| Foreword |
|
xi | |
|
PART 1 Abusive images and their emergence as a significant problem |
|
|
1 | (76) |
|
1 An introduction to the problem |
|
|
3 | (20) |
|
|
|
|
|
|
|
3 | (1) |
|
|
|
4 | (2) |
|
The use of abusive images |
|
|
6 | (3) |
|
|
|
9 | (1) |
|
|
|
10 | (3) |
|
Social contexts for image use |
|
|
13 | (1) |
|
|
|
14 | (2) |
|
|
|
16 | (7) |
|
2 Children within the images |
|
|
23 | (21) |
|
|
|
|
|
|
|
23 | (3) |
|
Self-produced sexual material |
|
|
26 | (6) |
|
Children in sexually abusive images |
|
|
32 | (7) |
|
Conclusion and discussion |
|
|
39 | (5) |
|
3 Understanding the emergence of the Internet sex offender: how useful are current theories in understanding the problem? |
|
|
44 | (16) |
|
|
|
|
|
|
|
44 | (2) |
|
Applying the integrated theory of sexual offending to understanding the online exploitation of children |
|
|
46 | (4) |
|
Ward and Siegert's pathways model explanation of online sexually abusive behaviours |
|
|
50 | (3) |
|
Explanations of the offence process in Internet offending |
|
|
53 | (1) |
|
|
|
54 | (6) |
|
4 Child pornography in international law |
|
|
60 | (17) |
|
|
|
|
|
60 | (1) |
|
What is international law? |
|
|
60 | (2) |
|
|
|
62 | (2) |
|
|
|
64 | (3) |
|
|
|
67 | (4) |
|
|
|
71 | (3) |
|
|
|
74 | (3) |
|
PART 2 Legal, social and familial contexts of abuse |
|
|
77 | (92) |
|
5 Child pornography and law in East Asia |
|
|
79 | (17) |
|
|
|
|
|
79 | (1) |
|
Legislative control of child pornography |
|
|
80 | (10) |
|
|
|
90 | (6) |
|
6 The social dimension of the online trade of child sexual exploitation material |
|
|
96 | (20) |
|
|
|
|
|
96 | (1) |
|
Child pornography and contact child sexual offending |
|
|
96 | (1) |
|
The similarities and differences between child pornography and contact child sexual offenders |
|
|
97 | (4) |
|
So why don't more child pornography offenders commit contact offences? |
|
|
101 | (2) |
|
The dark side of social control |
|
|
103 | (4) |
|
The new relationship between media consumption and contact offending |
|
|
107 | (2) |
|
|
|
109 | (7) |
|
7 Online child pornography, paedophilia and the sexualized child: mediated myths and moral panics |
|
|
116 | (17) |
|
|
|
|
|
116 | (1) |
|
Myth 1: sexual attraction to children is a problem of late-modern, technologically advanced nations |
|
|
117 | (2) |
|
Myth 2: CSA is an offence carried out by strangers and children are protected within the home |
|
|
119 | (3) |
|
Myth 3: child sexual abuse is less pervasive within societies with strong family structures |
|
|
122 | (1) |
|
Myth 4: paedophilia is an individual pathology |
|
|
123 | (4) |
|
Myth 5: children are `innocent' victims |
|
|
127 | (3) |
|
|
|
130 | (3) |
|
8 Sexual behaviour, adolescents and problematic content |
|
|
133 | (15) |
|
|
|
|
|
133 | (1) |
|
|
|
134 | (3) |
|
Coercion, peer pressure, grooming |
|
|
137 | (2) |
|
|
|
139 | (1) |
|
Young people's sexual behaviour online and their safety when using information and communication technologies |
|
|
139 | (1) |
|
Emergence of self-generated content |
|
|
140 | (2) |
|
Young people who are same-sex attracted and knowledge about online behaviours |
|
|
142 | (1) |
|
Exposure to pornography/accessing pornography? |
|
|
143 | (2) |
|
Balancing the rights of the child to explore their sexuality and the right to be protected from that which might cause harm |
|
|
145 | (3) |
|
9 Risk assessment of child pornography offenders: applications for law enforcement |
|
|
148 | (21) |
|
|
|
|
|
|
|
148 | (1) |
|
|
|
148 | (2) |
|
|
|
150 | (1) |
|
|
|
151 | (1) |
|
Risk assessment within law enforcement |
|
|
151 | (1) |
|
Risk assessment of child pornography offenders |
|
|
152 | (1) |
|
Contact offending histories |
|
|
153 | (1) |
|
Comparisons of child pornography and contact offenders |
|
|
154 | (1) |
|
Recidivism of child pornography offenders |
|
|
155 | (1) |
|
|
|
156 | (4) |
|
Development of an offence-specific risk measure? |
|
|
160 | (2) |
|
Summary and implications for law enforcement |
|
|
162 | (1) |
|
Future directions for research |
|
|
163 | (1) |
|
|
|
164 | (5) |
|
PART 3 Prevention and harm reduction |
|
|
169 | (97) |
|
10 The importance of digital evidence in Internet sex offending |
|
|
171 | (17) |
|
|
|
|
|
171 | (3) |
|
Risk assessment and Internet offenders |
|
|
174 | (3) |
|
Candidate measures for risk assessment |
|
|
177 | (7) |
|
Informing community risk assessments |
|
|
184 | (4) |
|
11 Situational prevention of child abuse in the new technologies |
|
|
188 | (16) |
|
|
|
|
|
188 | (1) |
|
Theoretical orientation: the person-situational interaction |
|
|
189 | (4) |
|
|
|
193 | (5) |
|
|
|
198 | (6) |
|
12 Proactive strategies to prevent the use of child abusive images: the Dunkelfeld Project |
|
|
204 | (24) |
|
|
|
|
|
|
|
204 | (1) |
|
`Dunkelfeld': offences that go undetected |
|
|
204 | (2) |
|
Sexual preference for children: paedophilia and hebephilia |
|
|
206 | (2) |
|
Primary and secondary prevention efforts |
|
|
208 | (2) |
|
Legal framework conditions in Germany |
|
|
210 | (1) |
|
The Berlin Prevention Project Dunkelfeld |
|
|
211 | (2) |
|
First results from the Berlin Prevention Project Dunkelfeld |
|
|
213 | (1) |
|
Special focus on child pornography offences |
|
|
214 | (2) |
|
|
|
216 | (1) |
|
Treatment setting and manual construction |
|
|
217 | (1) |
|
|
|
218 | (3) |
|
Outlook and new challenges |
|
|
221 | (7) |
|
13 Technological solutions to offending |
|
|
228 | (16) |
|
|
|
|
|
|
|
|
|
|
|
|
|
228 | (1) |
|
|
|
228 | (2) |
|
Current technological landscape |
|
|
230 | (1) |
|
|
|
231 | (1) |
|
|
|
232 | (2) |
|
Internet-based offending: a moving target |
|
|
234 | (1) |
|
Evolving offender tactics |
|
|
235 | (1) |
|
|
|
235 | (1) |
|
|
|
236 | (1) |
|
|
|
237 | (1) |
|
|
|
237 | (1) |
|
Overcoming the challenges: from reactive to proactive policing |
|
|
238 | (3) |
|
|
|
241 | (3) |
|
14 A public health approach to addressing Internet child sexual exploitation |
|
|
244 | (22) |
|
|
|
|
|
|
|
|
|
|
|
244 | (1) |
|
Overview: the public health burden of the issue |
|
|
245 | (1) |
|
What is a public health approach and how does it apply to Internet child exploitation? |
|
|
246 | (13) |
|
|
|
259 | (3) |
|
|
|
262 | (4) |
| Index |
|
266 | |