13.07.2015 Views

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Positive advances were also noted, particularly <strong>in</strong> relation <strong>to</strong> <strong>in</strong>creased <strong>in</strong>ternationalpolice co-operation, <strong>the</strong> development of dedicated law enforcement <strong>in</strong>itiatives, as well ascommunity-based <strong>in</strong>itiatives, such as hotl<strong>in</strong>es and <strong>in</strong>dustry-based codes of practice, alongwith public-awareness campaigns designed <strong>to</strong> alert children and parents about potentialonl<strong>in</strong>e dangers. A series of recommendations were made by this <strong>the</strong>matic paper whichrelated <strong>to</strong> specific targets for consolidation or change. These <strong>in</strong>cluded ano<strong>the</strong>r call for <strong>the</strong>harmonisation of def<strong>in</strong>itions and laws related <strong>to</strong> <strong>the</strong> problem, <strong>in</strong>clud<strong>in</strong>g issues relat<strong>in</strong>g <strong>to</strong>age of majority, and <strong>the</strong> need <strong>to</strong> develop expertise and resources with<strong>in</strong> law enforcementagencies and <strong>the</strong> establishment of standardised procedures, pro<strong>to</strong>cols and databases, alongwith multilateral and bilateral work<strong>in</strong>g relationships with<strong>in</strong> law enforcement. The judiciarywere identified as need<strong>in</strong>g <strong>to</strong> develop greater understand<strong>in</strong>g of technological crime, whichwould be reflected <strong>in</strong> sentenc<strong>in</strong>g policies and both <strong>in</strong>dustry, and law enforcement agencieswere called upon <strong>to</strong> work with <strong>the</strong> challenges of encryption, anonymity, identificationand removal of image availability. At a community level, recommendations were made <strong>to</strong><strong>in</strong>crease assistance <strong>to</strong> <strong>the</strong> development of hotl<strong>in</strong>es and <strong>to</strong> enable more effective educationabout stay<strong>in</strong>g safe onl<strong>in</strong>e. In addition, a challenge was made at a political level <strong>to</strong> ‘confrontand confound any argument which seeks <strong>to</strong> l<strong>in</strong>k <strong>the</strong> protection of children with attacks onfree speech’.As already noted, when <strong>the</strong> first paper was written <strong>the</strong>re was very little empirical datarelat<strong>in</strong>g <strong>to</strong> <strong>the</strong> new technologies that could <strong>in</strong>form our understand<strong>in</strong>g of <strong>the</strong> problemsposed, and while this had changed somewhat by 2001 <strong>the</strong> data that was drawn on relatedlargely <strong>to</strong> that obta<strong>in</strong>ed through police operations and anecdotal <strong>in</strong><strong>format</strong>ion, or casestudies, from several countries. In fact, one of <strong>the</strong> constra<strong>in</strong>ts noted <strong>in</strong> this paper related <strong>to</strong><strong>the</strong> absence of reliable data from many parts of <strong>the</strong> non-<strong>in</strong>dustrialised world, which madegeneralisations from exist<strong>in</strong>g published studies more difficult. As we will see, this situationhas not substantially changed and is a cause for considerable concern, as is <strong>the</strong> cont<strong>in</strong>uedpaucity of recovery programmes for children and young people abused and/or exploitedthrough <strong>the</strong> new technologies. However, <strong>the</strong>re have been some very positive changes, withmore countries develop<strong>in</strong>g def<strong>in</strong>itions and laws related <strong>to</strong> child abuse through <strong>the</strong> newtechnologies, a substantial advance <strong>in</strong> <strong>the</strong> capacity of law enforcement agencies <strong>to</strong> respondboth nationally and <strong>in</strong>ternationally, and an <strong>in</strong>creas<strong>in</strong>g acknowledgement that tackl<strong>in</strong>g<strong>the</strong>se problems requires a multi-agency, multi-sec<strong>to</strong>r approach. Few countries have,however, responded with more str<strong>in</strong>gent legislation <strong>in</strong> relation <strong>to</strong> <strong>the</strong> use of In<strong>format</strong>ionand communication technology (ICT) <strong>to</strong> exploit children sexually. There has also been an<strong>in</strong>crease <strong>in</strong> <strong>the</strong> number of countries that have hotl<strong>in</strong>es, which have received substantial<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!