13.07.2015 Views

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

to download the document in PDF format - Child Centre: Expert ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

that <strong>the</strong>y use <strong>the</strong> Internet <strong>to</strong> ga<strong>in</strong> access <strong>to</strong> children whom <strong>the</strong>y coerce <strong>in</strong><strong>to</strong> meet<strong>in</strong>g <strong>the</strong>mfor sexual purposes. The third category, trader-travellers, are those who do both. However,as Beech, Elliot, Birgden and F<strong>in</strong>dlater (2008) have <strong>in</strong>dicated, “Although <strong>in</strong>tuitivelysimple and appeal<strong>in</strong>g, <strong>the</strong>re are also a number of problems with this system. A trader whotravels <strong>to</strong> commit contact offences with children solicited offl<strong>in</strong>e while simultaneouslyaccess<strong>in</strong>g abusive images would only be considered a trader. Conversely, an offender whouses <strong>the</strong> Internet <strong>to</strong> arrange sexual meet<strong>in</strong>gs with children and simultaneously collectsoffl<strong>in</strong>e ‘<strong>in</strong>dicative’ images or sexually abusive pseudo-images of children is only considereda traveller”. For <strong>the</strong> discussion on <strong>the</strong> offend<strong>in</strong>g behaviour that would fit <strong>in</strong><strong>to</strong> <strong>the</strong> categoryof sexual exploitation we can clearly see <strong>the</strong> trader as contribut<strong>in</strong>g <strong>to</strong> and fur<strong>the</strong>r<strong>in</strong>g <strong>the</strong>sexual abuse of children by committ<strong>in</strong>g crimes that would fall <strong>in</strong> <strong>the</strong> exploitation category,whereas <strong>the</strong> traveller and <strong>the</strong> trader-traveller would both be sexual abusers and sexualexploiters as <strong>the</strong>ir offences build on <strong>the</strong> one <strong>to</strong> fur<strong>the</strong>r <strong>the</strong> o<strong>the</strong>r. Krone (2004) generated amore comprehensive typology along a cont<strong>in</strong>uum of <strong>in</strong>creas<strong>in</strong>g seriousness of <strong>the</strong> offence.This <strong>in</strong>cluded offences that did not directly <strong>in</strong>volve a child <strong>to</strong> offences <strong>in</strong>volv<strong>in</strong>g directcontact with children, and from onl<strong>in</strong>e engagement <strong>to</strong> physical abuse. Krone’s (2004)typology generated n<strong>in</strong>e types of offender classes. These were:Table 2: Krone’s (2004) typologyBrowser: This is a person who may stumble across child pornography un<strong>in</strong>tentionally(for example via spam) but <strong>the</strong>n decide <strong>to</strong> keep it, ra<strong>the</strong>r than delete it.Private fantasy: Krone differentiates between a private fantasy (which is unlikely <strong>to</strong> beseen as illegal) and where <strong>the</strong>re is evidence of that fantasy through a permanent product,such as images or text. This is not necessarily shared with o<strong>the</strong>rs, but may come <strong>to</strong> lightaccidentally.Trawler: This is a person who uses little onl<strong>in</strong>e security and where <strong>the</strong>re is m<strong>in</strong>imalnetwork<strong>in</strong>g with o<strong>the</strong>rs. Krone (2004) used <strong>the</strong> earlier work of Taylor (1999) <strong>to</strong> expla<strong>in</strong>what might motivate such a person. The sexually omnivorous user is oriented <strong>to</strong> a rangeof sexually explicit material of which child pornography is simply a part but not <strong>the</strong>focus. The sexually curious user has experimented with child pornographic material buthas not pursued it. The libertarian is driven <strong>to</strong> assert a claim <strong>to</strong> be free <strong>to</strong> access whateverIn material a similar <strong>the</strong>y way, wish. Lann<strong>in</strong>g (2001) talked about ‘computer offenders’ who use this medium24|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!