06.01.2015 Views

413047-Underground-Commercial-Sex-Economy

413047-Underground-Commercial-Sex-Economy

413047-Underground-Commercial-Sex-Economy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table 9.1 Child Pornography Offending Typology<br />

Type of<br />

involvement<br />

Browser<br />

Private Fantasy<br />

Trawler<br />

Non-secure<br />

collector<br />

Secure collector<br />

Groomer<br />

Physical abuser<br />

Producer<br />

Features<br />

Level of<br />

networking by<br />

offender<br />

Security<br />

Nature<br />

of abuse<br />

Response to spam, accidental hit on suspect site–<br />

material knowingly saved Nil Nil Indirect<br />

Conscious creation of online text or digital images<br />

for private use Nil Nil Indirect<br />

Actively seeking child pornography using openly<br />

available browsers Low Nil Indirect<br />

Actively seeking material often through peer-topeer<br />

networks High Nil Indirect<br />

Actively seeking material but only through secure<br />

networks. Collector syndrome and exchange as an<br />

entry barrier High Secure Indirect<br />

Cultivating an online relationship with one or more<br />

children. The offender may or may not seek<br />

material in any of the above ways. Pornography may<br />

be used to facilitate abuse<br />

Abusing a child who may have been introduced to<br />

the offender online. The offender may or may not<br />

seek material in any of the above ways. Pornography<br />

may be used to facilitate abuse<br />

Records own abuse or that of other (or induces<br />

children to submit images of themselves)<br />

Varies—online<br />

contact with<br />

individual children<br />

Varies—physical<br />

contact with<br />

individual children<br />

Varies—may depend<br />

on whether becomes<br />

a distributor<br />

Distributor May distribute at any one of the above levels Varies<br />

Source: Krone 2004.<br />

Security<br />

depends<br />

on child<br />

Security<br />

depends<br />

on child<br />

Security<br />

depends<br />

on child<br />

Tends to<br />

be secure<br />

Direct<br />

Direct<br />

Direct<br />

Indirect<br />

Since the Internet is a relatively new phenomenon, a number of studies have endeavored to discern<br />

behavioral and psychological differences between online (non-contact) sex offenders and offline (contact)<br />

sex offenders. Babchishin, Hanson, and Hermann’s (2011) meta-analysis of 27 studies found that online<br />

offenders were younger than offline offenders, less likely to be a racial minority, and less likely to have a<br />

criminal history. Both online and offline offenders experienced more physical and sexual abuse than the<br />

general population. Offline offenders had lower rates of victim empathy and more cognitive distortions,<br />

but also lower rates of sexual deviancy. The authors suggest that higher levels of self-control and less<br />

impulsivity may explain why online offenders do not commit contact crimes.<br />

Other studies have attempted to determine the likelihood of non-contact offenders “crossing over” to<br />

commit contact crimes. Viewing child abuse images could normalize this behavior and therefore lead to<br />

contact offending, or could potentially prevent contact offending by acting as a substitute (Quayle and<br />

Taylor 2002). Wortley and Smallbone (2012) point to the increase in child pornography accessibility and<br />

decrease in sexual abuse rates to illustrate that Internet child pornography does not lead to contact<br />

crimes.<br />

Seto, Hanson, and Babchishin (2011) conducted a meta-analysis of nine studies, which found a recidivism<br />

rate of only 4.6 percent for online sex offenders, with 2 percent committing a contact sexual offense over a<br />

1.5 to 6 year follow-up period. They also analyzed 21 studies and found that 12 percent of online offenders<br />

have an officially documented contact sexual offense. However, six studies with self-report data indicated<br />

a high number of undocumented crimes, as 55 percent of offenders disclosed additional offenses. Even<br />

when excluding Bourke and Hernandez’s (2009) Butner study, whose high rates of self-reported data have<br />

been questioned (Aviv 2013), the rate remains at around 50 percent.<br />

While numerous studies rely on administrative data or interviews with law enforcement officers and<br />

clinical staff, Quayle and Taylor (2002) conducted interviews with 13 men convicted of downloading child<br />

pornography. Their study sheds light on the function of child pornography and identifies six main ways<br />

that offenders describe using child pornography: for sexual arousal, as collectibles, to facilitate social<br />

relationships, to avoid real life, as therapy, and as inevitably linked with the Internet.<br />

253

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!