12.07.2015 Views

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Germany and South Africa, ISPs are not guilty of committ<strong>in</strong>g child pornography offences if <strong>the</strong>y are not notifiedof <strong>the</strong> content. However, if <strong>the</strong>y are notified, <strong>the</strong>y must remove or at least prevent access <strong>to</strong> it immediately.See: UN Commission on Human Rights. Report on <strong>the</strong> sale of children, child prostitution and child pornography(E/2004/78). 2004. 16.359E.C. Mac Gillavry. Internet Service Providers and crim<strong>in</strong>al <strong>in</strong>vestigation: A case study regard<strong>in</strong>g <strong>the</strong> voluntary cooperationof Dutch ISPs with <strong>the</strong> <strong>in</strong>vestigat<strong>in</strong>g authorities. Paper presented <strong>to</strong> <strong>the</strong> Combat<strong>in</strong>g <strong>Child</strong> Pornographyon <strong>the</strong> Internet Conference. Vienna: 29 Sept. – Oct. 1, 1999.360Make-IT-Safe. What We Are Do<strong>in</strong>g. Accessed on 14 Oct. 2008 from: www.make-it-safe.net361K. Bradley. Drive-by Net User Targets Kid Porn. The Toron<strong>to</strong> Sun. 22 Nov., 2003: A4.362Paedophiles jailed for porn r<strong>in</strong>g. BBC News. 13 Feb., 2001. Accessed on 14 Oct. 2008 from: http://news.bbc.co.uk/1/hi/uk/1168112.stm.363D. Kuxhaus. <strong>Child</strong>-Porn Suspect’s entire cache still unseen. Free Press. 23 Nov. 2004: B2.364W. R. Graham, Jr. Uncover<strong>in</strong>g and Elim<strong>in</strong>at<strong>in</strong>g <strong>Child</strong> Pornography R<strong>in</strong>gs on <strong>the</strong> Internet: Issues Regard<strong>in</strong>gand Avenues Facilitat<strong>in</strong>g Law Enforcement’s Access <strong>to</strong> ‘Wonderland. Law Review of Michigan State University-Detroit College of Law, 2000, 457.365G. Berardi. PayPal <strong>to</strong> Impose F<strong>in</strong>es for Break<strong>in</strong>g Bans. Yahoo News. 13 Sept., 2004.366J. Wolak, D. F<strong>in</strong>kelhor, and K. Mitchell. Internet-<strong>in</strong>itiated Sex Crimes aga<strong>in</strong>st M<strong>in</strong>ors: Implications for PreventionBased on F<strong>in</strong>d<strong>in</strong>gs from a National Study. New York: Elsevier Inc., 2004.367S. Coll<strong>in</strong>s. Cellphone Gifts Lure <strong>Child</strong>ren for Sex. New Zealand Herald. 20 Aug., 2005: B16.368J. Wolak, D. F<strong>in</strong>kelhor and K. Mitchell. Internet-<strong>in</strong>itiated Sex Crimes aga<strong>in</strong>st M<strong>in</strong>ors: Implications for PreventionBased on F<strong>in</strong>d<strong>in</strong>gs from a National Study. New York: Elsevier Inc., 2004.369Ibid.370Ibid.371MSN <strong>to</strong> close chat rooms. CNN.com, 24 Sept. 2003. Accessed on 14 Oct. 2008 from: www.cnn.com/2003/TECH/<strong>in</strong>ternet/09/24/microsoft.chat/<strong>in</strong>dex.html372United K<strong>in</strong>gdom. Home Office – Police. Good practice for <strong>the</strong> providers of social network<strong>in</strong>g and o<strong>the</strong>r <strong>in</strong>teractiveservices 2008. Accessed on 14 Oct. 2008 from: http://police.homeoffice.gov.uk/publications/operationalpolic<strong>in</strong>g/social-network<strong>in</strong>g-guidance.373Ibid., 12.374At <strong>the</strong> request of <strong>the</strong> RCMP, Imagis Cascade expanded <strong>in</strong><strong>to</strong> image and facial recognition <strong>to</strong> provide an easyand effective way <strong>to</strong> identify a suspect us<strong>in</strong>g only a pho<strong>to</strong>graph. Soon <strong>the</strong>reafter, Imagis <strong>in</strong>itiated deployment ofa facial recognition-enabled regional arrest and book<strong>in</strong>g data shar<strong>in</strong>g network <strong>in</strong> Alameda County (Oakland,CA), us<strong>in</strong>g traditional system <strong>in</strong>tegration approaches. For more <strong>in</strong><strong>format</strong>ion on Imagis, see its homepage at:www.imagistechnologies.com375Second Life ‘child abuse’ claim. BBC. 9 May 2007. Accessed on 14 Oct. 2008 from: http://news.bbc.co.uk/2/hi/technology/6638331.stm.376ECPAT. Violence aga<strong>in</strong>st <strong>Child</strong>ren <strong>in</strong> Cyberspace. ECPAT International, Sept. 2005. Available at: www.ecpat.net/EI/book.asp?id=42377UNESCO. Declaration and Action Plan. <strong>Expert</strong> Meet<strong>in</strong>g on Sexual Abuse of <strong>Child</strong>ren, <strong>Child</strong> Pornography and on <strong>the</strong>Internet: an International Challenge: Proceed<strong>in</strong>gs of a Conference Held January 18-19, 1999, Paris. Accessed on 14Oct. 2008 from: www.unesco.org/webworld/child_screen/conf_<strong>in</strong>dex.html378Combat<strong>in</strong>g <strong>Child</strong> Pornography on <strong>the</strong> Internet. Conference held September 29-Oc<strong>to</strong>ber 1, 1999, Vienna.379T. Palmer. Beh<strong>in</strong>d <strong>the</strong> Screen: <strong>Child</strong>ren Who Are <strong>the</strong> Subjects of Abusive Images. 2005. 7.380Virtual Global Taskforce (VGT). What we do. Accessed on 14 Oct. 2008 from: www.virtualglobaltaskforce.com381In <strong>the</strong> U.K., <strong>the</strong> prosecution rate for paedophiles us<strong>in</strong>g <strong>the</strong> Internet as a means <strong>to</strong> lure children or post childpornography <strong>in</strong> 2001 <strong>in</strong>creased by 1,500 per cent from 1998, which directly matched <strong>the</strong> Internet growth <strong>in</strong> <strong>the</strong>U.K. In 2003, it <strong>in</strong>creased fur<strong>the</strong>r <strong>to</strong> 6,500 percent (Make-IT-Safe. Fact Sheet #1: <strong>Child</strong>ren, Young People and IT.Accessed: 14 Oct. 2008. Available at: www.make-it-safe.net).382E.M. Barnes, T.N. Burrows. Brief Summary of <strong>the</strong> F<strong>in</strong>d<strong>in</strong>gs of Work<strong>in</strong>g Group I of <strong>the</strong> International Association ofProsecu<strong>to</strong>rs. Paper presented <strong>to</strong> Combat<strong>in</strong>g Use of <strong>the</strong> Internet <strong>to</strong> Exploit <strong>Child</strong>ren. Beij<strong>in</strong>g, 5-10 Sept., 1999.Accessed on 14 Oct. 2008 from: www.iap.nl.com126|Private Sec<strong>to</strong>r Accountability <strong>in</strong> Combat<strong>in</strong>g <strong>the</strong> Commercial Sexual Exploitation of <strong>Child</strong>ren

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!