29.04.2015 Views

child pornography and sexual exploitation of children online

child pornography and sexual exploitation of children online

child pornography and sexual exploitation of children online

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table <strong>of</strong> Contents<br />

Acknowledgments 3<br />

Executive Summary 7<br />

1. Introduction 6<br />

2. Adult perpetrators <strong>of</strong> abuse 9<br />

2.1 Child <strong>pornography</strong> <strong>and</strong> abusive images 9<br />

2.2 Virtual <strong>child</strong> <strong>pornography</strong> 17<br />

2.3 The Internet sex <strong>of</strong>fender, the Internet sex exploiter <strong>and</strong> harms facilitated<br />

by the new technologies 21<br />

2.4 Who are these people? 27<br />

2.5 Technologies used 31<br />

2.6 The relationship between viewing <strong>and</strong> the commission <strong>of</strong> further<br />

<strong>sexual</strong> <strong>of</strong>fences against <strong>child</strong>ren 36<br />

3. Child victims <strong>of</strong> abuse via the new technologies 39<br />

3.1 Identification <strong>of</strong> the <strong>child</strong> victim in abusive images 39<br />

3.2 The impact <strong>of</strong> Internet-related <strong>sexual</strong> abuse 43<br />

3.2.1 Children made the subjects <strong>of</strong> abuse images 45<br />

3.2.2 Working with <strong>child</strong>ren abused through abusive images on the Internet 50<br />

3.3 Children persuaded <strong>and</strong> coerced into <strong>of</strong>fline encounters leading to <strong>sexual</strong> abuse 53<br />

4. Young people’s behaviour <strong>online</strong> 58<br />

4.1 Accessing <strong>pornography</strong> <strong>online</strong> 58<br />

4.2 Internet affordance 62<br />

4.3 Staying safe on the Internet 65<br />

4.4 Exploring new territories vs. unsafe practices 70<br />

4.5 Young people’s <strong>sexual</strong>ly problematic behaviours <strong>and</strong> the new technologies 72<br />

4.5.1 Sexual solicitation 72<br />

4.5.2 Young people accessing <strong>child</strong> abuse images 73<br />

5. Cultural <strong>and</strong> geographical diversity <strong>and</strong> the connection between<br />

<strong>online</strong> <strong>exploitation</strong> <strong>and</strong> other forms <strong>of</strong> <strong>sexual</strong> <strong>exploitation</strong> <strong>of</strong> <strong>child</strong>ren 76<br />

5.1 Cultural <strong>and</strong> geographical diversity 76<br />

5.2 Internet <strong>child</strong> <strong>pornography</strong> <strong>and</strong> the law 82<br />

6. Prevention <strong>and</strong> education 92<br />

6.1 Youth, agency <strong>and</strong> education 92<br />

6.1.1 Information materials 92<br />

6.1.2 Online safety tools 93<br />

6.1.3 Helplines 94<br />

6.1.4 Education packages for use in school settings 94<br />

|Child Pornography <strong>and</strong> Sexual Exploitation <strong>of</strong> Children Online

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!