Skip to main content

Online Obscenity and Child Sexual Abuse

  • Chapter
  • First Online:
Cybercrime, Digital Forensics and Jurisdiction

Part of the book series: Studies in Computational Intelligence ((SCI,volume 593))

  • 2405 Accesses

Abstract

The investigation of cybercrime and the gathering of appropriate evidence for a criminal prosecution, the science of “forensic computing”, “digital forensics”, or “cyber forensics”, can be an extremely difficult and complex issue (Walden 2007, p. 205).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Researchers found that exposure to images of inappropriate sexual conduct with minors, not to mention actual sexual abuse of children, is damaging to the young child’s development. See Preston (2009), All Knowledge is not Equal: Facilitating Children’s Access to Knowledge by Making the Internet Safer, International Journal of Communications Law & Policy, issue 13, p. 118.

  2. 2.

    See Schrock and Boyd, Online Threats to Youth: Solicitation, Harassment, and Problematic Content, Literature Review by the Research Advisory Board of the Internet Safety Technical Task Force, Berkman Center for Internet & Society, available at: <www.zephoria.org>, [visited 01/08/2011].

  3. 3.

    Ibid.

  4. 4.

    Ibid.

  5. 5.

    Available at <www.idletechie.com>, [retrieved 01 / 08/ 2011].

  6. 6.

    Ibid.

  7. 7.

    See Parkinson, Family Law and ParentChild Contact : Assessing the Risk of Sexual Abuse , MULR 15, available at: <http://www.austlii.edu.au/au/journals/MULR/1999/15.html>, (retrieved 02 August 2011).

  8. 8.

    Available at <www.idletechie.com>, [retrieved 02 August 2011].

  9. 9.

    Ibid.

  10. 10.

    Ibid.

  11. 11.

    Ibid.

  12. 12.

    See < http://secondlife.com>.

  13. 13.

    An avatar is a computer user’s representation of himself/herself or alter ego, whether in the form of a three—dimensional model used in computer games, a two—dimensional icon used on internet forums and other communities. It is an “object” representing the embodiment of the user. The term can also refer to personality connected with the screen name, or handle, of an internet user. See <www.wikipedia.org >.

  14. 14.

    Founder of Second Life.

  15. 15.

    Premium membership allows the resident to own land, with the first 512 m² (of Main Land owned by a holder of a Premium account) free of the usual monthly Land Use Fee. The users pay US $ for their first 65,536 m2. Any land must be purchased from either Liden Lab or a private seller.

  16. 16.

    Linden Lab has implemented a new account verification system. Users that want to access adult regions and search results will have to authenticate their accounts by having payment information on file or by using Linden Lab’s age verification system. Available at <www.pcworld.com>, (retrieved 02 August 2011).

  17. 17.

    See Schrock and Boyd, Online Threats to Youth: Solicitation, Harassment, and Problematic Content, op. cit.

  18. 18.

    Ibid.

  19. 19.

    Ibid.

  20. 20.

    Ibid.

  21. 21.

    Ibid.

  22. 22.

    Ibid.

References

  • Y. Akdeniz, Internet Child Pornography and the Law (Ashgate, Hampshire, 2008)

    Google Scholar 

  • C. Arnaldo, Child Abuse on the Internet: Ending the Silence (Berghahn Books, NY, 2001)

    Google Scholar 

  • A. Beech et al., The internet and child sexual offending: a criminological review. Aggress. Violent Behav. 13, 216–228 (2008)

    Article  Google Scholar 

  • D. Bross, Minimizing risks to children when they access the world wide web. Child Abuse Negl. 29, 749–752 (2005)

    Article  Google Scholar 

  • P. Bocij, Cyberstalking (Praeger, Connecticut, 2004)

    Google Scholar 

  • S. Cankaya, O. Hatice, Parental controls on children’s computer & internet use. Procedia Soc. Behav. Sci. 1, 1105–1109 (2009)

    Article  Google Scholar 

  • E. Casey, Digital Evidence and Computer Crime (Elsevier, NY, 2004)

    Google Scholar 

  • M. Chawki, Combattre la Cybercriminalité (Editions de Saint Amans, Perpignan, 2008)

    Google Scholar 

  • D. Delmonico et al., Cybersex Unhooked: A Workbook for Breaking Free of Compulsive Online Sexual Behavior (Gentle Path Press, Carefree, 2001)

    Google Scholar 

  • N. Dixon, Catching Cyber Predators: The Sexual Offences Bill 2002, (Queensland Parliamentary Library, QLD Brisbane, 2002)

    Google Scholar 

  • N. Doring, The internet’s impact on sexuality: a critical review of 15 years of research. Comput. Hum. Behav. 25, 1089–1101 (2009)

    Article  Google Scholar 

  • I. Elliott et al., Understanding online child pornography use: applying sexual theory to internet offenders. Aggress. Violent Behav. 14, 180–193 (2009)

    Article  Google Scholar 

  • M. Ferraro et al., Investigating Child Exploitation & Pornography: The Internet Law and Forensic Science (Elsevier, NY, 2005)

    Google Scholar 

  • Garlik, UK Cybercrime Report, Online (2008)

    Google Scholar 

  • T. Hoeren, The European Liability and Responsibility of Providers of Online Platforms such as Second Life, JILT 1 (2009)

    Google Scholar 

  • Internet Watch Foundation, Annual Report on Cybercrime(Cambridge University Press, Cambridge, 2008)

    Google Scholar 

  • S. Kierkeggard, Cybering, Online Grooming, and Age Play. Computer Law and Security Report 24, 41–55 (2008)

    Article  Google Scholar 

  • E. Lievens, Protecting children in the new media environment: rising to the regulatory challenge? Telematics Inform. 24, 315–330 (2007)

    Article  Google Scholar 

  • I. Marsh, M. Gaynor, Crime, Justice and the Media (Routledge, NY, 2009)

    Google Scholar 

  • K. Mitchell et al., Protecting youth online: family use of filtering and blocking software. Child Abuse Negl. 29, 753–765 (2005)

    Article  Google Scholar 

  • L. Penna et al., Challenges of Automating the Detection of Pedophile Activity on the Internet, The First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE’O5), November 7–9, Taipei (2005)

    Google Scholar 

  • C. Preston, All knowledge is not equal: facilitating children’s access to knowledge by making the internet safer. Int. J. Commun. Law Policy 13, 115–132 (2009)

    Google Scholar 

  • E. Quayle et al., In: Child pornography and sexual exploitation of children online. The World Congress III against Sexual Exploitation of Children and Adolescents, Rio de Janerio 25–28 November, 2008

    Google Scholar 

  • B. Schell et al., Cyber child pornography: a review paper of the social & legal issues and remedies—and a proposed technological solution. Aggression Violent Behav. 12, 45–63 (2007)

    Article  Google Scholar 

  • K. Sheldon, D. Howitt, Sex Offenders and the Internet (John Wiley, West Sussex, 2007)

    Google Scholar 

  • A. Schrock et al., Online Threats to Youth: Solicitation, Harassment, and Problematic Content (Berkman Center for Internet & Society, Cambridge)

    Google Scholar 

  • P. Sommer, Evidence in Internet Pedophilia Cases, NCS/ ACPO Conference, July 2002, Bournemouth

    Google Scholar 

  • K. Subrahmanyam et al., The impact of computer use on children’s and adolescent’s development. Appl. Dev. Psychol. 22, 7–30 (2001)

    Article  Google Scholar 

  • D. Taylor, Internet Service Providers (ISPs) and their Responsibility for Content under New French Legal Regime. Comput. Law Secur. Rep. 20(4), 268–272 (2004)

    Article  Google Scholar 

  • D. Van der Merwe et al., Information and Communications Technology Law ( Lexis Nexis, Durban, 2008)

    Google Scholar 

  • I. Walden, Computer Crimes and Digital Investigations (Oxford University Press, Oxford, 2007)

    Google Scholar 

  • D. Wall, Crime and the Internet (Routledge, Oxford shire, 2001)

    Google Scholar 

  • D. Wall, Legal professionalism in the information age. The Paralegal Educ. 22(1), 50–54 (2008)

    Google Scholar 

  • S.-J. Wang, Measures of retaining digital evidence to prosecute computer—based cybercrimes. Comput. Stan. Interfaces 29(2), 216–223 (2007)

    Article  Google Scholar 

  • J. Wolak et al., Predators and their victims. Am. Psychol. Assoc. J. 63(2), 111–128 (2008)

    Article  Google Scholar 

  • R. Wortley, Child Pornography on the Internet, (US Department of Justice, Washington, 2006)

    Google Scholar 

Download references

Acknowledgments

An earlier version of this chapter was published in JDFSL 2009 (4). The author is grateful to Glenn Dardick.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Chawki .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Chawki, M., Darwish, A., Khan, M.A., Tyagi, S. (2015). Online Obscenity and Child Sexual Abuse. In: Cybercrime, Digital Forensics and Jurisdiction. Studies in Computational Intelligence, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-15150-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15150-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15149-6

  • Online ISBN: 978-3-319-15150-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics