Abstract
The investigation of cybercrime and the gathering of appropriate evidence for a criminal prosecution, the science of “forensic computing”, “digital forensics”, or “cyber forensics”, can be an extremely difficult and complex issue (Walden 2007, p. 205).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Researchers found that exposure to images of inappropriate sexual conduct with minors, not to mention actual sexual abuse of children, is damaging to the young child’s development. See Preston (2009), All Knowledge is not Equal: Facilitating Children’s Access to Knowledge by Making the Internet Safer, International Journal of Communications Law & Policy, issue 13, p. 118.
- 2.
See Schrock and Boyd, Online Threats to Youth: Solicitation, Harassment, and Problematic Content, Literature Review by the Research Advisory Board of the Internet Safety Technical Task Force, Berkman Center for Internet & Society, available at: <www.zephoria.org>, [visited 01/08/2011].
- 3.
Ibid.
- 4.
Ibid.
- 5.
Available at <www.idletechie.com>, [retrieved 01 / 08/ 2011].
- 6.
Ibid.
- 7.
See Parkinson, Family Law and Parent—Child Contact : Assessing the Risk of Sexual Abuse , MULR 15, available at: <http://www.austlii.edu.au/au/journals/MULR/1999/15.html>, (retrieved 02 August 2011).
- 8.
Available at <www.idletechie.com>, [retrieved 02 August 2011].
- 9.
Ibid.
- 10.
Ibid.
- 11.
Ibid.
- 12.
See < http://secondlife.com>.
- 13.
An avatar is a computer user’s representation of himself/herself or alter ego, whether in the form of a three—dimensional model used in computer games, a two—dimensional icon used on internet forums and other communities. It is an “object” representing the embodiment of the user. The term can also refer to personality connected with the screen name, or handle, of an internet user. See <www.wikipedia.org >.
- 14.
Founder of Second Life.
- 15.
Premium membership allows the resident to own land, with the first 512 m² (of Main Land owned by a holder of a Premium account) free of the usual monthly Land Use Fee. The users pay US $ for their first 65,536 m2. Any land must be purchased from either Liden Lab or a private seller.
- 16.
Linden Lab has implemented a new account verification system. Users that want to access adult regions and search results will have to authenticate their accounts by having payment information on file or by using Linden Lab’s age verification system. Available at <www.pcworld.com>, (retrieved 02 August 2011).
- 17.
See Schrock and Boyd, Online Threats to Youth: Solicitation, Harassment, and Problematic Content, op. cit.
- 18.
Ibid.
- 19.
Ibid.
- 20.
Ibid.
- 21.
Ibid.
- 22.
Ibid.
References
Y. Akdeniz, Internet Child Pornography and the Law (Ashgate, Hampshire, 2008)
C. Arnaldo, Child Abuse on the Internet: Ending the Silence (Berghahn Books, NY, 2001)
A. Beech et al., The internet and child sexual offending: a criminological review. Aggress. Violent Behav. 13, 216–228 (2008)
D. Bross, Minimizing risks to children when they access the world wide web. Child Abuse Negl. 29, 749–752 (2005)
P. Bocij, Cyberstalking (Praeger, Connecticut, 2004)
S. Cankaya, O. Hatice, Parental controls on children’s computer & internet use. Procedia Soc. Behav. Sci. 1, 1105–1109 (2009)
E. Casey, Digital Evidence and Computer Crime (Elsevier, NY, 2004)
M. Chawki, Combattre la Cybercriminalité (Editions de Saint Amans, Perpignan, 2008)
D. Delmonico et al., Cybersex Unhooked: A Workbook for Breaking Free of Compulsive Online Sexual Behavior (Gentle Path Press, Carefree, 2001)
N. Dixon, Catching Cyber Predators: The Sexual Offences Bill 2002, (Queensland Parliamentary Library, QLD Brisbane, 2002)
N. Doring, The internet’s impact on sexuality: a critical review of 15 years of research. Comput. Hum. Behav. 25, 1089–1101 (2009)
I. Elliott et al., Understanding online child pornography use: applying sexual theory to internet offenders. Aggress. Violent Behav. 14, 180–193 (2009)
M. Ferraro et al., Investigating Child Exploitation & Pornography: The Internet Law and Forensic Science (Elsevier, NY, 2005)
Garlik, UK Cybercrime Report, Online (2008)
T. Hoeren, The European Liability and Responsibility of Providers of Online Platforms such as Second Life, JILT 1 (2009)
Internet Watch Foundation, Annual Report on Cybercrime(Cambridge University Press, Cambridge, 2008)
S. Kierkeggard, Cybering, Online Grooming, and Age Play. Computer Law and Security Report 24, 41–55 (2008)
E. Lievens, Protecting children in the new media environment: rising to the regulatory challenge? Telematics Inform. 24, 315–330 (2007)
I. Marsh, M. Gaynor, Crime, Justice and the Media (Routledge, NY, 2009)
K. Mitchell et al., Protecting youth online: family use of filtering and blocking software. Child Abuse Negl. 29, 753–765 (2005)
L. Penna et al., Challenges of Automating the Detection of Pedophile Activity on the Internet, The First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE’O5), November 7–9, Taipei (2005)
C. Preston, All knowledge is not equal: facilitating children’s access to knowledge by making the internet safer. Int. J. Commun. Law Policy 13, 115–132 (2009)
E. Quayle et al., In: Child pornography and sexual exploitation of children online. The World Congress III against Sexual Exploitation of Children and Adolescents, Rio de Janerio 25–28 November, 2008
B. Schell et al., Cyber child pornography: a review paper of the social & legal issues and remedies—and a proposed technological solution. Aggression Violent Behav. 12, 45–63 (2007)
K. Sheldon, D. Howitt, Sex Offenders and the Internet (John Wiley, West Sussex, 2007)
A. Schrock et al., Online Threats to Youth: Solicitation, Harassment, and Problematic Content (Berkman Center for Internet & Society, Cambridge)
P. Sommer, Evidence in Internet Pedophilia Cases, NCS/ ACPO Conference, July 2002, Bournemouth
K. Subrahmanyam et al., The impact of computer use on children’s and adolescent’s development. Appl. Dev. Psychol. 22, 7–30 (2001)
D. Taylor, Internet Service Providers (ISPs) and their Responsibility for Content under New French Legal Regime. Comput. Law Secur. Rep. 20(4), 268–272 (2004)
D. Van der Merwe et al., Information and Communications Technology Law ( Lexis Nexis, Durban, 2008)
I. Walden, Computer Crimes and Digital Investigations (Oxford University Press, Oxford, 2007)
D. Wall, Crime and the Internet (Routledge, Oxford shire, 2001)
D. Wall, Legal professionalism in the information age. The Paralegal Educ. 22(1), 50–54 (2008)
S.-J. Wang, Measures of retaining digital evidence to prosecute computer—based cybercrimes. Comput. Stan. Interfaces 29(2), 216–223 (2007)
J. Wolak et al., Predators and their victims. Am. Psychol. Assoc. J. 63(2), 111–128 (2008)
R. Wortley, Child Pornography on the Internet, (US Department of Justice, Washington, 2006)
Acknowledgments
An earlier version of this chapter was published in JDFSL 2009 (4). The author is grateful to Glenn Dardick.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Chawki, M., Darwish, A., Khan, M.A., Tyagi, S. (2015). Online Obscenity and Child Sexual Abuse. In: Cybercrime, Digital Forensics and Jurisdiction. Studies in Computational Intelligence, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-15150-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-15150-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15149-6
Online ISBN: 978-3-319-15150-2
eBook Packages: EngineeringEngineering (R0)