Skip to main content

New Technologies, ‘Risk’ and Sexual Offending

  • Chapter
  • 706 Accesses

Part of the book series: Palgrave Studies in Risk, Crime and Society ((PSRCS))

Abstract

Rapid and evolving technology has revolutionized our daily lives. The Internet is no exception, having advanced from being a specialized communication tool for around 20 years to something that is common place in the workplace, school, and in the home (Davidson and Gottschalk, 2011). According to Internet World Stats (2012) there are over 2.4 billion Internet users globally, with 96% of connected individuals accessing the Internet daily (Global Internet User Survey, 2012). The Internet has altered many aspects of human activity, including how we communicate and interact with one another; however, like any other public space, the online environment reflects the behaviour of its users, with positive and negative aspects evident (Whittle et al., 2013). It is the negative aspects that tend to dominate the media headlines, particularly how this new technology has allowed predatory child sex abusers to target vulnerable children and young people for sexual exploitation. This is particularly significant as empirical research suggests that child sex abusers have developed and established a strong link with emerging technologies (Wolak and Finkelhor, 2011 McCartan and McAlister, 2012). The availability and affordability of computing devices, and mobile phones with camera and video-streaming technology have provided new opportunities for the production of indecent images of children with such images frequently shared by sex offenders in the online environment (Jenkins, 2001; Mitchell et al., 2005; McCartan and McAlister, 2012), resulting in the increasingly large and lucrative online availability of indecent images of children (Wyre, 2003; Johansson, 2004).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Atkinson, C. and Newton, D. (2010). Online behaviours of adolescents: Victims, perpetrators, and Web 2.0. Commercialisation and sexualisation of childhood. London: Department for Education.

    Google Scholar 

  • Barak, A. (2005). Sexual harassment on the internet. Social Science Computer Review, 23(1), 77–91.

    Article  Google Scholar 

  • Beebe, T., Asche, S., Harrison, P. and Quinlan, K. (2004). Heightened vulnerability and increased risk taking among adolescent chat room users. Results from a state-wide school survey, journal of Adolescent Health, 35(2), 116–123.

    Article  Google Scholar 

  • Bebbington, P. E. Jonas, S., Bragha, I., Meltzer, H., Jenkins, R. and Cooper, C. (2011). Child sexual abuse reported by an English national sample: Characteristics and demography. Social Psychiatry, 46(3), 255–262.

    Google Scholar 

  • Berson, J. R. (2003). Grooming cybervictims. The psychological effects of online exploitation for youth, journal of School Violence, 2(1), 5–18.

    Article  Google Scholar 

  • Briggs, P., Simon, W. T. and Simonsen, S. (2011). An exploratory study of internet sexual offences and the chat room offender: Has the Internet enabled a new typology of sex offender?. Sexual Abuse: A journal of Research and Treatment, 23(1), 72–91.

    Google Scholar 

  • Bryce, J. (2010). Online sexual exploitation of children and young people. In Y. Jewkes and M. Yar (eds). Handbook of Internet Crime (pp. 320–342). Devon: Willan.

    Google Scholar 

  • Buckler, C. (2012). Twitter ‘failing’ on child abuse, CEOP watchdog warns, available at http://www.bbc.co.uk/news/uk-16508481 (accessed 7 July 2013).

  • Byron, T. (2008). Safer children in a digital world: The report of the Byron Review. London: Department for Children, Schools and Families, and the Department for Culture, Media and Sport.

    Google Scholar 

  • CEOP (2009) ACPO CPAI lead’s position on young people who post self-taken indecent images, available at https://www.ceop.police.uk/Documents/ceop-docs/externaldocs/ACPO_Lead_position_on_Self_Taken_Images.pdf (accessed 25 June 2014).

  • CEOP (2011). UK children asked to think before they send, available at http://www.ceop.police.uk/Media-Centre/Press-releases/ (accessed 6 June 2013).

  • Chalfen, R. (2009) ‘It’s only a picture’: Sexting,’ smutty’ snapshots and felony charges. Visual Studies, 24(3), 258–268.

    Article  Google Scholar 

  • Craven, S., Brown, S. J. and Gilchirst, E. (2006). Sexual grooming of children: Review of literature and theoretical considerations, journal of Sexual Aggression, 12(3), 287–299.

    Article  Google Scholar 

  • Cross, E. J., Richardson, B. Douglas, T. and Von Kaenel-Flatt, J. (2009). Virtual violence: Protecting children from cyberbullying, available at http://www2.beat-bullying.org//pdfs/Virtual%20Violence%20%20Protecting%20Children%20 from%20Cyberbullying.pdf (accessed 11 June 2013).

  • Davidson, J. and Gottschalk, P. (2011). Characteristics of the internet for criminal child sexual abuse by online groom er’s. Criminal justice Studies: A Critical journal of Crime, Law and Society 24(1), 23–36.

    Article  Google Scholar 

  • Davidson, J. and Martellozzo, E. (2012). Exploring young people’s use of social networking sites and digital media in the internet safety context. Information, Communication Si Society, 16(9), 1456–1476.

    Article  Google Scholar 

  • Davidson, J., Lorenz, M. and Martellozzo, E. (2010). Evaluation of CEOP Think You Know internet safetyprog-amme and exploration of young people’ s internet safety. London: Centre for Abuse and Trauma Studies.

    Google Scholar 

  • Demos (2011). Truth, lies and the Internet: A report into young people’s digital fluency, available at http://www.demos.co.uk/files/Truth_-_web.pdf (accessed 2 November 2013).

  • Dewey, C. (2013). Kids are three clicks away from adult content on YouTube, study says. Washington Post, 6 February, available at http://articles.washington-post.com/2013–02-0 6/business/36937189_1_videos-youtube-adult-content (accessed 1 July 2013).

  • eMarketer (2011) Young Children Consuming More Digital Media 9 June, available at http://www.emarketer.com/Article/Young-Children-Consuming-More-Digital-Media/1008435 (accessed 5 June 2013).

  • Erikson, E.H. (1968). Identity, youth & crisis. Norton: New York.

    Google Scholar 

  • Global Internet User Survey (2012). Internet usage, available at https://www.internetsociety.org/sites/default/files/GUIS-2012-Infographic.pdf (accessed 7 October 2013).

  • Forbes (2013). 2014 will be the year of wearable technology, available at http://www.forbes.com/sites/ewanspence/2013/11/02/2014-will-be-the-year-of-wearable-technology/ (accessed 3 November 2013).

  • Haider, D. and Jaishankar, K. (2012). Sexting among teens: An analysis on the questions of legalities and illegalities. In S. McQuade (ed.). Cybercrime, issues, practices, and responses. Lanham, MD: Rowan and Littlefield.

    Google Scholar 

  • Hanson, R.K. and Babchishin, K. M. (2009). How we should advance our knowledge of risk assessment for internet sex offenders, available at http://www.iprc.unc.edu/papers.shtml (accessed 3 February 2014).

  • HM Government (2010). Call to end violence against women and girls. London: Home Office.

    Google Scholar 

  • HM Government (2013). The internet and pornography: Prime Minister calls for action, available at https://www.gov.uk/govemment/speeches/the-internet-and-pornography-prime-minister-calls-for-action (accessed 15 October 2013).

  • Holloway, D., Green, L. and Livingstone, S. (2013). Zero to eight. Young children and their internet use. London: EU Kids Online.

    Google Scholar 

  • Holt, T. J., Blevins, K. R. and Burkert, N. (2010). Considering the paedophile subculture online. Sexual Abuse: A journal of Research Sc Treatment, 22(1), 3–24.

    Google Scholar 

  • Internet World Stats (2012). World internet users and population stats, available at http://www.internetworldstats.com/stats.htm (accessed 23 September 2013).

  • Jaishankar, K. (2009). Sexting: A new form of victimless crime. International journal of Cyber Criminology, 3(1), 21–25.

    Google Scholar 

  • Jenkins, R (2001). Beyond tolerance: Child pornography on the internet. New York: New York University Press.

    Google Scholar 

  • Jenkins, P. (2009) Failure to launch: Why do some social issues fail to denote moral panics? British journal of Criminology, 49(1), 35–47.

    Article  Google Scholar 

  • Jewkes, Y (2010). Much ado about nothing? Representations and reality of the online solicitating of children, journal of Sexual Aggression, 16(1), 5–18.

    Article  Google Scholar 

  • Johansson, K. (2004). A challenge for the real world. ECPAT International Newsletter, 48 (1 July).

    Google Scholar 

  • Jones, S. and Fox, S. (2009) Pew Internet project data, generations online in 2009, available at http://www.pewinternet.org/files/old-media/Files/Reports/2009/ PIP_Generations_2009.pdf (accessed 15 October 2013).

  • Kiss, J. (2010). Facebook child protection app prompts 211 reports of suspicious online activity. The Guardian, 12 August 2010, available at http://www.guardian.co.uk/technology/2010/aug/12/ceop-facebook-child-protection (accessed 5 October 2013).

  • Lenhart, A. (2009). Teens and sexting: How and why minor teens are sending sexually suggestive nude or nearly nude images via text messaging. Pew Research Centre Report, available at http://pewresearch.org/assets/pdf/teens-and-sexting.pdf (accessed 2 January 2013).

  • Lightfoot, C. (1997). The culture of adolescent risk taking. Guildford Press: New York.

    Google Scholar 

  • Livingstone, S. and Haddon, L. (2011). EU Kids Online Report. London: ELI Kids Online, available at http://www.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20II%20(2009–11)/EUKidsOnlineIIReports/Final%20report.pdf (accessed 3 November 2013).

    Google Scholar 

  • Marcum, C. (2007). Interpreting the intentions of internet predators: An examination of online predatory behaviour. Journal of Child Sexual Abuse, 16(4), 99–114.

    Article  Google Scholar 

  • McAlindon, A. (2006). ’setting em’ up’: Personal, familial and institutional grooming in the sexual abuse of children. Social and Legal Studies, 15(3), 339–362.

    Article  Google Scholar 

  • McCartan, K and McAlister, R. (2012). Mobile phone technology and sexual abuse. Information and Communications Technology Law, 21(3), 257–268.

    Article  Google Scholar 

  • Medaris, M. and Girouard, C. (2002). Protecting children in cyberspace: The ICAC task force programme. Office of juvenile Justice and Delinquency Prevention juvenile justice Bulletin, January,.

    Google Scholar 

  • Mitchell, K. J., Finkelhor, D. and Wolak, J. (2005). The internet and family and acquaintance sexual abuse. Child Maltreatment, 10(1), 49–60.

    Article  Google Scholar 

  • Mitchell, K. J., Finkelhor, D. and Wolak, J. (2007). Youth internet users at risk for the most serious sexual solicitations. American journal of Preventative Medicine, 32(6), 532–536.

    Article  Google Scholar 

  • Mitchell, K. J., Jones, L. M., Finkelhor, D. and Wolak, J. (2011). Internet facilitated commercial sexual exploitation of children: Findings from a representative sample of law enforcement agencies in the United States. Sexual Abuse: A journal of Research & Treatment, 23(1), 43–71.

    Google Scholar 

  • Mobile Marketing Magazine (2013a). Tablets it’s revolution — not evolution, available at http://www.mobilemarketingmagazine.com/content/tablets-its-revolu-tion-not-evolution (accessed 10 November 2013).

  • Mobile Marketing Magazine (2013b). Young people’s uses of WhatsApp, available at http://www.mobilemarketingmagazine.com/search/node/WhatsApp (accessed 12 November 2013).

  • Moody, E. (2009) Sexting topic of LCCC forum. 24 April, available at http://www. citizensvoice.com/news/1.4972 (accessed 12 October 2013).

  • Naked Security (2013). Snapchat images that have ‘disappeared forever’ stay right on your phone, available at http://nakedsecurity.sophos.com/2013/05/10/ snapchat-images-that-have-disappeared-forever-stay-right-on-your-phone/ (accessed 10 November 2013).

  • National Centre for Missing and Exploited Children (2009). Policy statement on’ sexting’, available at http://esdll3.org/cms/lib3AVA01001093/Centricity/ Domain/22/policystatementonsexting-ncmec.pdf (accessed 4 November 2013).

  • NSPCC (2012). A qualitative study of children, young people and’ sexting’. London: NSPCC.

    Google Scholar 

  • OCC (2013). If only someone had listened. OCC inquiry into child exploitation in gangs and groups, available at http://www.childrenscommissioner.gov.uk/ content/publications/content_743 (accessed 2 February 2014).

  • O’Connell, R. (2003). A typology of cyber sexploitation and online grooming practices. Preston: University of Central Lancashire.

    Google Scholar 

  • O’Donnell, I. and Milner, C. (2007). Child pornography: Crime, computers and society. London: Routledge.

    Google Scholar 

  • Ofcom (2013). Younger children turn from phones, available at http://media.ofcom.org.uk/2013/10/03/younger-children-turn-from-phones-to-tablets/ (accessed 28 September 2013).

  • Palmer, T. and Stacey L. (2004) Just one click: sexual abuse of children and young people through the internet and mobile phone technology. Essex: Barnardo’s. Pewintemet (2013). Social networking, available at http://www.pewintemet.org/ topics/Social-Networking.aspx?typeFilter=5 (accessed 28 October 2013).

    Google Scholar 

  • Pierce, T.A. (2007) X-posed on MySpace: A content analysis of “MySpace” social networking sites, available at: http://www.calstatela.edu/faculty/sfischo/X-posed_on_%20MySpace.htm (accessed 12 November 2013).

  • Quayle, E. (2010). Child pornography. In Y. Jewkes and M. Yar (eds). Handbook of internet aime (pp. 343–368). Collumpton: Willan.

    Google Scholar 

  • Rybak, D. (2013) ‘Sexting’ from bad judgement to a registered sex offender, available at http://campbelllawobserver.com/2013/07/sexting-fr om-bad-judgment-to-a-registered-sex-offender/ (accessed 25 June 2014)

  • Renk, K., Liljequest, L., Steinberg, A., Bosco, G. and Phares, V. (2002). Prevention of child sexual abuse. Journal of American Academy of Child Adolescent Psychiatry, 42(3), 269–278.

    Google Scholar 

  • Richards, R. D. and Calvert, C. (2009). When sex and cell phones collide: Inside the prosecution of a teen sexting case. Communications & Entertainment Law Journal, 32(1), 1–39.

    Google Scholar 

  • Sex and Tech Survey (2009). Sex and tech: What’s really going on?, available at http://www.thenationalcampaign.org/sextech/ (accessed 7 February 2013).

  • Sexual Offences Act (2003). Section 15, available at http://www.legislation.gov.uk/ukpga/2003/42/section/15 (accessed 20 September 2013).

  • Seto, M. O, Hanson, R. K. and Babchishin, K. M. (2010). Contact sexual offending by men with online sexual offences. Sexual Abuse: Journal of Research & Treatment, 23(1), 124–145.

    Google Scholar 

  • Sky News (2013). Child sex sting sees 110 Brits caught, available at http://news.sky.com/story/1163814/child-sex-sting-sees-110-brits-caught-online (accessed 4 November 2013).

  • Smith-Darden, J., Kernsmith, P. D. and Kernsmith, R. M (2011). Navigating teen relationships in tech savvy times. Paper presented at the Association for the Treatment of Sexual Abusers conference, Toronto, C.nada, 3–5 November.

    Google Scholar 

  • Staksrud, E. and Livingstone, S. (2009). Children and online risk: Powerless victims or resourceful participants? Information, Communication ana Society, 12(3), 364–387.

    Article  Google Scholar 

  • Sullivan, J. and Beech, A. (2002). Professional perpetrators: Sex offenders who use their employment to target and sexually abuse the children with whom they work. Child Abuse Review, 11(3), 153–167.

    Article  Google Scholar 

  • Taylor, M. and Quayle, E. (2003). Child pornography: An internet aime. Brighton: Routledge.

    Google Scholar 

  • The Observer (2013) Teenagers say goodbye to facebook and hello to messenger apps,10 November 2013, available at http://www.theguardian.com/ technology/2013/nov/10/teenagers-messenger-apps-facebook-exo dus (accessed 10 November 2013).

  • Turlington, A. (2011). Sexting: Keeping yourself safe, preventing harm. Paper presented at the Association for the Treatment of Sexual Abusers conference, Toronto, C.nada, 3–5 November.

    Google Scholar 

  • Webster, S., Davidson, J., Bifulco, A., Pham, T. and Caretti, V. (2009). European online grooming project, available at http://www.europeanonlinegrooming-project.com/ (accessed 6 June 2013).

  • Whittle, H., Hamilton-Giachritsis, C, Beech, A. and Collings, G. (2013). A review of online grooming: Characteristics and concerns. Aggression and Violent Behaviour, 18(1), 62–70.

    Article  Google Scholar 

  • Wolak, J. and Finkelhor, D. (2011). Sexting: A typology. Research Bulletin (March). Durham: University of New Hampshire, Crimes Against Children Research Center.

    Google Scholar 

  • Wyre, R. (2003). No excuse for child pom. Community Care, 11 (September), 38–40.

    Google Scholar 

  • Yar, M. (2010). Cybersex offences: Patterns, prevention and protection. In K. Harrison (ed.). Dealing with high-risk sex offenders in the community: Risk management, treatment and social responsibilities. Willan: Cullompton.

    Google Scholar 

  • Young, A., Young, A. and Fullwood, H. (2007). Adolescent online victimisation. The Prevention Researcher, 14(1), 8–9.

    Google Scholar 

  • Zeuthen, K. and Hagelskjaer, K. (2013). Prevention of child sexual abuse: analysis and discussion of the field. Journal of Child Sexual Abuse, 22(6), 742–760.

    Article  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2014 Ruth McAlister

About this chapter

Cite this chapter

McAlister, R. (2014). New Technologies, ‘Risk’ and Sexual Offending. In: McCartan, K. (eds) Responding to Sexual Offending. Palgrave Studies in Risk, Crime and Society. Palgrave Macmillan, London. https://doi.org/10.1057/9781137358134_4

Download citation

Publish with us

Policies and ethics