oth <strong>the</strong> diversity of <strong>the</strong> children <strong>in</strong>volved <strong>in</strong> onl<strong>in</strong>e abusive practices and <strong>the</strong> fact thatharm may be <strong>in</strong>flicted even when <strong>the</strong> children <strong>the</strong>mselves have limited, or no, access <strong>to</strong><strong>the</strong> new technologies. These will be considered fur<strong>the</strong>r when we exam<strong>in</strong>e <strong>the</strong> importanceof cultural and geographical differences <strong>in</strong> conceptualis<strong>in</strong>g harm. In <strong>the</strong> follow<strong>in</strong>g sectiontwo of <strong>the</strong> areas of concern listed <strong>in</strong> <strong>the</strong> Barnardos’ study – children groomed onl<strong>in</strong>e forsexual abuse offl<strong>in</strong>e and children made <strong>the</strong> subjects of abusive images – are discussed <strong>in</strong>more detail. The rema<strong>in</strong>der are addressed <strong>in</strong> o<strong>the</strong>r sections of <strong>the</strong> paper.Our understand<strong>in</strong>g of <strong>the</strong> impacts of child sexual abuse on children’s emotional andpsychological well-be<strong>in</strong>g has grown rapidly over <strong>the</strong> past 20 years (Sgroi, 1982; F<strong>in</strong>kelhor,1986; Ben<strong>to</strong>vim et al., 1988; Jehu, 1988; Briere, 1989). Correspond<strong>in</strong>g knowledge onhow children are affected by sexual exploitation is on <strong>the</strong> o<strong>the</strong>r hand very sparse. Theeffects of sexual abuse are many and far rang<strong>in</strong>g. <strong>Child</strong>ren may feel grief, guilt and fear.They may display an <strong>in</strong>ability <strong>to</strong> trust, cognitive confusion, lack of mastery and control,repressed anger and hostility, blurred boundaries and role confusion, pseudo-maturity andfailure <strong>to</strong> complete developmental tasks, depression and poor social skills (Palmer, 2001).F<strong>in</strong>kelhor and Berl<strong>in</strong>er (1995) provided a conceptual framework for an understand<strong>in</strong>gof <strong>the</strong> impact of sexual abuse on children. They described four trauma-caus<strong>in</strong>g fac<strong>to</strong>rs:traumatic sexualisation, betrayal, powerlessness and stigmatisation. These authors suggestedthat, although <strong>the</strong>se fac<strong>to</strong>rs were present <strong>in</strong> o<strong>the</strong>r experiences which could be describedas traumatic, <strong>the</strong> way <strong>the</strong>y <strong>in</strong>tersected with<strong>in</strong> a given set of circumstances was what made<strong>the</strong> trauma of sexual abuse unique. Kelly (1992) used this framework and expanded it<strong>to</strong> <strong>in</strong>clude notions of ‘shame’ and ‘enforced silence’ that had been derived from previousresearch. We know that <strong>the</strong> degree of <strong>in</strong>ternalisation of sexually abusive experiencesis unique <strong>to</strong> each child and dependent on fac<strong>to</strong>rs such as: <strong>the</strong> nature of <strong>the</strong> abuse; <strong>the</strong>circumstances <strong>in</strong> which it occurred; <strong>the</strong> modus operandi of <strong>the</strong> abuser; <strong>the</strong> nature of <strong>the</strong>child’s previous life experiences; <strong>the</strong> degree of support with<strong>in</strong> <strong>the</strong> home environment; and<strong>the</strong> child’s natural ‘<strong>in</strong>-built’ resilience. In many parts of <strong>the</strong> world, child welfare/ protectionagencies and crim<strong>in</strong>al justice agencies have jo<strong>in</strong>tly drawn up procedures for <strong>in</strong>vestigat<strong>in</strong>gcases of child sexual abuse with <strong>the</strong> aim of safeguard<strong>in</strong>g <strong>the</strong> children concerned and hold<strong>in</strong>g<strong>the</strong> perpetra<strong>to</strong>r responsible. There are assessment and <strong>in</strong>tervention programmes <strong>in</strong> place<strong>to</strong> assist children <strong>in</strong> <strong>the</strong>ir recovery and help <strong>the</strong>m make sense of what has happened <strong>to</strong><strong>the</strong>m. However <strong>the</strong>re is still an urgent need, as expressed by several authors, <strong>to</strong> expand <strong>the</strong>knowledge base when assist<strong>in</strong>g child victims of sexual abuse and sexual exploitation via<strong>the</strong> new technology. With <strong>the</strong> <strong>in</strong>troduction of technology, we are faced with both a novelconduit for those <strong>in</strong>tent on harm<strong>in</strong>g children and <strong>the</strong> potential of <strong>the</strong>re be<strong>in</strong>g compleximpacts on children abused and exploited via this medium, which call for development ofnew methods of assistance (Palmer, 2005; Nyman, 2006; Söderström, 2006; von Weiller2008). Such impacts challenge us <strong>to</strong> review our current practice both with regard <strong>to</strong> how44|<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e
we <strong>in</strong>vestigate such cases and how we accommodate <strong>the</strong> recovery needs of <strong>the</strong> child victims.In particular, <strong>the</strong> research <strong>in</strong> Germany by von Weiller has highlighted some of <strong>the</strong> gaps <strong>in</strong>our ability <strong>to</strong> respond <strong>the</strong>rapeutically <strong>to</strong> <strong>the</strong>se children. These <strong>in</strong>clude:• Lack of experienced professionals• Lack of specific knowledge and expertise on <strong>the</strong> psychological impact on <strong>the</strong>victim• Limited access <strong>to</strong> services throughout <strong>the</strong> world• A need for shar<strong>in</strong>g of good practice among professionals both regionally and<strong>in</strong>ternationally• An ability <strong>to</strong> build on exist<strong>in</strong>g structures, while acknowledg<strong>in</strong>g cultural diversity, <strong>to</strong>enable both recognition of , and response <strong>to</strong>, <strong>the</strong> needs of <strong>the</strong>se children.Here we acknowledge <strong>the</strong> paucity of research on <strong>the</strong> impact of both Internet-related sexualabuse and what should be seen as Internet-related sexual exploitation. It is clear that <strong>in</strong><strong>the</strong> majority of countries practitioners do not explore such abuse nor do <strong>the</strong>y feel that <strong>the</strong>yhave <strong>the</strong> capacity or expertise <strong>to</strong> address <strong>the</strong> sexual exploitation children suffer.3.2.1 <strong>Child</strong>ren made <strong>the</strong> subjects of abuse imagesIn <strong>the</strong> context of abuse images, <strong>the</strong>re are four substantial studies (all but one of whichpredate <strong>the</strong> Internet), which have sought <strong>to</strong> exam<strong>in</strong>e <strong>the</strong> impact of ‘child pornography’.• Burgess and Hartman (1987) exam<strong>in</strong>ed children’s <strong>in</strong>volvement <strong>in</strong> pornography andsex r<strong>in</strong>gs;• Silbert (1989) exam<strong>in</strong>ed child pornography production <strong>in</strong> <strong>the</strong> context of childprostitution;• Sved<strong>in</strong> and Back’s (1996) sample was drawn from a group of children exposed <strong>to</strong>both <strong>the</strong> production of pornography and <strong>in</strong>tra and extra-familial abuse (an enlargedsample was published <strong>in</strong> 2003 and will be considered separately)• Scott’s (2001) study was <strong>in</strong> <strong>the</strong> context of ritual abuse.All four of <strong>the</strong>se studies are broadly similar <strong>in</strong> <strong>the</strong> accounts that <strong>the</strong>y give of <strong>the</strong> symp<strong>to</strong>msthat <strong>the</strong> children produced dur<strong>in</strong>g <strong>the</strong> abuse. Aga<strong>in</strong> it is difficult <strong>to</strong> disentangle <strong>the</strong>consequences of <strong>the</strong> abuse per se (physical symp<strong>to</strong>ms, such as ur<strong>in</strong>ary <strong>in</strong>fections andgenital soreness, as well as behavioural symp<strong>to</strong>ms such as sexualised behaviours) from <strong>the</strong>consequences of be<strong>in</strong>g pho<strong>to</strong>graphed, ie, <strong>the</strong> symp<strong>to</strong>ms of <strong>the</strong> sexual exploitation. HoweverSved<strong>in</strong> and Back (1996) gave details amongst <strong>the</strong>ir sample of restlessness, depression,hunger, exhaustion, concentration difficulties and aggressive behaviours. Silbert’s (1989)study also suggested that children who were exposed <strong>to</strong> longer periods of abuse suffered<strong>Child</strong> Pornography and Sexual Exploitation of <strong>Child</strong>ren Onl<strong>in</strong>e |45
- Page 5 and 6: Child Pornography and SexualExploit
- Page 7 and 8: 6.1.5 Media co-operation 956.1.6 Ev
- Page 9 and 10: Executive SummaryÜ This thematic p
- Page 11 and 12: importance for children who are sam
- Page 13 and 14: Actions to be achieved by 2013Toget
- Page 15 and 16: Positive advances were also noted,
- Page 17 and 18: 2. Adult perpetrators of abuse2.1 C
- Page 19 and 20: 2 (c) defined child pornography as,
- Page 21 and 22: Taylor, 2002). In part, this relate
- Page 23 and 24: Level 7: Explicit Sexual Activity.I
- Page 25 and 26: and carefree the child seems to be,
- Page 29 and 30: 2.3 The Internet sex offender, the
- Page 31 and 32: e criminalised before the offender
- Page 33 and 34: Non-secure collector: This person p
- Page 35 and 36: This section examines the potential
- Page 37 and 38: about sexually abusive practices an
- Page 39 and 40: Activity Number PercentagePhysical
- Page 41 and 42: searched for files on Gnutella are
- Page 43 and 44: for a minimum of several months, wi
- Page 45 and 46: develop a risk assessment that will
- Page 47 and 48: 3. Child victims of abuse via the n
- Page 49 and 50: that a more conservative estimate w
- Page 51: States need to demonstrate investme
- Page 55 and 56: Table 5: Disclosure of abuse throug
- Page 57 and 58: Silbert (1989) made reference to th
- Page 59 and 60: they will have had no control over
- Page 61 and 62: 3.3 Children persuaded and coerced
- Page 63 and 64: all crimes in which the victim thou
- Page 65 and 66: situation have reported to one of t
- Page 67 and 68: programmed to make them difficult t
- Page 69 and 70: disorders, for young offenders with
- Page 71 and 72: ealising how widely they could be c
- Page 73 and 74: contexts, be seen as a consequence
- Page 75 and 76: some people they connect with onlin
- Page 77 and 78: Two studies by Lwin et al. (2008) l
- Page 79 and 80: perhaps reaching the same conclusio
- Page 81 and 82: 4.5.2 Young people accessing child
- Page 83 and 84: Some abusers intent on grooming you
- Page 85 and 86: or young person’s experience of b
- Page 87 and 88: for different psychosocial problems
- Page 89 and 90: A recent study from Ukraine demonst
- Page 91 and 92: paper, such as online abuse where t
- Page 93 and 94: definition in Article 20 - Offences
- Page 95 and 96: • Which is a visual or audio repr
- Page 97 and 98: i. The display of the material by a
- Page 99 and 100: sex offending, this would certainly
- Page 101 and 102: the vast majority who met someone o
- Page 103 and 104:
6.1.6 Evaluation of impactFew infor
- Page 105 and 106:
most countries. However, such image
- Page 107 and 108:
of online child sexual abuse conten
- Page 109 and 110:
gambling). Based on research commis
- Page 111 and 112:
7. RecommendationsIn preparation of
- Page 113 and 114:
Endnotes1Dr. Ethel Quayle, COPINE R
- Page 115 and 116:
Bensimon, P. The role of pornograph
- Page 117 and 118:
Flood, M. Exposure to pornography a
- Page 119 and 120:
Joyce, E. and Kraut, R. Predicting
- Page 121 and 122:
Mitchell, K.J., Finkelhor, D. and W
- Page 123 and 124:
Shukan Bunshun. Yoji Rape Bon ga Ba
- Page 125:
Wolak, J., Finkelhor, D., Mitchell,