- Page 1: Final Report Stephen Webster, Julia
- Page 5 and 6: 1. Executive Summary Background •
- Page 7 and 8: Online Spaces The Features of Onlin
- Page 9 and 10: also described using webcams 3 as a
- Page 11 and 12: Maintenance • Offence maintenance
- Page 13 and 14: easons - here low self-efficacy und
- Page 15 and 16: Typology of Young People Victimised
- Page 17 and 18: ehaviours and strategies to stay sa
- Page 19 and 20: Awareness and Perception of Online
- Page 21 and 22: Content gaps • Some young people
- Page 23 and 24: • Events with teachers were also
- Page 25 and 26: Girls appear to be at higher risk,
- Page 27 and 28: off-line abusive contact with the c
- Page 29 and 30: said activity was sexual intercours
- Page 31 and 32: 2.5 Scoping Methods Literature revi
- Page 33 and 34: 2.6 Interviews with Online Groomers
- Page 35 and 36: and 14-16 years; a mix of boys and
- Page 37 and 38: 3. Understanding Online Grooming Th
- Page 39 and 40: turned off and daily life returned
- Page 41 and 42: Social networking - For adults and
- Page 43 and 44: Online Spaces Figure 3.3.1 - The fe
- Page 45 and 46: The role of the online environment
- Page 47 and 48: Online identities were described by
- Page 49 and 50: Mode Before an approach to a young
- Page 51 and 52: Extent of contact With technology a
- Page 53 and 54:
- Mentor: this refers to the way so
- Page 55 and 56:
extent of online disinhibition amon
- Page 57 and 58:
Providing gifts to young people cou
- Page 59 and 60:
It is not unreasonable to suggest t
- Page 61 and 62:
4. Offender Maintenance and Risk Ma
- Page 63 and 64:
There are plenty of fish - you’ll
- Page 65 and 66:
conversations to escalate in a way
- Page 67 and 68:
In the literature, there has also b
- Page 69 and 70:
At the time… I said I’m not doi
- Page 71 and 72:
I felt powerful and important knowi
- Page 73 and 74:
However, as with images, it would b
- Page 75 and 76:
• how the young person behaved on
- Page 77 and 78:
children. Consequently, online groo
- Page 79 and 80:
forefront of their functioning. The
- Page 81 and 82:
achieved that allowed each groomer
- Page 83 and 84:
Risk Management Adaptable Style Dis
- Page 85 and 86:
Risk Management Hyper-Sexualised se
- Page 87 and 88:
6. Young People Online The chapters
- Page 89 and 90:
equally exploited. Thus the level o
- Page 91 and 92:
as having problems in family life o
- Page 93 and 94:
of themselves. As we have seen in t
- Page 95 and 96:
which are largely unformulated. Soc
- Page 97 and 98:
G: Pictures of you and I want you t
- Page 99 and 100:
If we begin with the example of the
- Page 101 and 102:
Figure 6.6 Resilient young people o
- Page 103 and 104:
make contact with young boys. In th
- Page 105 and 106:
to the people from schools with rob
- Page 107 and 108:
Plenty. Some I see around, they’r
- Page 109 and 110:
We have seen in chapter 3, 4 and 5
- Page 111 and 112:
Table 6.7: Young peoples perception
- Page 113 and 114:
Socialisation Information seeking O
- Page 115 and 116:
when appraising all potential conta
- Page 117 and 118:
evidence from parents’ that tends
- Page 119 and 120:
7. Implications: Applying the resea
- Page 121 and 122:
of online technology and mobile pho
- Page 123 and 124:
Targeted programmes for young peopl
- Page 125 and 126:
the grooming to which they were sub
- Page 127 and 128:
with particular regard to anonymity
- Page 129 and 130:
measures for online groomers. A key
- Page 131 and 132:
addition, the Good Lives Model-Comp
- Page 133 and 134:
References Andrews, D. A., Bonta, J
- Page 135 and 136:
Hayes, E., Archer, D. & Middleton,
- Page 137 and 138:
Taylor, M. & Quayle, E. (2006). The
- Page 139 and 140:
Appendices 139 of 152 |Final report
- Page 141 and 142:
Dear [insert name] Understanding on
- Page 143 and 144:
Understanding Online Grooming On be
- Page 145 and 146:
Understanding the process of online
- Page 147 and 148:
2. ONLINE GROOMERS OFFENDING BEHAVI
- Page 149 and 150:
Online presentation (here we are ex
- Page 151 and 152:
Contact offending and online groome