1,313
Views
16
CrossRef citations to date
0
Altmetric
ARTICLES

Conceptualizing the Harms Done to Children Made the Subjects of Sexual Abuse Images Online

REFERENCES

  • Adam, A. (2002). Cyberstalking and Internet pornography: Gender and the gaze. Ethics and Information Technology, 4(2), 133–142.
  • Ainley, R. (1998). Watching the detectors: Control and the Panopticon. In R. Ainley (Ed.), New Frontiers of space, bodies and gender (pp. 88–100). London, England: Routledge.
  • Alaggia, R. (2004). Many ways of telling: Expanding conceptualizations of child sexual abuse disclosure. Child Abuse & Neglect, 28(11), 1213–1227.
  • Briere, J. (1992). Child abuse trauma: Theory and treatment of the lasting effects (Interpersonal violence: The practice series). Newbury Park, CA: Sage.
  • Bunzeluk, K. (2009). Child sexual abuse images: An analysis of websites by Cybertip.ca. Canadian Centre for Child Protection - Helping Families, Protecting Children. Retrieved from https://www.protectchildren.ca/pdfs/CTIP_ChildSexualAbuse_Report_en.pdf
  • Burgess, A., & Hartman, C. (1987). Child abuse aspects of child pornography. Psychiatric Annals, 17(4), 248–253.
  • Burstow, B. (2003). Toward a radical understanding of trauma and trauma work. Violence Against Women, 9(11), 1293–1317.
  • Butt, D. (2007). Freedom of expression and Internet child exploitation. Bangkok, Thailand: ECPAT International. Retrieved from http://portal.unesco.org/ci/en/files/25454/11909028101Butt-David.pdf/Butt-David.pdf
  • Canadian Resource Centre for Victims of Crime. (2007). Brief to the Standing Committee on Access to Information, Privacy and Ethics re: PIPEDA review. Retrieved from http://crcvc.ca/docs/PIPEDA.BRIEF.pdf
  • Carr, J. (2003). Child abuse, child pornography and the Internet. London, England: NCH, The Children's Charity. Retrieved from http://uploadi.safe.si/editor/1149589931pornographyreport.pdf
  • Carr, J. (2010). Online child protection: Combatting child pornography on the Internet. Commonwealth Internet Governance Forum, Joint Report. Retrieved from http://www.icmec.org/en_X1/pdf/Online_Child_Protection.pdf
  • Child Exploitation and Online Protection Centre (CEOP). (2014). Executive summary: A picture of abuse. Retrieved from http://www.ceop.police.uk/Documents/ceopdocs/CEOP%20IIOCTA%20Executive%20Summary.pdf
  • Chase, E., & Statham, J. (2005). Commercial and sexual exploitation of children and young people in the UK - A review. Child Abuse Review, 14(1), 4–25.
  • Cheung, M. (2012). Child sexual abuse: Best practices for interviewing and treatment. Chicago, IL: Lyceum Books.
  • Cohen, J., Mannarino, A., & Deblinger, E. (2006). Treating trauma and traumatic grief in children and adolescents. New York, NY: Guilford.
  • Courtois, C. (2002). Recollections of sexual abuse: Treatment principles and guidelines. New York, NY: W. W. Norton.
  • Daniel, B., Bowes, A. (2011). Re-thinking harm and abuse: Insights from a lifespan perspective. British Journal of Social Work, 41(5), 820–836.
  • Deblinger, E., & Heflin, A. (1996). Treating sexually abused children and their non-offending parents: A cognitive behavioral approach. Thousand Oaks, CA: Sage.
  • European Cybercrime Centre. (2015). Commercial sexual exploitation of children online: A strategic assessment. Retrieved from https://www.europol.europa.eu/content/commercial-sexual-exploitation-children-online
  • Feiring, C., & Taska, L. (2005). The persistence of shame following sexual abuse: A longitudinal look at risk and recovery. Child Maltreatment, 10(4), 337–349.
  • Filipas, H., & Ullman, S. (2006). Child sexual abuse, coping responses, self-blame, posttraumatic stress disorder, and adult sexual revictimization. Journal of Interpersonal Violence, 21(5), 652–672.
  • Finkelhor, D. (1986). A sourcebook of child sexual abuse. Newbury Park, CA: Sage.
  • Finkelhor, D. (2008). Childhood victimization: Violence, crime, and abuse in the lives of young people. New York: Oxford University Press.
  • Finkelhor, D., & Browne, A. (1985). The traumatic impact of child sexual abuse: A conceptualization. American Journal of Orthopsychiatry, 55(4), 530–541.
  • Foucault, M. (1977). Discipline and punish: The birth of a prison. London, England: Penguin.
  • Foucault, M. (1980). The eye of power. In C. Gordon (Ed.), Power/Knowledge: Selected interviews and other writings 1972-1977 by Michel Foucault (pp. 146–165). Sussex, England: Harvester Press.
  • Gilfus, M. (1999). The price of the ticket: A survivor-centered appraisal of trauma theory. Violence Against Women, 5(11), 1238–1257.
  • Hannah, M. (1997). Imperfect panopticism: envisioning the construction of normal lives. In G. Benko & U. Stohmayer (Eds.), Space and social theory: Interpreting modernity and postmodernity (pp. 334–359). Oxford, England: Blackwell.
  • Harrison, C. (2006). Cyberspace and child abuse images: A feminist perspective. Affilia: Journal of Woman and Social Work, 21(4), 365–379.
  • Herman, J. (1997). Trauma and recovery: The aftermath of violence – from domestic abuse to political terror. New York, NY: Basic Books.
  • Herman, J. (2012). Posttraumatic stress disorder as a shame disorder. In R. Dearing & J. Tangney (Eds.), Shame in the therapy hour (pp. 261–276). Washington, DC: American Psychological Association Press.
  • Herrmann, K., Jr. (1987). Children sexually exploited for profit: A plea for a new social work priority. Social Work, 32(6), 523–525.
  • Holland, G. (2005). Identifying victims of child abuse images: An analysis of successful identifications. In E. Quayle & M. Taylor (Eds.), Viewing child pornography on the Internet: Understanding the offense, managing the offender, helping the victims (pp. 75–89). Dorset, England: Russell House.
  • Hunt, P., & Baird, M. (1990). Children of sex rings. Child Welfare League of America, 69(3), 195–207.
  • International Centre for Missing and Exploited Children (ICMEC). (2006). Child pornography: Model legislation and global review (2nd ed.). Retrieved from http://www.icmec.org/en_X1/pdf/Child_Pornography_Model_Law_English_7th_Edition_2012.pdf
  • Jones, V., & Skogrand, E. (2005). Position paper regarding online images of sexual abuse and other Internet-related exploitation of children. Retrieved from https://www.crin.org/docs/savePositionPaper2005.pdf
  • Kauffman Best Practices Project. (2004). Closing the quality chasm in child abuse treatment: Identifying and disseminating best practices. The Findings of the Kauffman Best Practices Project to Help Children Heal From Child Abuse. Retrieved from www.chadwickcenter.org/…/Kaufman%20Report/ChildHosp-NCTAbrochure.pdf
  • Kelly, L., & Pringle, K. (2009). Gender and child harm. Child Abuse Review, 18, 367–371.
  • Koskela, H. (2003). “Cam Era”: The contemporary urban panopticon. Surveillance & Society, 1(3), 292–313.
  • Krause, M. (2009). In harm's way: Duty of care for child exploitation and pornography investigators. FBI Law Enforcement Bulletin, 78(1), 20–29.
  • Kuek, V., & Slane, A. (2007). Staying safely connected: Updated strategies for protecting children and youth from exploitation online. Toronto, ON: Centre for Innovation Law and Policy.
  • Leonard, M. (2010). “I did what I was directed to do but he didn't touch me”: The impact of being a victim in internet offending. Journal of Sexual Aggression, 16(2), 249–256.
  • London, K., Bruck, M., Wright, D., & Ceci, S. (2008). Review of the contemporary literature on how children report sexual abuse to others: Findings, methodological issues, and implications for forensic interviewers. Memory, 16(1), 29–47.
  • Martin, J. (2013). Out of focus: Exploring practitioners’ understanding of child sexual abuse images on the Internet. TSpace. Retrieved from https://tspace.library.utoronto.ca/handle/1807/68955
  • Martin, J. (2014a). “It's just an image, right?:” Practitioners’ understanding of child sexual abuse images online and effects on victims. Child & Youth Services, 35(2), 96–115.
  • Martin, J. (2014b). Child sexual abuse images online: Implications for social work training and practice. British Journal of Social Work, 1–17. doi: 10.1093/bjsw/bcu116
  • Martin, J., & Alaggia, R. (2013). Sexual abuse images in cyberspace: Expanding the ecology of the child. Journal of Child Sexual Abuse, 22(4), 398–415.
  • Mitchell, K., Finkelhor, D., & Wolak, J. (2005). The Internet and family and acquaintance sexual abuse. Child Maltreatment, 10(1), 49–60.
  • Muir, D. (2005). Violence against children in cyberspace. Bangkok, Thailand: ECPAT International. Retrieved from: http://ecpat.net/sites/default/files/Cyberspace_ENG_0.pdf
  • National Center for Victims of Crime (NCVC). (2015). Reporting on child sexual abuse: Effects of child sexual abuse on victims. Retrieved from http://www.victimsofcrime.org/media/reporting-on-child-sexual-abuse/effects-of-csa-on the-victim
  • National Child Traumatic Stress Network (NCTSN). (2015). Complex trauma. Retrieved from http://www.nctsn.org/trauma-types/complex-trauma
  • Negrao II, C., Bonanno, G., Noll, J., Putnam, F., & Trickett, P. (2005). Shame, humiliation, and childhood sexual abuse: Distinct contributions and emotional coherence. Child Maltreatment, 10(4), 350–363.
  • Nyman, A. (2007). Abused online. BUP Elefanten (Child and Adolescent Psychiatric Unit) and the County Council of Ostergotland: World Childhood Foundation. Retrieved from www.childcentre.info/projects/internet/dbaFile15618.pdf
  • Office of the Federal Ombudsman for Victims of Crime. (2009). Every image, every child: Internet-facilitated child sexual abuse in Canada. Ottawa, Canada: Department of Justice, Government of Canada. Retrieved from http://www.victimsfirst.gc.ca/pdf/childp-pjuvenile.pdf
  • Palmer, T. (2005). Behind the Screen – Children who are the subjects of abusive images. In E. Quayle & M. Taylor (Eds.), Viewing child pornography on the Internet: Understanding the offence, managing the offender, helping the victim (pp. 61–74). Dorset, England: Russell House.
  • Palmer, T. (2006). Sexual exploitation via the Internet: The clinical challenges. In I. Thalen & B. Bredesen (Eds.), Children and young persons with abusive and violent experiences connected to cyberspace: Challenges for research, rehabilitation, prevention and protection (pp. 8–12). Stockholm: Sweden: Swedish Children's Welfare Foundation.
  • Pierce, R. (1984). Child pornography: A hidden dimension of child abuse. Child Abuse & Neglect, 8, 483–493.
  • Putnam, F. (2003). Ten-year research update review: Child sexual abuse. Journal of the American Academy of Child and Adolescent Psychiatry, 42(3), 269–278.
  • Quayle, E., Lööf, L., & Palmer, T. (2008). Child pornography and sexual exploitation of children online. Retrieved from http://lastradainternational.org/lsidocs/Child_Pornography_and_Sexual_Exploitation_of_Children_Online.pdf
  • Quayle, E., & Sinclair, R. (2012). An introduction to the problem. In E. Quayle & K. Ribisl (Eds.), Understanding and preventing online sexual exploitation of children (pp. 3–22). New York, NY, Routledge.
  • Runyon, M., & Kenny, M. (2002). Relationship of attributional style, depression, and posttrauma distress among children who suffered physical or sexual abuse. Child Maltreatment, 7(3), 254–264.
  • Silbert, M. (1989). The effects on juveniles of being used for pornography and prostitution. In D. Zillman & C. Bryant (Eds.), Pornography: Research advances and policy consideration (pp. 215–235). Hillsdale, NJ: Erlbaum.
  • Slane, A. (2009). Child sexual exploitation, technology and crime prevention education: “Keeping pace with the risks?” Ottawa, Canada: Public Safety Canada. Retrieved from https://shared.uoit.ca/shared/faculty/fssh/documents/Slane_-_Keeping_Pace_Report_August_19_2009_FINAL1.pdf
  • Slane, A. (2010). From scanning to sexting: The scope of protection of dignity-based privacy in Canadian child pornography law. Osgoode Hall Law Journal, 48, 543–593.
  • Soderstrom, B. (2006). Experiences from and question raised in clinical practice. In I. Thalen & B. Bredesen (Eds.), Children and young persons with abusive and violent experiences connected to cyberspace: Challenges for research, rehabilitation, prevention and protection (pp. 14–17). Stockholm, Sweden: Swedish Children's Welfare Foundation.
  • Struik, A. (2014). Treating chronically traumatized children: Don't let sleeping dogs lie! New York, NY: Routledge.
  • Svedin, C. (2009). Reaching out and assisting child victims of online sexual abuse: Problematic areas and gaps. In R. Coccaro (Ed.), Child abuse images and sexual exploitation of children online (pp. 46–47). Bangkok, Thailand: ECPAT. Retrieved from http://www.ecpat.net/EI/Publications/ICT/ICT.pdf
  • Svedin, C., & Back, K. (1996). Children who don't speak out: About children being used in child pornography. Stockholm, Sweden: Swedish Save the Children.
  • UNICEF. (2014). 25 years of the Convention of the Rights of the Child: Is the world a better place for children? New York, NY: United Nations. Retrieved from http://www.unicef.org/publications/files/CRC_at_25_Anniversary_Publication_compliation_5Nov2014.pdf
  • United Nations Convention on the Rights of the Child (UNCRC). (1989). Convention on the Rights of the Child. Geneva, Switzerland: Office of the High Commissioner for Human Rights. Retrieved from http://www.ohchr.org/en/professionalinterest/pages/crc.aspx
  • United States Department of Justice. (2010). The national strategy for child exploitation prevention and interdiction: A report to Congress. Washington, DC: Author. Retrieved from: http://www.justice.gov/psc/docs/natstrategyreport.pdf
  • von Weiler, J., Haardt-Becker, A., & Schulte, S. (2010). Care and treatment of child victims of child pornographic exploitation (CPE) in Germany. Journal of Sexual Aggression, 16(2), 211–222.
  • Wasco, S. (2003) Conceptualizing the harm done by rape: Application of trauma theory to experiences of sexual assault. Trauma, Violence, & Abuse, 4(4), 309–322.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.