child pornography and sexual exploitation of children online
child pornography and sexual exploitation of children online
child pornography and sexual exploitation of children online
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Bibliography<br />
Abelsohn, Jonna <strong>and</strong> Hubelsjö, Anna. I <strong>sexual</strong>itetens gränstrakter. [On the fringes <strong>of</strong> <strong>sexual</strong>ity].<br />
Resursförvaltningen Göteborgs stad. Gothenburg. 2007.<br />
Adam, A. Cyberstalking <strong>and</strong> Internet <strong>pornography</strong>: Gender <strong>and</strong> the gaze. Ethics <strong>and</strong> Information<br />
Technology, 4, 2002, 133-142.<br />
Adler, A. The Perverse Law <strong>of</strong> Child Pornography. Columbia Law Review, 101(March), 2001, 209-273.<br />
Akdeniz, Y. Internet Child Pornography <strong>and</strong> the Law. National <strong>and</strong> International Responses. Ashgate.<br />
Aldershot. 2008.<br />
Alexy, E.M., Burgess, A.W. <strong>and</strong> Baker, T. Internet <strong>of</strong>fenders: Traders, travelers <strong>and</strong> combination tradertravelers.<br />
Journal <strong>of</strong> Interpersonal Violence, 20, 2005, 804-812.<br />
American Psychiatric Association. Diagnostic <strong>and</strong> statistical manual <strong>of</strong> mental disorders (DSM-IV-TR).<br />
American Psychiatric Association. Washington, D.C. 2000.<br />
Anderson, C. The Long Tail. R<strong>and</strong>om House. London. 2006.<br />
Andrews, D.A. The psychology <strong>of</strong> criminal conduct <strong>and</strong> effective treatment. In J. McGuire (Ed.), What<br />
Works: Reducing Re-<strong>of</strong>fending: Guidelines from Research <strong>and</strong> Practice. Wiley. Chichester. 1995. pp. 35-62.<br />
Ashcr<strong>of</strong>t v. Free Speech Coalition. 535 U.S. 224 2002.<br />
Aslanidou, S. <strong>and</strong> Menexes, G. Youth <strong>and</strong> the Internet: Uses <strong>and</strong> practices in the home. Computers <strong>and</strong><br />
Education, 51, 2008, 1375-1391.<br />
Asquith, S. <strong>and</strong> Turner, E. Recovery <strong>and</strong> Reintegration <strong>of</strong> Children from the Effects <strong>of</strong> Sexual Exploitation<br />
<strong>and</strong> Related Trafficking. 2008. Oak Foundation. Geneva. pp. 5-6.<br />
Azaola, E. Boy <strong>and</strong> girl victims <strong>of</strong> <strong>sexual</strong> <strong>exploitation</strong> in Mexico. UNICEF-DIF. 2000. Accessed on 15<br />
October2008 from: www.oas.org/atip/country%20specific/AZAOLA%20Mexico%20Child%20<br />
Sex%20Exploitation.pdf<br />
Baartz, D. Australians, the Internet <strong>and</strong> technology-enabled <strong>child</strong> sex abuse: A statistical pr<strong>of</strong>ile. Australian<br />
Federal Police. 2008.<br />
Bates, A. <strong>and</strong> Metcalf, C. A psychometric comparison <strong>of</strong> internet <strong>and</strong> non-internet sex <strong>of</strong>fenders from a<br />
community treatment sample. Journal <strong>of</strong> Sexual Aggression, 13 (1), 2007, 11-20.<br />
BBC. BBC News, 24 April 2005. Accessed 10 January2006 from: http://www.newsvole.bbc.co.uk/<br />
mpapps/pagetools/print/news.bbc.co.uk/2/htp.<br />
Beech, A.R., Elliott, I.A., Birgden, A. <strong>and</strong> Findlater, D. The Internet <strong>and</strong> <strong>child</strong> <strong>sexual</strong> <strong>of</strong>fending: A<br />
criminological review. Aggression <strong>and</strong> Violent Behavior, doi:10.1016/j.arb.2008.03.007.<br />
106|Child Pornography <strong>and</strong> Sexual Exploitation <strong>of</strong> Children Online