Perr<strong>in</strong>, P.C., Madanat, H.N., Barnes, M.D., Corolan, A., Clark, R.B., Iv<strong>in</strong>s, N. et al. Health education’srole <strong>in</strong> fram<strong>in</strong>g pornography as a public health issue: local and national strategies with <strong>in</strong>ternationalimplications. Promotion and Education, 15, 2008, 11-18.Petit, J. Special Rapporteur. Rights of <strong>the</strong> <strong>Child</strong> (<strong>Child</strong> Pornography on <strong>the</strong> Internet) (E/CN.4/2005/78).Report <strong>to</strong> <strong>the</strong> Commission on Human Rights, Economic and Social Concerns. United Nations. NewYork. 2005.Piper, C. Who are <strong>the</strong>se youths? Language <strong>in</strong> <strong>the</strong> service of policy. Youth Justice, 1, 2001, 30-39.Quayle, E. Assessment issues with young people who engage <strong>in</strong> problematic sexual behaviour through<strong>the</strong> Internet. In M.C. Calder (Ed.), New developments with young people who sexually abuse. Russell HousePublish<strong>in</strong>g. Lyme Regis, UK. 2007.Quayle, E. Internet Offend<strong>in</strong>g. In D.R. Laws and W. O’Donohue (Eds.), Sexual Deviance. GuilfordPress. New York. 2008. pp. 439-458.Quayle, E. and Taylor, M. Paedophiles, pornography and <strong>the</strong> Internet: Assessment issues. British Journalof Social Work, 32, 863-875. 2002.Quayle, E. and Taylor, M. Young people who sexually abuse: <strong>the</strong> role of <strong>the</strong> new technologies. In M.Erooga and H. Masson (Eds.), <strong>Child</strong>ren and Young People who Sexually Abuse O<strong>the</strong>rs. Routledge. London.2006. pp. 115-128.Renold, E. and Creigh<strong>to</strong>n, S.J. Images of Abuse: A Review of <strong>the</strong> Evidence on <strong>Child</strong> Pornography. NSPCC.London. 2003.Rickert, V.I. and Ryan, O. Is <strong>the</strong> Internet <strong>the</strong> source? Journal of Adolescent Health, 40, 2007, 104-105.SAFT. Safety Awareness Facts Tools. European Commission. Brussels. Accessed on 5 June 2007 from:http://www.ec.europa.eu/<strong>in</strong><strong>format</strong>ion_society/activities/sip/projects/awareness/closed_projects/saft/<strong>in</strong>dex_en.htm.Se<strong>to</strong>, M. and Eke, A. The crim<strong>in</strong>al his<strong>to</strong>ries and later offend<strong>in</strong>g of child pornography offenders. SexualAbuse: A Journal of Research and Treatment, 17 (2), 2005, 201-210.Se<strong>to</strong>, M.C., Can<strong>to</strong>r, J.M., and Blanchard, R. <strong>Child</strong> pornography offenses are a valid diagnostic <strong>in</strong>dica<strong>to</strong>rof pedophilia. Journal of Abnormal Psychology, 115, 2006, 610-615.Schuijer, J. and Rossen, B. The Trade <strong>in</strong> <strong>Child</strong> Pornography. IPT forensics, 4. 1992. Accessed on 8 July2002 from: http://www.ipt-forensics.com/journal/volume4/j4_2_1.htmScott, S., The Politics and Experience of <strong>Child</strong> Sexual Abuse: Beyond Disbelief. Open University Press.Buck<strong>in</strong>gham. 2001Sgroi, S. Handbook Of Cl<strong>in</strong>ical Intervention In <strong>Child</strong> Sexual Abuse. Lex<strong>in</strong>g<strong>to</strong>n Books. Lex<strong>in</strong>g<strong>to</strong>n, MA.1982.Sheldon, K. and Howitt, D. Sexual fantasy <strong>in</strong> paedophile offenders: Can any model expla<strong>in</strong> satisfac<strong>to</strong>rilynew f<strong>in</strong>d<strong>in</strong>gs from a study of Internet and contact sexual offenders? Legal and Crim<strong>in</strong>ological Psychology,13, 2008, 137-158.114|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e
Shukan Bunshun. Yoji Rape Bon ga Bakaure suru Saish<strong>in</strong> “Lolicon Jijyo” (Lolita: The Latest Situation –Comics with <strong>Child</strong> Rape Images on High Demand). Weekly Bunshun, 15 December 2005, p. 30.Smith, P., Gogg<strong>in</strong>, C. and Gendreau, P. The effects of prison sentences and <strong>in</strong>termediate sanctions onrecidivism: general effects and <strong>in</strong>dividual differences. Public Works and Government Services, Solici<strong>to</strong>rGeneral’s Office. Ottawa. 2002.Silbert, M.H. The Effects on Juveniles of Be<strong>in</strong>g Used for Pornography and Prostitution. In D. Zillmanand C. Bryant (Eds.), Pornography: Research Advances and Policy Considerations. Lawrence Erlbaum.Hillside, New Jersey. 1989Söderström, Bengt. Experiences from and questions raised <strong>in</strong> cl<strong>in</strong>ical practice. In <strong>Child</strong>ren and YoungPersons with Abusive and violent Experiences Connected <strong>to</strong> Cyberspace. Swedish <strong>Child</strong>ren’s WelfareFoundation. 2006.Söderström, Bengt. Internet-related violence. Paper presented at Council of Europe conference: Build<strong>in</strong>ga Europe for and with <strong>Child</strong>ren. Towards a Strategy for 2009 - 2011. S<strong>to</strong>ckholm. 2008.Steevens, V. and Webster, C. Clos<strong>in</strong>g <strong>the</strong> barn door: The effect of parental supervision on Canadianchildren’s onl<strong>in</strong>e privacy. Bullet<strong>in</strong> of Science, Technology and Society, 28 (11), 2008, 4-19.S<strong>to</strong>p It Now, UK and Ireland. Helpl<strong>in</strong>e Report (2006). Accessed onl<strong>in</strong>e on 10 January 2007 and availablefrom: http://www.s<strong>to</strong>pitnow.org.uk/publications.htm.Subrahmanyam, K., Smahel, D. and Greenwood, P. Connect<strong>in</strong>g developmental constructions <strong>to</strong><strong>the</strong> Internet: Identity presentation and sexual exploration <strong>in</strong> onl<strong>in</strong>e teen chat rooms. DevelopmentalPsychology, 42 (3), 2006, 395-406.Sullivan, C. Internet traders of child pornography: profil<strong>in</strong>g research. Censorship Compliance Unit. NewZealand. 2005.Supreme Court of Sweden [Högsta Doms<strong>to</strong>len]. Mål nr B 1460-04. [Rul<strong>in</strong>g nr B 1460-04]. S<strong>to</strong>ckholm.2005.Sved<strong>in</strong>, C.G. and Back, K, <strong>Child</strong>ren who Don’t Speak Out. Save <strong>the</strong> <strong>Child</strong>ren Sweden. S<strong>to</strong>ckholm. 1996.Sved<strong>in</strong>, C.G. and Back, K. Why Didn’t They Tell Us? Sexual Abuse <strong>in</strong> <strong>Child</strong> Pornography. Save <strong>the</strong> <strong>Child</strong>renSweden. S<strong>to</strong>ckholm. 2003.Sved<strong>in</strong>, C.G. and Priebe, G. Sell<strong>in</strong>g sex <strong>in</strong> a population-based study of high school seniors <strong>in</strong> Sweden:Demographic and psychosocial correlates. Archives of Sexual Behavior, 36, 2007, 21-32.Tate, T. <strong>Child</strong> Pornography. Methuen. St. Ives, UK. 1990.Taylor, M. and Quayle, E. <strong>Child</strong> Pornography: An Internet Crime. Routledge. Brigh<strong>to</strong>n. 2003.Taylor, M. and Quayle, E. Abusive images of children. In S. Cooper, A. Giard<strong>in</strong>o, V. Vieth and N. Kellogg(Eds.), Medical, Legal and Social Science Aspects of <strong>Child</strong> Sexual Exploitation. GW Medical Publish<strong>in</strong>g.Sa<strong>in</strong>t Louis. 2005.<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |115
- Page 5 and 6:
Child Pornography and SexualExploit
- Page 7 and 8:
6.1.5 Media co-operation 956.1.6 Ev
- Page 9 and 10:
Executive SummaryÜ This thematic p
- Page 11 and 12:
importance for children who are sam
- Page 13 and 14:
Actions to be achieved by 2013Toget
- Page 15 and 16:
Positive advances were also noted,
- Page 17 and 18:
2. Adult perpetrators of abuse2.1 C
- Page 19 and 20:
2 (c) defined child pornography as,
- Page 21 and 22:
Taylor, 2002). In part, this relate
- Page 23 and 24:
Level 7: Explicit Sexual Activity.I
- Page 25 and 26:
and carefree the child seems to be,
- Page 29 and 30:
2.3 The Internet sex offender, the
- Page 31 and 32:
e criminalised before the offender
- Page 33 and 34:
Non-secure collector: This person p
- Page 35 and 36:
This section examines the potential
- Page 37 and 38:
about sexually abusive practices an
- Page 39 and 40:
Activity Number PercentagePhysical
- Page 41 and 42:
searched for files on Gnutella are
- Page 43 and 44:
for a minimum of several months, wi
- Page 45 and 46:
develop a risk assessment that will
- Page 47 and 48:
3. Child victims of abuse via the n
- Page 49 and 50:
that a more conservative estimate w
- Page 51 and 52:
States need to demonstrate investme
- Page 53 and 54:
we investigate such cases and how w
- Page 55 and 56:
Table 5: Disclosure of abuse throug
- Page 57 and 58:
Silbert (1989) made reference to th
- Page 59 and 60:
they will have had no control over
- Page 61 and 62:
3.3 Children persuaded and coerced
- Page 63 and 64:
all crimes in which the victim thou
- Page 65 and 66:
situation have reported to one of t
- Page 67 and 68:
programmed to make them difficult t
- Page 69 and 70:
disorders, for young offenders with
- Page 71 and 72: ealising how widely they could be c
- Page 73 and 74: contexts, be seen as a consequence
- Page 75 and 76: some people they connect with onlin
- Page 77 and 78: Two studies by Lwin et al. (2008) l
- Page 79 and 80: perhaps reaching the same conclusio
- Page 81 and 82: 4.5.2 Young people accessing child
- Page 83 and 84: Some abusers intent on grooming you
- Page 85 and 86: or young person’s experience of b
- Page 87 and 88: for different psychosocial problems
- Page 89 and 90: A recent study from Ukraine demonst
- Page 91 and 92: paper, such as online abuse where t
- Page 93 and 94: definition in Article 20 - Offences
- Page 95 and 96: • Which is a visual or audio repr
- Page 97 and 98: i. The display of the material by a
- Page 99 and 100: sex offending, this would certainly
- Page 101 and 102: the vast majority who met someone o
- Page 103 and 104: 6.1.6 Evaluation of impactFew infor
- Page 105 and 106: most countries. However, such image
- Page 107 and 108: of online child sexual abuse conten
- Page 109 and 110: gambling). Based on research commis
- Page 111 and 112: 7. RecommendationsIn preparation of
- Page 113 and 114: Endnotes1Dr. Ethel Quayle, COPINE R
- Page 115 and 116: Bensimon, P. The role of pornograph
- Page 117 and 118: Flood, M. Exposure to pornography a
- Page 119 and 120: Joyce, E. and Kraut, R. Predicting
- Page 121: Mitchell, K.J., Finkelhor, D. and W
- Page 125: Wolak, J., Finkelhor, D., Mitchell,