RRB- work_df3svrqaezdklfstxiwkq7kydu 6 17 , , , work_df3svrqaezdklfstxiwkq7kydu 6 18 online online NN work_df3svrqaezdklfstxiwkq7kydu 6 19 … … NFP work_df3svrqaezdklfstxiwkq7kydu 6 20   _SP work_df3svrqaezdklfstxiwkq7kydu 6 21 Expand Expand NNP work_df3svrqaezdklfstxiwkq7kydu 6 22 View View NNP work_df3svrqaezdklfstxiwkq7kydu 6 23 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 6 24 on on IN work_df3svrqaezdklfstxiwkq7kydu 6 25 arXiv arXiv NNP work_df3svrqaezdklfstxiwkq7kydu 6 26 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 6 27 to to IN work_df3svrqaezdklfstxiwkq7kydu 6 28 Library Library NNP work_df3svrqaezdklfstxiwkq7kydu 6 29 Create Create NNP work_df3svrqaezdklfstxiwkq7kydu 6 30 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 6 31 Cite Cite NNP work_df3svrqaezdklfstxiwkq7kydu 6 32 Launch Launch NNP work_df3svrqaezdklfstxiwkq7kydu 6 33 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 6 34 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 6 35 Share Share NNP work_df3svrqaezdklfstxiwkq7kydu 6 36 This this DT work_df3svrqaezdklfstxiwkq7kydu 6 37 Paper paper NN work_df3svrqaezdklfstxiwkq7kydu 6 38 11 11 CD work_df3svrqaezdklfstxiwkq7kydu 6 39 CitationsBackground CitationsBackground NNP work_df3svrqaezdklfstxiwkq7kydu 6 40 Citations Citations NNPS work_df3svrqaezdklfstxiwkq7kydu 6 41 9 9 CD work_df3svrqaezdklfstxiwkq7kydu 6 42 Methods method NNS work_df3svrqaezdklfstxiwkq7kydu 6 43 Citations citation NNS work_df3svrqaezdklfstxiwkq7kydu 6 44 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 6 45 View View NNP work_df3svrqaezdklfstxiwkq7kydu 6 46 All all DT work_df3svrqaezdklfstxiwkq7kydu 6 47 Figures figure NNS work_df3svrqaezdklfstxiwkq7kydu 6 48 , , , work_df3svrqaezdklfstxiwkq7kydu 6 49 Tables Tables NNPS work_df3svrqaezdklfstxiwkq7kydu 6 50 , , , work_df3svrqaezdklfstxiwkq7kydu 6 51 and and CC work_df3svrqaezdklfstxiwkq7kydu 6 52 Topics Topics NNPS work_df3svrqaezdklfstxiwkq7kydu 6 53 from from IN work_df3svrqaezdklfstxiwkq7kydu 6 54 this this DT work_df3svrqaezdklfstxiwkq7kydu 6 55 paper paper NN work_df3svrqaezdklfstxiwkq7kydu 6 56 figure figure NN work_df3svrqaezdklfstxiwkq7kydu 6 57 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 6 58 table table NN work_df3svrqaezdklfstxiwkq7kydu 6 59 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 6 60 Cybercrime Cybercrime NNP work_df3svrqaezdklfstxiwkq7kydu 6 61 Human Human NNP work_df3svrqaezdklfstxiwkq7kydu 6 62 factors factor NNS work_df3svrqaezdklfstxiwkq7kydu 6 63 and and CC work_df3svrqaezdklfstxiwkq7kydu 6 64 ergonomics ergonomic NNS work_df3svrqaezdklfstxiwkq7kydu 6 65 Phishing phishe VBG work_df3svrqaezdklfstxiwkq7kydu 6 66 Malware Malware NNP work_df3svrqaezdklfstxiwkq7kydu 6 67 Social Social NNP work_df3svrqaezdklfstxiwkq7kydu 6 68 engineering engineering NN work_df3svrqaezdklfstxiwkq7kydu 6 69 ( ( -LRB- work_df3svrqaezdklfstxiwkq7kydu 6 70 security security NN work_df3svrqaezdklfstxiwkq7kydu 6 71 ) ) -RRB- work_df3svrqaezdklfstxiwkq7kydu 6 72 Cyberbullying Cyberbullying NNP work_df3svrqaezdklfstxiwkq7kydu 6 73 Doxing doxe VBG work_df3svrqaezdklfstxiwkq7kydu 6 74 Phone phone NN work_df3svrqaezdklfstxiwkq7kydu 6 75 hacking hack VBG work_df3svrqaezdklfstxiwkq7kydu 6 76 Revenge Revenge NNP work_df3svrqaezdklfstxiwkq7kydu 6 77 porn porn NNP work_df3svrqaezdklfstxiwkq7kydu 6 78 Denial Denial NNP work_df3svrqaezdklfstxiwkq7kydu 6 79 - - HYPH work_df3svrqaezdklfstxiwkq7kydu 6 80 of of IN work_df3svrqaezdklfstxiwkq7kydu 6 81 - - HYPH work_df3svrqaezdklfstxiwkq7kydu 6 82 service service NN work_df3svrqaezdklfstxiwkq7kydu 6 83 attack attack NN work_df3svrqaezdklfstxiwkq7kydu 6 84 Internet internet NN work_df3svrqaezdklfstxiwkq7kydu 6 85 troll troll NN work_df3svrqaezdklfstxiwkq7kydu 6 86 Paper Paper NNP work_df3svrqaezdklfstxiwkq7kydu 6 87 Mentions Mentions NNPS work_df3svrqaezdklfstxiwkq7kydu 6 88 News News NNP work_df3svrqaezdklfstxiwkq7kydu 6 89 Article Article NNP work_df3svrqaezdklfstxiwkq7kydu 6 90 Working work VBG work_df3svrqaezdklfstxiwkq7kydu 6 91 from from IN work_df3svrqaezdklfstxiwkq7kydu 6 92 home home NN work_df3svrqaezdklfstxiwkq7kydu 6 93 risks risk NNS work_df3svrqaezdklfstxiwkq7kydu 6 94 online online RB work_df3svrqaezdklfstxiwkq7kydu 6 95 security security NN work_df3svrqaezdklfstxiwkq7kydu 6 96 and and CC work_df3svrqaezdklfstxiwkq7kydu 6 97 privacy privacy NN work_df3svrqaezdklfstxiwkq7kydu 6 98 : : : work_df3svrqaezdklfstxiwkq7kydu 6 99 How how WRB work_df3svrqaezdklfstxiwkq7kydu 6 100 to to TO work_df3svrqaezdklfstxiwkq7kydu 6 101 stay stay VB work_df3svrqaezdklfstxiwkq7kydu 6 102 protected protect VBN work_df3svrqaezdklfstxiwkq7kydu 6 103 Tech Tech NNP work_df3svrqaezdklfstxiwkq7kydu 6 104 Xplore Xplore NNP work_df3svrqaezdklfstxiwkq7kydu 6 105 27 27 CD work_df3svrqaezdklfstxiwkq7kydu 6 106 March March NNP work_df3svrqaezdklfstxiwkq7kydu 6 107 2020 2020 CD work_df3svrqaezdklfstxiwkq7kydu 6 108 News News NNP work_df3svrqaezdklfstxiwkq7kydu 6 109 Article Article NNP work_df3svrqaezdklfstxiwkq7kydu 6 110 MIL MIL NNP work_df3svrqaezdklfstxiwkq7kydu 6 111 - - HYPH work_df3svrqaezdklfstxiwkq7kydu 6 112 OSI OSI NNP work_df3svrqaezdklfstxiwkq7kydu 6 113 Global Global NNP work_df3svrqaezdklfstxiwkq7kydu 6 114 : : : work_df3svrqaezdklfstxiwkq7kydu 6 115 Working work VBG work_df3svrqaezdklfstxiwkq7kydu 6 116 from from IN work_df3svrqaezdklfstxiwkq7kydu 6 117 home home NN work_df3svrqaezdklfstxiwkq7kydu 6 118 risks risk NNS work_df3svrqaezdklfstxiwkq7kydu 6 119 online online RB work_df3svrqaezdklfstxiwkq7kydu 6 120 security security NN work_df3svrqaezdklfstxiwkq7kydu 6 121 and and CC work_df3svrqaezdklfstxiwkq7kydu 6 122 privacy privacy NN work_df3svrqaezdklfstxiwkq7kydu 6 123 – – : work_df3svrqaezdklfstxiwkq7kydu 6 124 how how WRB work_df3svrqaezdklfstxiwkq7kydu 6 125 to to TO work_df3svrqaezdklfstxiwkq7kydu 6 126 stay stay VB work_df3svrqaezdklfstxiwkq7kydu 6 127 protected protect VBN work_df3svrqaezdklfstxiwkq7kydu 6 128 Foreign Foreign NNP work_df3svrqaezdklfstxiwkq7kydu 6 129 Affairs Affairs NNPS work_df3svrqaezdklfstxiwkq7kydu 6 130 New New NNP work_df3svrqaezdklfstxiwkq7kydu 6 131 Zealand Zealand NNP work_df3svrqaezdklfstxiwkq7kydu 6 132 26 26 CD work_df3svrqaezdklfstxiwkq7kydu 6 133 March March NNP work_df3svrqaezdklfstxiwkq7kydu 6 134 2020 2020 CD work_df3svrqaezdklfstxiwkq7kydu 6 135 News News NNP work_df3svrqaezdklfstxiwkq7kydu 6 136 Article Article NNP work_df3svrqaezdklfstxiwkq7kydu 6 137 Working work VBG work_df3svrqaezdklfstxiwkq7kydu 6 138 from from IN work_df3svrqaezdklfstxiwkq7kydu 6 139 home home NN work_df3svrqaezdklfstxiwkq7kydu 6 140 risks risk NNS work_df3svrqaezdklfstxiwkq7kydu 6 141 online online RB work_df3svrqaezdklfstxiwkq7kydu 6 142 security security NN work_df3svrqaezdklfstxiwkq7kydu 6 143 and and CC work_df3svrqaezdklfstxiwkq7kydu 6 144 privacy privacy NN work_df3svrqaezdklfstxiwkq7kydu 6 145 – – : work_df3svrqaezdklfstxiwkq7kydu 6 146 how how WRB work_df3svrqaezdklfstxiwkq7kydu 6 147 to to TO work_df3svrqaezdklfstxiwkq7kydu 6 148 stay stay VB work_df3svrqaezdklfstxiwkq7kydu 6 149 protected protect VBN work_df3svrqaezdklfstxiwkq7kydu 6 150 Yahoo Yahoo NNP work_df3svrqaezdklfstxiwkq7kydu 6 151 ! ! . work_df3svrqaezdklfstxiwkq7kydu 7 1 News news NN work_df3svrqaezdklfstxiwkq7kydu 7 2 26 26 CD work_df3svrqaezdklfstxiwkq7kydu 7 3 March March NNP work_df3svrqaezdklfstxiwkq7kydu 7 4 2020 2020 CD work_df3svrqaezdklfstxiwkq7kydu 7 5 News News NNP work_df3svrqaezdklfstxiwkq7kydu 7 6 Article Article NNP work_df3svrqaezdklfstxiwkq7kydu 7 7 Working work VBG work_df3svrqaezdklfstxiwkq7kydu 7 8 from from IN work_df3svrqaezdklfstxiwkq7kydu 7 9 home home NN work_df3svrqaezdklfstxiwkq7kydu 7 10 risks risk NNS work_df3svrqaezdklfstxiwkq7kydu 7 11 online online RB work_df3svrqaezdklfstxiwkq7kydu 7 12 security security NN work_df3svrqaezdklfstxiwkq7kydu 7 13 and and CC work_df3svrqaezdklfstxiwkq7kydu 7 14 privacy privacy NN work_df3svrqaezdklfstxiwkq7kydu 7 15 – – : work_df3svrqaezdklfstxiwkq7kydu 7 16 how how WRB work_df3svrqaezdklfstxiwkq7kydu 7 17 to to TO work_df3svrqaezdklfstxiwkq7kydu 7 18 stay stay VB work_df3svrqaezdklfstxiwkq7kydu 7 19 protected protect VBN work_df3svrqaezdklfstxiwkq7kydu 7 20 Yahoo Yahoo NNP work_df3svrqaezdklfstxiwkq7kydu 7 21 ! ! . work_df3svrqaezdklfstxiwkq7kydu 8 1 News news NN work_df3svrqaezdklfstxiwkq7kydu 8 2 26 26 CD work_df3svrqaezdklfstxiwkq7kydu 8 3 March March NNP work_df3svrqaezdklfstxiwkq7kydu 8 4 2020 2020 CD work_df3svrqaezdklfstxiwkq7kydu 8 5 News News NNP work_df3svrqaezdklfstxiwkq7kydu 8 6 Article Article NNP work_df3svrqaezdklfstxiwkq7kydu 8 7 Working work VBG work_df3svrqaezdklfstxiwkq7kydu 8 8 from from IN work_df3svrqaezdklfstxiwkq7kydu 8 9 home home NN work_df3svrqaezdklfstxiwkq7kydu 8 10 risks risk NNS work_df3svrqaezdklfstxiwkq7kydu 8 11 online online RB work_df3svrqaezdklfstxiwkq7kydu 8 12 security security NN work_df3svrqaezdklfstxiwkq7kydu 8 13 and and CC work_df3svrqaezdklfstxiwkq7kydu 8 14 privacy privacy NN work_df3svrqaezdklfstxiwkq7kydu 8 15 – – : work_df3svrqaezdklfstxiwkq7kydu 8 16 how how WRB work_df3svrqaezdklfstxiwkq7kydu 8 17 to to TO work_df3svrqaezdklfstxiwkq7kydu 8 18 stay stay VB work_df3svrqaezdklfstxiwkq7kydu 8 19 protected protect VBN work_df3svrqaezdklfstxiwkq7kydu 8 20 The the DT work_df3svrqaezdklfstxiwkq7kydu 8 21 Conversation Conversation NNP work_df3svrqaezdklfstxiwkq7kydu 8 22 26 26 CD work_df3svrqaezdklfstxiwkq7kydu 8 23 March March NNP work_df3svrqaezdklfstxiwkq7kydu 8 24 2020 2020 CD work_df3svrqaezdklfstxiwkq7kydu 8 25 News News NNP work_df3svrqaezdklfstxiwkq7kydu 8 26 Article Article NNP work_df3svrqaezdklfstxiwkq7kydu 8 27 Working work VBG work_df3svrqaezdklfstxiwkq7kydu 8 28 from from IN work_df3svrqaezdklfstxiwkq7kydu 8 29 home home NN work_df3svrqaezdklfstxiwkq7kydu 8 30 risks risk NNS work_df3svrqaezdklfstxiwkq7kydu 8 31 online online RB work_df3svrqaezdklfstxiwkq7kydu 8 32 security security NN work_df3svrqaezdklfstxiwkq7kydu 8 33 and and CC work_df3svrqaezdklfstxiwkq7kydu 8 34 privacy privacy NN work_df3svrqaezdklfstxiwkq7kydu 8 35 – – : work_df3svrqaezdklfstxiwkq7kydu 8 36 how how WRB work_df3svrqaezdklfstxiwkq7kydu 8 37 to to TO work_df3svrqaezdklfstxiwkq7kydu 8 38 stay stay VB work_df3svrqaezdklfstxiwkq7kydu 8 39 protected protect VBN work_df3svrqaezdklfstxiwkq7kydu 8 40 Yahoo Yahoo NNP work_df3svrqaezdklfstxiwkq7kydu 8 41 ! ! . work_df3svrqaezdklfstxiwkq7kydu 9 1 Finance Finance NNP work_df3svrqaezdklfstxiwkq7kydu 9 2 USA USA NNP work_df3svrqaezdklfstxiwkq7kydu 9 3 26 26 CD work_df3svrqaezdklfstxiwkq7kydu 9 4 March March NNP work_df3svrqaezdklfstxiwkq7kydu 9 5 2020 2020 CD work_df3svrqaezdklfstxiwkq7kydu 9 6 11 11 CD work_df3svrqaezdklfstxiwkq7kydu 9 7 Citations Citations NNPS work_df3svrqaezdklfstxiwkq7kydu 9 8 Citation Citation NNP work_df3svrqaezdklfstxiwkq7kydu 9 9 Type Type NNP work_df3svrqaezdklfstxiwkq7kydu 9 10 Citation Citation NNP work_df3svrqaezdklfstxiwkq7kydu 9 11 Type Type NNP work_df3svrqaezdklfstxiwkq7kydu 9 12 All all DT work_df3svrqaezdklfstxiwkq7kydu 9 13 Types type NNS work_df3svrqaezdklfstxiwkq7kydu 9 14 Cites cite VBZ work_df3svrqaezdklfstxiwkq7kydu 9 15 Results result NNS work_df3svrqaezdklfstxiwkq7kydu 9 16 Cites cite VBZ work_df3svrqaezdklfstxiwkq7kydu 9 17 Methods Methods NNPS work_df3svrqaezdklfstxiwkq7kydu 9 18 Cites Cites NNPS work_df3svrqaezdklfstxiwkq7kydu 9 19 Background Background NNP work_df3svrqaezdklfstxiwkq7kydu 9 20 Has have VBZ work_df3svrqaezdklfstxiwkq7kydu 9 21 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 9 22 Publication Publication NNP work_df3svrqaezdklfstxiwkq7kydu 9 23 Type Type NNP work_df3svrqaezdklfstxiwkq7kydu 9 24 Author author NN work_df3svrqaezdklfstxiwkq7kydu 9 25 More More JJR work_df3svrqaezdklfstxiwkq7kydu 9 26 Filters filter VBZ work_df3svrqaezdklfstxiwkq7kydu 9 27 More More JJR work_df3svrqaezdklfstxiwkq7kydu 9 28 Filters Filters NNPS work_df3svrqaezdklfstxiwkq7kydu 9 29 Filters Filters NNPS work_df3svrqaezdklfstxiwkq7kydu 9 30 Sort Sort NNP work_df3svrqaezdklfstxiwkq7kydu 9 31 by by IN work_df3svrqaezdklfstxiwkq7kydu 9 32 Relevance Relevance NNP work_df3svrqaezdklfstxiwkq7kydu 9 33 Sort Sort NNP work_df3svrqaezdklfstxiwkq7kydu 9 34 by by RB work_df3svrqaezdklfstxiwkq7kydu 9 35 Most Most JJS work_df3svrqaezdklfstxiwkq7kydu 9 36 Influenced Influenced NNP work_df3svrqaezdklfstxiwkq7kydu 9 37 Papers Papers NNPS work_df3svrqaezdklfstxiwkq7kydu 9 38 Sort Sort NNP work_df3svrqaezdklfstxiwkq7kydu 9 39 by by IN work_df3svrqaezdklfstxiwkq7kydu 9 40 Citation Citation NNP work_df3svrqaezdklfstxiwkq7kydu 9 41 Count Count NNP work_df3svrqaezdklfstxiwkq7kydu 9 42 Sort Sort NNP work_df3svrqaezdklfstxiwkq7kydu 9 43 by by IN work_df3svrqaezdklfstxiwkq7kydu 9 44 Recency Recency NNP work_df3svrqaezdklfstxiwkq7kydu 9 45 Cybersecurity Cybersecurity NNP work_df3svrqaezdklfstxiwkq7kydu 9 46 Awareness Awareness NNP work_df3svrqaezdklfstxiwkq7kydu 9 47 Jason Jason NNP work_df3svrqaezdklfstxiwkq7kydu 9 48 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 9 49 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 9 50 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 9 51 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 9 52 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 9 53 ArXiv ArXiv NNP work_df3svrqaezdklfstxiwkq7kydu 9 54 2021 2021 CD work_df3svrqaezdklfstxiwkq7kydu 9 55 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 9 56 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 9 57 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 9 58 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 9 59 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 9 60 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 9 61 The the DT work_df3svrqaezdklfstxiwkq7kydu 9 62 Social Social NNP work_df3svrqaezdklfstxiwkq7kydu 9 63 and and CC work_df3svrqaezdklfstxiwkq7kydu 9 64 Psychological Psychological NNP work_df3svrqaezdklfstxiwkq7kydu 9 65 Impact Impact NNP work_df3svrqaezdklfstxiwkq7kydu 9 66 of of IN work_df3svrqaezdklfstxiwkq7kydu 9 67 Cyber Cyber NNP work_df3svrqaezdklfstxiwkq7kydu 9 68 - - HYPH work_df3svrqaezdklfstxiwkq7kydu 9 69 Attacks Attacks NNP work_df3svrqaezdklfstxiwkq7kydu 9 70 Maria Maria NNP work_df3svrqaezdklfstxiwkq7kydu 9 71 Bada Bada NNP work_df3svrqaezdklfstxiwkq7kydu 9 72 , , , work_df3svrqaezdklfstxiwkq7kydu 9 73 Jason Jason NNP work_df3svrqaezdklfstxiwkq7kydu 9 74 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 9 75 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 9 76 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 9 77 Psychology Psychology NNP work_df3svrqaezdklfstxiwkq7kydu 9 78 , , , work_df3svrqaezdklfstxiwkq7kydu 9 79 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 9 80 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 9 81 ArXiv ArXiv NNP work_df3svrqaezdklfstxiwkq7kydu 9 82 2019 2019 CD work_df3svrqaezdklfstxiwkq7kydu 9 83 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 9 84 View View NNP work_df3svrqaezdklfstxiwkq7kydu 9 85 7 7 CD work_df3svrqaezdklfstxiwkq7kydu 9 86 excerpts excerpt NNS work_df3svrqaezdklfstxiwkq7kydu 9 87 , , , work_df3svrqaezdklfstxiwkq7kydu 9 88 cites cite VBZ work_df3svrqaezdklfstxiwkq7kydu 9 89 background background NN work_df3svrqaezdklfstxiwkq7kydu 9 90 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 9 91 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 9 92 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 9 93 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 9 94 The the DT work_df3svrqaezdklfstxiwkq7kydu 9 95 Group Group NNP work_df3svrqaezdklfstxiwkq7kydu 9 96 Element Element NNP work_df3svrqaezdklfstxiwkq7kydu 9 97 of of IN work_df3svrqaezdklfstxiwkq7kydu 9 98 Cybercrime Cybercrime NNP work_df3svrqaezdklfstxiwkq7kydu 9 99 : : : work_df3svrqaezdklfstxiwkq7kydu 9 100 Types Types NNP work_df3svrqaezdklfstxiwkq7kydu 9 101 , , , work_df3svrqaezdklfstxiwkq7kydu 9 102 Dynamics Dynamics NNPS work_df3svrqaezdklfstxiwkq7kydu 9 103 , , , work_df3svrqaezdklfstxiwkq7kydu 9 104 and and CC work_df3svrqaezdklfstxiwkq7kydu 9 105 Criminal Criminal NNP work_df3svrqaezdklfstxiwkq7kydu 9 106 Operations Operations NNPS work_df3svrqaezdklfstxiwkq7kydu 9 107 Jason Jason NNP work_df3svrqaezdklfstxiwkq7kydu 9 108 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 9 109 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 9 110 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 9 111 , , , work_df3svrqaezdklfstxiwkq7kydu 9 112 Maria Maria NNP work_df3svrqaezdklfstxiwkq7kydu 9 113 Bada Bada NNP work_df3svrqaezdklfstxiwkq7kydu 9 114 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 9 115 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 9 116 , , , work_df3svrqaezdklfstxiwkq7kydu 9 117 Sociology Sociology NNP work_df3svrqaezdklfstxiwkq7kydu 9 118 ArXiv ArXiv NNP work_df3svrqaezdklfstxiwkq7kydu 9 119 2019 2019 CD work_df3svrqaezdklfstxiwkq7kydu 9 120 6 6 CD work_df3svrqaezdklfstxiwkq7kydu 9 121 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 9 122 View View NNP work_df3svrqaezdklfstxiwkq7kydu 9 123 2 2 CD work_df3svrqaezdklfstxiwkq7kydu 9 124 excerpts excerpt NNS work_df3svrqaezdklfstxiwkq7kydu 9 125 , , , work_df3svrqaezdklfstxiwkq7kydu 9 126 cites cite VBZ work_df3svrqaezdklfstxiwkq7kydu 9 127 background background NN work_df3svrqaezdklfstxiwkq7kydu 9 128 and and CC work_df3svrqaezdklfstxiwkq7kydu 9 129 methods method NNS work_df3svrqaezdklfstxiwkq7kydu 9 130 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 9 131 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 9 132 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 9 133 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 9 134 Cybercrime Cybercrime NNP work_df3svrqaezdklfstxiwkq7kydu 9 135 Investigators Investigators NNPS work_df3svrqaezdklfstxiwkq7kydu 9 136 are be VBP work_df3svrqaezdklfstxiwkq7kydu 9 137 Users user NNS work_df3svrqaezdklfstxiwkq7kydu 9 138 Too too RB work_df3svrqaezdklfstxiwkq7kydu 9 139 ! ! . work_df3svrqaezdklfstxiwkq7kydu 10 1 Understanding understand VBG work_df3svrqaezdklfstxiwkq7kydu 10 2 the the DT work_df3svrqaezdklfstxiwkq7kydu 10 3 Socio Socio NNP work_df3svrqaezdklfstxiwkq7kydu 10 4 - - HYPH work_df3svrqaezdklfstxiwkq7kydu 10 5 Technical Technical NNP work_df3svrqaezdklfstxiwkq7kydu 10 6 Challenges Challenges NNPS work_df3svrqaezdklfstxiwkq7kydu 10 7 Faced face VBN work_df3svrqaezdklfstxiwkq7kydu 10 8 by by IN work_df3svrqaezdklfstxiwkq7kydu 10 9 Law Law NNP work_df3svrqaezdklfstxiwkq7kydu 10 10 Enforcement Enforcement NNP work_df3svrqaezdklfstxiwkq7kydu 10 11 Mariam Mariam NNP work_df3svrqaezdklfstxiwkq7kydu 10 12 Nouh Nouh NNP work_df3svrqaezdklfstxiwkq7kydu 10 13 , , , work_df3svrqaezdklfstxiwkq7kydu 10 14 Jason Jason NNP work_df3svrqaezdklfstxiwkq7kydu 10 15 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 10 16 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 10 17 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 10 18 , , , work_df3svrqaezdklfstxiwkq7kydu 10 19 Helena Helena NNP work_df3svrqaezdklfstxiwkq7kydu 10 20 Webb Webb NNP work_df3svrqaezdklfstxiwkq7kydu 10 21 , , , work_df3svrqaezdklfstxiwkq7kydu 10 22 M. M. NNP work_df3svrqaezdklfstxiwkq7kydu 10 23 Goldsmith Goldsmith NNP work_df3svrqaezdklfstxiwkq7kydu 10 24 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 10 25 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 10 26 NDSS ndss VBP work_df3svrqaezdklfstxiwkq7kydu 10 27 2019 2019 CD work_df3svrqaezdklfstxiwkq7kydu 10 28 2019 2019 CD work_df3svrqaezdklfstxiwkq7kydu 10 29 6 6 CD work_df3svrqaezdklfstxiwkq7kydu 10 30 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 10 31 View View NNP work_df3svrqaezdklfstxiwkq7kydu 10 32 2 2 CD work_df3svrqaezdklfstxiwkq7kydu 10 33 excerpts excerpt NNS work_df3svrqaezdklfstxiwkq7kydu 10 34 , , , work_df3svrqaezdklfstxiwkq7kydu 10 35 cites cite VBZ work_df3svrqaezdklfstxiwkq7kydu 10 36 background background NN work_df3svrqaezdklfstxiwkq7kydu 10 37 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 10 38 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 10 39 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 10 40 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 10 41 Catching catch VBG work_df3svrqaezdklfstxiwkq7kydu 10 42 the the DT work_df3svrqaezdklfstxiwkq7kydu 10 43 Phish Phish NNP work_df3svrqaezdklfstxiwkq7kydu 10 44 : : : work_df3svrqaezdklfstxiwkq7kydu 10 45 Detecting detect VBG work_df3svrqaezdklfstxiwkq7kydu 10 46 Phishing Phishing NNP work_df3svrqaezdklfstxiwkq7kydu 10 47 Attacks Attacks NNPS work_df3svrqaezdklfstxiwkq7kydu 10 48 using use VBG work_df3svrqaezdklfstxiwkq7kydu 10 49 Recurrent recurrent JJ work_df3svrqaezdklfstxiwkq7kydu 10 50 Neural Neural NNP work_df3svrqaezdklfstxiwkq7kydu 10 51 Networks network NNS work_df3svrqaezdklfstxiwkq7kydu 10 52 ( ( -LRB- work_df3svrqaezdklfstxiwkq7kydu 10 53 RNNs rnn NNS work_df3svrqaezdklfstxiwkq7kydu 10 54 ) ) -RRB- work_df3svrqaezdklfstxiwkq7kydu 10 55 Lukas Lukas NNP work_df3svrqaezdklfstxiwkq7kydu 10 56 Halgas Halgas NNP work_df3svrqaezdklfstxiwkq7kydu 10 57 , , , work_df3svrqaezdklfstxiwkq7kydu 10 58 Ioannis Ioannis NNP work_df3svrqaezdklfstxiwkq7kydu 10 59 Agrafiotis Agrafiotis NNP work_df3svrqaezdklfstxiwkq7kydu 10 60 , , , work_df3svrqaezdklfstxiwkq7kydu 10 61 Jason Jason NNP work_df3svrqaezdklfstxiwkq7kydu 10 62 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 10 63 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 10 64 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 10 65 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 10 66 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 10 67 WISA WISA NNP work_df3svrqaezdklfstxiwkq7kydu 10 68 2019 2019 CD work_df3svrqaezdklfstxiwkq7kydu 10 69 6 6 CD work_df3svrqaezdklfstxiwkq7kydu 10 70 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 10 71 View View NNP work_df3svrqaezdklfstxiwkq7kydu 10 72 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 10 73 excerpt excerpt NN work_df3svrqaezdklfstxiwkq7kydu 10 74 , , , work_df3svrqaezdklfstxiwkq7kydu 10 75 cites cite VBZ work_df3svrqaezdklfstxiwkq7kydu 10 76 background background NN work_df3svrqaezdklfstxiwkq7kydu 10 77 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 10 78 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 10 79 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 10 80 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 10 81 Cybercrime Cybercrime NNP work_df3svrqaezdklfstxiwkq7kydu 10 82 in in IN work_df3svrqaezdklfstxiwkq7kydu 10 83 Online Online NNP work_df3svrqaezdklfstxiwkq7kydu 10 84 Dating dating NN work_df3svrqaezdklfstxiwkq7kydu 10 85 Site site NN work_df3svrqaezdklfstxiwkq7kydu 10 86 : : : work_df3svrqaezdklfstxiwkq7kydu 10 87 Pornography Pornography NNP work_df3svrqaezdklfstxiwkq7kydu 10 88 Business Business NNP work_df3svrqaezdklfstxiwkq7kydu 10 89 in in IN work_df3svrqaezdklfstxiwkq7kydu 10 90 the the DT work_df3svrqaezdklfstxiwkq7kydu 10 91 Virtual Virtual NNP work_df3svrqaezdklfstxiwkq7kydu 10 92 World World NNP work_df3svrqaezdklfstxiwkq7kydu 10 93 Rizki Rizki NNP work_df3svrqaezdklfstxiwkq7kydu 10 94 Briandana Briandana NNP work_df3svrqaezdklfstxiwkq7kydu 10 95 , , , work_df3svrqaezdklfstxiwkq7kydu 10 96 Irmawati Irmawati NNP work_df3svrqaezdklfstxiwkq7kydu 10 97 Oktavianingtyas Oktavianingtyas NNP work_df3svrqaezdklfstxiwkq7kydu 10 98 , , , work_df3svrqaezdklfstxiwkq7kydu 10 99 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 10 100 Marta Marta NNP work_df3svrqaezdklfstxiwkq7kydu 10 101 Political Political NNP work_df3svrqaezdklfstxiwkq7kydu 10 102 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 10 103 2020 2020 CD work_df3svrqaezdklfstxiwkq7kydu 10 104 View view NN work_df3svrqaezdklfstxiwkq7kydu 10 105 2 2 CD work_df3svrqaezdklfstxiwkq7kydu 10 106 excerpts excerpt NNS work_df3svrqaezdklfstxiwkq7kydu 10 107 , , , work_df3svrqaezdklfstxiwkq7kydu 10 108 cites cite VBZ work_df3svrqaezdklfstxiwkq7kydu 10 109 background background NN work_df3svrqaezdklfstxiwkq7kydu 10 110 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 10 111 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 10 112 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 10 113 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 10 114 The the DT work_df3svrqaezdklfstxiwkq7kydu 10 115 Data datum NNS work_df3svrqaezdklfstxiwkq7kydu 10 116 that that WDT work_df3svrqaezdklfstxiwkq7kydu 10 117 Drives drive VBZ work_df3svrqaezdklfstxiwkq7kydu 10 118 Cyber Cyber NNP work_df3svrqaezdklfstxiwkq7kydu 10 119 Insurance insurance NN work_df3svrqaezdklfstxiwkq7kydu 10 120 : : : work_df3svrqaezdklfstxiwkq7kydu 10 121 A a DT work_df3svrqaezdklfstxiwkq7kydu 10 122 Study Study NNP work_df3svrqaezdklfstxiwkq7kydu 10 123 into into IN work_df3svrqaezdklfstxiwkq7kydu 10 124 the the DT work_df3svrqaezdklfstxiwkq7kydu 10 125 Underwriting Underwriting NNP work_df3svrqaezdklfstxiwkq7kydu 10 126 and and CC work_df3svrqaezdklfstxiwkq7kydu 10 127 Claims Claims NNPS work_df3svrqaezdklfstxiwkq7kydu 10 128 Processes Processes NNPS work_df3svrqaezdklfstxiwkq7kydu 10 129 Jason Jason NNP work_df3svrqaezdklfstxiwkq7kydu 10 130 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 10 131 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 10 132 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 10 133 , , , work_df3svrqaezdklfstxiwkq7kydu 10 134 Louise Louise NNP work_df3svrqaezdklfstxiwkq7kydu 10 135 Axon Axon NNP work_df3svrqaezdklfstxiwkq7kydu 10 136 , , , work_df3svrqaezdklfstxiwkq7kydu 10 137 Arnau Arnau NNP work_df3svrqaezdklfstxiwkq7kydu 10 138 Erola Erola NNP work_df3svrqaezdklfstxiwkq7kydu 10 139 , , , work_df3svrqaezdklfstxiwkq7kydu 10 140 Ioannis Ioannis NNP work_df3svrqaezdklfstxiwkq7kydu 10 141 Agrafiotis Agrafiotis NNP work_df3svrqaezdklfstxiwkq7kydu 10 142 , , , work_df3svrqaezdklfstxiwkq7kydu 10 143 M. M. NNP work_df3svrqaezdklfstxiwkq7kydu 10 144 Goldsmith Goldsmith NNP work_df3svrqaezdklfstxiwkq7kydu 10 145 , , , work_df3svrqaezdklfstxiwkq7kydu 10 146 S. S. NNP work_df3svrqaezdklfstxiwkq7kydu 10 147 Creese Creese NNP work_df3svrqaezdklfstxiwkq7kydu 10 148 Business Business NNP work_df3svrqaezdklfstxiwkq7kydu 10 149 , , , work_df3svrqaezdklfstxiwkq7kydu 10 150 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 10 151 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 10 152 2020 2020 CD work_df3svrqaezdklfstxiwkq7kydu 10 153 International International NNP work_df3svrqaezdklfstxiwkq7kydu 10 154 Conference Conference NNP work_df3svrqaezdklfstxiwkq7kydu 10 155 on on IN work_df3svrqaezdklfstxiwkq7kydu 10 156 Cyber Cyber NNP work_df3svrqaezdklfstxiwkq7kydu 10 157 Situational Situational NNP work_df3svrqaezdklfstxiwkq7kydu 10 158 Awareness Awareness NNP work_df3svrqaezdklfstxiwkq7kydu 10 159 , , , work_df3svrqaezdklfstxiwkq7kydu 10 160 Data Data NNP work_df3svrqaezdklfstxiwkq7kydu 10 161 Analytics Analytics NNP work_df3svrqaezdklfstxiwkq7kydu 10 162 and and CC work_df3svrqaezdklfstxiwkq7kydu 10 163 Assessment Assessment NNP work_df3svrqaezdklfstxiwkq7kydu 10 164 ( ( -LRB- work_df3svrqaezdklfstxiwkq7kydu 10 165 CyberSA CyberSA NNP work_df3svrqaezdklfstxiwkq7kydu 10 166 ) ) -RRB- work_df3svrqaezdklfstxiwkq7kydu 10 167 2020 2020 CD work_df3svrqaezdklfstxiwkq7kydu 10 168 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 10 169 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 10 170 View View NNP work_df3svrqaezdklfstxiwkq7kydu 10 171 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 10 172 excerpt excerpt NN work_df3svrqaezdklfstxiwkq7kydu 10 173 , , , work_df3svrqaezdklfstxiwkq7kydu 10 174 cites cite VBZ work_df3svrqaezdklfstxiwkq7kydu 10 175 background background NN work_df3svrqaezdklfstxiwkq7kydu 10 176 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 10 177 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 10 178 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 10 179 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 10 180 An an DT work_df3svrqaezdklfstxiwkq7kydu 10 181 application application NN work_df3svrqaezdklfstxiwkq7kydu 10 182 of of IN work_df3svrqaezdklfstxiwkq7kydu 10 183 cyberpsychology cyberpsychology NN work_df3svrqaezdklfstxiwkq7kydu 10 184 in in IN work_df3svrqaezdklfstxiwkq7kydu 10 185 business business NN work_df3svrqaezdklfstxiwkq7kydu 10 186 email email NN work_df3svrqaezdklfstxiwkq7kydu 10 187 compromise compromise NN work_df3svrqaezdklfstxiwkq7kydu 10 188 Shadrack Shadrack NNP work_df3svrqaezdklfstxiwkq7kydu 10 189 Awah Awah NNP work_df3svrqaezdklfstxiwkq7kydu 10 190 Buo Buo NNP work_df3svrqaezdklfstxiwkq7kydu 10 191 Business Business NNP work_df3svrqaezdklfstxiwkq7kydu 10 192 , , , work_df3svrqaezdklfstxiwkq7kydu 10 193 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 10 194 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 10 195 ArXiv ArXiv NNP work_df3svrqaezdklfstxiwkq7kydu 10 196 2020 2020 CD work_df3svrqaezdklfstxiwkq7kydu 10 197 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 10 198 View View NNP work_df3svrqaezdklfstxiwkq7kydu 10 199 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 10 200 excerpt excerpt NN work_df3svrqaezdklfstxiwkq7kydu 10 201 , , , work_df3svrqaezdklfstxiwkq7kydu 10 202 cites cite VBZ work_df3svrqaezdklfstxiwkq7kydu 10 203 background background NN work_df3svrqaezdklfstxiwkq7kydu 10 204 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 10 205 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 10 206 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 10 207 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 10 208 Developing Developing NNP work_df3svrqaezdklfstxiwkq7kydu 10 209 cybersecurity cybersecurity NN work_df3svrqaezdklfstxiwkq7kydu 10 210 education education NN work_df3svrqaezdklfstxiwkq7kydu 10 211 and and CC work_df3svrqaezdklfstxiwkq7kydu 10 212 awareness awareness NN work_df3svrqaezdklfstxiwkq7kydu 10 213 programmes programme NNS work_df3svrqaezdklfstxiwkq7kydu 10 214 for for IN work_df3svrqaezdklfstxiwkq7kydu 10 215 Small small JJ work_df3svrqaezdklfstxiwkq7kydu 10 216 and and CC work_df3svrqaezdklfstxiwkq7kydu 10 217 medium medium JJ work_df3svrqaezdklfstxiwkq7kydu 10 218 - - HYPH work_df3svrqaezdklfstxiwkq7kydu 10 219 sized sized JJ work_df3svrqaezdklfstxiwkq7kydu 10 220 enterprises enterprise NNS work_df3svrqaezdklfstxiwkq7kydu 10 221 ( ( -LRB- work_df3svrqaezdklfstxiwkq7kydu 10 222 SMEs SMEs NNP work_df3svrqaezdklfstxiwkq7kydu 10 223 ) ) -RRB- work_df3svrqaezdklfstxiwkq7kydu 10 224 Maria Maria NNP work_df3svrqaezdklfstxiwkq7kydu 10 225 Bada Bada NNP work_df3svrqaezdklfstxiwkq7kydu 10 226 , , , work_df3svrqaezdklfstxiwkq7kydu 10 227 Jason Jason NNP work_df3svrqaezdklfstxiwkq7kydu 10 228 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 10 229 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 10 230 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 10 231 Business Business NNP work_df3svrqaezdklfstxiwkq7kydu 10 232 , , , work_df3svrqaezdklfstxiwkq7kydu 10 233 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 10 234 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 10 235 Inf Inf NNP work_df3svrqaezdklfstxiwkq7kydu 10 236 . . . work_df3svrqaezdklfstxiwkq7kydu 11 1 Comput comput NN work_df3svrqaezdklfstxiwkq7kydu 11 2 . . . work_df3svrqaezdklfstxiwkq7kydu 12 1 Secur secur NN work_df3svrqaezdklfstxiwkq7kydu 12 2 . . . work_df3svrqaezdklfstxiwkq7kydu 13 1 2019 2019 CD work_df3svrqaezdklfstxiwkq7kydu 13 2 11 11 CD work_df3svrqaezdklfstxiwkq7kydu 13 3 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 13 4 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 13 5 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 13 6 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 13 7 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 13 8 ( ( -LRB- work_df3svrqaezdklfstxiwkq7kydu 13 9 Smart)Watch smart)watch VB work_df3svrqaezdklfstxiwkq7kydu 13 10 Out out RP work_df3svrqaezdklfstxiwkq7kydu 13 11 ! ! . work_df3svrqaezdklfstxiwkq7kydu 14 1 encouraging encourage VBG work_df3svrqaezdklfstxiwkq7kydu 14 2 privacy privacy NN work_df3svrqaezdklfstxiwkq7kydu 14 3 - - HYPH work_df3svrqaezdklfstxiwkq7kydu 14 4 protective protective JJ work_df3svrqaezdklfstxiwkq7kydu 14 5 behavior behavior NN work_df3svrqaezdklfstxiwkq7kydu 14 6 through through IN work_df3svrqaezdklfstxiwkq7kydu 14 7 interactive interactive JJ work_df3svrqaezdklfstxiwkq7kydu 14 8 games game NNS work_df3svrqaezdklfstxiwkq7kydu 14 9 Meredydd Meredydd NNP work_df3svrqaezdklfstxiwkq7kydu 14 10 Williams Williams NNP work_df3svrqaezdklfstxiwkq7kydu 14 11 , , , work_df3svrqaezdklfstxiwkq7kydu 14 12 Jason Jason NNP work_df3svrqaezdklfstxiwkq7kydu 14 13 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 14 14 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 14 15 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 14 16 , , , work_df3svrqaezdklfstxiwkq7kydu 14 17 S. S. NNP work_df3svrqaezdklfstxiwkq7kydu 14 18 Creese Creese NNP work_df3svrqaezdklfstxiwkq7kydu 14 19 Psychology Psychology NNP work_df3svrqaezdklfstxiwkq7kydu 14 20 , , , work_df3svrqaezdklfstxiwkq7kydu 14 21 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 14 22 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 14 23 Int Int NNP work_df3svrqaezdklfstxiwkq7kydu 14 24 . . . work_df3svrqaezdklfstxiwkq7kydu 15 1 J. J. NNP work_df3svrqaezdklfstxiwkq7kydu 15 2 Hum Hum NNP work_df3svrqaezdklfstxiwkq7kydu 15 3 . . . work_df3svrqaezdklfstxiwkq7kydu 16 1 Comput comput NN work_df3svrqaezdklfstxiwkq7kydu 16 2 . . . work_df3svrqaezdklfstxiwkq7kydu 17 1 Stud Stud NNP work_df3svrqaezdklfstxiwkq7kydu 17 2 . . . work_df3svrqaezdklfstxiwkq7kydu 18 1 2019 2019 CD work_df3svrqaezdklfstxiwkq7kydu 18 2 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 18 3 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 18 4 View View NNP work_df3svrqaezdklfstxiwkq7kydu 18 5 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 18 6 excerpt excerpt NN work_df3svrqaezdklfstxiwkq7kydu 18 7 , , , work_df3svrqaezdklfstxiwkq7kydu 18 8 cites cite VBZ work_df3svrqaezdklfstxiwkq7kydu 18 9 background background NN work_df3svrqaezdklfstxiwkq7kydu 18 10 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 18 11 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 18 12 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 18 13 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 18 14 ... ... NFP work_df3svrqaezdklfstxiwkq7kydu 18 15 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 18 16 2 2 CD work_df3svrqaezdklfstxiwkq7kydu 18 17 ... ... : work_df3svrqaezdklfstxiwkq7kydu 18 18 References reference NNS work_df3svrqaezdklfstxiwkq7kydu 18 19 SHOWING show VBG work_df3svrqaezdklfstxiwkq7kydu 18 20 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 18 21 - - SYM work_df3svrqaezdklfstxiwkq7kydu 18 22 10 10 CD work_df3svrqaezdklfstxiwkq7kydu 18 23 OF of IN work_df3svrqaezdklfstxiwkq7kydu 18 24 83 83 CD work_df3svrqaezdklfstxiwkq7kydu 18 25 REFERENCES reference NNS work_df3svrqaezdklfstxiwkq7kydu 18 26 SORT sort JJ work_df3svrqaezdklfstxiwkq7kydu 18 27 BYRelevance byrelevance NN work_df3svrqaezdklfstxiwkq7kydu 18 28 Most most RBS work_df3svrqaezdklfstxiwkq7kydu 18 29 Influenced influence VBD work_df3svrqaezdklfstxiwkq7kydu 18 30 Papers Papers NNP work_df3svrqaezdklfstxiwkq7kydu 18 31 Recency Recency NNP work_df3svrqaezdklfstxiwkq7kydu 18 32 Cyberstalking Cyberstalking NNP work_df3svrqaezdklfstxiwkq7kydu 18 33 , , , work_df3svrqaezdklfstxiwkq7kydu 18 34 a a DT work_df3svrqaezdklfstxiwkq7kydu 18 35 New New NNP work_df3svrqaezdklfstxiwkq7kydu 18 36 Crime Crime NNP work_df3svrqaezdklfstxiwkq7kydu 18 37 : : : work_df3svrqaezdklfstxiwkq7kydu 18 38 Evaluating evaluate VBG work_df3svrqaezdklfstxiwkq7kydu 18 39 the the DT work_df3svrqaezdklfstxiwkq7kydu 18 40 Effectiveness Effectiveness NNP work_df3svrqaezdklfstxiwkq7kydu 18 41 of of IN work_df3svrqaezdklfstxiwkq7kydu 18 42 Current Current NNP work_df3svrqaezdklfstxiwkq7kydu 18 43 State State NNP work_df3svrqaezdklfstxiwkq7kydu 18 44 and and CC work_df3svrqaezdklfstxiwkq7kydu 18 45 Federal Federal NNP work_df3svrqaezdklfstxiwkq7kydu 18 46 Laws Laws NNPS work_df3svrqaezdklfstxiwkq7kydu 18 47 Naomi Naomi NNP work_df3svrqaezdklfstxiwkq7kydu 18 48 Harlin Harlin NNP work_df3svrqaezdklfstxiwkq7kydu 18 49 Goodno Goodno NNP work_df3svrqaezdklfstxiwkq7kydu 18 50 Political Political NNP work_df3svrqaezdklfstxiwkq7kydu 18 51 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 18 52 2006 2006 CD work_df3svrqaezdklfstxiwkq7kydu 18 53 34 34 CD work_df3svrqaezdklfstxiwkq7kydu 18 54 View View NNP work_df3svrqaezdklfstxiwkq7kydu 18 55 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 18 56 excerpt excerpt NN work_df3svrqaezdklfstxiwkq7kydu 18 57 , , , work_df3svrqaezdklfstxiwkq7kydu 18 58 references reference NNS work_df3svrqaezdklfstxiwkq7kydu 18 59 background background NN work_df3svrqaezdklfstxiwkq7kydu 18 60 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 18 61 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 18 62 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 18 63 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 18 64 The the DT work_df3svrqaezdklfstxiwkq7kydu 18 65 Group Group NNP work_df3svrqaezdklfstxiwkq7kydu 18 66 Element Element NNP work_df3svrqaezdklfstxiwkq7kydu 18 67 of of IN work_df3svrqaezdklfstxiwkq7kydu 18 68 Cybercrime Cybercrime NNP work_df3svrqaezdklfstxiwkq7kydu 18 69 : : : work_df3svrqaezdklfstxiwkq7kydu 18 70 Types Types NNP work_df3svrqaezdklfstxiwkq7kydu 18 71 , , , work_df3svrqaezdklfstxiwkq7kydu 18 72 Dynamics Dynamics NNPS work_df3svrqaezdklfstxiwkq7kydu 18 73 , , , work_df3svrqaezdklfstxiwkq7kydu 18 74 and and CC work_df3svrqaezdklfstxiwkq7kydu 18 75 Criminal Criminal NNP work_df3svrqaezdklfstxiwkq7kydu 18 76 Operations Operations NNPS work_df3svrqaezdklfstxiwkq7kydu 18 77 Jason Jason NNP work_df3svrqaezdklfstxiwkq7kydu 18 78 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 18 79 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 18 80 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 18 81 , , , work_df3svrqaezdklfstxiwkq7kydu 18 82 Maria Maria NNP work_df3svrqaezdklfstxiwkq7kydu 18 83 Bada Bada NNP work_df3svrqaezdklfstxiwkq7kydu 18 84 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 18 85 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 18 86 , , , work_df3svrqaezdklfstxiwkq7kydu 18 87 Sociology Sociology NNP work_df3svrqaezdklfstxiwkq7kydu 18 88 ArXiv ArXiv NNP work_df3svrqaezdklfstxiwkq7kydu 18 89 2019 2019 CD work_df3svrqaezdklfstxiwkq7kydu 18 90 6 6 CD work_df3svrqaezdklfstxiwkq7kydu 18 91 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 18 92 View View NNP work_df3svrqaezdklfstxiwkq7kydu 18 93 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 18 94 excerpt excerpt NN work_df3svrqaezdklfstxiwkq7kydu 18 95 , , , work_df3svrqaezdklfstxiwkq7kydu 18 96 references reference NNS work_df3svrqaezdklfstxiwkq7kydu 18 97 background background NN work_df3svrqaezdklfstxiwkq7kydu 18 98 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 18 99 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 18 100 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 18 101 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 18 102 The the DT work_df3svrqaezdklfstxiwkq7kydu 18 103 Internet internet NN work_df3svrqaezdklfstxiwkq7kydu 18 104 as as IN work_df3svrqaezdklfstxiwkq7kydu 18 105 a a DT work_df3svrqaezdklfstxiwkq7kydu 18 106 Conduit Conduit NNP work_df3svrqaezdklfstxiwkq7kydu 18 107 for for IN work_df3svrqaezdklfstxiwkq7kydu 18 108 Criminal Criminal NNP work_df3svrqaezdklfstxiwkq7kydu 18 109 Activity Activity NNP work_df3svrqaezdklfstxiwkq7kydu 18 110 D. D. NNP work_df3svrqaezdklfstxiwkq7kydu 18 111 Wall Wall NNP work_df3svrqaezdklfstxiwkq7kydu 18 112 Political Political NNP work_df3svrqaezdklfstxiwkq7kydu 18 113 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 18 114 2015 2015 CD work_df3svrqaezdklfstxiwkq7kydu 18 115 59 59 CD work_df3svrqaezdklfstxiwkq7kydu 18 116 View view NN work_df3svrqaezdklfstxiwkq7kydu 18 117 2 2 CD work_df3svrqaezdklfstxiwkq7kydu 18 118 excerpts excerpt NNS work_df3svrqaezdklfstxiwkq7kydu 18 119 , , , work_df3svrqaezdklfstxiwkq7kydu 18 120 references reference NNS work_df3svrqaezdklfstxiwkq7kydu 18 121 background background NN work_df3svrqaezdklfstxiwkq7kydu 18 122 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 18 123 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 18 124 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 18 125 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 18 126 Policing Policing NNP work_df3svrqaezdklfstxiwkq7kydu 18 127 Cybercrimes cybercrime NNS work_df3svrqaezdklfstxiwkq7kydu 18 128 : : : work_df3svrqaezdklfstxiwkq7kydu 18 129 Situating situate VBG work_df3svrqaezdklfstxiwkq7kydu 18 130 the the DT work_df3svrqaezdklfstxiwkq7kydu 18 131 Public Public NNP work_df3svrqaezdklfstxiwkq7kydu 18 132 Police Police NNPS work_df3svrqaezdklfstxiwkq7kydu 18 133 in in IN work_df3svrqaezdklfstxiwkq7kydu 18 134 Networks Networks NNP work_df3svrqaezdklfstxiwkq7kydu 18 135 of of IN work_df3svrqaezdklfstxiwkq7kydu 18 136 Security Security NNP work_df3svrqaezdklfstxiwkq7kydu 18 137 within within IN work_df3svrqaezdklfstxiwkq7kydu 18 138 Cyberspace Cyberspace NNP work_df3svrqaezdklfstxiwkq7kydu 18 139 D. D. NNP work_df3svrqaezdklfstxiwkq7kydu 18 140 Wall Wall NNP work_df3svrqaezdklfstxiwkq7kydu 18 141 Political Political NNP work_df3svrqaezdklfstxiwkq7kydu 18 142 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 18 143 , , , work_df3svrqaezdklfstxiwkq7kydu 18 144 Psychology psychology NN work_df3svrqaezdklfstxiwkq7kydu 18 145 2007 2007 CD work_df3svrqaezdklfstxiwkq7kydu 18 146 104 104 CD work_df3svrqaezdklfstxiwkq7kydu 18 147 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 18 148 View View NNP work_df3svrqaezdklfstxiwkq7kydu 18 149 2 2 CD work_df3svrqaezdklfstxiwkq7kydu 18 150 excerpts excerpt NNS work_df3svrqaezdklfstxiwkq7kydu 18 151 , , , work_df3svrqaezdklfstxiwkq7kydu 18 152 references reference NNS work_df3svrqaezdklfstxiwkq7kydu 18 153 background background NN work_df3svrqaezdklfstxiwkq7kydu 18 154 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 18 155 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 18 156 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 18 157 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 18 158 Trustworthy Trustworthy NNP work_df3svrqaezdklfstxiwkq7kydu 18 159 and and CC work_df3svrqaezdklfstxiwkq7kydu 18 160 effective effective JJ work_df3svrqaezdklfstxiwkq7kydu 18 161 communication communication NN work_df3svrqaezdklfstxiwkq7kydu 18 162 of of IN work_df3svrqaezdklfstxiwkq7kydu 18 163 cybersecurity cybersecurity NN work_df3svrqaezdklfstxiwkq7kydu 18 164 risks risk NNS work_df3svrqaezdklfstxiwkq7kydu 18 165 : : : work_df3svrqaezdklfstxiwkq7kydu 18 166 A a DT work_df3svrqaezdklfstxiwkq7kydu 18 167 review review NN work_df3svrqaezdklfstxiwkq7kydu 18 168 Jason Jason NNP work_df3svrqaezdklfstxiwkq7kydu 18 169 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 18 170 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 18 171 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 18 172 , , , work_df3svrqaezdklfstxiwkq7kydu 18 173 S. S. NNP work_df3svrqaezdklfstxiwkq7kydu 18 174 Creese Creese NNP work_df3svrqaezdklfstxiwkq7kydu 18 175 , , , work_df3svrqaezdklfstxiwkq7kydu 18 176 M. M. NNP work_df3svrqaezdklfstxiwkq7kydu 18 177 Goldsmith Goldsmith NNP work_df3svrqaezdklfstxiwkq7kydu 18 178 , , , work_df3svrqaezdklfstxiwkq7kydu 18 179 K. K. NNP work_df3svrqaezdklfstxiwkq7kydu 18 180 Lamberts Lamberts NNPS work_df3svrqaezdklfstxiwkq7kydu 18 181 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 18 182 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 18 183 2011 2011 CD work_df3svrqaezdklfstxiwkq7kydu 18 184 1st 1st JJ work_df3svrqaezdklfstxiwkq7kydu 18 185 Workshop Workshop NNP work_df3svrqaezdklfstxiwkq7kydu 18 186 on on IN work_df3svrqaezdklfstxiwkq7kydu 18 187 Socio Socio NNP work_df3svrqaezdklfstxiwkq7kydu 18 188 - - HYPH work_df3svrqaezdklfstxiwkq7kydu 18 189 Technical Technical NNP work_df3svrqaezdklfstxiwkq7kydu 18 190 Aspects Aspects NNPS work_df3svrqaezdklfstxiwkq7kydu 18 191 in in IN work_df3svrqaezdklfstxiwkq7kydu 18 192 Security Security NNP work_df3svrqaezdklfstxiwkq7kydu 18 193 and and CC work_df3svrqaezdklfstxiwkq7kydu 18 194 Trust Trust NNP work_df3svrqaezdklfstxiwkq7kydu 18 195 ( ( -LRB- work_df3svrqaezdklfstxiwkq7kydu 18 196 STAST STAST NNP work_df3svrqaezdklfstxiwkq7kydu 18 197 ) ) -RRB- work_df3svrqaezdklfstxiwkq7kydu 18 198 2011 2011 CD work_df3svrqaezdklfstxiwkq7kydu 18 199 41 41 CD work_df3svrqaezdklfstxiwkq7kydu 18 200 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 18 201 View View NNP work_df3svrqaezdklfstxiwkq7kydu 18 202 3 3 CD work_df3svrqaezdklfstxiwkq7kydu 18 203 excerpts excerpt NNS work_df3svrqaezdklfstxiwkq7kydu 18 204 , , , work_df3svrqaezdklfstxiwkq7kydu 18 205 references reference NNS work_df3svrqaezdklfstxiwkq7kydu 18 206 background background NN work_df3svrqaezdklfstxiwkq7kydu 18 207 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 18 208 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 18 209 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 18 210 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 18 211 Baiting Baiting NNP work_df3svrqaezdklfstxiwkq7kydu 18 212 the the DT work_df3svrqaezdklfstxiwkq7kydu 18 213 hook hook NN work_df3svrqaezdklfstxiwkq7kydu 18 214 : : : work_df3svrqaezdklfstxiwkq7kydu 18 215 factors factor NNS work_df3svrqaezdklfstxiwkq7kydu 18 216 impacting impact VBG work_df3svrqaezdklfstxiwkq7kydu 18 217 susceptibility susceptibility NN work_df3svrqaezdklfstxiwkq7kydu 18 218 to to IN work_df3svrqaezdklfstxiwkq7kydu 18 219 phishing phishe VBG work_df3svrqaezdklfstxiwkq7kydu 18 220 attacks attack NNS work_df3svrqaezdklfstxiwkq7kydu 18 221 Cristian Cristian NNP work_df3svrqaezdklfstxiwkq7kydu 18 222 Iuga Iuga NNP work_df3svrqaezdklfstxiwkq7kydu 18 223 , , , work_df3svrqaezdklfstxiwkq7kydu 18 224 Jason Jason NNP work_df3svrqaezdklfstxiwkq7kydu 18 225 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 18 226 C. C. NNP work_df3svrqaezdklfstxiwkq7kydu 18 227 Nurse Nurse NNP work_df3svrqaezdklfstxiwkq7kydu 18 228 , , , work_df3svrqaezdklfstxiwkq7kydu 18 229 Arnau Arnau NNP work_df3svrqaezdklfstxiwkq7kydu 18 230 Erola Erola NNP work_df3svrqaezdklfstxiwkq7kydu 18 231 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 18 232 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 18 233 Human Human NNP work_df3svrqaezdklfstxiwkq7kydu 18 234 - - HYPH work_df3svrqaezdklfstxiwkq7kydu 18 235 centric centric NN work_df3svrqaezdklfstxiwkq7kydu 18 236 Computing Computing NNP work_df3svrqaezdklfstxiwkq7kydu 18 237 and and CC work_df3svrqaezdklfstxiwkq7kydu 18 238 Information Information NNP work_df3svrqaezdklfstxiwkq7kydu 18 239 Sciences Sciences NNPS work_df3svrqaezdklfstxiwkq7kydu 18 240 2016 2016 CD work_df3svrqaezdklfstxiwkq7kydu 18 241 47 47 CD work_df3svrqaezdklfstxiwkq7kydu 18 242 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 18 243 View View NNP work_df3svrqaezdklfstxiwkq7kydu 18 244 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 18 245 excerpt excerpt NN work_df3svrqaezdklfstxiwkq7kydu 18 246 , , , work_df3svrqaezdklfstxiwkq7kydu 18 247 references reference NNS work_df3svrqaezdklfstxiwkq7kydu 18 248 background background NN work_df3svrqaezdklfstxiwkq7kydu 18 249 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 18 250 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 18 251 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 18 252 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 18 253 On on IN work_df3svrqaezdklfstxiwkq7kydu 18 254 the the DT work_df3svrqaezdklfstxiwkq7kydu 18 255 definition definition NN work_df3svrqaezdklfstxiwkq7kydu 18 256 and and CC work_df3svrqaezdklfstxiwkq7kydu 18 257 classification classification NN work_df3svrqaezdklfstxiwkq7kydu 18 258 of of IN work_df3svrqaezdklfstxiwkq7kydu 18 259 cybercrime cybercrime NN work_df3svrqaezdklfstxiwkq7kydu 18 260 Sarah Sarah NNP work_df3svrqaezdklfstxiwkq7kydu 18 261 Gordon Gordon NNP work_df3svrqaezdklfstxiwkq7kydu 18 262 , , , work_df3svrqaezdklfstxiwkq7kydu 18 263 R. R. NNP work_df3svrqaezdklfstxiwkq7kydu 18 264 Ford Ford NNP work_df3svrqaezdklfstxiwkq7kydu 18 265 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 18 266 Science Science NNP work_df3svrqaezdklfstxiwkq7kydu 18 267 Journal Journal NNP work_df3svrqaezdklfstxiwkq7kydu 18 268 in in IN work_df3svrqaezdklfstxiwkq7kydu 18 269 Computer Computer NNP work_df3svrqaezdklfstxiwkq7kydu 18 270 Virology Virology NNP work_df3svrqaezdklfstxiwkq7kydu 18 271 2006 2006 CD work_df3svrqaezdklfstxiwkq7kydu 18 272 151 151 CD work_df3svrqaezdklfstxiwkq7kydu 18 273 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 18 274 View View NNP work_df3svrqaezdklfstxiwkq7kydu 18 275 2 2 CD work_df3svrqaezdklfstxiwkq7kydu 18 276 excerpts excerpt NNS work_df3svrqaezdklfstxiwkq7kydu 18 277 , , , work_df3svrqaezdklfstxiwkq7kydu 18 278 references reference NNS work_df3svrqaezdklfstxiwkq7kydu 18 279 background background NN work_df3svrqaezdklfstxiwkq7kydu 18 280 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 18 281 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 18 282 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 18 283 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 18 284 The the DT work_df3svrqaezdklfstxiwkq7kydu 18 285 online online JJ work_df3svrqaezdklfstxiwkq7kydu 18 286 dating date VBG work_df3svrqaezdklfstxiwkq7kydu 18 287 romance romance NN work_df3svrqaezdklfstxiwkq7kydu 18 288 scam scam NN work_df3svrqaezdklfstxiwkq7kydu 18 289 : : : work_df3svrqaezdklfstxiwkq7kydu 18 290 The the DT work_df3svrqaezdklfstxiwkq7kydu 18 291 psychological psychological JJ work_df3svrqaezdklfstxiwkq7kydu 18 292 impact impact NN work_df3svrqaezdklfstxiwkq7kydu 18 293 on on IN work_df3svrqaezdklfstxiwkq7kydu 18 294 victims victim NNS work_df3svrqaezdklfstxiwkq7kydu 18 295 – – : work_df3svrqaezdklfstxiwkq7kydu 18 296 both both CC work_df3svrqaezdklfstxiwkq7kydu 18 297 financial financial JJ work_df3svrqaezdklfstxiwkq7kydu 18 298 and and CC work_df3svrqaezdklfstxiwkq7kydu 18 299 non non JJ work_df3svrqaezdklfstxiwkq7kydu 18 300 - - JJ work_df3svrqaezdklfstxiwkq7kydu 18 301 financial financial JJ work_df3svrqaezdklfstxiwkq7kydu 18 302 M. M. NNP work_df3svrqaezdklfstxiwkq7kydu 18 303 Whitty Whitty NNP work_df3svrqaezdklfstxiwkq7kydu 18 304 , , , work_df3svrqaezdklfstxiwkq7kydu 18 305 T. T. NNP work_df3svrqaezdklfstxiwkq7kydu 18 306 Buchanan Buchanan NNP work_df3svrqaezdklfstxiwkq7kydu 18 307 Psychology Psychology NNP work_df3svrqaezdklfstxiwkq7kydu 18 308 2016 2016 CD work_df3svrqaezdklfstxiwkq7kydu 18 309 50 50 CD work_df3svrqaezdklfstxiwkq7kydu 18 310 PDF PDF NNP work_df3svrqaezdklfstxiwkq7kydu 18 311 View View NNP work_df3svrqaezdklfstxiwkq7kydu 18 312 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 18 313 excerpt excerpt NN work_df3svrqaezdklfstxiwkq7kydu 18 314 , , , work_df3svrqaezdklfstxiwkq7kydu 18 315 references reference NNS work_df3svrqaezdklfstxiwkq7kydu 18 316 background background NN work_df3svrqaezdklfstxiwkq7kydu 18 317 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 18 318 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 18 319 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 18 320 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 18 321 Cyberstalking Cyberstalking NNP work_df3svrqaezdklfstxiwkq7kydu 18 322 versus versus IN work_df3svrqaezdklfstxiwkq7kydu 18 323 off off IN work_df3svrqaezdklfstxiwkq7kydu 18 324 - - HYPH work_df3svrqaezdklfstxiwkq7kydu 18 325 line line NN work_df3svrqaezdklfstxiwkq7kydu 18 326 stalking stalking NN work_df3svrqaezdklfstxiwkq7kydu 18 327 in in IN work_df3svrqaezdklfstxiwkq7kydu 18 328 a a DT work_df3svrqaezdklfstxiwkq7kydu 18 329 forensic forensic JJ work_df3svrqaezdklfstxiwkq7kydu 18 330 sample sample NN work_df3svrqaezdklfstxiwkq7kydu 18 331 Cristina Cristina NNP work_df3svrqaezdklfstxiwkq7kydu 18 332 Cavezza Cavezza NNP work_df3svrqaezdklfstxiwkq7kydu 18 333 , , , work_df3svrqaezdklfstxiwkq7kydu 18 334 T. T. NNP work_df3svrqaezdklfstxiwkq7kydu 18 335 McEwan McEwan NNP work_df3svrqaezdklfstxiwkq7kydu 18 336 Psychology Psychology NNP work_df3svrqaezdklfstxiwkq7kydu 18 337 2014 2014 CD work_df3svrqaezdklfstxiwkq7kydu 18 338 34 34 CD work_df3svrqaezdklfstxiwkq7kydu 18 339 View View NNP work_df3svrqaezdklfstxiwkq7kydu 18 340 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 18 341 excerpt excerpt NN work_df3svrqaezdklfstxiwkq7kydu 18 342 , , , work_df3svrqaezdklfstxiwkq7kydu 18 343 references reference NNS work_df3svrqaezdklfstxiwkq7kydu 18 344 background background NN work_df3svrqaezdklfstxiwkq7kydu 18 345 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 18 346 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 18 347 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 18 348 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 18 349 Cyberbullying Cyberbullying NNP work_df3svrqaezdklfstxiwkq7kydu 18 350 : : : work_df3svrqaezdklfstxiwkq7kydu 18 351 another another DT work_df3svrqaezdklfstxiwkq7kydu 18 352 main main JJ work_df3svrqaezdklfstxiwkq7kydu 18 353 type type NN work_df3svrqaezdklfstxiwkq7kydu 18 354 of of IN work_df3svrqaezdklfstxiwkq7kydu 18 355 bullying bullying NN work_df3svrqaezdklfstxiwkq7kydu 18 356 ? ? . work_df3svrqaezdklfstxiwkq7kydu 19 1 Robert Robert NNP work_df3svrqaezdklfstxiwkq7kydu 19 2 Slonje Slonje NNP work_df3svrqaezdklfstxiwkq7kydu 19 3 , , , work_df3svrqaezdklfstxiwkq7kydu 19 4 P. P. NNP work_df3svrqaezdklfstxiwkq7kydu 19 5 Smith Smith NNP work_df3svrqaezdklfstxiwkq7kydu 19 6 Psychology Psychology NNP work_df3svrqaezdklfstxiwkq7kydu 19 7 , , , work_df3svrqaezdklfstxiwkq7kydu 19 8 Medicine Medicine NNP work_df3svrqaezdklfstxiwkq7kydu 19 9 Scandinavian scandinavian JJ work_df3svrqaezdklfstxiwkq7kydu 19 10 journal journal NN work_df3svrqaezdklfstxiwkq7kydu 19 11 of of IN work_df3svrqaezdklfstxiwkq7kydu 19 12 psychology psychology NN work_df3svrqaezdklfstxiwkq7kydu 19 13 2008 2008 CD work_df3svrqaezdklfstxiwkq7kydu 19 14 1,325 1,325 CD work_df3svrqaezdklfstxiwkq7kydu 19 15 View View NNP work_df3svrqaezdklfstxiwkq7kydu 19 16 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 19 17 excerpt excerpt NN work_df3svrqaezdklfstxiwkq7kydu 19 18 , , , work_df3svrqaezdklfstxiwkq7kydu 19 19 references reference NNS work_df3svrqaezdklfstxiwkq7kydu 19 20 background background NN work_df3svrqaezdklfstxiwkq7kydu 19 21 Save Save NNP work_df3svrqaezdklfstxiwkq7kydu 19 22 Alert Alert NNP work_df3svrqaezdklfstxiwkq7kydu 19 23 Research Research NNP work_df3svrqaezdklfstxiwkq7kydu 19 24 Feed Feed NNP work_df3svrqaezdklfstxiwkq7kydu 19 25 ... ... NFP work_df3svrqaezdklfstxiwkq7kydu 19 26 1 1 CD work_df3svrqaezdklfstxiwkq7kydu 19 27 2 2 CD work_df3svrqaezdklfstxiwkq7kydu 19 28 3 3 CD work_df3svrqaezdklfstxiwkq7kydu 19 29 4 4 CD work_df3svrqaezdklfstxiwkq7kydu 19 30 5 5 CD work_df3svrqaezdklfstxiwkq7kydu 19 31 ... ... : work_df3svrqaezdklfstxiwkq7kydu 19 32 Related related JJ work_df3svrqaezdklfstxiwkq7kydu 19 33 Papers Papers NNPS work_df3svrqaezdklfstxiwkq7kydu 19 34 Abstract Abstract NNP work_df3svrqaezdklfstxiwkq7kydu 19 35 Figures Figures NNPS work_df3svrqaezdklfstxiwkq7kydu 19 36 , , , work_df3svrqaezdklfstxiwkq7kydu 19 37 Tables Tables NNPS work_df3svrqaezdklfstxiwkq7kydu 19 38 , , , work_df3svrqaezdklfstxiwkq7kydu 19 39 and and CC work_df3svrqaezdklfstxiwkq7kydu 19 40 Topics Topics NNP work_df3svrqaezdklfstxiwkq7kydu 19 41 Paper Paper NNP work_df3svrqaezdklfstxiwkq7kydu 19 42 Mentions Mentions NNPS work_df3svrqaezdklfstxiwkq7kydu 19 43 11 11 CD work_df3svrqaezdklfstxiwkq7kydu 19 44 Citations citation NNS work_df3svrqaezdklfstxiwkq7kydu 19 45 83 83 CD work_df3svrqaezdklfstxiwkq7kydu 19 46 References reference NNS work_df3svrqaezdklfstxiwkq7kydu 19 47 Related relate VBN work_df3svrqaezdklfstxiwkq7kydu 19 48 Papers paper NNS work_df3svrqaezdklfstxiwkq7kydu 19 49 Stay stay VBP work_df3svrqaezdklfstxiwkq7kydu 19 50 Connected connected JJ work_df3svrqaezdklfstxiwkq7kydu 19 51 With with IN work_df3svrqaezdklfstxiwkq7kydu 19 52 Semantic semantic JJ work_df3svrqaezdklfstxiwkq7kydu 19 53 Scholar scholar NN work_df3svrqaezdklfstxiwkq7kydu 19 54 Sign sign VB work_df3svrqaezdklfstxiwkq7kydu 19 55 Up up RP work_df3svrqaezdklfstxiwkq7kydu 19 56 About about IN work_df3svrqaezdklfstxiwkq7kydu 19 57 Semantic semantic JJ work_df3svrqaezdklfstxiwkq7kydu 19 58 Scholar Scholar NNP work_df3svrqaezdklfstxiwkq7kydu 19 59 Semantic Semantic NNP work_df3svrqaezdklfstxiwkq7kydu 19 60 Scholar Scholar NNP work_df3svrqaezdklfstxiwkq7kydu 19 61 is be VBZ work_df3svrqaezdklfstxiwkq7kydu 19 62 a a DT work_df3svrqaezdklfstxiwkq7kydu 19 63 free free JJ work_df3svrqaezdklfstxiwkq7kydu 19 64 , , , work_df3svrqaezdklfstxiwkq7kydu 19 65 AI AI NNP work_df3svrqaezdklfstxiwkq7kydu 19 66 - - HYPH work_df3svrqaezdklfstxiwkq7kydu 19 67 powered power VBN work_df3svrqaezdklfstxiwkq7kydu 19 68 research research NN work_df3svrqaezdklfstxiwkq7kydu 19 69 tool tool NN work_df3svrqaezdklfstxiwkq7kydu 19 70 for for IN work_df3svrqaezdklfstxiwkq7kydu 19 71 scientific scientific JJ work_df3svrqaezdklfstxiwkq7kydu 19 72 literature literature NN work_df3svrqaezdklfstxiwkq7kydu 19 73 , , , work_df3svrqaezdklfstxiwkq7kydu 19 74 based base VBN work_df3svrqaezdklfstxiwkq7kydu 19 75 at at IN work_df3svrqaezdklfstxiwkq7kydu 19 76 the the DT work_df3svrqaezdklfstxiwkq7kydu 19 77 Allen Allen NNP work_df3svrqaezdklfstxiwkq7kydu 19 78 Institute Institute NNP work_df3svrqaezdklfstxiwkq7kydu 19 79 for for IN work_df3svrqaezdklfstxiwkq7kydu 19 80 AI AI NNP work_df3svrqaezdklfstxiwkq7kydu 19 81 . . . work_df3svrqaezdklfstxiwkq7kydu 20 1 Learn learn VB work_df3svrqaezdklfstxiwkq7kydu 20 2 More More JJR work_df3svrqaezdklfstxiwkq7kydu 20 3 → → SYM work_df3svrqaezdklfstxiwkq7kydu 20 4 Resources resource NNS work_df3svrqaezdklfstxiwkq7kydu 20 5 DatasetsSupp.aiAPIOpen DatasetsSupp.aiAPIOpen NNP work_df3svrqaezdklfstxiwkq7kydu 20 6 Corpus Corpus NNP work_df3svrqaezdklfstxiwkq7kydu 20 7 Organization Organization NNP work_df3svrqaezdklfstxiwkq7kydu 20 8 About about IN work_df3svrqaezdklfstxiwkq7kydu 20 9 UsResearchPublishing usresearchpublishe VBG work_df3svrqaezdklfstxiwkq7kydu 20 10 PartnersData PartnersData NNP work_df3svrqaezdklfstxiwkq7kydu 20 11 Partners Partners NNP work_df3svrqaezdklfstxiwkq7kydu 20 12     _SP work_df3svrqaezdklfstxiwkq7kydu 20 13 FAQContact faqcontact NN work_df3svrqaezdklfstxiwkq7kydu 20 14 Proudly proudly RB work_df3svrqaezdklfstxiwkq7kydu 20 15 built build VBN work_df3svrqaezdklfstxiwkq7kydu 20 16 by by IN work_df3svrqaezdklfstxiwkq7kydu 20 17 AI2 AI2 NNP work_df3svrqaezdklfstxiwkq7kydu 20 18 with with IN work_df3svrqaezdklfstxiwkq7kydu 20 19 the the DT work_df3svrqaezdklfstxiwkq7kydu 20 20 help help NN work_df3svrqaezdklfstxiwkq7kydu 20 21 of of IN work_df3svrqaezdklfstxiwkq7kydu 20 22 our -PRON- PRP$ work_df3svrqaezdklfstxiwkq7kydu 20 23 Collaborators Collaborators NNP work_df3svrqaezdklfstxiwkq7kydu 20 24 Terms Terms NNPS work_df3svrqaezdklfstxiwkq7kydu 20 25 of of IN work_df3svrqaezdklfstxiwkq7kydu 20 26 Service•Privacy service•privacy NN work_df3svrqaezdklfstxiwkq7kydu 20 27 Policy Policy NNP work_df3svrqaezdklfstxiwkq7kydu 20 28 The the DT work_df3svrqaezdklfstxiwkq7kydu 20 29 Allen Allen NNP work_df3svrqaezdklfstxiwkq7kydu 20 30 Institute Institute NNP work_df3svrqaezdklfstxiwkq7kydu 20 31 for for IN work_df3svrqaezdklfstxiwkq7kydu 20 32 AI AI NNP work_df3svrqaezdklfstxiwkq7kydu 20 33 By by IN work_df3svrqaezdklfstxiwkq7kydu 20 34 clicking click VBG work_df3svrqaezdklfstxiwkq7kydu 20 35 accept accept NN work_df3svrqaezdklfstxiwkq7kydu 20 36 or or CC work_df3svrqaezdklfstxiwkq7kydu 20 37 continuing continue VBG work_df3svrqaezdklfstxiwkq7kydu 20 38 to to TO work_df3svrqaezdklfstxiwkq7kydu 20 39 use use VB work_df3svrqaezdklfstxiwkq7kydu 20 40 the the DT work_df3svrqaezdklfstxiwkq7kydu 20 41 site site NN work_df3svrqaezdklfstxiwkq7kydu 20 42 , , , work_df3svrqaezdklfstxiwkq7kydu 20 43 you -PRON- PRP work_df3svrqaezdklfstxiwkq7kydu 20 44 agree agree VBP work_df3svrqaezdklfstxiwkq7kydu 20 45 to to IN work_df3svrqaezdklfstxiwkq7kydu 20 46 the the DT work_df3svrqaezdklfstxiwkq7kydu 20 47 terms term NNS work_df3svrqaezdklfstxiwkq7kydu 20 48 outlined outline VBN work_df3svrqaezdklfstxiwkq7kydu 20 49 in in IN work_df3svrqaezdklfstxiwkq7kydu 20 50 our -PRON- PRP$ work_df3svrqaezdklfstxiwkq7kydu 20 51 Privacy Privacy NNP work_df3svrqaezdklfstxiwkq7kydu 20 52 Policy Policy NNP work_df3svrqaezdklfstxiwkq7kydu 20 53 , , , work_df3svrqaezdklfstxiwkq7kydu 20 54 Terms term NNS work_df3svrqaezdklfstxiwkq7kydu 20 55 of of IN work_df3svrqaezdklfstxiwkq7kydu 20 56 Service Service NNP work_df3svrqaezdklfstxiwkq7kydu 20 57 , , , work_df3svrqaezdklfstxiwkq7kydu 20 58 and and CC work_df3svrqaezdklfstxiwkq7kydu 20 59 Dataset Dataset NNP work_df3svrqaezdklfstxiwkq7kydu 20 60 License License NNP work_df3svrqaezdklfstxiwkq7kydu 20 61 ACCEPT ACCEPT NNP work_df3svrqaezdklfstxiwkq7kydu 20 62 & & CC work_df3svrqaezdklfstxiwkq7kydu 20 63 CONTINUE CONTINUE NNP