Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 30, 2024 Tue

Time: 12:05 am

Results for sexting

26 results found

Author: Wolak, Janis

Title: Sexting: A Typology

Summary: This bulletin presents a typology of sexting episodes based on a review of over 550 cases obtained from a national survey of law enforcement agencies. The cases all involved “youth‐produced sexual images,” defined as images of minors created by minors that could qualify as child pornography under applicable criminal statutes. The episodes could be broadly divided into two categories, which we termed ‘Aggravated’ and ‘Experimental’. Aggravated incidents involved criminal or abusive elements beyond the creation, sending or possession of youth‐produced sexual images. These additional elements included 1) adult involvement; or 2) criminal or abusive behavior by minors such as sexual abuse, extortion, threats; malicious conduct arising from interpersonal conflicts; or creation or sending or showing of images without the knowledge or against the will of a minor who was pictured. In Experimental incidents, by contrast, youth took pictures of themselves to send to established boy‐ or girlfriends, to create romantic interest in other youth, or for reasons such as attention‐seeking, but there was no criminal behavior beyond the creation or sending of images, no apparent malice and no lack of willing participation by youth who were pictured.

Details: Durham, NH: Crimes Against Children Research Center, University of New Hampshire, 2011. 11p.

Source: Internet Resource: Accessed on January 21, 2012 at http://www.unh.edu/ccrc/pdf/CV231_Sexting%20Typology%20Bulletin_4-6-11_revised.pdf

Year: 2011

Country: United States

URL: http://www.unh.edu/ccrc/pdf/CV231_Sexting%20Typology%20Bulletin_4-6-11_revised.pdf

Shelf Number: 123714

Keywords:
Adult Offenders
Child Sexual Abuse
Juvenile Offenders
Sexting

Author: Badenhorst, Charmain

Title: Legal responses to cyber bullying and sexting in South Africa

Summary: Very little is known about the true extent of cyber bullying and sexting in South Africa – two relatively new phenomena. The occurrence of cyber bullying and sexting has increased along with increased access to and usage of electronic communication technology. Both adults and children are therefore at risk of participating in or being exposed to these practices. It is important to examine the legal responses to cyber bullying and sexting in the South African context since some of these acts may result in the commission of criminal offences or lead to civil actions. This paper explores cyber bullying and sexting in South Africa and focuses on the responses within the context of existing legislative frameworks and legal remedies available in South Africa. It also identifies some of the gaps and risks in the legal responses applicable to children who engage in cyber bullying and sexting, and offers some recommendations in an attempt to minimise the gaps and accompanying risks to children.

Details: Claremont, South Africa: CJCP - Centre for Justice and Crime Prevention, 2011. 20p.

Source: CJCP Issue Paper No. 10: Internet Resource: Accessed on February 3, 2012 at http://www.cjcp.org.za/admin/uploads/Issue%20Paper%2010-1.pdf

Year: 2011

Country: South Africa

URL: http://www.cjcp.org.za/admin/uploads/Issue%20Paper%2010-1.pdf

Shelf Number: 123941

Keywords:
Bullying, Cyber (South Africa)
Juvenile Offenders
Juvenile Victims
Legislation
Sexting

Author: Sacco, Dena T.

Title: Sexting: Youth Practices and Legal Implications

Summary: This document addresses legal and practical issues related to the practice colloquially known as sexting. It was created by Harvard Law School’s Cyberlaw Clinic, based at the Berkman Center for Internet & Society, for the Berkman Center’s Youth and Media Policy Working Group Initiative. The Initiative is exploring policy issues that fall within three substantive clusters emerging from youth’s information and communications technology practices: Risky Behaviors and Online Safety; Privacy, Publicity and Reputation; and Youth Created Content and Information Quality. The Initiative is funded by the John D. and Catherine T. MacArthur Foundation and is co‐directed by danah boyd, Urs Gasser, and John Palfrey. This document was created for the Risky Behaviors and Online Safety cluster, which is focused on four core issues: (1) sexual solicitation and problematic sexual encounters; (2) Internet‐related bullying and harassment; (3) access to problematic content, including pornography and self‐harm content; and (4) youth‐generated problematic content, including sexting. The Initiative’s goal is to bring the best research on youth and media into the policy‐making debate and to propose practical interventions based upon that research. This document is intended to provide background for the discussion of interventions related to sexting. It begins with a definition of sexting, and continues with overviews of research and media stories related to sexting. It then discusses the statutory and constitutional framework for child pornography and obscenity. It concludes with a description of current and pending legislation meant to address sexting.

Details: Cambridge, MA: The Berkman Center for Internet & Society at Harvard University, 2010. 45p.

Source: Internet Resource: Accessed February 11, 2012 at

Year: 2010

Country: United States

URL:

Shelf Number: 124082

Keywords:
Juvenile Offenders
Juvenile Victims
Legislation
Sexting

Author: Bluett-Boyd, Nicole

Title: The Role of Emerging Communication Technologies in Experiences of Sexual Violence: A New Legal Frontier?

Summary: This research study investigates how communication technologies facilitate sexual violence against young people and what challenges this presents for the Victorian criminal justice system. Based on interviews with young people and professionals working with young people, it examines the effects of technology on the lives of young people, the interface between emerging communication technologies and experiences of sexual violence, and the factors that enable or hinder appropriate legal responses. Communication technologies such as online social networking sites and mobile phones are considered, and their use in identifying and grooming potential victims, blackmail and intimation, sexting, harassment, and pornography. The key messages identified by the study included: - Young people's engagement with emerging communication technologies (such as social networking and mobile phone technology) is an essential method of socialisation. Given the constant accessibility offered by these technologies, and the blurring between online and offline social spheres, emerging communication technologies afford diverse opportunities for the perpetration of sexual violence. The study found that emerging communication technologies help facilitate sexually violent acts, before, during and after an offence. Specifically, technologies help to increase the accessibility of potential victims: Before a sexually violent act. Social networking in particular can provide a false sense of connection between offender and victim. For example, the act of 'friending' enhances the feeling of 'trust'. •During the act of sexual violence, technologies can be used to record non-consensual sexual activity. Threats to distribute this material can be used to further coerce and victimise. After an act of either consensual or non-consensual sexual activity, offenders can distribute images to cause further harm to victims. Technologies are also used post-assault to contact, threaten or abuse victims. - A lack of clarity on how a range of online behaviours should be conceptualised has hampered the development of appropriate and effective responses to the issue. While the law has a role to play in addressing such issues, appropriate conduct for using technologies is better addressed through a primary prevention approach to the promotion of personal ethics and respect.

Details: Melbourne: Australian Institute of Family Studies, 2013. 127p.

Source: Internet Resource: Research Report No. 23: Accessed February 28, 2013 at: http://www.aifs.gov.au/institute/pubs/resreport23/index.html

Year: 2013

Country: Australia

URL: http://www.aifs.gov.au/institute/pubs/resreport23/index.html

Shelf Number: 127554

Keywords:
Communication Technologies
Pornography
Sex Crimes
Sexting
Sexual Harassment
Sexual Violence (Australia)
Technology and Crime

Author: Englander, Elizabeth

Title: Low Risk Associated with Most Teenage Sexting: A Study of 617 18-Year-Olds

Summary: This report describes research conducted in 2011 and 2012 on 617 subjects, 30% of whom reported sexting. The report details the frequency of sexting behaviors as well as the relationship between coerced and non-coerced sexting, sexting and gender differences, characteristics of sexters, and data on risk of discovery and social conflict following engaging in sexting. The study revealed that most risk associated with sexting is experienced by youth who are coerced into sexting; they are more impacted emotionally by the experience, and are more likely to have a prior victimization. Risk of discovery and social conflict was highest for coerced sexters but still generally low.

Details: Bridgewater, MA: Massachusetts Aggression Reduction Center (MARC), Bridgewater State University, 2012. 13p.

Source: Internet Resource: MARC Research Reports. Paper 6: Accessed June 3, 2013 at: http://vc.bridgew.edu/cgi/viewcontent.cgi?article=1003&context=marc_reports

Year: 2012

Country: United States

URL: http://vc.bridgew.edu/cgi/viewcontent.cgi?article=1003&context=marc_reports

Shelf Number: 128925

Keywords:
Peer Influences
Sexting
Teenagers (Sexual Behavior)

Author: Mitchell, Kimberly J.

Title: Trends in Unwanted Online Experiences and Sexting: Final Report

Summary: This bulletin summarizes findings from the Third Youth Internet Safety Survey (YISS]3). Topics include youth reports of unwanted sexual solicitations, online harassment, unwanted exposure to sexual material, and "sexting."

Details: Durham, NH: University of New Hampshire, 2014. 57p.

Source: Internet Resource: Accessed May 10, 2014 at: http://www.unh.edu/ccrc/pdf/Full%20Trends%20Report%20Feb%202014%20with%20tables.pdf

Year: 2014

Country: United States

URL: http://www.unh.edu/ccrc/pdf/Full%20Trends%20Report%20Feb%202014%20with%20tables.pdf

Shelf Number: 147747

Keywords:
Internet Crimes
Internet Safety
Online Communications
Pornography
Sex Crimes
Sexting
Sexual Harassment

Author: Internet Watch Foundation

Title: Youth-Produced Sexual Content

Summary: This Paper introduces the key findings of a quantitative study of youth-produced sexual content online ("the Study"). The Study took place over a three month period between September and November 2014 and used a combination of proactively sourced1 content from search engines, historic IWF data and leads from public reports to locate "youth-produced sexual content" depicting "young people". Where the content was assessed as meeting these criteria the content was analysed in accordance with IWF's standard procedures for actioning child sexual abuse content, capturing data about each image/video including image category, site type, commerciality, hosting location, device used to create the content and the assessed age and gender of the individuals depicted. During the course of the Study, 3,803 images and videos were assessed as meeting the research criteria. The key findings of the Study were as follows: - 17.5% of content depicted children aged 15 years or younger. - 85.9% of content depicting children aged 15 or younger was created using a webcam. - 93.1% of the content depicting children aged 15 or younger featured girls. - 46.9% of content depicting children aged 15 years or younger was Category A or B5 compared to 27.6% of content in the 16-20 years age range. - 89.9% of the total images and videos assessed as part of the Study had been harvested from the original upload location and were being redistributed on third party websites.

Details: Cambridge, UK: Internet Watch Foundation, 2015. 23p.

Source: Internet Resource: Emerging Patterns and Trends Report #1: Accessed March 16, 2015 at: https://www.iwf.org.uk/assets/media/resources/Emerging%20Patterns%20and%20Trends%20Report%201%20-%20Youth-Produced%20Sexual%20Content%20website%20March%202015-1.pdf

Year: 2015

Country: United Kingdom

URL: http://pornharmsresearch.com/wp-content/uploads/Emerging-Patterns-and-Trends-Report-1-Youth-Produced-Sexual-Content-1.pdf

Shelf Number: 134937

Keywords:
Child Pornography (U.K.)
Child Sexual Abuse
Online Communications
Online Victimization
Sexting

Author: U.S. Department of Justice, Office of the Inspector General, Evaluation and Inspections Division

Title: The Handling of Sexual Harassment and Misconduct Allegations by the Department's Law Enforcement Components

Summary: The Office of the Inspector General (OIG) conducted this review to assess how the Department of Justice's (Department) four law enforcement components respond to sexual misconduct and harassment allegations made against their employees. This review examined the nature, frequency, reporting, investigation, and adjudication of such allegations in the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF); the Drug Enforcement Administration (DEA); the Federal Bureau of Investigation (FBI); and the United States Marshals Service (USMS). The findings in today's report include: - Component supervisors did not always report allegations of sexual harassment and misconduct to their respective internal affairs offices as required by component policies. In several instances, these supervisors were not disciplined for their failure to report. Additionally, at the FBI and USMS, the internal affairs offices chose not to investigate some allegations of sexual harassment and misconduct despite significant evidence that misconduct had occurred, and DEA's internal affairs office did not always fully investigate allegations of sexual misconduct related to prostitution. - At ATF, DEA, and USMS, we found a lack of coordination between the internal affairs offices and security personnel. As a result, security departments at these components were sometimes unaware of allegations that may impact an employee's eligibility to hold a security clearance and access classified information. In contrast, we found that the FBI's internal affairs office alerts the FBI security department to any such misconduct allegations it receives. - All of the components we reviewed either did not have adequate offense tables or did not properly use their offense tables for charging employees with sexual harassment and sexual misconduct offenses. The offense tables at ATF, DEA, and USMS did not contain adequate language to address the solicitation of prostitutes in jurisdictions where the conduct is legal or tolerated. The FBI offense table contains such a category, but we found instances where general offense categories were applied instead of the specific category. - All four components have weaknesses in detecting the transmission of sexually explicit text messages and images by employees. Although the FBI archives and proactively monitors its employees' text messages, there are limitations to its ability to use this information, and misconduct investigators at ATF, DEA, and USMS cannot easily obtain such text message evidence. These issues may hamper the components' ability to conduct misconduct investigations, fulfill their discovery obligations, and deter misconduct. Finally, today's report notes that the OIG's ability to conduct this review was significantly impacted and unnecessarily delayed by repeated difficulties we had in obtaining relevant information from both the FBI and DEA. Specifically, the FBI and DEA initially refused to provide the OIG with unredacted information which the OIG was entitled to receive under the Inspector General Act. When they finally did provide the information without extensive redactions, we found that it still was incomplete. We were also concerned by an apparent decision by DEA to withhold information regarding a particular open misconduct case despite the fact that the OIG was authorized to receive the information. Because of these difficulties, we cannot be completely confident that the FBI and DEA provided us with all information relevant to this review. Our report reflects the findings and conclusions we reached based on the information made available to us. The report makes eight recommendations to improve the law enforcement components' disciplinary and security processes relating to allegations of sexual misconduct and harassment. The DOJ and the four components reviewed concurred with all of the recommendations.

Details: Washington, DC: U.S. Department of Justice, 2015. 139p.

Source: Internet Resource: Accessed April 2, 2015 at: http://www.justice.gov/oig/reports/2015/e1504.pdf

Year: 2015

Country: United States

URL: http://www.justice.gov/oig/reports/2015/e1504.pdf

Shelf Number: 135145

Keywords:
Child Pornography
Law Enforcement Investigations
Military (U.S.)
Prostitution
Rape
Sexting
Sexual Abuse
Sexual Harassment
Sexual Misconduct

Author: Internet Watch Foundation

Title: Emerging Patterns and Trends Report #1. Youth-Produced Sexual Content

Summary: This Paper introduces the key findings of a quantitative study of youth-produced sexual content online ('the Study'). The Study took place over a three month period between September and November 2014 and used a combination of proactively sourced content from search engines, historic IWF data and leads from public reports to locate "youth-produced sexual content" depicting "young people". Where the content was assessed as meeting these criteria the content was analysed in accordance with IWF's standard procedures for actioning child sexual abuse content, capturing data about each image/video including image category, site type, commerciality, hosting location, device used to create the content and the assessed age and gender of the individuals depicted. During the course of the Study, 3,803 images and videos were assessed as meeting the research criteria. The key findings of the Study were as follows: - 17.5% of content depicted children aged 15 years or younger. - 85.9% of content depicting children aged 15 or younger was created using a webcam. - 93.1% of the content depicting children aged 15 or younger featured girls. - 46.9% of content depicting children aged 15 years or younger was Category A or B5 compared to 27.6% of content in the 16-20 years age range. - 89.9% of the total images and videos assessed as part of the Study had been harvested from the original upload location and were being redistributed on third party websites. The Study was carried out by Internet Watch Foundation (IWF) in partnership with Microsoft and was initially designed to expand upon an earlier study carried out by IWF in 2012 which provided a snapshot of the availability of self-generated sexual content featuring young people online and the extent to which control over that content is lost once it has appeared online. However, on analysis of the data it became apparent that the scope of the 2012 study and the definition of "self-generated sexual content" as used therein was inadequate in describing the observed trends. This was particularly the case in relation to methods of creation of the content and age of many of the individuals depicted. What emerged from the data in this Study is an increasing trend for the distribution of sexually explicit content produced by younger children using laptop webcams which, due to the nature of the technology used, they are aware is being shared with at least one other party. To reflect this finding, we instead propose a new definition of "youth-produced sexual content" as: "Nude or semi-nude images or videos produced by a young person of themselves engaging in erotic or sexual activity and intentionally shared by any electronic means."

Details: Cambridge, UK: Internet Watch Foundation, 2015. 25p.

Source: Internet Resource: Accessed April 2, 2015 at: https://www.iwf.org.uk/assets/media/resources/Emerging%20Patterns%20and%20Trends%20Report%201%20-%20Youth-Produced%20Sexual%20Content.pdf

Year: 2015

Country: United Kingdom

URL: https://www.iwf.org.uk/assets/media/resources/Emerging%20Patterns%20and%20Trends%20Report%201%20-%20Youth-Produced%20Sexual%20Content.pdf

Shelf Number: 135150

Keywords:
Child Pornography
Computer Crimes
Internet Crimes
Internet Pornography
Sex Crimes
Sexting

Author: Walsh, Wendy A.

Title: Sexting: When are State Prosecutors Deciding to Prosecute? The Third National Juvenile Online Victimization Study

Summary: The majority of state prosecutors (62%) in the sample that had worked on technology facilitated crimes against children had handled a sexting case involving juveniles, and 36% of prosecutors in the sample reported that they had ever filed charges in these cases. When charges were filed, the majority charged child pornography production felonies and 16% of prosecutors had sexting cases that resulted in the defendant being sentenced to sex offender registration. Research needs to continue to help prosecutors develop tools and strategies to deal with these complex crimes.

Details: Durham, NH: Crime Against Children Research Center, 2013. 4p.

Source: Internet Resource: Accessed May 20, 2015 at: http://www.unh.edu/ccrc/pdf/CV294_Walsh_Sexting%20&%20prosecution_2-6-13.pdf

Year: 2013

Country: United States

URL: http://www.unh.edu/ccrc/pdf/CV294_Walsh_Sexting%20&%20prosecution_2-6-13.pdf

Shelf Number: 135733

Keywords:
Child Pornography
Child Sexual Abuse
Online Victimization
Prosecution
Sex Offenders
Sexting

Author: Lee, Murray

Title: Sexting among young people: Perceptions and practices

Summary: The rapid development and adoption of online digital technologies has had a profound effect on the way young people conduct their social relationships. The emergence of sexting, or the distribution of sexually explicit photos and videos, has gained widespread attention and raised moral concerns. However, there remains little policy-relevant research on the prevalence of sexting and its impact on young people. This study provides a valuable contribution to the evidence base. In a survey of over 2,000 respondents, almost half reported having sent a sexual picture or video of themselves to another party, while two-thirds had received a sexual image. Sexting was prevalent among all age groups, with 13 to 15 year olds particularly likely to receive sexual images. Sexting was prominent among homosexual and bisexual respondents. Most sexting occurred between partners in committed relationships. The study found very little evidence of peer pressure or coercion to engage in sexting. Rather, young people reported engaging in the practice as a consensual and enjoyable part of their intimate relationships. The paper considers the implications of this for legal and policy responses to sexting.

Details: Canberra: Australian Institute of Criminology, 2015. 9p.

Source: Internet Resource: Trends & issues in crime and criminal justice no. 508: Accessed March 2, 2016 at: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi508.pdf

Year: 2015

Country: Australia

URL: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi508.pdf

Shelf Number: 138009

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual exploitation
Online Communications
Sexting
Social Media

Author: Mitchell, Kimberly J.

Title: Youth Involvement in Sexting: Findings from the Youth Internet Safety Studies

Summary: Several concerns have fueled the considerable attention to the problem of "youth sexting" among the media, parents, professionals, educators and law enforcement. (Sexting generally refers to sending sexual images and sometimes sexual texts via cell phone and other electronic devices.) One is that youth may be creating illegal child pornography, exposing them to possibly serious legal sanctions. Another is that youth may be jeopardizing futures by putting compromising, ineradicable images online that could be available to potential employers, academic institutions and family members. These concerns have been abetted by frequently cited statistics about the supposed widespread teen involvement in sexting. The most common reference has been to a National Campaign to Prevent Teen and Unplanned Pregnancy study showing that 20% of teens had sent or posted nude or semi-nude pictures of themselves. However, this research as well as other often cited studies have flaws that compromise their findings. For example, the National Campaign study, used an Internet panel rather than a true population sample and included 18 and 19 year olds, and not just minors. Moreover, none of these studies has made distinctions that allow a careful assessment of the problem from a policy perspective. Studies have asked respondents about "nude or semi-nude", "nearly nude" or "sexually suggestive" images that might, in fact, be no more revealing than what someone might see at a beach. In some studies, sexting was defined to include text messages that could contain no images. And many studies did not distinguish between taking and sending an image of oneself as opposed to receiving or disseminating an image of another youth. For policy purposes, it is important to look at whether images are created or simply received and whether images might qualify as child pornography, but such information is not currently available.

Details: Durham, NH: University of New Hampshire, Crimes Against Children Research Center, 2014. 8p.

Source: Internet Resource: Accessed March 12, 2016 at: http://www.unh.edu/ccrc/pdf/Sexting%204%20of%204%20YISS%20Bulletins%20Feb%202014.pdf

Year: 2014

Country: United States

URL: http://www.unh.edu/ccrc/pdf/Sexting%204%20of%204%20YISS%20Bulletins%20Feb%202014.pdf

Shelf Number: 138184

Keywords:
Child Pornography
Internet Communications
Internet Safety
Sexting
Social Networks

Author: Mitchell, Kimberly J.

Title: Trends in Unwanted Sexual Solicitations: Findings from the Youth Internet Safety Studies

Summary: There has been considerable and growing concern voiced by schools, parents and the public about what youth experience while using the Internet and other electronic technologies. The last decade saw significant and rapid changes in youth online activity: Internet use has now expanded to encompass almost all youth. Moreover, the nature of youth Internet use changed during this time with an increase in the use of cell‐ and smart‐phones, and the migration of adolescent social activity to social networking sites. However, this rapid expansion in technology use has occurred during a period of time in which child victimization has declined significantly. In 1999 and 2000, the first Youth Internet Safety Survey (YISS‐1) was conducted to address concerns about adults using the Internet to sexually solicit youth, young people encountering sexual material online and youth being threatened and harassed through the Internet. While YISS‐1 found that many youth who used the Internet encountered such episodes, most of these incidents were relatively mild and not very disturbing to youth. However, some were serious and distressing. We conducted the second Youth Internet Safety Survey (YISS‐2) in 2005 to reassess the extent to which young Internet users were encountering problems five years later, gauge whether the incidence and characteristics of these episodes had changed, explore new areas of interest, review emerging technologies, ascertain the effect those technologies have on the issue, and assess threats to youth. Compared to YISS‐1, the results of YISS‐2 showed that a smaller proportion of youth had received unwanted online sexual solicitations and a smaller proportion had interacted online with strangers. However, larger proportions of youth reported being exposed to pornography they did not want to see and were being harassed online. In 2010, the third Youth Internet Safety Survey (YISS‐3) was conducted to continue to track existing trends in the number and types of threats youth encounter using technology; assess risks of new behaviors and activities, including youth creating and distributing explicit images of themselves and/or peers; assess benefits and utilization of safety programs and technologies; and identify activities and behaviors most closely associated with risk. This document reviews key findings from YISS‐3.

Details: Durham, NH: University of New Hampshire, Crimes Against Children Research Center, 2014. 10p.

Source: Internet Resource: Accessed March 12, 2016 at: http://www.unh.edu/ccrc/pdf/Sexual%20Solicitation%201%20of%204%20YISS%20Bulletins%20Feb%202014.pdf

Year: 2014

Country: United States

URL: http://www.unh.edu/ccrc/pdf/Sexual%20Solicitation%201%20of%204%20YISS%20Bulletins%20Feb%202014.pdf

Shelf Number: 138185

Keywords:
Child Pornography
Child Sexual Exploitation
Internet Communications
Internet Safety
Online Communications
Sexting
Social Media
Social Networks

Author: Martellozzo, Elena

Title: "...I wasn't sure it was normal to watch it..." A quantitative and qualitative examination of the impact of online pornography on the values, attitudes, beliefs and behaviours of children and young people.

Summary: The research consisted of an online survey of 1001 children and young people aged 11-16 across the UK, an online discussion forum and online focus groups. Key Findings Overall Almost half of 11-16 year olds surveyed (47%) had never seen any pornography online. At 11, the majority of children (72%) had not seen online pornography. By 15, children were more likely (65%) than not to have seen online pornography. Of those who had seen pornography online More boys (59%) view online pornography, through choice, than girls (25%). Children were as likely to stumble across pornography (28%) as to search for it deliberately (19%). Substantial minorities of older children (42% of 12-16 year olds) wanted to try things out they had seen in pornography. A greater proportion of boys (44%) wanted to emulate pornography than the proportion of girls (29%). Sending and receiving pornographic material Pornographic material had been received by a quarter (26%) of young people. A minority of young people (4%) had generated naked or semi-naked images of themselves; some of them had shared the images further. Repeated viewing of online pornography may have a desensitising effect with young people feeling less negative over time and generally less anxious or disgusted by what they are seeing. Young people's perceptions of pornography Most young people (49%) saw pornography as unrealistic however a minority rated it positively. Young people who rated pornography positively were more likely to be: boys; younger respondents; or those whose families and/or schools had not engaged with them about online pornography. Most young people thought pornography was a poor model for consent or safe sex and wanted better sex education, covering the impact of pornography. Young people wanted to be able to find out about sex and relationships and about pornography in ways that were safe, private and credible. Young people highlighted the need for materials that are age and gender appropriate. Some also touched on lack of teacher awareness of the potential additional vulnerabilities faced by young people who do not identify as either male or female in a binary manner.

Details: London: Children's Commissioner and NSPCC, 2016. 87p.

Source: Internet Resource: Accessed July 21, 2016 at: https://www.nspcc.org.uk/globalassets/documents/research-reports/mdx-nspcc-occ-pornography-report-final.pdf

Year: 2016

Country: United Kingdom

URL: https://www.nspcc.org.uk/globalassets/documents/research-reports/mdx-nspcc-occ-pornography-report-final.pdf

Shelf Number: 139787

Keywords:
Online Pornography
Pornography
Sexting

Author: Canada. Public Safety Canada

Title: 2013-2014 Evaluation of the National Strategy for the Protection of Children from Sexual Exploitation on the Internet

Summary: The National Strategy for the Protection of Children from Sexual Exploitation on the Internet (the National Strategy) is a horizontal initiative providing a comprehensive, coordinated approach to enhancing the protection of children on the Internet and pursuing those who use technology to prey on them. The evaluation covered the activities delivered under the National Strategy by Public Safety Canada, including: the Canadian Centre for Child Protection as a funding recipient for the management of the national tipline Cybertip.ca, the Royal Canadian Mounted Police (through NCECC-National Child Exploitation Coordination Centre, a national division of the Canadian Police Centre for Missing and Exploited Children/Behavioural Sciences Branch) and the Department of Justice. The evaluation included the Contribution Program to Combat Child Sexual Exploitation and Human Trafficking and its administration by Public Safety Canada. The scope of the evaluation covered the time period over the past five years (July 2008 to December 2013). There is a continued need to address the sexual exploitation of children on the Internet. Evidence shows increasing trends in the number of reported offences, the availability of material and the severity of these criminal acts. The increasing use of the Internet, mobile technologies and social media have facilitated the sexual exploitation of children. Concerns about child pornography have extended to the availability of material on peer-to-peer networks, the "dark Web" and through encrypted technologies. The problem extends well beyond Canada's borders. Law enforcement faces increasing challenges posed by transnational child sex offenders in addition to online child sexual exploitation offences in general. These types of international investigations are appropriately characterized as increasingly complex. The National Strategy remains relevant to ensure national collaboration and a consistent national approach, as well as cooperation with the international community. The evaluation points to a continued need for improved data collection, increased research efforts and enhanced information exchange at the national level in order to better understand the underpinnings and contributing factors surrounding online child sexual exploitation. There may be a need to revisit the current mandate as a number of areas of concern are expanding (e.g. transnational child sex offenders, self-peer exploitation or "sexting", cyberbullying, sextortion, sexualized child modelling) that were not originally envisioned by the National Strategy. Increased public reporting continues to put resourcing pressures on the law enforcement community. There is also evidence to indicate that there is still a need to increase knowledge and awareness about Internet child sexual exploitation and that the issue needs to be addressed through a multi-faceted approach (e.g. socially through education and prevention, and complemented by law enforcement efforts). The National Strategy aligns with federal priorities and the departmental mandates of the federal Strategy partners. The safety and security of children is central to the federal strategic priorities as reflected in numerous legislative initiatives, ministerial press releases, official documents and initiatives, and is consistent with the federal commitment made most recently in the 2013 Speech from the Throne. The National Strategy aligns with federal legislative roles and responsibilities of Strategy partners and the broad role of the federal government in the safety and security of Canadians. Investigations cross jurisdictions and require the collaboration and coordination of many stakeholders nationally and internationally. There is an opportunity for PS to provide greater leadership at the national level in areas of cooperation and in facilitating data collection, research and information sharing. The National Strategy also supports international commitments aimed at combating child sexual exploitation on the Internet. Evidence suggests that initiatives by other jurisdictions or non-profit organizations tend to complement the National Strategy. However, there may be opportunities for greater synergy and collaboration, especially between the federal government and provinces and territories in order to ensure that federal investments are targeted to areas of greatest need. In support of this, Strategy partners continue to develop partnerships with provinces, non-governmental organizations and private industry as well as participate in the Federal/Provincial/Territorial committees. From an enforcement perspective, the Strategy helps avoid duplication by providing a centralized coordinated approach and central point of contact for investigations that cross multiple jurisdictions nationally and internationally. Without a centralized coordinated approach, it was suggested that the system in Canada would be disparate. Despite the different organizations involved at various levels, efforts aimed at coordinating investigations internationally are seen as complementary rather than duplicative.

Details: Ottawa: Public Safety Canada, 2015. 67p.

Source: Internet Resource: 2015-05-27: Accessed July 25, 2016 at: http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/vltn-prtctn-chldrn-2013-14/vltn-prtctn-chldrn-2013-14-eng.pdf

Year: 2015

Country: Canada

URL: http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/vltn-prtctn-chldrn-2013-14/vltn-prtctn-chldrn-2013-14-eng.pdf

Shelf Number: 139843

Keywords:
Child Pornography
Child Protection
Child Sexual Exploitation
Internet Crimes
Online Victimization
Sexting

Author: Wittes, Benjamin

Title: Sextortion: Cybersecurity, teenagers, and remote sexual assault

Summary: This paper represents an effort to our knowledge the first to study in depth and across jurisdictions the problems of sextortion. In it, we look at the methods used by perpetrators and the prosecutorial tools authorities have used to bring offenders to justice. We hope that by highlighting the scale and scope of the problem, and the brutality of these cases for the many victims they affect, to spur a close look at both state and federal laws under which these cases get prosecuted. Our key findings include: - Sextortion is dramatically understudied. While it's an acknowledged problem both within law enforcement and among private advocates, no government agency publishes data on its prevalence; no private advocacy group does either. The subject lacks an academic literature. Aside from a few prosecutors and investigators who have devoted significant energy to the problem over time, and a few journalists who have written-often excellently- about individual cases, the problem has been largely ignored. - Yet sextortion is surprisingly common. We identified 78 cases that met our definition of the crime-and a larger number that contained significant elements of the crime but that, for one reason or another, did not fully satisfy our criteria. These cases were prosecuted in 29 states and territories of the United States and three foreign jurisdictions. - Sextortionists, like other perpetrators of sex crimes, tend to be prolific repeat players. Among the cases we studied, authorities identified at least 10 victims in 25 cases. In 13 cases, moreover, there were at least 20 identified victims. And in four cases, investigators identified more than 100 victims. The numbers get far worse if you consider prosecutorial estimates of the number of additional victims in each case, rather than the number of specifically identified victims. In 13 cases, prosecutors estimated that there were more than 100 victims; in two, prosecutors estimated that there had been "hundreds, if not thousands" of victims. - Sextortion perpetrators are, in the cases we have seen, uniformly male. Victims, by contrast, vary. Virtually all of the adult victims in these cases are female, and adult sextortion therefore appears to be a species of violence against women. On the other hand, most sextortion victims in this sample are children, and a sizable percentage of the child victims turn out to be boys. - There is no consistency in the prosecution of sextortion cases. Because no crime of sextortion exists, the cases proceed under a hodgepodge of state and federal laws. Some are prosecuted as child pornography cases. Some are prosecuted as hacking cases. Some are prosecuted as extortions. Some are prosecuted as stalkings. Conduct that seems remarkably similar to an outside observer produces actions under the most dimly-related of statutes. - These cases thus also produce wild, and in in our judgment indefensible, disparities in sentencing. Many sextortionists, particularly those who prey on minors, receive lengthy sen - tences under child pornography laws. On the other hand, others-like Mijangos-receive sentences dramatically lighter than they would get for multiple physical attacks on even a fraction of the number of people they are accused of victimizing. In our sample, one perpetrator received only three years in prison for victimizing up to 22 young boys. 36 Another received only 30 months for a case in which federal prosecutors identified 15 separate victims. 37 - Sentencing is particularly light in one of two key circumstances: (1) when all victims are adults and federal pros - ecutors thus do not have recourse to the child pornography statutes, or (2) in cases prosecuted at the state level. - Sextortion is brutal. This is not a matter of playful consensual sexting-a subject that has received ample attention from a shocked press. Sextortion, rather, is a form of sexual exploitation, coercion, and violence, often but not always of children. In many cases, the perpetrators seem to take pleasure in their victims' pleading and protes - tations that they are scared and underage. In multiple cases we have reviewed, victims contemplate, threaten, or even attempt suicide-sometimes to the apparent pleasure of their tormentors. 38 At least two cases involve either a father or stepfather tormenting children living in his house. 39 Some of the victims are very young. And the impacts on victims can be severe and likely lasting. Many cases result, after all, in images permanently on the Internet on multiple child pornography sites following extended periods of coercion. - Certain jurisdictions have seen a disproportionate number of sextortion cases. This almost certainly reflects devoted investigators and prosecutors in those locales, and not a higher incidence of the offense. Rather, our data suggest that sextortion is taking place anywhere social media penetration is ubiquitous. The paper proceeds in several distinct parts. We begin with a literature review of the limited existing scholarship and data on sextortion. We then outline our methodology for collecting and analyzing data for the present study. We then offer a working definition of sextortion. In the subsequent section, we provide a sketch of the aggregate sta - tistics revealed by our data concerning the scope of the sextortion problem, and we examine the statutes used and sentences delivered in federal and state sextortion cases. We then turn to detailing several specific case studies in sextortion. In our last empirical section, we look briefly at the victim impact of these crimes. Finally, we offer several recommendations for policymakers, law enforcement, parents, teachers, and victims.

Details: Washington, DC: Center for Technology Innovation, Brookings Institution, 2016. 47p.

Source: Internet Resource: Accessed September 3, 2016 at: https://www.brookings.edu/wp-content/uploads/2016/05/sextortion1-1.pdf

Year: 2016

Country: United States

URL: https://www.brookings.edu/wp-content/uploads/2016/05/sextortion1-1.pdf

Shelf Number: 140158

Keywords:
Child Pornography
Computer Crime
Cybersecurity
Online Victimization
Sex Crimes
Sexting
Sextortion

Author: Wittes, Benjamin

Title: Closing the sextortion sentencing gap: A legislative proposal

Summary: On the surface, at least, the sextortion case of Joseph Simone seems far more egregious than does that of Joshua Blankenship. Simone was a wrestling coach at a prestigious preparatory high school in Providence, Rhode Island. He was charged with sextorting "numerous" minor males; prosecutors estimated that he had exploited at least 22 young boys through a social media manipulation scheme, pretending to be a young girl when soliciting initial nude images, and then threatening to release those initial images on Facebook if the boys did not perform more sex acts. Blankenship also ran a social media manipulation scheme - but in this instance, against a single minor female in Maryland, convincing her that she had broken the law herself by sending out a nude photo, and demanding more images in exchange for not telling the police. But Blankenship was sentenced in federal court, whereas Simone faced trial in state court in Rhode Island, specifically in the Providence Superior Court. The result? The man with at least 22 victims was sentenced to one year in prison and two more in home confinement. By contrast, Blankenship, who had only one victim, received 12 years in prison after pleading guilty to federal child exploitation charges. What sort of sentence does conduct like Simone's get a man in federal court? Another sextortionist, William T. Koch, was convicted in a federal court in Ohio on charges that he too extorted 20 minor males, with one victim as young as 11-years-old. Koch was sentenced to 20 years in prison on federal charges of extortion, exploitation of a minor, and receipt and distribution of child pornography. Sextortionists dont get to decide which jurisdiction prosecutes them. They do, however, get to choose their victims. And it matters a great deal which ones they choose. Mark Reynolds was sentenced to 14 years in prison on one federal charge of possession of child pornography for sextorting one minor female using a social media manipulation scheme. Contrast that with Adam Paul Savader, who sextorted between 15 and 45 adult women and received a paltry sentence of two-and-a-half years in federal prison. Savader was convicted on charges of interstate extortion and stalking. Reynolds received eleven-and-a-half years more in prison than did Savader, even though Savader potentially had up to 44 more victims. Federal law seems to care a great deal more about children than it does about adult women.

Details: Washington, DC: Center for Technology Innovation, Brookings Institution, 2016. 18p.

Source: Internet Resource: Accessed September 17, 2016 at: https://www.brookings.edu/wp-content/uploads/2016/05/sextortion2.pdf

Year: 2016

Country: United States

URL: https://www.brookings.edu/wp-content/uploads/2016/05/sextortion2.pdf

Shelf Number: 147931

Keywords:
Child Pornography
Computer Crime
Cybersecurity
Online Victimization
Sex Crimes
Sexting
Sextortion
Sexual Violence

Author: UK Council for Child Internet Safety

Title: Sexting in schools and colleges: Responding to incidents and safeguarding young people

Summary: This advice is for designated safeguarding leads (DSLs), their deputies, headteachers and senior leadership teams in schools and educational establishments in England. What does this advice cover? This advice covers: - Responding to disclosures - Handling devices and imagery - Risk assessing situations - Involving other agencies, including escalation to the police and children's social care - Recording incidents - Involving parents - Preventative education What is the status of this advice? This advice has been produced on behalf of the UK Council for Child Internet Safety (UKCCIS) a group of more than 200 organisations from across government, industry, law, academia and charity sectors, working in partnership to help keep children safe online.

Details: s.l.: The Council, 2016. 50p.

Source: Internet Resource: Accessed October 8, 2016 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/551575/6.2439_KG_NCA_Sexting_in_Schools_WEB__1_.PDF

Year: 2016

Country: United Kingdom

URL: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/551575/6.2439_KG_NCA_Sexting_in_Schools_WEB__1_.PDF

Shelf Number: 145374

Keywords:
Child Protection
Sexting
Social Media

Author: Tompson, Trevor

Title: The Digital Abuse Study: Experiences of Teens and Young Adults

Summary: Digital abuse is any type of bullying or harassing behavior that occurs online, through social networking, text messaging, or other technologies. These acts include anything from sending or posting mean or threatening messages about another person to disclosing private information without permission. The U.S. Centers for Disease Control and Prevention finds that, similar to traditional forms of bullying, digital bullying is associated with emotional distress and trouble at school. In response to growing concerns about the harmful effects of digital abuse, both public and private sector organizations initiated campaigns and interventions aimed at educating young people about appropriate online behavior and how to deal with digital abuse when it happens. Seeking to contribute rigorous research on this issue, MTV and the Associated Press-NORC Center for Public Affairs Research conducted a national survey of 1,297 teens and young adults between the ages of 14 and 24 to gain a fresh look at digital use and abuse among young people in the United States and to update previous estimates from AP and MTV on the number of teens and young adults involved in or affected by digital abuse. The key findings from the study, summarized below, provide much-needed information on these changing trends. This survey gives a voice to young Americans and contributes to an in-depth public discourse on the issue. - Digital abuse affects a large number of teenagers and young adults. Nearly half of all young people 14-24 report being electronically harassed in some form, 40 percent report incidences of digital dating abuse, and 11 percent have shared naked pictures of themselves. - Trends do show a decline in the number of young people affected by digital abuse since 2011. Forty-nine percent of young people surveyed say they have been electronically harassed in at least one of the ways included in the 2013 survey. This represents a 7-point decrease from 56 percent in 2011. Twenty-six percent of teenagers and young adults say they have participated in some form of sexting, down 6 percentage points from 32 percent in 2011.

Details: Chicago: NORC at the University of Chicago, 2013. 10p.

Source: Internet Resource: Accessed October 12, 2016 at: http://www.apnorc.org/PDFs/Digital%20Abuse/AP-NORC%20Center%20and%20MTV_Digital%20Abuse%20Study_FINAL.pdf

Year: 2013

Country: United States

URL: http://www.apnorc.org/PDFs/Digital%20Abuse/AP-NORC%20Center%20and%20MTV_Digital%20Abuse%20Study_FINAL.pdf

Shelf Number: 140677

Keywords:
Online Victimization
Sexting

Author: Hales, Gavin

Title: A 'Sexting' Surge or a Conceptual Muddle? The challenges of analogue law and ambiguous crime recording

Summary: 'Sexting' - the sending and receiving by children and young people of 'youth produced sexual imagery'1 - has emerged as a growing phenomenon in recent years, facilitated by the advent of near universal smart phone ownership.2 While it may often take place within the confines of consensual sexual relationships, in some cases 'sexting' has been associated with bullying, threats or exploitation, with significant consequences for the subjects of the images, particularly where those images are widely circulated without their consent. At times the police have been called on to act, whether by victims or for example their parents or schools. The response of police forces and the wider criminal justice system has periodically been called into question with allegations that children have been unduly criminalised, particularly following publicity given to individual cases (eg BBC, 2015). The National Police Chiefs' Council (NPCC) recently published new data on the nature of 'sexting' by children (under 18), as recorded by police forces in England and Wales, under the headline 'Police dealing with rising number [of] 'sexting' cases involving children' (NPCC, 2017). They reported that there has been a 'surge in children sharing or possessing sexual images of themselves or others' with recorded offences more than doubling in three years; that girls are recorded as victims three times as often as boys; and that girls and boys are equally likely to be recorded as suspects or perpetrators. This paper discusses whether a meaningful line can be drawn from the NPCC data to the nature and underlying social issues associated with 'sexting', including who is involved, how 'sexting' is changing over time, and how the police service is responding. In addressing those questions this paper identifies a conceptual muddle at the intersection of four factors that will be examined in some detail: - Antiquated law that did not anticipate digital technology, including children taking and distributing indecent images of themselves. - Complex and ambiguous police crime recording and counting rules and practices. - Attempts to avoid unnecessarily 'criminalising' children. - Crime data published with limited detail and without caveats. It concludes by asking if the law on 'indecent images of children' needs updating with some specific exemptions for children, to reflect the world as it is today and avoid logically counterproductive consequences, including the risk that children may be deterred from reporting victimisation.

Details: London: Police Foundations, 2018. 12p.

Source: Internet Resource: Perspectives on Policing: Paper 4: Accessed February 2, 2018 at: http://www.police-foundation.org.uk/2017/wp-content/uploads/2010/10/perspectives_on_policing_sexting_FINAL.pdf

Year: 2018

Country: United Kingdom

URL: http://www.police-foundation.org.uk/2017/wp-content/uploads/2010/10/perspectives_on_policing_sexting_FINAL.pdf

Shelf Number: 148976

Keywords:
Child Pornography
Child Sexual Exploitation
Internet Crimes
Sex Crimes
Sexting
Social Media

Author: Smahel, David, ed.

Title: The meaning of online problematic situations for children: Results of qualitative cross-cultural investigation in nine European countries

Summary: Young people are currently surrounded by digital technologies, and through these technologies they experience a variety of positive, but also negative, situations (Livingstone, Haddon, Gorzig, & Olafsson, 2011). The unique pan-European survey of EU Kids Online II (2009-11) offered insights into how often and what types of harm children experienced in the following online risks: cyberbullying, exposure to sexual materials, sexting (sexual communication), meeting online strangers, personal data problems, seeing dangerous websites, and excessive internet use. EU Kids Online II also studied how children cope with some of these risks, and the effectiveness of parental mediation strategies to reduce these risks. Although there are several pieces of research studying specific online risks from qualitative perspectives (i.e., Parris, Varjas, Meyers, & Cutts, 2012; Sleglova & Cerna, 2011; Vandebosch & van Cleemput, 2008), most of the current research on online problematic experiences is quantitative, and aimed at understanding the prevalence, definitions and measurement, and the associated psycho-social consequences. But as we know, perceptions of risk differ for children and researchers (Cohn, Macfarlane, Yanez, & Imai, 1995). What researchers describe as "risky" is sometimes perceived as normal and not negative among young people. Therefore, this report introduces research from the EU Kids Online III (2011-14) studies on risks and online problematic situations from children's perspectives. We ask what children perceive as problematic on the internet, and the meaning of online problematic situations according to children. To fulfil this goal, we proposed qualitative investigations, where we took a children-centred approach and asked what children perceived as problematic on the internet. Using this approach, children spontaneously reported many different online situations, from the harmful and unpleasant to the neutral, as well as positive experiences. For example, meeting an online stranger in offline settings was typically a risk from the researcher's perspective, but from the children's perspectives, it was mostly seen as an online opportunity. Children's experiences with meeting strangers varied from very pleasant to harmful feelings. We therefore decided to avoid the term "risks," where children experienced a broad scale of different situations, and instead used the term "online problematic situations" to describe any unpleasant, bothering, or harmful situations on the internet. We proposed the following definition of problematic online situations: "encompassing a broad range of possible online behaviours and experiences that, together or individually, result in a disruption of relationships, values, daily obligations, and or mental or physical well-being" (Mitchell, Sabina, Finkelhor, & Wells, 2009, p. 707). Such a definition of online problematic situations is broader than the previously used term of "online risk," which is defined as the probability of harm (Livingstone et al., 2011). In this report, both terms are used in different contexts. Research presented in this report is based on focus groups and interviews with 368 children from the following nine countries: Belgium, the Czech Republic, Greece, Italy, Malta, Portugal, Romania, Spain, and the United Kingdom (UK). Teams from the EU Kids Online network voluntarily joined this comparative research. Therefore, the selection of countries is not the selection of coordinators, but instead a group of voluntary, cooperating research teams with one coordinator (David Smahel). As explained in Chapter 3: Methodology, we involved children from many different social and cultural backgrounds, and recorded a large variability of different perspectives and meanings of online situations. Nevertheless, this report intentionally does not include a special section on cultural comparisons across countries, because producing a systematic analysis of cultural factors remains difficult in qualitative research with relatively small samples. Despite this consideration, across this report possible observations about country differences have been made, including ones that draw on a background knowledge of specific countries. The emphasis of this report was on pooling the data from the countries in order to describe the range of online problematic situations, and coping and awareness of them, along with various mediational strategies. We believe that this pooled sample has generated enough material to provide a relatively comprehensive picture of the meaning and experience of online problematic situations for children in Europe. Research questions To understand children's meanings of online problematic situations and risks, we proposed the following research questions, which we answer in the chapters that follow in this report: - What do children perceive as being potentially negative or problematic when using the internet? - What online problematic situations and risks are children aware of? - What are the consequences of online negative experiences? - How do/would they react to it (including emotional reaction, behavioural reaction, opinion change etc.)? - What do/would children do to avoid or prevent these online problematic experiences? - What is the context for children's perceptions of certain situations as negative? - In which circumstances are certain situations perceived as negative? In which circumstances are other situations perceived as neutral or even positive? - What coping strategies work best from children's perspectives? - How do children evaluate situations that adults consider problematic? - How are children's negative experiences mediated?

Details: London: EU Kids Online, London School of Economics and Political Science, 2014. 171p.

Source: Internet Resource: Accessed March 23, 2018 at: http://eprints.lse.ac.uk/56972/1/EU_Kids_Online_Report_Online_Problematic_Situations_for_Children_June2014.pdf

Year: 2014

Country: Europe

URL: http://eprints.lse.ac.uk/56972/1/EU_Kids_Online_Report_Online_Problematic_Situations_for_Children_June2014.pdf

Shelf Number: 149543

Keywords:
Child Pornography
Child Sexual Abuse
Online Victimization
Prosecution
Sex Offenders
Sexting
Social Media

Author: Haddon, Leslie

Title: The meaning of online problematic situations for children: The UK report

Summary: The present report looks specifically at the experiences of the UK children who took part in that wider European project. Interviews and focus groups were used to collect children's data. The interview schedule for the research was tested in all participating countries. In the UK pilot interviews were conducted in January 2013 with primary and secondary school boys (aged 9-10 and 11-13 respectively). The European pilots indicated that the interview schedule was generally sound although some alterations were made to it in the light of the pilot feedback. In the UK the main interviews took place between March and September 2013 in four schools - two primary and two secondary. This consisted of interviews with two boys and two girls from each age group (9‐10, 11‐13, 14‐16), and one boys' and one girls' focus group from each of the three age bands, each group consisting of five people. There was one extra interview with a boy aged 9‐10. This made a total of 13 interviews and six focus groups - 43 children aged 9-16 years old altogether. The interviews, conducted by the authors, were fully transcribed and analysed for the present report. Since the UK research was part of a wider European project it followed the same procedures as in the other participating countries. Each point discussed in the interview was summarised in a comment box, and all the comments from the interview were imported into an Excel file. Here they received a secondary level of coding so that for each point made by a child it was clear whether and what ICTs were involved, whether and what risks were involved, who was being discussed, whether the theme was about activities, communication, mediation of some kind, etc. The coding meant that it was possible to search the Excel sheets by various criteria, whether looking into specific risks, preventative measures, coping strategies or parental mediation Parallel to this, main points for translation that related to previous project‐wide discussions of the whole area were marked and collated. In the other countries these observations by children were translated into English to make them accessible to all the other researchers when collectively writing the pan‐European report. In the UK, they were simply collated in the original English. When conducting the analysis, these points for translation often became the basis for the main quotations in this report, either because they summarised certain issues (more succinctly than some of the other children), captured ambivalences or demonstrated a theme well. The points for translation were used in conjunction with searches of the Excel sheet. The latter aimed to capture overall tendencies within the sample, the range of experiences and diverse examples of the same theme. When children are cited but not directly quoted, the material often comes from this second strand of analysis involving an overview of the interview material on any particular topic. The whole procedure had the effect that some children are quoted more, often reflecting the fact that they are either more articulate, more reflective or have more of certain kinds of experience. However, the overall content and conclusions of this report fully reflect the range and diversity of opinions and experiences expressed by all children interviewed in the project.

Details: London: EU Kids Online, London School of Economics and Political Science, 2014. 41p.

Source: Internet Resource: Accessed march 23, 2018 at: http://eprints.lse.ac.uk/60514/1/__lse.ac.uk_storage_LIBRARY_Secondary_libfile_shared_repository_Content_EU%20Kids%20Online_EU%20Kids%20Online_Meaning%20of%20online%20problematic%20situations-UK%20report_2014.pdf

Year: 2014

Country: United Kingdom

URL: http://eprints.lse.ac.uk/60514/1/__lse.ac.uk_storage_LIBRARY_Secondary_libfile_shared_repository_Content_EU%20Kids%20Online_EU%20Kids%20Online_Meaning%20of%20online%20problematic%20situations-UK%20report_2014.pdf

Shelf Number: 149545

Keywords:
Child Pornography
Child Sexual Abuse
Online Victimization
Prosecution
Sex Offenders
Sexting
Social Media

Author: DeMarco, Jeffrey

Title: Behaviour and Characteristics of Perpetrators of Online-facilitated Child Sexual Abuse and Exploitation: A Rapid Evidence Assessment

Summary: - The Independent Inquiry into Child Sexual Abuse: The primary remit of the Independent Inquiry into Child Sexual Abuse (IICSA) is to explore how public bodies and other non-state institutions in England and Wales have handled their duty of care in protecting children from sexual abuse. One of the investigations focuses on the institutional responses to child sexual abuse (CSA) and exploitation facilitated by the internet. This is referred to as the Internet Investigation. - ICT and CSA: Evidence suggests that all perpetrators of online-facilitated CSA have broadly been using information and communication technology (ICT) to commit child abuse since the late 1980s. - Research aims and objectives: IICSA commissioned this rapid evidence assessment as part of its investigation into the internet and CSA. Its aim was to answer the question: 'What is known about the behaviour and characteristics of people who sexually abuse or exploit children, where such abuse is facilitated by the internet?' Research aims and objectives - In responding to the primary research question listed above, the rapid evidence assessment considered how perpetrators use specific technologies to offend and how the availability of these technologies influences perpetrators' behaviour, how perpetrators identify and target potential victims across forums, and what the key safeguarding challenges are for institutions raised by changing technologies and associated perpetrator behaviour. - The rapid evidence assessment also sought to identify evidence regarding emerging types of offences, including self-generated material in sexual solicitation, exploitation and abuse of children, sexual extortion, and offences in which self-generated sexual material shared freely online by children is identified and circulated by perpetrators with an interest in child sexual exploitation material. - Lastly, the rapid evidence assessment also aimed to capture information pertaining to children who perpetrate online-facilitated sexual abuse against peers, relationships between different types of offending, and pathways into offending. - The rapid evidence assessment was conducted in four stages: pilot, evidence selecting, evidence screening and evidence synthesising. - The findings from the above points are presented to best synthesise the information in responding to each one while considering the primary research question.

Details: London: NatCen Social Research, 2018. 85p.

Source: Internet Resource: Accessed March 23, 2018 at: https://www.iicsa.org.uk/document/rapid-evidence-assessment-behaviour-and-characteristics-perpetrators-online-facilitated

Year: 2018

Country: United Kingdom

URL: https://www.iicsa.org.uk/document/rapid-evidence-assessment-behaviour-and-characteristics-perpetrators-online-facilitated

Shelf Number: 149552

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Internet Crime
Online Victimization
Sex Offenders
Sexting

Author: Lee, Murray

Title: Sexting and Young People

Summary: Aim This project aimed to investigate the phenomenon of sexting by young people. This under-researched but emergent contemporary legal and social issue was examined through an inter-disciplinary and multi-method framework by asking the question: are the current legal and policy responses to sexting reflective of young peoples' perceptions and practices of sexting? As such, the research had three specific aims: 1. to document young people's perceptions and practices of sexting; 2. to analyse public and media discourse around sexting, and; 3. to examine existing legal frameworks and sanctions around sexting and develop recommendations for an appropriate and effective legislative policy response to the practice by young people. Method The project consisted of a three-stage research plan: 1. quantitative surveys and focus groups with young people regarding their views and experiences of sexting; 2. a media discourse analysis to capture the tenure of public discussion around sexting in Australia, and; 3. an analysis of existing laws and sanctions that apply to sexting in all states and territories in Australia. Results Our results indicate that a significant number of young people have engaged in the sending and receiving of sexually suggestive pictures (sexting). Indeed, 47% of young people surveyed reported engaging in such behaviour. However, both the types of activity and the frequency of the engagement varied dramatically amongst respondents. Furthermore, the vast majority of those who reported sending or receiving sexually suggestive images did so with only a small number of people and most commonly only with those they already had a romantic attachment. Focus group respondents indicated that they did not use the term sexting and saw it as an adult or media construct. Their knowledge about sexting relied heavily on media reports and high school curriculum. A range of motivations for sexting practices (both their own and their peers) were also identified, ranging from experimentation to peer pressure. Respondents tended to perceive that young people - particularly young women - feel pressure to exchange sexual images. On the other hand participants in sexting exchanges were much more likely to judge their behaviour positively, stressing the fun and flirtatious nature of sexting. Focus groups participants' also suggested the importance of an intersectional analysis (age, class and gender) in understanding and engaging with sexting practices, as well as the need to rethink criminal justice responses to sexting. The discourses that young people reported around sexting mirrored the findings of the media analysis, which showed that young peoples' sexting behaviours were an issue of growing concern in the Australian media. Sexting was framed in the media as a risky activity, with potentially far-reaching consequences for young people and their romantic and career prospects, not to mention the potential legal ramifications. Such media reporting has thus promoted a particular image of sexting as an activity that should be avoided by young people, and dealt with seriously by parents, educators, governments and the law. An analysis of the legal framework around sexting suggests that sexting has generally been framed as child pornography and that such offenses significantly outweigh young people's perceptions of the seriousness of most behaviours that might be defined as sexting. In Australian jurisdictions child pornography has a relatively broad definition, extended in recent decades in response to concerns that new technologies are fueling child pornography. In most jurisdictions there is little to legally hinder prosecution (aside from the general requirement of establishing sufficient understanding of wrongfulness on the part of 10 to 14 year olds (presumption of doli incapax), defenses to child pornography offenses for minors in certain situations in Tasmania and Victoria and the Attorney-General's permission being needed before prosecution of an under 18 year old can be commenced under the Commonwealth Criminal Code). It is therefore legally possible for young people to be prosecuted for child pornography offenses. Despite this it seems that prosecutions for child pornography offenses for sexting are rare in Australia and that discretion is widely used to divert young people from formal proceedings unless there are aggravating factors. Conclusion This project has found that the sending and receiving of sexually suggestive pictures by young people can have serious consequences. As well as the potential legal consequences for young people who take and/or circulate such images, there are a number of personal costs that young people engaging in this behaviour may face. These include the embarrassment or humiliation resulting from the dissemination of images, coercion through the threat of making an image public, the continuation of physical or psychologically abusive behaviours into the digital realm (cyberbullying), and the potential for such images to fall into the hands of pedophiles. More generally sexting can contribute to the reproduction of gendered power relations and double standards. Such negative consequences are reinforced by much of the media discourse on sexting. Nevertheless, the findings from this project suggest that such outcomes, as reported by young people themselves, are relatively rare. Indeed, the majority of young people, although certainly not all, who engage in sexting do so with a romantic partner in a climate of perceived mutual trust. Even though this trust might be thought of as fragile, the research shows it is not regularly broken. It should be noted that when such trust is broken and a third party is shown the image, it is more likely to occur in-person rather than through digital onsending - although of course this also happens.

Details: Canberra: Criminology Research Advisory Council, 2015. 86p.

Source: Internet Resource: Accessed April 30, 2018 at: http://crg.aic.gov.au/reports/1516/53-1112-FinalReport.pdf

Year: 2015

Country: Australia

URL: http://crg.aic.gov.au/reports/1516/53-1112-FinalReport.pdf

Shelf Number: 149968

Keywords:
Child Pornography
Child Sexual Abuse
Child Sexual Exploitation
Online Communications
Sexting
Social Media

Author: Internet Watch Foundation

Title: Trends in Online Child Sexual Exploitation: Examining the Distribution of Captures of Live-streamed Child Sexual Abuse

Summary: This Paper introduces the key findings of a study of the distribution of captures of live-streamed child sexual abuse which were publicly available online during 3 months in 2017 ("the Study"). The Study was carried out by Internet Watch Foundation (IWF) and funded by Microsoft. Over a three-month period between August and October 2017, images and videos meeting the research criteria were identified using a combination of leads from existing IWF data and techniques employed by IWF analysts to proactively locate child sexual abuse imagery being distributed online. The images and videos were then assessed in accordance with IWF's standard procedures for processing child sexual abuse imagery. Data captured in each instance included image category, site type, commerciality, hosting location, and the assessed age and gender of the individuals depicted. During the Study, 2,082 images and videos were assessed as meeting the research criteria. Key findings were: - 96% depicted children on their own, typically in a home setting such as their own bedroom. - 98% of imagery depicted children assessed as 13 years or younger. - 96% of the imagery featured girls. - 40% of the imagery was Category A or B. - 100% of the imagery had been harvested from the original upload location and was being redistributed on third party websites. - 4% of the imagery was captured from mobile-only streaming apps. - 73% of the imagery appeared on 16 dedicated forums with the purpose of advertising paid downloads of videos of webcam child sexual abuse. Key recommendations are: - Recognition of the need for awareness raising programs aimed at educating children and those in a parental role about the risks of live-streaming services; - Wider implementation of tools to tackle online distribution of child sexual abuse imagery by service providers; - Development of new services including video hashing technology to detect duplicate captures of live streamed child sexual abuse which have been redistributed online; - Recognition of legal loopholes facilitating distribution of child sexual abuse imagery and elaboration of policy proposals that can influence positive change. This paper sets out the limitations on the Study and makes recommendations for further research which can be undertaken to expand upon and clarify the findings. It is hoped that by raising awareness of this issue, a multi-agency approach can be taken to help protect children from the immediate and long-term effects of the distribution of permanent records of their sexual abuse.

Details: Cambridge, UK: IWF, 2018. 26p.

Source: Internet Resource: Accessed May 30, 2018 at: https://www.iwf.org.uk/sites/default/files/inline-files/Distribution%20of%20Captures%20of%20Live-streamed%20Child%20Sexual%20Abuse%20FINAL.pdf

Year: 2018

Country: United Kingdom

URL: https://www.iwf.org.uk/sites/default/files/inline-files/Distribution%20of%20Captures%20of%20Live-streamed%20Child%20Sexual%20Abuse%20FINAL.pdf

Shelf Number: 150409

Keywords:
Child Pornography
Child Prostitution
Child Sexual Abuse
Child Sexual Exploitation
Internet Crimes
Sexting

Author: National Society for the Prevention of Cruelty to Children

Title: "Is this sexual abuse?" NSPCC helplines report: peer sexual abuse

Summary: It's normal for children to demonstrate a range of sexual behaviours as they grow up. But sometimes they may behave in a sexualised way that is inappropriate to their age and stage of development. We call this harmful sexual behaviour, because it's harmful to the children who display it, as well as the people it's directed towards. There are many reasons why children display harmful sexual behaviour, but research shows that exposure to trauma can be a key factor in its development (Hackett, 2016). Harmful sexual behaviour can be displayed towards peers, younger children, older children or adults. It ranges from behaviour that is socially inappropriate to behaviour that is unexpected or impulsive, and behaviour with an element of victimisation or violence. This may include unwanted or inappropriate touching; forcing or coercing someone else to watch or take part in sexualised activity; and sexual violence. Around a third of child sexual abuse is committed by other children and young people (Hackett, 2014). We hear from parents and professionals who are concerned about children displaying sexualised behaviour. In 2016/17, there were 663 contacts to our helpline about this. Many of the adults who got in touch weren't confident about deciding whether sexualised behaviour is 'normal' or harmful, and they weren't sure of the best way to respond. Puberty can be a confusing time and peer relationships naturally change as children grow up. This can mean children also find it difficult to identify which sexual behaviours are appropriate and inappropriate. Those who display harmful sexual behaviour may not recognise that they are doing so. Those who experience harmful sexual behaviour may realise it makes them feel unhappy or unsafe, but they aren't always clear about how to respond. In 2016/17, our Childline service delivered 3,004 counselling sessions to children and young people who were concerned about having been sexually abused by their peers. This might be a friend; boyfriend or girlfriend; ex-partner; or another young person who was under the age of 18, and who isn't related to them. Throughout this report we're calling this type of abuse 'peer sexual abuse'. Peer sexual abuse can take place in a range of locations including at school, at home, at social events and online. According to a BBC Freedom of Information request, the number of police-recorded sexual offences by under-18-year-olds against other under-18-year-olds in England and Wales rose by 71 per cent between 2013/14 (4,603) and 2016/17 (7,866) (BBC, 2017). However, it's likely that peer sexual abuse is underreported. Research carried out by Radford in 2009 found that 1 in 3 children sexually abused by an adult didn't tell anyone at the time, and this figure is even higher for children who have experienced peer sexual abuse (Radford et al, 2011). Some young people tell our Childline counsellors they don't want to speak out, for reasons like: - being worried about getting a friend or partner into trouble - being blackmailed or threatened into keeping things secret - being afraid of being bullied - not being sure they will be believed. They may not fully understand whether they gave consent for sexual activity to take place, feel guilty or think they are somehow to blame - especially if alcohol was involved, or if they were involved in sexting (sharing explicit texts, images or videos). We want to help adults support children who are affected by peer sexual abuse more effectively. It's vital that children and young people who have experienced any form of abuse know it wasn't their fault, and are able to get the right help at the right time. So in this report we're sharing what young people have told Childline about their experiences of peer sexual abuse. We've looked at how peer sexual abuse takes place; the impact this has on young people's lives; and the challenges they face accessing support. We're also highlighting what they say helps them get back on track after experiencing peer sexual abuse, what they're telling us about the support they need, and how we can best prevent peer sexual abuse from happening.

Details: London: NSPCC, 2018. 27p.

Source: Internet Resource: Accessed June 3, 2018 at: https://www.nspcc.org.uk/globalassets/documents/research-reports/nspcc-helplines-report-peer-sexual-abuse.pdf

Year: 2018

Country: United Kingdom

URL: https://www.nspcc.org.uk/globalassets/documents/research-reports/nspcc-helplines-report-peer-sexual-abuse.pdf

Shelf Number: 150451

Keywords:
Child Protection
Child Sexual Abuse
Juvenile Sex Offenders
Peer Relations
Peer Sexual Abuse
Sexting
Sexual Abuse
Social Media