|
|
ix | |
|
|
x | |
Abbreviations |
|
xi | |
|
|
1 | (14) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
Defining child sexual abuse material |
|
|
4 | (2) |
|
|
6 | (1) |
|
|
7 | (2) |
|
|
9 | (6) |
|
|
15 | (70) |
|
|
17 | (19) |
|
|
17 | (1) |
|
What constitutes the environment in the CSAM ecosystem? |
|
|
18 | (4) |
|
A climate that is conducive to growth |
|
|
22 | (1) |
|
What constitutes an organism in the CSAM ecosystem? |
|
|
23 | (7) |
|
How are communities formed in the CSAM ecosystem and how do their members interact with one another? |
|
|
30 | (1) |
|
Summing up the CSAM ecosystem |
|
|
31 | (5) |
|
|
36 | (15) |
|
|
36 | (1) |
|
|
36 | (3) |
|
|
39 | (3) |
|
|
42 | (1) |
|
CSAM in computer-generated images, animation and computer games |
|
|
43 | (1) |
|
Summing up the ways in which CSAM is created |
|
|
44 | (7) |
|
4 How is CSAM distributed? |
|
|
51 | (14) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (2) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
Which countries share CSAM? |
|
|
60 | (1) |
|
Summing up the ways in which CSAM is shared |
|
|
61 | (4) |
|
|
65 | (8) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
Situations in which CSAM is viewed |
|
|
67 | (1) |
|
Technology used to view CSAM |
|
|
67 | (1) |
|
Security measures to prevent disclosure |
|
|
68 | (2) |
|
Summing up the ways in which CSAM is consumed |
|
|
70 | (3) |
|
6 Understanding CSAM problems |
|
|
73 | (12) |
|
|
73 | (1) |
|
Classifying problem facilitators |
|
|
74 | (3) |
|
Features of the 15 Problems |
|
|
77 | (4) |
|
|
81 | (4) |
|
PART II Addressing the problem |
|
|
85 | (96) |
|
7 Taking a crime science approach |
|
|
87 | (22) |
|
|
87 | (1) |
|
|
87 | (7) |
|
|
94 | (10) |
|
|
104 | (1) |
|
|
104 | (5) |
|
8 Approaches to reducing the production of CSAM |
|
|
109 | (30) |
|
|
109 | (2) |
|
Interventions that address target selection |
|
|
111 | (9) |
|
Interventions that address preparation |
|
|
120 | (1) |
|
Interventions that address perpetration |
|
|
121 | (1) |
|
Interventions that address completion |
|
|
121 | (4) |
|
Summing up the evidence on approaches the reduce the production of CSAM |
|
|
125 | (2) |
|
What more could be done to reduce CSAM production? |
|
|
127 | (12) |
|
9 Approaches to preventing the distribution of CSAM |
|
|
139 | (18) |
|
|
139 | (1) |
|
|
139 | (5) |
|
Taking down rogue servers |
|
|
144 | (2) |
|
|
146 | (2) |
|
The problem of encryption |
|
|
148 | (1) |
|
Summing up the evidence on approaches that reduce the distribution of CSAM |
|
|
148 | (2) |
|
What more could be done to reduce CSAM distribution? |
|
|
150 | (7) |
|
10 Approaches to preventing the consumption of CSAM |
|
|
157 | (10) |
|
|
157 | (1) |
|
Pop-up messaging to warn users |
|
|
158 | (2) |
|
Law enforcement detection of CSAM Consumers |
|
|
160 | (2) |
|
Demotivating CSAM Consumers |
|
|
162 | (1) |
|
Summing up the evidence on approaches to reduce the consumption of CSAM |
|
|
163 | (1) |
|
What more could be done to reduce CSAM from being consumed? |
|
|
164 | (3) |
|
|
167 | (14) |
|
Addressing a complex problem |
|
|
167 | (1) |
|
|
168 | (13) |
Concluding remarks |
|
181 | (3) |
Index |
|
184 | |